Routing Equal-Size Messages on a Slotted Ring

Size: px
Start display at page:

Download "Routing Equal-Size Messages on a Slotted Ring"

Transcription

1 Journal of Scheduling 15(4) (2012) Routing Equal-Size Messages on a Slotted Ring Dariusz Dereniowski Department of Algorithms and System Modeling Gdańsk University of Technology Gdańsk, Poland deren@eti.pg.gda.pl Wiesław Kubiak Faculty of Business Administration Memorial University St. John s, Canada wkubiak@mun.ca Abstract We deal with the problem of routing messages on a slotted ring network in this paper. We study the computational complexity and algorithms for this routing by means of the results known in the literature for the multi-slot just-in-time scheduling problem. We consider two criteria for the routing problem: makespan, or minimum routing time, and diagonal makespan. A diagonal is simply a schedule of ring links i = 0,..., q 1 in q consecutive time slots respectively. The number of diagonals between the earliest and the latest diagonals with non-empty packets is referred to as the diagonal makespan. For the former, we show that the optimal routing of messages of size k, is NP-hard in the strong sense, while an optimal routing when k = q can be computed in O(n 2 log 2 n) time. We also give an O(n log n)-time constant factor approximation algorithm for unit size messages. For the latter, we prove that the optimal routing of messages of size k, where k divides the size of the ring q, is NP-hard in the strong sense even for any fixed k 1, while an optimal routing when k = q can be computed in O(n log n) time. We also give an O(n log n)-time approximation algorithm with an absolute error 2q k. Keywords: just-in-time scheduling, multi-slot scheduling, optical network, routing, slotted ring 1 Introduction According to the Websters online dictionary a slotted ring is A LAN architecture that continually carries a constant number of fixed length packets or slots round the ring. The nodes then use, by replacement, empty slots as they pass through, to transmit data. All the nodes have the ability to recognise empty slots or slots addressed to them. A regular topology of the ring and no buffering in the slotted ring are two desirable features of modern high speed networks according to a recent survey, Li et al. [2007]. Consequently, slotted rings have found numerous real-life implementations. Although slotted rings with variable packet sizes have been proposed, the asynchronous network model with variable size packets have several disadvantages, see e.g. Bianco et al. [2004], Yang et al. [2004]. Therefore the DAVID Metropolitan Area Network described in Bianco et al. [2004] is dealing with variable packet sizes by breaking them into fixed size packets, transmitting these through the network and then assembling them at the destination once the transmission is complete. The topology of the DAVID network is a Wide Area Network consisting of several optical Metropolitan Area Networks (MAN). Each MAN contains several optical slotted ring networks, see Bianco et al. [2002, 2004]. The new French slotted ring ECOFRAME is described in Chiaroni [2008]. For other examples of fixed size slotted ring networks models and their analysis see e.g. Carena et al. [2002],Chaitou et al. [2007], Kang et al. [1995], King and Mitrani [1987], Marsan et al. [1997]. In this paper we consider a slotted ring network with one wavelength. Though in practice several wavelengths may be available, their number is usually much smaller than the possible number of nodes attached to the network. This leads to similar algorithmic and complexity problems as the ones considered in this paper. One important consequence of this assumption is the fact that the transmission of packets happens in one direction only in the slotted ring. The complexity and related results concerning the ring loading problem for the rings with a possibility of two-way transmission are given in Lee and Chang 1

2 [1997], Myung and Kim [2004], Schrijver et al. [1998], Wang [2005]. A survey of various wavelengthdivision multiplexing (WDM) metropolitan ring networks and protocols can be found in Herzog et al. [2004]. Despite studies concerning the network efficiency for slotted and un-slotted models even with more general than ring network topologies, see Yao et al. [2001], very little is known about computational complexity and algorithms for routing slotted rings. To our knowledge the work of Barth et al. [2004] is the first and only paper dealing with these issues. The main motivation of this paper is to fill in this void. One of the contributions of this paper is a characterization of a connection between the optimization of routing on a slotted ring and the optimization of multi-slot just-in-time schedules on parallel machines. In the latter problem a set of n jobs and an integer L > 0 are given. Each job is characterized by its relative due-date, which is an integer not greater than L, and its integer processing time. The time is divided into time slots, each of length L. In a feasible schedule no machine processes two or more jobs at the same time, and each job has to be executed without preemption to complete exactly at its due-date in one of the time slots. The due-dates are relative to the beginning of slots, not to the beginning of schedule. The problem consists in minimizing either the number of slots or the makespan of the schedule. The latter objective is more general for a schedule minimizing makespan minimizes the number of slots at the same time but not the other way round. The minimization of the number of slots of a just-in-time schedule is strongly NP-hard even if the processing time of each job is at most L, however there exists an approximation algorithm with absolute error of one slot, Sung et al. [2007b], for this case. If the processing time of each job does not exceed its due-date, then a minimum makespan solution can be found in time O(n log n), see Dereniowski and Kubiak [2010]. An optimal schedule for a single machine and any set of jobs can be found in O(n log n)- time, Sung et al. [2007b], and O(n log 2 n) time, Dereniowski and Kubiak [2010], for the minimum number of slots and the makespan objectives, respectively. Other results on multi-slot just-in-time scheduling can be found in Čepek and Sung [2004]. For general scheduling models and notation see Tanaev et al. [1994] and Błażewicz et al. [1996], and for just-in-time scheduling models see Józefowska [2007], and Kubiak [2009]. For the terminology and definitions concerning algorithms and complexity see e.g. Garey and Johnson [1979], Hromkovič [2001], Vazirani [2001]. The paper s main result proves that the optimization of routing on a slotted ring is NP-hard in the strong sense. This proof improves the result of Barth et al. [2004] in two ways. First, by holding for the messages of equal size. Second, by dropping the initial staircase-pattern machine availability assumption, see Błażewicz et al. [2000] for the scheduling with machine availability constraints. This assumption is a key assumption needed in the NP-hardness proof given in Barth et al. [2004]. Finally, the paper proposes several off-line optimal and approximation algorithms for the optimization of routing on a slotted ring. The paper is organized as follows. The next section introduces the routing on a slotted ring and defines two optimization criteria: the diagonal makespan, or the number of diagonals, and the makespan. The section also defines the notation used thorough the paper. Section 3 is devoted to the problem of minimizing the diagonal makespan, its main contribution is a mapping between the ring routing problem and the problem of multi-slot just-in-time scheduling discussed in Sections 3.1 and 3.2. Section 3.3 applies this mapping to prove that the problem of minimizing diagonal makespan is strongly NP-hard even for messages of size 1, and to derive an efficient approximation algorithm with an absolute error of 2q k for the problem, where k is the message size. Section 4 deals with the makespan minimization problem in slotted rings. Section 4.1 shows that this problem is NP-hard in the strong sense even for equal size messages. However, if the size equals the size of the ring, then the problem is solvable in polynomial time, which is shown in Section 4.2. Sections 4.3 and 4.4 give algorithms for two special cases of the problem: routing on a path and short routing with a bottleneck link. These algorithms are then used as subroutines in an O(n log n)-time constant approximation ratio algorithm for unit size messages in Section 4.5. We summarize the results, and list some open problems in Section 5 which concludes the paper. 2

3 2 Routing slotted ring The network with the ring topology contains q nodes, numbered 0,..., q 1, and q links, (0, 1), (1, 2),..., (q 1, 0). We refer to the link (l, (l + 1) mod q) simply as link l. The set of messages is denoted by P = {P 1,..., P n }. Each message P i is characterized by its size, size(p i ) - the number of packets the message P i contains. Its source node, source(p i ), is the node in the ring where the broadcast of P i originates from, and its destination node, dest(p i ), is the node in the ring where P i is destined to. The time is divided into steps of equal duration sufficient for a link to carry a single packet. At each step s a link l carries a packet p P i if and only if either link (l 1) mod q carried p in step s 1 and dest(p i ) l, or source(p i ) = l and the broadcast of P i begins in step s. Each node can receive a packet and send another packet in the same step. Without loss of generality we assume that the ring carries packets clockwise. A routing is defined by assigning each message P i an integer b i - the step when the broadcast of P i begins in the source(p i ). Figure 1(a) depicts a ring network with 9 nodes numbered 0,..., 8. The three distinguished nodes 1, 5 and 8 are both broadcasting and receiving packets in this example. Suppose that a set P = {P 1,..., P 5 } of 5 unit size messages is to be transmitted, where the message source and destination nodes are defined as follows. Message source(p i ) dest(p i ) P P P P P (a) (b) time (c) 8 P P 1 2 P3 3 4 P 2 Figure 1: (a) a ring with 9 nodes; (b) a matrix t for routing R; (c) the state of the ring in the third step Figure 1(b) gives a possible routing R for this instance. The routing R is presented by a matrix t where t l,s = i means that link l carries a packet of message P i in step s, and t l,s being blank means that link l is empty, carries no packet, in step s. Figure 1(c) shows the state of the ring in step 3 of R. The step when the transmission of the last packet of P i begins is b i +size(p i ) 1, while the transmission of P i ends in step e i = b i + size(p i ) 1 + λ i, where λ i is the number of links that each packet of P i visits on its way from the source to the destination, formally λ i = { dest(pi ) source(p i ) if dest(p i ) > source(p i ), q (source(p i ) dest(p i )) if dest(p i ) < source(p i ). (1) The makespan of a routing R is ms(r) = max{e i : i = 1,..., n}. In the example from Figure 1 we have that ms(r) = 7. Following the notation in Barth et al. [2004], we use the MS-FSP (Makespan criterion - Fixed Size Packet) to denote the problem of minimizing makespan for the routing problem with all messages of size 1. We extend this notation to MS-FSP k to denote the problem of minimizing makespan for the routing problem with all messages of size k 1. The k may or may not be a part of the input, whichever is the case will be clear from the context. In particular we have MS-FSP = MS-FSP 1. 3

