3 Distance in Graphs. Brief outline of this lecture
|
|
- Isabella White
- 7 years ago
- Views:
Transcription
1 Distance in Graphs While the preios lectre stdied jst the connectiity properties of a graph, now we are going to inestigate how long (short, actally) a connection in a graph is. This natrally leads to the concept of graph distance, which has two ariants: the simple one considering only the nmber of edges, while the weighted one haing a length for each edge. a b c Brief otline of this lectre d x Distance in a graph, basic properties, triangle ineqality. Graph metrics: all-pairs shortest distances. Dijkstra s algorithm for the shortest weighted distance in a graph. Rote planning: a sketch of some adanced ideas. Petr Hliněný, FI MU Brno FI: MA: Distance in Graphs
2 . Graph distance (nweighted) Recall that a walk of length n in a graph G is an alternating seqence of ertices and edges, e,, e,,...,e n, n sch that each e i has the ends i, i. Definition.. Distance d G (, ) between two ertices, of a graph G is defined as the length of the shortest walk between and in G. If there is now walk between,, then we declare d G (, ) =. Informally and natrally, the distance between, eqals the least possible nmber of edges traersed from to. Specially d G(, ) =. Recall, moreoer, that the shortest walk is always a path Theorem.. Fact: The distance in an ndirected graph is symmetric, i.e. d G (, ) = d G (, ). Lemma.. The graph distance satisfies the triangle ineqality:,, w V (G) : d G (, ) + d G (, w) d G (, w). Proof. Easily; starting with a walk of length d G (, ) from to, and appending a walk of length d G (, w) from to w, reslts in a walk of length d G (, ) + d G (, w) from to w. This is an pper bond on the real distance from to w. Petr Hliněný, FI MU Brno FI: MA: Distance in Graphs
3 How to find the distance Theorem.. Let,, w be ertices of a connected graph G sch that d G (, ) < d G (, w). Then the breadth-first search algorithm on G, starting from, finds the ertex before w. Proof. We apply indction on the distance d G (, ): If d G (, ) =, i.e. =, then it is triial that is fond first. So let d G (, ) = d > and be a neighbor of closer to, which means d G (, ) = d. Analogosly choose w a neighbor of w closer to. Then d G (, w ) d G (, w) > d G (, ) = d G (, ), and so has been fond before w by the indctie assmption. Hence has been stored into U before w, and (cf. FIFO) the neighbors of ( among them, bt not w) are fond before the neighbors of w (sch as w). Corollary.. The breadth-first search algorithm on G correctly determines graph distances from the starting ertex. Petr Hliněný, FI MU Brno FI: MA: Distance in Graphs
4 Other related terms Definition. Let G be a graph. We define, with respect to G, the following notions: The excentricity of a ertex exc() is the largest distance from to another ertex; exc() = max x V (G) d G (, x). The diameter diam(g) of G is the largest excentricity oer its ertices, and the radis rad(g) of G is the smallest excentricity oer its ertices. The center of G is the sbset U V (G) of ertices sch that their excentricity eqals rad(g). Petr Hliněný, FI MU Brno FI: MA: Distance in Graphs
5 . All-pairs shortest distances Definition: The metrics of a graph is the collection of distances between all pairs of its ertices. In other words, the metrics is a matrix d[,] sch that d[i,j] is the distance from i to j. Method.. Dynamic programming for all-pairs distances in a graph G on the ertex set V (G) = {,,..., N }. Initially, let d[i,j] be (alternatiely, the edge length of { i, j }), or if i, j are not adjacent. After step t let it hold that d[i,j] is the shortest length of a walk between i, j sch that its internal ert. are from {,,..., t } (empty for t = ). Moing from step t to t +, we pdate all the distances as: Either d[i,j] from the preios step is still optimal (the ertex t does not help to obtain a shorter walk from i to j ), or there is a shorter i to j walk sing (also) the ertex t which is, by the assmption at step t, of length d[i,t]+d[t,j] d[i,j]. Theorem.6. Method. correctly comptes the distance d[i,j] between each pair of ertices i, j in N = V (G) steps. Petr Hliněný, FI MU Brno FI: MA: Distance in Graphs
