p 3 pk 2 q 3 q 2 q 1 p 1 1 ε ε o q m p m

Size: px
Start display at page:

Download "p 3 pk 2 q 3 q 2 q 1 p 1 1 ε ε o q m p m"

Transcription

1 Minimum-Energy Broadcast Routing in Static Ad Hoc Wireless Networks P.-J. Wan G. Calinescu.-Y. Li O. Frieder Abstract Energy conservation is a critical issue in ad hoc wireless networks for node and network life, as the nodes are owered by batteries only. One major aroach for energy conservation is to route a communication session along the routes which requires the lowest total energy consumtion. This otimization roblem is referred to as minimum-energy routing. While minimum-energy unicast routing can be solved in olynomial time by shortest-ath algorithms, it remains oen whether minimum-energy broadcast routing can be solved in olynomial time, desite of the NP-hardness of its general grah version. Recently three greedy heuristics were roosed in [8]: MST (minimum sanning tree), SPT (shortest-ath tree), and BIP (broadcasting incremental ower). They have been evaluated through simulations in [8], but little is known about their analytical erformance. The main contribution of this aer is the quantitative characterization of their erformances in terms of aroximation ratios. By exloring geometric structures of Euclidean MSTs, we have been able to rove that the aroximation ratio of MST is between 6 and, and the aroximation ratio of BIP is between and. On the other hand, the aroximation ratio of SPT is shown to be at least n,wherenis the number of receiving nodes. To our best knowledge, these are the rst analytical results for minimum-energy broadcasting. I. Introduction Ad hoc wireless networks have received signicant attention in recent years due to their otential alications in battleeld, emergency disaster relief and etc [7] [8]. Unlike wired networks or cellular networks, no wired backbone infrastructure is installed in ad hoc wireless networks. A communication session is achieved either through a gle-ho transmission if the communication arties are close enough, or through relaying by intermediate nodes otherwise. Omnidirectional antennas are used by all nodes to transmit and receive signals. They are attractive in their broadcast nature. A gle transmission by a node can be received by many nodes within its vicinity. This feature is extremely useful for multicasting/broadcasting communications. For the urose of energy conservation, each node can dynamically adjust its transmitting ower based on the distance of the receiving nodes and background noise. In the most common ower-attenuation model [6], the signal ower falls as r where r is the distance from the transmitter antenna and is the a constant between and 4 deendent on the wireless environment. All receivers have the same ower threshold for signal detection, which aretyically normalized to one. With these assumtions, the ower Deartment of Comuter Science, Illinois Institute of Technology, Chicago, IL s: fwan, calinescu, xli, ohirg@cs.iit.edu. required to suort a link between two nodes searated by ranger is r. Akey observation is that relaying signal between nodes may results in lower transmission than communicating over large distances due to the nonlinear ower attenuation. As a simle illustration, consider three nodes and with as k k > k k in Figure and assume =.Node wants to send a message to node. It has two otions. It can transmit the signal directly to node, with a energy consumtion of k k. Alternatively, it can relay the message through node and have it retransmit to node, with a total energy consumtion of k k + k k. Therefore if the angle is obtuse, the second otion consumes less total energy. A crucial issue is then how to nd a routing with minimum total energy consumtion for a given communication session. This roblem is referred to as the Minimum-Energy Routing [7] [8]. Fig.. Reduce energy consumtion through relaying. The minimum-energy broadcast/multicast routing in a simle ad hoc networking environment has been addressed by the ioneering work in [8]. To assess the comlex trade-os one at a time, the nodes in the network are assumed to be a oint set randomly distributed in a twodimensional lane and there is no mobility. Nevertheless, as argued in [8], the imact of mobility can be incororated into this static model because transmitter ower can be adjusted to accommodate the new locations of the nodes, as necessary. In other words, the caability to adjust transmission ower rovides considerable \elasticity" to the toological connectivity, and hence may reduce the The terms node, oint and vertex are interchangeable in this aer: node is a networking term, oint is a geometric term, and vertex is a grah-theoretic term.

2 need for hand-os and tracking. In addition, as assumed in [8], there are sucient bandwidth and transceiver resources. Under these assumtions, centralized (as oosed to distributed) algorithms were resented by [8] for minimum-energy broadcast/multicast routing. These centralized algorithms in this simle networking environment are exected to serve as the basis for further studies on the distributed algorithms in a more ractical network environment with limited bandwidth and transceiver resources, as well as node mobility. Three greedy heuristics were roosed in [8] for minimum-energy broadcast routing: MST (minimum sanning tree), SPT (shortest-ath tree), and BIP (broadcasting incremental ower). They have been evaluated through simulations in [8], but little is known about their analytical erformances in terms of the aroximation ratios. We believe that this analytical erformance is very essential and more convincing in evaluating these heuristics. For the minimum-energy broadcast routing, one may come u with many seemingly reasonable greedy criteria. But it's hard to tell from simulation oututs which one is better or oorer. Indeed, all the three heuristics roosed in [8] only have subtle dierences. For ure illustrative urose, another a slight variation of BIP, which is referred to Broadcast Average Incremental Power (BAIP), will be introduced in Section III. These subtle dierences, however, can have great imact on their erformance ratios. In fact, we will show thatthe aroximation ratios of MST and BIP are between 6 and and between and resectively on the other hand, the aroximation ratios of SPT and BAIP are at least n 4n and ln n ; o () resectively, where n is the number of nodes. To our best knowledge, these are the rst quantiative characterizations of heuristics for minimum-energy broadcast routing. The remaining of this aer is organized as follows. In Section II, we analyze the challenges for minimum-energy broadcast routing and briey overview the three greedy heuristics develoed in [8]. In Section III, we construct some bad instances to illustrate the oor erformance of both SPT and BAIP. These instances lead to the lower boundsonthearoximation ratios of SPT and BAIP. In Section IV, we construct instances to obtain lowerbounds on the aroximation ratios of MST and BIP. InSection V, we derive uer bounds on the aroximation ratios of MST and BIP. A cornerstone to the analysis of the uer bounds is an elegant structure roerty of Euclidean MST, which is exlored in Section VI. Finally in Section VIIwe summarize our results and oint outseveral future reseach roblems. II. Preliminaries In this aer, we assume the network nodes are given as a nite oint set P in the two-dimensional lane. For any,weuseg () to denote the weighted comlete grah over P in which the weight ofanedgee is equal to kek. The minimum-energy unicast routing is essentially a shortest-ath roblem in G (). Consider any for a unicast from a node P to another node q P can be easily obtained by alying a shortest-ath algorithm to G (). Consider any unicast ath from a node P to another node q P: = 0 m; m = q: In this ath, the transmission ower of node i for 0 i m; isk i i+ k and the transmission ower of m is zero. Thus the total transmission energy required by this ath is m; i= k i i+ k which isthetotalweight of this ath. So by alying any shortest-ath algorithm such as Dijkstra's algorithm [], one can get a minimum-energy unicast routing. However, for broadcast alications, and in general multicast alications, the minimum-energy routing is far more challenging. Any broadcast routing is an arborescence (a directed tree) T rooted at the source node of the broadcasting that sans all nodes. We usef T () to denote the transmission ower of the node required by T. Then for any leaf node of T, f T () = 0 and for any internal node of T, f T () = max qt kqk in other words, the -th ower of the longest distance between and its children in T P. The total energy required by T is then given by P f T (). Thus the minimum-energy broadcast routing is dierent from the conventional link-based minimum sanning tree (MST) roblem. Indeed, while the MST can be solved in olynomial time by algorithms such as Prim's algorithm [] and Kruskal's algorithm, it is still unknown whether minimum-energy broadcast routing can be solved in olynomial time. In its general grah version, the minimumenergy broadcast routing can be shown to be NP-hard [], and even worse, inaroxiable within a factor of ( ; ) log, where is the maximal degree and is any arbitrary small ositive constant unless NP DTIME n O(log log n) by an aroximation-reserving reduction from the Connected Dominating Set roblem [4]. However, this intractness of its general grah version does not necessarily imly the same hardness of its geometric version. In fact, as will be shown later in the aer, its geometric version can be aroximated within a constant factor. Nevertheless, this suggests that minimum-energy broadcast routing is considerably harder than the MST roblem. Three greedy heuristics have been roosed for the minimum-energy broadcast routing by [8]. The MST heuristic rst alies the Prim's algorithm to obtain a MST, and then orient it as an arborescence rooted at the source node. The SPT heuristic rst alies the Dijkstra's algorithm [] to obtain a SPT, and then orient it

