Worst Case and Probabilistic Analysis of the 2-Opt Algorithm for the TSP

Size: px
Start display at page:

Download "Worst Case and Probabilistic Analysis of the 2-Opt Algorithm for the TSP"

Transcription

1 Worst Case and Probabilistic Analysis of the 2-Opt Algorithm for the TSP Matthias Englert Heiko Röglin Berthold Vöcking Department of Computer Science RWTH Aachen Oberwolfach 2007 Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

2 Traveling Salesperson Problem Traveling Salesperson Problem (TSP) Input: weighted (complete) graph G = (V, E, d) with d : E R. Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

3 Traveling Salesperson Problem Traveling Salesperson Problem (TSP) Input: weighted (complete) graph G = (V, E, d) with d : E R. Goal: Find Hamiltonian cycle of minimum length. Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

4 Theoretical Results General TSP Strongly NP-hard. Not approximable within any polynomial factor. Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

5 Theoretical Results a b c a + b c General TSP Strongly NP-hard. Not approximable within any polynomial factor. Metric TSP Strongly NP-hard. 3/2-approximation [Christofides, (1976)] APX-hard: lower bound of 220/219 [Papadimitriou, Vempala (2000)] Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

6 Theoretical Results a b c a + b c (x 1, y 1 ) (x 2, y 2 ) d(p 1, P 2 ) = (x1 -x 2 ) 2 +(y 1 -y 2 ) 2 General TSP Strongly NP-hard. Not approximable within any polynomial factor. Metric TSP Strongly NP-hard. 3/2-approximation [Christofides, (1976)] APX-hard: lower bound of 220/219 [Papadimitriou, Vempala (2000)] Euclidean TSP Cities R d Strongly NP-hard ( no FPTAS) [Papadimitriou (1977)] PTAS exists [Arora (1996), Mitchell (1996)]. Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

7 Experimental Results Numerous experimental studies. TSPLIB contains real-world and random (Euclidean) instances. DIMACS Implementation Challenge [Johnson and McGeoch (2002)]. Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

8 Experimental Results Numerous experimental studies. TSPLIB contains real-world and random (Euclidean) instances. DIMACS Implementation Challenge [Johnson and McGeoch (2002)]. Some conclusions: Worst-case results are often too pessimistic. The PTAS is too slow on large scale instances. The most successful algorithms (w. r. t. quality and running time) in practice rely on local search. Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

9 2-Opt Heuristic 1 Start with an arbitrary tour. Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

10 2-Opt Heuristic 1 Start with an arbitrary tour. 2 Remove two edges from the tour. Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

11 2-Opt Heuristic 1 Start with an arbitrary tour. 2 Remove two edges from the tour. 3 Complete the tour by two other edges. Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

12 2-Opt Heuristic 1 Start with an arbitrary tour. 2 Remove two edges from the tour. 3 Complete the tour by two other edges. 4 Repeat steps 2 and 3 until no local improvement is possible anymore. Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

13 Why 2-Opt? Experiments on Random Euclidean Instances [Johnson and McGeoch (2002)] Approximation Ratio Christofides (for n 10 5 ): Opt (for n 10 6 ): 1.05 Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

14 Why 2-Opt? Experiments on Random Euclidean Instances [Johnson and McGeoch (2002)] Approximation Ratio Christofides (for n 10 5 ): Opt (for n 10 6 ): 1.05 Number of Local Improvements of 2-Opt Greedy Starts: Probably O(n) Random Starts: Probably O(n log n) Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

15 Running time of 2-Opt: Known and New Results General TSP Euclidean metric Manhattan metric average smoothed worst-case 2 Ω(n) Average-case results: [Chandra, Karloff, Tovey (1999)]. Worst-case results: [Lueker (1975)]. Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

16 Running time of 2-Opt: Known and New Results General TSP Euclidean metric Manhattan metric average smoothed worst-case 2 Ω(n) 2 Ω(n) 2 Ω(n) Average-case results: [Chandra, Karloff, Tovey (1999)]. Worst-case results: [Lueker (1975)]. Our results. Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

17 Running time of 2-Opt: Known and New Results General TSP Euclidean metric Manhattan metric average Õ(n 10 ) Õ(n 6 ) smoothed worst-case 2 Ω(n) 2 Ω(n) 2 Ω(n) Average-case results: [Chandra, Karloff, Tovey (1999)]. Worst-case results: [Lueker (1975)]. Our results. Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

18 Running time of 2-Opt: Known and New Results General TSP Euclidean metric Manhattan metric average Õ(n 10 ) Õ(n 6 ) n 3+o(1) Õ(n 4.33 ) [Õ(n3.83 )] Õ(n 4 ) [Õ(n3.5 )] smoothed worst-case 2 Ω(n) 2 Ω(n) 2 Ω(n) Average-case results: [Chandra, Karloff, Tovey (1999)]. Worst-case results: [Lueker (1975)]. Our results. Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

19 Lower Bound 1 Introduction 2 Lower Bound 3 Upper Bound 4 Extensions and Open Problems Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

20 Lower Bound Theorem For every n N, there is a graph in the Euclidean plane with 8n vertices on which 2-Opt can make 2 n+3 14 steps. Gadget G 1 Gadget G n Possible States of a Gadget: (Long,Long), (Long,Short), (Short,Long), (Short,Short) Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