4 Given a routing R, let t l,s = i if link l, l = 0,..., q 1, in step s, s = 1,..., ms(r), carries a packet of message P i, or t l,s = otherwise. If s 0 or s > ms(r) then t l,s =. For r 1 define a vector I r : {0,..., q 1} P { } I r = (t 0,r q+1, t 1,r q+2,..., t h,r q+1+h,..., t q 1,r ). The vector I r is called diagonal r of routing R. We also use a notation I r (a, b) = (t a,r q+1+a,..., t b,r q+1+b ), 0 a b < q, to denote a sub-vector of I r which includes all coordinates of I r between a and b inclusive. We say that I r or I r (a, b) is empty if all their coordinates are. Note that by definition we have that for each routing R, the sub-vectors I r (0, q 1 r) and I ms(r)+r (q r, q 1) are empty for r = 1,..., q 1. The example in Figure 1 has b 1 = 1 so that t 8,1 = P 1. In step 2 the only packet of P 1 is carried by link 0 so that t 0,2 = 1. The broadcast of message P 1 is thus contained in diagonals I 1 and I 10 of R. Given a routing R for P, define its diagonal makespan, diag(r), as the number of diagonals I r between the earliest and the latest nonempty diagonals inclusive, diag(r) = r max r min + 1, (2) where r max = max{r : I r (,..., )} and r min = min{r : I r (,..., )}. The I(R) will denote the set of all diagonals I r of R such that r min r r max. Thus, diag(r) = I(R). We reserve the DIAG-FSP k to denote the problem of minimizing diagonal makespan for the routing problem with all messages of size k 1. For the routing R in Figure 1(b) we have diag(r) = 13. We conclude this section with a theorem that allows us to assume without loss of generality that if k q, that is if k divides q, then each schedule for the problem DIAG-FSP k starts broadcasting each message P i P in some diagonal I jk+1 for some j 0. In other words no message starts broadcasting on the in-between diagonals I jk+2,..., I j(k+1). Theorem 1 Let P and q be given. If R is a routing for P and k q, then there exists a routing R such that diag(r ) diag(r) and R has the following property: for j = 0, 1,.... I jk+1 = I jk+2 = = I (j+1)k, (3) Proof: Given a feasible R. If I r, r > 1, is the first nonempty diagonal of R, then subtract r 1 from all the diagonal indices in I(R). Thus, without loss of generality I 1 is the first nonempty diagonal of R. Let us consider routing R with P i starting in diagonal I jk+1 provided that P i starts in diagonal I jk+t for some j 0 and 1 t k. Clearly, diag(r ) diag(r). We now prove that (3) holds. Consider diagonals I jk+1,..., I (j+1)k. By the construction of R and since k q, these diagonals may only contain packets of messages P i that start their broadcasts either in I jk+1 or in I jk+1 q = I jk+1 (q/k)k = I (j q/k)k+1. The latter holds since if a packet of message P with source(p ) > dest(p ) passes the link q 1 in step s, that is, it completes the diagonal I s, then it continues on link 0 in step s + 1 which is the start of diagonal s + q. Consequently, the condition (3) is satisfied, because size(p i ) = k. We argue, by contradiction, that R is feasible. Suppose that packets p P i and p P m, for different messages P i and P m, share a link in the same step in R. For each P P, we have that size(p ) = k and the broadcast of P starts in a diagonal I jk+1 in R for some j 0, thus without loss of generality we may assume that p and p are the first packets of P i and P m, respectively. However, since b i b i b i + k 1 and b m b m b m + k 1, then a packet of P i and a packet of P m must share a link in the same step in R as well because size(p i ) = size(p m ) = k and (b i mod k) (b m mod k) < k. This implies the infeasibility of R and leads to a contradiction. 3 Diagonal makespan is just-in-time scheduling This section focuses on the DIAG-FSP k problem. Our approach transforms DIAG-FSP k to the multislot just-in-time scheduling problem. The transformation is linear in P and not only does it give a one-to-one mapping between the two problem s instances but also a one-to-one mapping between their 4

5 schedules and routings. The latter, however, holds as long as the size of the ring q is divisible by the size of messages k, that is k q, (4) which we assume throughout this section. The advantage of this transformation based approach to solving DIAG-FSP k is that a number of results already obtained for the multi-slot just-in-time scheduling problem, see Sung et al. [2007a] and Dereniowski and Kubiak [2010], almost immediately translates in the results for the routing problem DIAG-FSP k and thus no new complexity proofs or algorithms are required for the latter. We begin with introducing the multi-slot just-in-time scheduling problem. 3.1 Just-in-time scheduling We follow terminology of Sung et al. [2007a] and Dereniowski and Kubiak [2010] in our introduction of the multi-slot just-in-time scheduling here. The time is divided into slots of equal size L. A set of jobs J = {J 1,..., J n } is given, where each job J j has integer processing time p j and integer due-date d j. The execution of job J j must end exactly at d j in one of the slots. The jobs are executed on a set of identical machines M = {M 1,..., M m }. No preemptions are allowed. A schedule S for J is feasible if no machine M performs more than one job at the same time and the execution of each job J j ends at its due-date. We define s j for each J j J to denote the start of J j relative to the beginning of a slot, formally { dj p s j = j if p j d j, (5) L p j + d j if p j > d j. Note that s j depends on J j but not on schedule. However, the absolute start, S j = s j + a j L, of J j depends on schedule since the schedule defines the slot a j where J j starts. The completion time of J j is then C j = S j + p j. Let S be a schedule of J on machines in M. Then S M, M M, is simply S restricted to a single machine schedule on machine M. If S is a single machine schedule, then slots(s) denotes the number of slots used in S. If S is a schedule on machines in M, M > 1, then we define slots(s) = max{slots(s M ) : M M}. For any schedule S let len(s) = max{c j : J j J }. 3.2 The transformation The transformation from an instance of the routing problem to an instance of the just-in-time scheduling problem is as follows. Set L = q and m = q/k, (6) and for each message P j P create a corresponding job J j J with processing time p j = λ j, where λ j is defined in (1), due date d j = dest(p j ), and s j = source(p j ). Note that the size k of all messages affects only the number of machines. Moreover, by (1) the outcome of the transformation contains only jobs J i shorter than L. That is, a job either ends in the same slot it has started or in the next one in a multi-slot just-in-time schedule. We now claim that there exists a routing R for P with diag(r) bq if and only if there exists a just-in-time schedule S for J with slots(s) b, for an integer b 0. Therefore, since q is fixed in any instance of the routing problem, the diagonal makespan minimization is related to the number of slots minimization. First, let us observe that there exists a one-to-one mapping between the slots of schedule S and the diagonals I r of routing R; simply slot p on machine M f M is mapped into the set of diagonals {I k(f 1)+1+(p 1)q,..., I kf+(p 1)q }, (7) in this mapping. However, by Theorem 1, all these diagonals are equal. Thus, we may limit ourselves to diagonals I ki+jq for j 0 and i = 1,..., q/k in the mapping. Moreover, without loss of generality we 5

6 may assume that the first nonempty diagonal in R is I 1. Thus, the schedule S Mf is actually mapped into the set {I kf, I kf+q,..., I kf+(slots(s) 1)q }, (8) of diagonals; since km = q, any two different machines are thus mapped into disjoint sets of diagonals. The schedule S on M f is simply the concatenation of I kf, I kf+q,..., I kf+(slots(s) 1)q in that order. Next, observe that the unit time interval [l, l + 1], for some integer l {0,..., q 1}, in slot p of S Mf corresponds to the coordinate l of diagonal I k(f 1)+(p 1)q. Therefore, any time interval [a, b], for integers a b, b a < L, entirely contained in slot p of S Mf in S, corresponds to the sub-diagonal I kf+(p 1)q (a (p 1)L 1, b (p 1)L), (9) and any time interval [a, b] intersecting two slots, p and p + 1, on M f, corresponds to the concatenation of two sub-diagonals I kf+(p 1)q (a (p 1)L 1, L 1) and I kf+pq (0, b pl). (10) This proves that a job J i is executed in the interval [a, b] in S Mf if and only if the last packet of the corresponding message P i is scheduled in either (9) or (10) in R. Therefore, there is a one-to-one mapping between feasible routings R for P and feasible schedules S for J. Finally, by (8) we have that slots(s) b if and only if diag(r) bmk = bq for an integer b. We thus proved the following theorem. Theorem 2 Let size(p i ) = k for each P i P, L = q, m = q/k, where k q. There exists a schedule S for J satisfying slots(s) b if and only if there exists a routing R for P with diag(r) bmk = bq. Let us give an example of this transformation for q = 5 and k = 1. The set P contains the following 8 messages: Message source(p i ) dest(p i ) P P P P P P P P Figure 2(a) gives a multi-slot just-in-time schedule for J = {J 1,..., J 8 }. This schedule is executed within two slots on each of the 5 machines. The corresponding routing for P is given in Figure 2(b). (a) M 1 J 1 M 2 J 2 J 3 J 4 M 3 M 4 M 5 J 5 J 8 J 6 J 7 0 (b) P 2 P 1 P 3 P 4 P P 2 P 5 P 3 P 7 2 P 1 P 2 P 5 P 8 P 7 3 P 1 P 3 P 8 P 7 4 P 1 P 3 P 4 P 6 P 8 Figure 2: (a) a just-in-time schedule for J ; (b) the corresponding routing for P 3.3 Applications of the transformation We are now ready to prove that DIAG-FSP k is NP-complete in the strong sense. We begin by recalling the following result. 6

