Improved approximation for non-preemptive single machine ow-time scheduling with an availability constraint
|
|
- Nathaniel Holland
- 7 years ago
- Views:
Transcription
1 Improved approximation for non-preemptive single machine ow-time scheduling with an availability constraint Joachim Breit Department of Information and Technology Management, Saarland University, Saarbrücken, Germany Abstract We study the problem of scheduling n non-preemptable jobs on a single machine which is not available for processing during a given time period. The objective is to minimize the sum of the job completion times. The best known approximation algorithm for this NP-hard problem has a relative worst-case error bound of 17.6%. We present a parametric O(n log n)-algorithm H with which better worst-case error bounds can be obtained. The best error bound calculated for the algorithm in the paper is 7.4%. In a computational experiment we test the algorithm with the performance guarantee set to 10.2%. It turns out that randomly generated instances with up to 1000 jobs can be solved with a mean (maximum) error of 0.31% (3.18%) and a mean (maximum) computation time of 0.8 (9.7) seconds. Keywords: Single machine scheduling; Approximation algorithms; Availability constraints. 1 Introduction In classical scheduling models it is usually assumed that machines are continuously available for processing throughout the planning period. This assumption is not justied in situations Address: Saarland University, Department of Information and Technology Management, P.O. Box , D Saarbrücken, Germany. address: jb@itm.uni-sb.de (J. Breit). Tel.: +49(681) Fax: +49(681)
2 where maintenance requirements, rest periods or breakdowns have to be considered. This motivates the investigation of generalized scheduling models in which machine availability may be restricted. In the past years such models have received considerable attention from researchers. Schmidt [7], Lee [3] and Braun et al. [2] provide surveys of this area of research. In the problem studied in this paper we are given a set N = {J 1,..., J n } of jobs to be processed on a single machine. The processing time of job J j, j = 1,..., n, is denoted by p j. The machine cannot process more than one job at a time and is assumed not to be available for processing during a given time interval [s, t] where = t s > 0. For convenience we will call this interval of non-availability the hole in the following. Job preemption is not allowed. A solution for the problem is a schedule S which assigns a completion time C j,s and a starting time C j,s p j to each job J j. The sum of the job completion times (or ow-time) of schedule S is denoted by C(S) = j C j,s. An optimal schedule S has a minimal ow-time of C. It is not dicult to see that jobs with zero processing time (p j = 0) can be optimally scheduled at time 0. We therefore assume throughout the paper that processing times are strictly positive. The objective function value obtained from an algorithm H is C(H). We say that algorithm H has a relative worst-case error bound of α if ρ(h) = (C(H) C )/C α holds for any instance of the problem. Adiri et al. [1] show that our problem is NP-hard. Lee and Liman [4] provide a shorter NP-hardness proof and show that the shortest processing time rule (SPT) which sequences the jobs in non-decreasing order of their processing times has a tight worst-case error bound of 2/7. In [5] Sad et al. propose a pseudo-polynomial dynamic programming algorithm with time complexity O(ns) to solve the problem exactly. The eciency of the algorithm is improved by a xation of variables technique. An improved approximation algorithm MSPT (modied SPT) with a worst-case error bound of 3/17 is provided by Sad et al. in [6]. We adopt the notation introduced in the aforementioned papers and denote by B (A) the set of jobs scheduled before (after) the hole in the SPT schedule S SP T. The MSPT algorithm rst generates schedule S SP T. Then it tries to improve the result by enumerating schedules which can be obtained by a single exchange of one job from set B with one job from set A. In each schedule jobs before and after the hole, respectively, appear in nondecreasing order of their processing times. Clearly, the maximum number of tentative schedules that the MSPT algorithm has to examine is B A (n/2) 2 which would result in a time complexity of O(n 2 ). However, Sad et al. showed that it is possible to decrease 2
3 the number of tentative schedules considerably. In the computational experiment reported in [5] an improved version of the MSPT algorithm with time complexity O(n log n) was used. This version of the algorithm required an average computation time of only about 3 seconds on a personal computer for problem instances with jobs. The objective of this research is to provide approximation algorithms with performance guarantee better than the MSPT algorithm. In order to present our results we introduce further notation: J [i],s - job scheduled at position i in schedule S C [i],s - completion time of job J [i],s p [i],s - processing time of job J [i],s J[i] - job scheduled at position i in schedule S C[i] - completion time of job J[i] Cj - completion time of job J j in schedule S p [i] - processing time of job J[i] X - set of the rst B jobs in schedule S Y - set of the last A jobs in schedule S We assume that jobs are generally started as early as possible. Under this assumption let δ (δ ) denote the idle time immediately before the hole in schedule S SP T (S ). In [4] it is shown that δ δ. By B (A ) we denote the set of jobs scheduled before (after) the hole in the optimal solution. In the following section we will present our approximation algorithm and analyze its worst-case performance. The section is divided into two subsections. In the rst subsection we discuss the properties of a schedule S k which is important for our algorithm. In the second subsection we state the approximation algorithm and derive its worst-case bound based on the results of the rst subsection. In Section 3 we report on the results of a computational experiment. Section 4 nishes the paper with a summary. 2 Approximation algorithm and worst-case analysis 2.1 Schedule S k and its properties Let Z k = { J[ B k+1], J [ B k+2],..., J [ B ]} be the set of the last k jobs processed before the hole in the optimal solution, k 1. We denote by S k a schedule with the following structure: 3