21 Lower Bound (Long,Long) = 0 (Long,Short) = 1 (Short,Short) = 2 Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

22 Lower Bound (Long,Long) = (Long,Short) = 1 (Short,Short) = 2 Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

23 Lower Bound (Long,Long) = (Long,Short) = 1 (Short,Short) = 2 Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

24 Lower Bound (Long,Long) = Trigger 1 0 (Long,Short) = 1 (Short,Short) = 2 Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

25 Lower Bound (Long,Long) = Trigger (Long,Short) = 1 2 (Short,Short) = 2 Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

26 Lower Bound (Long,Long) = Trigger (Long,Short) = (Short,Short) = 2 Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

27 Lower Bound (Long,Long) = Trigger (Long,Short) = Trigger 0 (Short,Short) = 2 Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

28 Lower Bound (Long,Long) = Trigger (Long,Short) = Trigger 0 (Short,Short) = Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

29 Lower Bound (Long,Long) = Trigger (Long,Short) = Trigger 0 (Short,Short) = Gadget G i is reset 2 i 1 times to (Long,Long) = 0. Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

30 Euclidean Embedding of the Gadgets Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

31 Upper Bound 1 Introduction 2 Lower Bound 3 Upper Bound 4 Extensions and Open Problems Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

32 Upper Bound Theorem Assume that n points are placed independently, uniformly at random in the unit square [0, 1] 2. The expected number of 2-Opt steps is bounded by O(n 4+1/3 log n) (for every initial tour and every pivot rule). Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

33 Simple Polynomial Bound Theorem The expected number of 2-Opt steps is bounded by O(n 7 log 2 n). Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

34 Simple Polynomial Bound Theorem The expected number of 2-Opt steps is bounded by O(n 7 log 2 n). Proof. Consider a 2-Opt step (e 1, e 2 ) (e 3, e 4 ). (e 1, e 2, e 3, e 4 ) = l(e 1 ) + l(e 2 ) l(e 3 ) l(e 4 ). Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

35 Simple Polynomial Bound Theorem The expected number of 2-Opt steps is bounded by O(n 7 log 2 n). Proof. Consider a 2-Opt step (e 1, e 2 ) (e 3, e 4 ). (e 1, e 2, e 3, e 4 ) = l(e 1 ) + l(e 2 ) l(e 3 ) l(e 4 ). = min (e 1, e 2, e 3, e 4 ). e 1,e 2,e 3,e 4 Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

36 Simple Polynomial Bound Theorem The expected number of 2-Opt steps is bounded by O(n 7 log 2 n). Proof. Consider a 2-Opt step (e 1, e 2 ) (e 3, e 4 ). (e 1, e 2, e 3, e 4 ) = l(e 1 ) + l(e 2 ) l(e 3 ) l(e 4 ). = min (e 1, e 2, e 3, e 4 ). e 1,e 2,e 3,e 4 # 2-Opt Steps 2n. Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

37 Simple Polynomial Bound Theorem The expected number of 2-Opt steps is bounded by O(n 7 log 2 n). Proof. Consider a 2-Opt step (e 1, e 2 ) (e 3, e 4 ). (e 1, e 2, e 3, e 4 ) = l(e 1 ) + l(e 2 ) l(e 3 ) l(e 4 ). = min (e 1, e 2, e 3, e 4 ). e 1,e 2,e 3,e 4 # 2-Opt Steps 2n. Bound by a union bound: There are O(n 4 ) different 2-Opt steps, analyze (e 1, e 2, e 3, e 4 ) for one of them. 1/(n 4 log n). Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

38 Idea for Improvement The bound is too pessimistic: Not every step yields the smallest possible improvement 1/(n 4 log n). Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

39 Idea for Improvement The bound is too pessimistic: Not every step yields the smallest possible improvement 1/(n 4 log n). Consider two consecutive steps: They yield + 2 > 2. Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

40 Idea for Improvement The bound is too pessimistic: Not every step yields the smallest possible improvement 1/(n 4 log n). Consider two consecutive steps: They yield + 2 > 2. Consider linked pair: (e 1, e 2 ) (e 3, e 4 ) and (e 3, e 5 ) (e 6, e 7 ). Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

41 Idea for Improvement The bound is too pessimistic: Not every step yields the smallest possible improvement 1/(n 4 log n). Consider two consecutive steps: They yield + 2 > 2. Consider linked pair: (e 1, e 2 ) (e 3, e 4 ) and (e 3, e 5 ) (e 6, e 7 ). Sequence of t consecutive steps, contains Ω(t) linked pairs: S 1 S 2 S 3 S 4 S 5 S 6 S 7 S 8 S 9 (S 1, S 4 ) (S 2, S 5 ) (S 6, S 9 ) Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

42 Idea for Improvement The bound is too pessimistic: Not every step yields the smallest possible improvement 1/(n 4 log n). Consider two consecutive steps: They yield + 2 > 2. Consider linked pair: (e 1, e 2 ) (e 3, e 4 ) and (e 3, e 5 ) (e 6, e 7 ). Sequence of t consecutive steps, contains Ω(t) linked pairs: S 1 S 2 S 3 S 4 S 5 S 6 S 7 S 8 S 9 Linked 1/(n 3+1/3 log 2/3 n). (S 1, S 4 ) (S 2, S 5 ) (S 6, S 9 ) Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

