Vertex Cover Problems

Size: px
Start display at page:

Download "Vertex Cover Problems"

Transcription

1 Rob van Stee: Approximations- und Online-Algorithmen 1 Vertex Cover Problems Consider a graph G=(V,E) S V is a vertex cover if {u,v} E : u S v S minimum vertex cover (MIN-VCP): find a vertex cover S that minimizes S.

2 Rob van Stee: Approximations- und Online-Algorithmen 2 Motivation This problem has many applications Example: placing ATMs in a city Each additional ATM costs money Want to have an ATM in every street (block, district) Where should they be placed so that we need as little ATMs as possible?

3 Rob van Stee: Approximations- und Online-Algorithmen 3 Greedy Algorithm Function greedyvc(v,e) C:= /0 while E /0 do return C select any {u, v} E C:= C {u,v} remove all edges incident to u or v from E Exercise: explain how to implement the algorithm to run in time O( V + E ) b a b a b a b c e c d h e f g c e c d f d f d h g h g h a e f g (postprocess:)

4 Rob van Stee: Approximations- und Online-Algorithmen 4 Greedy Algorithm Function greedyvc(v,e) C:= /0 while E /0 do return C select any {u, v} E C:= C {u,v} remove all edges incident to u or v from E Exercise: explain how to implement the algorithm to run in time O( V + E ) b a b a b a b a c d h e f g c d h e f g c d h e f g c d h e f g

5 Rob van Stee: Approximations- und Online-Algorithmen 5 Greedy Algorithm Function greedyvc(v,e) C:= /0 while E /0 do return C select any {u, v} E C:= C {u,v} remove all edges incident to u or v from E Exercise: explain how to implement the algorithm to run in time O( V + E ) b a b a b a b a c d h e f g c d h e f g c d h e f g c d h e f g

6 Rob van Stee: Approximations- und Online-Algorithmen 6 Greedy Algorithm Function greedyvc(v,e) C:= /0 while E /0 do return C select any {u, v} E C:= C {u,v} remove all edges incident to u or v from E Exercise: explain how to implement the algorithm to run in time O( V + E ) b a b a b a b a c d h e f g c d h e f g c d h e f g c d h e f g

7 Rob van Stee: Approximations- und Online-Algorithmen 7 Theorem 1. Algorithm greedyvc computes a two-approximation of MIN-VCP. Proof. Correctness: trivial since only covered edges are removed. Quality: Let A denote the set of edges selected by greedyvc. We have C =2 A. A is a matching, i.e., no node covers two edges in A. Hence, any vertex cover contains at least one node from each edge in A, i.e., opt A.

8 Rob van Stee: Approximations- und Online-Algorithmen 8 Weighted Vertex Cover Consider a graph G=(V,E) S V is a vertex cover if {u,v} E : u S v S 1 1 minimum WEIGHT vertex cover (WEIGHT-VCP): find a vertex cover S that minimizes c(s) v S

9 Rob van Stee: Approximations- und Online-Algorithmen ILP Formulation Assume V ={1,...,n} Variables: x v = 1 iff v V minimize c x subject to {u,v} E : x u + x v 1 v V : x v {0,1}

10 Rob van Stee: Approximations- und Online-Algorithmen ILP Formulation Linear Relaxation Assume V ={1,...,n} Variables: x v = 1 iff v V minimize c x subject to {u,v} E : x u + x v 1 v V : x v {0,1} Assume V ={1,...,n} Variables: x v = 1 iff v V minimize c x subject to {u,v} E : x u + x v 1 v V : x v 0

11 Rob van Stee: Approximations- und Online-Algorithmen ILP Formulation Linear Relaxation Assume V ={1,...,n} Variables: x v = 1 iff v V minimize c x subject to {u,v} E : x u + x v 1 v V : x v {0,1} Assume V ={1,...,n} Variables: x v = 1 iff v V minimize c x subject to {u,v} E : x u + x v 1 v V : x v 0 LP Rounding Algorithm for WEIGHT-VCP Function lpweightedvc(v, E, c) x:= lpsolve(linearrelaxation(v, E, c)) return{v V : x v 1/2}

12 Rob van Stee: Approximations- und Online-Algorithmen 12 Theorem 2. Algorithm lpweightedvc computes a two-approximation of WEIGHT-VCP. Correctness: Consider any edge {u,v} E. We have x u + x v 1, hence, max{x u,x v } 1/2, i.e., rounding will put at least one of {u,v} into the output.

13 Rob van Stee: Approximations- und Online-Algorithmen 13 Theorem 2. Algorithm lpweightedvc computes a two-approximation of WEIGHT-VCP. Quality: Let x := the solution computed by lpweightedvc x := the optimal solution, and x := the optimal solution of the linear relaxation c x= c i 2 x i c i 2 x i 1/2 x i 1/2 n i=1 x i c i = 2c x 2c x

14 Rob van Stee: Approximations- und Online-Algorithmen 14 Theorem 2. Algorithm lpweightedvc computes a two-approximation of WEIGHT-VCP. Quality: Let x := the solution computed by lpweightedvc x := the optimal solution, and x := the optimal solution of the linear relaxation c x= c i 2 x i c i 2 x i 1/2 x i 1/2 n i=1 x i c i = 2c x 2c x

15 Rob van Stee: Approximations- und Online-Algorithmen 15 Theorem 2. Algorithm lpweightedvc computes a two-approximation of WEIGHT-VCP. Quality: Let x := the solution computed by lpweightedvc x := the optimal solution, and x := the optimal solution of the linear relaxation c x= c i 2 x i c i 2 x i 1/2 x i 1/2 n i=1 x i c i = 2c x 2c x

16 Rob van Stee: Approximations- und Online-Algorithmen 16 Theorem 2. Algorithm lpweightedvc computes a two-approximation of WEIGHT-VCP. Quality: Let x := the solution computed by lpweightedvc x := the optimal solution, and x := the optimal solution of the linear relaxation c x= c i 2 x i c i 2 x i 1/2 x i 1/2 n i=1 x i c i = 2c x 2c x

17 Rob van Stee: Approximations- und Online-Algorithmen 17 Theorem 2. Algorithm lpweightedvc computes a two-approximation of WEIGHT-VCP. Quality: Let x := the solution computed by lpweightedvc x := the optimal solution, and x := the optimal solution of the linear relaxation c x= c i 2 x i c i 2 x i 1/2 x i 1/2 n i=1 x i c i = 2c x 2c x