7 Theorem 3 (Sung et al. [2007b]) Given an integer b 1 and a set of jobs J satisfying p j < L for each J j J, and J p j J j = bml, the problem of deciding whether there exists a schedule S with slots(s) b is NP-complete in the strong sense. In the following we show that we can restrict the inputs of the multi-slot just-in-time scheduling problem in Theorem 3 to the ones with L = km, for any fixed integer k 1, and this problem still remains NP-complete in the strong sense. First of all, by multiplying L, d j s and p j s by 2k, we may assume without loss of generality that L = kl for some even integer l > 1, and that there are two odd integers s, s {0,..., L 1} such that s j, d j / {s, s } for each job J j. If L < km, then we set the slot size to L = km, and the number of machines to m = m. Each due date increases by km L. Thus, a new due-date is at the same relative distance from L, as the old one was from L. Moreover, if s j d j for J j, then we set p j = p j, otherwise we set p j = p j + km L. In the former case the job is entirely processed in a single slot of a just-in-time schedule, in the latter it is processed in two adjacent slots. Observe that after the change no job starts or ends in time interval (0, km L) which means that we can readily obtain a schedule for one instance from a schedule for the other by simply executing each job in the same slot and on the same machine as in the original schedule. If L = kl > km, then we add l m long jobs to J each with due date L and processing time bl. We increase the number of machines to m = L/k = l, and set L = L. Thus, each new long job must occupy a separate machine by itself in any just-in-time schedule S with slots(s) b. We then split each new long job into the maximum number of jobs shorter than L and with due-dates s and s. Observe that the total processing time equals bm L for the resulting instance, provided that J j J p j = bml for the initial instance. Thus, the new shorter than L jobs may not share a machine with the original jobs in J ; the sharing would create at least one unit idle time which is not allowed as long as slots(s) b. Thus, we obtain instances with L = km and p j < L, j = 1,..., n, (11) in both cases. To prove that the transformation is polynomial observe that {s j, d j : J j J } 2n for an input J, L to the multi-slot just-in-time scheduling problem. If u, v {s j, d j : J j J }, u < v, meet the following condition s j, d j / (u, v) for all J j J, then we can we convert (u, v) into a unit time interval. This can be done by setting the slot size to L v + u + 1, and for each J j with s j u and d j v setting their new values s j v + u + 1 and d j v + u + 1, respectively. (Note that by changing s j and/or d j we also modify p j so that (5) holds.) This allows us to assume that L 2n. We may also restrict ourselves to nontrivial instances where m n. Finally, b 2n, because each job intersects at most two consecutive slots in each schedule, so we can schedule each job exclusively within two adjacent slots and thus obtain a schedule using at most 2n slots. This leads to the following corollary. Corollary 1 Given integers L, b and k, a set of jobs J satisfying p j < L for each J j J, and a set of m machines M, where k M = L, the problem of finding a just-in-time schedule S satisfying slots(s) b is NP-complete in the strong sense. This corollary and Theorem 2 immediately imply the following theorem. Theorem 4 The routing problem DIAG-FSP k is NP-hard in the strong sense for each fixed k 1. This transformation readily leads to an approximation algorithm for DIAG-FSP k which we now show. To begin with, we recall the O(n log n)-time multi-slot just-in-time approximation scheduling algorithm given by Sung et al. [2007b]. Theorem 5 (Sung et al. [2007b]) There exists an O(n log n)-time algorithm, which finds a just-in-time schedule S for J and M with slots(s) slots(s ) + 1, where S is an optimal schedule for J and M. Though this theorem is a point of departure for the approximation algorithm for DIAG-FSP k, we also need the following relative lower bound on the number of diagonals in the routing problem resulting from the transformation. 7

8 Lemma 1 Let J, L, m and P, q = L, k = q/m be the corresponding instances of the multi-slot just-intime scheduling and the routing problems, respectively. If an optimal just-in-time schedule for J uses b slots on some machine, then for each routing R for P, diag(r) (b 1)L + k. Proof: By contradiction. Let R be a routing for P with diag(r) < (b 1)L + k. By Theorem 1, diag(r) (b 1)L. This, by Theorem 2, implies that there exists a just-in-time schedule S for J of length slots(s) b 1 a contradiction. We are now ready to give the approximation algorithm for DIAG-FSP k. The algorithm constructs the corresponding instance of the multi-slot just-in-time scheduling problem, applies the algorithm from Theorem 5 to find a just-in-time schedule, and finally the schedule is transformed into a routing as described earlier in this section. Theorem 6 If k q, then there exists an approximation O(n log n)-time algorithm with an absolute error of 2q k for the problem DIAG-FSP k. Proof: Let an optimal schedule S for J results into slots(s ) slots. Let R, S and R be an optimal routing for the DIAG-FSP k problem, a schedule for J found by the algorithm from Theorem 5, and the routing for P corresponding to S in the transformation, respectively. We have that slots(s) slots(s ) + 1 by Theorem 5. By Theorem 2, diag(r) (slots(s ) + 1)q. Finally, by Lemma 1, diag(r ) (slots(s ) 1)q + k. Thus, diag(r) diag(r ) 2q k and the theorem holds. We close this section pointing another benefit of the transformation. Namely, whenever an instance of the just-in-time scheduling problem belongs to DIAG-FSP q, that is k = q, then by Lemma 1 and Theorem 2, an optimal schedule for the DIAG-FSP q problem is simply an optimal single machine multislot just-in-time schedule for J. The latter can be found in O(n log n) time Sung et al. [2007a,b] as has been earlier mentioned. Thus, the problem DIAG-FSP q is solvable in O(n log n) time. It is somewhat interesting that DIAG-FSP k is NP-hard in the strong sense for any fixed k = 1, 2, 3,... by Theorem 4, yet whenever k = q the problem is efficiently solvable. 4 Makespan of the routing problem This section deals with the makespan minimization problem MS-FSP k. We begin by showing that the problem is NP-hard in the strong sense in Section 4.1. Then, in the subsequent sections we give polynomial time optimal and approximation algorithms for some special cases of the problem. We begin in Section 4.2 with MS-FSP q where all messages have the same size equal the size of the ring q. We then focus on the problem MS-FSP 1 where all messages are of unit size, k = 1. Section 4.3 considers the case of a ring with a link never used by any message in P. We refer to this case as routing unit size messages on a path. We show a 2-approximation algorithm running in O(n log n) time for this case. Section 4.4 addresses a somewhat complementary case of a ring with a bottleneck link used by all messages in P, and with an additional requirements that the makespan of an optimal routing is at most q. We show that this case reduces to finding maximum matchings in convex bipartite graphs (we give a definition in Section 4.4). Finally, we give an approximation algorithm with a constant approximation ratio for any set of messages P of unit size in Section 4.5. The approximation relies on the two special cases studied in Sections 4.3 and 4.4 and a reduction to the multi-slot just-in-time scheduling problem. 4.1 Makespan minimization is NP-hard The reduction is from the circular-arc graph coloring problem we now briefly introduce. A simple graph G = (V, E) is a circular-arc graph if each vertex v V can be represented by an arc on a circle and for any two vertices u, v V, {u, v} E iff the arcs corresponding to u and v intersect. For each v V let l(v) and r(v) be respectively the left and right endpoint of the arc corresponding to v. We may without loss of generality assume that the endpoints of all vertices are pairwise different. For more details on circular-arc graph see Brandstädt et al. [1999]. For a positive integer c and a graph G, we say that a function f : V {1,..., c} is a c-coloring of the vertices of G if for each {u, v} E we have f(u) f(v). The smallest number c, denoted by χ(g), 8

9 for which there exists a c-coloring of G is referred to as the chromatic number of G. Given c and a circular arc graph G, the problem of deciding whether there exists a c-coloring of the vertices of G is NP-complete in the strong sense, see Garey et al. [1980]. We now reduce this problem to the following decision version of the routing problem. Input: a ring of size q, and a set of packets P of size k each. Question: is there a routing with makespan at most b for P? Assume that a circular-arc graph G = (V, E) is given along with the required number of colors c. We compute a mapping π : {1,..., 2 V } {l(v), r(v) : v V (G)} satisfying π(i) < π(j) for 1 i < j 2n. Let q = 2 V. For each v V include into P a message P v such that source(p v ) = i, where π(i) = l(v), dest(p v ) = j, where π(j) = r(v), and k = size(p v ) = (c + 1)q. Finally, let b = c(k + q). In order to prove that the mapping we just defined is a required reduction, we introduce a useful relation. Given a routing R for the routing problem, define a relation on P as follows: first, begin with a relation such that P 1 P 2 if there exists such a link l {0,..., q 1} that each packet of P 1 appears on l earlier than each packet of P 2, i.e. if t l,j = P 1 and t l,i = P 2 then j < i in R. Then, set to be the reflexive and transitive closure of. Figure 3(a) depicts a routing of a set of messages which results in being a partial order. The corresponding Hasse diagram is given in Figure 3(b). Observe that is not a partial order generally. (a) 0 1 P P 7 P 4 P 2 (b) P 6 P 4 P 8 P 7 P P3 6 P 2 P 5 P P 8 5 P 7 P 3 10 P 1 Figure 3: (a) a routing for P; (b) a Hasse diagram corresponding to (P, ) Lemma 2 If there exists a routing of makespan c(k + q) for the routing problem with all messages of size k = (c + 1)q on a ring with 2 V nodes, then there exists a c-coloring f of the circular-arc graph G. Proof: Given a routing R for P, observe that the corresponding relation is a partial order which is guaranteed by k = (c + 1)q. Given the relation, we partition the set P into P 1,..., P h, in such a way that P i is the set of messages on the ith level of a Hasse diagram of, where level 1 is the one containing only minimal elements. Given the partial order (P, ) and a partition P = P 1 P h, let f(v) = i if P v P i. To prove that f is a coloring of G assume that {u, v} E. This means that P u and P v belong to different sets P i, which implies f(u) f(v). Now we prove by contradiction that f uses at most c colors. Suppose h > c. Clearly, if P u P i for some P u P then e u i k. Thus, for P u P c+1 we have e u (c + 1)k. Since, k = (c + 1)q we obtain ms(s) e u = (c + 1)k = c(k + q) + q > c(k + q) = b which leads to a contradiction. Moreover, we have: Lemma 3 If there exists a c-coloring f of the circular-arc graph G, then there exists a routing of makespan c(k + q) for the corresponding routing problem with all messages of size k = (c + 1)q on a ring with 2 V nodes. Proof: Let the transmission of P v P begin at b v = (i 1)(k + q) + 1, where f(v) = i. It is easy to check that all these transmissions are then finished by b. It remains to prove that this routing is feasible. Let P u, P v be two different messages. If f(u) < f(v) then b u = (f(u) 1)(k + q) + 1 and b v = (f(u) 1)(k + q) + (f(v) f(u))(k + q) + 1, which implies that the transmission P u ends before the transmission of P v begins. The case f(u) > f(v) is similar. Finally, consider f(u) = f(v). Then 9

