Worst-case performance of critical path type algorithms

Size: px
Start display at page:

Download "Worst-case performance of critical path type algorithms"

Transcription

1 Intl. Trans. in Op. Res. 7 (2000) 383±399 Worst-case perforance of critical path type algoriths G. Singh, Y. Zinder* University of Technology, P.O. Box 123, Broadway, NSW 2007, Sydney, Australia Received 11 February 2000; accepted 24 February 2000 Abstract The critical path ethod reains one of the ost popular approaches in practical scheduling. Being developed for the akespan proble this ethod can also be generalized to the axiu lateness proble. For the unit execution tie task syste and parallel processors this generalization is known as the Brucker±Garey±Johnson algorith. We characterize this algorith by introducing an upper bound on the deviation of the criterion fro its optial value. The bound is stated in ters of paraeters characterizing the proble, naely nuber of processors, the length of the longest path, and the total required processing tie. We also derive a siilar bound for the preeptive version of the Brucker± Garey±Johnson algorith IFORS. Published by Elsevier Science Ltd. All rights reserved. Keywords: Deterinistic scheduling probles; Parallel identical achines; Precedence constraints; Maxiu lateness; Worst-case analysis 1. Introduction The critical path ethod reains one of the ost popular approaches in practical scheduling. The rst theoretical justi cation of this ethod has been given by Hu (1961). Hu's algorith allows the generalization to the case of the axiu lateness proble. This generalization is known as the Brucker±Garey±Johnson algorith (Brucker et al., 1977). Both the algoriths were developed for the odel with a unit execution tie (UET) task syste, precedence constraints, and parallel processors. Being of considerable practical interest in its own right, this odel provides an iportant insight into the eld of deterinistic scheduling * Corresponding author. Tel.: ; fax: E-ail address: y.zinder@aths.uts.edu.au (Y. Zinder) /00/$ IFORS. Published by Elsevier Science Ltd. All rights reserved. PII: S (00)00023-X

2 384 G. Singh, Y. Zinder / Intl. Trans. in Op. Res. 7 (2000) 383±399 with precedence constraints, and therefore, reains as a subject of intensive research over several decades. The axiu lateness proble for a UET task syste can be stated as follows. Suppose that a set N ˆf1, 2,...,ng of n tasks (jobs, operations) is to be processed on > 1 identical processors (achines) subject to precedence constraints in the for of an anti-re exive, antisyetric and transitive relation on N. If task i precedes task j, denoted as i4j, then the processing of i ust be copleted before the processing of j begins. The processing of the tasks coences at tie t ˆ 0: Each processor can process at ost one task at a tie, and each task can be processed by any processor. Once a processor begins executing a task it continues until copletion (i.e., no preeptions are allowed). The processing tie of task j is denoted by p j : All processing ties are equal, and therefore, without loss of generality, can be taken as the unit of tie. Let C j s be the copletion tie of task j in schedule s. It is necessary to nd a schedule, which iniizes the criterion of axiu lateness L ax s ˆ ax Cj s d j, j2n where d j is a due date associated with each task j. If all due dates are equal to zero the axiu lateness proble converts into the akespan proble. Using the popular three- eld notation ajbjg, where a speci es the processor environent, b speci es the task characteristics, and g denotes the optiality criterion, the above proble can be denoted by Pjprec, p j ˆ 1jL ax : Here, P speci es that there are several parallel identical processors, prec indicates the presence of precedence constraints, and the ter p j ˆ 1 indicates that each task has a unit processing tie. It is convenient to represent a partially ordered set of tasks by an acyclic directed graph, where nodes correspond to the tasks and arcs re ect the precedence constraints. Hence, the scheduling probles with UET task systes and parallel identical processors can be viewed as graph partition probles, where the set of nodes ust be partitioned into several subsets containing no ore than nodes each. The Brucker±Garey±Johnson algorith solves the axiu lateness proble if the corresponding graph is an in-tree. The Pjprec, p j ˆ 1jL ax proble is NP-hard if the corresponding graph is an out-tree (Brucker et al., 1977). Therefore, for general precedence constraints, the Brucker±Garey±Johnson algorith is only an approxiation algorith. This algorith represents the faily of so-called priority algoriths. A priority algorith can be viewed as a two-phase procedure. The rst phase of this procedure associates with each task a nuber, which indicates the priority (urgency) of the task. The second phase allocates tasks for processing in accord to these priorities, i.e. each tie, when a processor becoes available, aong all tasks, which are ready for processing, the algorith selects a task with the highest priority. The idea of a priority algorith can be odi ed to the case of arbitrary processing ties and preeptions. If preeptions are allowed, the processing of any task can be interrupted at any tie and resued later on the sae or another processor. The corresponding axiu lateness proble with preeptions is denoted by Pjprp, precjl ax : In general, the preeptive version of the Brucker±Garey±Johnson algorith provides only an approxiation solution,

3 since the akespan proble with an arbitrary nuber of processors, general precedence constraints, arbitrary processing ties, and preeptions is also NP-hard (Ullan, 1975). The perforance guarantees are viewed as an essential coponent of the characterization of approxiation algoriths. For the scheduling probles with parallel identical processors any results of this type were obtained for the akespan proble (see, for exaple, Parker, 1995; Lawler et al., 1993). Interest in such perforance guarantees is inspired not only by the fact that they provide an iportant insight into the nature of the corresponding approxiation algoriths, but also by the role which these results play in the developent of various algoriths requiring calculation of lower bounds, in particular, in the developent of branchand-bound algoriths. In spite of the existence of perforance guarantees for a nuber of algoriths for the akespan proble, uch less is known about the worst-case perforance of the approxiation algoriths for the axiu lateness proble. Thus, it was shown by Zinder and Roper (1998), that L ax s Z R 2 2 L ax s 1 2 ax d a r, 1 a2n where s Z is a schedule constructed by the approxiation algorith, s is an optial schedule for the axiu lateness proble, and ( 3 r ˆ for odd for even: 2 G. Singh, Y. Zinder / Intl. Trans. in Op. Res. 7 (2000) 383± The establishent of siilar results for other known approxiation algoriths can be viewed as a logical next step in the theoretical study in the eld. The result in Zinder and Roper (1998), as well as any perforance guarantees for the akespan proble presents an upper bound on the value of the criterion corresponding to the approxiation algorith expressed in ters of its optiu value. In contrast, in this paper we present two perforance guarantees in the for of bounds on the deviation of the criterion value fro its optiu expressed in ters of the paraeters characterizing the partially ordered set of tasks. This for provides ore inforation on the worst-case perforance of the respective algoriths and is convenient for the use in various exible self-tuned algoriths that select an appropriate strategy by analyzing the proble on hand. A siilar for of perforance guarantee for the classical Hu's algorith is presented in Singh and Zinder (2000). In Section 2 we consider the Pjprec, p j ˆ 1jL ax proble and present a tight upper bound on the di erences L ax s BGJ L ax s, where s BGJ is the schedule constructed by the Brucker±Garey±Johnson algorith and s is an optial schedule for Pjprec, p j ˆ 1jL ax proble. In Section 3 we consider the Pjprp, precjl ax proble and present a tight bound for the preeptive counterpart of the Brucker±Garey±Johnson algorith. 2. The worst-case perforance of the Brucker±Garey±Johnson algorith for the Pjprec, p j ˆ 1jL ax proble The priority associated with each task by the Brucker±Garey±Johnson algorith is called a

