On Shortest Single/Multiple Path Computation Problems in Fiber-Wireless (FiWi) Access Networks

Size: px
Start display at page:

Download "On Shortest Single/Multiple Path Computation Problems in Fiber-Wireless (FiWi) Access Networks"

Transcription

1 2014 IEEE 15th International Conference on High Performance Sitching and Routing (HPSR) On Shortest Single/Multiple Path Computation Problems in Fiber-Wireless (FiWi) Access Netorks Chenyang Zhou, Anisha Mazumder, Arunabha Sen, Martin Reisslein and Andrea Richa School of Computing, Informatics and Decision Systems Engineering School of Electrical, Computer, and Energy Engineering Arizona State Uniersity {czhou24, anisha.mazumder, asen, reisslein, Abstract Fiber-Wireless (FiWi) netorks hae receied considerable attention in the research community in the last fe years as they offer an attractie ay of integrating optical and ireless technology. As in eery other type of netorks, routing plays a major role in FiWi netorks. Accordingly, a number of routing algorithms for FiWi netorks hae been proposed. Most of the routing algorithms attempt to find the shortest path from the source to the destination. A recent paper proposed a noel path length metric, here the contribution of a link toards path length computation depends not only on that link but also eery other link that constitutes the path from the source to the destination. In this paper e address the problem of computing the shortest path using this path length metric. Moreoer, e consider a ariation of the metric and also proide an algorithm to compute the shortest path using this ariation. As multipath routing proides a number of adantages oer single path routing, e consider disjoint path routing ith the ne path length metric. We sho that hile the single path computation problem can be soled in polynomial time in both the cases, the disjoint path computation problem is NP-complete. We proide optimal solution for the NP-complete problem using integer linear programming and also proide to approximation algorithms ith a performance bound of 4 and 2 respectiely. The experimental ealuation of the approximation algorithms produced a near optimal solution in a fraction of a second. I. INTRODUCTION Path computation problems are arguably one of the most ell studied family of problems in communication netorks. In most of these problems, one or more eight is associated ith a link representing, among other things, the cost, delay or the reliability of that link. The objectie most often is to find a least eighted path (or shortest path ) beteen a specified source-destination node pair. In most of these problems, if a link l is a part of a path P, then the contribution of the link l on the length of the path P depends only on the eight (l) of the link l, and is obliious of the eights of the links traersed before or after traersing the link l on the path P. Hoeer, in a recent paper on optical-ireless FiWi netork [5], the authors hae proposed a path length metric, here the contribution of the link l on the length of the path P depends not only on its on eight (l), but also on the eights of all the links of the path P. As the authors of [5] do not present any algorithm for computing the shortest path beteen the source-destination node pair using this ne metric, e present a polynomial time algorithm for this problem in this paper. This result is interesting because of the nature of ne metric proposed in [5], one key property on hich the shortest path algorithm due to Dijkstra is based, that is, subpath of a shortest path is shortest, is no longer alid. We sho that een ithout this key property, not only it is possible to compute the shortest path in polynomial time using the ne metric, it is also possible to compute the shortest path in polynomial time, ith a ariation of the metric proposed in [5]. The rest of the paper is organized as follos. In section III, e present the path length metric proposed for the FiWi netork in [5] and a ariation of it. In section IV e proide algorithms for computing the shortest path using these to metrics. As multi-path routing offers significant adantage oer single path routing [6], [7], [8], [9], e also consider the problem of computation of a pair of node disjoint paths beteen a source-destination node pair using the metric proposed in [5]. We sho that hile the single path computation problem can be soled in polynomial time in all these cases, the disjoint path computation problem is NP-complete. The contributions of the paper are as follos; Polynomial time algorithm for single path routing (metric 1) in FiWi netorks Polynomial time algorithm for single path routing (metric 2) in FiWi netorks NP-completeness proof of disjoint path routing (metric 1) in FiWi netorks Optimal solution for disjoint path routing (metric 1) in FiWi netorks using Integer Linear Programming One approximation algorithm for disjoint path routing in FiWi netorks ith an approximation bound of 4 and computation complexity O((n + m)log n) One approximation algorithm for disjoint path routing in FiWi netorks ith an approximation bound of 2 and computation complexity O(m(n + m)log n) Experimental ealuation results of the approximation algorithm for disjoint path routing in FiWi netorks II. RELATED WORK Fiber-Wirelss (FiWi) netorks is a hybrid access netork resulting from the conergence of optical access netorks such as Passie Optical Netorks (PONs) and ireless access netorks such as Wireless Mesh Netorks (WMNs) capable of proiding lo cost, high bandidth last mile access /14/$ IEEE 131

2 Because it proides an attractie ay of integrating optical and ireless technology, Fiber-Wireless (FiWi) netorks hae receied considerable attention in the research community in the last fe years [1], [2], [3], [4], [5], [8], [9]. The minimum interference routing algorithm for the FiWi enironment as first proposed in [4]. In this algorithm the path length as measured in terms of the number of hops in the ireless part of the FiWi netork. The rationale for this choice as that the maximum throughput of the ireless part is typically much smaller than the throughput of the optical part, and hence minimization of the ireless hop count should lead to maximizing the throughout of the FiWi netork. Hoeer, the authors of [5] noted that minimization of the ireless hop count does not alays lead to throughput maximization. Accordingly, the path length metric proposed by them in [5] pays considerable importance to the traffic intensity at a generic FiWi netork node. The results presented in this paper are motiated by the path length metric proposed in [5]. III. PROBLEM FORMULATION In the classical path problem, each edge e E of the graph G =(V,E), has a eight (e) associated ith it and if there is a path P from the node 0 to k in the graph G =(V,E) k k then the path length or the distance beteen the nodes 0 and k is gien by (P 0, k )= k Hoeer, in the path length metric proposed in [5] for optical-ireless FiWi netorks [1], [2], [3], the contribution of e i to the path length computation depends not only on the eight i, but also on the eights of the other edges that constitute the path. In the folloing section, e discuss this metric and a ariation of it. We also also formulate the multipath computation problem using this metric. The Optimized FiWi Routing Algorithm (OFRA) proposed in [5] computes the length (or eight) of a path P from 0 to k using the folloing metric ( ) (P 0, k )=min ( u )+max ( u) P u P u P here u represents the traffic intensity at a generic FiWi netork node u, hich may be an optical node in the fiber backhaul or a ireless node in ireless mesh front-end. In order to compute shortest path using this metric, in our formulation, instead of associating a traffic intensity eight ( u ) ith nodes, e associate them ith edges. This can easily be achieed by replacing the node u ith eight u ith to nodes u 1 and u 2, connecting them ith an edge (u 1,u 2 ) and assigning the eight u on this edge. In this scenario, if there is a path P from the node 0 to k in the graph G =(V,E) k k then the path length beteen the nodes 0 and k is gien by + (P 0, k ) = k + max( 1, 2,... k ) k = i + max k i=1 i i=1 In the second metric, the length a path P 0, k : k, beteen the nodes 0 and k is gien by (P 0, k ) = = k i + CNT(P 0, k ) max( 1, 2,... k ) i=1 k i + CNT(P 0, k ) max k i=1 i i=1 here CNT(P 0, k ) is the count of the number of times max ( 1, 2,... k ) appears on the path P 0, k. We study the shortest path computation problems in FiWi netorks using the aboe metrics and proide polynomial time algorithms for solution in subsections IV-A and IV-B. If max = max( 1, 2,... k ), e refer to the corresponding edge (link) as e max. If there are multiple edges haing the eight of max, e arbitrarily choose any one of them as e max. It may be noted that both the metrics hae an interesting property in that in both cases, the contribution of an edge e on the path length computation depends not only on the edge e but also on eery other edge on the path. This is so, because if the edge e happens to be e max, contribution of this edge in computation of + (P 0, k ) and (P 0, k ) ill be 2 (e) and CNT(P 0, k ) (e) respectiely. If e is not e max, then its contribution ill be (e) for both the metrics. As multipath routing proides an opportunity for higher throughput, loer delay, and better load balancing and resilience, its use hae been proposed in fiber netorks [6], ireless netorks [7] and recently in integrated fiber-ireless netorks [8], [9]. Accordingly, e study the problem of computing a pair of edge disjoint paths beteen a sourcedestination node pair s and d, such that the length of the longer path (path length computation using the first metric) is shortest among all edge disjoint path pairs beteen the nodes s and d. In subsection IV-C e proe that this problem is NP-complete, in subsection IV-D, e proide an optimal solution for the problem using integer linear programming, in subsections IV-E and IV-F e proide to approximation algorithms for the problem ith a performance bound of 4 and 2 respectiely, and in subsection IV-F e proide results of experimental ealuation of the approximation algorithms. IV. PATH PROBLEMS IN FIWI NETWORKS In this section, e present (i) to different algorithms for shortest path computation using to different metrics, (ii) NP-completeness proof for the disjoint path problem, (iii) to approximation algorithms for the disjoint path problem, and (i) experimental ealuation results of the approximation algorithms. 132

