3 Distance in Graphs. Brief outline of this lecture

Size: px
Start display at page:

Download "3 Distance in Graphs. Brief outline of this lecture"

Transcription

1 Distance in Graphs While the preios lectre stdied jst the connectiity properties of a graph, now we are going to inestigate how long (short, actally) a connection in a graph is. This natrally leads to the concept of graph distance, which has two ariants: the simple one considering only the nmber of edges, while the weighted one haing a length for each edge. a b c Brief otline of this lectre d x Distance in a graph, basic properties, triangle ineqality. Graph metrics: all-pairs shortest distances. Dijkstra s algorithm for the shortest weighted distance in a graph. Rote planning: a sketch of some adanced ideas. Petr Hliněný, FI MU Brno FI: MA: Distance in Graphs

2 . Graph distance (nweighted) Recall that a walk of length n in a graph G is an alternating seqence of ertices and edges, e,, e,,...,e n, n sch that each e i has the ends i, i. Definition.. Distance d G (, ) between two ertices, of a graph G is defined as the length of the shortest walk between and in G. If there is now walk between,, then we declare d G (, ) =. Informally and natrally, the distance between, eqals the least possible nmber of edges traersed from to. Specially d G(, ) =. Recall, moreoer, that the shortest walk is always a path Theorem.. Fact: The distance in an ndirected graph is symmetric, i.e. d G (, ) = d G (, ). Lemma.. The graph distance satisfies the triangle ineqality:,, w V (G) : d G (, ) + d G (, w) d G (, w). Proof. Easily; starting with a walk of length d G (, ) from to, and appending a walk of length d G (, w) from to w, reslts in a walk of length d G (, ) + d G (, w) from to w. This is an pper bond on the real distance from to w. Petr Hliněný, FI MU Brno FI: MA: Distance in Graphs

3 How to find the distance Theorem.. Let,, w be ertices of a connected graph G sch that d G (, ) < d G (, w). Then the breadth-first search algorithm on G, starting from, finds the ertex before w. Proof. We apply indction on the distance d G (, ): If d G (, ) =, i.e. =, then it is triial that is fond first. So let d G (, ) = d > and be a neighbor of closer to, which means d G (, ) = d. Analogosly choose w a neighbor of w closer to. Then d G (, w ) d G (, w) > d G (, ) = d G (, ), and so has been fond before w by the indctie assmption. Hence has been stored into U before w, and (cf. FIFO) the neighbors of ( among them, bt not w) are fond before the neighbors of w (sch as w). Corollary.. The breadth-first search algorithm on G correctly determines graph distances from the starting ertex. Petr Hliněný, FI MU Brno FI: MA: Distance in Graphs

4 Other related terms Definition. Let G be a graph. We define, with respect to G, the following notions: The excentricity of a ertex exc() is the largest distance from to another ertex; exc() = max x V (G) d G (, x). The diameter diam(g) of G is the largest excentricity oer its ertices, and the radis rad(g) of G is the smallest excentricity oer its ertices. The center of G is the sbset U V (G) of ertices sch that their excentricity eqals rad(g). Petr Hliněný, FI MU Brno FI: MA: Distance in Graphs

5 . All-pairs shortest distances Definition: The metrics of a graph is the collection of distances between all pairs of its ertices. In other words, the metrics is a matrix d[,] sch that d[i,j] is the distance from i to j. Method.. Dynamic programming for all-pairs distances in a graph G on the ertex set V (G) = {,,..., N }. Initially, let d[i,j] be (alternatiely, the edge length of { i, j }), or if i, j are not adjacent. After step t let it hold that d[i,j] is the shortest length of a walk between i, j sch that its internal ert. are from {,,..., t } (empty for t = ). Moing from step t to t +, we pdate all the distances as: Either d[i,j] from the preios step is still optimal (the ertex t does not help to obtain a shorter walk from i to j ), or there is a shorter i to j walk sing (also) the ertex t which is, by the assmption at step t, of length d[i,t]+d[t,j] d[i,j]. Theorem.6. Method. correctly comptes the distance d[i,j] between each pair of ertices i, j in N = V (G) steps. Petr Hliněný, FI MU Brno FI: MA: Distance in Graphs

6 Remark: In a practical implementation we may se, say, MAX INT/ in place of. Algorithm.7. Floyd Warshall algorithm (cf..) inpt < the adjacency matrix G[,] of an N-ertex graph, sch that the ertices of G are indexed as...n-, and G[i,j]= if i, j adjacent and G[i,j]= otherwise; for (i=; i<n; i++) for (j=; j<n; j++) d[i,j] = (i==j?: (G[i,j]? : MAX INT/)); for (t=; t<n; t++) { for (i=; i<n; i++) for (j=; j<n; j++) d[i,j] = min(d[i,j], d[i,t]+d[t,j]); } retrn The distance matrix d[,] ; Notice that this Algorithm.7 is extremely simple and relatiely fast it needs abot N steps to get the whole distance matrix. Its only problem is that all-pairs distances mst be compted at the same time, een if we need to know jst one distance... Petr Hliněný, FI MU Brno 6 FI: MA: Distance in Graphs