43 Extensions and Open Problems 1 Introduction 2 Lower Bound 3 Upper Bound 4 Extensions and Open Problems Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

44 Smoothed Analysis Smoothed Analysis Each point i {1,..., n} is chosen independently according to a probability density f i : [0, 1] 2 [0, φ]. Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

45 Smoothed Analysis Smoothed Analysis Each point i {1,..., n} is chosen independently according to a probability density f i : [0, 1] 2 [0, φ]. 1/ φ 1/ φ Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

46 Smoothed Analysis General TSP Euclidean metric Manhattan metric average n 3+o(1) Õ(n 4.33 ) Õ(n 4 ) smoothed m n 1+o(1) φ Õ(n 4.33 φ 2.67 ) Õ(n 4 φ) worst-case 2 Ω(n) 2 Ω(n) 2 Ω(n) Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

47 Approximation Ratio Worst Case: O(log n) Worst Case: Ω(log n/ log log n) Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

48 Approximation Ratio Worst Case: O(log n) Worst Case: Ω(log n/ log log n) Average Case: O(1) Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

49 Approximation Ratio Worst Case: O(log n) Worst Case: Ω(log n/ log log n) Average Case: O(1) Smoothed: O( φ) Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

50 Open Problems Worst-Case Analysis Analyze the diameter of the 2-Opt state graph. Analyze particular pivot rules like largest improvement. Probabilistic Analysis Show exact bounds on the running time of 2-Opt and k-opt. Show small constant approximation ratio for 2-Opt on random Euclidean instances. Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

51 The End Thanks! Questions? Heiko Röglin (RWTH Aachen) Worst Case and Prob. Analysis of 2-Opt Oberwolfach / 21

CMPSCI611: Approximating MAX-CUT Lecture 20

CMPSCI611: Approximating MAX-CUT Lecture 20 CMPSCI611: Approximating MAX-CUT Lecture 20 For the next two lectures we ll be seeing examples of approximation algorithms for interesting NP-hard problems. Today we consider MAX-CUT, which we proved to

More information

ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN. Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015

ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN. Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015 ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015 ONLINE STEINER FOREST PROBLEM An initially given graph G. s 1 s 2 A sequence of demands (s i, t i ) arriving

More information

Offline sorting buffers on Line

Offline sorting buffers on Line Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: rkhandekar@gmail.com 2 IBM India Research Lab, New Delhi. email: pvinayak@in.ibm.com

More information

Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li

Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li Computer Algorithms NP-Complete Problems NP-completeness The quest for efficient algorithms is about finding clever ways to bypass the process of exhaustive search, using clues from the input in order

More information

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm. Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of

More information

NP-complete? NP-hard? Some Foundations of Complexity. Prof. Sven Hartmann Clausthal University of Technology Department of Informatics

NP-complete? NP-hard? Some Foundations of Complexity. Prof. Sven Hartmann Clausthal University of Technology Department of Informatics NP-complete? NP-hard? Some Foundations of Complexity Prof. Sven Hartmann Clausthal University of Technology Department of Informatics Tractability of Problems Some problems are undecidable: no computer

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm. Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three

More information

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms

More information

JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004

JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004 Scientiae Mathematicae Japonicae Online, Vol. 10, (2004), 431 437 431 JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS Ondřej Čepeka and Shao Chin Sung b Received December May 12, 2003; revised February

More information

Approximating Average Distortion of Embeddings into Line

Approximating Average Distortion of Embeddings into Line Approximating Average Distortion of Embeddings into Line Kedar Dhamdhere Carnegie Mellon University Joint work with Anupam Gupta, R. Ravi Finite metric spaces (V, d) is a finite metric space if V is a

More information

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,

More information

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples

More information

Load balancing of temporary tasks in the l p norm

Load balancing of temporary tasks in the l p norm Load balancing of temporary tasks in the l p norm Yossi Azar a,1, Amir Epstein a,2, Leah Epstein b,3 a School of Computer Science, Tel Aviv University, Tel Aviv, Israel. b School of Computer Science, The

More information

A Smoothed Analysis of the k-means Method

A Smoothed Analysis of the k-means Method A Smoothed Analysis of the k-means Method DAVID ARTHUR, Stanford University, Department of Computer Science BODO MANTHEY, University of Twente, Department of Applied Mathematics HEIKO RÖGLIN, University

More information

Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits

Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique

More information

2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8]

2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8] Code No: R05220502 Set No. 1 1. (a) Describe the performance analysis in detail. (b) Show that f 1 (n)+f 2 (n) = 0(max(g 1 (n), g 2 (n)) where f 1 (n) = 0(g 1 (n)) and f 2 (n) = 0(g 2 (n)). [8+8] 2. (a)

More information

CAD Algorithms. P and NP

CAD Algorithms. P and NP CAD Algorithms The Classes P and NP Mohammad Tehranipoor ECE Department 6 September 2010 1 P and NP P and NP are two families of problems. P is a class which contains all of the problems we solve using

More information

Broadcasting in Wireless Networks

Broadcasting in Wireless Networks Université du Québec en Outaouais, Canada 1/46 Outline Intro Known Ad hoc GRN 1 Introduction 2 Networks with known topology 3 Ad hoc networks 4 Geometric radio networks 2/46 Outline Intro Known Ad hoc

More information

Abstract of Approximation Schemes for Euclidean Vehicle Routing Problems. by Aparna Das, Ph.D., Brown University, May, 2011.