4 386 G. Singh, Y. Zinder / Intl. Trans. in Op. Res. 7 (2000) 383±399 odi ed due date, and the tasks are arranged in a list in the non-decreasing order of their odi ed due dates. The tie points t ˆ 0, t ˆ 1, t ˆ 2, and so on, are considered sequentially. For each tie point the list is scanned fro left to right and the rst encountered task available for processing is assigned to an idle processor and eliinated fro the list. The algorith continues to scan the list and to allocate tasks for processing until at least one of the following events occurs: the end of the list has been reached or all processors have tasks assigned to the. Then the allocation of the reaining tasks is ade for subsequent tie points until all tasks have been assigned. We will denote the odi ed due date associated with task j by dj 0: Modi ed due date d j 0 depends on the odi ed due dates of the iediate successors of task j. Task i is an iediate successor of task j if j4i and there is no task k such that j4k and k4i: We will denote the set of all iediate successors of task j by K( j ). In Brucker et al. (1977), the algorith coputing the odi ed due dates was given for in-trees. The algorith below is a straightforward extension of this algorith to the case of an arbitrary partially ordered set. 1. For each task j that does not have successors, set dj 0 ˆ d j : 2. Select a task j which has not been assigned its odi ed due date dj 0 and whose all iediate successors have been assigned their odi ed due dates. If no such task exists, then stop. 3. Set dj 0 ˆin i2k j fd j, di 0 p i g, where p i is the processing tie of task i, and return to step 2. We will refer to this algorith as the due date odi cation algorith. Note that this algorith without any changes will be also used in the preeptive case, where the processing tie p i can be any positive nuber. In order to analyze the worst-case perforance of the Brucker±Garey±Johnson algorith, we observe that the replaceent of the original due dates by the corresponding odi ed due dates does not a ect the axiu lateness. Indeed, since dq 0Rd q for any task q, we have ax C q s d q 0 rax Cq s d q ˆ Lax s : q2n q2n To show that ax C q s d q 0 RL ax s, q2n 2 aong all tasks j satisfying ax q2n C q s d q 0 ˆ C j s d j 0 select a task with the largest copletion tie. Let it be task b. Ifd b ˆ db 0, then Eq. (2) holds. On the other hand, if d b > db 0, then according to the due date odi cation algorith there is an iediate successor of task b, say task v, such that db 0 ˆ d v 0 p v: Since C v s rc b s p v,we have

5 C b s d 0 b ˆ C b s d 0 v p v ˆ Cb s p v d 0 v RC v s d 0 v, which contradicts the selection of task b. Let s BGJ be a schedule constructed by the Brucker±Garey±Johnson algorith. Fro the set of all tasks j such that C j s BGJ d 0 j ˆ L ax s BGJ G. Singh, Y. Zinder / Intl. Trans. in Op. Res. 7 (2000) 383± choose a task p with the sallest copletion tie. If C p s BGJ ˆ1, then s BGJ is optial. If C p s BGJ > 1, then we construct a sequence of tasks a h,...,a 1 and a sequence of sets of tasks M h,...,m 1 using the following procedure. Select task p as a 1, and denote by ~M 1 the set coprised of task p and all tasks j such that dj 0Rd p 0 and C j s BGJ < C p s BGJ : If for any positive integer t < C a1 s BGJ at least two tasks fro ~M 1 are processed in s BGJ on the tie interval t 1, t], then M 1 ˆ ~M 1 and the procedure terinates. Otherwise, we select the largest nuber aong all positive integers t < C a1 s BGJ such that only one task fro ~M 1 is processed on the tie interval t 1, t]. Denote this task by a 2 and set M 1 equals the set of all tasks j 2 ~M 1 with C j s BGJ > C a2 s BGJ : Let ~M 2 be the set of all tasks j such that dj 0Rd a 0 2 and C j s BGJ RC a2 s BGJ : Suppose that C a2 s BGJ ˆ1, or C a2 s BGJ > 1 and for any positive integer t < C a2 s BGJ at least two tasks fro ~M 2 are processed in s BGJ on the tie interval t 1, t]. Then M 2 ˆ ~M 2 and the procedure terinates. Otherwise, we select the largest nuber aong all positive integers t < C a2 s BGJ such that only one task fro ~M 2 is processed on the tie interval t 1, t]. Denote this task by a 3 and set M 2 equals the set of all tasks j 2 ~M 2 with C a2 s BGJ rc j s BGJ >C a3 s BGJ : We continue in the sae anner until for soe h the procedure terinates because either C ah s BGJ ˆ1, or C ah s BGJ > 1 and for any positive integer t < C ah s BGJ at least two tasks fro ~M h are processed in s BGJ on the tie interval t 1, t]. Lea 2.1. Let j be an arbitrary task fro M i, for soe 1RiRh 1: Then a i 1 4j: Proof. Note that any task q, satisfying the conditions dq 0Rd a 0 i and C q s BGJ < C ai s BGJ, belongs to ~M i : Therefore, on the tie interval C ai 1 s BGJ 1, C ai 1 s BGJ ], according to the schedule s BGJ, only one processor processes a task with the odi ed due date less than or equal to da 0 i : Let j be an arbitrary task fro M i : Since dj 0Rd a 0 i, according to the Brucker±Garey±Johnson algorith, task j ust have a predecessor, say task j', with C j 0 s BGJ ˆC ai 1 s BGJ : Since j 0 4j, we have dj 0 < d 0 0 j Rd a 0 i, but on the tie interval C ai 1 s BGJ 1, C ai 1 s BGJ Š only task a i 1 has the odi ed due date less than or equal to da 0 i : Therefore, a i 1 4j: Let M ˆ Sh iˆ1 M i: For any positive integer t < C p s BGJ, we say that the tie slot t is coplete, if exactly tasks fro M are processed on the tie interval t 1, t]. Otherwise, the tie slot t is said to be incoplete. Let w be the nuber of all incoplete tie slots. If w > 0, we will denote incoplete tie slots by t 1,...,t w, where t 1 <...< t w < C p s BGJ : Lea 2.2. The tie slot C p s BGJ 1 is coplete and any task that is processed in this tie slot does not precede task p. Proof. Suppose that there exists a task j such that C j s BGJ ˆC p s BGJ 1 and j4p: Then

6 388 G. Singh, Y. Zinder / Intl. Trans. in Op. Res. 7 (2000) 383±399 dj 0Rd p 0 1, and C j s BGJ d j 0 rc p s BGJ 1 d p 0 1 ˆ C p s BGJ d p 0, which contradicts the selection of task p. Suppose that the tie slot C p s BGJ 1 is incoplete. Then in this tie slot at least one processor is either idle or processes a task with the odi ed due date greater than dp 0: Therefore, according to the Brucker±Garey±Johnson algorith, task p ust have a predecessor that is processed in s BGJ in the tie slot C p s BGJ 1: But as has been shown above, this contradicts the selection of task p. Lea 2.3. Let U be the set coprised of task p and all tasks processed in the tie slot C p s BGJ 1: Then for any task b 2 U, there exists a sequence of tasks b 1,...,b w fro M such that b 1 4 4b w 4b, and C bi s BGJ ˆt i, for all 1RiRw: Proof. Let us denote task b by b w 1 : Suppose that for soe krw 1 a subsequence b k,...,b w 1 has been constructed, and b k 2 M i : If t k1 ˆ C ai 1 s BGJ, then by Lea 2.1 a i 1 4b k, and we choose task a i 1 as b k1 : Suppose that t k1 > C ai 1 s BGJ : Observe that any task j such that d 0 j Rd 0 a i and C j s BGJ < C ai s BGJ belongs to ~M i : Hence, in the schedule s BGJ in the tie slot t k1 at least one processor is either idle or processes a task with the due date greater than d 0 b k : Therefore, task b k ust have a predecessor, which is processed in the tie slot t k1 : We denote this predecessor by b k1 : Since b k1 4b k, according to the due date odi cation algorith d 0 b k1 Rd 0 b k 1: Hence, b k1 2 M i : Continuing in the sae anner, we obtain the desired chain. Consider a longest path } in the subgraph corresponding to the set M. Let l(t ) be the nuber of tasks in this path with the copletion tie greater than t. Then the length of } equals l(0). Lea 2.4. If each incoplete tie slot contains exactly one task fro the set M, then L ax s rl 0 1 d 0 p, 3 where s is an optial schedule for the axiu lateness proble. Proof. Lea 2.2 iplies that there exists a positive integer trc p s BGJ such that no task fro } is processed on the tie interval t 1, t]. Let t' be the sallest of these nubers, and let r be the largest value of i satisfying inequality t 0 RC ai s BGJ : Since the tie slot t' does not contain a task fro }, l C ar s BGJ C ar s BGJ rl 0 1: 4 By the due date odi cation algorith, in the path } the l C ar s BGJ th fro the right task has a due date less than or equal to d 0 p l C a r s BGJ 1: Then Lea 2.1 iplies that d 0 a r Rd 0 p l C ar s BGJ : Let j be an arbitrary task fro M r : Since d 0 j Rd 0 a r, we have