7 . Weighted distance in graphs Definition: A weighted graph is a graph G together with a weighting w of the edges by real nmbers w : E(G) R (edge lengths in this case). A positiely weighted graph G, w is sch that w(e) > for all edges e. Definition.8. (Weighted distance) Consider a positiely weighted graph G, w. The length of the weighted walk S =, e,, e,,..., e n, n in G is the sm d w G(S) = w(e ) + w(e ) + + w(e n ). The weighted distance in G, w between a pair of ertices, is d w G (, ) = min{dw G (S) : S is a walk from to }. All these terms natrally extend from graphs to directed graphs. Analogosly to Section. we get: Fact: The shortest walk in a positiely weighted (di)graph is always a path. Lemma.9. The weighted distance in a positiely weighted (di)graph satisfies the triangle ineqality. Petr Hliněný, FI MU Brno 7 FI: MA: Distance in Graphs

8 See an example... a b c The distances between a c and between b c are. What abot the a b distance? Is it 6? No, the distance from a to b in the graph is (traerse the pper path ). Petr Hliněný, FI MU Brno 8 FI: MA: Distance in Graphs

9 Negatie edge-lengths? What is the reason we are aoiding negatie edge lengths? x y Hence, what is the x y distance this graph? Say, or? No, it is, precisely by Definition.8, and this answer does not sond nice... Hence we hae got a good reason not to consider negatie edges in general. Petr Hliněný, FI MU Brno 9 FI: MA: Distance in Graphs

10 . Single-sorce shortest paths problem This section deals with the more specific problem of finding the shortest distance between one pair of terminals in a graph (or, from a single sorce to all other ertices). Remark: The coming Dijkstra s algorithm is, on one hand, slightly more inoled than Algorithm.7, bt it is significantly faster in the comptation of single-sorce shortest distances, on the other hand. Dijkstra s algorithm: Is a ariant of graph searching (related to BFS), in which eery discoered ertex carries a ariable keeping its temporary distance the length of the shortest so far discoered walk reaching this ertex from the starting ertex. We always pick from the depository the ertex with the shortest temporary distance. This is becase no shorter walk may reach this ertex (assming nonnegatie edge lengths). At the end of processing, the temporary distances become final shortest distances from the starting ertex (cf. Theorem.). Petr Hliněný, FI MU Brno FI: MA: Distance in Graphs

11 Algorithm.. Compting the single-sorce shortest paths (Dijkstra), i.e. finding the shortest walk from to, or from to all other ertices. inpt < N-ertex graph gien by adjacency mat. G[,] and cor. lengths len[,]; inpt <,, where is the starting ertex and the destination; // state[i] records the ertex processing state, dist[i] is the temporary distance for (i=; i<n; i++) { dist[i] = MAX INT; state[i] = init ; } dist[] = ; depository D = {}; while (state[]!= processed ) { if (D== ) retrn No path ; select m D with minimal dist[m]; // now pdating all neighbors of m and their temporary distances for (i=; i<n; i++) if (G[m,i]) { D = D {i}; if (dist[m]+len[m,i]<dist[i]) { income[i] = m; dist[i] = dist[m]+len[m,i]; } } state[m] = processed ; D = D \ {m}; } retrn A - path of length dist[], stored in incm[] reersely ; Petr Hliněný, FI MU Brno FI: MA: Distance in Graphs

12 Petr Hliněný, FI MU Brno FI: MA: Distance in Graphs Remark: Notice that Algorithm. works as-is also in directed graphs. Example.. An illstration rn of Dijkstra s Algorithm. from to in the following graph.

13 Petr Hliněný, FI MU Brno FI: MA: Distance in Graphs

14 Fact: The nmber of steps performed by Algorithm. to find the shortest path from to is abot N when N is the nmber of ertices (not so good...). On the other hand, with a better implementation of the depository, one can achiee on sparse graphs rntime almost linear in the nmber of edges. Theorem.. Eery iteration of Algorithm. (since jst after finishing the first while() loop) maintains an inariant that dist[i] is the length of a shortest path from to i sing only those internal ertices x of state[x]== processed. Proof: Briefly sing mathematical indction: In the first iteration, the first ertex m= is picked and processed, and its neighbors receie the correct straight distances (edge lengths). In eery next iteration, the picked ertex m is the nearest nprocessed one to the starting ertex. Assming nonnegatie costs len[,], this certifies that no shorter walk from to m may exist in the graph. On the other hand, any improed path from to an nfinished ertex i passing throgh m has mi as the last edge (since the distance of m is not smaller than of the other finished ertices). Hence dist[i] is pdated correctly in the algorithm. Petr Hliněný, FI MU Brno FI: MA: Distance in Graphs

15 . Adanced rote planning In some sitations, there is a better alternatie to ordinary Dijkstra s algorithm the Algorithm A which ses a sitable potential fnction to direct the search towards the destination. Wheneer we hae a good sense of direction (e.g. in a topo-map naigation), A can perform mch better! Algorithm A It re-implements Dijkstra with sitably modified edge costs. Let p (x) be a potential fnction giing an arbitrary lower bond on the distance from x to the destination. E.g., in a map naigation, p (x) may be the Eclidean distance from x to. Each directed(!) edge xy of the weighted graph G, w gets a new cost w (xy) = w(xy) + p (y) p (x). The potential p is admissible when all w (xy), i.e. w(xy) p (x) p (y). The aboe Eclidean potential is always admissible. The modified length of any - walk S then is d w G (S) = dw G (S)+p () p (), which is a constant difference from d w G (S)! Hence some S is optimal for the weighting w iff S is optimal for w. Here the Eclidean potential strongly prefers edges in the dest. direction. Petr Hliněný, FI MU Brno FI: MA: Distance in Graphs