18 Rob van Stee: Approximations- und Online-Algorithmen 18 Iterated Rounding [Vazirani Section 23.2] Function iteratedlpweightedvc(v, E, c) M:= /0 while E >0 do x:= lpsolve(linearrelaxation(v, E, c)) let v denote the node which maximizes x v M:= M {v} V:= V \{v} return M E:= E\{{u,v} E}

19 Rob van Stee: Approximations- und Online-Algorithmen 19 Iterated Rounding: Discussion Might give better solutions for many inputs No better approximation guarantees for VC Larger (still polynomial) execution time But: Resolving an LP is often quite fast Important technique for other problems

20 Rob van Stee: Approximations- und Online-Algorithmen 20 A Randomized Algorithm [Ausiello et al. Section 5.1] Function randweightedvc(v, E, c) C:= /0 while E /0 do b a b a c e c e d f d f h g h g select any {v,t} E b c d h return C flip a coin with sides {v,t} and P[v]= c t c v + c t x:= upper side of coin C:= C {x} remove all edges incident to x from E a b a b a e c e c e f d f d f g h g h g

21 Rob van Stee: Approximations- und Online-Algorithmen 21 Theorem 3. Algorithm randweightedvc computes a vertex cover x with E[c x] 2c x. Correctness: as for greedyvc.

22 Rob van Stee: Approximations- und Online-Algorithmen 22 Theorem: Algorithm randweightedvc computes a vertex cover x with E[c x] 2c x. Quality: Define the random variables c v if v x X v := 0 otherwise c v if {v,t} is selected and v x X {v,t},v := 0 otherwise (1) (2) Note that X v = X {v,t},v {t:{v,t} E}

23 Rob van Stee: Approximations- und Online-Algorithmen 23 Lemma 4. E[X {v,t},v ]=E[X {v,t},t ] Proof. E[X {v,t},v ]=c v P[{v,t} is selected ]P[v x] E[X {v,t},v ]=c v P[{v,t} is selected ] c v + c t c v = c t P[{v,t} is selected ] c v + c t =E[X {v,t},t ] c t

24 Rob van Stee: Approximations- und Online-Algorithmen 24 Lemma 4. E[X {v,t},v ]=E[X {v,t},t ] Proof. E[X {v,t},v ]=c v P[{v,t} is selected ]P[v x] E[X {v,t},v ]=c v P[{v,t} is selected ] c v + c t c v = c t P[{v,t} is selected ] c v + c t =E[X {v,t},t ] c t

25 Rob van Stee: Approximations- und Online-Algorithmen 25 Lemma 4. E[X {v,t},v ]=E[X {v,t},t ] Proof. E[X {v,t},v ]=c v P[{v,t} is selected ]P[v x] E[X {v,t},v ]=c v P[{v,t} is selected ] c v + c t c v = c t P[{v,t} is selected ] c v + c t =E[X {v,t},t ] c t

26 Rob van Stee: Approximations- und Online-Algorithmen 26 Lemma 5. v x E[X v ] t x E[X t ] Proof. E[X v ]= E v x v x But also t x E[X t ]= t x Every term in (*) shows up in (**). [ ] X {v,t},v {t:{v,t} E} (X v = X {v,t},v ) {t:{v,t} E} = E[X {v,t},v ] Linearity ofe[ ] v x {t:{v,t} E} = E[X {v,t},t ](*). Lemma 4 v x {t:{v,t} E} E[X {v,t},t ](**). {v:{v,t} E}

27 Rob van Stee: Approximations- und Online-Algorithmen 27 Lemma 5. v x E[X v ] t x E[X t ] Proof. E[X v ]= E v x v x But also t x E[X t ]= t x Every term in (*) shows up in (**). [ ] X {v,t},v {t:{v,t} E} (X v = X {v,t},v ) {t:{v,t} E} = E[X {v,t},v ] Linearity ofe[ ] v x {t:{v,t} E} = E[X {v,t},t ](*). Lemma 4 v x {t:{v,t} E} E[X {v,t},t ](**). {v:{v,t} E}

28 Rob van Stee: Approximations- und Online-Algorithmen 28 Lemma 5. v x E[X v ] t x E[X t ] Proof. E[X v ]= E v x v x But also t x E[X t ]= t x Every term in (*) shows up in (**). [ ] X {v,t},v {t:{v,t} E} (X v = X {v,t},v ) {t:{v,t} E} = E[X {v,t},v ] Linearity ofe[ ] v x {t:{v,t} E} = E[X {v,t},t ](*). Lemma 4 v x {t:{v,t} E} E[X {v,t},t ](**). {v:{v,t} E}

29 Rob van Stee: Approximations- und Online-Algorithmen 29 Lemma 5. v x E[X v ] t x E[X t ] Proof. E[X v ]= E v x v x [ ] X {v,t},v {t:{v,t} E} (X v = X {v,t},v ) {t:{v,t} E} = E[X {v,t},v ] Linearity ofe[ ] v x {t:{v,t} E} But also t x E[X t ]= t x Every term in (*) shows up in (**). = E[X {v,t},t ](*). Lemma 4 v x {t:{v,t} E} E[X {v,t},t ](**). {v:{v,t} E} t... t v t

30 Rob van Stee: Approximations- und Online-Algorithmen 30 Theorem: Algorithm randweightedvc computes a vertex cover x with E[c x] 2c x. Quality: (Finishing Up) v V E[X v ] = v x E[X v ]+ t x E[X t ] Lemma 5 2 t x c t X t = 0 or X t = c t

31 Rob van Stee: Approximations- und Online-Algorithmen 31 Theorem: Algorithm randweightedvc computes a vertex cover x with E[c x] 2c x. Quality: (Finishing Up) v V E[X v ] = v x E[X v ]+ t x E[X t ] Lemma 5 2 t x E[X t ] 2 t x c t X t = 0 or X t = c t

32 Rob van Stee: Approximations- und Online-Algorithmen 32 Theorem: Algorithm randweightedvc computes a vertex cover x with E[c x] 2c x. Quality: (Finishing Up) v V E[X v ] = v x E[X v ]+ t x E[X t ] Lemma 5 2 t x E[X t ] 2 t x c t X t = 0 or X t = c t