Abstract of Approximation Schemes for Euclidean Vehicle Routing Problems. by Aparna Das, Ph.D., Brown University, May, 2011. Abstract of Approximation Schemes for Euclidean Vehicle Routing Problems. by Aparna Das, Ph.D., Brown University, May, 2011. Vehicle routing is a class of optimization problems where the objective is to

More information

Near Optimal Solutions

Near Optimal Solutions Near Optimal Solutions Many important optimization problems are lacking efficient solutions. NP-Complete problems unlikely to have polynomial time solutions. Good heuristics important for such problems.

More information

Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs

Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Stavros Athanassopoulos, Ioannis Caragiannis, and Christos Kaklamanis Research Academic Computer Technology Institute

More information

Tutorial 8. NP-Complete Problems

Tutorial 8. NP-Complete Problems Tutorial 8 NP-Complete Problems Decision Problem Statement of a decision problem Part 1: instance description defining the input Part 2: question stating the actual yesor-no question A decision problem

More information

Introduction to Algorithms. Part 3: P, NP Hard Problems

Introduction to Algorithms. Part 3: P, NP Hard Problems Introduction to Algorithms Part 3: P, NP Hard Problems 1) Polynomial Time: P and NP 2) NP-Completeness 3) Dealing with Hard Problems 4) Lower Bounds 5) Books c Wayne Goddard, Clemson University, 2004 Chapter

More information

Well-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications

Well-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications Well-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications Jie Gao Department of Computer Science Stanford University Joint work with Li Zhang Systems Research Center Hewlett-Packard

More information

B490 Mining the Big Data. 2 Clustering

B490 Mining the Big Data. 2 Clustering B490 Mining the Big Data 2 Clustering Qin Zhang 1-1 Motivations Group together similar documents/webpages/images/people/proteins/products One of the most important problems in machine learning, pattern

More information

Class constrained bin covering

Class constrained bin covering Class constrained bin covering Leah Epstein Csanád Imreh Asaf Levin Abstract We study the following variant of the bin covering problem. We are given a set of unit sized items, where each item has a color

More information

Is n a Prime Number? Manindra Agrawal. March 27, 2006, Delft. IIT Kanpur

Is n a Prime Number? Manindra Agrawal. March 27, 2006, Delft. IIT Kanpur Is n a Prime Number? Manindra Agrawal IIT Kanpur March 27, 2006, Delft Manindra Agrawal (IIT Kanpur) Is n a Prime Number? March 27, 2006, Delft 1 / 47 Overview 1 The Problem 2 Two Simple, and Slow, Methods

More information

Single machine models: Maximum Lateness -12- Approximation ratio for EDD for problem 1 r j,d j < 0 L max. structure of a schedule Q...

Single machine models: Maximum Lateness -12- Approximation ratio for EDD for problem 1 r j,d j < 0 L max. structure of a schedule Q... Lecture 4 Scheduling 1 Single machine models: Maximum Lateness -12- Approximation ratio for EDD for problem 1 r j,d j < 0 L max structure of a schedule 0 Q 1100 11 00 11 000 111 0 0 1 1 00 11 00 11 00

More information

Nimble Algorithms for Cloud Computing. Ravi Kannan, Santosh Vempala and David Woodruff

Nimble Algorithms for Cloud Computing. Ravi Kannan, Santosh Vempala and David Woodruff Nimble Algorithms for Cloud Computing Ravi Kannan, Santosh Vempala and David Woodruff Cloud computing Data is distributed arbitrarily on many servers Parallel algorithms: time Streaming algorithms: sublinear

More information

GENERATING LOW-DEGREE 2-SPANNERS

GENERATING LOW-DEGREE 2-SPANNERS SIAM J. COMPUT. c 1998 Society for Industrial and Applied Mathematics Vol. 27, No. 5, pp. 1438 1456, October 1998 013 GENERATING LOW-DEGREE 2-SPANNERS GUY KORTSARZ AND DAVID PELEG Abstract. A k-spanner

More information

Graph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003

Graph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003 Graph models for the Web and the Internet Elias Koutsoupias University of Athens and UCLA Crete, July 2003 Outline of the lecture Small world phenomenon The shape of the Web graph Searching and navigation

More information

Cycles and clique-minors in expanders

Cycles and clique-minors in expanders Cycles and clique-minors in expanders Benny Sudakov UCLA and Princeton University Expanders Definition: The vertex boundary of a subset X of a graph G: X = { all vertices in G\X with at least one neighbor

More information

Running Time Analysis of ACO Systems for Shortest Path Problems

Running Time Analysis of ACO Systems for Shortest Path Problems Running Time Analysis of ACO Systems for Shortest Path Problems Christian Horoba 1 and Dirk Sudholt 1,2 1 Fakultät für Informatik, LS 2, Technische Universität Dortmund, Dortmund, Germany, lastname@ls2.cs.tu-dortmund.de

More information

To Fill or not to Fill: The Gas Station Problem.