CSC 505, Fall 2000: Week 8

CSC 505, Fall 2000: Week 8 Objecties: CSC 505, Fall 2000: Week 8 learn abot the basic depth-first search algorithm learn how properties of a graph can be inferred from the strctre of a DFS tree learn abot one nontriial application

More information

CHAPTER ONE VECTOR GEOMETRY

CHAPTER ONE VECTOR GEOMETRY CHAPTER ONE VECTOR GEOMETRY. INTRODUCTION In this chapter ectors are first introdced as geometric objects, namely as directed line segments, or arrows. The operations of addition, sbtraction, and mltiplication

More information

value in arriving packet s header routing algorithm local forwarding table header value output link

value in arriving packet s header routing algorithm local forwarding table header value output link Compter Netorks Roting Algorithms Based on Compter Netorking, 4 th Edition b Krose and Ross Interpla beteen roting, forarding roting algorithm local forarding table header ale otpt link 000 00 0 00 ale

More information

Covering planar graphs with degree bounded forests

Covering planar graphs with degree bounded forests Coering planar graphs ith degree bonded forests D. Gonçales LaBRI, U.M.R. 5800, Uniersité Bordea 1, 351 cors de la Libération 33405 alence Cede, France. Abstract We proe that eer planar graphs has an edge

More information

Social Media Mining. Graph Essentials

Social Media Mining. Graph Essentials Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures

More information

5 Using Your Verbatim Autodialer

5 Using Your Verbatim Autodialer 5 Using Yor Verbatim Atodialer 5.1 Placing Inqiry Calls to the Verbatim Atodialer ( Yo may call the Verbatim atodialer at any time from any phone. The nit will wait the programmed nmber of rings before

More information

Resource Pricing and Provisioning Strategies in Cloud Systems: A Stackelberg Game Approach

Resource Pricing and Provisioning Strategies in Cloud Systems: A Stackelberg Game Approach Resorce Pricing and Provisioning Strategies in Clod Systems: A Stackelberg Game Approach Valeria Cardellini, Valerio di Valerio and Francesco Lo Presti Talk Otline Backgrond and Motivation Provisioning

More information

On a Generalized Graph Coloring/Batch Scheduling Problem

On a Generalized Graph Coloring/Batch Scheduling Problem Reglar Papers On a Generalized Graph Coloring/Batch Schedling Problem Giorgio Lcarelli 1, Ioannis Milis Dept. of Informatics, Athens University of Economics and Bsiness, 104 34, Athens, Greece, {glc, milis}@aeb.gr

More information

On the maximum average degree and the incidence chromatic number of a graph

On the maximum average degree and the incidence chromatic number of a graph Discrete Mathematics and Theoretical Computer Science DMTCS ol. 7, 2005, 203 216 On the maximum aerage degree and the incidence chromatic number of a graph Mohammad Hosseini Dolama 1 and Eric Sopena 2

More information

Global attraction to the origin in a parametrically-driven nonlinear oscillator

Global attraction to the origin in a parametrically-driven nonlinear oscillator Global attraction to the origin in a parametrically-drien nonlinear oscillator M.V. Bartccelli, J.H.B. Deane, G. Gentile and S.A. Gorley Department of Mathematics and Statistics, Uniersity of Srrey, Gildford,

More information

Graph-based Simplex Method for Pairwise Energy Minimization with Binary Variables

Graph-based Simplex Method for Pairwise Energy Minimization with Binary Variables Graph-based Simplex Method for Pairwise Energy Minimization with Binary Variables Daniel Průša Center for Machine Perception, Faclty of Electrical Engineering, Czech Technical Uniersity Karloo náměstí

More information

HOMOTOPY FIBER PRODUCTS OF HOMOTOPY THEORIES

HOMOTOPY FIBER PRODUCTS OF HOMOTOPY THEORIES HOMOTOPY FIBER PRODUCTS OF HOMOTOPY THEORIES JULIA E. BERGNER Abstract. Gien an appropriate diagram of left Qillen fnctors between model categories, one can define a notion of homotopy fiber prodct, bt

More information

Joint Routing and Scheduling in Multi-hop Wireless Networks with Directional Antennas

Joint Routing and Scheduling in Multi-hop Wireless Networks with Directional Antennas Joint Roting and Schedling in Mlti-hop Wireless Netorks ith Directional Antennas Partha Dtta IBM Research India parthdt@in.ibm.com Viek Mhatre Motorola Inc. iekmhatre@motorola.com Debmalya Panigrahi CSAIL,

More information

Tight Bounds for Randomized Load Balancing on Arbitrary Network Topologies

Tight Bounds for Randomized Load Balancing on Arbitrary Network Topologies Tight Bonds for Randomized Load Balancing on Arbitrary Network Topologies Thomas Saerwald and He Sn Max Planck Institte for Informatics Saarbrücken 66123, Germany Institte of Modern Mathematics and Physics,

