# How Asymmetry Helps Load Balancing

Save this PDF as:

Size: px
Start display at page:

## Transcription

3 Once we have seen that choosing the locations in a nonuniform way combined with an asymmetric tie breaking mechanism reduces the maximum load, it becomes an interesting question whether other kinds of choices for the locations or other schemes for deciding which of these locations finally gets the ball can improve on this result The following theorem answers this question negatively Theorem 2 Suppose that balls are placed sequentially into bins using an arbitrary sequential allocation scheme choosing bins for each ball at random according to an arbitrary probability distribution on O (type 3 Then the number of balls in the fullest bin is!, whp Combining Theorem 1 and 2, we conclude that, apart from some additive constants, the AlwaysGoeft algorithm achieves the best possible maximum load, ie,! Generalizations t is also interesting to study variants of the random allocation process assuming more balls than bins or even an infinite sequence of insertions and deletions We use a combined approach to model both of these variants n particular, we assume a possibly infinite sequence 4 of insertions and deletions of balls Each insertion corresponds to a ball that has to be assigned to one of the bins, each deletion specifies one of the previously inserted balls that is removed from the bin to which it has been assigned An allocation algorithm has to serve all allocations online, that is, the sequence is presented one by one and a ball has to be placed for each insertion without knowing future insertions and deletions, ie, The sequence is assumed to be oblivious, ie, it does not depend on the random choices of the allocation algorithm Next we give a generalized version of Theorem 1 Time denotes that point of time at which is presented but not yet served, and a ball is said to exist at time if it has been inserted but not deleted before Theorem 1 (generalized version Suppose that at most balls exist at any point of time Then the AlwaysGoeft algorithm yields maximum load, whp, at any fixed time step Assuming only insertions and no deletions, our model degenerates to the static problem of allocating balls to bins The corresponding best known upper bound for the uniform allocation process is (, whp, given Azar et al in [2] Assuming and that, after insertions, the sequence alternates between deletions of balls that are chosen uniformly at random from the set of existing balls and insertions of new balls, our model corresponds to the dynamic problem considered by Azar et al in [2] They show an upper bound on the maximum load of the uniform allocation process of!, whp, for any fixed step G < Assuming and arbitrary insertions and deletions, our model corresponds to the one considered by Cole et al in [4, 3] n [4] they investigate a more complicated routing problem on butterfly networks Translating their results to the simpler problem of placing balls into bins yields an upper bound of &, for This translation is described explicitly in [3] Furthermore, they present an upper bound of!, which, however, holds only for a polynomial number of steps The bound increases slightly with time in an infinite setting Applying our proof techniques to the uniform process we obtain the following improvement Theorem 3 Suppose that at most balls exist at any point of time Then using the uniform allocation algorithm yields maximum load, whp, at any fixed time step The rest of the paper is organized as follows n Section 2, we will prove the upper bounds given in the Theorems 1 and 3 We will first analyze the infinite symmetric scheme (Theorem 3, and then we will show how the analysis changes when considering the asymmetric scheme (Theorem 1 Finally, in Section 3, we will present the proof for the lower bound given in Theorem 2 2 Proof of the Upper Bounds n this section, we prove the upper bounds given in the Theorems 1 and 3 We are given an infinite sequence of insertions and deletions of balls, as described in the ntroduction There are bins, and the number of balls that exist at the same time is at most Each ball is placed in one out of possible locations We investigate the maximum load produced by the symmetric, uniform and the asymmetric, nonuniform allocation process n both the symmetric and the asymmetric case, we use the same kind of analysis, that is, we use witness trees to bound the probability for the bad event that a bin contains too many balls This witness tree is a tree graph the nodes of which represent balls whose randomly chosen locations are arranged in a bad fashion n Section 21, we will describe the construction of a symmetric witness tree for the symmetric allocation scheme n Section 22, we will show how this construction changes in the asymmetric case nitially, we make some simplifying assumptions First, we assume that all events represented by a witness tree are stochastically independent n Section 23, we will remove this simplifying assumption and give a common solution for dealing

4 with dependencies in both the symmetric and the asymmetric case The second simplifying assumption is that, ie, at most balls exist at any time Finally, in Section 24 we will extend our proofs to general The witness tree analysis is not a new idea of ours t has been introduced by Scheideler, Stemann, and Meyer auf der Heide in the context of PRAM simulations [7] Their argument has been improved by several authors in several articles, eg, [1, 3, 4, 8] Only some of these analyses, however, deal with the sequential allocation of balls to bins, namely [3, 4] They lose some constant factor in the maximum load whereas our analysis is tight up to an additive constant Furthermore, we remark that the finite variant of the asymmetric allocation scheme can be analyzed using the techniques introduced by Azar et al [2] or Mitzenmacher [9, 10], too We prefer the witness tree analysis, however, as it naturally extends to the case of infinite sequences of adversarial insertions and deletions, which cannot be handled by any of the other methods so far 21 The witness tree for the symmetric scheme A witness tree is a logical structure that can be constructed in case of a bad event, ie, when the maximum load exceeds some threshold value which we will specify later Thus an active witness tree is a necessary condition for bad events n the following, we will show that the existence of an active witness tree is unlikely Consequently, bad events are unlikely, too Definition of a symmetric witness tree A symmetric witness tree of order is a complete ary tree of height with leaf nodes Each node in this tree represents a ball The assignment of balls to bins has to fulfill the following time constraints Consider a fixed sequence of insertions and deletions and let denote the fixed time step given in the theorem The ball represented by the root node exists at time, and each ball represented by a node exists at the insertion time of the ball represented by the parent node of Note that the same ball may be represented by several nodes in the tree Each node of the witness tree represents an event that may occur or not, depending on the random choices for the locations of the balls We distinguish between edge and leaf events Edge event: Consider an edge * with being the th child of The edge represents the event that the th location of s ball points to the same location as one of the locations of s ball eaf event: A leaf node represents the event that each of the locations of s ball points to a bin that contains at least three balls at its insertion time An edge or a leaf node is activated if the random choices for the possible locations of the balls come out in such a way that the corresponding event occurs The witness tree is activated if all of its edges and leaf nodes are activated Construction of a symmetric witness tree We use an active witness tree of order to represent the bad event that some of the bins contain more than balls at time Assume the allocation process is determined up to time Suppose that a bin holds at least balls at time We show that this implies that there exists an active witness tree of order This tree can be constructed as follows The root gets assigned the topmost ball in the bin, ie, the ball that was inserted last into The symmetric allocation scheme ensures that each of the locations of that ball must point to a bin that contains at least balls at the ball s insertion time The topmost balls in these bins are assigned to the children of the root This construction can be continued recursively until we reach the leaf nodes Each ball assigned to a leaf node lies on top of three other balls, and, hence, each of its locations points to a bin that contains three other balls at the ball s insertion time Probability for the activation of a symmetric witness tree As a bin including more than balls implies the existence of an active witness tree of order, the probability that the maximum load is larger than at some time is bounded by the probability that a witness tree of order is active n the following, we calculate a bound on the the latter probability During this calculation we do not make any use of the explicit construction of the witness tree but only of its formal definition We point out that drawing to the construction instead would result in vast dependencies among the considered events The probability that a witness tree of order is active is bounded above by the number of different witness trees multiplied by the probability that any fixed witness trees becomes active n this section, we account only for witness trees whose nodes represent distinct balls, that is, we assume that each ball occurs at most once in the witness tree n Section 23 we will show how to deal with witness trees that may include the same ball for several times We start by counting the number of different witness trees The number of possibilities to choose the root s ball is at most because, by definition, this ball has to exist at the considered time, and at most balls exist at any time The ball represented by the root gives us the time step at which the balls corresponding to the children of the root have to exist Hence, the number of possibilities to assign a ball to one of the children is, too Applying this argument level by level to all nodes in the tree yields that the total number of possibilities to choose a ball for each of the nodes

