Improved approximation for non-preemptive single machine ow-time scheduling with an availability constraint

Size: px
Start display at page:

Download "Improved approximation for non-preemptive single machine ow-time scheduling with an availability constraint"

Transcription

1 Improved approximation for non-preemptive single machine ow-time scheduling with an availability constraint Joachim Breit Department of Information and Technology Management, Saarland University, Saarbrücken, Germany Abstract We study the problem of scheduling n non-preemptable jobs on a single machine which is not available for processing during a given time period. The objective is to minimize the sum of the job completion times. The best known approximation algorithm for this NP-hard problem has a relative worst-case error bound of 17.6%. We present a parametric O(n log n)-algorithm H with which better worst-case error bounds can be obtained. The best error bound calculated for the algorithm in the paper is 7.4%. In a computational experiment we test the algorithm with the performance guarantee set to 10.2%. It turns out that randomly generated instances with up to 1000 jobs can be solved with a mean (maximum) error of 0.31% (3.18%) and a mean (maximum) computation time of 0.8 (9.7) seconds. Keywords: Single machine scheduling; Approximation algorithms; Availability constraints. 1 Introduction In classical scheduling models it is usually assumed that machines are continuously available for processing throughout the planning period. This assumption is not justied in situations Address: Saarland University, Department of Information and Technology Management, P.O. Box , D Saarbrücken, Germany. address: jb@itm.uni-sb.de (J. Breit). Tel.: +49(681) Fax: +49(681)

2 where maintenance requirements, rest periods or breakdowns have to be considered. This motivates the investigation of generalized scheduling models in which machine availability may be restricted. In the past years such models have received considerable attention from researchers. Schmidt [7], Lee [3] and Braun et al. [2] provide surveys of this area of research. In the problem studied in this paper we are given a set N = {J 1,..., J n } of jobs to be processed on a single machine. The processing time of job J j, j = 1,..., n, is denoted by p j. The machine cannot process more than one job at a time and is assumed not to be available for processing during a given time interval [s, t] where = t s > 0. For convenience we will call this interval of non-availability the hole in the following. Job preemption is not allowed. A solution for the problem is a schedule S which assigns a completion time C j,s and a starting time C j,s p j to each job J j. The sum of the job completion times (or ow-time) of schedule S is denoted by C(S) = j C j,s. An optimal schedule S has a minimal ow-time of C. It is not dicult to see that jobs with zero processing time (p j = 0) can be optimally scheduled at time 0. We therefore assume throughout the paper that processing times are strictly positive. The objective function value obtained from an algorithm H is C(H). We say that algorithm H has a relative worst-case error bound of α if ρ(h) = (C(H) C )/C α holds for any instance of the problem. Adiri et al. [1] show that our problem is NP-hard. Lee and Liman [4] provide a shorter NP-hardness proof and show that the shortest processing time rule (SPT) which sequences the jobs in non-decreasing order of their processing times has a tight worst-case error bound of 2/7. In [5] Sad et al. propose a pseudo-polynomial dynamic programming algorithm with time complexity O(ns) to solve the problem exactly. The eciency of the algorithm is improved by a xation of variables technique. An improved approximation algorithm MSPT (modied SPT) with a worst-case error bound of 3/17 is provided by Sad et al. in [6]. We adopt the notation introduced in the aforementioned papers and denote by B (A) the set of jobs scheduled before (after) the hole in the SPT schedule S SP T. The MSPT algorithm rst generates schedule S SP T. Then it tries to improve the result by enumerating schedules which can be obtained by a single exchange of one job from set B with one job from set A. In each schedule jobs before and after the hole, respectively, appear in nondecreasing order of their processing times. Clearly, the maximum number of tentative schedules that the MSPT algorithm has to examine is B A (n/2) 2 which would result in a time complexity of O(n 2 ). However, Sad et al. showed that it is possible to decrease 2