3 as an arborescence rooted at the source node. The BIP heuristic is the node version of Dijkstra's algorithm for SPT. It maintains throughout its execution a gle arborescence rooted at the source node. The arborescence starts from the source node, and new nodes are added to the arborescence one at a time on a minimum incremental cost basis until all nodes are included in the arborescence. The incremental cost of adding a new node is the minimum additional ower increased by some node in the current arborescence so as to reach thisnew node. The imlementation of BIP is based on the standard Dijkstra's algorithm, with one fundamental dierence on the oeration whenever a new node is added. Whereas Dijkstra's algorithm udates the node weights (reresenting the distances), BIP udates the link costs (reresenting the incremental ower to reach the head node of the link). This udate is erformed by subtracting the cost of the added link from the cost of every link from the source node of the added link to a node not in new arborescence. The erformance of these three greedy heuristics have been evaluated in [8] by simulations studies. However, their analytic erformances in terms of the aroximation ratios remain oen. The subsequent sections of this aer will derive the bounds on their aroximation ratios. III. Greedy Is Not Always Good Greedy aroaches are the most natural and widely used techniques in design ractical heuristics for otimization roblems. For minimum-energy broadcast routing, one may think of many greedy heuristics, in addition to the three greedy heuristics roosed in [8]. The real challenge, however, is how to come u with a rovably good one. Two greedy criteria may only have slightdif- ference, but these small variation can have a great imact on their erformance. In addition, some criteria may erform quite well or even otimally in some situations, but may erform very oorly in some other situations. In this section, we describe two examles, one is SPT, another is a new one. The \bad" instance constructed in this section can not only lead to lower bounds on their aroximation ration, but also hel to design an overall good greedy criteria. For the simlicity, we only consider = in this section. We begin with the SPT algorithm. Let be a suciently small ositive number. Consider m nodes m evenly distributed on a cycle of radius centered at node o (see Figure ). For i m, let q i be the oint in the line segment o i with koq i k =. We consider a broadcasting from node o to these n =m nodes m q q q m : The SPT is the suerosition of the aths oq i i. Its total energy is + m ( ; ) : On the other hand, if the transmission ower of node o is, then the signal can reach all other oints. Thus the minimum energy is at most. So the aroximation ratio of SPT is + m ( ; ). As ;! 0, this ratio converges to n = m. ε ε o Fig.. q q q q m m A bad instance for SPT. The second greedy heuristic is very similar to Chvatal's algorithm [] for Set Cover Problem and is a variation of BIP. Like BIP, an arborescence, which starts with the source node, is maintained throughout the execution of algorithm. However, unlike BIP, many new nodes can be added one time. Similar to Chvatal's algorithm [], the new nodes added are chosen to have the minimal average incremental cost, which is dened as the ratio of the minimum addition ower increased by some node in the current arborescence so as to reach these new nodes to the number of these new nodes. We refer to this heuristic as the Broadcast Average Incremental Power, abbreviated by BAIP. In contrast to the + log m aroximation ratioofthechvatal's algorithm [] where m is the largest set size, we show that the aroximation ratio of BAIP is at least 4n ln n ; o () where n is the number of receiving nodes. Consider the following instance of minimum-energy broadcasting. All nodes are colinear with the source being the origin, the i-th receiving node at the osition i for i n ;, and the n-th receiving node at the osition n ; for some suciently small number >0. For any k n ;, the minimal transmission ower of the source to reach k receiving nodes is k = k, and thus the average ower eciency is k k =. On the other hand, the minimal transmission ower of the source to reach alln receiving nodes is ; n ; = n ;, and the thus the average ower eciency is n; n =; n. So BAIP will let the source to transmit at ower n ; to reach all nodes in a gle ste. However, the otimal routing is a directed ath consisting of all nodes from left

4 4 to right. So the minimum ower is n; i ; ; i ; + n ; ; n ; : i= < n i= i n; ; i ; =+ i= n; (n ; ) + + +ln 4i 4 = i= ln (n ; ) + 5 : 4 Thus the aroximation ratio is at least P n; i= n ; ; i ++ i ; i ; i ; + ; n ; ; n ; : As ;! 0, this ratio converges to P n i= = n ; = i ; i ; n + P n; i= 4i + P n; i= n + ln(n;)+ 4 4n ln (n ; ) + 5 = 4n ln n ; o () : n ( i++ i) Interestingly, SPT generates the otimal solution in the second bad instance, while BAIP can rovide nearotimal or otimal solution for the rst bad instance. On the other hand, MST and BIP have a lot similarities to SPT and BAIP, but have constant aroximation ratios as will be roved later. Thus one should carefully design and select greedy heuristics. IV. Lower Bounds on Aroximation Ratios In this section, we will derive lower bounds on aroximation ratios of MST and BIP. We begin with MST. Theorem : The aroximation ratio of MST is at least 6forany. Proof: Let be a suciently small ositive number. Consider seven nodes o 6 (see Figure ), which satises that ko k = Then for any i 5, and ko i k =+ i 6 k i i+ k = i 5: \ i o i+ < \ 6 o > : 4 5 Fig.. +ε +ε +ε +ε o 6 +ε A bad instance for MST. Consider the two triangles o and o 6. Since and by Law of Coe, we have ko k = ko 6 k \ 6 o > \ o k 6 k > k k =: We consider the broadcasting from the node o to nodes 6. Then the ath o 5 6 is the unique MST. It's total energy is 6. On the other hand, the otimal routing is the star centered at node o, whose total energy is ( + ). Thus the aroximation ratio is at 6 least (+), which converges to 6 as ;! 0. Now wedevelo the lower bound on the aroximation ratio of BIP. Theorem : The aroximation ratio of BIP is at least for any =. Proof: Let be a suciently small ositive number. Consider six oints 6 on a cycle of radius centered at node o (see Figure 4), with Then \ o = \ 5 o 6 = ; \ o = \ 4 o 5 = ; \ o 4 = ; \ 6 o = +: k k = k 5 6 k < k k = k 4 5 k < k 4 k < < k 6 k :