4 The jobs of set Z k are processed in SPT order immediately before the hole. The jobs of set N \ Z k are processed before the jobs of set Z k and after the hole. Proceeding according to the SPT-ordered list of these jobs we schedule as many of them as possible at the beginning of the schedule before job set Z k and the rest after the hole. In schedule S k the set of jobs processed before (after) the hole is denoted by B k (A k ). The idle time immediately before the hole in schedule S k is denoted by δ k. In the following we present four lemmas and a corollary which contain basic properties of schedule S k. Lemma 1. δ k δ. Proof. Consider schedule S k in which the last k jobs before the hole are the same as in schedule S. We distinguish between two cases. (i) Suppose rst that B k = B. As we use the SPT-ordered list of the jobs in set N \Z k to select the jobs appearing at positions 1,..., B k k in schedule S k it is clear that C [j],sk C[j] for j = 1,..., B k k. Jobs at positions B k k + 1,..., B k are the same in both schedules S k and S. Thus we have C [j],sk C[j] for j = B k k + 1,..., B k as well. The completion time of the jobs appearing at positions j = B k + 1,..., n in schedules S k and S are given by C [j],sk = B k k i=1 p [i],sk + i Z k p i + δ k + + j i= B k +1 p [i],sk, (1) C [j] = B k k i=1 p [i] + i Z k p i + δ + + j i= B k +1 Because in schedule S k jobs of set N \ Z k are scheduled using the SPT rule we have p [i]. B k k i=1 p [i],sk + j i= B k +1 p [i],sk B k k i=1 p [i] + j p [i] i= B k +1 and thus C [j],sk C [j] δ k δ j = B k + 1,..., n. (2) It follows that the lemma holds, for otherwise we have C(S k ) < C, a contradiction. 4
5 (ii) Now suppose that B k = B + l where l 1. Let us rst compare the ow-time of the rst B k jobs in schedules S k and S. Suppose that we must schedule the jobs of set Z k in SPT order immediately before the hole. For schedule S k we selected the shortest B k k jobs besides the jobs of set Z k which is obviously the best choice we can make. We can either schedule any of these jobs before the jobs of set Z k or after the hole. It is not dicult to see that scheduling all of them in SPT order before job set Z k is optimal. Hence, among all possibilities to schedule the jobs of set Z k and in addition B k k jobs from set N \ Z k under the restriction that job set Z k is placed immediately before the hole, schedule S k is the best. It follows that B k i=1 C [i],sk B k i=1 C [i]. Consider now the jobs at positions j = B k +1,..., n in schedules S k and S. Equation (1) still holds. The completion times of the last A k jobs in schedule S are given by C [j] = B k k l i=1 p [i] + i Z k p i + δ + + B k i= B k l+1 p [i] + j i= B k +1 Because in schedule S k jobs of set N \ Z k are scheduled using the SPT rule we have p [i]. B k k i=1 p [i],sk + j i= B k +1 p [i],sk B k k l i=1 p [i] + B k i= B k l+1 p [i] + j i= B k +1 p [i]. Inequality (2) holds thus for case (ii) as well. otherwise we have C(S k ) < C, a contradiction. It follows that the lemma holds for In the next lemma we derive a bound on the absolute error of schedule S k. The proof uses Lemma 1. Lemma 2. The absolute error of schedule S k is given by C(S k ) C ( A k k 1) (δ k δ ). (3) Proof. Because the last k jobs before the hole are the same in schedules S k and S, and δ k δ, each of these jobs nishes δ k δ time units later in schedule S than in schedule S k. The same is obviously true for the job preceding the rst job of set Z k. We may assume that this job exists because otherwise schedule S k is clearly optimal. Let us again distinguish between the two cases B k = B and B k > B. 5
6 (i) Suppose that B k = B. We have C [j],sk C [j] 0 j = 1,..., B k k 1, (4) C [j],sk C [j] = (δ k δ ) j = B k k,..., B k. (5) Integrating (2), (4) and (5) we obtain (3). (ii) Suppose now that B k = B + l, l 1. In this case we have C [j],sk C [j] 0 j = 1,..., B k k l 1, (6) C [j],sk C [j+k+1] 0 j = B k k l,..., B k k 1, (7) C [j],sk C [j l] = (δ k δ ) j = B k k,..., B k. (8) Integrating (2), (6), (7), (8) we obtain (3). The following lemma gives a lower bound on the minimal ow-time based on Lemma 1 and the structure of schedule S k. Let z be an integer and, for convenience, dene the function ω(z) = z(z + 1)/2. Lemma 3. If schedules S SP T and S k are not optimal then a lower bound on the minimal ow-time is given by C (ω( A k ) + 4) (δ k δ ). (9) Proof. All jobs processed after the hole in schedule S k must have a processing time greater than the idle time before the hole, i.e. p j > δ k δ k δ, J j A k. It follows that j A k C j > ω( A k ) (δ k δ ). It is not dicult to see that the SPT order for the jobs in sets A and B is dominant. Assume that the last job before the hole in schedule S belongs to set B. Then, due to the dominance of the SPT order for set B, all jobs in set B must belong to set B and all jobs of set A are processed after the hole in the optimal schedule. This implies that schedule S SP T is optimal. Hence, if schedule S SP T is not optimal, then the job processed immediately before the hole in schedules S and S k must belong to set A. For the same reason we may assume that the rst job after the hole in schedules S S k belongs to set B. Then we have p [ Bk ],S k p [ Bk +1],S k > δ k δ and, using Lemma 1, t > C [ B ] = C [ B k ],S k +(δ k δ ) p [ Bk ],S k +(δ k δ ) > 2(δ k δ ). Notice that by denition and 6
7 we have J [ B ] / A k. Under the condition of the lemma, nally, we may assume that one job of set B \ Z k is processed after the hole in schedule S, i.e. J l B k \ Z k : C l > 2(δ k δ ). It follows that inequality (9) holds. Our next lemma is a generalization of two results in [4] and [6]. Lemma 4. If B = B + l, l 0, then ρ(spt) ( A 1 l) (δ δ ) (ω( A ) + 1) (δ δ ) = W C1( A, l). (10) Proof. Lee and Liman [4] proved that δ δ and C [j],ssp T C [j] δ δ, j = B +1,..., n. We focus now on the rst B jobs in schedules S SP T and S. If l jobs of set X are processed after the hole in schedule S then the last job scheduled before the hole in schedule S is job J[ B l]. We have C [ B l] C [ B ],S SP T = δ δ. As C[ B l+i] > C[ B l], i = 1,..., l, and C [ B i],ssp T < C [ B ],SSP T, i = 1,..., l, we have C [j],ssp T C [j] (δ δ ), j = B l,..., B. Also, due to the SPT order in schedule S SP T we have C [j],ssp T C [j] 0, j = 1,..., B l 1. It follows that the maximum absolute error of schedule S SP T is given by C(S SP T ) C ( A 1 l) (δ δ ). In [4] it is shown that C (ω( A )+1) (δ δ ). Integrating the two bounds we obtain (10). The following corollary simply combines lemmas 2 and 3. Corollary 1. If schedules S SP T and S k are not optimal then the relative worst-case error bound of schedule S k is given by C(S k ) C C A k k 1 ω( A k ) + 4 = W C2( A k, k). (11) 2.2 Algorithm H and its performance guarantee In order to state our approximation algorithm we have to introduce two parameters a max (k) and l max (k) both of which depend on k only and can be computed a priori. Parameter a max (k): For a given value k we can easily compute the maximum value that function W C2( A k, k) can attain. In rows 2 and 3 of Table 1 we have listed these maximum values for k = 1,..., 5 as fractions and as decimal numbers, respectively. Row 4 shows for which value A k the maximum is attained. For example, if k = 3 the function W C2( A k, 3) attains its maximum value of 5/ for A k = 9. Following [4] we have ρ(spt) ( A 1)/(ω( A ) + 1) = W C3( A ) where W C3( A ) 0 as A. For 7