33 Rob van Stee: Approximations- und Online-Algorithmen 33 Theorem: Algorithm randweightedvc computes a vertex cover x with E[c x] 2c x. Quality: (Finishing Up) v V E[X v ] = v x E[X v ]+ t x E[X t ] Lemma 5 2 t x E[X t ] 2 c t t x = 2c x X t = 0 or X t = c t

34 Rob van Stee: Approximations- und Online-Algorithmen 34 More on Vertex Cover There are simple deterministic linear time 2-approximations. (Special case of set covering) Best known algorithm: ratio 2 Θ(1/ logn) fixed parameter algorithms: [Niedermeyer Rossmanith] find optimal solution in time O ( kn+k k) if x k. Key idea: (clever) exhaustive search+problem reductions. Example: include nodes of degree k. include neighbors of degree 1 nodes

35 Rob van Stee: Approximations- und Online-Algorithmen 35 Scheduling on Unrelated Parallel Machines [Vazirani Chapter 17] J: set of n jobs M: set of m machines p i j : processing time of job j on machine i x( j): Machine where job j is executed L i : { j:x( j)=i} p i j, load of machine i Objective: Minimize Makespan L max = max i L i

36 Rob van Stee: Approximations- und Online-Algorithmen 36 A Misguided ILP model minimize t subject to j J : x i j = 1 i M i M : x i j p i j t j J i M, j J : x i j {0,1}

37 Rob van Stee: Approximations- und Online-Algorithmen 37 The problem with this formulation minimize t subject to j J : x i j = 1 i M i M : x i j p i j t j J i M, j J : x i j {0,1} One Job, size m everywhere. Linear relaxation: makespan 1 Optimal solution: makespan m m The linear relaxation is far away from the optimal solution and hence yields little useful information LP-speak: integrality gap m

38 Rob van Stee: Approximations- und Online-Algorithmen 38 The problem with this formulation minimize t subject to j J : x i j = 1 i M i M : x i j p i j t j J i M, j J : x i j {0,1} In ILP, we always have x i j = 0 if p i j > t This is lost in the linear relaxation: some x i j may get small values We cannot add this constraint since it is not a linear constraint

39 Rob van Stee: Approximations- und Online-Algorithmen 39 A Refined LP Relaxation (Parametric Pruning) guess makespan T feasible assignments: S T := { (i, j) : p i j T } no objective function (feasibility only) LP(T): j J : i M : x i j = 1 {i:(i, j) S T } { j:(i, j) S T } (i, j) S T : x i j 0 x i j p i j T e.g., binary search

40 Rob van Stee: Approximations- und Online-Algorithmen 40 A Refined LP Relaxation (Parametric Pruning) guess makespan T feasible assignments: S T := { (i, j) : p i j T } e.g., binary search LP(T): j J : i M : x i j = 1 {i:(i, j) S T } { j:(i, j) S T } (i, j) S T : x i j 0 x i j p i j T No objective function! We only look for a feasible solution

41 Rob van Stee: Approximations- und Online-Algorithmen 41 More LP-speak Consider a solution x of a given LP. x is an extreme point solution if it cannot be expressed as a convex combination αx +(1 α)x with α (0,1) of two other feasible solutions x and x. convex combination x x Theorem 6. x R r is an extreme point solution iff it corresponds to setting r linearly independent constraints to equality. Proof. not here.

42 Rob van Stee: Approximations- und Online-Algorithmen 42 S T := { (i, j) : p i j T } LP(T): j J : i M : x i j = 1 {i:(i, j) S T } { j:(i, j) S T } (i, j) S T : x i j 0 x i j p i j T Lemma 7. An extreme point solution of LP(T) has at most n+m nonzero variables. Proof. r= S T variables n+m constraints (except 0) Thm6 r (n+m) of the 0 constraints are tight.

43 Rob van Stee: Approximations- und Online-Algorithmen 43 Lemma 7. An extreme point solution of LP(T) has at most n+m nonzero variables. Corollary 8. An extreme point solution of LP(T) sets n m jobs integrally. Proof. a integrally set jobs a nonzero entries in x n a fractionally set jobs 2(n a) nonzero entries in x Lemma 7 2(n a)+a n+m a n m

44 Rob van Stee: Approximations- und Online-Algorithmen 44 One Reason why LP Relaxation is Useful Theorem 6. x R r is an extreme point solution iff it corresponds to setting r linearly independent constraints to equality. Theorem 6 often implies that only few variables need to be rounded to obtain an solution of the ILP.... this does not mean rounding the remaining ones is easy.

45 Rob van Stee: Approximations- und Online-Algorithmen 45 The Algorithm: Top Level α:= makespan one gets by assigning each job to the fastest machine for it α is an upper bound for the optimal makespan

46 Rob van Stee: Approximations- und Online-Algorithmen 46 The Algorithm: Top Level α:= makespan one gets by assigning each job to the fastest machine for it α is an upper bound for the optimal makespan Use binary search in the range α/m,α to find the smallest T such that LP(T) has a feasible solution x

47 Rob van Stee: Approximations- und Online-Algorithmen 47 The Algorithm: Top Level α:= makespan one gets by assigning each job to the fastest machine for it α is an upper bound for the optimal makespan Use binary search in the range α/m,α to find the smallest T such that LP(T) has a feasible solution For this T, find an extremal point solution x

48 Rob van Stee: Approximations- und Online-Algorithmen 48 The Algorithm: Top Level α:= makespan one gets by assigning each job to the fastest machine for it α is an upper bound for the optimal makespan Use binary search in the range α/m,α to find the smallest T such that LP(T) has a feasible solution For this T, find an extremal point solution x assign integrally set jobs in x

49 Rob van Stee: Approximations- und Online-Algorithmen 49 The Algorithm: Top Level α:= makespan one gets by assigning each job to the fastest machine for it α is an upper bound for the optimal makespan Use binary search in the range α/m,α to find the smallest T such that LP(T) has a feasible solution For this T, find an extremal point solution x assign integrally set jobs in x deal with the fractionally set jobs // Rounding

50 Rob van Stee: Approximations- und Online-Algorithmen 50 Example p i j Four machines, five jobs For each job, the best machine for it is marked in blue.