5 1 is at most with denoting the number of nodes in the witness tree Next we bound the probability that a fixed witness tree is activated The probability that the event represented by an edge * occurs is! because, whatever bin the th location of points to, the probability that any fixed one of the locations of hit that bin is! Because of our assumption that all balls are distinct, the events for all edges in the tree are independent, and therefore, the probability! that all of the edges are activated is The probability for the event represented by a leaf node is at most JK because each of the locations of ball has to point to a bin that contains 3 balls and at any time the number of these bins is bounded above by? Note that the latter bound on the number of bins with load holds deterministically so that we can assume that the occurrence of a leaf event does not give any evidence about the distribution of any other balls than the one represented by the respective leaf node Therefore, the probability that all of the leaf events occur is at most KB with denoting the number of leaves in the tree Altogether, we can conclude that the probability that there exists an active symmetric witness tree with distinct balls at any fixed time is at most KB, and K K KB because, Consequently, Q?R if we choose then the probability for the existence of a witness tree with distinct balls is at most K n Section 13 we will extend this argument to witness trees with nondistinct balls Before, however, we will investigate how the bound above improves in the case of the AlwaysGoeft algorithm 22 The witness tree for the asymmetric scheme The witness trees that we will construct for the asymmetric allocation scheme are asymmetric, too We will see that the asymmetric trees are much larger than their symmetric counterparts, resulting in a smaller probability for their activation Definition of an asymmetric witness tree An asymmetric witness tree is defined similarly to its symmetric counterpart The only difference is the topology t is a Fibonacci tree, which is defined recursively as follows! and consist out of a single node, respectively #"*, for ", is a rooted tree whose root has " children which are the roots of the trees #"!!, from left to right #", for " G, is a rooted tree whose root has children which are the roots of the trees #" 4 4 #" The number of leaves in #"* is! #" K An asymmetric witness tree of order has the topology of the Fibonacci tree! Hence, it has!! leaves The activation of an asymmetric witness tree is defined analogously to the symmetric case Construction of an asymmetric witness tree Suppose some of the bins contain more than balls at time n this case, we can construct an active, asymmetric witness tree as follows To simplify the construction, we define labels for the nodes of the witness tree Each label is a tuple of two integers and with and The labels are not unique The label of the root is! For, the children of a node with label have the labels! 4! 4 4, from left to right The children of a node with label, for, have the labels J!! n the construction of the witness tree we assign balls to the nodes maintaining the following invariant: A ball that is assigned to a node with label was placed into a bin that contained at least other balls at s insertion time This bin belongs to group (except for the root node for which we do not care about the group The assignment proceeds iteratively, starting with the root The root gets assigned the topmost ball in one of the bins including balls For, the th location of this ball points to a bin that contains at least balls at time The topmost ball of location is assigned to that child with label Now assume that we are given a node with label whose ball is allocated to a bin in group that contains at least ( other balls at s insertion time For E, the th location of points to a bin that contains at least balls This is because the Always Goeft scheme prescribes that would have been placed at the th location, otherwise We assign the topmost ball of location to the child with label (provided that and are sufficiently large such that the respective child exists For, the th location of contains at least balls at s insertion time n this case, we assign the topmost ball of location to the child with label (provided that the respective child exists Obviously, these assignments fulfill the invariant above Probability for the activation of an asymmetric witness tree We derive the same bounds on the number of trees and the probability for the activation of a fixed tree as in the symmetric case The number of different witness trees is