8 Table 1: Worst-case bounds of schedule S k depending on k. and parameter values a max (k) and l max (k) k max Ak W C2( A k, k) 4/25 1/8 5/49 3/35 7/95 max Ak W C2( A k, k) A k a max (k) l max (k) any given value k we can thus determine a minimum value a max (k) such that ρ(spt ) W C3( A ) W C2( A k, k) holds if A > a max (k). In Table 1 the values a max (k) are listed in row 5. As an example, the value a max (3) = 17 indicates that the SPT-rule guarantees a worst-case bound of 10.21% or better if A > 17. In cases where A > a max (k) holds schedule S SP T has a worst-case performance guarantee at least as good as schedule S k. Parameter l max (k): A second special case of the problem in which schedule S SP T has a better worst-case performance guarantee than schedule S k can be deduced from Lemma 4. Let again l = B B be the number of jobs in set X which are processed after the hole in schedule S. For any given value k we can compute a minimum value l max (k) such that ρ(spt) W C1( A, l) W C2( A k, k) holds if l > l max (k). In Table 1 the values l max (k) are listed in row 6. The value l max (3) = 3 for example indicates that if k = 3 and l = B B > 3 then the SPT-rule guarantees a worst-case bound of 10.21% or better. In cases where l = B B > l max (k) holds schedule S SP T has a worst-case performance guarantee at least as good as schedule S k. We will now explain the basic idea of our approximation algorithm H. The algorithm is called with a specic accuracy parameter value k as its input. The aspired performance guarantee then is max Ak W C2( A k, k); see Table 1 for concrete values. As we have seen at the beginning of this subsection there are cases where the SPT rule guarantees a worst-case bound at least as good as max Ak W C2( A k, k). The algorithm therefore rst generates schedule S SP T. The remaining part of the algorithm only has to deal with cases in which the SPT schedule may have a performance worse than max Ak W C2( A k, k). In this part of the algorithm we try to nd schedules S 1,..., S k by full enumeration. Schedule S k will guarantee the desired worst-case bound of max Ak W C2( A k, k) for the case B > k. For the case B k one of the schedules S 1,..., S k 1 will be an optimal schedule. 8
9 We are now ready to state the algorithm and dene Q = { A { J [ B lmax(k) k+1],s SP T,..., J [ B ],SSP T }}, the set of the last A + l max (k) + k jobs in schedule S SP T. Algorithm H. Input: Accuracy parameter k. Output: Schedule S H. Step 1. Generate schedule S SP T. If A > a max (k) then go to step 3. Step 2. For q := 1 to k do begin For all subsets Z of set Q with Z = q do begin Generate a tentative schedule with the following structure: (1) Jobs of set Z are processed in SPT order immediately before the hole. (2) Jobs of set N \ Z are processed before the jobs of set Z and after the hole. Proceeding according to the SPT-ordered list of these jobs we schedule as many of them as possible at the beginning of the schedule before job set Z and the rest after the hole. end. end. Step 3. Find the best among all generated feasible schedules and call this schedule S H. end. The structure of schedules S SP T, S k and S is depicted in Figure 1. Figure 1: Structure of schedules S SP T, S k and S 9
10 In the following we will analyze the worst-case performance of algorithm H. We want to prove the following theorem. Theorem 1. Algorithm H guarantees a worst-case error bound of ρ(s H ) A k k 1 ω( A k ) + 4 = W C2( A k, k). (12) Proof. We have to show that bound (12) is either guaranteed by schedule S SP T or by step 2 of algorithm H. By denition of parameters a max (k) and l max (k) schedule S SP T guarantees bound (12) if A > a max (k) or B B > l max (k). For the following analysis of step 2 we may thus restrict attention to those situations where the following two conditions hold: A a max (k), (13) B B l max (k). (14) Notice that bound (12) is identical with the bound presented in Corollary 1 for schedule S k. Hence, if we show that under conditions (13) and (14) schedule S k or a better schedule is found in step 2 we are done. Suppose rst that l max (k) + k B and thus Q = N. If B k then schedule S k exists. Because we obviously have Z k N, algorithm H nds set Z k in the k-th passage of the outer loop of step 2 and thus generates schedule S k. Using Corollary 1 we have that bound (12) holds. Now assume that B < k. In this case algorithm H nds set Z B = B in the passage q = B of the outer loop of step 2 and thus generates an optimal schedule. In the following we may assume that l max (k) + k < B, (15) and thus Q N. Suppose rst that B k and schedule S k exists. If we show that one of the tentative sets Z generated in the inner loop of step 2 is set Z k, then we have shown that schedule S k is found by the algorithm. This task is obviously accomplished if we show that Z k Q holds. Aiming for contradiction suppose that Z k Q does not hold. Then, at least one of the last k positions before the hole in schedule S is taken by a job of set N \ Q. We want to demonstrate that under this condition a minimum number of jobs in set X is processed after the hole in the optimal schedule. Thus, assume 10
11 that as many jobs of set N \ Q as possible are processed before the hole. This is the case if J[i] = J [i],ssp T, i = 1,..., B l max (k) k = B k + 1. This implies that B B = l max (k) + 1, a contradiction to (14). Finally, suppose that B < k. Using (15) this implies l max (k) + B < B, again a contradiction to (14). The time complexity of step 1 of algorithm H is O(n log n). Step 2 of algorithm H is only carried out if A a max (k). As parameters l max (k) and a max (k) are constant for a given k, the number of jobs in set Q is constant as well. Hence, the number of tentative schedules enumerated in step 2 is constant. Each tentative schedule can be generated in O(n log n) time. Thus, the running time of algorithm H for a given k is O(n log n). 