51 Rob van Stee: Approximations- und Online-Algorithmen 51 Example p i j Each job on fastest machine: =: α Initial guess for the makespan is 6 Using binary search, we find smallest makespan in the range [6/4,6] that can be achieved using a fractional assignment

52 Rob van Stee: Approximations- und Online-Algorithmen 52 Example p i j Each job on fastest machine: =: α x i j Solution of LP(3):

53 Rob van Stee: Approximations- und Online-Algorithmen 53 Dealing with Fractionally Set Jobs Consider the bipartite graph H:=(J M,E ) where J := { j J : i : 0<x i j < 1 } M := { i M : j : 0<x i j < 1 } E := { {i, j} : x i j 0,i M, j J } Idea: Find a perfect matching in H assign jobs according to that matching matching

54 Rob van Stee: Approximations- und Online-Algorithmen 54 Matching A set of edges M that do not have any nodes in common, i.e., (V,M) has maximum degree one. Perfect Matching A matching of size V /2, i.e., all nodes are matched

55 Rob van Stee: Approximations- und Online-Algorithmen 55 Lemma 8. H is a pseudo forest, i.e., each connected component H C =(V C,E C ) has E C V C (a tree plus, possibly, one edge) Proof. It suffices to show this for the larger graph G:=(J M,E) where E:= { {i, j} : x i j 0,i M, j J } Consider a connected component H C of G. restrict x and LP(T) to H C : x C, LP C (T) x C is extreme point solution of LP C (T) (Otherwise, x itself could not be extreme point solution) Lemma 7 LP C (T) has V C nonzero vars., i.e., H C has V C edges.

56 Rob van Stee: Approximations- und Online-Algorithmen 56 Example p i j x i j T =

57 Rob van Stee: Approximations- und Online-Algorithmen 57 Lemma 9. H has a perfect matching Proof. We give an algorithm: M := /0 invariant H is a bipartite pseudo forest invariant all degree one nodes are machines while i M with degree one do e={i, j}:= the sole edge incident to i M := M {e} remove i, j and incident edges assert H is a collection of disjoint even cycles foreach cycle C H do match alternating edges in C

58 Rob van Stee: Approximations- und Online-Algorithmen 58 Theorem 10. The algorithm achieves an approximation guarantee of factor 2 for scheduling unrelated parallel machines. Proof. Consider solution x of LPT(T ) makespan due to jobs set integrally in x is T opt. In addition, each machine i receives 1 job j from the matching M H. p i, j T opt since otherwise {i, j} H

Algorithm Design and Analysis

Algorithm Design and Analysis Algorithm Design and Analysis LECTURE 27 Approximation Algorithms Load Balancing Weighted Vertex Cover Reminder: Fill out SRTEs online Don t forget to click submit Sofya Raskhodnikova 12/6/2011 S. Raskhodnikova;

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm. Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm. Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three

More information

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one

More information

11. APPROXIMATION ALGORITHMS

11. APPROXIMATION ALGORITHMS 11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: vertex cover LP rounding: vertex cover generalized load balancing knapsack problem Lecture slides by Kevin Wayne Copyright 2005

More information

Applied Algorithm Design Lecture 5

Applied Algorithm Design Lecture 5 Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

More information

5.1 Bipartite Matching

5.1 Bipartite Matching CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson

More information

ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN. Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015

ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN. Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015 ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015 ONLINE STEINER FOREST PROBLEM An initially given graph G. s 1 s 2 A sequence of demands (s i, t i ) arriving

More information

Steiner Tree Approximation via IRR. Randomized Rounding

Steiner Tree Approximation via IRR. Randomized Rounding Steiner Tree Approximation via Iterative Randomized Rounding Graduate Program in Logic, Algorithms and Computation μπλ Network Algorithms and Complexity June 18, 2013 Overview 1 Introduction Scope Related

More information

Scheduling Shop Scheduling. Tim Nieberg

Scheduling Shop Scheduling. Tim Nieberg Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations

More information

Guessing Game: NP-Complete?

Guessing Game: NP-Complete? Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES 2. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple

More information

Distributed Computing over Communication Networks: Maximal Independent Set

Distributed Computing over Communication Networks: Maximal Independent Set Distributed Computing over Communication Networks: Maximal Independent Set What is a MIS? MIS An independent set (IS) of an undirected graph is a subset U of nodes such that no two nodes in U are adjacent.

More information

Semi-Matchings for Bipartite Graphs and Load Balancing

Semi-Matchings for Bipartite Graphs and Load Balancing Semi-Matchings for Bipartite Graphs and Load Balancing Nicholas J. A. Harvey Richard E. Ladner László Lovász Tami Tamir Abstract We consider the problem of fairly matching the left-hand vertices of a bipartite

More information

Proximal mapping via network optimization

Proximal mapping via network optimization L. Vandenberghe EE236C (Spring 23-4) Proximal mapping via network optimization minimum cut and maximum flow problems parametric minimum cut problem application to proximal mapping Introduction this lecture:

More information

An Approximation Algorithm for Bounded Degree Deletion

An Approximation Algorithm for Bounded Degree Deletion An Approximation Algorithm for Bounded Degree Deletion Tomáš Ebenlendr Petr Kolman Jiří Sgall Abstract Bounded Degree Deletion is the following generalization of Vertex Cover. Given an undirected graph

More information

THE PROBLEM WORMS (1) WORMS (2) THE PROBLEM OF WORM PROPAGATION/PREVENTION THE MINIMUM VERTEX COVER PROBLEM

THE PROBLEM WORMS (1) WORMS (2) THE PROBLEM OF WORM PROPAGATION/PREVENTION THE MINIMUM VERTEX COVER PROBLEM 1 THE PROBLEM OF WORM PROPAGATION/PREVENTION I.E. THE MINIMUM VERTEX COVER PROBLEM Prof. Tiziana Calamoneri Network Algorithms A.y. 2014/15 2 THE PROBLEM WORMS (1)! A computer worm is a standalone malware

More information

A simpler and better derandomization of an approximation algorithm for Single Source Rent-or-Buy