6 Remark: In a practical implementation we may se, say, MAX INT/ in place of. Algorithm.7. Floyd Warshall algorithm (cf..) inpt < the adjacency matrix G[,] of an N-ertex graph, sch that the ertices of G are indexed as...n-, and G[i,j]= if i, j adjacent and G[i,j]= otherwise; for (i=; i<n; i++) for (j=; j<n; j++) d[i,j] = (i==j?: (G[i,j]? : MAX INT/)); for (t=; t<n; t++) { for (i=; i<n; i++) for (j=; j<n; j++) d[i,j] = min(d[i,j], d[i,t]+d[t,j]); } retrn The distance matrix d[,] ; Notice that this Algorithm.7 is extremely simple and relatiely fast it needs abot N steps to get the whole distance matrix. Its only problem is that all-pairs distances mst be compted at the same time, een if we need to know jst one distance... Petr Hliněný, FI MU Brno 6 FI: MA: Distance in Graphs
7 . Weighted distance in graphs Definition: A weighted graph is a graph G together with a weighting w of the edges by real nmbers w : E(G) R (edge lengths in this case). A positiely weighted graph G, w is sch that w(e) > for all edges e. Definition.8. (Weighted distance) Consider a positiely weighted graph G, w. The length of the weighted walk S =, e,, e,,..., e n, n in G is the sm d w G(S) = w(e ) + w(e ) + + w(e n ). The weighted distance in G, w between a pair of ertices, is d w G (, ) = min{dw G (S) : S is a walk from to }. All these terms natrally extend from graphs to directed graphs. Analogosly to Section. we get: Fact: The shortest walk in a positiely weighted (di)graph is always a path. Lemma.9. The weighted distance in a positiely weighted (di)graph satisfies the triangle ineqality. Petr Hliněný, FI MU Brno 7 FI: MA: Distance in Graphs
8 See an example... a b c The distances between a c and between b c are. What abot the a b distance? Is it 6? No, the distance from a to b in the graph is (traerse the pper path ). Petr Hliněný, FI MU Brno 8 FI: MA: Distance in Graphs
9 Negatie edge-lengths? What is the reason we are aoiding negatie edge lengths? x y Hence, what is the x y distance this graph? Say, or? No, it is, precisely by Definition.8, and this answer does not sond nice... Hence we hae got a good reason not to consider negatie edges in general. Petr Hliněný, FI MU Brno 9 FI: MA: Distance in Graphs
10 . Single-sorce shortest paths problem This section deals with the more specific problem of finding the shortest distance between one pair of terminals in a graph (or, from a single sorce to all other ertices). Remark: The coming Dijkstra s algorithm is, on one hand, slightly more inoled than Algorithm.7, bt it is significantly faster in the comptation of single-sorce shortest distances, on the other hand. Dijkstra s algorithm: Is a ariant of graph searching (related to BFS), in which eery discoered ertex carries a ariable keeping its temporary distance the length of the shortest so far discoered walk reaching this ertex from the starting ertex. We always pick from the depository the ertex with the shortest temporary distance. This is becase no shorter walk may reach this ertex (assming nonnegatie edge lengths). At the end of processing, the temporary distances become final shortest distances from the starting ertex (cf. Theorem.). Petr Hliněný, FI MU Brno FI: MA: Distance in Graphs
11 Algorithm.. Compting the single-sorce shortest paths (Dijkstra), i.e. finding the shortest walk from to, or from to all other ertices. inpt < N-ertex graph gien by adjacency mat. G[,] and cor. lengths len[,]; inpt <,, where is the starting ertex and the destination; // state[i] records the ertex processing state, dist[i] is the temporary distance for (i=; i<n; i++) { dist[i] = MAX INT; state[i] = init ; } dist[] = ; depository D = {}; while (state[]!= processed ) { if (D== ) retrn No path ; select m D with minimal dist[m]; // now pdating all neighbors of m and their temporary distances for (i=; i<n; i++) if (G[m,i]) { D = D {i}; if (dist[m]+len[m,i]<dist[i]) { income[i] = m; dist[i] = dist[m]+len[m,i]; } } state[m] = processed ; D = D \ {m}; } retrn A - path of length dist[], stored in incm[] reersely ; Petr Hliněný, FI MU Brno FI: MA: Distance in Graphs
12 Petr Hliněný, FI MU Brno FI: MA: Distance in Graphs Remark: Notice that Algorithm. works as-is also in directed graphs. Example.. An illstration rn of Dijkstra s Algorithm. from to in the following graph.