3 Computational experiment The previous section dealt with the theoretical worst-case behaviour of algorithm H. In this section we want to quantify the error and computation time of algorithm H using experimental analysis and draw a comparison to the algorithms SPT and MSPT. The data set for the experiment was generated almost in the same way as the data set for the experiment presented in [6]. Job processing times were random integers from a uniform distribution [1, 100]. The number n of jobs in an instance ranged from 10 to The start time of the hole was set to a percentage Rperc of the sum of the processing times in an instance, i.e. we set s = Rperc j N p j where Rperc {0.1, 0.3, 0.5, 0.7, 0.9}. The hole length was set to the average processing time of the instance, i.e. = j N p j /n. For each pair of the parameters n and Rperc ten instances were generated. The algorithms were implemented in the programming language Tcl and the experiment was run on an AMD Duron/1200 MHz personal computer. Algorithm H was tested with the accuracy parameter value k = 3. According to Table 1 the performance guarantee with this setting is 10.21%. Table 2 lists the mean (ME) and worst (WE) relative errors of the algorithms SPT, MSPT and H depending on the number of jobs. All values are percent deviations from the minimal ow-time C. The minimal ow-time was computed using the dynamic programming algorithm presented in [5]. We see that the mean and worst errors of algorithm H are very low (0.31% and 3.18% deviation from C, respectively). Algorithm H improves the SPT results distinctly. On average the mean error of algorithm H is 50% of the mean SPT error (0.31% above C in comparison to 0.62% above C ). This result is astonishing if we 11
12 Table 2: Mean (ME) and worst (WE) percent deviations of algorithms SPT, MSPT and H from the minimal ow-time. n ME(SPT) WE(SPT) ME(MSPT) WE(MSPT) ME(H) WE(H) average take into account that for 52% of the test instances the abort condition A > a max (k) held, i.e. for these instances the algorithm stopped after generating the SPT schedule. The overall average computation time of algorithm H is only 0.8 seconds. For those instances where the abort condition did not hold and step 2 was carried out, the average computation time was 1.7 seconds. The maximum computation time was 9.7 seconds. Taking into account that we used a relatively slow interpreted programming language for the experiment and that our implementation of the algorithm was not optimized we conclude that algorithm H is quite fast and superior to the SPT algorithm unless extreme computation speed is of vital importance. The results in Table 2 also show that algorithm H (for k = 3) is outperformed by algorithm MSPT for instances with n 30 with respect to average and worst solution quality. For the smaller instances algorithm H achieves better results than algorithm MSPT. On average the mean error of the MSPT algorithm is only 11% of the mean SPT error (0.07% above C in comparison to 0.62% above C ). We refrain from reporting computation times for the MSPT algorithm and comparing them to those of algorithm H because our implementations of the algorithms were not optimized. Taking into account the computational experiments reported in [5] it is likely that algorithm MSPT is faster than algorithm H (for k = 3). We conclude that algorithm H (for k = 3) achieves a better 12
13 solution quality than algorithm MSPT for problem instances with n 20 while algorithm MSPT outperforms algorithm H for the larger problem instances. Sad et al. report in [6] that parameter Rperc has a distinct inuence on the performance of the MSPT algorithm. The mean errors increased as Rperc was increased from to 0.5. Our experiment conrms this result for Rperc values between 0.1 and 0.5. However, as Rperc is further increased (values 0.7 and 0.9) the mean error decreases again. The mean errors for algorithm H decreases from 0.66% to 0.002% as Rperc is increased from 0.1 to Summary We investigated the problem of minimizing the sum of the job completion times on a single machine which is not available during a given time interval. The best known approximation algorithm for this problem, the MSPT algorithm, has a relative worst-case error bound of 17.6%. We presented a parametric O(n log n)-algorithm H with which better worst-case error bounds can be obtained. The best error bound calculated for the algorithm in the paper is 7.4%. In a computational experiment algorithm H was tested exemplarily with a performance guarantee setting of 10.2%. It turned out that instances with up to 1000 jobs were solved with a mean (maximum) error of 0.31% (3.18%) and a mean (maximum) computation time of 0.8 (9.7) seconds. In the experiment algorithm H outperformed the MSPT algorithm with respect to mean and worst error for problem instances with at most 20 jobs. References [1] I. Adiri, J. Bruno, E. Frostig, A.H.G. Rinnooy Kan, Single machine ow-time scheduling with a single breakdown, Acta Informatica 26 (1989) [2] O. Braun, J. Breit, G. Schmidt, Deterministic machine scheduling with limited machine availability, discussion paper B0403 (2004), Department of Economics, University of Saarland. [3] C.-Y. Lee, Machine scheduling with availability constraints, in: J.Y.-T. Leung (Ed.), Handbook of Scheduling, CRC Press, 2004,
14 [4] C.-Y. Lee, S.D. Liman, Single machine ow-time scheduling with scheduled maintenance, Acta Informatica 29 (1992) [5] C. Sad, B. Penz, C. Rapine, A dynamic programming algorithm for the single machine total completion time scheduling problem with availability, 8th International Workshop on Project Management and Scheduling - PMS, Valencia, Spain, (2002) [6] C. Sad, B. Penz, C. Rapine, J. Bªaºewicz, P. Formanowicz, An improved approximation algorithm for the single machine total completion time scheduling problem with availability constraints, European Journal of Operational Research 161 (2005) 310. [7] G. Schmidt, Scheduling with limited machine availability, European Journal of Operational Research 121 (2000) 115. Acknowledgements The author would like to express his gratitude to Dr. Chérif Sad and two anonymous referees for many constructive comments and hints which helped improve the paper. 14
Completion Time Scheduling and the WSRPT Algorithm
Completion Time Scheduling and the WSRPT Algorithm Bo Xiong, Christine Chung Department of Computer Science, Connecticut College, New London, CT {bxiong,cchung}@conncoll.edu Abstract. We consider the online
More informationApproximability of Two-Machine No-Wait Flowshop Scheduling with Availability Constraints
Approximability of Two-Machine No-Wait Flowshop Scheduling with Availability Constraints T.C. Edwin Cheng 1, and Zhaohui Liu 1,2 1 Department of Management, The Hong Kong Polytechnic University Kowloon,
More informationAn improved on-line algorithm for scheduling on two unrestrictive parallel batch processing machines
This is the Pre-Published Version. An improved on-line algorithm for scheduling on two unrestrictive parallel batch processing machines Q.Q. Nong, T.C.E. Cheng, C.T. Ng Department of Mathematics, Ocean
More information36 CHAPTER 1. LIMITS AND CONTINUITY. Figure 1.17: At which points is f not continuous?