10 {u, v} / E. Thus, P u and P v use disjoint sets of links and consequently the transmissions of P u and P v never interfere. Since the problem of coloring circular-arc graphs is strongly NP-hard, Garey et al. [1980], the following theorem is immediately implied by Lemmas 2 and 3. Theorem 7 The problem of finding an optimal solution to the routing problem with all messages of size pq, where p is a part of input to the problem, is NP-hard in the strong sense. 4.2 Routing messages of size q The MS-FSP q problem can be solved to optimality in polynomial time. The solution relies on the transformation given in Section 3.2, and on an O(n log 2 n) time algorithm minimizing the makespan of a single machine just-in-time schedule given by Dereniowski and Kubiak [2010]. The latter algorithm is based on the well-known Gilmore-Gomory algorithm for a special case of the traveling salesman problem, given in Gilmore and Gomory [1964]. The Gilmore-Gomory algorithm computes a complete weighted graph for the input to the just-in-time scheduling problem. The vertices of the graph correspond to the jobs in J, while the weight of a directed edge between two vertices depends on the idle time between the two corresponding jobs when they are being executed one immediately after the other. Then, finding a Hamiltonian cycle in the graph gives a permutation of the jobs in a schedule. Moreover, a dummy job J 0 with due-date d and processing time d, for a given d < L, ensures producing a minimum makespan just-in-time schedule with idleness in [0, d] in its first slot. This job replaces the job J 0 in the algorithm of Dereniowski and Kubiak [2010] (Section 4.2). The choice of d can be limited to d {s j : J j J } which leads to the following algorithm: Step 1: For given P and q, let J, L = q be its corresponding instance of the just-in-time scheduling problem in the mapping given in Section 3.2 for k = q. Set b := +. Step 2: For each d {s j : J j J } run steps 3-5. Step 3: Find a minimum makespan just-in-time schedule S with idle time [0, d] in the first slot using the algorithm given in Dereniowski and Kubiak [2010]. Step 4: Map S into a routing R for P and q, see Section 3.2. Step 5: If ms(r) < b, then set b := ms(r). Step 6: Return the routing R corresponding to the minimum value of b. We thus have the following theorem. Theorem 8 There exists an O(n 2 log 2 n) time algorithm for the MS-FSP q routing problem, where n = J and q is the size of the ring. Proof: The optimality follows from the preceding discussion. The instance J, L = q in step 1 can be found in time linear in n = P = J, and so can be the routing R in step 4. Step 3 can be carried out in time O(n log 2 n), see Dereniowski and Kubiak [2010]. Since the steps 3-5 are executed n times, the running time of the algorithm is O(n 2 log 2 n). 4.3 Routing unit size messages on a path We now consider a special case of the MS-FSP 1 problem, where no message uses a selected link. Without loss of generality we assume that this selected link is q 1. Therefore in principle we can cut this link out of the ring obtaining a simple path which motivates the title of this section. The condition that no message uses link q 1 is equivalent to the following one: source(p i ) < dest(p i ) for each P i P. (12) 10

11 Dereniowski and Kubiak [2010] show that the makespan of multi-slot just-in-time multiple machine schedule can be minimized in time O(n log n) if p j d j for all jobs, which is equivalent to (12) in the transformation of Section 3.2. These results will now be used to obtain a 2-approximate solution for routing messages satisfying (12). We start by proving the following key technical lemma. Lemma 4 Given P satisfying (12), if there exists a routing R with ms(r) b for P, then there exists a routing R for P such that diag(r ) b. Proof: Given R with ms(r) b, we create R as follows. For each P j P, let i j {0, b, 2b, 3b,...} be a translation such that t source(pj),b j i j belongs to one of the diagonals I 1,..., I b in R. Moreover, if P j is contained in one of these diagonals in R, then i j = 0. Otherwise, if P j is contained in one of the diagonals I b+1,..., I b+q 1 in R, then i j is a positive integer multiple of b. It can be checked that the translation with the two required properties always exists; one simply extends the matrix t for R to the left, negative side to fully cover the empty prefixes of diagonals I 1,..., I b, and then one moves to the left along the row source(p j ) with the step b starting at t source(pj),b j until one of the diagonals I 1,..., I b is finally reached. The number of steps multiplied by b equals the required translation. Finally, set the transmission of P j to start in step b j = b j i j in R. In other words, the transmission of P j starts exactly i j steps earlier in R than in R. Note that b j b j 0. However, a negative starting point of P j does not cause any problem when counting the number of diagonals in R. By the definition of the translation, all messages are routed within diagonals I 1,..., I b in R. We prove by contradiction that no packets of two different messages P j, P k go through the same link in the same step in R. Suppose that a packet of P j uses a link l in R at b j + α j for some 0 α j λ j b and a packet of P k uses the same link l in R for some 0 α k λ k b, and in R. The last equality implies b k + α k b j + α j = b k + α k b j + α j b k α k = i j i k. However, the absolute value of the left hand side of this inequality is positive and less than b for R is a feasible routing with ms(r) b. The absolute value of the right hand side belongs to {0, b, 2b, 3b,...}, which gives that i j = i k. This leads to a contradiction and proves that no packets of two different messages P j, P k go through the same link in the same step in R. Finally, R can be easily translated to start at 0 and thus a feasible routing with diag(r ) b. This lemma implies the following lower bound for the routing makespan. Corollary 2 Let P satisfying (12) be given. If R is a routing with minimum diag(r ) then for each routing R it holds ms(r) diag(r ). We are now ready to give the 2-approximation algorithm for routing unit size messages on a path. Let the jobs J correspond to the messages P, as in the transformation of Section 3.2. First, calculate a routing R with the minimum number of b diagonals. Second convert R into a routing R of makespan at most 2b. Finding a routing R with the minimum number of diagonals for P satisfying (12) is equivalent to finding a single machine multi-slot just-in-time schedule for J with minimum number of slots. The two numbers are equal, say b. For the latter problem we use the O(n log n)-time (more general) algorithm given by Dereniowski and Kubiak [2010] for J satisfying p j d j for each J j J. The slot i of the optimal single machine multi-slot just-in-time schedule for J corresponds to the diagonal I i in an optimal routing R for P, i = 1,..., b. By Corollary 2, the makespan of each routing for P is at least b. We convert R to R so that ms(r) 2b. To that end let us set the transmission of P j to start in step b j = (b j mod b) + 1 in R, where b j is the step when the transmission of P j starts in R. 11

12 We prove that R is feasible by contradiction. Suppose that a packet of P j uses a link l in R at b j + α j for some 0 α j λ j b and a packet of P k uses the same link l in R at b k + α k for some 0 α k λ k b, and in R. The last equality implies b j + α j = b k + α k with α k α j < b. However, (b j mod b) (b k mod b) = α k α j b j b k α k α j since R is feasible. This leads to a contradiction which proves that R is feasible. Finally, b j + λ j 2b for each massage P j which implies ms(r) 2b. Thus, by Corollary 2 we just proved the following theorem. Theorem 9 There exists an O(n log n)-time 2-approximation algorithm for finding routings for the set of messages P satisfying source(p i ) < dest(p i ) for each P i P. We conclude this section with a remark about optimal routing of unit size messages on a path. Though somewhat surprisingly the computational complexity of this optimal routing remains open for instances with makespan less than q, the optimal routing for instances with makespan b q, can be found in polynomial time as follows. First observe that in order to directly translate an optimal multi-slot just-in-time schedule for J (as described in Section 3.2) into an optimal routing for the corresponding P, one needs to ensure that each machine has some predefined idle intervals at the beginning of the first and at the end of the last slot in the multi-slot just-in-time schedule. These constraints are typical staircase-pattern machine availability constraints used in scheduling, see Błażewicz et al. [2000] for scheduling with machine availability constraints, and roughly speaking they result from the translation of the horizontal slots of the just-in-time schedules in the 45 diagonals of the routings. To enforce these staircase-pattern availability constraints, we add jobs J j, J j, j = 1,..., q 1, where d j = p j = j and d j = q, p j = j to mimic the constraints. A schedule for J {J j, J j : j = 1,..., q 1} uses the same number of slots on each machine as the corresponding schedule for J with availability constraints for the additional jobs fit exactly the predefined idle intervals. The latter schedule then directly translates into an optimal routing for P. There is no longer need for the availability constraints in the new instance. However, we still need to ensure that an optimal multi-slot just in time schedule for J {J j, J j : j = 1,..., q 1} does not make two jobs in {J j, J j : j = 1,..., q 1} to share a slot. To that end we transform the multi-slot just-in-time scheduling problem to a interval graph coloring with pre-coloring problem. Each job J j corresponds to the interval (s j, d j ) in this transformation. By (12), s j < d j for each J j J, which proves the correctness of the transformation. Moreover, the jobs in {J j, J j : j = 1,..., q 1} are forced not to share slots by pre-coloring their corresponding nodes in the interval graph with 2(q 1) distinct pre-colors. The problem of finding optimal interval graph coloring with pre-coloring, provided that each pre-color is pre-assigned to exactly one node can be solved in polynomial time Biró et al. [1992]. This implies the existence of a polynomial-time algorithm for finding long optimal routing of unit size messages on a path. For more on solving the multi-slot just-in-time scheduling problem via the interval graph coloring see Dereniowski and Kubiak [2010]. Sotskov et al. [2002], Ries and de Werra [2008] provide results on mixed graph coloring and scheduling problems. 12