13 Petr Hliněný, FI MU Brno FI: MA: Distance in Graphs
14 Fact: The nmber of steps performed by Algorithm. to find the shortest path from to is abot N when N is the nmber of ertices (not so good...). On the other hand, with a better implementation of the depository, one can achiee on sparse graphs rntime almost linear in the nmber of edges. Theorem.. Eery iteration of Algorithm. (since jst after finishing the first while() loop) maintains an inariant that dist[i] is the length of a shortest path from to i sing only those internal ertices x of state[x]== processed. Proof: Briefly sing mathematical indction: In the first iteration, the first ertex m= is picked and processed, and its neighbors receie the correct straight distances (edge lengths). In eery next iteration, the picked ertex m is the nearest nprocessed one to the starting ertex. Assming nonnegatie costs len[,], this certifies that no shorter walk from to m may exist in the graph. On the other hand, any improed path from to an nfinished ertex i passing throgh m has mi as the last edge (since the distance of m is not smaller than of the other finished ertices). Hence dist[i] is pdated correctly in the algorithm. Petr Hliněný, FI MU Brno FI: MA: Distance in Graphs
15 . Adanced rote planning In some sitations, there is a better alternatie to ordinary Dijkstra s algorithm the Algorithm A which ses a sitable potential fnction to direct the search towards the destination. Wheneer we hae a good sense of direction (e.g. in a topo-map naigation), A can perform mch better! Algorithm A It re-implements Dijkstra with sitably modified edge costs. Let p (x) be a potential fnction giing an arbitrary lower bond on the distance from x to the destination. E.g., in a map naigation, p (x) may be the Eclidean distance from x to. Each directed(!) edge xy of the weighted graph G, w gets a new cost w (xy) = w(xy) + p (y) p (x). The potential p is admissible when all w (xy), i.e. w(xy) p (x) p (y). The aboe Eclidean potential is always admissible. The modified length of any - walk S then is d w G (S) = dw G (S)+p () p (), which is a constant difference from d w G (S)! Hence some S is optimal for the weighting w iff S is optimal for w. Here the Eclidean potential strongly prefers edges in the dest. direction. Petr Hliněný, FI MU Brno FI: MA: Distance in Graphs
CSC 505, Fall 2000: Week 8
Objecties: CSC 505, Fall 2000: Week 8 learn abot the basic depth-first search algorithm learn how properties of a graph can be inferred from the strctre of a DFS tree learn abot one nontriial application
More informationCHAPTER ONE VECTOR GEOMETRY
CHAPTER ONE VECTOR GEOMETRY. INTRODUCTION In this chapter ectors are first introdced as geometric objects, namely as directed line segments, or arrows. The operations of addition, sbtraction, and mltiplication
More informationvalue in arriving packet s header routing algorithm local forwarding table header value output link
Compter Netorks Roting Algorithms Based on Compter Netorking, 4 th Edition b Krose and Ross Interpla beteen roting, forarding roting algorithm local forarding table header ale otpt link 000 00 0 00 ale
More informationCovering planar graphs with degree bounded forests
Coering planar graphs ith degree bonded forests D. Gonçales LaBRI, U.M.R. 5800, Uniersité Bordea 1, 351 cors de la Libération 33405 alence Cede, France. Abstract We proe that eer planar graphs has an edge
More informationSocial Media Mining. Graph Essentials
Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures
More information5 Using Your Verbatim Autodialer
5 Using Yor Verbatim Atodialer 5.1 Placing Inqiry Calls to the Verbatim Atodialer ( Yo may call the Verbatim atodialer at any time from any phone. The nit will wait the programmed nmber of rings before
More informationResource Pricing and Provisioning Strategies in Cloud Systems: A Stackelberg Game Approach
Resorce Pricing and Provisioning Strategies in Clod Systems: A Stackelberg Game Approach Valeria Cardellini, Valerio di Valerio and Francesco Lo Presti Talk Otline Backgrond and Motivation Provisioning
More informationOn a Generalized Graph Coloring/Batch Scheduling Problem
Reglar Papers On a Generalized Graph Coloring/Batch Schedling Problem Giorgio Lcarelli 1, Ioannis Milis Dept. of Informatics, Athens University of Economics and Bsiness, 104 34, Athens, Greece, {glc, milis}@aeb.gr
More informationOn the maximum average degree and the incidence chromatic number of a graph
Discrete Mathematics and Theoretical Computer Science DMTCS ol. 7, 2005, 203 216 On the maximum aerage degree and the incidence chromatic number of a graph Mohammad Hosseini Dolama 1 and Eric Sopena 2
More informationGlobal attraction to the origin in a parametrically-driven nonlinear oscillator
Global attraction to the origin in a parametrically-drien nonlinear oscillator M.V. Bartccelli, J.H.B. Deane, G. Gentile and S.A. Gorley Department of Mathematics and Statistics, Uniersity of Srrey, Gildford,
More informationGraph-based Simplex Method for Pairwise Energy Minimization with Binary Variables