More information

Cpt S 223. School of EECS, WSU

Cpt S 223. School of EECS, WSU The Shortest Path Problem 1 Shortest-Path Algorithms Find the shortest path from point A to point B Shortest in time, distance, cost, Numerous applications Map navigation Flight itineraries Circuit wiring

More information

Manipulating Deformable Linear Objects: Characteristic Features for Vision-Based Detection of Contact State Transitions

Manipulating Deformable Linear Objects: Characteristic Features for Vision-Based Detection of Contact State Transitions Maniplating Deformable Linear Objects: Characteristic Featres for Vision-Based Detection of Contact State Transitions Jürgen Acker Dominik Henrich Embedded Systems and Robotics Lab. (RESY) Faclty of Informatics,

More information

Eigenvalues and the Laplacian of a graph

Eigenvalues and the Laplacian of a graph CHAPTER Eigenalues and the Laplacian of a graph.. Introduction Spectral graph theory has a long history. In the early days, matrix theory and linear algebra were used to analyze adjacency matrices of graphs.

More information

Central Angles, Arc Length, and Sector Area

Central Angles, Arc Length, and Sector Area CHAPTER 5 A Central Angles, Arc Length, and Sector Area c GOAL Identify central angles and determine arc length and sector area formed by a central angle. Yo will need a calclator a compass a protractor

More information

LINES AND PLANES IN R 3

LINES AND PLANES IN R 3 LINES AND PLANES IN R 3 In this handout we will summarize the properties of the dot product and cross product and use them to present arious descriptions of lines and planes in three dimensional space.

More information

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

More information

Optimal Trust Network Analysis with Subjective Logic

Optimal Trust Network Analysis with Subjective Logic The Second International Conference on Emerging Secrity Information, Systems and Technologies Optimal Trst Network Analysis with Sbjective Logic Adn Jøsang UNIK Gradate Center, University of Oslo Norway

More information

Fast Approximation of Steiner Trees in Large Graphs

Fast Approximation of Steiner Trees in Large Graphs Fast Approximation of Steiner Trees in Large Graphs Andrey Gubiche Thomas Neumann Technische Uniersität München Garching, Germany {gubiche, neumann}@in.tum.de ABSTRACT Finding the minimum connected subtree

More information

Rotated Ellipses. And Their Intersections With Lines. Mark C. Hendricks, Ph.D. Copyright March 8, 2012

Rotated Ellipses. And Their Intersections With Lines. Mark C. Hendricks, Ph.D. Copyright March 8, 2012 Rotated Ellipses And Their Intersections With Lines b Mark C. Hendricks, Ph.D. Copright March 8, 0 Abstract: This paper addresses the mathematical equations for ellipses rotated at an angle and how to

More information

Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis. Contents. Introduction. Maarten van Steen. Version: April 28, 2014

Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis. Contents. Introduction. Maarten van Steen. Version: April 28, 2014 Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R.0, steen@cs.vu.nl Chapter 0: Version: April 8, 0 / Contents Chapter Description 0: Introduction

More information

Warshall s Algorithm: Transitive Closure

Warshall s Algorithm: Transitive Closure CS 0 Theory of Algorithms / CS 68 Algorithms in Bioinformaticsi Dynamic Programming Part II. Warshall s Algorithm: Transitive Closure Computes the transitive closure of a relation (Alternatively: all paths

More information

LIMITS IN CATEGORY THEORY

LIMITS IN CATEGORY THEORY LIMITS IN CATEGORY THEORY SCOTT MESSICK Abstract. I will start assming no knowledge o category theory and introdce all concepts necessary to embark on a discssion o limits. I will conclde with two big

More information

The Goldberg Rao Algorithm for the Maximum Flow Problem

The Goldberg Rao Algorithm for the Maximum Flow Problem The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }

More information

Configuration Management for Software Product Lines

Configuration Management for Software Product Lines onfigration Management for Software Prodct Lines Roland Laqa and Peter Knaber Franhofer Institte for Experimental Software Engineering (IESE) Saerwiesen 6 D-67661 Kaiserslatern, Germany +49 6301 707 161

More information

A Layered Architecture for Querying Dynamic Web Content

A Layered Architecture for Querying Dynamic Web Content A Layered Architectre for Qerying Dynamic Web Content Hasan Dalc Uniersity at Stony Brook dalc@cs.snysb.ed Jliana Freire Bell Laboratories jliana@research.bell-labs.com Michael Kifer Uniersity at Stony

More information

Vectors. Vector Multiplication

Vectors. Vector Multiplication Vectors Directed Line Segments and Geometric Vectors A line segment to which a direction has been assigned is called a directed line segment. The figure below shows a directed line segment form P to Q.