3 It may be noted that, in both metrics + (P 0, k ) and (P 0, k ), e call an edge e P 0, k crucial, if(e) = max k i=1 (e ), e P 0, k. A. Shortest Path Computation using Metric 1 It may be recalled that the path length metric used in this case is the folloing: + (P 0, k )= k i=1 i + max k i=1 i.if the path length metric as gien as (P 0, k )= k i=1 i, algorithms due to Dijkstra and Bellman-Ford could hae been used to compute the shortest path beteen a source-destination node pair. One important property of the path length metric that is exploited by Dijkstra s algorithm is that subpath of a shortest path is shortest. Hoeer, the ne path length metric k i=1 i +max k i=1 i does not hae this property. We illustrate this ith the example belo. Consider to paths P 1 and P 2 from the node 0 to 3 in the graph G =(V,E), here P 1 : and P 2 : If 1 =0.25, 2 =5, 3 =4.75, 4 = 2, 5 =4, the length of the path P 1, + (P 1 )= max( 1, 2, 3 )= max(0.25, 5, 4.75) = 15 and the length of the path P 2, + (P 2 )= max( 4, 5. 6 ) = max(2, 4, 4.75) = Although P 1 is shortest path in this scenario, the length of its subpath is max (0.25, 5) = 10.25, hich is greater than the length of a subpath of P max (2, 4) = 10, demonstrating that the assertion that subpath of a shortest path is shortest no longer holds in this path length metric. As the assertion subpath of a shortest path is shortest no longer holds in this path length metric, e cannot use the standard shortest path algorithm due to Dijkstra in this case. Hoeer, e sho that e can still compute the shortest path beteen a source-destination node pair in polynomial time by repeated application of the Dijkstra s algorithm. The algorithm is described next. For a gien graph G =(V,E),.l.o.g, e assume V = n and E = m. Define G e as subgraph of G by deleting edges hose eight is greater than (e). Also, as Dijkstra s algorithm does, e need to maintain distance ector. We define dist be distance (length of shortest path) from s to, Π be predecessor of and maxedge be eight of the crucial edge from s to ia the shortest path, ans be optimal solution (length) from s to. Different G e can be treated as different layers of the G. For any path P, e define the function e (P ) as the crucial edge along P. It is easy to obsere that if P d is the optimal path from s to node d then (P d ) = e P (e) and + (P d ) = (P d )+(e (P d )). It may be noted that henceforth, e shorten P s,d to P d, because e consider that the source is fixed hile the destination d is ariable. Lemma 1. (P d ) is minimum in G e (P d ). Proof: It is obious that P d still exists in G e (P d ), since edges on P d are not abandoned. Suppose P d is not shortest, then there must be another path P d s.t. (P d ) < (P d). Noting that the crucial edge on P d, namely e, is no longer than Algorithm 1 Modified Dijkstra s Algorithm 1: Initialize ans = for for all V 2: sort all edges according to (e) in ascending order 3: for i =1to m do 4: Initialize dist =, Π = nil, maxedge =0for all V 5: dist s =0 6: Q = the set of all nodes in graph 7: hile Q is not empty do 8: u = Extract-Min(Q) 9: for each neighbor of u do 10: if e u, E(G ei ) then 11: t = MAX {maxedge u, (e u, )} 12: if dist u + (e u, ) < dist then 13: dist = dist u + (e u, ) 14: maxedge =t 15: Π = u 16: else if dist u +(e u, ) == dist then 17: if maxedge >tthen 18: maxedge = t 19: Π = u 20: end if 21: end if 22: end if 23: end for 24: end hile 25: for each node do 26: ans =min{ans, dist + maxedge } 27: end for 28: end for e (P d ) since they both belong to G e (P d ). Hence + (P d )= (P d )+(e ) <(P d )+(e (P d )) = + (P d ), contradicting P d is optimal. Lemma 2. Modified Dijkstra s Algorithm (MDA) computes shortest path hile keeping the crucial edge as short as possible in eery iteration. Proof: Line 4 to 24 orks similar to the standard Dijkstra s algorithm does. Besides, hen updating distance, MDA also updates the crucial edge to guarantee that it lies on the path and hen there is a tie, MDA ill choose the edge ith the smaller eight. Theorem 1. Modified Dijkstra s Algorithm computes optimal solution for eery node in O(m(n + m)logn) time. Proof: Lemma 1 indicates for any node V, optimal solution can be obtained by enumerating all possible crucial edges e (P ) and computing shortest path on G e (P ). By sorting all edges in nondecreasing order, eery subgraph G e (P ) is considered and it is shon in lemma 2, MDA correctly computes shortest path for eery node in eery G e (P ). Then optimal solution is obtained by examining all shortest path using the () metric plus the corresponding crucial edge. Dijkstra s algorithm runs O((n + m)logn) time hen using 133

4 binary heap, hence MDA runs in O(m(n+m)logn) time hen considering all layers. B. Shortest Path Computation using Metric 2 Gien a path P, let e (P ) be the crucial edge along the P and CNT(P ) be the number of occurrence of such edge. No our objectie becomes to find a path Q, such that (P )= e Q (e)+cnt(q) (e (Q)) is minimum. The layering technique can also be used in this problem. Hoeer, shortest path under a ceratin layer may not become a alid candidate for optimal solution. Here, e introduce a dynamic programming algorithm that can sole the problem optimally in O(n 2 m 2 ) time. Input is a eighted graph G =(V,E), V = n, E = m ith a specified source node s. In this paper, e only consider nonnegatie edge eight. As shon before, e use G e to represent the residue graph by deleting edges longer than e in G. Different from MDA1, in order to consider the number of crucial edges, dist is replaced by an array dist 0, dist 1,...dist n. One can think dist c be the shortest distance from s to by going through exactly c crucial edges and possibly some shorter edges. Similarly, e replace Π by Π c, 0 c n. Each Π c records predecessor of for the path corresponding to dist c. Lastly, ans is used as optimal solution from s to. Lemma 3. If P is the best path from s to, i.e., (P ) is minimum among all s- path, then P is computed in G e (P ) and dist CNT(P) = (P ). Proof: By definition, P exists in G e (P ) and CNT(P ) 1 since any path should go through at least one crucial edge. Noting (P )=(P )+CNT(P ) (e (P )), on one hand if e treat CNT(P ) as a fixed number, then e need to keep (P ) as small as possible. Inspired by idea of bellman-ford algorithm, e can achiee it by enumerating P, i.e., number of edges on P. On the other hand, e need to keep tracking number of crucial edges as ell. Hence, dist c is adopted to maintain such information, superscript c reflects exact number of crucial edges. From line 12 to line 25, dist c is updated either hen it comes from a neighbor ho has already itnessed c crucial edges or it comes from a neighbor ith c 1 crucial edges and the edge beteen is crucial. In either case, node gets a path, say P, ith exact c crucial edges on it and (P ) is minimum. At last, P can be selected by enumerating number of crucial edges and that is hat line 30 to 32 does. Lemma 4. Maxedge Shortest Path Algorithm(MSPA) runs in O(n 2 m) time for each G e. Proof: We can apply similar analysis of bellman-ford algorithm. Hoeer, e need to update dist c array, it takes extra O(n) time for eery node in eery iteration hen enumerating P. Hence, total running time is O(n 2 m). Theorem 2. MSPA computes optimal path for eery V in O(n 2 m 2 ) time. Algorithm 2 Maxedge Shortest Path Algorithm 1: Initialize ans = for for all V 2: sort all edges according to (e) in ascending order, say e 1,e 2,..., e m after sorting 3: for i =1to m do 4: Initialize dist c =, Π c = nil for all V and all 0 c n 5: dist 0 s =0 6: for j =1to n 1 do 7: for k =0to j do 8: for eery node V do 9: if dist k = then 10: continue 11: end if 12: for eery neighbor u of do 13: if (e u, ) >(e i ) then 14: continue 15: else if (e u, )==(e ) then 16: if dist k + (e u, ) < dist k+1 u then 17: dist k+1 u = dist k + (e u, ) 18: Π k+1 u 19: end if 20: else = 21: if dist k + (e u, ) < dist k u then 22: dist k u = dist k + (e u, ) 23: Π k u = 24: end if 25: end if 26: end for 27: end for 28: end for 29: end for 30: for i =1to n 1 do 31: ans =min{ans, dist i + i (e i )} 32: end for 33: end for Proof: By Lemma 3, ifp is obtained hen computing G e P. Then, by considering all possible G e, e could get P in one of these layering. It takes O(m) to generate all G e, by Lemma 4, MSPA runs in V in O(n 2 m 2 ) time. C. Computational Complexity of Disjoint Path Problem In this section, e study edge disjoint path in optical ireless netork. By reduction from ell knon Min-Max 2-Path Problem, i.e., min-max 2 edge disjoint path problem under normal length measurement, e sho it is also NP-complete if e try to minimize the longer path hen + length is applied. Then e gie an ILP formulation to sole this problem optimally. At last, e proide to approximation algorithm, one ith approximation ratio 4, running time 134