Graph-based Simplex Method for Pairwise Energy Minimization with Binary Variables Daniel Průša Center for Machine Perception, Faclty of Electrical Engineering, Czech Technical Uniersity Karloo náměstí
More informationHOMOTOPY FIBER PRODUCTS OF HOMOTOPY THEORIES
HOMOTOPY FIBER PRODUCTS OF HOMOTOPY THEORIES JULIA E. BERGNER Abstract. Gien an appropriate diagram of left Qillen fnctors between model categories, one can define a notion of homotopy fiber prodct, bt
More informationJoint Routing and Scheduling in Multi-hop Wireless Networks with Directional Antennas
Joint Roting and Schedling in Mlti-hop Wireless Netorks ith Directional Antennas Partha Dtta IBM Research India parthdt@in.ibm.com Viek Mhatre Motorola Inc. iekmhatre@motorola.com Debmalya Panigrahi CSAIL,
More informationTight Bounds for Randomized Load Balancing on Arbitrary Network Topologies
Tight Bonds for Randomized Load Balancing on Arbitrary Network Topologies Thomas Saerwald and He Sn Max Planck Institte for Informatics Saarbrücken 66123, Germany Institte of Modern Mathematics and Physics,
More informationCpt S 223. School of EECS, WSU
The Shortest Path Problem 1 Shortest-Path Algorithms Find the shortest path from point A to point B Shortest in time, distance, cost, Numerous applications Map navigation Flight itineraries Circuit wiring
More informationManipulating Deformable Linear Objects: Characteristic Features for Vision-Based Detection of Contact State Transitions
Maniplating Deformable Linear Objects: Characteristic Featres for Vision-Based Detection of Contact State Transitions Jürgen Acker Dominik Henrich Embedded Systems and Robotics Lab. (RESY) Faclty of Informatics,
More informationEigenvalues and the Laplacian of a graph
CHAPTER Eigenalues and the Laplacian of a graph.. Introduction Spectral graph theory has a long history. In the early days, matrix theory and linear algebra were used to analyze adjacency matrices of graphs.
More informationCentral Angles, Arc Length, and Sector Area
CHAPTER 5 A Central Angles, Arc Length, and Sector Area c GOAL Identify central angles and determine arc length and sector area formed by a central angle. Yo will need a calclator a compass a protractor
More informationLINES AND PLANES IN R 3
LINES AND PLANES IN R 3 In this handout we will summarize the properties of the dot product and cross product and use them to present arious descriptions of lines and planes in three dimensional space.
More informationNetwork (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,
More informationOptimal Trust Network Analysis with Subjective Logic
The Second International Conference on Emerging Secrity Information, Systems and Technologies Optimal Trst Network Analysis with Sbjective Logic Adn Jøsang UNIK Gradate Center, University of Oslo Norway
More informationFast Approximation of Steiner Trees in Large Graphs
Fast Approximation of Steiner Trees in Large Graphs Andrey Gubiche Thomas Neumann Technische Uniersität München Garching, Germany {gubiche, neumann}@in.tum.de ABSTRACT Finding the minimum connected subtree
More informationRotated Ellipses. And Their Intersections With Lines. Mark C. Hendricks, Ph.D. Copyright March 8, 2012
Rotated Ellipses And Their Intersections With Lines b Mark C. Hendricks, Ph.D. Copright March 8, 0 Abstract: This paper addresses the mathematical equations for ellipses rotated at an angle and how to
More informationGraph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis. Contents. Introduction. Maarten van Steen. Version: April 28, 2014
Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R.0, steen@cs.vu.nl Chapter 0: Version: April 8, 0 / Contents Chapter Description 0: Introduction
More informationWarshall s Algorithm: Transitive Closure
CS 0 Theory of Algorithms / CS 68 Algorithms in Bioinformaticsi Dynamic Programming Part II. Warshall s Algorithm: Transitive Closure Computes the transitive closure of a relation (Alternatively: all paths
More informationLIMITS IN CATEGORY THEORY
LIMITS IN CATEGORY THEORY SCOTT MESSICK Abstract. I will start assming no knowledge o category theory and introdce all concepts necessary to embark on a discssion o limits. I will conclde with two big
More informationThe Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
More informationConfiguration Management for Software Product Lines
onfigration Management for Software Prodct Lines Roland Laqa and Peter Knaber Franhofer Institte for Experimental Software Engineering (IESE) Saerwiesen 6 D-67661 Kaiserslatern, Germany +49 6301 707 161
More informationA Layered Architecture for Querying Dynamic Web Content
A Layered Architectre for Qerying Dynamic Web Content Hasan Dalc Uniersity at Stony Brook dalc@cs.snysb.ed Jliana Freire Bell Laboratories jliana@research.bell-labs.com Michael Kifer Uniersity at Stony
More informationVectors. Vector Multiplication
Vectors Directed Line Segments and Geometric Vectors A line segment to which a direction has been assigned is called a directed line segment. The figure below shows a directed line segment form P to Q.