More information

Analysis of Algorithms, I

Analysis of Algorithms, I Analysis of Algorithms, I CSOR W4231.002 Eleni Drinea Computer Science Department Columbia University Thursday, February 26, 2015 Outline 1 Recap 2 Representing graphs 3 Breadth-first search (BFS) 4 Applications

More information

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one

More information

Linear Programming. Non-Lecture J: Linear Programming

Linear Programming. Non-Lecture J: Linear Programming The greatest flood has the soonest ebb; the sorest tempest the most sdden calm; the hottest love the coldest end; and from the deepest desire oftentimes enses the deadliest hate. Socrates Th extremes of

More information

Graphs without proper subgraphs of minimum degree 3 and short cycles

Graphs without proper subgraphs of minimum degree 3 and short cycles Graphs without proper subgraphs of minimum degree 3 and short cycles Lothar Narins, Alexey Pokrovskiy, Tibor Szabó Department of Mathematics, Freie Universität, Berlin, Germany. August 22, 2014 Abstract

More information

Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis

Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.0, steen@cs.vu.nl Chapter 06: Network analysis Version: April 8, 04 / 3 Contents Chapter

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

More information

On the urbanization of poverty

On the urbanization of poverty On the rbanization of poverty Martin Ravallion 1 Development Research Grop, World Bank 1818 H Street NW, Washington DC, USA Febrary 001; revised Jly 001 Abstract: Conditions are identified nder which the

More information

Online Dominating Set and Variations on. Stephan Eidenbenz. Institute of Theoretical Computer Science, ETH Zurich, Switzerland. eidenben@inf.ethz.

Online Dominating Set and Variations on. Stephan Eidenbenz. Institute of Theoretical Computer Science, ETH Zurich, Switzerland. eidenben@inf.ethz. Online Dominating Set and Variations on Restricted Graph Classes TECHNICAL REPORT no. 380, ETH Zurich, Dept. of Comper Science Stephan Eidenbenz Instite of Theoretical Comper Science, ETH Zurich, Switzerland

More information

I. GROUPS: BASIC DEFINITIONS AND EXAMPLES

I. GROUPS: BASIC DEFINITIONS AND EXAMPLES I GROUPS: BASIC DEFINITIONS AND EXAMPLES Definition 1: An operation on a set G is a function : G G G Definition 2: A group is a set G which is equipped with an operation and a special element e G, called

More information

Continuity Analysis of Programs

Continuity Analysis of Programs Continity Analysis of Programs Swarat Chadhri Pennsylvania State University swarat@cse.ps.ed Smit Glwani Microsoft Research smitg@microsoft.com Roberto Lblinerman Pennsylvania State University rlble@ps.ed

More information

Modeling Roughness Effects in Open Channel Flows D.T. Souders and C.W. Hirt Flow Science, Inc.

Modeling Roughness Effects in Open Channel Flows D.T. Souders and C.W. Hirt Flow Science, Inc. FSI-2-TN6 Modeling Roghness Effects in Open Channel Flows D.T. Soders and C.W. Hirt Flow Science, Inc. Overview Flows along rivers, throgh pipes and irrigation channels enconter resistance that is proportional

More information

WAN Wide Area Networks. Packet Switch Operation. Packet Switches. COMP476 Networked Computer Systems. WANs are made of store and forward switches.

WAN Wide Area Networks. Packet Switch Operation. Packet Switches. COMP476 Networked Computer Systems. WANs are made of store and forward switches. Routing WAN Wide Area Networks WANs are made of store and forward switches. To there and back again COMP476 Networked Computer Systems A packet switch with two types of I/O connectors: one type is used

More information

Chapter 21. Epidemics. 21.1 Diseases and the Networks that Transmit Them

Chapter 21. Epidemics. 21.1 Diseases and the Networks that Transmit Them From the book Netorks, Crods, and Markets: Reasoning abot a Highly Connected World. By Daid Easley and Jon Kleinberg. Cambridge Uniersity Press, 2010. Complete preprint on-line at http://.cs.cornell.ed/home/kleinber/netorks-book/

More information

Well-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications

Well-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications Well-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications Jie Gao Department of Computer Science Stanford University Joint work with Li Zhang Systems Research Center Hewlett-Packard

More information

High Availability for Microsoft SQL Server Using Double-Take 4.x

High Availability for Microsoft SQL Server Using Double-Take 4.x High Availability for Microsoft SQL Server Using Doble-Take 4.x High Availability for Microsoft SQL Server Using Doble-Take 4.x pblished April 2000 NSI and Doble-Take are registered trademarks of Network

More information

Shortcut sets for plane Euclidean networks (Extended abstract) 1

Shortcut sets for plane Euclidean networks (Extended abstract) 1 Shortcut sets for plane Euclidean networks (Extended abstract) 1 J. Cáceres a D. Garijo b A. González b A. Márquez b M. L. Puertas a P. Ribeiro c a Departamento de Matemáticas, Universidad de Almería,

More information

Regular Specifications of Resource Requirements for Embedded Control Software

Regular Specifications of Resource Requirements for Embedded Control Software Reglar Specifications of Resorce Reqirements for Embedded Control Software Rajeev Alr and Gera Weiss University of Pennsylvania Abstract For embedded control systems a schedle for the allocation of resorces

More information

The Dot Product. Properties of the Dot Product If u and v are vectors and a is a real number, then the following are true:

The Dot Product. Properties of the Dot Product If u and v are vectors and a is a real number, then the following are true: 00 000 00 0 000 000 0 The Dot Prodct Tesday, 2// Section 8.5, Page 67 Definition of the Dot Prodct The dot prodct is often sed in calcls and physics. Gien two ectors = and = , then their

More information

PY106 Class13. Permanent Magnets. Magnetic Fields and Forces on Moving Charges. Interactions between magnetic north and south poles.