13 4.4 Short routing of unit size messages with a bottleneck link Here we consider the routing problem MS-FSP 1, where each message in P uses a selected bottleneck link. Without loss of generality we may assume that this bottleneck link is q 1. This assumption can be re-stated as follows source(p i ) > dest(p i ) for each P i P. (13) We consider only the instances of MS-FSP 1 with short routings, that is, we assume b q throughout this subsection. In any such routing, each message P i is transmitted at the end of diagonal I s and the beginning of diagonal I s+q whenever dest(p i ) > 0, and at the end of diagonal I s only whenever dest(p i ) = 0, for some s 1. In the former case, no other message is transmitted in I s+q. In the latter case the diagonal I s+q must be empty. Otherwise I s+q (q 1) which implies b > q in both cases. This allows us to formulate the following simple observation. Lemma 5 If R solves the MS-FSP 1 problem with ms(r) b q, then each message exclusively, i.e. without sharing with other messages, uses two diagonals in R. This observation gives raise to an algorithm for the routing problem based on a transformation to the maximum matching problem in simple (unweighted) bipartite graphs. The two partitions of the vertex set of the graph will be denoted by V 1 and V 2. The vertices in V 1 correspond to the messages in P and are denoted by v(p i ), P i P, while the vertices in V 2 = {v 1,..., v b } correspond to the pairs (I j, I j+q ), j = 1,..., b, of diagonals. The set of edges E of the graph G = (V 1 V 2, E) is defined as follows {v(p i ), v j } E iff source(p i ) q j dest(p i ) b j, (14) for each v(p i ) V 1 and v j V 2. In other words, there is an edge {v(p i ), v j } in G if a message P i can be transmitted in the coordinates q j,..., q 1 of I j and in the coordinates 0,..., b j of I j+q. We have the following lemma. Lemma 6 There exists a matching M E satisfying M = P in G if and only if there exists a routing R with ms(r) b q for P. Proof: Let M E be a matching of size P. Clearly, for each v(p i ) V 1 there exists an edge {v(p i ), v j } M. By (14), the message P i can be transmitted in diagonals I j and I j+q. Since j + q > b, the pairs of diagonals where different messages in V 2 are transmitted do not overlap. Also, M = P ensures that each message appears in the routing. Finally, (14) ensures that the makespan of the routing is at most b. Now, let R be a routing with ms(r) b q for the set P. Then, by Lemma 5, a message P i P is transmitted exclusively within two diagonals I j, I j+q for some 1 j b. Observe that the diagonal I j+q may be empty if dest(p i ) = 0. It holds source(p i ) q j and j + dest(p i ) ms(r) b for the routing finishes by b and does not start before 0. Thus, by (14) there is an edge between v(p i ) and v j in G. Make this edge belong to M. Since every message is transmitted in R, then M = P and the lemma holds. Using Lemma 6 we readily obtain an optimal schedule for the short routing of unit size messages with a bottleneck link problem. Given b and P, we simply transform this problem to the problem of finding maximum cardinality matching in G. If a matching M of size P exists, then we have the corresponding routing R with ms(r) b. Otherwise no such routing exists. We can then use a binary search on b {1,..., q} to find a minimum value of makespan. Fortunately, a maximum cardinality matching in G can be found rather efficiently for G is a convex bipartite graph. Precisely, a bipartite graph G is V 2 -convex if there exists an ordering of vertices in V 2 such that for each u V 1 if {u, u i1 } E and {u, u i2 } E, i 1 < i 2, then for each i 3, i 1 i 3 i 2, {u, u i3 } E. It is easy to see that graphs G created in our algorithm are V 2 -convex, and the corresponding ordering of the vertices in V 2 is simply v 1,..., v b. Hence, the set of neighbors of v(p i ) V 1 can be represented by two integers f i, g i such that v(p i ) is adjacent to exactly the vertices v fi, v fi+1,..., v gi. By (14), f i = q source(p i ) and g i = b dest(p i ). This means that G can be created in linear time and a maximum cardinality matching for G can be obtained in O( V 1 )-time by the results of Lipski Jr. and Preparata [1981] and Gabow and Tarjan [1985], see also Steiner and Yeomans [1996]. 13

14 Theorem 10 There exists an O(n)-time algorithm which, for the given integer b q and set of unit size messages P satisfying (13), finds a routing R with ms(r) b or decides that no such routing exists. We end this section with an example of the execution of this algorithm for q = b = 5. Assume that P = {P 1,..., P 4 }, where source(p 1 ) = 4, dest(p 1 ) = 2, source(p 2 ) = 4, dest(p 2 ) = 3, source(p 3 ) = 2, dest(p 3 ) = 1, source(p 4 ) = 3, dest(p 4 ) = 2. Figure 4(a) shows the pairs of diagonals corresponding to the vertices in V 2. The bipartite graph G is given in Figure 4(b). Consider the following matching M (a) v 5 v 1 v 2 v 3 v 4 1 v 4 v 5 v 1 v 2 v 3 2 v 3 v 4 v 5 v 1 v 2 3 v 2 v 3 v 4 v 5 v 1 4 v 1 v 2 v 3 v 4 v 5 (b) v 1 v(p (c) 1 ) P 2 P 1 P 4 P v 3 2 v(p 1 P 2 P 1 P 2 ) 4 v 3 2 P 3 P 2 v 4 v(p 3 P 4 P 3 ) 3 4 P 2 P 1 P 4 P 3 v 5 v(p 4 ) Figure 4: (a) the diagonals corresponding to the vertices v 1,..., v 5 ; (b) the bipartite graph G; (c) the routing corresponding to the matching M M = {{v 1, v(p 2 )}, {v 2, v(p 1 )}, {v 4, v(p 3 )}, {v 3, v(p 4 )}}. The final routing obtained from M is depicted in Figure 4(c). 4.5 Makespan approximation algorithm for unit size messages We begin by observing that the makespan and the number of diagonals are within a distance of q 1 for any R. The two following lemmas hold for any routing R and any P, i.e. even with messages of variable sizes. Lemma 7 If R is a routing for P, then diag(r) ms(r) + q 1. Proof: Consider the diagonals I 1,..., I ms(r)+q 1. Again, without loss of generality we assume that I 1 is the first nonempty diagonal in R. If s {1,..., ms(r)} and l {0,..., q 1} then t s,l must belong to exactly one of these diagonals. Thus, the lemma holds. Lemma 8 If R is a routing for P, then ms(r) diag(r) + q 1. Proof: By the definition there are diag(r) consecutive indices r such that I(R) defines R. The lemma then follows from the fact that each diagonal I r intersects exactly q consecutive steps in a routing. We are ready to give an O(n log n)-time approximation algorithm for the MS-FSP 1 routing problem. In the following R D and R M denote optimal routings for P for the diagonal DIAG-FSP 1 and the makespan MS-FSP 1 minimization problems, respectively. By Theorem 6 we can find a routing R for P with diag(r) diag(r D ) + 2q 1 in time O(n log n). Clearly, diag(r D ) diag(r M ). By Lemma 8, ms(r) diag(r) + q 1. Thus, ms(r) diag(r M ) + 3q 2. (15) By Lemma 7, diag(r M ) ms(r M ) + q 1. This, by (15), gives ms(r) ms(r D ) + 4q 3 which implies the theorem. Theorem 11 There exists an O(n log n)-time approximation algorithm for finding a routing R of length ms(r) ms(r M ) + 4q 3, where R M is an optimal routing for MS-FSP 1. 14

arxiv: v2 [cs.dm] 2 Mar 2017

arxiv: v2 [cs.dm] 2 Mar 2017 Shared multi-processor scheduling arxiv:607.060v [cs.dm] Mar 07 Dariusz Dereniowski Faculty of Electronics, Telecommunications and Informatics, Gdańsk University of Technology, Gdańsk, Poland Abstract

More information

Online Interval Coloring and Variants

Online Interval Coloring and Variants Online Interval Coloring and Variants Leah Epstein 1, and Meital Levy 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. Email: lea@math.haifa.ac.il School of Computer Science, Tel-Aviv

More information

Improved Bounds for Flow Shop Scheduling

Improved Bounds for Flow Shop Scheduling Improved Bounds for Flow Shop Scheduling Monaldo Mastrolilli and Ola Svensson IDSIA - Switzerland. {monaldo,ola}@idsia.ch Abstract. We resolve an open question raised by Feige & Scheideler by showing that

More information

Scheduling of unit-length jobs with bipartite incompatibility graphs on four uniform machines arxiv: v1 [cs.

Scheduling of unit-length jobs with bipartite incompatibility graphs on four uniform machines arxiv: v1 [cs. Scheduling of unit-length jobs with bipartite incompatibility graphs on four uniform machines arxiv:1602.01867v1 [cs.ds] 4 Feb 2016 Hanna Furmańczyk, Marek Kubale Abstract In the paper we consider the

More information

A polynomial-time approximation scheme for the two-machine flow shop scheduling problem with an availability constraint

A polynomial-time approximation scheme for the two-machine flow shop scheduling problem with an availability constraint A polynomial-time approximation scheme for the two-machine flow shop scheduling problem with an availability constraint Joachim Breit Department of Information and Technology Management, Saarland University,

More information

On the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation

On the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation On the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation Mikael Fallgren Royal Institute of Technology December, 2009 Abstract

More information

Equitable and semi-equitable coloring of cubic graphs and its application in batch scheduling

Equitable and semi-equitable coloring of cubic graphs and its application in batch scheduling Equitable and semi-equitable coloring of cubic graphs and its application in batch scheduling Hanna Furmańczyk, Marek Kubale Abstract In the paper we consider the problems of equitable and semi-equitable

More information

4/12/2011. Chapter 8. NP and Computational Intractability. Directed Hamiltonian Cycle. Traveling Salesman Problem. Directed Hamiltonian Cycle

4/12/2011. Chapter 8. NP and Computational Intractability. Directed Hamiltonian Cycle. Traveling Salesman Problem. Directed Hamiltonian Cycle Directed Hamiltonian Cycle Chapter 8 NP and Computational Intractability Claim. G has a Hamiltonian cycle iff G' does. Pf. Suppose G has a directed Hamiltonian cycle Γ. Then G' has an undirected Hamiltonian

More information

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Jean-Claude Bermond a,b,, Bi Li b,a,c, Nicolas Nisse b,a, Hervé Rivano d, Min-Li Yu e a Univ. Nice Sophia Antipolis, CNRS,

More information

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Jean-Claude Bermond a,, Bi Li a,b, Nicolas Nisse a, Hervé Rivano c, Min-Li Yu d a Coati Project, INRIA I3S(CNRS/UNSA), Sophia

More information

ACO Comprehensive Exam March 17 and 18, Computability, Complexity and Algorithms

ACO Comprehensive Exam March 17 and 18, Computability, Complexity and Algorithms 1. Computability, Complexity and Algorithms (a) Let G(V, E) be an undirected unweighted graph. Let C V be a vertex cover of G. Argue that V \ C is an independent set of G. (b) Minimum cardinality vertex

More information

An improved approximation algorithm for two-machine flow shop scheduling with an availability constraint

An improved approximation algorithm for two-machine flow shop scheduling with an availability constraint An improved approximation algorithm for two-machine flow shop scheduling with an availability constraint J. Breit Department of Information and Technology Management, Saarland University, Saarbrcken, Germany