To Fill or not to Fill: The Gas Station Problem. To Fill or not to Fill: The Gas Station Problem. SAMIR KHULLER Dept. of Computer Science and Institute for Advanced Computer Studies University of Maryland, College Park, U.S.A. AZARAKHSH MALEKIAN Dept.

More information

Computational Geometry. Lecture 1: Introduction and Convex Hulls

Computational Geometry. Lecture 1: Introduction and Convex Hulls Lecture 1: Introduction and convex hulls 1 Geometry: points, lines,... Plane (two-dimensional), R 2 Space (three-dimensional), R 3 Space (higher-dimensional), R d A point in the plane, 3-dimensional space,

More information

20 Selfish Load Balancing

20 Selfish Load Balancing 20 Selfish Load Balancing Berthold Vöcking Abstract Suppose that a set of weighted tasks shall be assigned to a set of machines with possibly different speeds such that the load is distributed evenly among

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

More information

Guessing Game: NP-Complete?

Guessing Game: NP-Complete? Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES 2. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple

More information

The Butterfly, Cube-Connected-Cycles and Benes Networks

The Butterfly, Cube-Connected-Cycles and Benes Networks The Butterfly, Cube-Connected-Cycles and Benes Networks Michael Lampis mlambis@softlab.ntua.gr NTUA The Butterfly, Cube-Connected-Cycles and Benes Networks p.1/16 Introduction Hypercubes are computationally

More information

Distributed Selfish Load Balancing on Networks

Distributed Selfish Load Balancing on Networks Distributed Selfish Load Balancing on Networks Petra Berenbrink Martin Hoefer Thomas Sauerwald Abstract We study distributed load balancing in networks with selfish agents In the simplest model considered

More information

Energy Efficient Monitoring in Sensor Networks

Energy Efficient Monitoring in Sensor Networks Energy Efficient Monitoring in Sensor Networks Amol Deshpande, Samir Khuller, Azarakhsh Malekian, Mohammed Toossi Computer Science Department, University of Maryland, A.V. Williams Building, College Park,

More information

Load Balancing. Load Balancing 1 / 24

Load Balancing. Load Balancing 1 / 24 Load Balancing Backtracking, branch & bound and alpha-beta pruning: how to assign work to idle processes without much communication? Additionally for alpha-beta pruning: implementing the young-brothers-wait

More information

17.3.1 Follow the Perturbed Leader

17.3.1 Follow the Perturbed Leader CS787: Advanced Algorithms Topic: Online Learning Presenters: David He, Chris Hopman 17.3.1 Follow the Perturbed Leader 17.3.1.1 Prediction Problem Recall the prediction problem that we discussed in class.

More information

Network Design with Coverage Costs

Network Design with Coverage Costs Network Design with Coverage Costs Siddharth Barman 1 Shuchi Chawla 2 Seeun William Umboh 2 1 Caltech 2 University of Wisconsin-Madison APPROX-RANDOM 2014 Motivation Physical Flow vs Data Flow vs. Commodity

More information

MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research

MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research MapReduce and Distributed Data Analysis Google Research 1 Dealing With Massive Data 2 2 Dealing With Massive Data Polynomial Memory Sublinear RAM Sketches External Memory Property Testing 3 3 Dealing With

More information

A Note on Maximum Independent Sets in Rectangle Intersection Graphs

A Note on Maximum Independent Sets in Rectangle Intersection Graphs A Note on Maximum Independent Sets in Rectangle Intersection Graphs Timothy M. Chan School of Computer Science University of Waterloo Waterloo, Ontario N2L 3G1, Canada tmchan@uwaterloo.ca September 12,

More information

Boulder Dash is NP hard

Boulder Dash is NP hard Boulder Dash is NP hard Marzio De Biasi marziodebiasi [at] gmail [dot] com December 2011 Version 0.01:... now the difficult part: is it NP? Abstract Boulder Dash is a videogame created by Peter Liepa and

More information

Small Maximal Independent Sets and Faster Exact Graph Coloring

Small Maximal Independent Sets and Faster Exact Graph Coloring Small Maximal Independent Sets and Faster Exact Graph Coloring David Eppstein Univ. of California, Irvine Dept. of Information and Computer Science The Exact Graph Coloring Problem: Given an undirected

More information

Analyzing the Facebook graph?

Analyzing the Facebook graph? Logistics Big Data Algorithmic Introduction Prof. Yuval Shavitt Contact: shavitt@eng.tau.ac.il Final grade: 4 6 home assignments (will try to include programing assignments as well): 2% Exam 8% Big Data

More information

Computational complexity theory

Computational complexity theory Computational complexity theory Goal: A general theory of the resources needed to solve computational problems What types of resources? Time What types of computational problems? decision problem Decision

More information

Factoring & Primality

Factoring & Primality Factoring & Primality Lecturer: Dimitris Papadopoulos In this lecture we will discuss the problem of integer factorization and primality testing, two problems that have been the focus of a great amount

More information

MATHEMATICAL ENGINEERING TECHNICAL REPORTS. The Best-fit Heuristic for the Rectangular Strip Packing Problem: An Efficient Implementation