5 5 π/ θ Thus in the subsequent two stes, the oints and 5 are added, and the transmission ower of oints and 6 is k k = k 5 6 k. Similarly, in the last two stes, the oints and 4 are added, and the transmission ower of oints and 5 is k k = k 4 5 k. The total ower is 4 Fig. 4. π/ θ π/ θ 5 π/ θ q o q q q q m m+ π/ θ A bad instance for BIP. Let q be the oint in the erendicular bisector of 6 such that q is erendicular to : Choose a suciently large integer m such that koqk ; > k 4 k : m Let q q m+ be the m+ oints on the ray oq with koq i k = i m koqk for i m +. Then q m = q. We consider a broadcasting from oint o to oints q q m+ 6. The otimal solution is that the node o transmits at ower to reach all nodes. Now let's examine the outut of the BIP algorithm. As m is suciently large, in the rst m + stes, the oints q q m+ are sequentially added, and the transmission ower of the nodes o q q m all has the transmission ower Since the. angles koqk m \ q m+ q m = \ 6 q m+ q m > in the next two stes, the oints and 6 are added, and the transmission ower of oint q m+ is k q m+ k. At this moment, the incremental ower of all oints o q q m to reach any node i for i 5 is at least koqk ; > k 4 k > k k = k 5 6 k m and the incremental ower of oint q m+ to reach any node i for i 5 is also greater than k k = k 5 6 k as \ q m+ = \ 5 6 q m+ > \ q m = : 6 koqk (m +) + kqm+k +kk +kk m = m + m koqk + kqm+k +kk +kk : As ;! 0 and m ;!, the olygon converges to a regular hexagon, and the nodes q and q m+ converges to the center of the triangle o 6. Thus the total ower converges to +4=. Thus the aroximation ratio of BIP is at least 4:. V. Uer Bounds on Aroximation Ratios Our deriving of the uer bounds relies on extensively on the geometric structures of Euclidean MSTs. We rst observe that as long as the cost of a link is an increag function of the Euclidean length of the link, the set of MSTs of anyoint set coincides with the set of Euclidean MSTs of the same oint set. In fact, this can be followed from Prim's algorithm. In articular, for any sanning tree T of a (nite) oint setp, the arameter P et kek achieves its minimum if and only if T is an Euclidean MST of P. For any (nite) oint setp,weusemst (P ) to denote an arbitrary Euclidean MST of P. The radius of a oint set P is dened as inf su kqk : P qp Thus a oint set of radius one can be covered by a disk of the same radius. A key result P in this section is an uer bound on the arameter emst(p ) kek for any nite oint set P of radius P one. Note that the sureme of the length of mst (P ), emst(p ) kek, over all oint sets P of radius P one is innity. Amazingly however, the arameter emst(p ) kek is bounded by a constant for any oint set P of radius one, as shown P later. We use c to denote the sureme of the length of emst(p ) kek over all oint sets P of radius one. The next key theorem states that c is at most. Theorem : 6 c. The roof of this theorem involves comlicated geometric arguments, and therefore we ostone it in Section VI. Note that for any ointsetp of radius one, the length of each edge in mst (P ) isatmostone. Therefore, Theorem imlies that for any oint set P of radius one and any, emst(p ) kek emst(p ) kek c :

6 6 In the next, we exlore a relation between the minimum energy required by a broadcasting and the Euclidean MST of the corresonding oint set. Lemma 4: For any ointsetp in the lane, the total anergy required by any broadcasting among P is at least c P emst(p ) kek. Proof: Let T be an otimal arborescence for a broadcasting among P. For any none-leaf node in T, let T be an Euclidean MST of the oint set consisting and all children of in T. Suose that the longest Euclidean distance between and its children is r. Then the transmission ower of node is r, and all children of lie in the disk centered at with radius r. From the denition of c, we have which imlies that et r c kek c r et kek Let T denote the sanning tree obtained by suerog of all T 's for non-leaf nodes of PT. Then the total energy required by T is at least c et kek, which is P further no less than c emst(p ) kek. This comletes the roof. Consider any oint set P in the lane. Let T be an arborescence oriented from some mst P (P ). Then the total energy required by T is at most et kek. From Lemma 4, this total energy is at most c times the otimum cost. Thus the aroximation ratio of MST is at most c. Together with Theorem, this observation leads to the following theorem. Theorem 5: The aroximation ratio of MST is at most c, and therefore is at most. Finally, we derive the uer bound on the aroximation ratio of the BIP heuristic. Once again, the Euclidean MST will lay an imortant role. Lemma 6: For any broadcasting among a oint setp in the lane, the total energy required by P the arborescence generated by BIP algorithm is at most emst(p ) kek. Proof: Let G () be the comlete grah over the oint setp, in which theweight of an edge e is kek. Let T be the arborescence outut by the algorithm BIP. We construct another weighted grah H over the same oint set P according to the execution of BIP for generating T. Suose that during the execution of BIP the nodes are added in the order n where is the source node. Let T i be the arborescence just after node i is added. In H, the weight of the edge i i+ is equal to the incremental energy of the link from T i to i+ chosen during the execution of SPF and the weight ofany other edge is the same as that in G (). Note that for each edge i i+, its weight in H is not more than its weight in G (). Therefore, for any sanning tree, its weight inh is no more than its weight ing (). On the other hand, the execution of Prim's algorithm on H will emulate the algorithm BIP on G () in the sense that it will add the required nodes in the same order, and will outut the ath n. The weight of this ath in H is exactly the total energy required by T, but is at most the weight of any MSTin G (). This imlies that the total energy required by T is at most P emst(p ) kek. This comletes the roof. From the above lemma and Lemma 4, we can get the result for the BIP algorithm similar to Theorem 5. Theorem 7: The aroximation ratio of the BIP heuristic is at most c, and therefore is at most. VI. Proof of Theorem This section is devoted to the roof of Theorem. The lower bound is very trivial as it can follow from the instance consisting of seven oints: the center of a regular hexagon and its six vertices. However, the deriving of the uer bound is very challenging. We rst introduce some geometric structures and notations to be used in this section. All angles are measured in radians and take values in the range [0 ]. For any three oints and, the angle between the tworays and is denoted by \ or \. The closed innite area inside the angle \, also referred to as a sector, is denoted by ]. The triangle determined and is denoted by 4. The oen disk centered at with radius r, denoted by B ( r), is the set of oints whose distance from is less than r. The lune through oints and, denoted by L ( ), is the intersection of the two oen disks of radius k kcentered at and resectively (see Figure 5(a)). Thus it consists of oints whose distances from and are both less than k k. The oen diamond substended by a line segment, denoted by D ( ), is the rhombus with sides of length k k (see Figure 5(b)). Note that the interior angles at and within D ( )are equal to. Fig. 5. (a) (b) Illustration of (a) lune and (b) diamond. The Euclidean MSTs have many nice structure roerties [5]. Some basic roerties are listed blow. Any air of edges do not cross each other. The angles between any two edges incident to a common vertex is at least.

7 7 The length of each edge is at most the radius of the vertex set. The luna determined by each edge does not contain any other vertices. Let be any edge. Then the two endoints of any other edge are either both outside B ( k k), or both outside B ( k k). In this section, we willrstrove yet another structure roerty of the Euclidean MSTs, which isvery essential to bound the constant c: The diamonds of any two edges are disjoint. The roof of this roerty willmake use of the following lemma. Lemma 8: Let and be any three oints in the lane with \ = and k k = k k(see Figure 6). Let 4 be any oint in ] but outside 4 with \ 4 =. Then D ( 4 ) ] if and only if either 0 and k 4 k ( ;) k k or 5 6. On the other hand, as 4 and 4 4 x are similar, k 4 k k k = k xk k k = ; ; : Therefore, D ( 4 ) ] as long as k 4 k ( ;) k k. In the next we aly the above lemma to show that the diamond determined by any edge in an Euclidean MST is contained in some sector dened in the next lemma. Lemma 9: Let and be any three oints in the lane with being outside L ( ). Let 0 ( 0 resectively) be the vertex of D ( )(D ( ) resectively) which is lies on the oosite side of the line ( resectively) from ( resectively) (see Figure 7). Then D ( ) ] α α α π/ α x (a) 4 x y (a) x α α π/ α α x (b) y Fig. 6. (b) Two extreme cases for D (4) ]. Proof: Note that D ( 4 ) ] if > 5 6 and D ( 4 ) ] if 5 6. So we now assume 0. We x and calculate the maximum length of 4 such that D ( 4 ) ]. This haens when D ( 4 ) touches the ray,sayatx. We consider this extreme scenario. In this case, \ x = \ x = ; : Alying the Laws of Sine in 4 x,wehave k xk k k = ; ; : (c) Fig. 7. The three cases for Lemma 9 Proof: We assume by symmetry that is to the left of the line and to the right of the erendicular bisector of. Then k kk k. Since is outside L ( ), k kk k and \ <. x y