A simpler and better derandomization of an approximation algorithm for Single Source Rent-or-Buy A simpler and better derandomization of an approximation algorithm for Single Source Rent-or-Buy David P. Williamson Anke van Zuylen School of Operations Research and Industrial Engineering, Cornell University,

More information

On the effect of forwarding table size on SDN network utilization

On the effect of forwarding table size on SDN network utilization IBM Haifa Research Lab On the effect of forwarding table size on SDN network utilization Rami Cohen IBM Haifa Research Lab Liane Lewin Eytan Yahoo Research, Haifa Seffi Naor CS Technion, Israel Danny Raz

More information

Permutation Betting Markets: Singleton Betting with Extra Information

Permutation Betting Markets: Singleton Betting with Extra Information Permutation Betting Markets: Singleton Betting with Extra Information Mohammad Ghodsi Sharif University of Technology ghodsi@sharif.edu Hamid Mahini Sharif University of Technology mahini@ce.sharif.edu

More information

CHAPTER 9. Integer Programming

CHAPTER 9. Integer Programming CHAPTER 9 Integer Programming An integer linear program (ILP) is, by definition, a linear program with the additional constraint that all variables take integer values: (9.1) max c T x s t Ax b and x integral

More information

Linear Programming. Widget Factory Example. Linear Programming: Standard Form. Widget Factory Example: Continued.

Linear Programming. Widget Factory Example. Linear Programming: Standard Form. Widget Factory Example: Continued. Linear Programming Widget Factory Example Learning Goals. Introduce Linear Programming Problems. Widget Example, Graphical Solution. Basic Theory:, Vertices, Existence of Solutions. Equivalent formulations.

More information

5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1

5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 General Integer Linear Program: (ILP) min c T x Ax b x 0 integer Assumption: A, b integer The integrality condition

More information

Nan Kong, Andrew J. Schaefer. Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA

Nan Kong, Andrew J. Schaefer. Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA A Factor 1 2 Approximation Algorithm for Two-Stage Stochastic Matching Problems Nan Kong, Andrew J. Schaefer Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA Abstract We introduce

More information

CSC2420 Spring 2015: Lecture 3

CSC2420 Spring 2015: Lecture 3 CSC2420 Spring 2015: Lecture 3 Allan Borodin January 22, 2015 1 / 1 Announcements and todays agenda Assignment 1 due next Thursday. I may add one or two additional questions today or tomorrow. Todays agenda

More information

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples

More information

Online Adwords Allocation

Online Adwords Allocation Online Adwords Allocation Shoshana Neuburger May 6, 2009 1 Overview Many search engines auction the advertising space alongside search results. When Google interviewed Amin Saberi in 2004, their advertisement

More information

A Branch and Bound Algorithm for Solving the Binary Bi-level Linear Programming Problem

A Branch and Bound Algorithm for Solving the Binary Bi-level Linear Programming Problem A Branch and Bound Algorithm for Solving the Binary Bi-level Linear Programming Problem John Karlof and Peter Hocking Mathematics and Statistics Department University of North Carolina Wilmington Wilmington,

More information

Minimal Cost Reconfiguration of Data Placement in a Storage Area Network

Minimal Cost Reconfiguration of Data Placement in a Storage Area Network Minimal Cost Reconfiguration of Data Placement in a Storage Area Network Hadas Shachnai Gal Tamir Tami Tamir Abstract Video-on-Demand (VoD) services require frequent updates in file configuration on the

More information

Lecture 1: Course overview, circuits, and formulas

Lecture 1: Course overview, circuits, and formulas Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik

More information

Load-Balanced Virtual Backbone Construction for Wireless Sensor Networks

Load-Balanced Virtual Backbone Construction for Wireless Sensor Networks Load-Balanced Virtual Backbone Construction for Wireless Sensor Networks Jing (Selena) He, Shouling Ji, Yi Pan, Zhipeng Cai Department of Computer Science, Georgia State University, Atlanta, GA, USA, {jhe9,

More information

The Goldberg Rao Algorithm for the Maximum Flow Problem

The Goldberg Rao Algorithm for the Maximum Flow Problem The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }

More information

CIS 700: algorithms for Big Data

CIS 700: algorithms for Big Data CIS 700: algorithms for Big Data Lecture 6: Graph Sketching Slides at http://grigory.us/big-data-class.html Grigory Yaroslavtsev http://grigory.us Sketching Graphs? We know how to sketch vectors: v Mv

More information

8.1 Min Degree Spanning Tree

8.1 Min Degree Spanning Tree CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree

More information

Ph.D. Thesis. Judit Nagy-György. Supervisor: Péter Hajnal Associate Professor

Ph.D. Thesis. Judit Nagy-György. Supervisor: Péter Hajnal Associate Professor Online algorithms for combinatorial problems Ph.D. Thesis by Judit Nagy-György Supervisor: Péter Hajnal Associate Professor Doctoral School in Mathematics and Computer Science University of Szeged Bolyai

More information

Single machine models: Maximum Lateness -12- Approximation ratio for EDD for problem 1 r j,d j < 0 L max. structure of a schedule Q...

Single machine models: Maximum Lateness -12- Approximation ratio for EDD for problem 1 r j,d j < 0 L max. structure of a schedule Q... Lecture 4 Scheduling 1 Single machine models: Maximum Lateness -12- Approximation ratio for EDD for problem 1 r j,d j < 0 L max structure of a schedule 0 Q 1100 11 00 11 000 111 0 0 1 1 00 11 00 11 00

More information

Constant Factor Approximation Algorithm for the Knapsack Median Problem

Constant Factor Approximation Algorithm for the Knapsack Median Problem Constant Factor Approximation Algorithm for the Knapsack Median Problem Amit Kumar Abstract We give a constant factor approximation algorithm for the following generalization of the k-median problem. We

More information

Approximating Minimum Bounded Degree Spanning Trees to within One of Optimal

Approximating Minimum Bounded Degree Spanning Trees to within One of Optimal Approximating Minimum Bounded Degree Spanning Trees to within One of Optimal ABSTACT Mohit Singh Tepper School of Business Carnegie Mellon University Pittsburgh, PA USA mohits@andrew.cmu.edu In the MINIMUM

More information

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms

More information

MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research

MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research MapReduce and Distributed Data Analysis Google Research 1 Dealing With Massive Data 2 2 Dealing With Massive Data Polynomial Memory Sublinear RAM Sketches External Memory Property Testing 3 3 Dealing With