More information

CS 301: Complexity of Algorithms (Term I 2008) Alex Tiskin Harald Räcke. Hamiltonian Cycle. 8.5 Sequencing Problems. Directed Hamiltonian Cycle

CS 301: Complexity of Algorithms (Term I 2008) Alex Tiskin Harald Räcke. Hamiltonian Cycle. 8.5 Sequencing Problems. Directed Hamiltonian Cycle 8.5 Sequencing Problems Basic genres. Packing problems: SET-PACKING, INDEPENDENT SET. Covering problems: SET-COVER, VERTEX-COVER. Constraint satisfaction problems: SAT, 3-SAT. Sequencing problems: HAMILTONIAN-CYCLE,

More information

No-Idle, No-Wait: When Shop Scheduling Meets Dominoes, Eulerian and Hamiltonian Paths

No-Idle, No-Wait: When Shop Scheduling Meets Dominoes, Eulerian and Hamiltonian Paths No-Idle, No-Wait: When Shop Scheduling Meets Dominoes, Eulerian and Hamiltonian Paths J.C. Billaut 1, F.Della Croce 2, Fabio Salassa 2, V. T kindt 1 1. Université Francois-Rabelais, CNRS, Tours, France

More information

Graph Theory and Optimization Computational Complexity (in brief)

Graph Theory and Optimization Computational Complexity (in brief) Graph Theory and Optimization Computational Complexity (in brief) Nicolas Nisse Inria, France Univ. Nice Sophia Antipolis, CNRS, I3S, UMR 7271, Sophia Antipolis, France September 2015 N. Nisse Graph Theory

More information

On improving matchings in trees, via bounded-length augmentations 1

On improving matchings in trees, via bounded-length augmentations 1 On improving matchings in trees, via bounded-length augmentations 1 Julien Bensmail a, Valentin Garnero a, Nicolas Nisse a a Université Côte d Azur, CNRS, Inria, I3S, France Abstract Due to a classical

More information

Online Optimization of Busy Time on Parallel Machines

Online Optimization of Busy Time on Parallel Machines Online Optimization of Busy Time on Parallel Machines Mordechai Shalom 1 Ariella Voloshin 2 Prudence W.H. Wong 3 Fencol C.C. Yung 3 Shmuel Zaks 2 1 TelHai College, Upper Galilee, 12210, Israel cmshalom@telhai.ac.il

More information

On Machine Dependency in Shop Scheduling

On Machine Dependency in Shop Scheduling On Machine Dependency in Shop Scheduling Evgeny Shchepin Nodari Vakhania Abstract One of the main restrictions in scheduling problems are the machine (resource) restrictions: each machine can perform at

More information

Bichain graphs: geometric model and universal graphs

Bichain graphs: geometric model and universal graphs Bichain graphs: geometric model and universal graphs Robert Brignall a,1, Vadim V. Lozin b,, Juraj Stacho b, a Department of Mathematics and Statistics, The Open University, Milton Keynes MK7 6AA, United

More information

University of Twente. Faculty of Mathematical Sciences. Scheduling split-jobs on parallel machines. University for Technical and Social Sciences

University of Twente. Faculty of Mathematical Sciences. Scheduling split-jobs on parallel machines. University for Technical and Social Sciences Faculty of Mathematical Sciences University of Twente University for Technical and Social Sciences P.O. Box 217 7500 AE Enschede The Netherlands Phone: +31-53-4893400 Fax: +31-53-4893114 Email: memo@math.utwente.nl

More information

Graph Classes and Ramsey Numbers

Graph Classes and Ramsey Numbers Graph Classes and Ramsey Numbers Rémy Belmonte, Pinar Heggernes, Pim van t Hof, Arash Rafiey, and Reza Saei Department of Informatics, University of Bergen, Norway Abstract. For a graph class G and any

More information

Chapter 8. NP and Computational Intractability. Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved.

Chapter 8. NP and Computational Intractability. Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved. Chapter 8 NP and Computational Intractability Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved. 1 8.5 Sequencing Problems Basic genres.! Packing problems: SET-PACKING,

More information

1 Ordinary Load Balancing

1 Ordinary Load Balancing Comp 260: Advanced Algorithms Prof. Lenore Cowen Tufts University, Spring 208 Scribe: Emily Davis Lecture 8: Scheduling Ordinary Load Balancing Suppose we have a set of jobs each with their own finite

More information

c 2016 SIAM. Published by SIAM under the terms

c 2016 SIAM. Published by SIAM under the terms SIAM J. DISCRETE MATH. Vol. 30, No. 3, pp. 1685 1725 c 2016 SIAM. Published by SIAM under the terms of the Creative Commons 4.0 license NEW GEOMETRIC REPRESENTATIONS AND DOMINATION PROBLEMS ON TOLERANCE

More information

Complexity analysis of job-shop scheduling with deteriorating jobs

Complexity analysis of job-shop scheduling with deteriorating jobs Discrete Applied Mathematics 117 (2002) 195 209 Complexity analysis of job-shop scheduling with deteriorating jobs Gur Mosheiov School of Business Administration and Department of Statistics, The Hebrew

More information

8.5 Sequencing Problems

8.5 Sequencing Problems 8.5 Sequencing Problems Basic genres. Packing problems: SET-PACKING, INDEPENDENT SET. Covering problems: SET-COVER, VERTEX-COVER. Constraint satisfaction problems: SAT, 3-SAT. Sequencing problems: HAMILTONIAN-CYCLE,

More information

Algorithm Design. Scheduling Algorithms. Part 2. Parallel machines. Open-shop Scheduling. Job-shop Scheduling.

Algorithm Design. Scheduling Algorithms. Part 2. Parallel machines. Open-shop Scheduling. Job-shop Scheduling. Algorithm Design Scheduling Algorithms Part 2 Parallel machines. Open-shop Scheduling. Job-shop Scheduling. 1 Parallel Machines n jobs need to be scheduled on m machines, M 1,M 2,,M m. Each machine can

More information

Claw-Free Graphs With Strongly Perfect Complements. Fractional and Integral Version.

Claw-Free Graphs With Strongly Perfect Complements. Fractional and Integral Version. Claw-Free Graphs With Strongly Perfect Complements. Fractional and Integral Version. Part II. Nontrivial strip-structures Maria Chudnovsky Department of Industrial Engineering and Operations Research Columbia

More information

The Multiple Traveling Salesman Problem with Time Windows: Bounds for the Minimum Number of Vehicles

The Multiple Traveling Salesman Problem with Time Windows: Bounds for the Minimum Number of Vehicles The Multiple Traveling Salesman Problem with Time Windows: Bounds for the Minimum Number of Vehicles Snežana Mitrović-Minić Ramesh Krishnamurti School of Computing Science, Simon Fraser University, Burnaby,

More information

Week 4-5: Generating Permutations and Combinations

Week 4-5: Generating Permutations and Combinations Week 4-5: Generating Permutations and Combinations February 27, 2017 1 Generating Permutations We have learned that there are n! permutations of {1, 2,...,n}. It is important in many instances to generate

More information

Polynomial-time Reductions

Polynomial-time Reductions Polynomial-time Reductions Disclaimer: Many denitions in these slides should be taken as the intuitive meaning, as the precise meaning of some of the terms are hard to pin down without introducing the

More information

Properties of the Integers

Properties of the Integers Properties of the Integers The set of all integers is the set and the subset of Z given by Z = {, 5, 4, 3, 2, 1, 0, 1, 2, 3, 4, 5, }, N = {0, 1, 2, 3, 4, }, is the set of nonnegative integers (also called

More information

a + b = b + a and a b = b a. (a + b) + c = a + (b + c) and (a b) c = a (b c). a (b + c) = a b + a c and (a + b) c = a c + b c.

a + b = b + a and a b = b a. (a + b) + c = a + (b + c) and (a b) c = a (b c). a (b + c) = a b + a c and (a + b) c = a c + b c. Properties of the Integers The set of all integers is the set and the subset of Z given by Z = {, 5, 4, 3, 2, 1, 0, 1, 2, 3, 4, 5, }, N = {0, 1, 2, 3, 4, }, is the set of nonnegative integers (also called

More information

CS168: The Modern Algorithmic Toolbox Lectures #11 and #12: Spectral Graph Theory

CS168: The Modern Algorithmic Toolbox Lectures #11 and #12: Spectral Graph Theory CS168: The Modern Algorithmic Toolbox Lectures #11 and #12: Spectral Graph Theory Tim Roughgarden & Gregory Valiant May 2, 2016 Spectral graph theory is the powerful and beautiful theory that arises from

More information

Computational complexity theory

Computational complexity theory Computational complexity theory Introduction to computational complexity theory Complexity (computability) theory deals with two aspects: Algorithm s complexity. Problem s complexity. References S. Cook,

More information

Partition is reducible to P2 C max. c. P2 Pj = 1, prec Cmax is solvable in polynomial time. P Pj = 1, prec Cmax is NP-hard

Partition is reducible to P2 C max. c. P2 Pj = 1, prec Cmax is solvable in polynomial time. P Pj = 1, prec Cmax is NP-hard I. Minimizing Cmax (Nonpreemptive) a. P2 C max is NP-hard. Partition is reducible to P2 C max b. P Pj = 1, intree Cmax P Pj = 1, outtree Cmax are both solvable in polynomial time. c. P2 Pj = 1, prec Cmax

More information

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, Notes 22 for CS 170

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, Notes 22 for CS 170 UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, 2003 Notes 22 for CS 170 1 NP-completeness of Circuit-SAT We will prove that the circuit satisfiability

More information

Intrinsic products and factorizations of matrices

Intrinsic products and factorizations of matrices Available online at www.sciencedirect.com Linear Algebra and its Applications 428 (2008) 5 3 www.elsevier.com/locate/laa Intrinsic products and factorizations of matrices Miroslav Fiedler Academy of Sciences

More information

Show that the following problems are NP-complete

Show that the following problems are NP-complete Show that the following problems are NP-complete April 7, 2018 Below is a list of 30 exercises in which you are asked to prove that some problem is NP-complete. The goal is to better understand the theory