3 the number of tentative schedules considerably. In the computational experiment reported in [5] an improved version of the MSPT algorithm with time complexity O(n log n) was used. This version of the algorithm required an average computation time of only about 3 seconds on a personal computer for problem instances with jobs. The objective of this research is to provide approximation algorithms with performance guarantee better than the MSPT algorithm. In order to present our results we introduce further notation: J [i],s - job scheduled at position i in schedule S C [i],s - completion time of job J [i],s p [i],s - processing time of job J [i],s J[i] - job scheduled at position i in schedule S C[i] - completion time of job J[i] Cj - completion time of job J j in schedule S p [i] - processing time of job J[i] X - set of the rst B jobs in schedule S Y - set of the last A jobs in schedule S We assume that jobs are generally started as early as possible. Under this assumption let δ (δ ) denote the idle time immediately before the hole in schedule S SP T (S ). In [4] it is shown that δ δ. By B (A ) we denote the set of jobs scheduled before (after) the hole in the optimal solution. In the following section we will present our approximation algorithm and analyze its worst-case performance. The section is divided into two subsections. In the rst subsection we discuss the properties of a schedule S k which is important for our algorithm. In the second subsection we state the approximation algorithm and derive its worst-case bound based on the results of the rst subsection. In Section 3 we report on the results of a computational experiment. Section 4 nishes the paper with a summary. 2 Approximation algorithm and worst-case analysis 2.1 Schedule S k and its properties Let Z k = { J[ B k+1], J [ B k+2],..., J [ B ]} be the set of the last k jobs processed before the hole in the optimal solution, k 1. We denote by S k a schedule with the following structure: 3

4 The jobs of set Z k are processed in SPT order immediately before the hole. The jobs of set N \ Z k are processed before the jobs of set Z k and after the hole. Proceeding according to the SPT-ordered list of these jobs we schedule as many of them as possible at the beginning of the schedule before job set Z k and the rest after the hole. In schedule S k the set of jobs processed before (after) the hole is denoted by B k (A k ). The idle time immediately before the hole in schedule S k is denoted by δ k. In the following we present four lemmas and a corollary which contain basic properties of schedule S k. Lemma 1. δ k δ. Proof. Consider schedule S k in which the last k jobs before the hole are the same as in schedule S. We distinguish between two cases. (i) Suppose rst that B k = B. As we use the SPT-ordered list of the jobs in set N \Z k to select the jobs appearing at positions 1,..., B k k in schedule S k it is clear that C [j],sk C[j] for j = 1,..., B k k. Jobs at positions B k k + 1,..., B k are the same in both schedules S k and S. Thus we have C [j],sk C[j] for j = B k k + 1,..., B k as well. The completion time of the jobs appearing at positions j = B k + 1,..., n in schedules S k and S are given by C [j],sk = B k k i=1 p [i],sk + i Z k p i + δ k + + j i= B k +1 p [i],sk, (1) C [j] = B k k i=1 p [i] + i Z k p i + δ + + j i= B k +1 Because in schedule S k jobs of set N \ Z k are scheduled using the SPT rule we have p [i]. B k k i=1 p [i],sk + j i= B k +1 p [i],sk B k k i=1 p [i] + j p [i] i= B k +1 and thus C [j],sk C [j] δ k δ j = B k + 1,..., n. (2) It follows that the lemma holds, for otherwise we have C(S k ) < C, a contradiction. 4

5 (ii) Now suppose that B k = B + l where l 1. Let us rst compare the ow-time of the rst B k jobs in schedules S k and S. Suppose that we must schedule the jobs of set Z k in SPT order immediately before the hole. For schedule S k we selected the shortest B k k jobs besides the jobs of set Z k which is obviously the best choice we can make. We can either schedule any of these jobs before the jobs of set Z k or after the hole. It is not dicult to see that scheduling all of them in SPT order before job set Z k is optimal. Hence, among all possibilities to schedule the jobs of set Z k and in addition B k k jobs from set N \ Z k under the restriction that job set Z k is placed immediately before the hole, schedule S k is the best. It follows that B k i=1 C [i],sk B k i=1 C [i]. Consider now the jobs at positions j = B k +1,..., n in schedules S k and S. Equation (1) still holds. The completion times of the last A k jobs in schedule S are given by C [j] = B k k l i=1 p [i] + i Z k p i + δ + + B k i= B k l+1 p [i] + j i= B k +1 Because in schedule S k jobs of set N \ Z k are scheduled using the SPT rule we have p [i]. B k k i=1 p [i],sk + j i= B k +1 p [i],sk B k k l i=1 p [i] + B k i= B k l+1 p [i] + j i= B k +1 p [i]. Inequality (2) holds thus for case (ii) as well. otherwise we have C(S k ) < C, a contradiction. It follows that the lemma holds for In the next lemma we derive a bound on the absolute error of schedule S k. The proof uses Lemma 1. Lemma 2. The absolute error of schedule S k is given by C(S k ) C ( A k k 1) (δ k δ ). (3) Proof. Because the last k jobs before the hole are the same in schedules S k and S, and δ k δ, each of these jobs nishes δ k δ time units later in schedule S than in schedule S k. The same is obviously true for the job preceding the rst job of set Z k. We may assume that this job exists because otherwise schedule S k is clearly optimal. Let us again distinguish between the two cases B k = B and B k > B. 5