More information

Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs

Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Stavros Athanassopoulos, Ioannis Caragiannis, and Christos Kaklamanis Research Academic Computer Technology Institute

More information

Improved Results for Data Migration and Open Shop Scheduling

Improved Results for Data Migration and Open Shop Scheduling Improved Results for Data Migration and Open Shop Scheduling Rajiv Gandhi 1, Magnús M. Halldórsson, Guy Kortsarz 1, and Hadas Shachnai 3 1 Department of Computer Science, Rutgers University, Camden, NJ

More information

Scheduling Parallel Jobs with Linear Speedup

Scheduling Parallel Jobs with Linear Speedup Scheduling Parallel Jobs with Linear Speedup Alexander Grigoriev and Marc Uetz Maastricht University, Quantitative Economics, P.O.Box 616, 6200 MD Maastricht, The Netherlands. Email: {a.grigoriev,m.uetz}@ke.unimaas.nl

More information

Introduction to Scheduling Theory

Introduction to Scheduling Theory Introduction to Scheduling Theory Arnaud Legrand Laboratoire Informatique et Distribution IMAG CNRS, France arnaud.legrand@imag.fr November 8, 2004 1/ 26 Outline 1 Task graphs from outer space 2 Scheduling

More information

Load Balancing. Load Balancing 1 / 24

Load Balancing. Load Balancing 1 / 24 Load Balancing Backtracking, branch & bound and alpha-beta pruning: how to assign work to idle processes without much communication? Additionally for alpha-beta pruning: implementing the young-brothers-wait

More information

Weighted Sum Coloring in Batch Scheduling of Conflicting Jobs

Weighted Sum Coloring in Batch Scheduling of Conflicting Jobs Weighted Sum Coloring in Batch Scheduling of Conflicting Jobs Leah Epstein Magnús M. Halldórsson Asaf Levin Hadas Shachnai Abstract Motivated by applications in batch scheduling of jobs in manufacturing

More information

Weighted Sum Coloring in Batch Scheduling of Conflicting Jobs

Weighted Sum Coloring in Batch Scheduling of Conflicting Jobs Weighted Sum Coloring in Batch Scheduling of Conflicting Jobs Leah Epstein Magnús M. Halldórsson Asaf Levin Hadas Shachnai Abstract Motivated by applications in batch scheduling of jobs in manufacturing

More information

Beyond the Stars: Revisiting Virtual Cluster Embeddings

Beyond the Stars: Revisiting Virtual Cluster Embeddings Beyond the Stars: Revisiting Virtual Cluster Embeddings Matthias Rost Technische Universität Berlin September 7th, 2015, Télécom-ParisTech Joint work with Carlo Fuerst, Stefan Schmid Published in ACM SIGCOMM

More information

Fairness in Routing and Load Balancing

Fairness in Routing and Load Balancing Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria

More information

Combinatorial Algorithms for Data Migration to Minimize Average Completion Time

Combinatorial Algorithms for Data Migration to Minimize Average Completion Time Combinatorial Algorithms for Data Migration to Minimize Average Completion Time Rajiv Gandhi 1 and Julián Mestre 1 Department of Computer Science, Rutgers University-Camden, Camden, NJ 0810. Research partially

More information

Permutation Betting Markets: Singleton Betting with Extra Information

Permutation Betting Markets: Singleton Betting with Extra Information Permutation Betting Markets: Singleton Betting with Extra Information Mohammad Ghodsi Sharif University of Technology ghodsi@sharif.edu Hamid Mahini Sharif University of Technology mahini@ce.sharif.edu

More information

Improved Algorithms for Data Migration

Improved Algorithms for Data Migration Improved Algorithms for Data Migration Samir Khuller 1, Yoo-Ah Kim, and Azarakhsh Malekian 1 Department of Computer Science, University of Maryland, College Park, MD 20742. Research supported by NSF Award

More information

Online Matching and Ad Allocation. Contents

Online Matching and Ad Allocation. Contents Foundations and Trends R in Theoretical Computer Science Vol. 8, No. 4 (2012) 265 368 c 2013 A. Mehta DOI: 10.1561/0400000057 Online Matching and Ad Allocation By Aranyak Mehta Contents 1 Introduction

More information

Scheduling Parallel Jobs with Monotone Speedup 1

Scheduling Parallel Jobs with Monotone Speedup 1 Scheduling Parallel Jobs with Monotone Speedup 1 Alexander Grigoriev, Marc Uetz Maastricht University, Quantitative Economics, P.O.Box 616, 6200 MD Maastricht, The Netherlands, {a.grigoriev@ke.unimaas.nl,

More information

Exponential time algorithms for graph coloring

Exponential time algorithms for graph coloring Exponential time algorithms for graph coloring Uriel Feige Lecture notes, March 14, 2011 1 Introduction Let [n] denote the set {1,..., k}. A k-labeling of vertices of a graph G(V, E) is a function V [k].

More information

Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams

Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams André Ciré University of Toronto John Hooker Carnegie Mellon University INFORMS 2014 Home Health Care Home health care delivery

More information

3. Linear Programming and Polyhedral Combinatorics

3. Linear Programming and Polyhedral Combinatorics Massachusetts Institute of Technology Handout 6 18.433: Combinatorial Optimization February 20th, 2009 Michel X. Goemans 3. Linear Programming and Polyhedral Combinatorics Summary of what was seen in the

More information

Transportation Polytopes: a Twenty year Update

Transportation Polytopes: a Twenty year Update Transportation Polytopes: a Twenty year Update Jesús Antonio De Loera University of California, Davis Based on various papers joint with R. Hemmecke, E.Kim, F. Liu, U. Rothblum, F. Santos, S. Onn, R. Yoshida,

More information

Small Maximal Independent Sets and Faster Exact Graph Coloring

Small Maximal Independent Sets and Faster Exact Graph Coloring Small Maximal Independent Sets and Faster Exact Graph Coloring David Eppstein Univ. of California, Irvine Dept. of Information and Computer Science The Exact Graph Coloring Problem: Given an undirected

More information

Definition 11.1. Given a graph G on n vertices, we define the following quantities:

Definition 11.1. Given a graph G on n vertices, we define the following quantities: Lecture 11 The Lovász ϑ Function 11.1 Perfect graphs We begin with some background on perfect graphs. graphs. First, we define some quantities on Definition 11.1. Given a graph G on n vertices, we define

More information

GRAPH THEORY LECTURE 4: TREES

GRAPH THEORY LECTURE 4: TREES GRAPH THEORY LECTURE 4: TREES Abstract. 3.1 presents some standard characterizations and properties of trees. 3.2 presents several different types of trees. 3.7 develops a counting method based on a bijection

More information

ARTICLE IN PRESS. European Journal of Operational Research xxx (2004) xxx xxx. Discrete Optimization. Nan Kong, Andrew J.