5 O((m + n)logn), the other one ith approximation ratio 2 hile running time is O(m(m + n)logn). Min-Max 2 Disjoint Path Problem (MinMax2PP) Instance: An undirected graph G =(V,E) ith a positie eight ( e) associated ith each edge e E, a source node s V, a destination node t V, and a positie number X. Question: Does there exist a pair of edge disjoint paths P 1 and P 2 from s to d in G such that (P 1 ) (P 2 ) X? The MinMax2PP problem is shon to be NP-complete in [10]. With a small modification, e sho NP-completeness still holds if + length measurement is adopted. Min-Max 2 Disjoint Path Problem in Optical Wireless Netorks (MinMax2OWFN) Instance: An undirected graph G =(V,E) ith a positie eight ( e) associated ith each edge e E, a source node s V, a destination node t V, and a positie number X. Question: Does there exist a pair of edge disjoint paths P 1 and P 2 from s to t in G such that + (P 1) + (P 2) X? Theorem 3. The MinMax2OWFN is NP-complete Proof: Eidently, MinMax2OWFN is in NP class, gien to edge joint path P 1 and P 2, e can check if + (P 1) + (P 2) X in polynomial time. We then transfer from MinMax2PP to MinMax2OWFN. Let graph G =(V,E) ith source node s, destination t and an integer X be an instance of MinMax2PP, e construct an instance G of MinMax2OWFN in folloing ay. 1) Create an identical graph G ith same nodes and edges in G. 2) Add one node s 0 to G. 3) Create to parallel edges e 01,e 02 beteen s 0 and s, (e 01 )=(e 02 )=max e G(E) (e) 4) Choose s 0 to the source node in G and t to be the destination. 5) Set X = X +2(e 01 ) It is easy to see, the construction takes polynomial time. No e need to sho a instance of MinMax2OWFN hae to edge disjoint paths from s 0 to t ith length at most X if and only if the corresponding instance hae to edge disjoint paths from s to t ith length at most X. Suppose there are to edge disjoint paths P 1 and P 2 from s 0 to t in G, such that + (P 1) + (P 2) X.Bythe ay e construct G, P 1 and P 2 must go through e 01 and e 02. W.l.o.g. e say e 01 P 1 and e 02 P 2. Since (e 01 )= (e 02 )=max e E(G ){(e)}, therefore e 01 and e 02 are the crucial edge on P 1 and P 2 respectiely. Hence, P 1 e 01 and P 2 e 02 are to edge disjoint path in G, ith length no greater than X 2(e 01 )=X. Conersely, no suppose P 1 and P 2 are to edge joint paths in G satisfying (P 1 ) (P 2 ) X. We follo the same argument aboe, P 1 + e 01 and P 2 + e 02 are to desired paths, ith length not exceeding X +2(e 01 )=X. D. Optimal Solution for the Disjoint Path Problem Here, e gie an ILP formulation for MinMax2OWFN. ILP for MinMax2OWFN min MP s.t. f i,j,1 1 i = s f j,i,1 = 1 i = t (i,j) E (j,i) E 0 otherise f i,j,2 1 i = s f j,i,2 = 1 i = t (i,j) E (j,i) E 0 otherise f i,j,1 + f i,j,2 1 (i, j) E 1 f i,j,1 (i, j) (i, j) E 2 f i,j,2 (i, j) (i, j) E MP 1 + f i,j,1 (i, j) MP 2 + (i,j) E (i,j) E f i,j,2 (i, j) f i,j,1 = {0, 1}, f i,j,2 = {0, 1} (i, j) E The folloing is a brief description of this ILP formulation. The first to equation represent flo constraint as normal shortest path problem does. f i,j,1 =1indicates path P 1 goes through edge (i, j), and 0 otherise. So it is ith f i,j,2 and path P 2. Constraint 3 ensures to edges are disjoint, since f i,j,1 and f i,j,2 cannot both be 1 at the same time. 1, 2 act as the eights of the crucial edges on P 1 and P 2 respectiely. Finally, e define MP to be the maximum of + (P 1 ) and + (P 2 ) and therefore try to minimize it. E. Approximation Algorithm for the Disjoint Path Problem, ith approximation factor 4 Next e propose a 4-approximation algorithm hich runs in O((n + m)logn) time. Gien G =(V,E) ith source s and destination t, the idea of approximation algorithm is to find to disjoint P 1 and P 2 such that (P 1 )+(P 2 ) is minimized. Such P 1 and P 2 can be found either using min cost max flo algorithm or the algorithm due to Suurballe presented in [11]. And e need to sho both + (P 1 ) and + (P 2 ) are at most four times of the optimal solution. Algorithm 3 MinMax2OWFN Approximation Algorithm 1 (MAA1) 1: Run Suurballe s algorithm on G, denote P 1, P 2 be to resulting path. 2: Compute + (P 1 ) and + (P 2 ). 3: Output max{ + (P 1 ), + (P 2 )}. 135

6 Lemma 5. For any path P, + (P ) 2(P ). Proof: By definition, + (P )=(P)+(e (P )). Since (e (P )) (P ), then + (P ) 2 (P ). Lemma 6. If P 1 and P 2 are to edge joint path from s to t such that (P 1 )+(P 2 ) is minimum, then + (P 1 ) and + (P 2 ) are at most four times of the optimal solution. Proof: Say opt is the optimal alue of a MinMax2OWFN instance and Q 1,Q 2 are to s t edge disjoint path in one optimal solution. W.l.o.g, e may suppose + (P 1 ) + (P 2 ) and + (Q 1 ) + (Q 2 ). Let (P 1 )+(P 2 )=p and (Q 1 )+(Q 2 )=q, by assumption, p q. Also, e hae + (P 1 ) = (P 1 )+e (P 1 ) 2p, opt = + (Q 1 ) = (Q 1 ) + e (Q 1 ) > q 2. Hence, + (P 2) opt + (P 1) opt < 2p q/2 4 Theorem 4. MAA1 is a 4-approximation algorithm running in O((n + m)logn) time and 4 is a tight bound. Proof: By Lemma 5 and 6, MAA1 has approximation ratio at most 4.Then e sho MAA1 has approximation at least 4 for certain cases. Consider the folloing graph. Algorithm 4 MinMax2OWFN Approximation Algorithm 2(MAA2) 1: set ans = 2: for eery G e of G do 3: Run Suurballe s algorithm on G e, denote P 1, P 2 be to resulting path. 4: Compute + (P 1 ) and + (P 2 ). 5: ans =min{ans, max{ + (P 1 ), + (P 2 )}}. 6: end for 7: Output ans. (e ). It suffices to sho it by contradiction. Suppose Which follos, (P 1)+(e ) max{ + (Q 1), + (Q 2)} (P 1)+(e ) max{ + (Q 1), + (Q 2)} (P 1 )+(e ) + (Q 1 )+ + (Q 2 ) < 2. Weproe 2, then (P 1 )+(e ) (Q 1 )+(e (Q 1 )) + (Q 2 )+(e (Q 2 )) By definition, e is one of e (Q 1 ), e (Q 2 ). Hence, (P 1 ) >(Q 1 )+(Q 2 ) It is easy to check, P 1 = {s t}, P 2 = {s r t} are to edge disjoint path ith minimum length 2k+2, + (P 1 )= 4k > + (P 2 )=3. Hoeer, let Q 1 = {s u 1 u 2... u k 1 u k r t}, Q 2 = {s r k 1 k t}, then (Q 1 )+(Q 2 )=2k +4 hile + (Q 1 )= + (Q 2 )=k (P 1) + Q 1 = 4k k+3 4 hen k is sufficiently large. Hence, 4 is a tight bound for MAA1. We need O((n + m)logn) time running Suurballe s algorithm and O(n) time computing + (P 1 ) and + (P 2 ). Therefore total running time is O((n + m)logn). It is impossible since (P 1 )+(P 2 ) is minimum in layer G e. Theorem 5. MAA2 is a 2-approximation algorithm running in O(m(n + m)logn) time and 2 is a tight bound. Proof: By Lemma 7, in one of the layer, e guarantee to hae a 2-approximation solution. Since e take minimum outcome among all layers, the final result is no orse than tice of the optimal solution. No e need to sho there exists certain case, such that MAA2 is no good than tice of the optimal solution. Consider the folloing graph F. Approximation Algorithm for the Disjoint Path Problem, ith approximation factor 2 In MAA1, layering technique is not used and e only consider the original graph. Hoeer, by taking all G e of G into account, e can hae a better approximation ratio. Say Q 1, Q 2 are to disjoint paths in one optimal solution. Let e =max{e (Q 1 ),e (Q 2 )} and P 1, P 2 be the resulting paths hen computing layer G e ;.l.o.g, e may assume (P 1 ) >(P 2 ). Also, let ans e =max{ + (P 1 ), + (P 2 )}. Lemma 7. ans e < 2max{ + (Q 1 ), + (Q 2 )}. Proof: Noting that (e (P 1 )) (e ) and (e (P 2 )) (e ) since they both belong to G e. Then ans e (P 1 )+ There is only one layer, and P 1 = {s x 1 x 2... x 2k 1 x 2 k t}, P 2 = {s r t} are to edge disjoint path ith minimum length 2k +3, + (P 1 )= 2k +2> + (P 2 )=3. Again, set Q 1 = {s u 1 u 2... u k 1 u k r t}, Q 2 = {s r k 1 k t}, then (Q 1 )+(Q 2 )=2k +4 hile + (Q 1 )= + (Q 2 )=k (P 1) + Q 1 = 2k+2 k+3 2 hen k is sufficiently large. Hence, 2 is a tight bound for MAA2. Finally, it is easy to see that the running time is O(m(n + m)logn). 136