6 (i) Suppose that B k = B. We have C [j],sk C [j] 0 j = 1,..., B k k 1, (4) C [j],sk C [j] = (δ k δ ) j = B k k,..., B k. (5) Integrating (2), (4) and (5) we obtain (3). (ii) Suppose now that B k = B + l, l 1. In this case we have C [j],sk C [j] 0 j = 1,..., B k k l 1, (6) C [j],sk C [j+k+1] 0 j = B k k l,..., B k k 1, (7) C [j],sk C [j l] = (δ k δ ) j = B k k,..., B k. (8) Integrating (2), (6), (7), (8) we obtain (3). The following lemma gives a lower bound on the minimal ow-time based on Lemma 1 and the structure of schedule S k. Let z be an integer and, for convenience, dene the function ω(z) = z(z + 1)/2. Lemma 3. If schedules S SP T and S k are not optimal then a lower bound on the minimal ow-time is given by C (ω( A k ) + 4) (δ k δ ). (9) Proof. All jobs processed after the hole in schedule S k must have a processing time greater than the idle time before the hole, i.e. p j > δ k δ k δ, J j A k. It follows that j A k C j > ω( A k ) (δ k δ ). It is not dicult to see that the SPT order for the jobs in sets A and B is dominant. Assume that the last job before the hole in schedule S belongs to set B. Then, due to the dominance of the SPT order for set B, all jobs in set B must belong to set B and all jobs of set A are processed after the hole in the optimal schedule. This implies that schedule S SP T is optimal. Hence, if schedule S SP T is not optimal, then the job processed immediately before the hole in schedules S and S k must belong to set A. For the same reason we may assume that the rst job after the hole in schedules S S k belongs to set B. Then we have p [ Bk ],S k p [ Bk +1],S k > δ k δ and, using Lemma 1, t > C [ B ] = C [ B k ],S k +(δ k δ ) p [ Bk ],S k +(δ k δ ) > 2(δ k δ ). Notice that by denition and 6

7 we have J [ B ] / A k. Under the condition of the lemma, nally, we may assume that one job of set B \ Z k is processed after the hole in schedule S, i.e. J l B k \ Z k : C l > 2(δ k δ ). It follows that inequality (9) holds. Our next lemma is a generalization of two results in [4] and [6]. Lemma 4. If B = B + l, l 0, then ρ(spt) ( A 1 l) (δ δ ) (ω( A ) + 1) (δ δ ) = W C1( A, l). (10) Proof. Lee and Liman [4] proved that δ δ and C [j],ssp T C [j] δ δ, j = B +1,..., n. We focus now on the rst B jobs in schedules S SP T and S. If l jobs of set X are processed after the hole in schedule S then the last job scheduled before the hole in schedule S is job J[ B l]. We have C [ B l] C [ B ],S SP T = δ δ. As C[ B l+i] > C[ B l], i = 1,..., l, and C [ B i],ssp T < C [ B ],SSP T, i = 1,..., l, we have C [j],ssp T C [j] (δ δ ), j = B l,..., B. Also, due to the SPT order in schedule S SP T we have C [j],ssp T C [j] 0, j = 1,..., B l 1. It follows that the maximum absolute error of schedule S SP T is given by C(S SP T ) C ( A 1 l) (δ δ ). In [4] it is shown that C (ω( A )+1) (δ δ ). Integrating the two bounds we obtain (10). The following corollary simply combines lemmas 2 and 3. Corollary 1. If schedules S SP T and S k are not optimal then the relative worst-case error bound of schedule S k is given by C(S k ) C C A k k 1 ω( A k ) + 4 = W C2( A k, k). (11) 2.2 Algorithm H and its performance guarantee In order to state our approximation algorithm we have to introduce two parameters a max (k) and l max (k) both of which depend on k only and can be computed a priori. Parameter a max (k): For a given value k we can easily compute the maximum value that function W C2( A k, k) can attain. In rows 2 and 3 of Table 1 we have listed these maximum values for k = 1,..., 5 as fractions and as decimal numbers, respectively. Row 4 shows for which value A k the maximum is attained. For example, if k = 3 the function W C2( A k, 3) attains its maximum value of 5/ for A k = 9. Following [4] we have ρ(spt) ( A 1)/(ω( A ) + 1) = W C3( A ) where W C3( A ) 0 as A. For 7