MATHEMATICAL ENGINEERING TECHNICAL REPORTS. The Best-fit Heuristic for the Rectangular Strip Packing Problem: An Efficient Implementation MATHEMATICAL ENGINEERING TECHNICAL REPORTS The Best-fit Heuristic for the Rectangular Strip Packing Problem: An Efficient Implementation Shinji IMAHORI, Mutsunori YAGIURA METR 2007 53 September 2007 DEPARTMENT

More information

Online and Offline Selling in Limit Order Markets

Online and Offline Selling in Limit Order Markets Online and Offline Selling in Limit Order Markets Kevin L. Chang 1 and Aaron Johnson 2 1 Yahoo Inc. klchang@yahoo-inc.com 2 Yale University ajohnson@cs.yale.edu Abstract. Completely automated electronic

More information

Ph.D. Thesis. Judit Nagy-György. Supervisor: Péter Hajnal Associate Professor

Ph.D. Thesis. Judit Nagy-György. Supervisor: Péter Hajnal Associate Professor Online algorithms for combinatorial problems Ph.D. Thesis by Judit Nagy-György Supervisor: Péter Hajnal Associate Professor Doctoral School in Mathematics and Computer Science University of Szeged Bolyai

More information

Adaptive Online Gradient Descent

Adaptive Online Gradient Descent Adaptive Online Gradient Descent Peter L Bartlett Division of Computer Science Department of Statistics UC Berkeley Berkeley, CA 94709 bartlett@csberkeleyedu Elad Hazan IBM Almaden Research Center 650

More information

MATHEMATICAL ENGINEERING TECHNICAL REPORTS. An Improved Approximation Algorithm for the Traveling Tournament Problem

MATHEMATICAL ENGINEERING TECHNICAL REPORTS. An Improved Approximation Algorithm for the Traveling Tournament Problem MATHEMATICAL ENGINEERING TECHNICAL REPORTS An Improved Approximation Algorithm for the Traveling Tournament Problem Daisuke YAMAGUCHI, Shinji IMAHORI, Ryuhei MIYASHIRO, Tomomi MATSUI METR 2009 42 September

More information

On the effect of forwarding table size on SDN network utilization

On the effect of forwarding table size on SDN network utilization IBM Haifa Research Lab On the effect of forwarding table size on SDN network utilization Rami Cohen IBM Haifa Research Lab Liane Lewin Eytan Yahoo Research, Haifa Seffi Naor CS Technion, Israel Danny Raz

More information

Analysis of Different MMAS ACO Algorithms on Unimodal Functions and Plateaus

Analysis of Different MMAS ACO Algorithms on Unimodal Functions and Plateaus Noname manuscript No. (will be inserted by the editor) Analysis of Different MMAS ACO Algorithms on Unimodal Functions and Plateaus Frank Neumann Dirk Sudholt Carsten Witt the date of receipt and acceptance

More information

Complexity Classes P and NP

Complexity Classes P and NP Complexity Classes P and NP MATH 3220 Supplemental Presentation by John Aleshunas The cure for boredom is curiosity. There is no cure for curiosity Dorothy Parker Computational Complexity Theory In computer

More information

1 The Line vs Point Test

1 The Line vs Point Test 6.875 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 5: Low Degree Testing Lecturer: Dana Moshkovitz Scribe: Gregory Minton and Dana Moshkovitz Having seen a probabilistic verifier for linearity

More information

NP-Completeness. CptS 223 Advanced Data Structures. Larry Holder School of Electrical Engineering and Computer Science Washington State University

NP-Completeness. CptS 223 Advanced Data Structures. Larry Holder School of Electrical Engineering and Computer Science Washington State University NP-Completeness CptS 223 Advanced Data Structures Larry Holder School of Electrical Engineering and Computer Science Washington State University 1 Hard Graph Problems Hard means no known solutions with

More information

Single machine parallel batch scheduling with unbounded capacity

Single machine parallel batch scheduling with unbounded capacity Workshop on Combinatorics and Graph Theory 21th, April, 2006 Nankai University Single machine parallel batch scheduling with unbounded capacity Yuan Jinjiang Department of mathematics, Zhengzhou University

More information

5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1

5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 General Integer Linear Program: (ILP) min c T x Ax b x 0 integer Assumption: A, b integer The integrality condition

More information

Moving Target Search. 204 Automated Reasoning

Moving Target Search. 204 Automated Reasoning Moving Target Search Toru Ishida NTT Communications and Information Processing Laboratories 1-2356, Take, Yokosuka, 238-03, JAPAN ishida%nttkb.ntt.jp@relay.cs.net Richard E. Korf Computer Science Department

More information

Attacking Anonymized Social Network

Attacking Anonymized Social Network Attacking Anonymized Social Network From: Wherefore Art Thou RX3579X? Anonymized Social Networks, Hidden Patterns, and Structural Steganography Presented By: Machigar Ongtang (Ongtang@cse.psu.edu ) Social

More information

Applied Algorithm Design Lecture 5

Applied Algorithm Design Lecture 5 Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design