ARTICLE IN PRESS. European Journal of Operational Research xxx (2004) xxx xxx. Discrete Optimization. Nan Kong, Andrew J. A factor 1 European Journal of Operational Research xxx (00) xxx xxx Discrete Optimization approximation algorithm for two-stage stochastic matching problems Nan Kong, Andrew J. Schaefer * Department of

More information

9th Max-Planck Advanced Course on the Foundations of Computer Science (ADFOCS) Primal-Dual Algorithms for Online Optimization: Lecture 1

9th Max-Planck Advanced Course on the Foundations of Computer Science (ADFOCS) Primal-Dual Algorithms for Online Optimization: Lecture 1 9th Max-Planck Advanced Course on the Foundations of Computer Science (ADFOCS) Primal-Dual Algorithms for Online Optimization: Lecture 1 Seffi Naor Computer Science Dept. Technion Haifa, Israel Introduction

More information

A Network Flow Approach in Cloud Computing

A Network Flow Approach in Cloud Computing 1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges

More information

GENERATING LOW-DEGREE 2-SPANNERS

GENERATING LOW-DEGREE 2-SPANNERS SIAM J. COMPUT. c 1998 Society for Industrial and Applied Mathematics Vol. 27, No. 5, pp. 1438 1456, October 1998 013 GENERATING LOW-DEGREE 2-SPANNERS GUY KORTSARZ AND DAVID PELEG Abstract. A k-spanner

More information

How To Find An Optimal Search Protocol For An Oblivious Cell

How To Find An Optimal Search Protocol For An Oblivious Cell The Conference Call Search Problem in Wireless Networks Leah Epstein 1, and Asaf Levin 2 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. lea@math.haifa.ac.il 2 Department of Statistics,

More information

An Empirical Study of Two MIS Algorithms

An Empirical Study of Two MIS Algorithms An Empirical Study of Two MIS Algorithms Email: Tushar Bisht and Kishore Kothapalli International Institute of Information Technology, Hyderabad Hyderabad, Andhra Pradesh, India 32. tushar.bisht@research.iiit.ac.in,

More information

Optimal Monitoring in Multi-Channel Multi-Radio Wireless Mesh Networks

Optimal Monitoring in Multi-Channel Multi-Radio Wireless Mesh Networks Optimal Monitoring in Multi-Channel Multi-Radio Wireless Mesh Networks Dong-Hoon Shin and Saurabh Bagchi Dependable Computing Systems Lab School of Electrical and Computer Engineering Purdue University

More information

Energy Efficient Monitoring in Sensor Networks

Energy Efficient Monitoring in Sensor Networks Energy Efficient Monitoring in Sensor Networks Amol Deshpande, Samir Khuller, Azarakhsh Malekian, Mohammed Toossi Computer Science Department, University of Maryland, A.V. Williams Building, College Park,

More information

Randomized algorithms

Randomized algorithms Randomized algorithms March 10, 2005 1 What are randomized algorithms? Algorithms which use random numbers to make decisions during the executions of the algorithm. Why would we want to do this?? Deterministic

More information

Dynamic TCP Acknowledgement: Penalizing Long Delays

Dynamic TCP Acknowledgement: Penalizing Long Delays Dynamic TCP Acknowledgement: Penalizing Long Delays Karousatou Christina Network Algorithms June 8, 2010 Karousatou Christina (Network Algorithms) Dynamic TCP Acknowledgement June 8, 2010 1 / 63 Layout

More information

On the k-path cover problem for cacti

On the k-path cover problem for cacti On the k-path cover problem for cacti Zemin Jin and Xueliang Li Center for Combinatorics and LPMC Nankai University Tianjin 300071, P.R. China zeminjin@eyou.com, x.li@eyou.com Abstract In this paper we

More information

A Graph-Theoretic Network Security Game

A Graph-Theoretic Network Security Game A Graph-Theoretic Network Security Game Marios Mavronicolas 1, Vicky Papadopoulou 1, Anna Philippou 1, and Paul Spirakis 2 1 Department of Computer Science, University of Cyprus, Nicosia CY-1678, Cyprus.

More information

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,

More information

The chromatic spectrum of mixed hypergraphs

The chromatic spectrum of mixed hypergraphs The chromatic spectrum of mixed hypergraphs Tao Jiang, Dhruv Mubayi, Zsolt Tuza, Vitaly Voloshin, Douglas B. West March 30, 2003 Abstract A mixed hypergraph is a triple H = (X, C, D), where X is the vertex

More information

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,

More information

4.6 Linear Programming duality

4.6 Linear Programming duality 4.6 Linear Programming duality To any minimization (maximization) LP we can associate a closely related maximization (minimization) LP. Different spaces and objective functions but in general same optimal

More information

A2 1 10-Approximation Algorithm for a Generalization of the Weighted Edge-Dominating Set Problem

A2 1 10-Approximation Algorithm for a Generalization of the Weighted Edge-Dominating Set Problem Journal of Combinatorial Optimization, 5, 317 326, 2001 c 2001 Kluwer Academic Publishers. Manufactured in The Netherlands. A2 1 -Approximation Algorithm for a Generalization of the Weighted Edge-Dominating

More information

Minimum cost maximum flow, Minimum cost circulation, Cost/Capacity scaling

Minimum cost maximum flow, Minimum cost circulation, Cost/Capacity scaling 6.854 Advanced Algorithms Lecture 16: 10/11/2006 Lecturer: David Karger Scribe: Kermin Fleming and Chris Crutchfield, based on notes by Wendy Chu and Tudor Leu Minimum cost maximum flow, Minimum cost circulation,