7 S D Opt Approx Approx Approx Approx node node Sol Sol 1 ratio 1 Sol 2 ratio Fig. 1. The ARPANET graph ith 20 nodes and 32 links TABLE I COMPARISON OF THE APPROXIMATE SOLUTIONS WITH THE OPTIMAL SOLUTION FOR THE ARPANET GRAPH G. Experimental Results for the Disjoint Path Problem In this section, e present the results of simulations for comparing the performance of our approximation algorithms ith the optimal solution hen + () metric is applied. The simulation experiments hae been carried out on the ARPANET topology (as shon in Fig 1 ith nodes and links shon in black) hich has tenty nodes and thirty to links. The eights of the links hae been randomly generated and lie in the range of to and eleen (as shon in red in Fig 1) and e consider the graph to be undirected. The results of the comparison is presented in Table I. We hae compared the lengths of the longer of the to edge disjoint paths computed by the optimal and the approximate solutions for seenteen different source-destination pairs. It may be noted that for almost 65% of the cases, the approximate algorithms obtain the optimal solution. In the remaining cases, the approximate solutions lie ithin a factor of 1.2 of the optimal solution Thus, een though the approximation ratio in the orst case are proen to be 4 and 2, in practical cases, it is ithin 1.2. From these experimental results, e can conclude that the approximation algorithms produce optimal or near optimal solutions in majority of the cases. It may be noted that the to approximation algorithms perform in a similar fashion in the ARPANET graph, hoeer, as proen theoretically, the to approximation algorithms differ in their orst case approximation ratio. V. CONCLUSION In this paper, e study the shortest path problem in FiWi netorks. Based on the path length metrics proposed in [3], [5], e present polynomial time algorithms for the single path scenario. In the disjoint path scenario, e proe that the problem of finding a pair of disjoint paths, here the length of the longer path is shortest, is NP-complete. We proide an ILP solution for the disjoint path problem and propose to approximation algorithms. Both the approximation algorithms hae a constant factor approximation bound. Hoeer, there is a trade-off beteen the quality of the solution (approximation bound) and the execution time. Finally, e sho that both the approximation algorithms obtain near optimal results through simulation using the ARPANET topology. REFERENCES [1] N. Ghazisaidi, M. Maier, and C. M. Assi, Fiber-Wireless (FiWi) Access Netorks: A Surey, IEEE Communications Magazine, ol. 47, no. 2, pp , Feb [2] N. Ghazisaidi, and M. Maier, Fiber-Wireless (FiWi) Access Netorks: Challenges and Opportunities, IEEE Netork, ol. 25, no. 1, pp 36-42, Feb [3] Z. Zheng, J. Wang, X. Wang, ONU placement in fiber-ireless (FiWi) netorks considering peer-to-peer communications, IEEE Globecom, [4] Z. Zheng, J. Wang, X. Wang, A study of netork throughput gain in optical-ireless (FiWi) netorks subject to peer-to-peer commuincations, IEEE ICC, [5] F. Aurzada, M. Leesque, M. Maier, M. Reisslein, FiWi Access Netorks Based on Next-Generation PON and Gigabit-Class WLAN Technologies: A Capacity and Delay Analysis, IEEE/ACM Transactions on Netorking, to appear. [6] A. Sen, B.Hao. B. Shen, L.Zhou and S. Ganguly, On maximum aailable bandidth through disjoint paths, Proc. of IEEE Conf. on High Performance Sitching and Routing, [7] M. Mosko, J.J. Garcia-Luna-Acees, Multipath routing in ireless mesh netorks, Proc. of IEEE Workshop on Wireless Mesh Netorks, [8] J. Wang, K. Wu, S. Li and C. Qiao, Performance Modeling and Analysis of Multi-Path Routing in Integrated Fiber-Wireless (FiWi) Netorks, IEEE Infocom mini conference, [9] S. Li, J. Wang, C. Qiao, Y. Xu, Mitigating Packet Reordering in FiWi Netorks, IEEE/OSA Journal of Optical Communications and Netorking, ol. 3, pp , [10] C. Li, S.T. McCormick and D.Simchi-Lei, Complexity of Finding To Disjoint Paths ith Min- Max Objectie, Discrete Applied Mathematics, ol. 26, pp , [11] J. W. Suurballe, Disjoint paths in a netork, Netorks, ol. 4, pp ,

Exploiting Source Redundancy to Improve the Rate of Polar Codes

Exploiting Source Redundancy to Improve the Rate of Polar Codes Exploiting Source Redundancy to Improe the Rate of Polar Codes Ying Wang ECE Department Texas A&M Uniersity yingang@tamu.edu Krishna R. Narayanan ECE Department Texas A&M Uniersity krn@tamu.edu Aiao (Andre)

More information

1 :: Mathematical notation

1 :: Mathematical notation 1 :: Mathematical notation x A means x is a member of the set A. A B means the set A is contained in the set B. {a 1,..., a n } means the set hose elements are a 1,..., a n. {x A : P } means the set of

More information

Alternative non-linear predictive control under constraints applied to a two-wheeled nonholonomic mobile robot

Alternative non-linear predictive control under constraints applied to a two-wheeled nonholonomic mobile robot Alternatie non-linear predictie control under constraints applied to a to-heeled nonholonomic mobile robot Gaspar Fontineli Dantas Júnior *, João Ricardo Taares Gadelha *, Carlor Eduardo Trabuco Dórea

More information

Algorithms and Data Structures 2014 Exercises and Solutions Week 14

Algorithms and Data Structures 2014 Exercises and Solutions Week 14 lgorithms and ata tructures 0 xercises and s Week Linear programming. onsider the following linear program. maximize x y 0 x + y 7 x x 0 y 0 x + 3y Plot the feasible region and identify the optimal solution.