6 with denoting the number of nodes in the tree The probability that all edge events occur is at most, and the probability that all leaf events occur is KB with denoting the number of leaves in the tree For the bound on the probability of the edge events, we assume that all groups have exactly the same size t is not difficult to see, however, that our analysis is robust against changes of constant factors in the group sizes The bound on the probability for the leaf events may need some further explanations Analogously to the symmetric case, at most? bins contain three or more balls at any time, but we do not know how these bins are distributed among the groups For, let denote the fraction of bins in group that contain three or more bins Then the probability that all locations of a ball hit one of these bins is ( Since all groups have size we get & (*? and, hence, & (*? As the product of some positive variables that sum up to a fixed value is maximized when the values of all variables are equal, we can conclude that the probability for a leaf event is * K Combining the bounds above yields that the probability that there exists an active asymmetric witness tree with distinct balls at any fixed time is at most KB, and KB K K because, The only difference to the symmetric case is that the asymmetric tree is larger and, hence, the number of leaves,, is larger, which results in a smaller probability for the activation of the tree n particular, if we choose, the probability for the existence of a witness tree with distinct balls is at most K 23 Witness trees with nondistinct balls Until now we have only estimated the probability for the activation of witness trees with distinct balls n order to get a bound on the probability for a high maximum load, it remains to consider trees in which balls may occur more than once n this case the events represented by the edges and leaves are not stochastically independent anymore, which was an important assumption in the calculations above To remove these dependencies, we prune the witness tree such that only distinct balls remain Unfortunately, any pruning makes the tree smaller so that the probability for its activation may become larger We compensate this loss by starting from a larger tree and, additionally, gaining some probability from each pruning event Definition of a full witness tree A full witness tree of order includes symmetric or asymmetric witness trees of the same order, respectively, as subtrees, where denotes a suitable constant The root of the full witness tree has children each of which has only one child Hence, the root of the full tree has grandchildren Each of these grandchildren is the root of a symmetric or asymmetric witness tree of order, respectively The most important new feature of the full witness tree is that the balls assigned to the children of the root are guaranteed to be pairwise distinct The root represents the same ball as one of its children, eg, the ball of the leftmost child We define that each ball assigned to a child of the root has a location that points to the same bin as the root (just as in case of the symmetric or asymmetric witness tree et denote the index of this location, and choose from 4 arbitrarily et denote s only child Then one of the locations of s ball points to the same bin as the location of Below the node our definitions follow the rules of the symmetric or asymmetric witness tree, respectively The time constraints among all balls in the full tree and the activation of the full tree are defined analogously to the symmetric and asymmetric trees Construction of a full witness tree The full witness tree is constructed as follows Suppose some bin holds holds balls at time Then we assign the topmost balls in to the children of the root, and we assign the ball of the leftmost child to the root, too Next we assign balls to the grandchildren Consider a ball assigned to a child of the root One of s locations points to the bin et this be location (f there are more than one location pointing to, fix one arbitrarily Select arbitrarily At s insertion time, location points to a bin with at least balls The topmost ball in this bin is assigned to the child of Below this child, the construction is continued as done for the symmetric or asymmetric witness tree of order, respectively Pruning the full witness tree n order to remove dependencies we inspect the nonroot nodes of the full witness tree in BFS order Whenever we inspect a node that represents the same ball as another node inspected before, we cut the edge between and its parent node and cutoff the complete subtree rooted at The edge is called a cutoff edge, and we keep it in our witness structure as evidence that the ball of the parent node of shares a location with a ball represented by another node in the tree We continue this process until we have obtained either cutoff edges or we have inspected all nonpruned nodes All inspected, nonpruned nodes and the cutoff edges are defined to build the pruned witness tree Notice that the pruning does not remove any of the chil

7 dren of the root because these nodes represent distinct balls and they are visited first since we traverse the tree in BFS order skipping the root Therefore, if there fewer than cutoff edges, one of the symmetric or asymmetric witness trees includes only distinct balls We have bounded above the probability for the existence of such a witness tree in the previous sections by,k, for any constant, under the assumption that is chosen sufficiently large Therefore, it remains only to estimate the probability for the existence of an active pruned witness tree that includes exactly cutoff edges n the following, we upperbound this probability under the assumption that each of the witness trees below the grandchildren of the root has at most! nodes t is easy to check that this number of nodes suffices to obtain probability K in the case of a subtree with distinct balls Probability for the activation of a pruned witness trees We have to take into account that a pruned witness tree can have several different topologies et *! denote the number of those edges in the full tree that may become a cutoff edge The number of different topologies for the pruned witness tree is at most Now assume the topology is fixed et denote the number of nonroot nodes in the pruned witness tree Then the number of possibilities to assign balls to the tree nodes is (Recall that the ball of the root is identical to the ball of its leftmost child Furthermore, the probability that all edge events are activated is! (Notice that the edge connecting the root with its leftmost child is active by definition All other edge events have probability!, and these probabilities are independent as we have truncated all redundant balls et denote the number of leaves in the pruned tree, ie, the nodes that have no children and are not incident to cutoff edges Then, the probability that all leaves are activated is at most KB Apparently, we obtained almost the same bounds as for the symmetric and asymmetric witness trees However, and may be much smaller now so that we need to gain some further probability from the cutoff edges Each of the cutoff edges witnesses the event that a ball represented by a nonpruned node incident to the cutoff edge shares some random location with a ball of another node The node was inspected before without being truncated and, hence, is guaranteed to be included in the pruned tree, too The cutoff edge specifies which of the randomly chosen locations of hits one of the locations of This location of falls into the same bin as one of the location of n the following we give a bound for the probability of this event The number of possibilities to select and thus is bounded above by the number of nodes in the pruned tree minus the node itself This number is upper bounded by The probability that the location of hits one of the locations of the fixed ball is at most! Thus, is an upper bound on the probability for the event represented by a cutoff edge Notice that the randomly chosen location represented by the cutoff edge is not considered in any bound on the probability for the activation of the edge and leaf events Furthermore, events represented by different cutoff edges are independent, too Therefore, we obtain the following upper bound on the probability for the existence of a pruned witness tree with cutoff edges KB < KB < because (,, and Since our Theorems are obvious for, we assume Then the last term in the equation above is bounded by K Combining this result with the bounds given in the previous sections, we obtain that the probability that the load exceeds in the symmetric case, or in the asymmetric case, is at most,k M completes the proof of Theorem 1 and 3, for 24 More balls than bins K, This Finally, we extend the above proof to general, that is, we assume balls may exist at the same time The definitions of the symmetric and asymmetric witness trees are changed as follows Each leaf node in the witness tree represents balls rather than only one The locations of these balls point to bins that contain balls, for constant, rather than only balls Under these assumptions, the probability for the existence of an active witness trees with distinct balls can be bounded as follows et denote the number of nodes and the number of leafs in the tree Then the number of possibilities to assign balls to the nodes is at most K