8 8 Therefore, q q \ 0 0 < = 5 6 \ q q q q y x \ < : Let x and y be the other twovertices of D ( )which lie between the left side and right side resectively of the line. It's sucient toshow that both x and y are within ] 0 0. This is true when \ 6 (see Figure 7(a)). So we assume that \ < 6. In this case x is within 4 0, and thus within ] 0 0, from Lemma 8 and k kk k. If \ 5 6, then y is within ] 0 ] 0 0 (see Figure 7(b)). If \ > 5 6,then \ y = ;\ ; \ y ; ; 6 = 5 6 which imlies that the ray y does not intersect with the ray 0 (see Figure 7(c)). So y is within ] 0 0. Therefore, in either case both x and y are within ] 0 0. This comletes the roof. Now we are ready to rove the \disjoint diamond" roerty of Euclidean MSTs. Lemma 0: In any Euclidean MST, the two diamonds determined by anytwo edges are disjoint. Proof: The lemma is true when two edges are incident to a common vertex as the angle between them is at least. So we consider two edges and q q with distinct endoints. We consider two cases. Case : At least one of and q q does not cross the erendicular bisector of the other. Without loss of generality, assume that q and q lie in the same side of the erendicular bisector of as (see Figure 8(a)). Let q 0 (q 0 resectively) be the vertex of D ( q ) (D ( q ) resectively) which is lies on the oosite side of the line q ( q resectively) from q (q resectively). Then from Lemma 9, D (q q ) ]q 0 q 0. On the other hand, ce both q and q are outside L ( ), D ( ) is outside ]q 0 q 0. Thus D ( ) and D (q q ) are disjoint. Case : Both and q q cross the erendicular bisector of the other. Without loss of generality, assume that q lies in the same side of the erendicular bisector of as (see Figure 8(b)). Then must lie in the same side of the erendicular bisector of q q as q, for otherwise k q k > k q k > k q k > k q k i.e., both and lie in the same side of the erendicular bisector of q q as q, which contradicts to the assumtion. Since q is outside L ( ) and (a) Fig. 8. Two cases for Lemma 0. k q k > k q k, we have k q k > k k. As k q k > k q k, q is outside 4q. Similarly, any of these four oints q and q is outside the triangle determined by theother three oints. This imlies that the convex hull determined by these four oints is a quadrilateral. Note that and q q can't be the two diagonals of the quadrilateral as they do not cross each other. Neither can be q and q as they are searated by the erendicular bisector of. Thus the two diagonals must be q and q, and consequently the boundary of the quadrilateral is q q. From the revious argument its four sides are all less than its two diagonals, and hence its four inner angles are all more than. Without loss of generality, we assume that k q kk q k. Then k q kk k, for otherwise q would be inside B ( k k) and q would be inside B ( k k), which is imossible. Similarly, k q kkq q k. Therefore, both \q q and \ q are less than. Since both \q and \ q q are less than,wehave \q \ q q 5 6 (b) : Let x be the oint inside ]q such that 4 q x is equilateral. Then both and q q are outside 4 q x. In addition, and \x \xq q 0 k xkk k kq xkkq q k : Let y be the center of 4 q x. Then from Lemma 8, D ( ) ] yx D (q q ) ]q yx: This imlies that D ( ) and D (q q ) are disjoint. Let P be any oint set of radius one. According to Lemma 0, the total area of the diamonds through the

9 edges in mst (P ) equals to 6 emst(p ) kek : Let be the oint in P such that all oints in P have distance of at most one from. Since all edges have lengths of at most one, all diamonds are contained in B. This imlies that 6 emst(p ) kek = 4 : q 9 Therefore emst(p ) kek 8 4:5: This estimation is quite loose and fails in getting the desired uer bound. In the next, we will rovide a tighter estimation which can lead to the uer bound. We observe that the total area of the diamonds is no more than the area of the disk B ( ) lus the sticking-out areas of these diamonds beyond B ( ). Let D ( )beany diamond which sticks out B ( ), and let q be its vertex which is outside B ( ) (see Figure 9). Let 0 ( 0 resectively) be the intersection between q ( q resectively) and the boundary of B ( ). Then the sticking-out area of D ( ) can be calculated by subtracting the area of the sector substended by 0 and 0 from the area of the quadrilateral 0 q0. The area of the quadrilateral 0 q0 can be further calculated by summing u the areas of and 4q 0 0. As \ 0 q0 is a constant, the area of 4q0 0 is maximized when kq 0 k kq 0 k. Let \ 0 0 =, then ; 0 and the sticking-out area of D ( )isaat most S () = + 6 ( ; cos ) ; : The area function S () has the following nice roerty. Lemma : For any ; 0,. if +, S ()+S() S ( + ). if +, S ()+S () S ; + ; + S ;. Proof: The lemma follows from the following two equality: for any and, S ( + ) ; S () ; S () = 4 6 ; + + ; + S S = 4 + ; 6 ; S () ; S () 6 ; 6 ; : Fig. 9. The calculation of the sticking-out area. We rst rove the rst equality. S ( + ) ; S () ; S () = ( ( + ) ; ; )+ ((cos +cos) ; (cos ( + )+)) 6 = + cos + ; + cos + = + cos + cos ; cos + = cos ; cos ; ; cos + + ; cos ; ; cos + cos + ; + = 4 6 ; + Now werove the second equality. S + ; + S ; S () ; S () =(S ( + ) ; S () ; S ()) ; S ( + ) ; S + ; ; S = 4 6 ; + ; 4 + ; 6 = 4 + ; 6 = + ; 6 = 4 + ; ; ; + cos 6 ; + ; ; 6 ; cos ; 6 ; :