More information

On shredders and vertex connectivity augmentation

On shredders and vertex connectivity augmentation On shredders and vertex connectivity augmentation Gilad Liberman The Open University of Israel giladliberman@gmail.com Zeev Nutov The Open University of Israel nutov@openu.ac.il Abstract We consider the

More information

Algebraic Methods in Combinatorics

Algebraic Methods in Combinatorics Algebraic Methods in Combinatorics Po-Shen Loh 27 June 2008 1 Warm-up 1. (A result of Bourbaki on finite geometries, from Răzvan) Let X be a finite set, and let F be a family of distinct proper subsets

More information

Scheduling on Unrelated Parallel Machines. Approximation Algorithms, V. V. Vazirani Book Chapter 17

Scheduling on Unrelated Parallel Machines. Approximation Algorithms, V. V. Vazirani Book Chapter 17 Scheduling on Unrelated Parallel Machines Approximation Algorithms, V. V. Vazirani Book Chapter 17 Nicolas Karakatsanis, 2008 Description of the problem Problem 17.1 (Scheduling on unrelated parallel machines)

More information

A packing integer program arising in two-layer network design

A packing integer program arising in two-layer network design A packing integer program arising in two-layer network design Christian Raack Arie M.C.A Koster Zuse Institute Berlin Takustr. 7, D-14195 Berlin Centre for Discrete Mathematics and its Applications (DIMAP)

More information

Online Packet Routing on Linear Arrays and Rings

Online Packet Routing on Linear Arrays and Rings Proc. 28th ICALP, LNCS 2076, pp. 773-784, 2001 Online Packet Routing on Linear Arrays and Rings Jessen T. Havill Department of Mathematics and Computer Science Denison University Granville, OH 43023 USA

More information

A Robust APTAS for the Classical Bin Packing Problem

A Robust APTAS for the Classical Bin Packing Problem A Robust APTAS for the Classical Bin Packing Problem Leah Epstein 1 and Asaf Levin 2 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. Email: lea@math.haifa.ac.il 2 Department of Statistics,

More information

10.3 Matroids and approximation

10.3 Matroids and approximation 10.3 Matroids and approximation 137 10.3 Matroids and approximation Given a family F of subsets of some finite set X, called the ground-set, and a weight function assigning each element x X a non-negative

More information

CMSC 451: Lecture 7 Greedy Algorithms for Scheduling Tuesday, Sep 19, 2017

CMSC 451: Lecture 7 Greedy Algorithms for Scheduling Tuesday, Sep 19, 2017 CMSC CMSC : Lecture Greedy Algorithms for Scheduling Tuesday, Sep 9, 0 Reading: Sects.. and. of KT. (Not covered in DPV.) Interval Scheduling: We continue our discussion of greedy algorithms with a number

More information

Definition: A binary relation R from a set A to a set B is a subset R A B. Example:

Definition: A binary relation R from a set A to a set B is a subset R A B. Example: Chapter 9 1 Binary Relations Definition: A binary relation R from a set A to a set B is a subset R A B. Example: Let A = {0,1,2} and B = {a,b} {(0, a), (0, b), (1,a), (2, b)} is a relation from A to B.

More information

Scheduling of unit-length jobs with cubic incompatibility graphs on three uniform machines

Scheduling of unit-length jobs with cubic incompatibility graphs on three uniform machines arxiv:1502.04240v2 [cs.dm] 15 Jun 2015 Scheduling of unit-length jobs with cubic incompatibility graphs on three uniform machines Hanna Furmańczyk, Marek Kubale Abstract In the paper we consider the problem

More information

Section Summary. Relations and Functions Properties of Relations. Combining Relations

Section Summary. Relations and Functions Properties of Relations. Combining Relations Chapter 9 Chapter Summary Relations and Their Properties n-ary Relations and Their Applications (not currently included in overheads) Representing Relations Closures of Relations (not currently included

More information

8.5 Sequencing Problems. Chapter 8. NP and Computational Intractability. Hamiltonian Cycle. Hamiltonian Cycle

8.5 Sequencing Problems. Chapter 8. NP and Computational Intractability. Hamiltonian Cycle. Hamiltonian Cycle Chapter 8 NP and Computational Intractability 8.5 Sequencing Problems Basic genres. Packing problems: SET-PACKING, INDEPENDENT SET. Covering problems: SET-COVER, VERTEX-COVER. Constraint satisfaction problems:

More information

Combinatorial optimization problems

Combinatorial optimization problems Combinatorial optimization problems Heuristic Algorithms Giovanni Righini University of Milan Department of Computer Science (Crema) Optimization In general an optimization problem can be formulated as:

More information

ON COST MATRICES WITH TWO AND THREE DISTINCT VALUES OF HAMILTONIAN PATHS AND CYCLES

ON COST MATRICES WITH TWO AND THREE DISTINCT VALUES OF HAMILTONIAN PATHS AND CYCLES ON COST MATRICES WITH TWO AND THREE DISTINCT VALUES OF HAMILTONIAN PATHS AND CYCLES SANTOSH N. KABADI AND ABRAHAM P. PUNNEN Abstract. Polynomially testable characterization of cost matrices associated

More information

Technion - Computer Science Department - Technical Report CS On Centralized Smooth Scheduling

Technion - Computer Science Department - Technical Report CS On Centralized Smooth Scheduling On Centralized Smooth Scheduling Ami Litman January 25, 2005 Abstract Shiri Moran-Schein This paper studies evenly distributed sets of natural numbers and their applications to scheduling in a centralized

More information

Chapter 9: Relations Relations

Chapter 9: Relations Relations Chapter 9: Relations 9.1 - Relations Definition 1 (Relation). Let A and B be sets. A binary relation from A to B is a subset R A B, i.e., R is a set of ordered pairs where the first element from each pair

More information

Probabilistic Proofs of Existence of Rare Events. Noga Alon

Probabilistic Proofs of Existence of Rare Events. Noga Alon Probabilistic Proofs of Existence of Rare Events Noga Alon Department of Mathematics Sackler Faculty of Exact Sciences Tel Aviv University Ramat-Aviv, Tel Aviv 69978 ISRAEL 1. The Local Lemma In a typical

More information

Dispersing Points on Intervals

Dispersing Points on Intervals Dispersing Points on Intervals Shimin Li 1 and Haitao Wang 1 Department of Computer Science, Utah State University, Logan, UT 843, USA shiminli@aggiemail.usu.edu Department of Computer Science, Utah State

More information

Minimizing Mean Flowtime and Makespan on Master-Slave Systems

Minimizing Mean Flowtime and Makespan on Master-Slave Systems Minimizing Mean Flowtime and Makespan on Master-Slave Systems Joseph Y-T. Leung,1 and Hairong Zhao 2 Department of Computer Science New Jersey Institute of Technology Newark, NJ 07102, USA Abstract The

More information

APTAS for Bin Packing

APTAS for Bin Packing APTAS for Bin Packing Bin Packing has an asymptotic PTAS (APTAS) [de la Vega and Leuker, 1980] For every fixed ε > 0 algorithm outputs a solution of size (1+ε)OPT + 1 in time polynomial in n APTAS for

More information

Hanna Furmańczyk EQUITABLE COLORING OF GRAPH PRODUCTS

Hanna Furmańczyk EQUITABLE COLORING OF GRAPH PRODUCTS Opuscula Mathematica Vol. 6 No. 006 Hanna Furmańczyk EQUITABLE COLORING OF GRAPH PRODUCTS Abstract. A graph is equitably k-colorable if its vertices can be partitioned into k independent sets in such a

More information

An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees

An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees Francesc Rosselló 1, Gabriel Valiente 2 1 Department of Mathematics and Computer Science, Research Institute

More information

Computational complexity theory

Computational complexity theory Computational complexity theory Introduction to computational complexity theory Complexity (computability) theory deals with two aspects: Algorithm s complexity. Problem s complexity. References S. Cook,

More information

Equitable coloring of corona products of cubic graphs is harder than ordinary coloring

Equitable coloring of corona products of cubic graphs is harder than ordinary coloring Also available at http://amc-journal.eu ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 10 (2016) 333 347 Equitable coloring of corona products of cubic graphs

More information

Chapter 8. NP and Computational Intractability

Chapter 8. NP and Computational Intractability Chapter 8 NP and Computational Intractability Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved. Acknowledgement: This lecture slide is revised and authorized from Prof.

More information

The Algorithmic Aspects of the Regularity Lemma

The Algorithmic Aspects of the Regularity Lemma The Algorithmic Aspects of the Regularity Lemma N. Alon R. A. Duke H. Lefmann V. Rödl R. Yuster Abstract The Regularity Lemma of Szemerédi is a result that asserts that every graph can be partitioned in

More information

The minimum G c cut problem

The minimum G c cut problem The minimum G c cut problem Abstract In this paper we define and study the G c -cut problem. Given a complete undirected graph G = (V ; E) with V = n, edge weighted by w(v i, v j ) 0 and an undirected

More information

EMBEDDED PATHS AND CYCLES IN FAULTY HYPERCUBES

EMBEDDED PATHS AND CYCLES IN FAULTY HYPERCUBES EMBEDDED PATHS AND CYCLES IN FAULTY HYPERCUBES NELSON CASTAÑEDA AND IVAN S. GOTCHEV Abstract. An important task in the theory of hypercubes is to establish the maximum integer f n such that for every set

More information

Structural Grobner Basis. Bernd Sturmfels and Markus Wiegelmann TR May Department of Mathematics, UC Berkeley.