36 CHAPTER 1. LIMITS AND CONTINUITY 1.3 Continuity Before Calculus became clearly de ned, continuity meant that one could draw the graph of a function without having to lift the pen and pencil. While this
More informationAn example of a computable
An example of a computable absolutely normal number Verónica Becher Santiago Figueira Abstract The first example of an absolutely normal number was given by Sierpinski in 96, twenty years before the concept
More informationMinimizing the Number of Machines in a Unit-Time Scheduling Problem
Minimizing the Number of Machines in a Unit-Time Scheduling Problem Svetlana A. Kravchenko 1 United Institute of Informatics Problems, Surganova St. 6, 220012 Minsk, Belarus kravch@newman.bas-net.by Frank
More informationClassification - Examples
Lecture 2 Scheduling 1 Classification - Examples 1 r j C max given: n jobs with processing times p 1,...,p n and release dates r 1,...,r n jobs have to be scheduled without preemption on one machine taking
More informationStiffie's On Line Scheduling Algorithm
A class of on-line scheduling algorithms to minimize total completion time X. Lu R.A. Sitters L. Stougie Abstract We consider the problem of scheduling jobs on-line on a single machine and on identical
More informationSingle machine parallel batch scheduling with unbounded capacity
Workshop on Combinatorics and Graph Theory 21th, April, 2006 Nankai University Single machine parallel batch scheduling with unbounded capacity Yuan Jinjiang Department of mathematics, Zhengzhou University
More information1 if 1 x 0 1 if 0 x 1
Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or
More informationScheduling Single Machine Scheduling. Tim Nieberg
Scheduling Single Machine Scheduling Tim Nieberg Single machine models Observation: for non-preemptive problems and regular objectives, a sequence in which the jobs are processed is sufficient to describe
More informationList Scheduling in Order of α-points on a Single Machine
List Scheduling in Order of α-points on a Single Machine Martin Skutella Fachbereich Mathematik, Universität Dortmund, D 4422 Dortmund, Germany martin.skutella@uni-dortmund.de http://www.mathematik.uni-dortmund.de/
More informationHow To Find An Optimal Search Protocol For An Oblivious Cell
The Conference Call Search Problem in Wireless Networks Leah Epstein 1, and Asaf Levin 2 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. lea@math.haifa.ac.il 2 Department of Statistics,
More information14.1 Rent-or-buy problem
CS787: Advanced Algorithms Lecture 14: Online algorithms We now shift focus to a different kind of algorithmic problem where we need to perform some optimization without knowing the input in advance. Algorithms
More informationWhy? A central concept in Computer Science. Algorithms are ubiquitous.
Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online
More informationFairness in Routing and Load Balancing
Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria
More informationMathematical Induction
Mathematical Induction (Handout March 8, 01) The Principle of Mathematical Induction provides a means to prove infinitely many statements all at once The principle is logical rather than strictly mathematical,
More information8 Divisibility and prime numbers
8 Divisibility and prime numbers 8.1 Divisibility In this short section we extend the concept of a multiple from the natural numbers to the integers. We also summarize several other terms that express
More informationLecture 3: Finding integer solutions to systems of linear equations
Lecture 3: Finding integer solutions to systems of linear equations Algorithmic Number Theory (Fall 2014) Rutgers University Swastik Kopparty Scribe: Abhishek Bhrushundi 1 Overview The goal of this lecture
More information4. Continuous Random Variables, the Pareto and Normal Distributions
4. Continuous Random Variables, the Pareto and Normal Distributions A continuous random variable X can take any value in a given range (e.g. height, weight, age). The distribution of a continuous random
More informationSCORE SETS IN ORIENTED GRAPHS
Applicable Analysis and Discrete Mathematics, 2 (2008), 107 113. Available electronically at http://pefmath.etf.bg.ac.yu SCORE SETS IN ORIENTED GRAPHS S. Pirzada, T. A. Naikoo The score of a vertex v in
More informationRow Echelon Form and Reduced Row Echelon Form
These notes closely follow the presentation of the material given in David C Lay s textbook Linear Algebra and its Applications (3rd edition) These notes are intended primarily for in-class presentation
More informationContinued Fractions and the Euclidean Algorithm
Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction
More informationHOMEWORK 5 SOLUTIONS. n!f n (1) lim. ln x n! + xn x. 1 = G n 1 (x). (2) k + 1 n. (n 1)!