More information

Randomized Smoothing Networks

Randomized Smoothing Networks Randomized Smoothing Netorks Maurice Herlihy Computer Science Dept., Bron University, Providence, RI, USA Srikanta Tirthapura Dept. of Electrical and Computer Engg., Ioa State University, Ames, IA, USA

More information

Towards Green Distributed Storage Systems

Towards Green Distributed Storage Systems Towards Green Distributed Storage Systems Abdelrahman M. Ibrahim, Ahmed A. Zewail, and Aylin Yener Wireless Communications and Networking Laboratory (WCAN) Electrical Engineering Department The Pennsylania

More information

On the Energy-Delay Trade-off of a Two-Way Relay Network

On the Energy-Delay Trade-off of a Two-Way Relay Network On the Energy-Delay Trade-off of a To-Way Relay Netork Xiang He Aylin Yener Wireless Communications and Netorking Laboratory Electrical Engineering Department The Pennsylvania State University University

More information

Lecture 1. 1 Overview. 2 Maximum Flow. COMPSCI 532: Design and Analysis of Algorithms August 26, 2015

Lecture 1. 1 Overview. 2 Maximum Flow. COMPSCI 532: Design and Analysis of Algorithms August 26, 2015 COMPSCI 532: Design and Analysis of Algorithms August 26, 205 Lecture Lecturer: Debmalya Panigrahi Scribe: Allen Xiao Oeriew In this lecture, we will define the maximum flow problem and discuss two algorithms

More information

A Generalization of a result of Catlin: 2-factors in line graphs

A Generalization of a result of Catlin: 2-factors in line graphs AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 72(2) (2018), Pages 164 184 A Generalization of a result of Catlin: 2-factors in line graphs Ronald J. Gould Emory University Atlanta, Georgia U.S.A. rg@mathcs.emory.edu

More information

Pyramidal Sum Labeling In Graphs

Pyramidal Sum Labeling In Graphs ISSN : 48-96, Vol 8, Issue 4, ( Part -I) April 8, pp-9 RESEARCH ARTICLE Pyramidal Sum Labeling In Graphs OPEN ACCESS HVelet Getzimah, D S T Ramesh ( department Of Mathematics, Pope s College, Sayerpuram-68,Ms

More information

5. Biconnected Components of A Graph

5. Biconnected Components of A Graph 5. Biconnected Components of A Graph If one city s airport is closed by bad eather, can you still fly beteen any other pair of cities? If one computer in a netork goes don, can a message be sent beteen

More information

Chapter 3. Systems of Linear Equations: Geometry

Chapter 3. Systems of Linear Equations: Geometry Chapter 3 Systems of Linear Equations: Geometry Motiation We ant to think about the algebra in linear algebra (systems of equations and their solution sets) in terms of geometry (points, lines, planes,

More information

Non-linear consolidation of soil with vertical and horizontal drainage under time-dependent loading

Non-linear consolidation of soil with vertical and horizontal drainage under time-dependent loading Uniersity of Wollongong Research Online Faculty of Engineering - Papers (Archie) Faculty of Engineering and Information Sciences Non-linear consolidation of soil ith ertical and horizontal drainage under

More information

Social Network Games

Social Network Games CWI and University of Amsterdam Based on joint orks ith Evangelos Markakis and Sunil Simon The model Social netork ([Apt, Markakis 2011]) Weighted directed graph: G = (V,,), here V: a finite set of agents,

More information

CSC Metric Embeddings Lecture 8: Sparsest Cut and Embedding to

CSC Metric Embeddings Lecture 8: Sparsest Cut and Embedding to CSC21 - Metric Embeddings Lecture 8: Sparsest Cut and Embedding to Notes taken by Nilesh ansal revised by Hamed Hatami Summary: Sparsest Cut (SC) is an important problem ith various applications, including

More information

Analysis of Algorithms. Outline. Single Source Shortest Path. Andres Mendez-Vazquez. November 9, Notes. Notes

Analysis of Algorithms. Outline. Single Source Shortest Path. Andres Mendez-Vazquez. November 9, Notes. Notes Analysis of Algorithms Single Source Shortest Path Andres Mendez-Vazquez November 9, 01 1 / 108 Outline 1 Introduction Introduction and Similar Problems General Results Optimal Substructure Properties

More information

Theory of Network Communication

Theory of Network Communication Theory of Network Communication Dr. Christian Scheideler Johns Hopkins Uniersity, Sept. 9 2002 Introduction The goal of this lecture is to gie an introduction to the state of the art in the theory of network

More information

The Dot Product

The Dot Product The Dot Product 1-9-017 If = ( 1,, 3 ) and = ( 1,, 3 ) are ectors, the dot product of and is defined algebraically as = 1 1 + + 3 3. Example. (a) Compute the dot product (,3, 7) ( 3,,0). (b) Compute the

More information

Announcements Wednesday, September 06. WeBWorK due today at 11:59pm. The quiz on Friday covers through Section 1.2 (last weeks material)

Announcements Wednesday, September 06. WeBWorK due today at 11:59pm. The quiz on Friday covers through Section 1.2 (last weeks material) Announcements Wednesday, September 06 WeBWorK due today at 11:59pm. The quiz on Friday coers through Section 1.2 (last eeks material) Announcements Wednesday, September 06 Good references about applications(introductions

More information

Robustness Analysis of Linear Parameter Varying Systems Using Integral Quadratic Constraints

Robustness Analysis of Linear Parameter Varying Systems Using Integral Quadratic Constraints Robustness Analysis of Linear Parameter Varying Systems Using Integral Quadratic Constraints Harald Pfifer and Peter Seiler 1 Abstract A general approach is presented to analyze the orst case input/output

More information

3 - Vector Spaces Definition vector space linear space u, v,

3 - Vector Spaces Definition vector space linear space u, v, 3 - Vector Spaces Vectors in R and R 3 are essentially matrices. They can be vieed either as column vectors (matrices of size and 3, respectively) or ro vectors ( and 3 matrices). The addition and scalar

More information

1 Introduction. Control 2:

1 Introduction. Control 2: Introduction Kinematics of Wheeled Mobile Robots (No legs here. They ork like arms. We e seen arms already) For control purposes, the kinematics of heeled mobile robots (WMRs) that e care about are the

More information

CS 4407 Algorithms Lecture: Shortest Path Algorithms

CS 4407 Algorithms Lecture: Shortest Path Algorithms CS 440 Algorithms Lecture: Shortest Path Algorithms Prof. Gregory Provan Department of Computer Science University College Cork 1 Outline Shortest Path Problem General Lemmas and Theorems. Algorithms Bellman-Ford

More information

LINEAR THREE-PHASE STATE ESTIMATION FOR LV GRIDS USING PSEUDO MEASUREMENTS BASED ON APPROXIMATE POWER DISTRIBUTIONS

LINEAR THREE-PHASE STATE ESTIMATION FOR LV GRIDS USING PSEUDO MEASUREMENTS BASED ON APPROXIMATE POWER DISTRIBUTIONS 24 th International Conference on Electricity Distribution Glasgo, 25 June 207 Paper 007 LINEAR THREEPHASE STATE ESTIMATION FOR LV GRIDS SING PSEDO MEASREMENTS BASED ON APPROXIMATE POWER DISIBTIONS Robert

More information

Preliminaries. Definition: The Euclidean dot product between two vectors is the expression. i=1

Preliminaries. Definition: The Euclidean dot product between two vectors is the expression. i=1 90 8 80 7 70 6 60 0 8/7/ Preliminaries Preliminaries Linear models and the perceptron algorithm Chapters, T x + b < 0 T x + b > 0 Definition: The Euclidean dot product beteen to vectors is the expression

More information

Announcements Wednesday, September 06

Announcements Wednesday, September 06 Announcements Wednesday, September 06 WeBWorK due on Wednesday at 11:59pm. The quiz on Friday coers through 1.2 (last eek s material). My office is Skiles 244 and my office hours are Monday, 1 3pm and

More information

arxiv: v1 [math.co] 25 Apr 2016

arxiv: v1 [math.co] 25 Apr 2016 On the zone complexity of a ertex Shira Zerbib arxi:604.07268 [math.co] 25 Apr 206 April 26, 206 Abstract Let L be a set of n lines in the real projectie plane in general position. We show that there exists

More information

Dynamic Vehicle Routing with Moving Demands Part II: High speed demands or low arrival rates

Dynamic Vehicle Routing with Moving Demands Part II: High speed demands or low arrival rates ACC 9, Submitted St. Louis, MO Dynamic Vehicle Routing with Moing Demands Part II: High speed demands or low arrial rates Stephen L. Smith Shaunak D. Bopardikar Francesco Bullo João P. Hespanha Abstract

More information

Dynamic Programming: Shortest Paths and DFA to Reg Exps

Dynamic Programming: Shortest Paths and DFA to Reg Exps CS 374: Algorithms & Models of Computation, Spring 207 Dynamic Programming: Shortest Paths and DFA to Reg Exps Lecture 8 March 28, 207 Chandra Chekuri (UIUC) CS374 Spring 207 / 56 Part I Shortest Paths

More information

On resilience of distributed routing in networks under cascade dynamics

On resilience of distributed routing in networks under cascade dynamics On resilience of distributed routing in networks under cascade dynamics Ketan Sala Giacomo Como Munther A. Dahleh Emilio Frazzoli Abstract We consider network flow oer graphs between a single origin-destination

More information

Enhancing Generalization Capability of SVM Classifiers with Feature Weight Adjustment

Enhancing Generalization Capability of SVM Classifiers with Feature Weight Adjustment Enhancing Generalization Capability of SVM Classifiers ith Feature Weight Adjustment Xizhao Wang and Qiang He College of Mathematics and Computer Science, Hebei University, Baoding 07002, Hebei, China

More information

Optimization Problems in Multiple Subtree Graphs

Optimization Problems in Multiple Subtree Graphs Optimization Problems in Multiple Subtree Graphs Danny Hermelin Dror Rawitz February 28, 2010 Abstract We study arious optimization problems in t-subtree graphs, the intersection graphs of t- subtrees,