8 This is because there are possibilities to choose the balls for each leaf node, and possibilities to choose the ball for each internal node The probability for each edge event is! As before, the tree includes edges The edges to the leaves, however, represent edge events now Thus, the probability for the activation of all edge events is The probability that all of the locations of a ball point to a bin with balls is K However, we cannot account this probability for all of the balls assigned to the leaves because, when estimating the probability for the edge events, we assumed that all balls assigned to the same leaf node share a random location Consequently, we have only! independent locations for the balls at each leaf node Thus, the probability for the activation of all leaf nodes is at most K K Combining these bounds, the probability for the existence of a witness tree with distinct balls is bounded above by M K K M which, for chosen sufficiently large, is bounded above by K, analogously to the case The rest of the proof proceeds as before 3 Proof of the ower Bound n this section, we prove the lower bound given in Theorem 2 Suppose balls are placed sequentially into bins using an arbitrary sequential allocation scheme choosing bins for each ball at random according to an arbitrary probability distribution We show that the number of balls in the fullest bin is!, whp The major issue in proving this lower bound is that the possibly dependent random choices for the locations of a ball are very difficult to handle As a first step to separate the effects of different locations, we assume that the allocation algorithm uses disjoint groups each of which consists of bins numbered from to Obviously, any algorithm in the original model (with a total number of bins can be simulated by an algorithm in the new model (with bins so that the maximum load of is not larger than the maximum load of (Recall that we allow full knowledge about the distribution of previously placed balls Hence, a lower bound in the model with bins holds for the original model with bins, too et and 4 denote some positive, real numbers We define an 4 allocation to be an assignment of at least balls to at most & bins satisfying the following properties: The bins are divided into groups with 6, for Each of the balls is placed into one out of bins chosen according to an arbitrary, fixed probability distribution 2 The balls are assigned one after the other When a ball is placed, the random choices for the locations of those balls that have not yet been placed are unknown The maximum load of an 4 allocation is defined to be the number of balls in the fullest bin The aggregate load is defined by & (*, with denoting the number of balls in the fullest bin from the set 2 The following lemma gives a lower bound on the aggregate load of an 4 allocation scheme emma 4 For any 4 4 allocation scheme,, whp This lemma implies the lower bound given in Theorem 2 because n the rest of this section we deal with the proof of this lemma We lowerbound the aggregate load by a recursive function Given some positive real numbers, we define if E, and 0 if and, where! B, for 4 emma 5 Suppose 4 is sufficiently large et denote some positive numbers with, for Then the aggregate load of an 4 allocation is at least, with probability K, for any constant Proof We prove the lemma by induction, that is, we assume that the lemma holds for any allocation with E We allow that the failure probability is slightly increasing during the induction n particular, we assume that the aggregate load of the 4 allocation is at least 4 4, with probability,k rather than only K Notice, however, over all induction steps we lose only a factor of in the failure probability since we need induction steps no more than et denote the set of balls that have to be placed in the bins Each of the balls comes with locations chosen according to some probability distribution

10 G E G = Applying a Chernoff bound yields that, with probability at most,k(, the number of balls in is at least assuming that is sufficiently large and so that the Chernoff bound yields the desired result This equation shows that property 2 is satisfied and, hence, the proof of emma 5 is completed The lower bound on the aggregate load of an 4 4 allocation that we can obtain from emma 5 depends on how often we can apply the recursion until the parameter becomes smaller than n the following we investigate how behave when the recursion is applied iteratively Set, and let 4 4 denote the values of 4 4, respectively, after the recursion has been applied emma 6 constant G times, for some suitable Proof We start by introducing another, simpler recursion, which we will relate to the original recursion afterwards For, we define a vector of positive, real values as follows We define For, we define M M, and, for Notice that M K M, for, which shows that is related to the Fibonacci numbers! since! P!!!!, for We can expect that these two recursions behave similarly n fact, having a closer look to both of these recursion gives us (! ( for any n the following, we will use, that is, we show K \$ # to bound, which corresponds to the for some suitable constant G bound given in the lemma n order to prove this relationship between and, we need first to show some properties of Suppose instead of setting J4 4 we define 4, for some numbers 4 Then one can show by induction!! ( KB! for any Thus, is monotonically increasing in and monotonically decreasing in 4 4 Furthermore, one can observe that exchanging some of the initial values so that E, for some, does not increase the value of for any Another property of that can be shown by induction is that for any Hence, any vector fulfills the property that we assumed for the initial vector Therefore, exchanging some of the vector components 4 4 in the th iteration of the recursion does not increase the value of for any by Now consider the vectors Q?R 4, defined for any and Converting the recursion to the vectors, we derive the following recursive description of The initial vector is, and, for, M M, and, for any / Here! are some integers from which are controlled by the minimum operator in recursion The recursion differs from the recursion in only two aspects First, the integers determine which of the components 4 is subtracted from M and then replaced by n comparison to the recursion this mechanism corresponds simply to permuting the components 4 4 in iteration We have seen above that this does not increase for any Second, we add a positive value of 05 to one of the components in each iteration Because of the monotonicity property shown above, this does not increase, too for any