10 0 Suose that there are k diamonds which stick out B ( ). For any i k, let i be the inner angle of the arc between the two intersection oints of the boundary B ( ) and the boundary of the i-th stickingout diamond. Then i ; 0 and k i= i < : By reeatedly alying the two inequalities in Lemma, the total sticking-out area of the diamonds is k i= &P k i= S ( i ) i 6S ' S = ; : Thus the total area of diamonds is at most Therefore, + ; = : emst(p ) kek 6 This comletes the roof Theorem. =: VII. Summary and Future Works In this aer, we have rovided theoretical erformance analysis the heuristics resented in [8]. The aroximation ratio of SPT is at least n, and thus less favorable from the theoretical ersective. The other two heuristics, MST and BIP, have constant aroximation ratios. Secically, the aroximation ratio of MST is between 6 and c, which is at most the aroximation ratio of the BIP heuristic is between and c. However, there are still several challenging issues for future research. First of all, the comutational comlexity of the Minimum-Energy Broadcasting remains unknown. As mentioned in Section I, the grah-version of this roblem is at least as hard as the Connected Dominate Set roblem. However, due to its geometric nature, this intractness of the grah version does not imly the same intractness of geometric version which isstudied in this aer. Indeed, while Connected Dominating Set roblem does not allow a constant-aroximation ratio, the geometric version does on the contrary, for examle, bymst or BIP. Secondly, the exact value of the constant c remains unsolved. A tighter uer bound on c can lead to tighter uer bounds on the aroximation ratios of both MST and BIP. From the deriving of the uer bound, we observe there are still rooms to imrove the uer bound. For examle, it's very unlikely for the diamonds to ll the unit disk fully. At least this is true for small number of nodes. However, the treatment of large number of nodes is quite challenging, and more geometric roerties of the Euclidean MSTs have to be exlored. The third interesting roblem is how to construct \worse" instances that can lead to better lower bounds on the aroximation ratios of both the MST and BIP. A major challenge, and a toic of continued research, is the develoment of distributed algorithms of MST and BIP. These algorithms should take advantage of the geometric roerties for fast imlementation. Furthermore, it is imortant to study the imact of limited bandwidth and transceiver resources, as well as to develo mechanisms to coe with node mobility [8]. References [] V. Chvatal, \A Greedy Heuristic for the Set-Covering Problem", Mathematics of Oerations Research, Vol. 4, No.,. {5, 979. [] T. J. Cormen, C. E. Leiserson, and R. L. Rivest, Introduction to Algorithms, MIT Press and MxGraw-Hill, 990. [] M. R. Garey, and D. S. Johnson, Comuters and Intractability: a Guide to the Theory of NP-Comleteness, W. H. Freeman and Comany, 979. [4] S. Guha, and S. Khuller, \Aroximation Algorithms for Connected Dominating Sets". Algorithmica 998, 0: [5] F. P. Prearata and M. I. Shamos, Comuatational Geometry: an Introduction, Sringer-Verlag, 985. [6] T. S. Raaort, Wireless Communications: Princiles and Practices, Prentice Hall, 996. [7] S. Singh, C. S. Raghavendra, and J. Steanek, \Power-Aware Broadcasting in Mobile Ad Hoc Networks", Proceedings of IEEE PIMRC'99, Osaka, Jaan, Se [8] J.E. Wieselthier, G.D. Nguyen, and A. Ehremides, \On the Construction of energy-ecient Broadcast and Multicast Trees in Wireless Networks". IEEE Infocom'000.

Minimum-Energy Broadcast Routing

Minimum-Energy Broadcast Routing Minimum-Energy Broadcast Routing in Static Ad Hoc Wireless Networks P.-J. Wan G. Călinescu X.-Y. Li O. Frieder Abstract Energy conservation is a critical issue in ad hoc wireless networks for node and

More information

Strong Matching of Points with Geometric Shapes

Strong Matching of Points with Geometric Shapes Strong Matching of Points with Geometric Shaes Ahmad Biniaz Anil Maheshwari Michiel Smid School of Comuter Science, Carleton University, Ottawa, Canada December 9, 05 In memory of Ferran Hurtado. Abstract

More information

where x i is the ith coordinate of x R N. 1. Show that the following upper bound holds for the growth function of H:

where x i is the ith coordinate of x R N. 1. Show that the following upper bound holds for the growth function of H: Mehryar Mohri Foundations of Machine Learning Courant Institute of Mathematical Sciences Homework assignment 2 October 25, 2017 Due: November 08, 2017 A. Growth function Growth function of stum functions.

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

1 1 c (a) 1 (b) 1 Figure 1: (a) First ath followed by salesman in the stris method. (b) Alternative ath. 4. D = distance travelled closing the loo. Th

1 1 c (a) 1 (b) 1 Figure 1: (a) First ath followed by salesman in the stris method. (b) Alternative ath. 4. D = distance travelled closing the loo. Th 18.415/6.854 Advanced Algorithms ovember 7, 1996 Euclidean TSP (art I) Lecturer: Michel X. Goemans MIT These notes are based on scribe notes by Marios Paaefthymiou and Mike Klugerman. 1 Euclidean TSP Consider

More information

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:

More information

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES AARON ZWIEBACH Abstract. In this aer we will analyze research that has been recently done in the field of discrete

More information

Parallelism and Locality in Priority Queues. A. Ranade S. Cheng E. Deprit J. Jones S. Shih. University of California. Berkeley, CA 94720

Parallelism and Locality in Priority Queues. A. Ranade S. Cheng E. Deprit J. Jones S. Shih. University of California. Berkeley, CA 94720 Parallelism and Locality in Priority Queues A. Ranade S. Cheng E. Derit J. Jones S. Shih Comuter Science Division University of California Berkeley, CA 94720 Abstract We exlore two ways of incororating

More information

Multi-Operation Multi-Machine Scheduling

Multi-Operation Multi-Machine Scheduling Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job

More information

19th Bay Area Mathematical Olympiad. Problems and Solutions. February 28, 2017

19th Bay Area Mathematical Olympiad. Problems and Solutions. February 28, 2017 th Bay Area Mathematical Olymiad February, 07 Problems and Solutions BAMO- and BAMO- are each 5-question essay-roof exams, for middle- and high-school students, resectively. The roblems in each exam are

More information

COMMUNICATION BETWEEN SHAREHOLDERS 1

COMMUNICATION BETWEEN SHAREHOLDERS 1 COMMUNICATION BTWN SHARHOLDRS 1 A B. O A : A D Lemma B.1. U to µ Z r 2 σ2 Z + σ2 X 2r ω 2 an additive constant that does not deend on a or θ, the agents ayoffs can be written as: 2r rθa ω2 + θ µ Y rcov

More information

Positive decomposition of transfer functions with multiple poles

Positive decomposition of transfer functions with multiple poles Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

THE ERDÖS - MORDELL THEOREM IN THE EXTERIOR DOMAIN

THE ERDÖS - MORDELL THEOREM IN THE EXTERIOR DOMAIN INTERNATIONAL JOURNAL OF GEOMETRY Vol. 5 (2016), No. 1, 31-38 THE ERDÖS - MORDELL THEOREM IN THE EXTERIOR DOMAIN PETER WALKER Abstract. We show that in the Erd½os-Mordell theorem, the art of the region

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

216 S. Chandrasearan and I.C.F. Isen Our results dier from those of Sun [14] in two asects: we assume that comuted eigenvalues or singular values are

216 S. Chandrasearan and I.C.F. Isen Our results dier from those of Sun [14] in two asects: we assume that comuted eigenvalues or singular values are Numer. Math. 68: 215{223 (1994) Numerische Mathemati c Sringer-Verlag 1994 Electronic Edition Bacward errors for eigenvalue and singular value decomositions? S. Chandrasearan??, I.C.F. Isen??? Deartment

More information

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS #A13 INTEGERS 14 (014) ON THE LEAST SIGNIFICANT ADIC DIGITS OF CERTAIN LUCAS NUMBERS Tamás Lengyel Deartment of Mathematics, Occidental College, Los Angeles, California lengyel@oxy.edu Received: 6/13/13,

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

Feedback-error control

Feedback-error control Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller

More information

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms

More information

On the Chvatál-Complexity of Knapsack Problems

On the Chvatál-Complexity of Knapsack Problems R u t c o r Research R e o r t On the Chvatál-Comlexity of Knasack Problems Gergely Kovács a Béla Vizvári b RRR 5-08, October 008 RUTCOR Rutgers Center for Oerations Research Rutgers University 640 Bartholomew

More information

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their

More information

Stable Delaunay Graphs

Stable Delaunay Graphs Stable Delaunay Grahs Pankaj K. Agarwal Jie Gao Leonidas Guibas Haim Kalan Natan Rubin Micha Sharir Aril 29, 2014 Abstract Let P be a set of n oints in R 2, and let DT(P) denote its Euclidean Delaunay

More information

Sums of independent random variables

Sums of independent random variables 3 Sums of indeendent random variables This lecture collects a number of estimates for sums of indeendent random variables with values in a Banach sace E. We concentrate on sums of the form N γ nx n, where