More information

Active Measurement for Multiple Link Failures Diagnosis in IP Networks

Active Measurement for Multiple Link Failures Diagnosis in IP Networks Active Measurement for Multiple Link Failures Diagnosis in IP Networks Hung X. Nguyen and Patrick Thiran EPFL CH-1015 Lausanne, Switzerland Abstract. Simultaneous link failures are common in IP networks

More information

An example of Lagrangian for a non-holonomic system

An example of Lagrangian for a non-holonomic system Uniersit of North Georgia Nighthaks Open Institutional Repositor Facult Publications Department of Mathematics 9-9-05 An eample of Lagrangian for a non-holonomic sstem Piotr W. Hebda Uniersit of North

More information

Dynamic Vehicle Routing with Moving Demands Part II: High speed demands or low arrival rates

Dynamic Vehicle Routing with Moving Demands Part II: High speed demands or low arrival rates Dynamic Vehicle Routing with Moing Demands Part II: High speed demands or low arrial rates Stephen L. Smith Shaunak D. Bopardikar Francesco Bullo João P. Hespanha Abstract In the companion paper we introduced

More information

Estimation of Efficiency with the Stochastic Frontier Cost. Function and Heteroscedasticity: A Monte Carlo Study

Estimation of Efficiency with the Stochastic Frontier Cost. Function and Heteroscedasticity: A Monte Carlo Study Estimation of Efficiency ith the Stochastic Frontier Cost Function and Heteroscedasticity: A Monte Carlo Study By Taeyoon Kim Graduate Student Oklahoma State Uniersity Department of Agricultural Economics

More information

Network Flow Problems Luis Goddyn, Math 408

Network Flow Problems Luis Goddyn, Math 408 Network Flow Problems Luis Goddyn, Math 48 Let D = (V, A) be a directed graph, and let s, t V (D). For S V we write δ + (S) = {u A : u S, S} and δ (S) = {u A : u S, S} for the in-arcs and out-arcs of S

More information

NP and NP-Completeness

NP and NP-Completeness 0/2/206 Algorithms NP-Completeness 7- Algorithms NP-Completeness 7-2 Efficient Certification NP and NP-Completeness By a solution of a decision problem X we understand a certificate witnessing that an

More information

Design and Analysis of Algorithms

Design and Analysis of Algorithms Design and Analysis of Algorithms CSE 5311 Lecture 21 Single-Source Shortest Paths Junzhou Huang, Ph.D. Department of Computer Science and Engineering CSE5311 Design and Analysis of Algorithms 1 Single-Source

More information

Artificial Neural Networks. Part 2

Artificial Neural Networks. Part 2 Artificial Neural Netorks Part Artificial Neuron Model Folloing simplified model of real neurons is also knon as a Threshold Logic Unit x McCullouch-Pitts neuron (943) x x n n Body of neuron f out Biological

More information

Dynamic Programming: Shortest Paths and DFA to Reg Exps

Dynamic Programming: Shortest Paths and DFA to Reg Exps CS 374: Algorithms & Models of Computation, Fall 205 Dynamic Programming: Shortest Paths and DFA to Reg Exps Lecture 7 October 22, 205 Chandra & Manoj (UIUC) CS374 Fall 205 / 54 Part I Shortest Paths with

More information

Canard-like explosion of limit cycles in two-dimensional piecewise-linear models of FitzHugh-Nagumo type. NJIT CAMS Technical Report

Canard-like explosion of limit cycles in two-dimensional piecewise-linear models of FitzHugh-Nagumo type. NJIT CAMS Technical Report Canard-like explosion of limit cycles in to-dimensional pieceise-linear models of FitzHugh-Nagumo type. NJIT CAMS Technical Report 2-4 Horacio G. Rotstein, Stephen Coombes 2, Ana Maria Gheorghe 2, Department

More information

Towards Universal Cover Decoding

Towards Universal Cover Decoding International Symposium on Information Theory and its Applications, ISITA2008 Auckland, New Zealand, 7-10, December, 2008 Towards Uniersal Coer Decoding Nathan Axig, Deanna Dreher, Katherine Morrison,

More information

Slides credited from Hsueh-I Lu & Hsu-Chun Hsiao

Slides credited from Hsueh-I Lu & Hsu-Chun Hsiao Slides credited from Hsueh-I Lu & Hsu-Chun Hsiao Homework 3 released Due on 12/13 (Thur) 14:20 (one week only) Mini-HW 9 released Due on 12/13 (Thur) 14:20 Homework 4 released Due on 1/3 (Thur) 14:20 (four

More information

Chromatic characterization of biclique cover. Denis Cornaz. Jean Fonlupt. Equipe Combinatoire, UFR 921, Universite Pierre et Marie Curie, 4 place

Chromatic characterization of biclique cover. Denis Cornaz. Jean Fonlupt. Equipe Combinatoire, UFR 921, Universite Pierre et Marie Curie, 4 place Chromatic characterization of biclique coer Denis Cornaz France Telecom R&D, 38-40 rue du General Leclerc, Issy-les-Moulineaux 92794 Jean Fonlupt Equipe Combinatoire, UFR 921, Uniersite Pierre et Marie

More information

Average Coset Weight Distributions of Gallager s LDPC Code Ensemble

Average Coset Weight Distributions of Gallager s LDPC Code Ensemble 1 Average Coset Weight Distributions of Gallager s LDPC Code Ensemble Tadashi Wadayama Abstract In this correspondence, the average coset eight distributions of Gallager s LDPC code ensemble are investigated.

More information

An Improved Driving Scheme in an Electrophoretic Display

An Improved Driving Scheme in an Electrophoretic Display International Journal of Engineering and Technology Volume 3 No. 4, April, 2013 An Improved Driving Scheme in an Electrophoretic Display Pengfei Bai 1, Zichuan Yi 1, Guofu Zhou 1,2 1 Electronic Paper Displays

More information

The Budgeted Minimum Cost Flow Problem with Unit Upgrading Cost

The Budgeted Minimum Cost Flow Problem with Unit Upgrading Cost The Budgeted Minimum Cost Flow Problem with Unit Upgrading Cost Christina Büsing Sarah Kirchner Arie Koster Annika Thome October 6, 2015 Abstract The budgeted minimum cost flow problem (BMCF(K)) with unit

More information

An Explicit Lower Bound of 5n o(n) for Boolean Circuits

An Explicit Lower Bound of 5n o(n) for Boolean Circuits An Eplicit Lower Bound of 5n o(n) for Boolean Circuits Kazuo Iwama, Oded Lachish, Hiroki Morizumi, and Ran Raz Graduate School of Informatics, Kyoto Uniersity, Kyoto, JAPAN {iwama, morizumi}@kuis.kyoto-u.ac.jp

More information

Linear models and the perceptron algorithm

Linear models and the perceptron algorithm 8/5/6 Preliminaries Linear models and the perceptron algorithm Chapters, 3 Definition: The Euclidean dot product beteen to vectors is the expression dx T x = i x i The dot product is also referred to as

More information

Linear models: the perceptron and closest centroid algorithms. D = {(x i,y i )} n i=1. x i 2 R d 9/3/13. Preliminaries. Chapter 1, 7.

Linear models: the perceptron and closest centroid algorithms. D = {(x i,y i )} n i=1. x i 2 R d 9/3/13. Preliminaries. Chapter 1, 7. Preliminaries Linear models: the perceptron and closest centroid algorithms Chapter 1, 7 Definition: The Euclidean dot product beteen to vectors is the expression d T x = i x i The dot product is also

More information

Energy Minimization via a Primal-Dual Algorithm for a Convex Program

Energy Minimization via a Primal-Dual Algorithm for a Convex Program Energy Minimization via a Primal-Dual Algorithm for a Convex Program Evripidis Bampis 1,,, Vincent Chau 2,, Dimitrios Letsios 1,2,, Giorgio Lucarelli 1,2,,, and Ioannis Milis 3, 1 LIP6, Université Pierre

More information

Undirected Graphs. V = { 1, 2, 3, 4, 5, 6, 7, 8 } E = { 1-2, 1-3, 2-3, 2-4, 2-5, 3-5, 3-7, 3-8, 4-5, 5-6 } n = 8 m = 11

Undirected Graphs. V = { 1, 2, 3, 4, 5, 6, 7, 8 } E = { 1-2, 1-3, 2-3, 2-4, 2-5, 3-5, 3-7, 3-8, 4-5, 5-6 } n = 8 m = 11 Undirected Graphs Undirected graph. G = (V, E) V = nodes. E = edges between pairs of nodes. Captures pairwise relationship between objects. Graph size parameters: n = V, m = E. V = {, 2, 3,,,, 7, 8 } E

More information

Hydrodynamic Coefficients Identification and Experimental Investigation for an Underwater Vehicle

Hydrodynamic Coefficients Identification and Experimental Investigation for an Underwater Vehicle Sensors & Transducers 2014 by IFSA Publishing, S. L. http://.sensorsportal.com Hydrodynamic Coefficients Identification and Experimental Inestigation for an Underater Vehicle 1 Shaorong XIE, 1 Qingmei

More information

FINAL EXAM PRACTICE PROBLEMS CMSC 451 (Spring 2016)

FINAL EXAM PRACTICE PROBLEMS CMSC 451 (Spring 2016) FINAL EXAM PRACTICE PROBLEMS CMSC 451 (Spring 2016) The final exam will be on Thursday, May 12, from 8:00 10:00 am, at our regular class location (CSI 2117). It will be closed-book and closed-notes, except

More information

Chapter 6. Dynamic Programming. Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved.