PY106 Class13. Permanent Magnets. Magnetic Fields and Forces on Moving Charges. Interactions between magnetic north and south poles. Permanent Magnets Magnetic ields and orces on Moing Charges 1 We encounter magnetic fields frequently in daily life from those due to a permanent magnet. Each permanent magnet has a north pole and a south

More information

Using GPU to Compute Options and Derivatives

Using GPU to Compute Options and Derivatives Introdction Algorithmic Trading has created an increasing demand for high performance compting soltions within financial organizations. The actors of portfolio management and ris assessment have the obligation

More information

ASAND: Asynchronous Slot Assignment and Neighbor Discovery Protocol for Wireless Networks

ASAND: Asynchronous Slot Assignment and Neighbor Discovery Protocol for Wireless Networks ASAND: Asynchronos Slot Assignment and Neighbor Discovery Protocol for Wireless Networks Fikret Sivrikaya, Costas Bsch, Malik Magdon-Ismail, Bülent Yener Compter Science Department, Rensselaer Polytechnic

More information

Bonds with Embedded Options and Options on Bonds

Bonds with Embedded Options and Options on Bonds FIXED-INCOME SECURITIES Chapter 14 Bonds with Embedded Options and Options on Bonds Callable and Ptable Bonds Instittional Aspects Valation Convertible Bonds Instittional Aspects Valation Options on Bonds

More information

Key Stage 2 Mathematics Programme of Study

Key Stage 2 Mathematics Programme of Study Deeloping numerical reasoning Identify processes and connections Represent and communicate Reiew transfer mathematical to a ariety of contexts and eeryday situations identify the appropriate steps and

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm. Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of

More information

6.852: Distributed Algorithms Fall, 2009. Class 2

6.852: Distributed Algorithms Fall, 2009. Class 2 .8: Distributed Algorithms Fall, 009 Class Today s plan Leader election in a synchronous ring: Lower bound for comparison-based algorithms. Basic computation in general synchronous networks: Leader election

More information

Leveraging History for Faster Sampling of Online Social Networks

Leveraging History for Faster Sampling of Online Social Networks Leeraging History for Faster Sampling of Online Social Netorks Zhojie Zho George Washington Uniersity rexzho@g.ed Nan Zhang George Washington Uniersity nzhang10@g.ed Gatam Das Uniersity of Texas at Arlington

More information

The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge,

The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge, The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge, cheapest first, we had to determine whether its two endpoints

More information

Stability of Linear Control System

Stability of Linear Control System Stabilit of Linear Control Sstem Concept of Stabilit Closed-loop feedback sstem is either stable or nstable. This tpe of characterization is referred to as absolte stabilit. Given that the sstem is stable,

More information

An unbiased crawling strategy for directed social networks

An unbiased crawling strategy for directed social networks Abstract An nbiased crawling strategy for directed social networks Xeha Yang 1,2, HongbinLi 2* 1 School of Software, Shenyang Normal University, Shenyang 110034, Liaoning, China 2 Shenyang Institte of

More information

Statistical Image Completion

Statistical Image Completion STATISTICAL IMAGE COMPLETION 1 Statistical Image Completion Kaiming He, Member, IEEE and Jian Sn, Member, IEEE Abstract Image completion inoles filling missing parts in images. In this paper we address

More information

Applied Algorithm Design Lecture 5

Applied Algorithm Design Lecture 5 Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design

More information

4.12. Using Verilog for Behavioral Specification with Simulation for the 5-Stage Pipeline

4.12. Using Verilog for Behavioral Specification with Simulation for the 5-Stage Pipeline . An Introdction to Digital Design Using a Hardware Design Langage to Describe and odel a Pipeline and ore Pipelining Illstrations This CD section covers hardware decription langages and then a dozen eamples

More information

Handout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, 2010. Chapter 7: Digraphs

Handout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, 2010. Chapter 7: Digraphs MCS-236: Graph Theory Handout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, 2010 Chapter 7: Digraphs Strong Digraphs Definitions. A digraph is an ordered pair (V, E), where V is the set

More information

Minimum cost maximum flow, Minimum cost circulation, Cost/Capacity scaling

Minimum cost maximum flow, Minimum cost circulation, Cost/Capacity scaling 6.854 Advanced Algorithms Lecture 16: 10/11/2006 Lecturer: David Karger Scribe: Kermin Fleming and Chris Crutchfield, based on notes by Wendy Chu and Tudor Leu Minimum cost maximum flow, Minimum cost circulation,

More information

Degree Hypergroupoids Associated with Hypergraphs

Degree Hypergroupoids Associated with Hypergraphs Filomat 8:1 (014), 119 19 DOI 10.98/FIL1401119F Published by Faculty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Degree Hypergroupoids Associated

More information

Every manufacturer is confronted with the problem

Every manufacturer is confronted with the problem HOW MANY PARTS TO MAKE AT ONCE FORD W. HARRIS Prodction Engineer Reprinted from Factory, The Magazine of Management, Volme 10, Nmber 2, Febrary 1913, pp. 135-136, 152 Interest on capital tied p in wages,

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm. Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three

More information

CSE 326, Data Structures. Sample Final Exam. Problem Max Points Score 1 14 (2x7) 2 18 (3x6) 3 4 4 7 5 9 6 16 7 8 8 4 9 8 10 4 Total 92.