11 G Consequently, conclude, for any Thus, we can K K \$ which completes the proof of emma 6 Combining emma 5 and emma 6 we can derive a lower bound on the aggregate load as follows From emma 5 we can conclude that the aggregate load of an allocation is at least The value of is equal to the recursion depth The recursion ends at the first iteration with E From emma 6, we can conclude that \$ P, for some suitable constant Hence, satisfies \$ E Solving this equation for yields [6] D E Knuth The Art of Computer Programming, Volume 3 Addison Wesley, 1998 [7] F Meyer auf der Heide, C Scheideler, and V Stemann Exploiting storage redundancy to speed up randomized shared memory simulations n Proc of the 12th Symp on Theoretical Aspects of Computer Science (STACS, pages , 1995 [8] F Meyer auf der Heide, K Schröder, and F Schwarze Routing on networks of optical crossbars n Proc of the Euro Par 96, pages , 1996 [9] M Mitzenmacher oad balancing and density dependent jump Markov processes n Proc of the 37th EEE Symp on Foundations of Computer Science (FOCS, pages , 1996 [10] M Mitzenmacher The Power of Two Choices in Randomized oad Balancing PhD thesis, University of California at Berkeley, 1996 which corresponds to the bound given in emma 4, and hence completes the proof of Theorem 2 4 Acknowledgments would like to thank Artur Czumaj and Klaus Schröder for helpful discussions and Valerie King for suggesting the name of the algorithm, AlwaysGoeft References [1] M Adler, P Berenbrink, and K Schröder Analyzing an infinite parallel job allocation process n Proc of the 6th European Symposium on Algorithms (ESA, pages , 1998 [2] Y Azar, A Broder, A Karlin, and E Upfal Balanced allocations n Proc of the 26th ACM Symp on Theory of Computing (STOC, pages , 1994 [3] R Cole, B M Maggs, F Meyer auf der Heide, M Mitzenmacher, A W Richa, K Schröder, R K Sitaraman, and B Vöcking Randomized protocols for lowcongestion circuit routing in multistage interconnection networks n Proc of the 30th ACM Symp on Theory of Computing (STOC, pages , 1998 [4] R J Cole, A Frieze, B M Maggs, M Mitzenmacher, A W Richa, R K Sitaraman, and E Upfal On balls and bins with deletions n Proc of the RANDOM 98, 1998 [5] R Karp, M uby, and F Meyer auf der Heide Efficient PRAM simulation on a distributed memory machine n Proc of the 24th ACM Symp on Theory of Computing (STOC, pages , 1992

### Data Management in Hierarchical Bus Networks

Data Management in Hierarchical Bus Networks F. Meyer auf der Heide Department of Mathematics and Computer Science and Heinz Nixdorf Institute, Paderborn University, Germany fmadh@upb.de H. Räcke Department

### Competitive Analysis of On line Randomized Call Control in Cellular Networks

Competitive Analysis of On line Randomized Call Control in Cellular Networks Ioannis Caragiannis Christos Kaklamanis Evi Papaioannou Abstract In this paper we address an important communication issue arising

### CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma

CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are

Load Balancing with Memory Michael Mitzenmacher Harvard University michaelm@eecs.harvard.edu Balaji Prabhakar Stanford University balaji@stanford.edu Devavrat Shah Stanford University devavrat@cs.stanford.edu

Load Balancing Backtracking, branch & bound and alpha-beta pruning: how to assign work to idle processes without much communication? Additionally for alpha-beta pruning: implementing the young-brothers-wait

### Load Balancing and Switch Scheduling

EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: liuxh@systems.stanford.edu Abstract Load

### Online Bipartite Perfect Matching With Augmentations

Online Bipartite Perfect Matching With Augmentations Kamalika Chaudhuri, Constantinos Daskalakis, Robert D. Kleinberg, and Henry Lin Information Theory and Applications Center, U.C. San Diego Email: kamalika@soe.ucsd.edu

### MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research

MapReduce and Distributed Data Analysis Google Research 1 Dealing With Massive Data 2 2 Dealing With Massive Data Polynomial Memory Sublinear RAM Sketches External Memory Property Testing 3 3 Dealing With

### 2.3 Scheduling jobs on identical parallel machines

2.3 Scheduling jobs on identical parallel machines There are jobs to be processed, and there are identical machines (running in parallel) to which each job may be assigned Each job = 1,,, must be processed

### Decentralized Utility-based Sensor Network Design

Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA narayans@cs.usc.edu, bkrishna@usc.edu

### The Relative Worst Order Ratio for On-Line Algorithms

The Relative Worst Order Ratio for On-Line Algorithms Joan Boyar 1 and Lene M. Favrholdt 2 1 Department of Mathematics and Computer Science, University of Southern Denmark, Odense, Denmark, joan@imada.sdu.dk

### Topology-based network security

Topology-based network security Tiit Pikma Supervised by Vitaly Skachek Research Seminar in Cryptography University of Tartu, Spring 2013 1 Introduction In both wired and wireless networks, there is the

### Tight Bounds for Parallel Randomized Load Balancing (TIK Report Number 324) Revised November 5, 2010 Revised February 26, 2010

Tight Bounds for Parallel Randomized Load Balancing (TIK Report Number 324) Revised November 5, 2010 Revised February 26, 2010 Christoph Lenzen, Roger Wattenhofer {lenzen,wattenhofer}@tik.ee.ethz.ch Computer

### Fairness in Routing and Load Balancing

Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria

### Lecture 1: Course overview, circuits, and formulas

Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik

### Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding

### arxiv:1112.0829v1 [math.pr] 5 Dec 2011

How Not to Win a Million Dollars: A Counterexample to a Conjecture of L. Breiman Thomas P. Hayes arxiv:1112.0829v1 [math.pr] 5 Dec 2011 Abstract Consider a gambling game in which we are allowed to repeatedly

### The Goldberg Rao Algorithm for the Maximum Flow Problem

The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }

### Lecture 7: Approximation via Randomized Rounding

Lecture 7: Approximation via Randomized Rounding Often LPs return a fractional solution where the solution x, which is supposed to be in {0, } n, is in [0, ] n instead. There is a generic way of obtaining

### The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge,

The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge, cheapest first, we had to determine whether its two endpoints

### ! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.

Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of

### Measuring the Performance of an Agent

25 Measuring the Performance of an Agent The rational agent that we are aiming at should be successful in the task it is performing To assess the success we need to have a performance measure What is rational

### princeton univ. F 13 cos 521: Advanced Algorithm Design Lecture 6: Provable Approximation via Linear Programming Lecturer: Sanjeev Arora

princeton univ. F 13 cos 521: Advanced Algorithm Design Lecture 6: Provable Approximation via Linear Programming Lecturer: Sanjeev Arora Scribe: One of the running themes in this course is the notion of

### Cost Model: Work, Span and Parallelism. 1 The RAM model for sequential computation:

CSE341T 08/31/2015 Lecture 3 Cost Model: Work, Span and Parallelism In this lecture, we will look at how one analyze a parallel program written using Cilk Plus. When we analyze the cost of an algorithm

### Lecture 6 Online and streaming algorithms for clustering

CSE 291: Unsupervised learning Spring 2008 Lecture 6 Online and streaming algorithms for clustering 6.1 On-line k-clustering To the extent that clustering takes place in the brain, it happens in an on-line

### ! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.

Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three

### Distributed Computing over Communication Networks: Maximal Independent Set

Distributed Computing over Communication Networks: Maximal Independent Set What is a MIS? MIS An independent set (IS) of an undirected graph is a subset U of nodes such that no two nodes in U are adjacent.