More informationAnalysis of Algorithms, I
Analysis of Algorithms, I CSOR W4231.002 Eleni Drinea Computer Science Department Columbia University Thursday, February 26, 2015 Outline 1 Recap 2 Representing graphs 3 Breadth-first search (BFS) 4 Applications
More informationChapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling
Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one
More informationLinear Programming. Non-Lecture J: Linear Programming
The greatest flood has the soonest ebb; the sorest tempest the most sdden calm; the hottest love the coldest end; and from the deepest desire oftentimes enses the deadliest hate. Socrates Th extremes of
More informationGraphs without proper subgraphs of minimum degree 3 and short cycles
Graphs without proper subgraphs of minimum degree 3 and short cycles Lothar Narins, Alexey Pokrovskiy, Tibor Szabó Department of Mathematics, Freie Universität, Berlin, Germany. August 22, 2014 Abstract
More informationGraph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis
Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.0, steen@cs.vu.nl Chapter 06: Network analysis Version: April 8, 04 / 3 Contents Chapter
More informationApproximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
More informationOn the urbanization of poverty
On the rbanization of poverty Martin Ravallion 1 Development Research Grop, World Bank 1818 H Street NW, Washington DC, USA Febrary 001; revised Jly 001 Abstract: Conditions are identified nder which the
More informationOnline Dominating Set and Variations on. Stephan Eidenbenz. Institute of Theoretical Computer Science, ETH Zurich, Switzerland. eidenben@inf.ethz.
Online Dominating Set and Variations on Restricted Graph Classes TECHNICAL REPORT no. 380, ETH Zurich, Dept. of Comper Science Stephan Eidenbenz Instite of Theoretical Comper Science, ETH Zurich, Switzerland
More informationI. GROUPS: BASIC DEFINITIONS AND EXAMPLES
I GROUPS: BASIC DEFINITIONS AND EXAMPLES Definition 1: An operation on a set G is a function : G G G Definition 2: A group is a set G which is equipped with an operation and a special element e G, called
More informationContinuity Analysis of Programs
Continity Analysis of Programs Swarat Chadhri Pennsylvania State University swarat@cse.ps.ed Smit Glwani Microsoft Research smitg@microsoft.com Roberto Lblinerman Pennsylvania State University rlble@ps.ed
More informationModeling Roughness Effects in Open Channel Flows D.T. Souders and C.W. Hirt Flow Science, Inc.
FSI-2-TN6 Modeling Roghness Effects in Open Channel Flows D.T. Soders and C.W. Hirt Flow Science, Inc. Overview Flows along rivers, throgh pipes and irrigation channels enconter resistance that is proportional
More informationWAN Wide Area Networks. Packet Switch Operation. Packet Switches. COMP476 Networked Computer Systems. WANs are made of store and forward switches.
Routing WAN Wide Area Networks WANs are made of store and forward switches. To there and back again COMP476 Networked Computer Systems A packet switch with two types of I/O connectors: one type is used
More informationChapter 21. Epidemics. 21.1 Diseases and the Networks that Transmit Them
From the book Netorks, Crods, and Markets: Reasoning abot a Highly Connected World. By Daid Easley and Jon Kleinberg. Cambridge Uniersity Press, 2010. Complete preprint on-line at http://.cs.cornell.ed/home/kleinber/netorks-book/
More informationWell-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications
Well-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications Jie Gao Department of Computer Science Stanford University Joint work with Li Zhang Systems Research Center Hewlett-Packard
More informationHigh Availability for Microsoft SQL Server Using Double-Take 4.x
High Availability for Microsoft SQL Server Using Doble-Take 4.x High Availability for Microsoft SQL Server Using Doble-Take 4.x pblished April 2000 NSI and Doble-Take are registered trademarks of Network
More informationShortcut sets for plane Euclidean networks (Extended abstract) 1
Shortcut sets for plane Euclidean networks (Extended abstract) 1 J. Cáceres a D. Garijo b A. González b A. Márquez b M. L. Puertas a P. Ribeiro c a Departamento de Matemáticas, Universidad de Almería,
More informationRegular Specifications of Resource Requirements for Embedded Control Software
Reglar Specifications of Resorce Reqirements for Embedded Control Software Rajeev Alr and Gera Weiss University of Pennsylvania Abstract For embedded control systems a schedle for the allocation of resorces
More informationThe Dot Product. Properties of the Dot Product If u and v are vectors and a is a real number, then the following are true:
00 000 00 0 000 000 0 The Dot Prodct Tesday, 2// Section 8.5, Page 67 Definition of the Dot Prodct The dot prodct is often sed in calcls and physics. Gien two ectors = and = , then their
More informationPY106 Class13. Permanent Magnets. Magnetic Fields and Forces on Moving Charges. Interactions between magnetic north and south poles.