Chapter 6. Dynamic Programming. Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved. Chapter 6 Dynamic Programming Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved. 1 6.8 Shortest Paths Shortest Paths Shortest path problem. Given a directed graph G = (V,

More information

Shortest paths with negative lengths

Shortest paths with negative lengths Chapter 8 Shortest paths with negative lengths In this chapter we give a linear-space, nearly linear-time algorithm that, given a directed planar graph G with real positive and negative lengths, but no

More information

N-bit Parity Neural Networks with minimum number of threshold neurons

N-bit Parity Neural Networks with minimum number of threshold neurons Open Eng. 2016; 6:309 313 Research Article Open Access Marat Z. Arslanov*, Zhazira E. Amirgalieva, and Chingiz A. Kenshimov N-bit Parity Neural Netorks ith minimum number of threshold neurons DOI 10.1515/eng-2016-0037

More information

Dynamic Vehicle Routing with Heterogeneous Demands

Dynamic Vehicle Routing with Heterogeneous Demands Dynamic Vehicle Routing with Heterogeneous Demands Stephen L. Smith Marco Paone Francesco Bullo Emilio Frazzoli Abstract In this paper we study a ariation of the Dynamic Traeling Repairperson Problem DTRP

More information

THE MINIMUM MATCHING ENERGY OF BICYCLIC GRAPHS WITH GIVEN GIRTH

THE MINIMUM MATCHING ENERGY OF BICYCLIC GRAPHS WITH GIVEN GIRTH ROCKY MOUNTAIN JOURNAL OF MATHEMATICS Volume 46, Number 4, 2016 THE MINIMUM MATCHING ENERGY OF BICYCLIC GRAPHS WITH GIVEN GIRTH HONG-HAI LI AND LI ZOU ABSTRACT. The matching energy of a graph was introduced

More information

OPTIMAL RESOLVABLE DESIGNS WITH MINIMUM PV ABERRATION

OPTIMAL RESOLVABLE DESIGNS WITH MINIMUM PV ABERRATION Statistica Sinica 0 (010), 715-73 OPTIMAL RESOLVABLE DESIGNS WITH MINIMUM PV ABERRATION J. P. Morgan Virginia Tech Abstract: Amongst resolable incomplete block designs, affine resolable designs are optimal

More information

Information Propagation Speed in Bidirectional Vehicular Delay Tolerant Networks

Information Propagation Speed in Bidirectional Vehicular Delay Tolerant Networks Information Propagation Speed in Bidirectional Vehicular Delay Tolerant Networks Emmanuel Baccelli, Philippe Jacquet, Bernard Mans, Georgios Rodolakis INRIA, France, {firstname.lastname}@inria.fr Macquarie

More information

University of Toronto Department of Electrical and Computer Engineering. Final Examination. ECE 345 Algorithms and Data Structures Fall 2016

University of Toronto Department of Electrical and Computer Engineering. Final Examination. ECE 345 Algorithms and Data Structures Fall 2016 University of Toronto Department of Electrical and Computer Engineering Final Examination ECE 345 Algorithms and Data Structures Fall 2016 Print your first name, last name, UTORid, and student number neatly

More information

Maximum Flow. Reading: CLRS Chapter 26. CSE 6331 Algorithms Steve Lai

Maximum Flow. Reading: CLRS Chapter 26. CSE 6331 Algorithms Steve Lai Maximum Flow Reading: CLRS Chapter 26. CSE 6331 Algorithms Steve Lai Flow Network A low network G ( V, E) is a directed graph with a source node sv, a sink node tv, a capacity unction c. Each edge ( u,

More information

Minimal Delay Traffic Grooming for WDM Optical Star Networks

Minimal Delay Traffic Grooming for WDM Optical Star Networks Minimal Delay Traffic Grooming for WDM Optical Star Networks Hongsik Choi, Nikhil Grag, and Hyeong-Ah Choi Abstract All-optical networks face the challenge of reducing slower opto-electronic conversions

More information

On the Linear Threshold Model for Diffusion of Innovations in Multiplex Social Networks

On the Linear Threshold Model for Diffusion of Innovations in Multiplex Social Networks On the Linear Threshold Model for Diffusion of Innoations in Multiplex Social Networks Yaofeng Desmond Zhong 1, Vaibha Sriastaa 2 and Naomi Ehrich Leonard 1 Abstract Diffusion of innoations in social networks

More information

6. DYNAMIC PROGRAMMING II. sequence alignment Hirschberg's algorithm Bellman-Ford distance vector protocols negative cycles in a digraph

6. DYNAMIC PROGRAMMING II. sequence alignment Hirschberg's algorithm Bellman-Ford distance vector protocols negative cycles in a digraph 6. DYNAMIC PROGRAMMING II sequence alignment Hirschberg's algorithm Bellman-Ford distance vector protocols negative cycles in a digraph Shortest paths Shortest path problem. Given a digraph G = (V, E),

More information

Lecture 3a: The Origin of Variational Bayes

Lecture 3a: The Origin of Variational Bayes CSC535: 013 Advanced Machine Learning Lecture 3a: The Origin of Variational Bayes Geoffrey Hinton The origin of variational Bayes In variational Bayes, e approximate the true posterior across parameters

More information

Worst Case Analysis of a Saturated Gust Loads Alleviation System

Worst Case Analysis of a Saturated Gust Loads Alleviation System Worst Case Analysis of a Saturated Gust Loads Alleiation System Andreas Knoblach Institute of System Dynamics and Control, German Aerospace Center (DLR), 82234 Weßling, Germany Harald Pfifer and Peter

More information

Some Classes of Invertible Matrices in GF(2)

Some Classes of Invertible Matrices in GF(2) Some Classes of Invertible Matrices in GF() James S. Plank Adam L. Buchsbaum Technical Report UT-CS-07-599 Department of Electrical Engineering and Computer Science University of Tennessee August 16, 007

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is donloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title Amplify-and-forard based to-ay relay ARQ system ith relay combination Author(s) Luo, Sheng; Teh, Kah Chan

More information

2 The Bhaduri-Marglin model

2 The Bhaduri-Marglin model The Bhaduri-Marglin model n this chapter the basics o the Bhaduri-Marglin model ill be discussed. Doing so, attention ill be directed on hich eatures o the model ill hae to be altered hen endogeniing labor

More information

Highway Vehicular Delay Tolerant Networks: Information Propagation Speed Properties

Highway Vehicular Delay Tolerant Networks: Information Propagation Speed Properties Highay Vehicular Delay Tolerant Netorks: Information Propagation Speed Properties Emmanuel Baccelli, Philippe Jacquet, Bernard Mans, Georgios Rodolakis INRIA, France, {firstname.lastname}@inria.fr Macquarie

More information

Improved Shuffled Frog Leaping Algorithm Based on Quantum Rotation Gates Guo WU 1, Li-guo FANG 1, Jian-jun LI 2 and Fan-shuo MENG 1

Improved Shuffled Frog Leaping Algorithm Based on Quantum Rotation Gates Guo WU 1, Li-guo FANG 1, Jian-jun LI 2 and Fan-shuo MENG 1 17 International Conference on Computer, Electronics and Communication Engineering (CECE 17 ISBN: 978-1-6595-476-9 Improved Shuffled Frog Leaping Algorithm Based on Quantum Rotation Gates Guo WU 1, Li-guo

More information

Coin Changing: Give change using the least number of coins. Greedy Method (Chapter 10.1) Attempt to construct an optimal solution in stages.