### Lecture 4 Online and streaming algorithms for clustering

CSE 291: Geometric algorithms Spring 2013 Lecture 4 Online and streaming algorithms for clustering 4.1 On-line k-clustering To the extent that clustering takes place in the brain, it happens in an on-line

### CSC2420 Fall 2012: Algorithm Design, Analysis and Theory

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms

### Partitioning edge-coloured complete graphs into monochromatic cycles and paths

arxiv:1205.5492v1 [math.co] 24 May 2012 Partitioning edge-coloured complete graphs into monochromatic cycles and paths Alexey Pokrovskiy Departement of Mathematics, London School of Economics and Political

### 8.1 Min Degree Spanning Tree

CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree

### 6.852: Distributed Algorithms Fall, 2009. Class 2

.8: Distributed Algorithms Fall, 009 Class Today s plan Leader election in a synchronous ring: Lower bound for comparison-based algorithms. Basic computation in general synchronous networks: Leader election

### Full and Complete Binary Trees

Full and Complete Binary Trees Binary Tree Theorems 1 Here are two important types of binary trees. Note that the definitions, while similar, are logically independent. Definition: a binary tree T is full

### Offline sorting buffers on Line

Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: rkhandekar@gmail.com 2 IBM India Research Lab, New Delhi. email: pvinayak@in.ibm.com

### Approximation Algorithms

Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

### Analysis of Algorithms I: Binary Search Trees

Analysis of Algorithms I: Binary Search Trees Xi Chen Columbia University Hash table: A data structure that maintains a subset of keys from a universe set U = {0, 1,..., p 1} and supports all three dictionary

### root node level: internal node edge leaf node CS@VT Data Structures & Algorithms 2000-2009 McQuain

inary Trees 1 A binary tree is either empty, or it consists of a node called the root together with two binary trees called the left subtree and the right subtree of the root, which are disjoint from each

### Virtual Time and Timeout in Client-Server Networks

Virtual Time and Timeout in Client-Server Networks Jayadev Misra July 13, 2011 Contents 1 Introduction 2 1.1 Background.............................. 2 1.1.1 Causal Model of Virtual Time...............

### On the k-path cover problem for cacti

On the k-path cover problem for cacti Zemin Jin and Xueliang Li Center for Combinatorics and LPMC Nankai University Tianjin 300071, P.R. China zeminjin@eyou.com, x.li@eyou.com Abstract In this paper we

### Online and Offline Selling in Limit Order Markets

Online and Offline Selling in Limit Order Markets Kevin L. Chang 1 and Aaron Johnson 2 1 Yahoo Inc. klchang@yahoo-inc.com 2 Yale University ajohnson@cs.yale.edu Abstract. Completely automated electronic

### IMPROVING PERFORMANCE OF RANDOMIZED SIGNATURE SORT USING HASHING AND BITWISE OPERATORS

Volume 2, No. 3, March 2011 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info IMPROVING PERFORMANCE OF RANDOMIZED SIGNATURE SORT USING HASHING AND BITWISE

### The Random Graph Threshold for k-orientiability and a Fast Algorithm for Optimal Multiple-Choice Allocation

The Random Graph Threshold for k-orientiability and a Fast Algorithm for Optimal Multiple-Choice Allocation Julie Anne Cain Peter Sanders Nick Wormald Abstract We investigate a linear time greedy algorithm

### Classification/Decision Trees (II)

Classification/Decision Trees (II) Department of Statistics The Pennsylvania State University Email: jiali@stat.psu.edu Right Sized Trees Let the expected misclassification rate of a tree T be R (T ).

### Factoring & Primality

Factoring & Primality Lecturer: Dimitris Papadopoulos In this lecture we will discuss the problem of integer factorization and primality testing, two problems that have been the focus of a great amount

20 Selfish Load Balancing Berthold Vöcking Abstract Suppose that a set of weighted tasks shall be assigned to a set of machines with possibly different speeds such that the load is distributed evenly among

### The LCA Problem Revisited

The LA Problem Revisited Michael A. Bender Martín Farach-olton SUNY Stony Brook Rutgers University May 16, 2000 Abstract We present a very simple algorithm for the Least ommon Ancestor problem. We thus

### Discrete Mathematics and Probability Theory Fall 2009 Satish Rao,David Tse Note 11

CS 70 Discrete Mathematics and Probability Theory Fall 2009 Satish Rao,David Tse Note Conditional Probability A pharmaceutical company is marketing a new test for a certain medical condition. According

Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one

### Revised Version of Chapter 23. We learned long ago how to solve linear congruences. ax c (mod m)

Chapter 23 Squares Modulo p Revised Version of Chapter 23 We learned long ago how to solve linear congruences ax c (mod m) (see Chapter 8). It s now time to take the plunge and move on to quadratic equations.