CSE 326, Data Structures. Sample Final Exam. Problem Max Points Score 1 14 (2x7) 2 18 (3x6) 3 4 4 7 5 9 6 16 7 8 8 4 9 8 10 4 Total 92. Name: Email ID: CSE 326, Data Structures Section: Sample Final Exam Instructions: The exam is closed book, closed notes. Unless otherwise stated, N denotes the number of elements in the data structure

More information

PHY2061 Enriched Physics 2 Lecture Notes Relativity 4. Relativity 4

PHY2061 Enriched Physics 2 Lecture Notes Relativity 4. Relativity 4 PHY6 Enriched Physics Lectre Notes Relativity 4 Relativity 4 Disclaimer: These lectre notes are not meant to replace the corse textbook. The content may be incomplete. Some topics may be nclear. These

More information

Seminar. Path planning using Voronoi diagrams and B-Splines. Stefano Martina stefano.martina@stud.unifi.it

Seminar. Path planning using Voronoi diagrams and B-Splines. Stefano Martina stefano.martina@stud.unifi.it Seminar Path planning using Voronoi diagrams and B-Splines Stefano Martina stefano.martina@stud.unifi.it 23 may 2016 This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International

More information

Chapter 2 Solutions. 4. We find the average velocity from

Chapter 2 Solutions. 4. We find the average velocity from Chapter 2 Solutions 4. We find the aerage elocity from = (x 2 x 1 )/(t 2 t 1 ) = ( 4.2 cm 3.4 cm)/(6.1 s 3.0 s) = 2.5 cm/s (toward x). 6. (a) We find the elapsed time before the speed change from speed

More information

2 2 Matrices. Scalar multiplication for matrices. A2 2matrix(pronounced 2-by-2matrix )isasquareblockof4numbers. For example,

2 2 Matrices. Scalar multiplication for matrices. A2 2matrix(pronounced 2-by-2matrix )isasquareblockof4numbers. For example, 2 2 Matrices A2 2matrix(prononced 2-by-2matrix )isasqareblockofnmbers. For example, is a 2 2matrix. It scalleda2 2 matrix becase it has 2 rows 2 colmns. The for nmbers in a 2 2matrixarecalledtheentries

More information

Load balancing Static Load Balancing

Load balancing Static Load Balancing Chapter 7 Load Balancing and Termination Detection Load balancing used to distribute computations fairly across processors in order to obtain the highest possible execution speed. Termination detection

More information

2.3 Convex Constrained Optimization Problems

2.3 Convex Constrained Optimization Problems 42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions

More information

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms

More information

Chapter 14. Three-by-Three Matrices and Determinants. A 3 3 matrix looks like a 11 a 12 a 13 A = a 21 a 22 a 23

Chapter 14. Three-by-Three Matrices and Determinants. A 3 3 matrix looks like a 11 a 12 a 13 A = a 21 a 22 a 23 1 Chapter 14. Three-by-Three Matrices and Determinants A 3 3 matrix looks like a 11 a 12 a 13 A = a 21 a 22 a 23 = [a ij ] a 31 a 32 a 33 The nmber a ij is the entry in ro i and colmn j of A. Note that

More information

Finding and counting given length cycles

Finding and counting given length cycles Finding and counting given length cycles Noga Alon Raphael Yuster Uri Zwick Abstract We present an assortment of methods for finding and counting simple cycles of a given length in directed and undirected

More information

FINANCIAL FITNESS SELECTING A CREDIT CARD. Fact Sheet

FINANCIAL FITNESS SELECTING A CREDIT CARD. Fact Sheet FINANCIAL FITNESS Fact Sheet Janary 1998 FL/FF-02 SELECTING A CREDIT CARD Liz Gorham, Ph.D., AFC Assistant Professor and Family Resorce Management Specialist, Utah State University Marsha A. Goetting,

More information

Large induced subgraphs with all degrees odd

Large induced subgraphs with all degrees odd Large induced subgraphs with all degrees odd A.D. Scott Department of Pure Mathematics and Mathematical Statistics, University of Cambridge, England Abstract: We prove that every connected graph of order

More information

12.5 Equations of Lines and Planes

12.5 Equations of Lines and Planes Instructor: Longfei Li Math 43 Lecture Notes.5 Equations of Lines and Planes What do we need to determine a line? D: a point on the line: P 0 (x 0, y 0 ) direction (slope): k 3D: a point on the line: P

More information

An Energy-Efficient Communication Scheme in Wireless Cable Sensor Networks

An Energy-Efficient Communication Scheme in Wireless Cable Sensor Networks This fll text aer was eer reiewed at the direction of IEEE Commnications Society sbject matter exerts for blication in the IEEE ICC 11 roceedings An Energy-Efficient Commnication Scheme in Wireless Cable

More information

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH 31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,

More information

Adaptive behaviour in a predator-prey model leads to multiple equilibrium states. A. Pimenov, A. Korobeinikov, D. Rachinskii

Adaptive behaviour in a predator-prey model leads to multiple equilibrium states. A. Pimenov, A. Korobeinikov, D. Rachinskii Preprint núm. 1195 September 214 Adaptie behaior in a predator-prey model leads to mltiple eqilibrim states A. Pimeno, A. Korobeiniko, D. Rachinskii ADAPTIVE BEHAVIOUR IN A PREDATOR-PREY MODEL LEADS TO