More information

Introduction Consider a set of jobs that are created in an on-line fashion and should be assigned to disks. Each job has a weight which is the frequen

Introduction Consider a set of jobs that are created in an on-line fashion and should be assigned to disks. Each job has a weight which is the frequen Ancient and new algorithms for load balancing in the L norm Adi Avidor Yossi Azar y Jir Sgall z July 7, 997 Abstract We consider the on-line load balancing roblem where there are m identical machines (servers)

More information

On a Markov Game with Incomplete Information

On a Markov Game with Incomplete Information On a Markov Game with Incomlete Information Johannes Hörner, Dinah Rosenberg y, Eilon Solan z and Nicolas Vieille x{ January 24, 26 Abstract We consider an examle of a Markov game with lack of information

More information

Opposite-quadrant depth in the plane

Opposite-quadrant depth in the plane Oosite-quadrant deth in the lane Hervé Brönnimann Jonathan Lenchner János Pach Comuter and Information Science, Polytechnic University, Brooklyn, NY 1101, hbr@oly.edu IBM T. J. Watson Research Center,

More information

Correspondence Between Fractal-Wavelet. Transforms and Iterated Function Systems. With Grey Level Maps. F. Mendivil and E.R.

Correspondence Between Fractal-Wavelet. Transforms and Iterated Function Systems. With Grey Level Maps. F. Mendivil and E.R. 1 Corresondence Between Fractal-Wavelet Transforms and Iterated Function Systems With Grey Level Mas F. Mendivil and E.R. Vrscay Deartment of Alied Mathematics Faculty of Mathematics University of Waterloo

More information

A Social Welfare Optimal Sequential Allocation Procedure

A Social Welfare Optimal Sequential Allocation Procedure A Social Welfare Otimal Sequential Allocation Procedure Thomas Kalinowsi Universität Rostoc, Germany Nina Narodytsa and Toby Walsh NICTA and UNSW, Australia May 2, 201 Abstract We consider a simle sequential

More information

Best approximation by linear combinations of characteristic functions of half-spaces

Best approximation by linear combinations of characteristic functions of half-spaces Best aroximation by linear combinations of characteristic functions of half-saces Paul C. Kainen Deartment of Mathematics Georgetown University Washington, D.C. 20057-1233, USA Věra Kůrková Institute of

More information

MA3H1 TOPICS IN NUMBER THEORY PART III

MA3H1 TOPICS IN NUMBER THEORY PART III MA3H1 TOPICS IN NUMBER THEORY PART III SAMIR SIKSEK 1. Congruences Modulo m In quadratic recirocity we studied congruences of the form x 2 a (mod ). We now turn our attention to situations where is relaced

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

The inverse Goldbach problem

The inverse Goldbach problem 1 The inverse Goldbach roblem by Christian Elsholtz Submission Setember 7, 2000 (this version includes galley corrections). Aeared in Mathematika 2001. Abstract We imrove the uer and lower bounds of the

More information

On the irreducibility of a polynomial associated with the Strong Factorial Conjecture

On the irreducibility of a polynomial associated with the Strong Factorial Conjecture On the irreducibility of a olynomial associated with the Strong Factorial Conecture Michael Filaseta Mathematics Deartment University of South Carolina Columbia, SC 29208 USA E-mail: filaseta@math.sc.edu

More information

Statics and dynamics: some elementary concepts

Statics and dynamics: some elementary concepts 1 Statics and dynamics: some elementary concets Dynamics is the study of the movement through time of variables such as heartbeat, temerature, secies oulation, voltage, roduction, emloyment, rices and

More information

Convexification of Generalized Network Flow Problem with Application to Power Systems

Convexification of Generalized Network Flow Problem with Application to Power Systems 1 Convexification of Generalized Network Flow Problem with Alication to Power Systems Somayeh Sojoudi and Javad Lavaei + Deartment of Comuting and Mathematical Sciences, California Institute of Technology

More information

Improvement on the Decay of Crossing Numbers

Improvement on the Decay of Crossing Numbers Grahs and Combinatorics 2013) 29:365 371 DOI 10.1007/s00373-012-1137-3 ORIGINAL PAPER Imrovement on the Decay of Crossing Numbers Jakub Černý Jan Kynčl Géza Tóth Received: 24 Aril 2007 / Revised: 1 November

More information

A Special Case Solution to the Perspective 3-Point Problem William J. Wolfe California State University Channel Islands

A Special Case Solution to the Perspective 3-Point Problem William J. Wolfe California State University Channel Islands A Secial Case Solution to the Persective -Point Problem William J. Wolfe California State University Channel Islands william.wolfe@csuci.edu Abstract In this aer we address a secial case of the ersective

More information

#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS

#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS #A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS Ramy F. Taki ElDin Physics and Engineering Mathematics Deartment, Faculty of Engineering, Ain Shams University, Cairo, Egyt

More information

On Wald-Type Optimal Stopping for Brownian Motion

On Wald-Type Optimal Stopping for Brownian Motion J Al Probab Vol 34, No 1, 1997, (66-73) Prerint Ser No 1, 1994, Math Inst Aarhus On Wald-Tye Otimal Stoing for Brownian Motion S RAVRSN and PSKIR The solution is resented to all otimal stoing roblems of

More information

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems Int. J. Oen Problems Comt. Math., Vol. 3, No. 2, June 2010 ISSN 1998-6262; Coyright c ICSRS Publication, 2010 www.i-csrs.org Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various

More information

Multiplicity of weak solutions for a class of nonuniformly elliptic equations of p-laplacian type

Multiplicity of weak solutions for a class of nonuniformly elliptic equations of p-laplacian type Nonlinear Analysis 7 29 536 546 www.elsevier.com/locate/na Multilicity of weak solutions for a class of nonuniformly ellitic equations of -Lalacian tye Hoang Quoc Toan, Quô c-anh Ngô Deartment of Mathematics,

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

Lilian Markenzon 1, Nair Maria Maia de Abreu 2* and Luciana Lee 3

Lilian Markenzon 1, Nair Maria Maia de Abreu 2* and Luciana Lee 3 Pesquisa Oeracional (2013) 33(1): 123-132 2013 Brazilian Oerations Research Society Printed version ISSN 0101-7438 / Online version ISSN 1678-5142 www.scielo.br/oe SOME RESULTS ABOUT THE CONNECTIVITY OF

More information

Diverse Routing in Networks with Probabilistic Failures

Diverse Routing in Networks with Probabilistic Failures Diverse Routing in Networks with Probabilistic Failures Hyang-Won Lee, Member, IEEE, Eytan Modiano, Senior Member, IEEE, Kayi Lee, Member, IEEE Abstract We develo diverse routing schemes for dealing with

More information

p-adic Measures and Bernoulli Numbers

p-adic Measures and Bernoulli Numbers -Adic Measures and Bernoulli Numbers Adam Bowers Introduction The constants B k in the Taylor series exansion t e t = t k B k k! k=0 are known as the Bernoulli numbers. The first few are,, 6, 0, 30, 0,

More information

Complex Analysis Homework 1

Complex Analysis Homework 1 Comlex Analysis Homework 1 Steve Clanton Sarah Crimi January 27, 2009 Problem Claim. If two integers can be exressed as the sum of two squares, then so can their roduct. Proof. Call the two squares that

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

Radial Basis Function Networks: Algorithms

Radial Basis Function Networks: Algorithms Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.