7 G. Singh, Y. Zinder / Intl. Trans. in Op. Res. 7 (2000) 383± d 0 j Rd 0 p l C ar s BGJ : 5 Suppose that r < h: Then a r 1 belongs to the path }, and each tie slot t, where trc ar 1 s BGJ, contains a task fro }: Hence, task a r 1 cannot be copleted earlier than in the schedule s BGJ, and therefore, C ar 1 s rc ar 1 s BGJ : Because all tie slots t, where C ar 1 s BGJ < t 0 < C ar s BGJ, are coplete, and because by Lea 2.1 a r 1 precedes all tasks fro M r, ax C j s rc ar s BGJ : j2m r 6 Since all tie slots t, where t < C ah s BGJ, are coplete, the inequality Eq. (6) also holds if r ˆ h: Using Eqs. (4)±(6), we have n o n L ax s rax C j s d j 0 rax C j s d p 0 l C ar s BGJ o j2m r j2m r rc ar s BGJ d 0 p l C ar s BGJ rl 0 1 d 0 p : This copletes the proof. Lea 2.5. If w ˆ 0, then s BGJ is optial. Proof. If there are no incoplete tie slots, then the tasks fro M cannot be processed ore quickly by any other schedule. Therefore, for any schedule s that is optial for the axiu lateness proble, C p s BGJ Rax C j s, j2m and since dj 0Rd p 0, for all j 2 M, L ax s BGJ ˆ C p s BGJ d 0 p Rax j2m n o Rax C j s d j 0 j2m Hence, s BGJ is optial. Rax j2n n o C j s d p 0 ˆ ax C j s d p 0 j2m n o C j s d j 0 ˆ L ax s : Theore 2.1. If s is an optial schedule for the axiu lateness proble, then 8 n < nl 1 L ax s BGJ L ax s in 1, o, R l if n lr, 7 : 0, otherwise where n is the nuber of tasks and l is the length of the longest path in the corresponding graph. For any positive integer ^n there is an instance of the axiu lateness proble with nr ^n such

8 390 G. Singh, Y. Zinder / Intl. Trans. in Op. Res. 7 (2000) 383±399 that Eq. (7) is an equality. Proof. It is easy to see that schedule s BGJ is optial, and therefore Eq. (7) holds, if either n l <, or n lr and C p s BGJ ˆ1: By Lea 2.5, s BGJ is also optial when n lr, C p s BGJ > 1, and w ˆ 0: Hence, we only need to prove that Eq. (7) holds when n lr, C p s BGJ > 1, and w > 0: In this case we can construct the set M, and let c be the nuber of coplete tie slots t satisfying the inequality t < C p s BGJ : Hence, C p s BGJ ˆ c w 1: Since l(0) is the length of a longest path in the subgraph corresponding to the set M, we have L ax s rl 0 dp 0: Suppose that L ax s rl 0 1dp 0 : By Lea 2.3 l 0 rw 1, and Hence, L ax s BGJ ˆ C p s BGJ d 0 p ˆ c w 1 w 1 1 d 0 p RjMjl 0 l 0 d 0 p : d p 0 1 RjMj w w 1 L ax s BGJ L ax s R jmjl 0 1: 8 Now suppose that L ax s ˆl 0 dp 0 : Then fro Lea 2.4 we conclude that there is an incoplete tie slot containing at least two tasks fro M, and therefore, jmjrc w 2: Consider the set U speci ed in the stateent of the Lea 2.3. Since juj ˆ 1, this lea iplies that ax C j s rw 2: On the other hand, since L ax s ˆl 0 dp 0, we have C j2m j s ˆl 0, and hence, l 0 rw 2: We have ax j2m L ax s BGJ ˆ C p s BGJ d 0 p ˆ c w 2 w 2 w 2 1 d 0 p RjMjl 0 l 0 1 d 0 p, and, subtracting L ax s ˆl 0 dp 0, we again obtain Eq. (8). Since n jmjrll 0, Eq. (8) gives L ax s BGJ L ax s R n l 1: 9 Using Lea 2.3, we conclude that lrl 0 rw 1: Hence, L ax s BGJ ˆ C p s BGJ d 0 p ˆ c w 1 w 1 1 and subtracting the obvious inequality L ax s r jmj d p 0, we obtain d 0 p RjMj 1 l d 0 p,

9 G. Singh, Y. Zinder / Intl. Trans. in Op. Res. 7 (2000) 383± L ax s BGJ L ax s R 1 l, which together with Eq. (9) gives Eq. (7). In order to show that Eq. (7) is tight, consider a partially ordered set of tasks presented by the graph in Fig. 1. This graph is coprised of k identical sections and one terinal section. Fig. 1. The partially ordered set of tasks considered in Theore 2.1.

10 392 G. Singh, Y. Zinder / Intl. Trans. in Op. Res. 7 (2000) 383±399 Each task corresponding to a node in the rst (top) row has a due date of one unit of tie. Each task fro any other row has a due date of the previous row plus one. The corresponding optial schedule and a schedule constructed by the Brucker±Garey±Johnson algorith are presented in Figs. 2 and 3, respectively. It is easy to see that ax d j ˆ k 1, L ax s BGJ ˆ j2n k k, L ax s ˆ1 and Eq. (7) is an equality for any k and. 3. The worst-case perforance of the preeptive version of the Brucker±Garey±Johnson algorith for the Pjprp, precjl ax proble The stateent of the axiu lateness proble with preeptions is the sae as for the Pjprec, p j ˆ 1jL ax proble, but now we assue that each task j can have an arbitrary processing tie p j and its processing can be interrupted at any tie and resued later on the sae or another processor. Let p j t be the reaining processing tie for task j at tie t. Since preeptions are allowed and the sae task j can be allocated for processing at di erent points of tie, its priority depends on p j t : As a straightforward generalization of the Brucker± Garey±Johnson algorith, one ay copute the priority of task j at tie t as dj 0 p j t, where dj 0 is the odi ed due date calculated by the due date odi cation algorith presented in Section 2. In this case, a saller value of dj 0 p j t gives a higher priority. The construction of the schedule is based on a sequence of decisions regarding what tasks should be allocated for processing, what aount of processing tie should receive each of these tasks, and how these tasks should be scheduled. Points in tie that correspond to these decisions will be referred to as points of allocation. The rst point of allocation is t ˆ 0: At each point of allocation tasks are assigned for processing as follows. All tasks, which are ready for processing, are split into several subsets. Each subset is coprised of all tasks with the sae priority. If the nuber of tasks of the highest priority is greater than or equal to the nuber of processors, then the corresponding subset will occupy all processors and each task will receive the sae aount of processing tie on the interval between the current and the next points of allocation. If the nuber of tasks of the highest priority is less than the nuber of processors, then these tasks are allocated one task per processor, and the siilar allocation procedure is conducted for the reaining subsets of tasks and the reaining processors. The Fig. 2. An optial schedule.