Coin Changing: Give change using the least number of coins. Greedy Method (Chapter 10.1) Attempt to construct an optimal solution in stages. IV-0 Definitions Optimization Problem: Given an Optimization Function and a set of constraints, find an optimal solution. Optimal Solution: A feasible solution for which the optimization function has the

More information

Distributed Weighted Vertex Cover via Maximal Matchings

Distributed Weighted Vertex Cover via Maximal Matchings 839 Distributed Weighted Vertex Coer ia Maximal Matchings Fabrizio Grandoni 1, Jochen Könemann 2, and Alessandro Panconesi 1 1 Dipartimento di Informatica, Uniersità di Roma La Sapienza Via Salaria 113,

More information

Single Source Shortest Paths

Single Source Shortest Paths CMPS 00 Fall 017 Single Source Shortest Paths Carola Wenk Slides courtesy of Charles Leiserson with changes and additions by Carola Wenk Paths in graphs Consider a digraph G = (V, E) with an edge-weight

More information

Supereulerian Graphs and the Petersen Graph

Supereulerian Graphs and the Petersen Graph Acta Mathematica Sinica, English Series Feb., 04, Vol. 0, No., pp. 9 04 Published online: January 5, 04 DOI: 0.007/s04-04-7-y Http://.ActaMath.com Acta Mathematica Sinica, English Series Springer-Verlag

More information

NCG Group New Results and Open Problems

NCG Group New Results and Open Problems NCG Group Ne Results and Open Problems Table of Contents NP-Completeness 1 NP-Completeness 2 3 4 2 / 19 NP-Completeness 3 / 19 (P)NSP OPT - Problem Definition An instance I of (P)NSP opt : I = (G, F ),

More information

Shortest paths: label setting

Shortest paths: label setting : label setting CE 377K February 19, 2015 REVIEW HW 2 posted, due in 2 weeks Review Basic search algorithm Prim s algorithm Review Algorithm (Assumes that the network is connected.) 1 Arbitrarily choose

More information

On Buffer Limited Congestion Window Dynamics and Packet Loss

On Buffer Limited Congestion Window Dynamics and Packet Loss On Buffer Limited Congestion Windo Dynamics and Packet Loss A. Fekete, G. Vattay Communication Netorks Laboratory, Eötvös University Pázmány P. sétány /A, Budapest, Hungary 7 Abstract The central result

More information

Section 6: PRISMATIC BEAMS. Beam Theory

Section 6: PRISMATIC BEAMS. Beam Theory Beam Theory There are two types of beam theory aailable to craft beam element formulations from. They are Bernoulli-Euler beam theory Timoshenko beam theory One learns the details of Bernoulli-Euler beam

More information

6. DYNAMIC PROGRAMMING II

6. DYNAMIC PROGRAMMING II 6. DYNAMIC PROGRAMMING II sequence alignment Hirschberg's algorithm Bellman-Ford algorithm distance vector protocols negative cycles in a digraph Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison

More information

Oblivious Routing in Wireless networks. Costas Busch

Oblivious Routing in Wireless networks. Costas Busch Obliious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi 1 Outline of Presentation Introduction Network Model Obliious Algorithm

More information

Algorithms Demands and Bounds. Demands and Bounds. Design and Analysis of Algorithms Andrei Bulatov

Algorithms Demands and Bounds. Demands and Bounds. Design and Analysis of Algorithms Andrei Bulatov Algorithms Demands and Bounds Demands and Bounds Design and Analysis of Algorithms Andrei Bulato Algorithms Demands and Bounds 1- Demands In our flow network model there is only 1 source and sink Can we

More information

CMPS 6610 Fall 2018 Shortest Paths Carola Wenk

CMPS 6610 Fall 2018 Shortest Paths Carola Wenk CMPS 6610 Fall 018 Shortest Paths Carola Wenk Slides courtesy of Charles Leiserson with changes and additions by Carola Wenk Paths in graphs Consider a digraph G = (V, E) with an edge-weight function w

More information

A ROBUST BEAMFORMER BASED ON WEIGHTED SPARSE CONSTRAINT

A ROBUST BEAMFORMER BASED ON WEIGHTED SPARSE CONSTRAINT Progress In Electromagnetics Research Letters, Vol. 16, 53 60, 2010 A ROBUST BEAMFORMER BASED ON WEIGHTED SPARSE CONSTRAINT Y. P. Liu and Q. Wan School of Electronic Engineering University of Electronic

More information

Two-sided bounds for L p -norms of combinations of products of independent random variables

Two-sided bounds for L p -norms of combinations of products of independent random variables Two-sided bounds for L p -norms of combinations of products of independent random ariables Ewa Damek (based on the joint work with Rafał Latała, Piotr Nayar and Tomasz Tkocz) Wrocław Uniersity, Uniersity

More information

Stat 8112 Lecture Notes Weak Convergence in Metric Spaces Charles J. Geyer January 23, Metric Spaces

Stat 8112 Lecture Notes Weak Convergence in Metric Spaces Charles J. Geyer January 23, Metric Spaces Stat 8112 Lecture Notes Weak Convergence in Metric Spaces Charles J. Geyer January 23, 2013 1 Metric Spaces Let X be an arbitrary set. A function d : X X R is called a metric if it satisfies the folloing

More information

Chapter 4. Greedy Algorithms. Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved.

Chapter 4. Greedy Algorithms. Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved. Chapter 4 Greedy Algorithms Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved. 1 4.1 Interval Scheduling Interval Scheduling Interval scheduling. Job j starts at s j and

More information

Balanced Partitions of Vector Sequences

Balanced Partitions of Vector Sequences Balanced Partitions of Vector Sequences Imre Bárány Benjamin Doerr December 20, 2004 Abstract Let d,r N and be any norm on R d. Let B denote the unit ball with respect to this norm. We show that any sequence

More information

The Inverse Function Theorem

The Inverse Function Theorem Inerse Function Theorem April, 3 The Inerse Function Theorem Suppose and Y are Banach spaces and f : Y is C (continuousl differentiable) Under what circumstances does a (local) inerse f exist? In the simplest

More information

A Novel Beamformer Robust to Steering Vector Mismatch

A Novel Beamformer Robust to Steering Vector Mismatch A Novel Beamformer Robust to Steering Vector Mismatch Chun-Yang Chen and P. P. Vaidyanathan Dept. of Electrical Engineering, MC 136-93 California Institute of Technology, Pasadena, CA 9115, USA E-mail:

More information

The optimal pebbling number of the complete m-ary tree

The optimal pebbling number of the complete m-ary tree Discrete Mathematics 222 (2000) 89 00 www.elseier.com/locate/disc The optimal pebbling number of the complete m-ary tree Hung-Lin Fu, Chin-Lin Shiue Department of Applied Mathematics, National Chiao Tung

More information

The maximum edge-disjoint paths problem in complete graphs

The maximum edge-disjoint paths problem in complete graphs Theoretical Computer Science 399 (2008) 128 140 www.elsevier.com/locate/tcs The maximum edge-disjoint paths problem in complete graphs Adrian Kosowski Department of Algorithms and System Modeling, Gdańsk

More information

Maximum flow problem (part I)

Maximum flow problem (part I) Maximum flow problem (part I) Combinatorial Optimization Giovanni Righini Università degli Studi di Milano Definitions A flow network is a digraph D = (N,A) with two particular nodes s and t acting as

More information

Pareto-Improving Congestion Pricing on General Transportation Networks

Pareto-Improving Congestion Pricing on General Transportation Networks Transportation Seminar at University of South Florida, 02/06/2009 Pareto-Improving Congestion Pricing on General Transportation Netorks Yafeng Yin Transportation Research Center Department of Civil and

More information

Chapter 11. Approximation Algorithms. Slides by Kevin Wayne Pearson-Addison Wesley. All rights reserved.

Chapter 11. Approximation Algorithms. Slides by Kevin Wayne Pearson-Addison Wesley. All rights reserved. Chapter 11 Approximation Algorithms Slides by Kevin Wayne. Copyright @ 2005 Pearson-Addison Wesley. All rights reserved. 1 Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should

More information

The 9 th Romanian Master of Mathematics Competition

The 9 th Romanian Master of Mathematics Competition The 9 th Romanian Master of Mathematics Competition Day 1 Solutions Problem 1. (a) Proe that eery positie integer n can be written uniquely in the form 2k+1 n = ( 1) j 1 2 m j, j=1 where k 0 and 0 m 1

More information

Node-based Service-Balanced Scheduling for Provably Guaranteed Throughput and Evacuation Time Performance

Node-based Service-Balanced Scheduling for Provably Guaranteed Throughput and Evacuation Time Performance Node-based Service-Balanced Scheduling for Provably Guaranteed Throughput and Evacuation Time Performance Yu Sang, Gagan R. Gupta, and Bo Ji Member, IEEE arxiv:52.02328v2 [cs.ni] 8 Nov 207 Abstract This

More information