More information

Private Approximation of Clustering and Vertex Cover

Private Approximation of Clustering and Vertex Cover Private Approximation of Clustering and Vertex Cover Amos Beimel, Renen Hallak, and Kobbi Nissim Department of Computer Science, Ben-Gurion University of the Negev Abstract. Private approximation of search

More information

Approximability of Cycle Covers and Smoothed Analysis of Binary Search Trees

Approximability of Cycle Covers and Smoothed Analysis of Binary Search Trees Approximability of Cycle Covers and Smoothed Analysis of Binary Search Trees Bodo Manthey Dissertation Universität zu Lübeck Institut für Theoretische Informatik Aus dem Institut für Theoretische Informatik

More information

(67902) Topics in Theory and Complexity Nov 2, 2006. Lecture 7

(67902) Topics in Theory and Complexity Nov 2, 2006. Lecture 7 (67902) Topics in Theory and Complexity Nov 2, 2006 Lecturer: Irit Dinur Lecture 7 Scribe: Rani Lekach 1 Lecture overview This Lecture consists of two parts In the first part we will refresh the definition

More information

Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs

Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like

More information

An Experimental Study of Data Migration Algorithms

An Experimental Study of Data Migration Algorithms An Experimental Study of Data Migration Algorithms Eric Anderson 1,JoeHall 2, Jason Hartline 2, Michael Hobbs 1, Anna R. Karlin 2, Jared Saia 2, Ram Swaminathan 1, and John Wilkes 1 1 Storage Systems Program,

More information

THE TRAVELING SALESMAN PROBLEM AND ITS VARIATIONS

THE TRAVELING SALESMAN PROBLEM AND ITS VARIATIONS THE TRAVELING SALESMAN PROBLEM AND ITS VARIATIONS Edited by GREGORY GUTIN Royal Holloway, University of London, UK ABRAHAM PUNNEN University of New Brunswick, St. John, Canada Kluwer Academic Publishers

More information

8.1 Min Degree Spanning Tree

8.1 Min Degree Spanning Tree CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree

More information

TU e. Advanced Algorithms: experimentation project. The problem: load balancing with bounded look-ahead. Input: integer m 2: number of machines

TU e. Advanced Algorithms: experimentation project. The problem: load balancing with bounded look-ahead. Input: integer m 2: number of machines The problem: load balancing with bounded look-ahead Input: integer m 2: number of machines integer k 0: the look-ahead numbers t 1,..., t n : the job sizes Problem: assign jobs to machines machine to which

More information

The Freeze-Tag Problem: How to Wake Up a Swarm of Robots

The Freeze-Tag Problem: How to Wake Up a Swarm of Robots The Freeze-Tag Problem: How to Wake Up a Swarm of Robots Esther M. Arkin Michael A. Bender Sándor P. Fekete Joseph S. B. Mitchell Martin Skutella Abstract An optimization problem that naturally arises

More information

Introduction to computer science

Introduction to computer science Introduction to computer science Michael A. Nielsen University of Queensland Goals: 1. Introduce the notion of the computational complexity of a problem, and define the major computational complexity classes.

More information

The Relative Worst Order Ratio for On-Line Algorithms

The Relative Worst Order Ratio for On-Line Algorithms The Relative Worst Order Ratio for On-Line Algorithms Joan Boyar 1 and Lene M. Favrholdt 2 1 Department of Mathematics and Computer Science, University of Southern Denmark, Odense, Denmark, joan@imada.sdu.dk

More information

Efficient Fault-Tolerant Infrastructure for Cloud Computing

Efficient Fault-Tolerant Infrastructure for Cloud Computing Efficient Fault-Tolerant Infrastructure for Cloud Computing Xueyuan Su Candidate for Ph.D. in Computer Science, Yale University December 2013 Committee Michael J. Fischer (advisor) Dana Angluin James Aspnes

More information

DATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS

DATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS DATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS 1 AND ALGORITHMS Chiara Renso KDD-LAB ISTI- CNR, Pisa, Italy WHAT IS CLUSTER ANALYSIS? Finding groups of objects such that the objects in a group will be similar

More information

Persistent Data Structures and Planar Point Location

Persistent Data Structures and Planar Point Location Persistent Data Structures and Planar Point Location Inge Li Gørtz Persistent Data Structures Ephemeral Partial persistence Full persistence Confluent persistence V1 V1 V1 V1 V2 q ue V2 V2 V5 V2 V4 V4

More information

Arithmetic Coding: Introduction

Arithmetic Coding: Introduction Data Compression Arithmetic coding Arithmetic Coding: Introduction Allows using fractional parts of bits!! Used in PPM, JPEG/MPEG (as option), Bzip More time costly than Huffman, but integer implementation

More information

Faster deterministic integer factorisation

Faster deterministic integer factorisation David Harvey (joint work with Edgar Costa, NYU) University of New South Wales 25th October 2011 The obvious mathematical breakthrough would be the development of an easy way to factor large prime numbers

More information

11. APPROXIMATION ALGORITHMS

11. APPROXIMATION ALGORITHMS 11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: vertex cover LP rounding: vertex cover generalized load balancing knapsack problem Lecture slides by Kevin Wayne Copyright 2005

More information

Ant Colony Optimization (ACO)

Ant Colony Optimization (ACO) Ant Colony Optimization (ACO) Exploits foraging behavior of ants Path optimization Problems mapping onto foraging are ACO-like TSP, ATSP QAP Travelling Salesman Problem (TSP) Why? Hard, shortest path problem

More information

Consider a problem in which we are given a speed function

Consider a problem in which we are given a speed function Fast marching methods for the continuous traveling salesman problem June Andrews and J. A. Sethian* Department of Mathematics, University of California, Berkeley, CA 94720 Communicated by Alexandre J.