11 G. Singh, Y. Zinder / Intl. Trans. in Op. Res. 7 (2000) 383± allocation terinates if there are either no reaining subsets, or no reaining processors. All processors are released at the next point of allocation, and the allocation procedure repeats. Suppose that D is the length of the tie interval between two successive points of allocation. If a subset coprising u tasks is allocated to k processors, where u > k, then each task in this subset will receive D u k units of processing tie. If u ˆ k, then each task fro this subset will receive D units of processing tie. The next point of allocation is selected in such a way that either soe task is copleted or the priority of tasks in one subset becoes equal to the priority of tasks in another. In other words, suppose that tasks fro a subset N 1 are allocated one task per processor at a point of allocation t, then D Ð the length of the tie interval between the current and the next points of allocation Ð ust satisfy the inequality DRin p j t : j2n 1 Suppose that tasks fro another subset N 2 are allocated to reaining k processors, where k < jn 2 j: Then p j t jn 2 j DRin j2n 2 k and for any j 1 2 N 1 and j 2 2 N 2 d j 0 1 p j1 t D Rd j 0 2 p j2 t Dk : jn 2 j Suppose that a task j is ready for processing at point t, but is not assigned to be processed on the interval between this and the subsequent point of allocation. Then for any j 1 2 N 1 and j 2 2 N 2, d j 0 p j t rd j 0 1 p j1 t D and d j 0 p j t rd j 0 2 p j2 t Dk : jn 2 j The next point of allocation is de ned by the axiu value of D, which satis es these conditions. Fig. 3. A schedule constructed by the Brucker±Garey±Johnson algorith.

12 394 G. Singh, Y. Zinder / Intl. Trans. in Op. Res. 7 (2000) 383±399 The actual scheduling on the tie interval between two successive points of allocation is obtained by applying McNaughton's algorith (McNaughton, 1959). To describe this algorith we assue that tasks fro a subset N' are allocated at point t to k processors, where k < jn 0 j: As before, we denote by D the length of the tie interval between the current point of allocation and the next one. Therefore, each task fro N' will be processed on this interval for Dk jn 0 j tie units. We select a processor and allocate to this processor fro tie t an arbitrary task j 1 2 N 0 : After that we select an arbitrary task j 2 2 N 0 and allocate this task to the sae processor fro tie t Dk jn 0 j : We continue to allocate tasks one after another to the selected processor until we reach a task j r, which cannot be allocated entirely to this processor, then we allocate task j r to the selected processor only till the tie point t D: After that we select another processor and allocate this task to this new processor fro tie t in such a way that the total processing tie for this task on both processors becoes Dk jn 0 j : We continue to allocate tasks to this second processor until we encounter a situation that the next task cannot be allocated entirely to this processor. In this case we allocate this task only till the tie t D, again select a new processor and allocate to this new processor the considered task fro tie t for the reaining processing tie, and so on. To illustrate this algorith consider the following exaple. Let N 0 ˆfj 1,...,j 6 g, D ˆ 3, and k ˆ 4: Then each task fro N' will be processed on the tie interval t, t DŠ for 2 tie units. Fig. 4 depicts the resulting schedule. The algorith described above produces an optial schedule if the corresponding graph is an in-tree (Lawler, 1982). In what follows we will analyze the worst case perforance of this algorith for the general precedence constraints. We will denote the schedule constructed by this algorith by s L : In order to be able to indicate what schedule is considered, we also replace the notation p j t by p j t, s, where p j t, s is the reaining processing tie for task j at tie t in schedule s. As has been shown in Section 2, if preeptions are not allowed, then the replaceent of the original due dates by the corresponding odi ed due dates does not e ect the axiu lateness. It is easy to see that the sae reasonings are valid for the preeptive case and in this case also, for any schedule s, n o L ax s ˆ ax C j s d j 0 : j2n Suppose that schedule s L has been constructed using h points of allocation. Let they be points t 1,...,t h, where 0 ˆ t 1 <...< t h : For each point of allocation t i, let S i be the set of all tasks, which are allocated for processing at point t i : Note that S h ˆ b and the procedure terinates Fig. 4. A preeptive schedule.

13 at this point. For each point of allocation t i, i > 1, let F i be the set of all tasks, which coplete their processing on the tie interval t i1, t i Š at point t i : Since, for any j 2 F i, C j s L rt i p j t i, s L, ax t i p j ti, s L d j 0 RL ax s L : j2f i Consider task q satisfying the equality C q s L d 0 q ˆ L ax s L : Suppose that t i1 < C q s L < t i, for soe i > 1: This eans that at point t i1, task q belonged to a subset, say N', which was allocated to the nuber of processors less than jn 0 j: According to the algorith, there is a task r 2 N 0 that copletes its processing on the tie interval t i1, t i Š at point t i : Hence, C r s L rt i p r t i, s L : Because q and r belongs at point t i1 to the sae subset, they ust have the sae priority at point t i, that is dq 0 ˆd0 r p r t i, s L : We have, C q s L d 0 q < t i d 0 q ˆ t i d 0 r p r ti, s L RC r s L d 0 r, which contradicts the selection of task q. Therefore, C q s L ˆt i, for soe i > 1, and for this point of allocation t i p j ti, s L d j 0 ˆ L ax s L : 10 ax j2f i G. Singh, Y. Zinder / Intl. Trans. in Op. Res. 7 (2000) 383± Aong all t i satisfying Eq. (10) select the sallest, say t i, and select x 2 F i t i p x ti, s L h d x 0 ˆ ax t i p j ti, s L i d j 0 : j2f i such that For each 1 < iri, we denote by M i the subset of all j 2 S i1 such that d 0 j p j ti, s L Rd 0 x p x ti, s L : We will say that an interval t i1, t i ], where 1 < iri, is coplete if jm i jr: Otherwise the interval is said to be incoplete. Lea 3.1. For any task j 2 S i 1 d j 0 p j ti 1, s L ˆ d x 0 p x ti 1, s L, and jm i j > : Proof. Suppose that there is a task j 2 S i 1 such that d j 0 p j ti 1, s L < d x 0 p x ti 1, s L : Then j 2 F i and

14 396 G. Singh, Y. Zinder / Intl. Trans. in Op. Res. 7 (2000) 383±399 p j ti 1, s L ˆ t i t i 1 p j ti, s L : 11 If jm i jr or there is a task q 2 S i 1 such that d 0 q p q ti 1, s L > d 0 x p x ti 1, s L, then Eq. (11) holds for j equals x. Since in both cases we have d 0 j p j ti, s L ˆ d 0 x p x ti, s L, t i 1 p j ti 1, s L d 0 j ˆ t i p j ti, s L d 0 j ˆ t i p x ti, s L d 0 x ˆ L ax s L, which contradicts the selection of t i : Therefore, jm i j > and d 0 j p j t i 1, s L ˆd 0 x p x t i 1, s L, for all j 2 S i 1: We de ne the length of any path in the directed acyclic graph which represents the partially ordered set of tasks as a su of processing ties corresponding to the nodes in this path. Let l be the length of the longest path, w be the total length of all incoplete tie intervals for the schedule s L, and p in ˆ in j2n p j : Lea 3.2. Let t i1, t i Š be an incoplete interval and j be an arbitrary task fro M i 0, where i < i 0 : Then either j is processed on t i1, t i Š during t i t i1 tie units, or there is a task j 0, such that j 0 2 M i, j 0 4j, and j 0 is processed on this interval during t i t i1 tie units. Proof. Since jm i j <, on the interval t i1, t i Š at least one processor is either idle or processes a task with priority lower than the priority of j. Hence, either j is processed on t i1, t i ], or there is a task j 0, which precedes j and is ready for processing at t i1 : In the forer case, since jm i j < and all other tasks fro S i1 have a lower priority than tasks fro M i, task j is processed on t i1, t i Š during t i t i1 tie units. In the latter case, according to the due date odi cation algorith d 0 j 0Rd 0 j p jrd 0 x p x ti, s L : Hence, j 0 2 M i and this task is also processed on the interval t i1, t i Š during t i t i1 tie units. Theore 3.1. Let s be an optial schedule for the axiu lateness proble, then L ax s L L ax s R 1 l p in : 12 For any positive integer ^n there is an instance of the axiu lateness proble with nr ^n such that Eq. (12) is an equality. Proof. Suppose that w ˆ 0: Because on the interval t 1, t i Š all processors are busy, there exists a task j such that j is processed on this interval in schedule s L and C j s rt i p j t i, s L : Since d 0 j