### Notes from Week 1: Algorithms for sequential prediction

CS 683 Learning, Games, and Electronic Markets Spring 2007 Notes from Week 1: Algorithms for sequential prediction Instructor: Robert Kleinberg 22-26 Jan 2007 1 Introduction In this course we will be looking

### Welcome to the course Algorithm Design

HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Welcome to the course Algorithm Design Summer Term 2011 Friedhelm Meyer auf der Heide Lecture 6, 20.5.2011 Friedhelm Meyer auf

### U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra

U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009 Notes on Algebra These notes contain as little theory as possible, and most results are stated without proof. Any introductory

### A single minimal complement for the c.e. degrees

A single minimal complement for the c.e. degrees Andrew Lewis Leeds University, April 2002 Abstract We show that there exists a single minimal (Turing) degree b < 0 s.t. for all c.e. degrees 0 < a < 0,

The Power of Two Random Choices: A Survey of Techniques and Results Michael Mitzenmacher Andrea W. Richa y Ramesh Sitaraman z 1 Introduction To motivate this survey, we begin with a simple problem that

### The Trip Scheduling Problem

The Trip Scheduling Problem Claudia Archetti Department of Quantitative Methods, University of Brescia Contrada Santa Chiara 50, 25122 Brescia, Italy Martin Savelsbergh School of Industrial and Systems

### Software Analysis (POPA Sec , )

Software Analysis (POPA Sec. 2.2.2, 2.5-2.5.2) Klaus Ostermann Based on slides by Jurriaan Hage Overview Correctness proof Live Variables Analysis The While language with procedures Live Variables Analysis

### OPRE 6201 : 2. Simplex Method

OPRE 6201 : 2. Simplex Method 1 The Graphical Method: An Example Consider the following linear program: Max 4x 1 +3x 2 Subject to: 2x 1 +3x 2 6 (1) 3x 1 +2x 2 3 (2) 2x 2 5 (3) 2x 1 +x 2 4 (4) x 1, x 2

### Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs

Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Stavros Athanassopoulos, Ioannis Caragiannis, and Christos Kaklamanis Research Academic Computer Technology Institute

### 1. LINEAR EQUATIONS. A linear equation in n unknowns x 1, x 2,, x n is an equation of the form

1. LINEAR EQUATIONS A linear equation in n unknowns x 1, x 2,, x n is an equation of the form a 1 x 1 + a 2 x 2 + + a n x n = b, where a 1, a 2,..., a n, b are given real numbers. For example, with x and

### Outline BST Operations Worst case Average case Balancing AVL Red-black B-trees. Binary Search Trees. Lecturer: Georgy Gimel farb

Binary Search Trees Lecturer: Georgy Gimel farb COMPSCI 220 Algorithms and Data Structures 1 / 27 1 Properties of Binary Search Trees 2 Basic BST operations The worst-case time complexity of BST operations

### MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.

MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column

### How Useful Is Old Information?

6 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 11, NO. 1, JANUARY 2000 How Useful Is Old Information? Michael Mitzenmacher AbstractÐWe consider the problem of load balancing in dynamic distributed

### A class of on-line scheduling algorithms to minimize total completion time

A class of on-line scheduling algorithms to minimize total completion time X. Lu R.A. Sitters L. Stougie Abstract We consider the problem of scheduling jobs on-line on a single machine and on identical

### SMT 2014 Algebra Test Solutions February 15, 2014

1. Alice and Bob are painting a house. If Alice and Bob do not take any breaks, they will finish painting the house in 20 hours. If, however, Bob stops painting once the house is half-finished, then the

### A Sublinear Bipartiteness Tester for Bounded Degree Graphs

A Sublinear Bipartiteness Tester for Bounded Degree Graphs Oded Goldreich Dana Ron February 5, 1998 Abstract We present a sublinear-time algorithm for testing whether a bounded degree graph is bipartite

### The Graphical Method: An Example

The Graphical Method: An Example Consider the following linear program: Maximize 4x 1 +3x 2 Subject to: 2x 1 +3x 2 6 (1) 3x 1 +2x 2 3 (2) 2x 2 5 (3) 2x 1 +x 2 4 (4) x 1, x 2 0, where, for ease of reference,

### The Conference Call Search Problem in Wireless Networks

The Conference Call Search Problem in Wireless Networks Leah Epstein 1, and Asaf Levin 2 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. lea@math.haifa.ac.il 2 Department of Statistics,

### Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows

TECHNISCHE UNIVERSITEIT EINDHOVEN Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows Lloyd A. Fasting May 2014 Supervisors: dr. M. Firat dr.ir. M.A.A. Boon J. van Twist MSc. Contents

### CONTINUED FRACTIONS AND FACTORING. Niels Lauritzen

CONTINUED FRACTIONS AND FACTORING Niels Lauritzen ii NIELS LAURITZEN DEPARTMENT OF MATHEMATICAL SCIENCES UNIVERSITY OF AARHUS, DENMARK EMAIL: niels@imf.au.dk URL: http://home.imf.au.dk/niels/ Contents

### The Random Graph Threshold for k-orientiability and a Fast Algorithm for Optimal Multiple-Choice Allocation

The Random Graph Threshold for k-orientiability and a Fast Algorithm for Optimal Multiple-Choice Allocation Julie Anne Cain, U. Melbourne, Australia, J.Cain@ms.unimelb.edu.au and Peter Sanders,Universität

### Tight Bounds for Selfish and Greedy Load Balancing

Tight Bounds for Selfish and Greedy Load Balancing Ioannis Caragiannis 1, Michele Flammini, Christos Kaklamanis 1, Panagiotis Kanellopoulos 1, and Luca Moscardelli 1 Research Academic Computer Technology

### Converting Online Algorithms to Local Computation Algorithms

Converting Online Algorithms to Local Computation Algorithms Yishay Mansour 1, Aviad Rubinstein 1, Shai Vardi 1, and Ning Xie 2 1 School of Computer Science, Tel Aviv University, Israel 2 CSAIL, MIT, Cambridge

### What s next? Reductions other than kernelization

What s next? Reductions other than kernelization Dániel Marx Humboldt-Universität zu Berlin (with help from Fedor Fomin, Daniel Lokshtanov and Saket Saurabh) WorKer 2010: Workshop on Kernelization Nov