More information

A numerical implementation of a predictor-corrector algorithm for sufcient linear complementarity problem

A numerical implementation of a predictor-corrector algorithm for sufcient linear complementarity problem A numerical imlementation of a redictor-corrector algorithm for sufcient linear comlementarity roblem BENTERKI DJAMEL University Ferhat Abbas of Setif-1 Faculty of science Laboratory of fundamental and

More information

Monopolist s mark-up and the elasticity of substitution

Monopolist s mark-up and the elasticity of substitution Croatian Oerational Research Review 377 CRORR 8(7), 377 39 Monoolist s mark-u and the elasticity of substitution Ilko Vrankić, Mira Kran, and Tomislav Herceg Deartment of Economic Theory, Faculty of Economics

More information

GENERICITY OF INFINITE-ORDER ELEMENTS IN HYPERBOLIC GROUPS

GENERICITY OF INFINITE-ORDER ELEMENTS IN HYPERBOLIC GROUPS GENERICITY OF INFINITE-ORDER ELEMENTS IN HYPERBOLIC GROUPS PALLAVI DANI 1. Introduction Let Γ be a finitely generated grou and let S be a finite set of generators for Γ. This determines a word metric on

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

An Ant Colony Optimization Approach to the Probabilistic Traveling Salesman Problem

An Ant Colony Optimization Approach to the Probabilistic Traveling Salesman Problem An Ant Colony Otimization Aroach to the Probabilistic Traveling Salesman Problem Leonora Bianchi 1, Luca Maria Gambardella 1, and Marco Dorigo 2 1 IDSIA, Strada Cantonale Galleria 2, CH-6928 Manno, Switzerland

More information

Mollifiers and its applications in L p (Ω) space

Mollifiers and its applications in L p (Ω) space Mollifiers and its alications in L () sace MA Shiqi Deartment of Mathematics, Hong Kong Batist University November 19, 2016 Abstract This note gives definition of mollifier and mollification. We illustrate

More information

1 Extremum Estimators

1 Extremum Estimators FINC 9311-21 Financial Econometrics Handout Jialin Yu 1 Extremum Estimators Let θ 0 be a vector of k 1 unknown arameters. Extremum estimators: estimators obtained by maximizing or minimizing some objective

More information

Probability Estimates for Multi-class Classification by Pairwise Coupling

Probability Estimates for Multi-class Classification by Pairwise Coupling Probability Estimates for Multi-class Classification by Pairwise Couling Ting-Fan Wu Chih-Jen Lin Deartment of Comuter Science National Taiwan University Taiei 06, Taiwan Ruby C. Weng Deartment of Statistics

More information

Approximation of the Euclidean Distance by Chamfer Distances

Approximation of the Euclidean Distance by Chamfer Distances Acta Cybernetica 0 (0 399 47. Aroximation of the Euclidean Distance by Chamfer Distances András Hajdu, Lajos Hajdu, and Robert Tijdeman Abstract Chamfer distances lay an imortant role in the theory of

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

Notes on duality in second order and -order cone otimization E. D. Andersen Λ, C. Roos y, and T. Terlaky z Aril 6, 000 Abstract Recently, the so-calle

Notes on duality in second order and -order cone otimization E. D. Andersen Λ, C. Roos y, and T. Terlaky z Aril 6, 000 Abstract Recently, the so-calle McMaster University Advanced Otimization Laboratory Title: Notes on duality in second order and -order cone otimization Author: Erling D. Andersen, Cornelis Roos and Tamás Terlaky AdvOl-Reort No. 000/8

More information

arxiv:cond-mat/ v2 25 Sep 2002

arxiv:cond-mat/ v2 25 Sep 2002 Energy fluctuations at the multicritical oint in two-dimensional sin glasses arxiv:cond-mat/0207694 v2 25 Se 2002 1. Introduction Hidetoshi Nishimori, Cyril Falvo and Yukiyasu Ozeki Deartment of Physics,

More information

IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES

IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES OHAD GILADI AND ASSAF NAOR Abstract. It is shown that if (, ) is a Banach sace with Rademacher tye 1 then for every n N there exists

More information

LEIBNIZ SEMINORMS IN PROBABILITY SPACES

LEIBNIZ SEMINORMS IN PROBABILITY SPACES LEIBNIZ SEMINORMS IN PROBABILITY SPACES ÁDÁM BESENYEI AND ZOLTÁN LÉKA Abstract. In this aer we study the (strong) Leibniz roerty of centered moments of bounded random variables. We shall answer a question

More information

Convex Analysis and Economic Theory Winter 2018

Convex Analysis and Economic Theory Winter 2018 Division of the Humanities and Social Sciences Ec 181 KC Border Conve Analysis and Economic Theory Winter 2018 Toic 16: Fenchel conjugates 16.1 Conjugate functions Recall from Proosition 14.1.1 that is

More information

Cubic Sieve Congruence of the Discrete Logarithm Problem, and Fractional Part Sequences

Cubic Sieve Congruence of the Discrete Logarithm Problem, and Fractional Part Sequences Cubic Sieve Congruence of the Discrete Logarithm Problem, and Fractional Part Sequences Srinivas Vivek University of Luxembourg, Luxembourg C. E. Veni Madhavan Deartment of Comuter Science and Automation,

More information

15-451/651: Design & Analysis of Algorithms October 23, 2018 Lecture #17: Prediction from Expert Advice last changed: October 25, 2018

15-451/651: Design & Analysis of Algorithms October 23, 2018 Lecture #17: Prediction from Expert Advice last changed: October 25, 2018 5-45/65: Design & Analysis of Algorithms October 23, 208 Lecture #7: Prediction from Exert Advice last changed: October 25, 208 Prediction with Exert Advice Today we ll study the roblem of making redictions

More information

An Estimate For Heilbronn s Exponential Sum

An Estimate For Heilbronn s Exponential Sum An Estimate For Heilbronn s Exonential Sum D.R. Heath-Brown Magdalen College, Oxford For Heini Halberstam, on his retirement Let be a rime, and set e(x) = ex(2πix). Heilbronn s exonential sum is defined

More information

On split sample and randomized confidence intervals for binomial proportions

On split sample and randomized confidence intervals for binomial proportions On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have

More information

A Plane 1.88-Spanner for Points in Convex Position

A Plane 1.88-Spanner for Points in Convex Position A Plane 1.88-Sanner or Points in Convex Position Mahdi Amani Ahmad Biniaz Prosenjit Bose Jean-Lou De Caruel Anil Maheshwari Michiel Smid October 6, 016 Abstract Let S be a set o n oints in the lane that

More information

Some results of convex programming complexity

Some results of convex programming complexity 2012c12 $ Ê Æ Æ 116ò 14Ï Dec., 2012 Oerations Research Transactions Vol.16 No.4 Some results of convex rogramming comlexity LOU Ye 1,2 GAO Yuetian 1 Abstract Recently a number of aers were written that

More information

The non-stochastic multi-armed bandit problem

The non-stochastic multi-armed bandit problem Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at

More information

Asymptotically Optimal Simulation Allocation under Dependent Sampling

Asymptotically Optimal Simulation Allocation under Dependent Sampling Asymtotically Otimal Simulation Allocation under Deendent Samling Xiaoing Xiong The Robert H. Smith School of Business, University of Maryland, College Park, MD 20742-1815, USA, xiaoingx@yahoo.com Sandee

More information

HARMONIC EXTENSION ON NETWORKS

HARMONIC EXTENSION ON NETWORKS HARMONIC EXTENSION ON NETWORKS MING X. LI Abstract. We study the imlication of geometric roerties of the grah of a network in the extendibility of all γ-harmonic germs at an interior node. We rove that

More information

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar 15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider

More information

Analysis of some entrance probabilities for killed birth-death processes

Analysis of some entrance probabilities for killed birth-death processes Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction

More information

Efficient algorithms for the smallest enclosing ball problem

Efficient algorithms for the smallest enclosing ball problem Efficient algorithms for the smallest enclosing ball roblem Guanglu Zhou, Kim-Chuan Toh, Jie Sun November 27, 2002; Revised August 4, 2003 Abstract. Consider the roblem of comuting the smallest enclosing

More information

CMSC 425: Lecture 4 Geometry and Geometric Programming

CMSC 425: Lecture 4 Geometry and Geometric Programming CMSC 425: Lecture 4 Geometry and Geometric Programming Geometry for Game Programming and Grahics: For the next few lectures, we will discuss some of the basic elements of geometry. There are many areas

More information

Sets of Real Numbers

Sets of Real Numbers Chater 4 Sets of Real Numbers 4. The Integers Z and their Proerties In our revious discussions about sets and functions the set of integers Z served as a key examle. Its ubiquitousness comes from the fact

More information

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4 Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work

More information

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction GOOD MODELS FOR CUBIC SURFACES ANDREAS-STEPHAN ELSENHANS Abstract. This article describes an algorithm for finding a model of a hyersurface with small coefficients. It is shown that the aroach works in

More information

A New Perspective on Learning Linear Separators with Large L q L p Margins

A New Perspective on Learning Linear Separators with Large L q L p Margins A New Persective on Learning Linear Searators with Large L q L Margins Maria-Florina Balcan Georgia Institute of Technology Christoher Berlind Georgia Institute of Technology Abstract We give theoretical

More information

Brownian Motion and Random Prime Factorization

Brownian Motion and Random Prime Factorization Brownian Motion and Random Prime Factorization Kendrick Tang June 4, 202 Contents Introduction 2 2 Brownian Motion 2 2. Develoing Brownian Motion.................... 2 2.. Measure Saces and Borel Sigma-Algebras.........

More information

Topic 7: Using identity types

Topic 7: Using identity types Toic 7: Using identity tyes June 10, 2014 Now we would like to learn how to use identity tyes and how to do some actual mathematics with them. By now we have essentially introduced all inference rules

More information

#A37 INTEGERS 15 (2015) NOTE ON A RESULT OF CHUNG ON WEIL TYPE SUMS

#A37 INTEGERS 15 (2015) NOTE ON A RESULT OF CHUNG ON WEIL TYPE SUMS #A37 INTEGERS 15 (2015) NOTE ON A RESULT OF CHUNG ON WEIL TYPE SUMS Norbert Hegyvári ELTE TTK, Eötvös University, Institute of Mathematics, Budaest, Hungary hegyvari@elte.hu François Hennecart Université

More information

Applicable Analysis and Discrete Mathematics available online at HENSEL CODES OF SQUARE ROOTS OF P-ADIC NUMBERS

Applicable Analysis and Discrete Mathematics available online at   HENSEL CODES OF SQUARE ROOTS OF P-ADIC NUMBERS Alicable Analysis and Discrete Mathematics available online at htt://efmath.etf.rs Al. Anal. Discrete Math. 4 (010), 3 44. doi:10.98/aadm1000009m HENSEL CODES OF SQUARE ROOTS OF P-ADIC NUMBERS Zerzaihi

More information

AR PROCESSES AND SOURCES CAN BE RECONSTRUCTED FROM. Radu Balan, Alexander Jourjine, Justinian Rosca. Siemens Corporation Research

AR PROCESSES AND SOURCES CAN BE RECONSTRUCTED FROM. Radu Balan, Alexander Jourjine, Justinian Rosca. Siemens Corporation Research AR PROCESSES AND SOURCES CAN BE RECONSTRUCTED FROM DEGENERATE MIXTURES Radu Balan, Alexander Jourjine, Justinian Rosca Siemens Cororation Research 7 College Road East Princeton, NJ 8 fradu,jourjine,roscag@scr.siemens.com

More information

Linear diophantine equations for discrete tomography

Linear diophantine equations for discrete tomography Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,

More information

2 K. ENTACHER 2 Generalized Haar function systems In the following we x an arbitrary integer base b 2. For the notations and denitions of generalized

2 K. ENTACHER 2 Generalized Haar function systems In the following we x an arbitrary integer base b 2. For the notations and denitions of generalized BIT 38 :2 (998), 283{292. QUASI-MONTE CARLO METHODS FOR NUMERICAL INTEGRATION OF MULTIVARIATE HAAR SERIES II KARL ENTACHER y Deartment of Mathematics, University of Salzburg, Hellbrunnerstr. 34 A-52 Salzburg,

More information

A Note on Guaranteed Sparse Recovery via l 1 -Minimization

A Note on Guaranteed Sparse Recovery via l 1 -Minimization A Note on Guaranteed Sarse Recovery via l -Minimization Simon Foucart, Université Pierre et Marie Curie Abstract It is roved that every s-sarse vector x C N can be recovered from the measurement vector

More information

On a class of Rellich inequalities

On a class of Rellich inequalities On a class of Rellich inequalities G. Barbatis A. Tertikas Dedicated to Professor E.B. Davies on the occasion of his 60th birthday Abstract We rove Rellich and imroved Rellich inequalities that involve

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

Recursive Estimation of the Preisach Density function for a Smart Actuator

Recursive Estimation of the Preisach Density function for a Smart Actuator Recursive Estimation of the Preisach Density function for a Smart Actuator Ram V. Iyer Deartment of Mathematics and Statistics, Texas Tech University, Lubbock, TX 7949-142. ABSTRACT The Preisach oerator

More information

HAUSDORFF MEASURE OF p-cantor SETS

HAUSDORFF MEASURE OF p-cantor SETS Real Analysis Exchange Vol. 302), 2004/2005,. 20 C. Cabrelli, U. Molter, Deartamento de Matemática, Facultad de Cs. Exactas y Naturales, Universidad de Buenos Aires and CONICET, Pabellón I - Ciudad Universitaria,

More information

7. The olynomial P (x) =x, 9x 4 +9x, 4x +4x, 4 can be written in the form P (x) =(x, ) n Q(x), where n is a ositive integer and Q(x) is not divisible

7. The olynomial P (x) =x, 9x 4 +9x, 4x +4x, 4 can be written in the form P (x) =(x, ) n Q(x), where n is a ositive integer and Q(x) is not divisible . Which of the following intervals contains all of the real zeros of the function g(t) =t, t + t? (a) (,; ) (b) ( ; ) (c) (,; ) (d) (; ) (e) (,; ) 4 4. The exression ((a), + b), is equivalent to which

More information

q-ary Symmetric Channel for Large q

q-ary Symmetric Channel for Large q List-Message Passing Achieves Caacity on the q-ary Symmetric Channel for Large q Fan Zhang and Henry D Pfister Deartment of Electrical and Comuter Engineering, Texas A&M University {fanzhang,hfister}@tamuedu

More information

A randomized sorting algorithm on the BSP model

A randomized sorting algorithm on the BSP model A randomized sorting algorithm on the BSP model Alexandros V. Gerbessiotis a, Constantinos J. Siniolakis b a CS Deartment, New Jersey Institute of Technology, Newark, NJ 07102, USA b The American College

More information

Finding Shortest Hamiltonian Path is in P. Abstract

Finding Shortest Hamiltonian Path is in P. Abstract Finding Shortest Hamiltonian Path is in P Dhananay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune, India bstract The roblem of finding shortest Hamiltonian ath in a eighted comlete grah belongs

More information

Averaging sums of powers of integers and Faulhaber polynomials

Averaging sums of powers of integers and Faulhaber polynomials Annales Mathematicae et Informaticae 42 (20. 0 htt://ami.ektf.hu Averaging sums of owers of integers and Faulhaber olynomials José Luis Cereceda a a Distrito Telefónica Madrid Sain jl.cereceda@movistar.es

More information