15 p j t i, s L Rd 0 x p x t i, s L, L ax s rc j s d 0 j rt i p j ti, s L d 0 j rt i p x ti, s L d 0 x ˆ L ax s L : Hence, s L is optial, and Eq. (12) holds. Suppose that w > 0: For any j 2[ i iˆ2 M i we denote by i j the largest index i such that j 2 M i : Then for any j 2[ i iˆ2 M i and any trt ij d 0 j p j t, s L Rd 0 x p x ti, s L : On the other hand, because M i 6ˆb, by Lea 3.2, for each incoplete tie interval t i1, t i ], there is a task j 2 M i, which is processed on this interval during t i t i1 tie units. Hence, denoting the total length of all coplete tie intervals by c, we obtain X j2[ i iˆ2 M i p j r X j2[ i iˆ2 M i hp j p j t ij, s L irc wr X Therefore, there exists a task q 2[ i iˆ2 M i such that C q s r c w c w p q, s : j2[ i iˆ2 M i c w p j p j, s : 13 Without loss of generality we can assue that p q c w, s rp q t iq, s L, because otherwise Eq. (13) iplies that there exists a task r 2[ i iˆ2 M i such that p r c w, s > p r t ir, s L, and since p r c w, s > 0, c w We have C r s r c w p r, s L ax s rc q s d 0 q rc w d q 0 rc w Hence, G. Singh, Y. Zinder / Intl. Trans. in Op. Res. 7 (2000) 383± : p x ti, s L d x 0 : c w p q, s d q 0 rc w p q t iq, s L L ax s L ˆ t i p x ti, s L d x 0 ˆ c w p x ti, s L d x 0 ˆ c w 1 w p x ti, s L d x 0 1 R w L ax s : Let t i 0 be the largest t i for which interval t i1, t i Š is incoplete. By Lea 3.1 jm i j >, and since jm i 0j <, according to Lea 3.2 there exist tasks j 0 2 M i 0 and j 2 M i such that j 0 4j: Therefore, Lea 3.2 iplies that lrw p in, and

16 398 G. Singh, Y. Zinder / Intl. Trans. in Op. Res. 7 (2000) 383±399 L ax s L L ax s R 1 1 wr l p in : In order to show that Eq. (12) is achievable, consider the graph depicted in Fig. 5. Nodes in the rst (top) row do not precede any other nodes and the corresponding tasks have the sae due date equals one. Tasks in each subsequent row have due date of the previous row plus one. All tasks have the sae processing tie equals one. It is easy to see that L ax s L ˆ l 1 1 l 2: In the optial schedule s the tasks fro the rst row are processed in parallel with the chain of l 1 tasks preceding all tasks fro the last (botto) row. Since L ax s ˆl2, Eq. (12) is an equality for any value of l. 4. Conclusions This paper presents the perforance guarantees for the non-preeptive and preeptive versions of the Brucker±Garey±Johnson algorith. The Brucker±Garey±Johnson algorith is a straightforward generalization of the classical Hu's algorith. The presented results coplient the results on the worst-case perforance of Hu's algorith (Singh and Zinder, 2000) and its preeptive counterpart known as the Muntz±Co an algorith (La and Sethi, 1977). Each perforance guarantee presented in this paper is in the for of an upper bound on the deviation of the criterion value fro its optiu. The bounds are expressed in ters of the nuber of processors and paraeters characterizing the partially ordered set of tasks, and therefore, establish a relationship between these paraeters and the perforance of the algorith. Another feature of the presented bounds is their achievability for arbitrary large instances of the respective probles. The presented results will be copliented by the Fig. 5. The partially ordered set of tasks considered in Theore 3.1.

17 G. Singh, Y. Zinder / Intl. Trans. in Op. Res. 7 (2000) 383± coputational experients which constitute a part of the ongoing research. The design of approxiation algoriths with better than known perforance guarantees also reains an open proble for both akespan (Schuuran and Woeginger, 1999) and axiu lateness probles. References Brucker, P., Garey, M.R., Johnson, D.S., Scheduling equal-length tasks under tree-like precedence constraints to iniise axiu lateness. Math. Oper. Res. 2, 275±284. Hu, T.C., Parallel sequencing and assebly line probles. Operations Research 9, 841±848. La, S., Sethi, R., Worst case analysis of two scheduling algoriths. SIAM J. Coput. 6, 518±536. Lawler, E.L., Preeptive scheduling of precedence-constrained jobs on parallel achines. In: Dester, M.A.H, Lenstra, J.K., Rinnooy Kan, A.H.G. (Eds.), Deterinistic and Stochastic Scheduling, pp. 101±123. Lawler, E.L., Lenstra, J.K., Rinnooy Kan, A.H.G., Shoys, D.B., Sequencing and scheduling: algoriths and coplexity. In: Graves, S.C., Rinnooy Kan, A.H.G., Zipkin, P.H. (Eds.), Logistics of Production and inventory. Elsevier, Asterda. McNaughton, R., Scheduling with deadline and loss functions. Manageent Sci. 6, 1±12. Parker, R.G., Deterinistic Scheduling Theory. Chapan and Hall, New York. Schuuran, P., Woeginger, G.J., Polynoial tie approxiation algoriths for achine scheduling: ten open probles. J. Sched. 2, 203±213. Singh, G., Zinder, Y., Worst-case perforance of two critical path type algoriths. Asia Paci c J. Oper. Res. 17(1) (to appear). Ullan, J.D., NP-Coplete scheduling probles. J. Coput. Syste Sci. 10, 384±393. Zinder, Y., Roper, D., An iterative algorith for scheduling unit-tie operations with precedence constraints to iniise the axiu lateness. Annals of Operations Research 81, 321±340.

List Scheduling and LPT Oliver Braun (09/05/2017)

List Scheduling and LPT Oliver Braun (09/05/2017) List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)

More information

Homework 3 Solutions CSE 101 Summer 2017

Homework 3 Solutions CSE 101 Summer 2017 Hoework 3 Solutions CSE 0 Suer 207. Scheduling algoriths The following n = 2 jobs with given processing ties have to be scheduled on = 3 parallel and identical processors with the objective of iniizing

More information

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness A Note on Scheduling Tall/Sall Multiprocessor Tasks with Unit Processing Tie to Miniize Maxiu Tardiness Philippe Baptiste and Baruch Schieber IBM T.J. Watson Research Center P.O. Box 218, Yorktown Heights,

More information

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and

More information

A Note on Online Scheduling for Jobs with Arbitrary Release Times

A Note on Online Scheduling for Jobs with Arbitrary Release Times A Note on Online Scheduling for Jobs with Arbitrary Release Ties Jihuan Ding, and Guochuan Zhang College of Operations Research and Manageent Science, Qufu Noral University, Rizhao 7686, China dingjihuan@hotail.co

More information

time time δ jobs jobs

time time δ jobs jobs Approxiating Total Flow Tie on Parallel Machines Stefano Leonardi Danny Raz y Abstract We consider the proble of optiizing the total ow tie of a strea of jobs that are released over tie in a ultiprocessor

More information

Approximation in Stochastic Scheduling: The Power of LP-Based Priority Policies

Approximation in Stochastic Scheduling: The Power of LP-Based Priority Policies Approxiation in Stochastic Scheduling: The Power of -Based Priority Policies Rolf Möhring, Andreas Schulz, Marc Uetz Setting (A P p stoch, r E( w and (B P p stoch E( w We will assue that the processing

More information

1 Identical Parallel Machines

1 Identical Parallel Machines FB3: Matheatik/Inforatik Dr. Syaantak Das Winter 2017/18 Optiizing under Uncertainty Lecture Notes 3: Scheduling to Miniize Makespan In any standard scheduling proble, we are given a set of jobs J = {j

More information

Convex Programming for Scheduling Unrelated Parallel Machines

Convex Programming for Scheduling Unrelated Parallel Machines Convex Prograing for Scheduling Unrelated Parallel Machines Yossi Azar Air Epstein Abstract We consider the classical proble of scheduling parallel unrelated achines. Each job is to be processed by exactly

More information

New Slack-Monotonic Schedulability Analysis of Real-Time Tasks on Multiprocessors