Math 7 Fall 205 HOMEWORK 5 SOLUTIONS Problem. 2008 B2 Let F 0 x = ln x. For n 0 and x > 0, let F n+ x = 0 F ntdt. Evaluate n!f n lim n ln n. By directly computing F n x for small n s, we obtain the following
More informationMATH10040 Chapter 2: Prime and relatively prime numbers
MATH10040 Chapter 2: Prime and relatively prime numbers Recall the basic definition: 1. Prime numbers Definition 1.1. Recall that a positive integer is said to be prime if it has precisely two positive
More information3 Some Integer Functions
3 Some Integer Functions A Pair of Fundamental Integer Functions The integer function that is the heart of this section is the modulo function. However, before getting to it, let us look at some very simple
More informationDiscrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 2
CS 70 Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 2 Proofs Intuitively, the concept of proof should already be familiar We all like to assert things, and few of us
More informationThe Prime Numbers. Definition. A prime number is a positive integer with exactly two positive divisors.
The Prime Numbers Before starting our study of primes, we record the following important lemma. Recall that integers a, b are said to be relatively prime if gcd(a, b) = 1. Lemma (Euclid s Lemma). If gcd(a,
More informationThe Mean Value Theorem
The Mean Value Theorem THEOREM (The Extreme Value Theorem): If f is continuous on a closed interval [a, b], then f attains an absolute maximum value f(c) and an absolute minimum value f(d) at some numbers
More informationTiers, Preference Similarity, and the Limits on Stable Partners
Tiers, Preference Similarity, and the Limits on Stable Partners KANDORI, Michihiro, KOJIMA, Fuhito, and YASUDA, Yosuke February 7, 2010 Preliminary and incomplete. Do not circulate. Abstract We consider
More informationLecture 2: Universality
CS 710: Complexity Theory 1/21/2010 Lecture 2: Universality Instructor: Dieter van Melkebeek Scribe: Tyson Williams In this lecture, we introduce the notion of a universal machine, develop efficient universal
More informationDynamic TCP Acknowledgement: Penalizing Long Delays
Dynamic TCP Acknowledgement: Penalizing Long Delays Karousatou Christina Network Algorithms June 8, 2010 Karousatou Christina (Network Algorithms) Dynamic TCP Acknowledgement June 8, 2010 1 / 63 Layout
More informationTwo-Job Shop Scheduling Problems with Availability Constraints
rom: ICAPS- Proceedings. Copyright, AAAI (www.aaai.org). All rights reserved. Two-Job Shop Scheduling Problems with Availability Constraints Riad Aggoune Laboratoire des Technologies Industrielles Centre
More informationChapter 3. Cartesian Products and Relations. 3.1 Cartesian Products
Chapter 3 Cartesian Products and Relations The material in this chapter is the first real encounter with abstraction. Relations are very general thing they are a special type of subset. After introducing
More informationPricing of Limit Orders in the Electronic Security Trading System Xetra
Pricing of Limit Orders in the Electronic Security Trading System Xetra Li Xihao Bielefeld Graduate School of Economics and Management Bielefeld University, P.O. Box 100 131 D-33501 Bielefeld, Germany
More informationThe power of -points in preemptive single machine scheduling
JOURNAL OF SCHEDULING J. Sched. 22; 5:121 133 (DOI: 1.12/jos.93) The power of -points in preemptive single machine scheduling Andreas S. Schulz 1; 2; ; and Martin Skutella 1 Massachusetts Institute of
More information3. Mathematical Induction
3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)
More informationChapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling
Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one
More informationNear Optimal Solutions
Near Optimal Solutions Many important optimization problems are lacking efficient solutions. NP-Complete problems unlikely to have polynomial time solutions. Good heuristics important for such problems.
More informationOn the largest prime factor of x 2 1
On the largest prime factor of x 2 1 Florian Luca and Filip Najman Abstract In this paper, we find all integers x such that x 2 1 has only prime factors smaller than 100. This gives some interesting numerical
More informationNP-Completeness and Cook s Theorem
NP-Completeness and Cook s Theorem Lecture notes for COM3412 Logic and Computation 15th January 2002 1 NP decision problems The decision problem D L for a formal language L Σ is the computational task:
More informationMechanisms for Fair Attribution
Mechanisms for Fair Attribution Eric Balkanski Yaron Singer Abstract We propose a new framework for optimization under fairness constraints. The problems we consider model procurement where the goal is
More informationMath Circle Beginners Group October 18, 2015
Math Circle Beginners Group October 18, 2015 Warm-up problem 1. Let n be a (positive) integer. Prove that if n 2 is odd, then n is also odd. (Hint: Use a proof by contradiction.) Suppose that n 2 is odd
More informationarxiv:1112.0829v1 [math.pr] 5 Dec 2011
How Not to Win a Million Dollars: A Counterexample to a Conjecture of L. Breiman Thomas P. Hayes arxiv:1112.0829v1 [math.pr] 5 Dec 2011 Abstract Consider a gambling game in which we are allowed to repeatedly
More informationReal-Time Scheduling (Part 1) (Working Draft) Real-Time System Example
Real-Time Scheduling (Part 1) (Working Draft) Insup Lee Department of Computer and Information Science School of Engineering and Applied Science University of Pennsylvania www.cis.upenn.edu/~lee/ CIS 41,
More informationScheduling Jobs and Preventive Maintenance Activities on Parallel Machines
Scheduling Jobs and Preventive Maintenance Activities on Parallel Machines Maher Rebai University of Technology of Troyes Department of Industrial Systems 12 rue Marie Curie, 10000 Troyes France maher.rebai@utt.fr
More informationInternational Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
More informationA Constant-Approximate Feasibility Test for Multiprocessor Real-Time Scheduling
Algorithmica manuscript No. (will be inserted by the editor) A Constant-Approximate Feasibility Test for Multiprocessor Real-Time Scheduling Vincenzo Bonifaci Alberto Marchetti-Spaccamela Sebastian Stiller
More information11 Multivariate Polynomials
CS 487: Intro. to Symbolic Computation Winter 2009: M. Giesbrecht Script 11 Page 1 (These lecture notes were prepared and presented by Dan Roche.) 11 Multivariate Polynomials References: MC: Section 16.6
More informationSome Polynomial Theorems. John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 rkennedy@ix.netcom.