More information

Solving Min-Max Multi-Depot Vehicle Routing Problem

Solving Min-Max Multi-Depot Vehicle Routing Problem Solving Min-Max Multi-Depot Vehicle Routing Problem John Carlsson ; Dongdong Ge ; Arjun Subramaniam ; Amy Wu ; and Yinyu Ye 1st May 2007 Abstract The Multi-Depot Vehicle Routing Problem (MDVRP) is a generalization

More information

AI: A Modern Approach, Chpts. 3-4 Russell and Norvig

AI: A Modern Approach, Chpts. 3-4 Russell and Norvig AI: A Modern Approach, Chpts. 3-4 Russell and Norvig Sequential Decision Making in Robotics CS 599 Geoffrey Hollinger and Gaurav Sukhatme (Some slide content from Stuart Russell and HweeTou Ng) Spring,

More information

CSC2420 Spring 2015: Lecture 3

CSC2420 Spring 2015: Lecture 3 CSC2420 Spring 2015: Lecture 3 Allan Borodin January 22, 2015 1 / 1 Announcements and todays agenda Assignment 1 due next Thursday. I may add one or two additional questions today or tomorrow. Todays agenda

More information

Lecture 7: NP-Complete Problems

Lecture 7: NP-Complete Problems IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 7: NP-Complete Problems David Mix Barrington and Alexis Maciel July 25, 2000 1. Circuit

More information

A o(n)-competitive Deterministic Algorithm for Online Matching on a Line

A o(n)-competitive Deterministic Algorithm for Online Matching on a Line A o(n)-competitive Deterministic Algorithm for Online Matching on a Line Antonios Antoniadis 2, Neal Barcelo 1, Michael Nugent 1, Kirk Pruhs 1, and Michele Scquizzato 3 1 Department of Computer Science,

More information

Problem Set 7 Solutions

Problem Set 7 Solutions 8 8 Introduction to Algorithms May 7, 2004 Massachusetts Institute of Technology 6.046J/18.410J Professors Erik Demaine and Shafi Goldwasser Handout 25 Problem Set 7 Solutions This problem set is due in

More information

The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge,

The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge, The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge, cheapest first, we had to determine whether its two endpoints

More information

THE NUMBER OF REPRESENTATIONS OF n OF THE FORM n = x 2 2 y, x > 0, y 0

THE NUMBER OF REPRESENTATIONS OF n OF THE FORM n = x 2 2 y, x > 0, y 0 THE NUMBER OF REPRESENTATIONS OF n OF THE FORM n = x 2 2 y, x > 0, y 0 RICHARD J. MATHAR Abstract. We count solutions to the Ramanujan-Nagell equation 2 y +n = x 2 for fixed positive n. The computational

More information

Steiner Tree Approximation via IRR. Randomized Rounding

Steiner Tree Approximation via IRR. Randomized Rounding Steiner Tree Approximation via Iterative Randomized Rounding Graduate Program in Logic, Algorithms and Computation μπλ Network Algorithms and Complexity June 18, 2013 Overview 1 Introduction Scope Related

More information

Local search for the minimum label spanning tree problem with bounded color classes

Local search for the minimum label spanning tree problem with bounded color classes Available online at www.sciencedirect.com Operations Research Letters 31 (003) 195 01 Operations Research Letters www.elsevier.com/locate/dsw Local search for the minimum label spanning tree problem with

More information

Theoretical Computer Science (Bridging Course) Complexity

Theoretical Computer Science (Bridging Course) Complexity Theoretical Computer Science (Bridging Course) Complexity Gian Diego Tipaldi A scenario You are a programmer working for a logistics company Your boss asks you to implement a program that optimizes the

More information

Efficiency of algorithms. Algorithms. Efficiency of algorithms. Binary search and linear search. Best, worst and average case.

Efficiency of algorithms. Algorithms. Efficiency of algorithms. Binary search and linear search. Best, worst and average case. Algorithms Efficiency of algorithms Computational resources: time and space Best, worst and average case performance How to compare algorithms: machine-independent measure of efficiency Growth rate Complexity

More information

THE SCHEDULING OF MAINTENANCE SERVICE

THE SCHEDULING OF MAINTENANCE SERVICE THE SCHEDULING OF MAINTENANCE SERVICE Shoshana Anily Celia A. Glass Refael Hassin Abstract We study a discrete problem of scheduling activities of several types under the constraint that at most a single

More information

Network Algorithms for Homeland Security

Network Algorithms for Homeland Security Network Algorithms for Homeland Security Mark Goldberg and Malik Magdon-Ismail Rensselaer Polytechnic Institute September 27, 2004. Collaborators J. Baumes, M. Krishmamoorthy, N. Preston, W. Wallace. Partially

More information