New Slack-Monotonic Schedulability Analysis of Real-Time Tasks on Multiprocessors New Slack-Monotonic Schedulability Analysis of Real-Tie Tasks on Multiprocessors Risat Mahud Pathan and Jan Jonsson Chalers University of Technology SE-41 96, Göteborg, Sweden {risat, janjo}@chalers.se

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science A Better Algorith For an Ancient Scheduling Proble David R. Karger Steven J. Phillips Eric Torng Departent of Coputer Science Stanford University Stanford, CA 9435-4 Abstract One of the oldest and siplest

More information

Stochastic Machine Scheduling with Precedence Constraints

Stochastic Machine Scheduling with Precedence Constraints Stochastic Machine Scheduling with Precedence Constraints Martin Skutella Fakultät II, Institut für Matheatik, Sekr. MA 6-, Technische Universität Berlin, 0623 Berlin, Gerany skutella@ath.tu-berlin.de

More information

Explicit solution of the polynomial least-squares approximation problem on Chebyshev extrema nodes

Explicit solution of the polynomial least-squares approximation problem on Chebyshev extrema nodes Explicit solution of the polynoial least-squares approxiation proble on Chebyshev extrea nodes Alfredo Eisinberg, Giuseppe Fedele Dipartiento di Elettronica Inforatica e Sisteistica, Università degli Studi

More information

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate The Siplex Method is Strongly Polynoial for the Markov Decision Proble with a Fixed Discount Rate Yinyu Ye April 20, 2010 Abstract In this note we prove that the classic siplex ethod with the ost-negativereduced-cost

More information

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

In this chapter, we consider several graph-theoretic and probabilistic models

In this chapter, we consider several graph-theoretic and probabilistic models THREE ONE GRAPH-THEORETIC AND STATISTICAL MODELS 3.1 INTRODUCTION In this chapter, we consider several graph-theoretic and probabilistic odels for a social network, which we do under different assuptions

More information

Infinitely Many Trees Have Non-Sperner Subtree Poset

Infinitely Many Trees Have Non-Sperner Subtree Poset Order (2007 24:133 138 DOI 10.1007/s11083-007-9064-2 Infinitely Many Trees Have Non-Sperner Subtree Poset Andrew Vince Hua Wang Received: 3 April 2007 / Accepted: 25 August 2007 / Published online: 2 October

More information

arxiv: v1 [cs.ds] 3 Feb 2014

arxiv: v1 [cs.ds] 3 Feb 2014 arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/

More information

University of Twente. Faculty of Mathematical Sciences. Scheduling split-jobs on parallel machines. University for Technical and Social Sciences

University of Twente. Faculty of Mathematical Sciences. Scheduling split-jobs on parallel machines. University for Technical and Social Sciences Faculty of Mathematical Sciences University of Twente University for Technical and Social Sciences P.O. Box 217 7500 AE Enschede The Netherlands Phone: +31-53-4893400 Fax: +31-53-4893114 Email: memo@math.utwente.nl

More information

Constant-Space String-Matching. in Sublinear Average Time. (Extended Abstract) Wojciech Rytter z. Warsaw University. and. University of Liverpool

Constant-Space String-Matching. in Sublinear Average Time. (Extended Abstract) Wojciech Rytter z. Warsaw University. and. University of Liverpool Constant-Space String-Matching in Sublinear Average Tie (Extended Abstract) Maxie Crocheore Universite de Marne-la-Vallee Leszek Gasieniec y Max-Planck Institut fur Inforatik Wojciech Rytter z Warsaw University

More information

Bipartite subgraphs and the smallest eigenvalue

Bipartite subgraphs and the smallest eigenvalue Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

Introduction to Discrete Optimization

Introduction to Discrete Optimization Prof. Friedrich Eisenbrand Martin Nieeier Due Date: March 9 9 Discussions: March 9 Introduction to Discrete Optiization Spring 9 s Exercise Consider a school district with I neighborhoods J schools and

More information

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair Proceedings of the 6th SEAS International Conference on Siulation, Modelling and Optiization, Lisbon, Portugal, Septeber -4, 006 0 A Siplified Analytical Approach for Efficiency Evaluation of the eaving

More information

On the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs

On the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs On the Inapproxiability of Vertex Cover on k-partite k-unifor Hypergraphs Venkatesan Guruswai and Rishi Saket Coputer Science Departent Carnegie Mellon University Pittsburgh, PA 1513. Abstract. Coputing

More information

An FPTAS for the minimum total weighted tardiness problem with a fixed number of distinct due dates

An FPTAS for the minimum total weighted tardiness problem with a fixed number of distinct due dates An FPTAS for the iniu total weighted tardiness proble with a fixed nuber of distinct due dates George Karaostas Stavros G. Kolliopoulos Jing Wang February 3, 2009 Abstract Given a sequencing of jobs on

More information

Boosting with log-loss

Boosting with log-loss Boosting with log-loss Marco Cusuano-Towner Septeber 2, 202 The proble Suppose we have data exaples {x i, y i ) i =... } for a two-class proble with y i {, }. Let F x) be the predictor function with the

More information

Distributed Subgradient Methods for Multi-agent Optimization

Distributed Subgradient Methods for Multi-agent Optimization 1 Distributed Subgradient Methods for Multi-agent Optiization Angelia Nedić and Asuan Ozdaglar October 29, 2007 Abstract We study a distributed coputation odel for optiizing a su of convex objective functions

More information

International Journal on Recent and Innovation Trends in Computing and Communication ISSN: Volume: 5 Issue:

International Journal on Recent and Innovation Trends in Computing and Communication ISSN: Volume: 5 Issue: Optial Specially Structured N X 2 Flow Shop Scheduling To Miniize Total Waiting Tie of Jobs ncluding Job Block Concept with Processing Tie Separated Fro Set up Tie Dr Deepak Gupta Professor & Head Departent

More information

Nonclairvoyant Scheduling to Minimize the Total Flow Time on Single and Parallel Machines

Nonclairvoyant Scheduling to Minimize the Total Flow Time on Single and Parallel Machines Nonclairvoyant Scheduling to Miniize the Total Flow Tie on Single and Parallel Machines LUCA BECCHETTI AND STEFANO LEONARDI University of Roe La Sapienza, Roe, Italy Abstract. Scheduling a sequence of

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

CS Lecture 13. More Maximum Likelihood

CS Lecture 13. More Maximum Likelihood CS 6347 Lecture 13 More Maxiu Likelihood Recap Last tie: Introduction to axiu likelihood estiation MLE for Bayesian networks Optial CPTs correspond to epirical counts Today: MLE for CRFs 2 Maxiu Likelihood

More information

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words)

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words) 1 A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine (1900 words) Contact: Jerry Farlow Dept of Matheatics Univeristy of Maine Orono, ME 04469 Tel (07) 866-3540 Eail: farlow@ath.uaine.edu

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

Average-Case Performance Analysis of Online Non-clairvoyant Scheduling of Parallel Tasks with Precedence Constraints

Average-Case Performance Analysis of Online Non-clairvoyant Scheduling of Parallel Tasks with Precedence Constraints Average-Case Performance Analysis of Online Non-clairvoyant Scheduling of Parallel Tasks with Precedence Constraints Keqin Li Department of Computer Science State University of New York New Paltz, New

More information

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna

More information

Computational and Statistical Learning Theory

Computational and Statistical Learning Theory Coputational and Statistical Learning Theory Proble sets 5 and 6 Due: Noveber th Please send your solutions to learning-subissions@ttic.edu Notations/Definitions Recall the definition of saple based Radeacher

More information

a a a a a a a m a b a b

a a a a a a a m a b a b Algebra / Trig Final Exa Study Guide (Fall Seester) Moncada/Dunphy Inforation About the Final Exa The final exa is cuulative, covering Appendix A (A.1-A.5) and Chapter 1. All probles will be ultiple choice

More information

Multi-Dimensional Hegselmann-Krause Dynamics

Multi-Dimensional Hegselmann-Krause Dynamics Multi-Diensional Hegselann-Krause Dynaics A. Nedić Industrial and Enterprise Systes Engineering Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu B. Touri Coordinated Science Laboratory