More information

Optimizing the Placement of Integration Points in Multi-hop Wireless Networks

Optimizing the Placement of Integration Points in Multi-hop Wireless Networks Optimizing the Placement of Integration Points in Multi-hop Wireless Networks Lili Qiu, Ranveer Chandra, Kamal Jain, and Mohammad Mahdian ABSTRACT Efficient integration of a multi-hop wireless network

More information

Branch and Cut for TSP

Branch and Cut for TSP Branch and Cut for TSP jla,jc@imm.dtu.dk Informatics and Mathematical Modelling Technical University of Denmark 1 Branch-and-Cut for TSP Branch-and-Cut is a general technique applicable e.g. to solve symmetric

More information

Generating models of a matched formula with a polynomial delay

Generating models of a matched formula with a polynomial delay Generating models of a matched formula with a polynomial delay Petr Savicky Institute of Computer Science, Academy of Sciences of Czech Republic, Pod Vodárenskou Věží 2, 182 07 Praha 8, Czech Republic

More information

Graph theoretic techniques in the analysis of uniquely localizable sensor networks

Graph theoretic techniques in the analysis of uniquely localizable sensor networks Graph theoretic techniques in the analysis of uniquely localizable sensor networks Bill Jackson 1 and Tibor Jordán 2 ABSTRACT In the network localization problem the goal is to determine the location of

More information

Linear Programming. March 14, 2014

Linear Programming. March 14, 2014 Linear Programming March 1, 01 Parts of this introduction to linear programming were adapted from Chapter 9 of Introduction to Algorithms, Second Edition, by Cormen, Leiserson, Rivest and Stein [1]. 1

More information

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH 31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,

More information

High degree graphs contain large-star factors

High degree graphs contain large-star factors High degree graphs contain large-star factors Dedicated to László Lovász, for his 60th birthday Noga Alon Nicholas Wormald Abstract We show that any finite simple graph with minimum degree d contains a

More information

Single machine parallel batch scheduling with unbounded capacity

Single machine parallel batch scheduling with unbounded capacity Workshop on Combinatorics and Graph Theory 21th, April, 2006 Nankai University Single machine parallel batch scheduling with unbounded capacity Yuan Jinjiang Department of mathematics, Zhengzhou University

More information

Linear Programming I

Linear Programming I Linear Programming I November 30, 2003 1 Introduction In the VCR/guns/nuclear bombs/napkins/star wars/professors/butter/mice problem, the benevolent dictator, Bigus Piguinus, of south Antarctica penguins

More information

Data Migration in Heterogeneous Storage Systems

Data Migration in Heterogeneous Storage Systems 011 31st International Conference on Distributed Computing Systems Data Migration in Heterogeneous Storage Systems Chadi Kari Department of Computer Science and Engineering University of Connecticut Storrs,

More information

Private Approximation of Clustering and Vertex Cover

Private Approximation of Clustering and Vertex Cover Private Approximation of Clustering and Vertex Cover Amos Beimel, Renen Hallak, and Kobbi Nissim Department of Computer Science, Ben-Gurion University of the Negev Abstract. Private approximation of search

More information

Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li

Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li Computer Algorithms NP-Complete Problems NP-completeness The quest for efficient algorithms is about finding clever ways to bypass the process of exhaustive search, using clues from the input in order

More information

Online Scheduling with Bounded Migration

Online Scheduling with Bounded Migration Online Scheduling with Bounded Migration Peter Sanders, Naveen Sivadasan, and Martin Skutella Max-Planck-Institut für Informatik, Saarbrücken, Germany, {sanders,ns,skutella}@mpi-sb.mpg.de Abstract. Consider

More information

Compressing Forwarding Tables for Datacenter Scalability

Compressing Forwarding Tables for Datacenter Scalability TECHNICAL REPORT TR12-03, TECHNION, ISRAEL 1 Compressing Forwarding Tables for Datacenter Scalability Ori Rottenstreich, Marat Radan, Yuval Cassuto, Isaac Keslassy, Carmi Arad, Tal Mizrahi, Yoram Revah

More information

A Practical Scheme for Wireless Network Operation

A Practical Scheme for Wireless Network Operation A Practical Scheme for Wireless Network Operation Radhika Gowaikar, Amir F. Dana, Babak Hassibi, Michelle Effros June 21, 2004 Abstract In many problems in wireline networks, it is known that achieving

More information

A Sublinear Bipartiteness Tester for Bounded Degree Graphs

A Sublinear Bipartiteness Tester for Bounded Degree Graphs A Sublinear Bipartiteness Tester for Bounded Degree Graphs Oded Goldreich Dana Ron February 5, 1998 Abstract We present a sublinear-time algorithm for testing whether a bounded degree graph is bipartite

More information

Bargaining Solutions in a Social Network

Bargaining Solutions in a Social Network Bargaining Solutions in a Social Network Tanmoy Chakraborty and Michael Kearns Department of Computer and Information Science University of Pennsylvania Abstract. We study the concept of bargaining solutions,

More information

Scheduling Single Machine Scheduling. Tim Nieberg

Scheduling Single Machine Scheduling. Tim Nieberg Scheduling Single Machine Scheduling Tim Nieberg Single machine models Observation: for non-preemptive problems and regular objectives, a sequence in which the jobs are processed is sufficient to describe

More information

Adaptive Linear Programming Decoding

Adaptive Linear Programming Decoding Adaptive Linear Programming Decoding Mohammad H. Taghavi and Paul H. Siegel ECE Department, University of California, San Diego Email: (mtaghavi, psiegel)@ucsd.edu ISIT 2006, Seattle, USA, July 9 14, 2006

More information

Network Algorithms for Homeland Security

Network Algorithms for Homeland Security Network Algorithms for Homeland Security Mark Goldberg and Malik Magdon-Ismail Rensselaer Polytechnic Institute September 27, 2004. Collaborators J. Baumes, M. Krishmamoorthy, N. Preston, W. Wallace. Partially

More information

On the independence number of graphs with maximum degree 3

On the independence number of graphs with maximum degree 3 On the independence number of graphs with maximum degree 3 Iyad A. Kanj Fenghui Zhang Abstract Let G be an undirected graph with maximum degree at most 3 such that G does not contain any of the three graphs

More information