Permanent Magnets Magnetic ields and orces on Moing Charges 1 We encounter magnetic fields frequently in daily life from those due to a permanent magnet. Each permanent magnet has a north pole and a south
More informationUsing GPU to Compute Options and Derivatives
Introdction Algorithmic Trading has created an increasing demand for high performance compting soltions within financial organizations. The actors of portfolio management and ris assessment have the obligation
More informationASAND: Asynchronous Slot Assignment and Neighbor Discovery Protocol for Wireless Networks
ASAND: Asynchronos Slot Assignment and Neighbor Discovery Protocol for Wireless Networks Fikret Sivrikaya, Costas Bsch, Malik Magdon-Ismail, Bülent Yener Compter Science Department, Rensselaer Polytechnic
More informationBonds with Embedded Options and Options on Bonds
FIXED-INCOME SECURITIES Chapter 14 Bonds with Embedded Options and Options on Bonds Callable and Ptable Bonds Instittional Aspects Valation Convertible Bonds Instittional Aspects Valation Options on Bonds
More informationKey Stage 2 Mathematics Programme of Study
Deeloping numerical reasoning Identify processes and connections Represent and communicate Reiew transfer mathematical to a ariety of contexts and eeryday situations identify the appropriate steps and
More information! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.
Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of
More information6.852: Distributed Algorithms Fall, 2009. Class 2
.8: Distributed Algorithms Fall, 009 Class Today s plan Leader election in a synchronous ring: Lower bound for comparison-based algorithms. Basic computation in general synchronous networks: Leader election
More informationLeveraging History for Faster Sampling of Online Social Networks
Leeraging History for Faster Sampling of Online Social Netorks Zhojie Zho George Washington Uniersity rexzho@g.ed Nan Zhang George Washington Uniersity nzhang10@g.ed Gatam Das Uniersity of Texas at Arlington
More informationThe Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge,
The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge, cheapest first, we had to determine whether its two endpoints
More informationStability of Linear Control System
Stabilit of Linear Control Sstem Concept of Stabilit Closed-loop feedback sstem is either stable or nstable. This tpe of characterization is referred to as absolte stabilit. Given that the sstem is stable,
More informationAn unbiased crawling strategy for directed social networks
Abstract An nbiased crawling strategy for directed social networks Xeha Yang 1,2, HongbinLi 2* 1 School of Software, Shenyang Normal University, Shenyang 110034, Liaoning, China 2 Shenyang Institte of
More informationStatistical Image Completion
STATISTICAL IMAGE COMPLETION 1 Statistical Image Completion Kaiming He, Member, IEEE and Jian Sn, Member, IEEE Abstract Image completion inoles filling missing parts in images. In this paper we address
More informationApplied Algorithm Design Lecture 5
Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design
More information4.12. Using Verilog for Behavioral Specification with Simulation for the 5-Stage Pipeline
. An Introdction to Digital Design Using a Hardware Design Langage to Describe and odel a Pipeline and ore Pipelining Illstrations This CD section covers hardware decription langages and then a dozen eamples
More informationHandout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, 2010. Chapter 7: Digraphs
MCS-236: Graph Theory Handout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, 2010 Chapter 7: Digraphs Strong Digraphs Definitions. A digraph is an ordered pair (V, E), where V is the set
More informationMinimum cost maximum flow, Minimum cost circulation, Cost/Capacity scaling
6.854 Advanced Algorithms Lecture 16: 10/11/2006 Lecturer: David Karger Scribe: Kermin Fleming and Chris Crutchfield, based on notes by Wendy Chu and Tudor Leu Minimum cost maximum flow, Minimum cost circulation,
More informationDegree Hypergroupoids Associated with Hypergraphs
Filomat 8:1 (014), 119 19 DOI 10.98/FIL1401119F Published by Faculty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Degree Hypergroupoids Associated
More informationEvery manufacturer is confronted with the problem
HOW MANY PARTS TO MAKE AT ONCE FORD W. HARRIS Prodction Engineer Reprinted from Factory, The Magazine of Management, Volme 10, Nmber 2, Febrary 1913, pp. 135-136, 152 Interest on capital tied p in wages,
More information! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.
Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three
More informationCSE 326, Data Structures. Sample Final Exam. Problem Max Points Score 1 14 (2x7) 2 18 (3x6) 3 4 4 7 5 9 6 16 7 8 8 4 9 8 10 4 Total 92.
Name: Email ID: CSE 326, Data Structures Section: Sample Final Exam Instructions: The exam is closed book, closed notes. Unless otherwise stated, N denotes the number of elements in the data structure
More informationPHY2061 Enriched Physics 2 Lecture Notes Relativity 4. Relativity 4
PHY6 Enriched Physics Lectre Notes Relativity 4 Relativity 4 Disclaimer: These lectre notes are not meant to replace the corse textbook. The content may be incomplete. Some topics may be nclear. These
More informationSeminar. Path planning using Voronoi diagrams and B-Splines. Stefano Martina stefano.martina@stud.unifi.it
Seminar Path planning using Voronoi diagrams and B-Splines Stefano Martina stefano.martina@stud.unifi.it 23 may 2016 This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International
More informationChapter 2 Solutions. 4. We find the average velocity from
Chapter 2 Solutions 4. We find the aerage elocity from = (x 2 x 1 )/(t 2 t 1 ) = ( 4.2 cm 3.4 cm)/(6.1 s 3.0 s) = 2.5 cm/s (toward x). 6. (a) We find the elapsed time before the speed change from speed
More information2 2 Matrices. Scalar multiplication for matrices. A2 2matrix(pronounced 2-by-2matrix )isasquareblockof4numbers. For example,
2 2 Matrices A2 2matrix(prononced 2-by-2matrix )isasqareblockofnmbers. For example, is a 2 2matrix. It scalleda2 2 matrix becase it has 2 rows 2 colmns. The for nmbers in a 2 2matrixarecalledtheentries
More informationLoad balancing Static Load Balancing
Chapter 7 Load Balancing and Termination Detection Load balancing used to distribute computations fairly across processors in order to obtain the highest possible execution speed. Termination detection
More information2.3 Convex Constrained Optimization Problems
42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions
More informationCSC2420 Fall 2012: Algorithm Design, Analysis and Theory
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms
More informationChapter 14. Three-by-Three Matrices and Determinants. A 3 3 matrix looks like a 11 a 12 a 13 A = a 21 a 22 a 23
1 Chapter 14. Three-by-Three Matrices and Determinants A 3 3 matrix looks like a 11 a 12 a 13 A = a 21 a 22 a 23 = [a ij ] a 31 a 32 a 33 The nmber a ij is the entry in ro i and colmn j of A. Note that
More informationFinding and counting given length cycles
Finding and counting given length cycles Noga Alon Raphael Yuster Uri Zwick Abstract We present an assortment of methods for finding and counting simple cycles of a given length in directed and undirected
More informationFINANCIAL FITNESS SELECTING A CREDIT CARD. Fact Sheet
FINANCIAL FITNESS Fact Sheet Janary 1998 FL/FF-02 SELECTING A CREDIT CARD Liz Gorham, Ph.D., AFC Assistant Professor and Family Resorce Management Specialist, Utah State University Marsha A. Goetting,
More informationLarge induced subgraphs with all degrees odd
Large induced subgraphs with all degrees odd A.D. Scott Department of Pure Mathematics and Mathematical Statistics, University of Cambridge, England Abstract: We prove that every connected graph of order
More information12.5 Equations of Lines and Planes
Instructor: Longfei Li Math 43 Lecture Notes.5 Equations of Lines and Planes What do we need to determine a line? D: a point on the line: P 0 (x 0, y 0 ) direction (slope): k 3D: a point on the line: P
More informationAn Energy-Efficient Communication Scheme in Wireless Cable Sensor Networks
This fll text aer was eer reiewed at the direction of IEEE Commnications Society sbject matter exerts for blication in the IEEE ICC 11 roceedings An Energy-Efficient Commnication Scheme in Wireless Cable
More informationSHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH
31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,
More informationAdaptive behaviour in a predator-prey model leads to multiple equilibrium states. A. Pimenov, A. Korobeinikov, D. Rachinskii
Preprint núm. 1195 September 214 Adaptie behaior in a predator-prey model leads to mltiple eqilibrim states A. Pimeno, A. Korobeiniko, D. Rachinskii ADAPTIVE BEHAVIOUR IN A PREDATOR-PREY MODEL LEADS TO