More information

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography Tight Bounds for axial Identifiability of Failure Nodes in Boolean Network Toography Nicola Galesi Sapienza Università di Roa nicola.galesi@uniroa1.it Fariba Ranjbar Sapienza Università di Roa fariba.ranjbar@uniroa1.it

More information

Fixed-to-Variable Length Distribution Matching

Fixed-to-Variable Length Distribution Matching Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de

More information

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering

More information

Multiprocessor scheduling with rejection

Multiprocessor scheduling with rejection Multiprocessor scheduling with rejection Bartal, Y.; Leonardi, S.; Marchetti Spaccaela, A.; Sgall, J.; Stougie, L. Published in: SIAM Journal on Discrete Matheatics DOI: 10.1137/S0895480196300522 Published:

More information

Curious Bounds for Floor Function Sums

Curious Bounds for Floor Function Sums 1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International

More information

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer

More information

A new type of lower bound for the largest eigenvalue of a symmetric matrix

A new type of lower bound for the largest eigenvalue of a symmetric matrix Linear Algebra and its Applications 47 7 9 9 www.elsevier.co/locate/laa A new type of lower bound for the largest eigenvalue of a syetric atrix Piet Van Mieghe Delft University of Technology, P.O. Box

More information

Best Arm Identification: A Unified Approach to Fixed Budget and Fixed Confidence

Best Arm Identification: A Unified Approach to Fixed Budget and Fixed Confidence Best Ar Identification: A Unified Approach to Fixed Budget and Fixed Confidence Victor Gabillon Mohaad Ghavazadeh Alessandro Lazaric INRIA Lille - Nord Europe, Tea SequeL {victor.gabillon,ohaad.ghavazadeh,alessandro.lazaric}@inria.fr

More information

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13 CSE55: Randoied Algoriths and obabilistic Analysis May 6, Lecture Lecturer: Anna Karlin Scribe: Noah Siegel, Jonathan Shi Rando walks and Markov chains This lecture discusses Markov chains, which capture

More information

3.8 Three Types of Convergence

3.8 Three Types of Convergence 3.8 Three Types of Convergence 3.8 Three Types of Convergence 93 Suppose that we are given a sequence functions {f k } k N on a set X and another function f on X. What does it ean for f k to converge to

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths

More information

arxiv: v1 [cs.dc] 19 Jul 2011

arxiv: v1 [cs.dc] 19 Jul 2011 DECENTRALIZED LIST SCHEDULING MARC TCHIBOUKDJIAN, NICOLAS GAST, AND DENIS TRYSTRAM arxiv:1107.3734v1 [cs.dc] 19 Jul 2011 ABSTRACT. Classical list scheduling is a very popular and efficient technique for

More information

ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD

ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical and Matheatical Sciences 04,, p. 7 5 ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD M a t h e a t i c s Yu. A. HAKOPIAN, R. Z. HOVHANNISYAN

More information

Scheduling Contract Algorithms on Multiple Processors

Scheduling Contract Algorithms on Multiple Processors Fro: AAAI Technical Report FS-0-04. Copilation copyright 200, AAAI (www.aaai.org). All rights reserved. Scheduling Contract Algoriths on Multiple Processors Daniel S. Bernstein, Theodore. Perkins, Shloo

More information

FLOWSHOP SCHEDULES WITH SEQUENCE DEPENDENT SETUP TIMES

FLOWSHOP SCHEDULES WITH SEQUENCE DEPENDENT SETUP TIMES Journal of the Operations Research Society of Japan Vo!. 29, No. 3, Septeber 1986 1986 The Operations Research Society of Japan FLOWSHOP SCHEDULES WITH SEQUENCE DEPENDENT SETUP TIMES Jatinder N. D. Gupta

More information

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Soft Coputing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Beverly Rivera 1,2, Irbis Gallegos 1, and Vladik Kreinovich 2 1 Regional Cyber and Energy Security Center RCES

More information

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3 A. Find all ordered pairs a, b) of positive integers for which a + b = 3 08. Answer. The six ordered pairs are 009, 08), 08, 009), 009 337, 674) = 35043, 674), 009 346, 673) = 3584, 673), 674, 009 337)

More information

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp

More information

Fairness via priority scheduling

Fairness via priority scheduling Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation

More information

Randomized Accuracy-Aware Program Transformations For Efficient Approximate Computations

Randomized Accuracy-Aware Program Transformations For Efficient Approximate Computations Randoized Accuracy-Aware Progra Transforations For Efficient Approxiate Coputations Zeyuan Allen Zhu Sasa Misailovic Jonathan A. Kelner Martin Rinard MIT CSAIL zeyuan@csail.it.edu isailo@it.edu kelner@it.edu

More information

Improved multiprocessor global schedulability analysis

Improved multiprocessor global schedulability analysis Iproved ultiprocessor global schedulability analysis Sanjoy Baruah The University of North Carolina at Chapel Hill Vincenzo Bonifaci Max-Planck Institut für Inforatik Sebastian Stiller Technische Universität

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

SPECTRUM sensing is a core concept of cognitive radio

SPECTRUM sensing is a core concept of cognitive radio World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile

More information

Chaotic Coupled Map Lattices

Chaotic Coupled Map Lattices Chaotic Coupled Map Lattices Author: Dustin Keys Advisors: Dr. Robert Indik, Dr. Kevin Lin 1 Introduction When a syste of chaotic aps is coupled in a way that allows the to share inforation about each

More information

arxiv: v1 [math.co] 19 Apr 2017

arxiv: v1 [math.co] 19 Apr 2017 PROOF OF CHAPOTON S CONJECTURE ON NEWTON POLYTOPES OF q-ehrhart POLYNOMIALS arxiv:1704.0561v1 [ath.co] 19 Apr 017 JANG SOO KIM AND U-KEUN SONG Abstract. Recently, Chapoton found a q-analog of Ehrhart polynoials,

More information

A Simple Regression Problem

A Simple Regression Problem A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where

More information

Divisibility of Polynomials over Finite Fields and Combinatorial Applications

Divisibility of Polynomials over Finite Fields and Combinatorial Applications Designs, Codes and Cryptography anuscript No. (will be inserted by the editor) Divisibility of Polynoials over Finite Fields and Cobinatorial Applications Daniel Panario Olga Sosnovski Brett Stevens Qiang

More information

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40 On Poset Merging Peter Chen Guoli Ding Steve Seiden Abstract We consider the follow poset erging proble: Let X and Y be two subsets of a partially ordered set S. Given coplete inforation about the ordering

More information

Longest Processing Time rule for identical parallel machines revisited

Longest Processing Time rule for identical parallel machines revisited Longest Processing Tie rule for identical parallel achines revisited Federico Della Croce a,b,, Rosario Scataacchia a arxiv:1801.05489v1 [cs.ds] 16 Jan 2018 a Dipartiento di Ingegneria Gestionale e della

More information

Page 1 Lab 1 Elementary Matrix and Linear Algebra Spring 2011

Page 1 Lab 1 Elementary Matrix and Linear Algebra Spring 2011 Page Lab Eleentary Matri and Linear Algebra Spring 0 Nae Due /03/0 Score /5 Probles through 4 are each worth 4 points.. Go to the Linear Algebra oolkit site ransforing a atri to reduced row echelon for

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

Acyclic Colorings of Directed Graphs

Acyclic Colorings of Directed Graphs Acyclic Colorings of Directed Graphs Noah Golowich Septeber 9, 014 arxiv:1409.7535v1 [ath.co] 6 Sep 014 Abstract The acyclic chroatic nuber of a directed graph D, denoted χ A (D), is the iniu positive

More information

EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS

EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS Jochen Till, Sebastian Engell, Sebastian Panek, and Olaf Stursberg Process Control Lab (CT-AST), University of Dortund,

More information

INTEGRATIVE COOPERATIVE APPROACH FOR SOLVING PERMUTATION FLOWSHOP SCHEDULING PROBLEM WITH SEQUENCE DEPENDENT FAMILY SETUP TIMES