Some Polynomial Theorems by John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 rkennedy@ix.netcom.com This paper contains a collection of 31 theorems, lemmas,
More informationApplied Algorithm Design Lecture 5
Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design
More informationFEGYVERNEKI SÁNDOR, PROBABILITY THEORY AND MATHEmATICAL
FEGYVERNEKI SÁNDOR, PROBABILITY THEORY AND MATHEmATICAL STATIsTICs 4 IV. RANDOm VECTORs 1. JOINTLY DIsTRIBUTED RANDOm VARIABLEs If are two rom variables defined on the same sample space we define the joint
More informationResearch Article Batch Scheduling on Two-Machine Flowshop with Machine-Dependent Setup Times
Hindawi Publishing Corporation Advances in Operations Research Volume 2009, Article ID 153910, 10 pages doi:10.1155/2009/153910 Research Article Batch Scheduling on Two-Machine Flowshop with Machine-Dependent
More informationPh.D. Thesis. Judit Nagy-György. Supervisor: Péter Hajnal Associate Professor
Online algorithms for combinatorial problems Ph.D. Thesis by Judit Nagy-György Supervisor: Péter Hajnal Associate Professor Doctoral School in Mathematics and Computer Science University of Szeged Bolyai
More informationDuplicating and its Applications in Batch Scheduling
Duplicating and its Applications in Batch Scheduling Yuzhong Zhang 1 Chunsong Bai 1 Shouyang Wang 2 1 College of Operations Research and Management Sciences Qufu Normal University, Shandong 276826, China
More informationn k=1 k=0 1/k! = e. Example 6.4. The series 1/k 2 converges in R. Indeed, if s n = n then k=1 1/k, then s 2n s n = 1 n + 1 +...
6 Series We call a normed space (X, ) a Banach space provided that every Cauchy sequence (x n ) in X converges. For example, R with the norm = is an example of Banach space. Now let (x n ) be a sequence
More informationPrimality - Factorization
Primality - Factorization Christophe Ritzenthaler November 9, 2009 1 Prime and factorization Definition 1.1. An integer p > 1 is called a prime number (nombre premier) if it has only 1 and p as divisors.
More informationJUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004
Scientiae Mathematicae Japonicae Online, Vol. 10, (2004), 431 437 431 JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS Ondřej Čepeka and Shao Chin Sung b Received December May 12, 2003; revised February
More informationHow To Know If A Domain Is Unique In An Octempo (Euclidean) Or Not (Ecl)
Subsets of Euclidean domains possessing a unique division algorithm Andrew D. Lewis 2009/03/16 Abstract Subsets of a Euclidean domain are characterised with the following objectives: (1) ensuring uniqueness
More information! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.
Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three
More informationAlgorithm Design and Analysis
Algorithm Design and Analysis LECTURE 27 Approximation Algorithms Load Balancing Weighted Vertex Cover Reminder: Fill out SRTEs online Don t forget to click submit Sofya Raskhodnikova 12/6/2011 S. Raskhodnikova;
More informationScheduling Parallel Jobs with Monotone Speedup 1
Scheduling Parallel Jobs with Monotone Speedup 1 Alexander Grigoriev, Marc Uetz Maastricht University, Quantitative Economics, P.O.Box 616, 6200 MD Maastricht, The Netherlands, {a.grigoriev@ke.unimaas.nl,
More informationScheduling Shop Scheduling. Tim Nieberg
Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations
More information! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.
Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of
More informationMathematical Induction. Mary Barnes Sue Gordon
Mathematics Learning Centre Mathematical Induction Mary Barnes Sue Gordon c 1987 University of Sydney Contents 1 Mathematical Induction 1 1.1 Why do we need proof by induction?.... 1 1. What is proof by
More informationLecture 1: Course overview, circuits, and formulas
Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik
More informationA Sublinear Bipartiteness Tester for Bounded Degree Graphs
A Sublinear Bipartiteness Tester for Bounded Degree Graphs Oded Goldreich Dana Ron February 5, 1998 Abstract We present a sublinear-time algorithm for testing whether a bounded degree graph is bipartite
More informationSo let us begin our quest to find the holy grail of real analysis.
1 Section 5.2 The Complete Ordered Field: Purpose of Section We present an axiomatic description of the real numbers as a complete ordered field. The axioms which describe the arithmetic of the real numbers
More informationa 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2.
Chapter 1 LINEAR EQUATIONS 1.1 Introduction to linear equations A linear equation in n unknowns x 1, x,, x n is an equation of the form a 1 x 1 + a x + + a n x n = b, where a 1, a,..., a n, b are given
More informationComplexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar
Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples
More informationClustering and scheduling maintenance tasks over time
Clustering and scheduling maintenance tasks over time Per Kreuger 2008-04-29 SICS Technical Report T2008:09 Abstract We report results on a maintenance scheduling problem. The problem consists of allocating
More information1. Prove that the empty set is a subset of every set.