More informationARLib: A C++ Augmented Reality Software Development Kit. Masters Thesis
ARLib: A C++ Agmented Reality Software Deelopment Kit Masters Thesis Daniel Diggins MSc Compter Animation N.C.C.A Bornemoth Uniersity 5 September 5 Contents Introdction... 3 Preios and Crrent Work... 5
More informationBasic Linear Algebra
Basic Linear Algebra by: Dan Sunday, softsurfer.com Table of Contents Coordinate Systems 1 Points and Vectors Basic Definitions Vector Addition Scalar Multiplication 3 Affine Addition 3 Vector Length 4
More informationKey Stage 3 Mathematics Programme of Study
Deeloping numerical reasoning Identify processes and connections Represent and communicate Reiew transfer mathematical across the curriculum in a ariety of contexts and eeryday situations select, trial
More informationChapter 3. 2. Consider an economy described by the following equations: Y = 5,000 G = 1,000
Chapter C evel Qestions. Imagine that the prodction of fishing lres is governed by the prodction fnction: y.7 where y represents the nmber of lres created per hor and represents the nmber of workers employed
More informationSpectrum Balancing for DSL with Restrictions on Maximum Transmit PSD
Spectrm Balancing for DSL with Restrictions on Maximm Transmit PSD Driton Statovci, Tomas Nordström, and Rickard Nilsson Telecommnications Research Center Vienna (ftw.), Dona-City-Straße 1, A-1220 Vienna,
More informationEfficient Euclidean Distance Transform Using Perpendicular Bisector Segmentation
Efficient Eclidean Distance Transform Using Perpendiclar Bisector Segmentation Jn Wang and Ying Tan Key Laboratory of Machine Perception (Ministry of Edcation), Peking Uniersity Department of Machine Intelligence,
More informationGuessing Game: NP-Complete?
Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES 2. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple
More informationHigh Availability for Internet Information Server Using Double-Take 4.x
High Availability for Internet Information Server Using Doble-Take 4.x High Availability for Internet Information Server Using Doble-Take 4.x pblished April 2000 NSI and Doble-Take are registered trademarks
More informationMidterm Practice Problems
6.042/8.062J Mathematics for Computer Science October 2, 200 Tom Leighton, Marten van Dijk, and Brooke Cowan Midterm Practice Problems Problem. [0 points] In problem set you showed that the nand operator
More informationLoad Balancing and Termination Detection
Chapter 7 slides7-1 Load Balancing and Termination Detection slides7-2 Load balancing used to distribute computations fairly across processors in order to obtain the highest possible execution speed. Termination
More information7 Gaussian Elimination and LU Factorization
7 Gaussian Elimination and LU Factorization In this final section on matrix factorization methods for solving Ax = b we want to take a closer look at Gaussian elimination (probably the best known method
More informationTarget Tracking with Monitor and Backup Sensors in Wireless Sensor Networks
Target Tracking with Monitor and Backup Sensors in Wireless Sensor Networks Md. Zakirul Alam Bhuiyan, Guojun Wang,andJieWu School of Information Science and Engineering Central South Uniersity, Changsha
More informationIntroduction to Scheduling Theory
Introduction to Scheduling Theory Arnaud Legrand Laboratoire Informatique et Distribution IMAG CNRS, France arnaud.legrand@imag.fr November 8, 2004 1/ 26 Outline 1 Task graphs from outer space 2 Scheduling
More informationExact moments of generalized order statistics from type II exponentiated log-logistic distribution
Hacettepe Jornal of Mathematics and Statistics Volme 44 3 25, 75 733 Eact moments of generalized order statistics from type II eponentiated log-logistic distribtion Deendra Kmar Abstract In this paper
More informationLoad Balancing and Termination Detection
Chapter 7 Load Balancing and Termination Detection 1 Load balancing used to distribute computations fairly across processors in order to obtain the highest possible execution speed. Termination detection
More informationShortest Inspection-Path. Queries in Simple Polygons
Shortest Inspection-Path Queries in Simple Polygons Christian Knauer, Günter Rote B 05-05 April 2005 Shortest Inspection-Path Queries in Simple Polygons Christian Knauer, Günter Rote Institut für Informatik,
More information