INTEGRATIVE COOPERATIVE APPROACH FOR SOLVING PERMUTATION FLOWSHOP SCHEDULING PROBLEM WITH SEQUENCE DEPENDENT FAMILY SETUP TIMES 8 th International Conference of Modeling and Siulation - MOSIM 10 - May 10-12, 2010 - Haaet - Tunisia Evaluation and optiization of innovative production systes of goods and services INTEGRATIVE COOPERATIVE

More information

Single Machine Scheduling with a Non-renewable Financial Resource

Single Machine Scheduling with a Non-renewable Financial Resource Single Machine Scheduling with a Non-renewable Financial Resource Evgeny R. Gafarov a, Alexander A. Lazarev b Institute of Control Sciences of the Russian Academy of Sciences, Profsoyuznaya st. 65, 117997

More information

Partition is reducible to P2 C max. c. P2 Pj = 1, prec Cmax is solvable in polynomial time. P Pj = 1, prec Cmax is NP-hard

Partition is reducible to P2 C max. c. P2 Pj = 1, prec Cmax is solvable in polynomial time. P Pj = 1, prec Cmax is NP-hard I. Minimizing Cmax (Nonpreemptive) a. P2 C max is NP-hard. Partition is reducible to P2 C max b. P Pj = 1, intree Cmax P Pj = 1, outtree Cmax are both solvable in polynomial time. c. P2 Pj = 1, prec Cmax

More information

The Inferential Complexity of Bayesian and Credal Networks

The Inferential Complexity of Bayesian and Credal Networks The Inferential Coplexity of Bayesian and Credal Networks Cassio Polpo de Capos,2 Fabio Gagliardi Cozan Universidade de São Paulo - Escola Politécnica 2 Pontifícia Universidade Católica de São Paulo cassio@pucsp.br,

More information

EE5900 Spring Lecture 4 IC interconnect modeling methods Zhuo Feng

EE5900 Spring Lecture 4 IC interconnect modeling methods Zhuo Feng EE59 Spring Parallel LSI AD Algoriths Lecture I interconnect odeling ethods Zhuo Feng. Z. Feng MTU EE59 So far we ve considered only tie doain analyses We ll soon see that it is soeties preferable to odel

More information

Kernel Methods and Support Vector Machines

Kernel Methods and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley ENSIAG 2 / osig 1 Second Seester 2012/2013 Lesson 20 2 ay 2013 Kernel ethods and Support Vector achines Contents Kernel Functions...2 Quadratic

More information

Graphical Models in Local, Asymmetric Multi-Agent Markov Decision Processes

Graphical Models in Local, Asymmetric Multi-Agent Markov Decision Processes Graphical Models in Local, Asyetric Multi-Agent Markov Decision Processes Ditri Dolgov and Edund Durfee Departent of Electrical Engineering and Coputer Science University of Michigan Ann Arbor, MI 48109

More information

Note on generating all subsets of a finite set with disjoint unions

Note on generating all subsets of a finite set with disjoint unions Note on generating all subsets of a finite set with disjoint unions David Ellis e-ail: dce27@ca.ac.uk Subitted: Dec 2, 2008; Accepted: May 12, 2009; Published: May 20, 2009 Matheatics Subject Classification:

More information

COS 424: Interacting with Data. Written Exercises

COS 424: Interacting with Data. Written Exercises COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well

More information

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

THE CONSTRUCTION OF GOOD EXTENSIBLE RANK-1 LATTICES. 1. Introduction We are interested in approximating a high dimensional integral [0,1]

THE CONSTRUCTION OF GOOD EXTENSIBLE RANK-1 LATTICES. 1. Introduction We are interested in approximating a high dimensional integral [0,1] MATHEMATICS OF COMPUTATION Volue 00, Nuber 0, Pages 000 000 S 0025-578(XX)0000-0 THE CONSTRUCTION OF GOOD EXTENSIBLE RANK- LATTICES JOSEF DICK, FRIEDRICH PILLICHSHAMMER, AND BENJAMIN J. WATERHOUSE Abstract.

More information

Handout 7. and Pr [M(x) = χ L (x) M(x) =? ] = 1.

Handout 7. and Pr [M(x) = χ L (x) M(x) =? ] = 1. Notes on Coplexity Theory Last updated: October, 2005 Jonathan Katz Handout 7 1 More on Randoized Coplexity Classes Reinder: so far we have seen RP,coRP, and BPP. We introduce two ore tie-bounded randoized

More information

Complexity analysis of the discrete sequential search problem with group activities

Complexity analysis of the discrete sequential search problem with group activities Complexity analysis of the discrete sequential search problem with group activities Coolen K, Talla Nobibon F, Leus R. KBI_1313 Complexity analysis of the discrete sequential search problem with group

More information

PREPRINT 2006:17. Inequalities of the Brunn-Minkowski Type for Gaussian Measures CHRISTER BORELL

PREPRINT 2006:17. Inequalities of the Brunn-Minkowski Type for Gaussian Measures CHRISTER BORELL PREPRINT 2006:7 Inequalities of the Brunn-Minkowski Type for Gaussian Measures CHRISTER BORELL Departent of Matheatical Sciences Division of Matheatics CHALMERS UNIVERSITY OF TECHNOLOGY GÖTEBORG UNIVERSITY

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

The Weierstrass Approximation Theorem

The Weierstrass Approximation Theorem 36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined

More information

Analyzing Simulation Results

Analyzing Simulation Results Analyzing Siulation Results Dr. John Mellor-Cruey Departent of Coputer Science Rice University johnc@cs.rice.edu COMP 528 Lecture 20 31 March 2005 Topics for Today Model verification Model validation Transient

More information

Testing Properties of Collections of Distributions

Testing Properties of Collections of Distributions Testing Properties of Collections of Distributions Reut Levi Dana Ron Ronitt Rubinfeld April 9, 0 Abstract We propose a fraework for studying property testing of collections of distributions, where the

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

Faster and Simpler Algorithms for Multicommodity Flow and other. Fractional Packing Problems. Abstract

Faster and Simpler Algorithms for Multicommodity Flow and other. Fractional Packing Problems. Abstract Faster and Sipler Algoriths for Multicoodity Flow and other Fractional Packing Probles Naveen Garg Jochen Koneann y Abstract This paper considers the proble of designing fast, approxiate, cobinatorial

More information

Understanding Machine Learning Solution Manual

Understanding Machine Learning Solution Manual Understanding Machine Learning Solution Manual Written by Alon Gonen Edited by Dana Rubinstein Noveber 17, 2014 2 Gentle Start 1. Given S = ((x i, y i )), define the ultivariate polynoial p S (x) = i []:y

More information

Solving initial value problems by residual power series method

Solving initial value problems by residual power series method Theoretical Matheatics & Applications, vol.3, no.1, 13, 199-1 ISSN: 179-9687 (print), 179-979 (online) Scienpress Ltd, 13 Solving initial value probles by residual power series ethod Mohaed H. Al-Sadi

More information

Support Vector Machines. Maximizing the Margin

Support Vector Machines. Maximizing the Margin Support Vector Machines Support vector achines (SVMs) learn a hypothesis: h(x) = b + Σ i= y i α i k(x, x i ) (x, y ),..., (x, y ) are the training exs., y i {, } b is the bias weight. α,..., α are the

More information

A Bernstein-Markov Theorem for Normed Spaces

A Bernstein-Markov Theorem for Normed Spaces A Bernstein-Markov Theore for Nored Spaces Lawrence A. Harris Departent of Matheatics, University of Kentucky Lexington, Kentucky 40506-0027 Abstract Let X and Y be real nored linear spaces and let φ :

More information

Distance Optimal Target Assignment in Robotic Networks under Communication and Sensing Constraints

Distance Optimal Target Assignment in Robotic Networks under Communication and Sensing Constraints Distance Optial Target Assignent in Robotic Networks under Counication and Sensing Constraints Jingjin Yu CSAIL @ MIT/MechE @ BU Soon-Jo Chung Petros G. Voulgaris AE @ University of Illinois Supported

More information