1. Prove that the empty set is a subset of every set. Basic Topology Written by Men-Gen Tsai email: b89902089@ntu.edu.tw Proof: For any element x of the empty set, x is also an element of every set since
More informationMath 319 Problem Set #3 Solution 21 February 2002
Math 319 Problem Set #3 Solution 21 February 2002 1. ( 2.1, problem 15) Find integers a 1, a 2, a 3, a 4, a 5 such that every integer x satisfies at least one of the congruences x a 1 (mod 2), x a 2 (mod
More informationExact Nonparametric Tests for Comparing Means - A Personal Summary
Exact Nonparametric Tests for Comparing Means - A Personal Summary Karl H. Schlag European University Institute 1 December 14, 2006 1 Economics Department, European University Institute. Via della Piazzuola
More informationThe Fundamental Theorem of Arithmetic
The Fundamental Theorem of Arithmetic 1 Introduction: Why this theorem? Why this proof? One of the purposes of this course 1 is to train you in the methods mathematicians use to prove mathematical statements,
More informationTriangle deletion. Ernie Croot. February 3, 2010
Triangle deletion Ernie Croot February 3, 2010 1 Introduction The purpose of this note is to give an intuitive outline of the triangle deletion theorem of Ruzsa and Szemerédi, which says that if G = (V,
More informationAbstract Title: Planned Preemption for Flexible Resource Constrained Project Scheduling
Abstract number: 015-0551 Abstract Title: Planned Preemption for Flexible Resource Constrained Project Scheduling Karuna Jain and Kanchan Joshi Shailesh J. Mehta School of Management, Indian Institute
More informationScheduling Parallel Jobs with Linear Speedup
Scheduling Parallel Jobs with Linear Speedup Alexander Grigoriev and Marc Uetz Maastricht University, Quantitative Economics, P.O.Box 616, 6200 MD Maastricht, The Netherlands. Email: {a.grigoriev,m.uetz}@ke.unimaas.nl
More informationBANACH AND HILBERT SPACE REVIEW
BANACH AND HILBET SPACE EVIEW CHISTOPHE HEIL These notes will briefly review some basic concepts related to the theory of Banach and Hilbert spaces. We are not trying to give a complete development, but
More informationTAKE-AWAY GAMES. ALLEN J. SCHWENK California Institute of Technology, Pasadena, California INTRODUCTION
TAKE-AWAY GAMES ALLEN J. SCHWENK California Institute of Technology, Pasadena, California L INTRODUCTION Several games of Tf take-away?f have become popular. The purpose of this paper is to determine the
More information8 Primes and Modular Arithmetic
8 Primes and Modular Arithmetic 8.1 Primes and Factors Over two millennia ago already, people all over the world were considering the properties of numbers. One of the simplest concepts is prime numbers.
More informationOffline sorting buffers on Line
Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: rkhandekar@gmail.com 2 IBM India Research Lab, New Delhi. email: pvinayak@in.ibm.com
More informationAlgebraic and Transcendental Numbers
Pondicherry University July 2000 Algebraic and Transcendental Numbers Stéphane Fischler This text is meant to be an introduction to algebraic and transcendental numbers. For a detailed (though elementary)
More informationCHAPTER 3. Methods of Proofs. 1. Logical Arguments and Formal Proofs
CHAPTER 3 Methods of Proofs 1. Logical Arguments and Formal Proofs 1.1. Basic Terminology. An axiom is a statement that is given to be true. A rule of inference is a logical rule that is used to deduce
More informationMath 4310 Handout - Quotient Vector Spaces
Math 4310 Handout - Quotient Vector Spaces Dan Collins The textbook defines a subspace of a vector space in Chapter 4, but it avoids ever discussing the notion of a quotient space. This is understandable
More informationLEARNING OBJECTIVES FOR THIS CHAPTER
CHAPTER 2 American mathematician Paul Halmos (1916 2006), who in 1942 published the first modern linear algebra book. The title of Halmos s book was the same as the title of this chapter. Finite-Dimensional
More information7.6 Approximation Errors and Simpson's Rule
WileyPLUS: Home Help Contact us Logout Hughes-Hallett, Calculus: Single and Multivariable, 4/e Calculus I, II, and Vector Calculus Reading content Integration 7.1. Integration by Substitution 7.2. Integration
More informationElementary Number Theory and Methods of Proof. CSE 215, Foundations of Computer Science Stony Brook University http://www.cs.stonybrook.
Elementary Number Theory and Methods of Proof CSE 215, Foundations of Computer Science Stony Brook University http://www.cs.stonybrook.edu/~cse215 1 Number theory Properties: 2 Properties of integers (whole
More informationThe Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
More informationNotes from Week 1: Algorithms for sequential prediction
CS 683 Learning, Games, and Electronic Markets Spring 2007 Notes from Week 1: Algorithms for sequential prediction Instructor: Robert Kleinberg 22-26 Jan 2007 1 Introduction In this course we will be looking
More informationFollow links for Class Use and other Permissions. For more information send email to: permissions@pupress.princeton.edu
COPYRIGHT NOTICE: Ariel Rubinstein: Lecture Notes in Microeconomic Theory is published by Princeton University Press and copyrighted, c 2006, by Princeton University Press. All rights reserved. No part
More informationBatch Scheduling of Deteriorating Products
Decision Making in Manufacturing and Services Vol. 1 2007 No. 1 2 pp. 25 34 Batch Scheduling of Deteriorating Products Maksim S. Barketau, T.C. Edwin Cheng, Mikhail Y. Kovalyov, C.T. Daniel Ng Abstract.
More informationOnline Adwords Allocation
Online Adwords Allocation Shoshana Neuburger May 6, 2009 1 Overview Many search engines auction the advertising space alongside search results. When Google interviewed Amin Saberi in 2004, their advertisement
More informationPredict the Popularity of YouTube Videos Using Early View Data
000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050
More informationOn-line machine scheduling with batch setups
On-line machine scheduling with batch setups Lele Zhang, Andrew Wirth Department of Mechanical Engineering The University of Melbourne, VIC 3010, Australia Abstract We study a class of scheduling problems
More informationLoad balancing of temporary tasks in the l p norm
Load balancing of temporary tasks in the l p norm Yossi Azar a,1, Amir Epstein a,2, Leah Epstein b,3 a School of Computer Science, Tel Aviv University, Tel Aviv, Israel. b School of Computer Science, The
More informationRegular Languages and Finite Automata
Regular Languages and Finite Automata 1 Introduction Hing Leung Department of Computer Science New Mexico State University Sep 16, 2010 In 1943, McCulloch and Pitts [4] published a pioneering work on a
More informationSystems of Linear Equations
Systems of Linear Equations Beifang Chen Systems of linear equations Linear systems A linear equation in variables x, x,, x n is an equation of the form a x + a x + + a n x n = b, where a, a,, a n and
More informationThis unit will lay the groundwork for later units where the students will extend this knowledge to quadratic and exponential functions.
Algebra I Overview View unit yearlong overview here Many of the concepts presented in Algebra I are progressions of concepts that were introduced in grades 6 through 8. The content presented in this course
More informationBinary Adders: Half Adders and Full Adders
Binary Adders: Half Adders and Full Adders In this set of slides, we present the two basic types of adders: 1. Half adders, and 2. Full adders. Each type of adder functions to add two binary bits. In order
More information