Structural Grobner Basis. Bernd Sturmfels and Markus Wiegelmann TR May Department of Mathematics, UC Berkeley. I 1947 Center St. Suite 600 Berkeley, California 94704-1198 (510) 643-9153 FAX (510) 643-7684 INTERNATIONAL COMPUTER SCIENCE INSTITUTE Structural Grobner Basis Detection Bernd Sturmfels and Markus Wiegelmann

More information

Online Coloring of Intervals with Bandwidth

Online Coloring of Intervals with Bandwidth Online Coloring of Intervals with Bandwidth Udo Adamy 1 and Thomas Erlebach 2, 1 Institute for Theoretical Computer Science, ETH Zürich, 8092 Zürich, Switzerland. adamy@inf.ethz.ch 2 Computer Engineering

More information

Scheduling Parallel Jobs with Linear Speedup

Scheduling Parallel Jobs with Linear Speedup Scheduling Parallel Jobs with Linear Speedup Alexander Grigoriev and Marc Uetz Maastricht University, Quantitative Economics, P.O.Box 616, 6200 MD Maastricht, The Netherlands. Email: {a.grigoriev, m.uetz}@ke.unimaas.nl

More information

Chapter 3: Discrete Optimization Integer Programming

Chapter 3: Discrete Optimization Integer Programming Chapter 3: Discrete Optimization Integer Programming Edoardo Amaldi DEIB Politecnico di Milano edoardo.amaldi@polimi.it Website: http://home.deib.polimi.it/amaldi/opt-16-17.shtml Academic year 2016-17

More information

Parameterized Domination in Circle Graphs

Parameterized Domination in Circle Graphs Parameterized Domination in Circle Graphs Nicolas Bousquet 1, Daniel Gonçalves 1, George B. Mertzios 2, Christophe Paul 1, Ignasi Sau 1, and Stéphan Thomassé 3 1 AlGCo project-team, CNRS, LIRMM, Montpellier,

More information

Multi-coloring and Mycielski s construction

Multi-coloring and Mycielski s construction Multi-coloring and Mycielski s construction Tim Meagher Fall 2010 Abstract We consider a number of related results taken from two papers one by W. Lin [1], and the other D. C. Fisher[2]. These articles

More information

Algorithms. Outline! Approximation Algorithms. The class APX. The intelligence behind the hardware. ! Based on

Algorithms. Outline! Approximation Algorithms. The class APX. The intelligence behind the hardware. ! Based on 6117CIT - Adv Topics in Computing Sci at Nathan 1 Algorithms The intelligence behind the hardware Outline! Approximation Algorithms The class APX! Some complexity classes, like PTAS and FPTAS! Illustration

More information

P versus NP. Math 40210, Spring September 16, Math (Spring 2012) P versus NP September 16, / 9

P versus NP. Math 40210, Spring September 16, Math (Spring 2012) P versus NP September 16, / 9 P versus NP Math 40210, Spring 2012 September 16, 2012 Math 40210 (Spring 2012) P versus NP September 16, 2012 1 / 9 Properties of graphs A property of a graph is anything that can be described without

More information

Separating Simple Domino Parity Inequalities

Separating Simple Domino Parity Inequalities Separating Simple Domino Parity Inequalities Lisa Fleischer Adam Letchford Andrea Lodi DRAFT: IPCO submission Abstract In IPCO 2002, Letchford and Lodi describe an algorithm for separating simple comb

More information

Planar Graphs (1) Planar Graphs (3) Planar Graphs (2) Planar Graphs (4)

Planar Graphs (1) Planar Graphs (3) Planar Graphs (2) Planar Graphs (4) S-72.2420/T-79.5203 Planarity; Edges and Cycles 1 Planar Graphs (1) Topological graph theory, broadly conceived, is the study of graph layouts. Contemporary applications include circuit layouts on silicon

More information

On balanced colorings of sparse hypergraphs

On balanced colorings of sparse hypergraphs On balanced colorings of sparse hypergraphs Andrzej Dude Department of Mathematics Western Michigan University Kalamazoo, MI andrzej.dude@wmich.edu January 21, 2014 Abstract We investigate 2-balanced colorings

More information

This means that we can assume each list ) is

This means that we can assume each list ) is This means that we can assume each list ) is of the form ),, ( )with < and Since the sizes of the items are integers, there are at most +1pairs in each list Furthermore, if we let = be the maximum possible

More information

4-coloring P 6 -free graphs with no induced 5-cycles

4-coloring P 6 -free graphs with no induced 5-cycles 4-coloring P 6 -free graphs with no induced 5-cycles Maria Chudnovsky Department of Mathematics, Princeton University 68 Washington Rd, Princeton NJ 08544, USA mchudnov@math.princeton.edu Peter Maceli,

More information

On Two Class-Constrained Versions of the Multiple Knapsack Problem

On Two Class-Constrained Versions of the Multiple Knapsack Problem On Two Class-Constrained Versions of the Multiple Knapsack Problem Hadas Shachnai Tami Tamir Department of Computer Science The Technion, Haifa 32000, Israel Abstract We study two variants of the classic

More information

Low-Complexity Algorithms for Sequencing Jobs with a Fixed Number of Job-Classes

Low-Complexity Algorithms for Sequencing Jobs with a Fixed Number of Job-Classes Low-Complexity Algorithms for Sequencing Jobs with a Fixed Number of Job-Classes Jack A.A. van der Veen Nijenrode University - The Netherlands School of Business Straatweg 25, 3621 BG Breukelen The Netherlands

More information

2. A vertex in G is central if its greatest distance from any other vertex is as small as possible. This distance is the radius of G.

2. A vertex in G is central if its greatest distance from any other vertex is as small as possible. This distance is the radius of G. CME 305: Discrete Mathematics and Algorithms Instructor: Reza Zadeh (rezab@stanford.edu) HW#1 Due at the beginning of class Thursday 01/21/16 1. Prove that at least one of G and G is connected. Here, G

More information

Equitable Colorings of Corona Multiproducts of Graphs

Equitable Colorings of Corona Multiproducts of Graphs Equitable Colorings of Corona Multiproducts of Graphs arxiv:1210.6568v1 [cs.dm] 24 Oct 2012 Hanna Furmańczyk, Marek Kubale Vahan V. Mkrtchyan Abstract A graph is equitably k-colorable if its vertices can

More information

0 Sets and Induction. Sets

0 Sets and Induction. Sets 0 Sets and Induction Sets A set is an unordered collection of objects, called elements or members of the set. A set is said to contain its elements. We write a A to denote that a is an element of the set

More information

A bad example for the iterative rounding method for mincost k-connected spanning subgraphs

A bad example for the iterative rounding method for mincost k-connected spanning subgraphs A bad example for the iterative rounding method for mincost k-connected spanning subgraphs Ashkan Aazami a, Joseph Cheriyan b,, Bundit Laekhanukit c a Dept. of Comb. & Opt., U. Waterloo, Waterloo ON Canada

More information

Algorithms Design & Analysis. Approximation Algorithm

Algorithms Design & Analysis. Approximation Algorithm Algorithms Design & Analysis Approximation Algorithm Recap External memory model Merge sort Distribution sort 2 Today s Topics Hard problem Approximation algorithms Metric traveling salesman problem A

More information

Generating Permutations and Combinations

Generating Permutations and Combinations Generating Permutations and Combinations March 0, 005 Generating Permutations We have learned that there are n! permutations of {,,, n} It is important in many instances to generate a list of such permutations

More information

Algebraic Methods in Combinatorics

Algebraic Methods in Combinatorics Algebraic Methods in Combinatorics Po-Shen Loh June 2009 1 Linear independence These problems both appeared in a course of Benny Sudakov at Princeton, but the links to Olympiad problems are due to Yufei

More information

Discrete Applied Mathematics

Discrete Applied Mathematics Discrete Applied Mathematics 194 (015) 37 59 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: wwwelseviercom/locate/dam Loopy, Hankel, and combinatorially skew-hankel

More information

Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems

Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Rani M. R, Mohith Jagalmohanan, R. Subashini Binary matrices having simultaneous consecutive

More information

On the Existence of Ideal Solutions in Multi-objective 0-1 Integer Programs

On the Existence of Ideal Solutions in Multi-objective 0-1 Integer Programs On the Existence of Ideal Solutions in Multi-objective -1 Integer Programs Natashia Boland a, Hadi Charkhgard b, and Martin Savelsbergh a a School of Industrial and Systems Engineering, Georgia Institute

More information

Longest paths in circular arc graphs. Paul N. Balister Department of Mathematical Sciences, University of Memphis

Longest paths in circular arc graphs. Paul N. Balister Department of Mathematical Sciences, University of Memphis Longest paths in circular arc graphs (Final version: February, 2003) Paul N Balister Department of Mathematical Sciences, University of Memphis (balistep@mscimemphisedu) Ervin Győri Rényi Institute of

More information

Complexity analysis of the discrete sequential search problem with group activities

Complexity analysis of the discrete sequential search problem with group activities Complexity analysis of the discrete sequential search problem with group activities Coolen K, Talla Nobibon F, Leus R. KBI_1313 Complexity analysis of the discrete sequential search problem with group

More information

Machine Minimization for Scheduling Jobs with Interval Constraints

Machine Minimization for Scheduling Jobs with Interval Constraints Machine Minimization for Scheduling Jobs with Interval Constraints Julia Chuzhoy Sudipto Guha Sanjeev Khanna Joseph (Seffi) Naor Abstract The problem of scheduling jobs with interval constraints is a well-studied

More information

The Turán number of sparse spanning graphs

The Turán number of sparse spanning graphs The Turán number of sparse spanning graphs Noga Alon Raphael Yuster Abstract For a graph H, the extremal number ex(n, H) is the maximum number of edges in a graph of order n not containing a subgraph isomorphic

More information

Queue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling

Queue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling 1 Queue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling Saswati Sarkar and Koushik Kar Abstract In this paper, we consider queue-length stability in wireless

More information

Topics in Approximation Algorithms Solution for Homework 3

Topics in Approximation Algorithms Solution for Homework 3 Topics in Approximation Algorithms Solution for Homework 3 Problem 1 We show that any solution {U t } can be modified to satisfy U τ L τ as follows. Suppose U τ L τ, so there is a vertex v U τ but v L

More information

arxiv: v1 [cs.ds] 30 Jun 2016

arxiv: v1 [cs.ds] 30 Jun 2016 Online Packet Scheduling with Bounded Delay and Lookahead Martin Böhm 1, Marek Chrobak 2, Lukasz Jeż 3, Fei Li 4, Jiří Sgall 1, and Pavel Veselý 1 1 Computer Science Institute of Charles University, Prague,

More information

A robust APTAS for the classical bin packing problem

A robust APTAS for the classical bin packing problem A robust APTAS for the classical bin packing problem Leah Epstein Asaf Levin Abstract Bin packing is a well studied problem which has many applications. In this paper we design a robust APTAS for the problem.

More information