Adaptive Online Gradient Descent Peter L Bartlett Division of Computer Science Department of Statistics UC Berkeley Berkeley, CA 94709 bartlett@csberkeleyedu Elad Hazan IBM Almaden Research Center 650

### Analysis of Algorithms, I

Analysis of Algorithms, I CSOR W4231.002 Eleni Drinea Computer Science Department Columbia University Thursday, February 26, 2015 Outline 1 Recap 2 Representing graphs 3 Breadth-first search (BFS) 4 Applications

### A binary search tree is a binary tree with a special property called the BST-property, which is given as follows:

Chapter 12: Binary Search Trees A binary search tree is a binary tree with a special property called the BST-property, which is given as follows: For all nodes x and y, if y belongs to the left subtree

Online Adwords Allocation Shoshana Neuburger May 6, 2009 1 Overview Many search engines auction the advertising space alongside search results. When Google interviewed Amin Saberi in 2004, their advertisement

### D1.1 Service Discovery system: Load balancing mechanisms

D1.1 Service Discovery system: Load balancing mechanisms VERSION 1.0 DATE 2011 EDITORIAL MANAGER Eddy Caron AUTHORS STAFF Eddy Caron, Cédric Tedeschi Copyright ANR SPADES. 08-ANR-SEGI-025. Contents Introduction

### This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,

### Dynamic 3-sided Planar Range Queries with Expected Doubly Logarithmic Time

Dynamic 3-sided Planar Range Queries with Expected Doubly Logarithmic Time Gerth Stølting Brodal 1, Alexis C. Kaporis 2, Spyros Sioutas 3, Konstantinos Tsakalidis 1, Kostas Tsichlas 4 1 MADALGO, Department

### Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs

CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like

### 1 Approximating Set Cover

CS 05: Algorithms (Grad) Feb 2-24, 2005 Approximating Set Cover. Definition An Instance (X, F ) of the set-covering problem consists of a finite set X and a family F of subset of X, such that every elemennt

### GRAPH THEORY LECTURE 4: TREES

GRAPH THEORY LECTURE 4: TREES Abstract. 3.1 presents some standard characterizations and properties of trees. 3.2 presents several different types of trees. 3.7 develops a counting method based on a bijection

### An On-Line Algorithm for Checkpoint Placement

An On-Line Algorithm for Checkpoint Placement Avi Ziv IBM Israel, Science and Technology Center MATAM - Advanced Technology Center Haifa 3905, Israel avi@haifa.vnat.ibm.com Jehoshua Bruck California Institute

### Generating models of a matched formula with a polynomial delay

Generating models of a matched formula with a polynomial delay Petr Savicky Institute of Computer Science, Academy of Sciences of Czech Republic, Pod Vodárenskou Věží 2, 182 07 Praha 8, Czech Republic

### Faster deterministic integer factorisation

David Harvey (joint work with Edgar Costa, NYU) University of New South Wales 25th October 2011 The obvious mathematical breakthrough would be the development of an easy way to factor large prime numbers

### An Evaluation of Self-adjusting Binary Search Tree Techniques

SOFTWARE PRACTICE AND EXPERIENCE, VOL. 23(4), 369 382 (APRIL 1993) An Evaluation of Self-adjusting Binary Search Tree Techniques jim bell and gopal gupta Department of Computer Science, James Cook University,

### Applied Algorithm Design Lecture 5

Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design

### Reinforcement Learning

Reinforcement Learning LU 2 - Markov Decision Problems and Dynamic Programming Dr. Martin Lauer AG Maschinelles Lernen und Natürlichsprachliche Systeme Albert-Ludwigs-Universität Freiburg martin.lauer@kit.edu

### A Note on Maximum Independent Sets in Rectangle Intersection Graphs

A Note on Maximum Independent Sets in Rectangle Intersection Graphs Timothy M. Chan School of Computer Science University of Waterloo Waterloo, Ontario N2L 3G1, Canada tmchan@uwaterloo.ca September 12,

### An example of a computable

An example of a computable absolutely normal number Verónica Becher Santiago Figueira Abstract The first example of an absolutely normal number was given by Sierpinski in 96, twenty years before the concept

### Chapter 6. Cuboids. and. vol(conv(p ))

Chapter 6 Cuboids We have already seen that we can efficiently find the bounding box Q(P ) and an arbitrarily good approximation to the smallest enclosing ball B(P ) of a set P R d. Unfortunately, both

### Nonparametric adaptive age replacement with a one-cycle criterion

Nonparametric adaptive age replacement with a one-cycle criterion P. Coolen-Schrijner, F.P.A. Coolen Department of Mathematical Sciences University of Durham, Durham, DH1 3LE, UK e-mail: Pauline.Schrijner@durham.ac.uk

### Tight Bounds for Parallel Randomized Load Balancing

Tight Bounds for Parallel Randomized Load Balancing [Extended Abstract] ABSTRACT Christoph Lenzen Computer Engineering and Networks Laboratory ETH Zurich Switzerland lenzen@tik.ee.ethz.ch We explore the

### 1. (First passage/hitting times/gambler s ruin problem:) Suppose that X has a discrete state space and let i be a fixed state. Let

Copyright c 2009 by Karl Sigman 1 Stopping Times 1.1 Stopping Times: Definition Given a stochastic process X = {X n : n 0}, a random time τ is a discrete random variable on the same probability space as

### Some Polynomial Theorems. John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 rkennedy@ix.netcom.

Some Polynomial Theorems by John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 rkennedy@ix.netcom.com This paper contains a collection of 31 theorems, lemmas,

### Universal hashing. In other words, the probability of a collision for two different keys x and y given a hash function randomly chosen from H is 1/m.

Universal hashing No matter how we choose our hash function, it is always possible to devise a set of keys that will hash to the same slot, making the hash scheme perform poorly. To circumvent this, we

### Simulation-Based Security with Inexhaustible Interactive Turing Machines

Simulation-Based Security with Inexhaustible Interactive Turing Machines Ralf Küsters Institut für Informatik Christian-Albrechts-Universität zu Kiel 24098 Kiel, Germany kuesters@ti.informatik.uni-kiel.de