More information

ARLib: A C++ Augmented Reality Software Development Kit. Masters Thesis

ARLib: A C++ Augmented Reality Software Development Kit. Masters Thesis ARLib: A C++ Agmented Reality Software Deelopment Kit Masters Thesis Daniel Diggins MSc Compter Animation N.C.C.A Bornemoth Uniersity 5 September 5 Contents Introdction... 3 Preios and Crrent Work... 5

More information

Basic Linear Algebra

Basic Linear Algebra Basic Linear Algebra by: Dan Sunday, softsurfer.com Table of Contents Coordinate Systems 1 Points and Vectors Basic Definitions Vector Addition Scalar Multiplication 3 Affine Addition 3 Vector Length 4

More information

Key Stage 3 Mathematics Programme of Study

Key Stage 3 Mathematics Programme of Study Deeloping numerical reasoning Identify processes and connections Represent and communicate Reiew transfer mathematical across the curriculum in a ariety of contexts and eeryday situations select, trial

More information

Chapter 3. 2. Consider an economy described by the following equations: Y = 5,000 G = 1,000

Chapter 3. 2. Consider an economy described by the following equations: Y = 5,000 G = 1,000 Chapter C evel Qestions. Imagine that the prodction of fishing lres is governed by the prodction fnction: y.7 where y represents the nmber of lres created per hor and represents the nmber of workers employed

More information

Spectrum Balancing for DSL with Restrictions on Maximum Transmit PSD

Spectrum Balancing for DSL with Restrictions on Maximum Transmit PSD Spectrm Balancing for DSL with Restrictions on Maximm Transmit PSD Driton Statovci, Tomas Nordström, and Rickard Nilsson Telecommnications Research Center Vienna (ftw.), Dona-City-Straße 1, A-1220 Vienna,

More information

Efficient Euclidean Distance Transform Using Perpendicular Bisector Segmentation

Efficient Euclidean Distance Transform Using Perpendicular Bisector Segmentation Efficient Eclidean Distance Transform Using Perpendiclar Bisector Segmentation Jn Wang and Ying Tan Key Laboratory of Machine Perception (Ministry of Edcation), Peking Uniersity Department of Machine Intelligence,

More information

Guessing Game: NP-Complete?

Guessing Game: NP-Complete? Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES 2. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple

More information

High Availability for Internet Information Server Using Double-Take 4.x

High Availability for Internet Information Server Using Double-Take 4.x High Availability for Internet Information Server Using Doble-Take 4.x High Availability for Internet Information Server Using Doble-Take 4.x pblished April 2000 NSI and Doble-Take are registered trademarks

More information

Midterm Practice Problems

Midterm Practice Problems 6.042/8.062J Mathematics for Computer Science October 2, 200 Tom Leighton, Marten van Dijk, and Brooke Cowan Midterm Practice Problems Problem. [0 points] In problem set you showed that the nand operator

More information

Load Balancing and Termination Detection

Load Balancing and Termination Detection Chapter 7 slides7-1 Load Balancing and Termination Detection slides7-2 Load balancing used to distribute computations fairly across processors in order to obtain the highest possible execution speed. Termination

More information

7 Gaussian Elimination and LU Factorization

7 Gaussian Elimination and LU Factorization 7 Gaussian Elimination and LU Factorization In this final section on matrix factorization methods for solving Ax = b we want to take a closer look at Gaussian elimination (probably the best known method

More information

Target Tracking with Monitor and Backup Sensors in Wireless Sensor Networks

Target Tracking with Monitor and Backup Sensors in Wireless Sensor Networks Target Tracking with Monitor and Backup Sensors in Wireless Sensor Networks Md. Zakirul Alam Bhuiyan, Guojun Wang,andJieWu School of Information Science and Engineering Central South Uniersity, Changsha

More information

Introduction to Scheduling Theory

Introduction to Scheduling Theory Introduction to Scheduling Theory Arnaud Legrand Laboratoire Informatique et Distribution IMAG CNRS, France arnaud.legrand@imag.fr November 8, 2004 1/ 26 Outline 1 Task graphs from outer space 2 Scheduling

More information

Exact moments of generalized order statistics from type II exponentiated log-logistic distribution

Exact moments of generalized order statistics from type II exponentiated log-logistic distribution Hacettepe Jornal of Mathematics and Statistics Volme 44 3 25, 75 733 Eact moments of generalized order statistics from type II eponentiated log-logistic distribtion Deendra Kmar Abstract In this paper

More information

Load Balancing and Termination Detection

Load Balancing and Termination Detection Chapter 7 Load Balancing and Termination Detection 1 Load balancing used to distribute computations fairly across processors in order to obtain the highest possible execution speed. Termination detection

More information

Shortest Inspection-Path. Queries in Simple Polygons

Shortest Inspection-Path. Queries in Simple Polygons Shortest Inspection-Path Queries in Simple Polygons Christian Knauer, Günter Rote B 05-05 April 2005 Shortest Inspection-Path Queries in Simple Polygons Christian Knauer, Günter Rote Institut für Informatik,

More information