8 Table 1: Worst-case bounds of schedule S k depending on k. and parameter values a max (k) and l max (k) k max Ak W C2( A k, k) 4/25 1/8 5/49 3/35 7/95 max Ak W C2( A k, k) A k a max (k) l max (k) any given value k we can thus determine a minimum value a max (k) such that ρ(spt ) W C3( A ) W C2( A k, k) holds if A > a max (k). In Table 1 the values a max (k) are listed in row 5. As an example, the value a max (3) = 17 indicates that the SPT-rule guarantees a worst-case bound of 10.21% or better if A > 17. In cases where A > a max (k) holds schedule S SP T has a worst-case performance guarantee at least as good as schedule S k. Parameter l max (k): A second special case of the problem in which schedule S SP T has a better worst-case performance guarantee than schedule S k can be deduced from Lemma 4. Let again l = B B be the number of jobs in set X which are processed after the hole in schedule S. For any given value k we can compute a minimum value l max (k) such that ρ(spt) W C1( A, l) W C2( A k, k) holds if l > l max (k). In Table 1 the values l max (k) are listed in row 6. The value l max (3) = 3 for example indicates that if k = 3 and l = B B > 3 then the SPT-rule guarantees a worst-case bound of 10.21% or better. In cases where l = B B > l max (k) holds schedule S SP T has a worst-case performance guarantee at least as good as schedule S k. We will now explain the basic idea of our approximation algorithm H. The algorithm is called with a specic accuracy parameter value k as its input. The aspired performance guarantee then is max Ak W C2( A k, k); see Table 1 for concrete values. As we have seen at the beginning of this subsection there are cases where the SPT rule guarantees a worst-case bound at least as good as max Ak W C2( A k, k). The algorithm therefore rst generates schedule S SP T. The remaining part of the algorithm only has to deal with cases in which the SPT schedule may have a performance worse than max Ak W C2( A k, k). In this part of the algorithm we try to nd schedules S 1,..., S k by full enumeration. Schedule S k will guarantee the desired worst-case bound of max Ak W C2( A k, k) for the case B > k. For the case B k one of the schedules S 1,..., S k 1 will be an optimal schedule. 8

9 We are now ready to state the algorithm and dene Q = { A { J [ B lmax(k) k+1],s SP T,..., J [ B ],SSP T }}, the set of the last A + l max (k) + k jobs in schedule S SP T. Algorithm H. Input: Accuracy parameter k. Output: Schedule S H. Step 1. Generate schedule S SP T. If A > a max (k) then go to step 3. Step 2. For q := 1 to k do begin For all subsets Z of set Q with Z = q do begin Generate a tentative schedule with the following structure: (1) Jobs of set Z are processed in SPT order immediately before the hole. (2) Jobs of set N \ Z are processed before the jobs of set Z and after the hole. Proceeding according to the SPT-ordered list of these jobs we schedule as many of them as possible at the beginning of the schedule before job set Z and the rest after the hole. end. end. Step 3. Find the best among all generated feasible schedules and call this schedule S H. end. The structure of schedules S SP T, S k and S is depicted in Figure 1. Figure 1: Structure of schedules S SP T, S k and S 9

10 In the following we will analyze the worst-case performance of algorithm H. We want to prove the following theorem. Theorem 1. Algorithm H guarantees a worst-case error bound of ρ(s H ) A k k 1 ω( A k ) + 4 = W C2( A k, k). (12) Proof. We have to show that bound (12) is either guaranteed by schedule S SP T or by step 2 of algorithm H. By denition of parameters a max (k) and l max (k) schedule S SP T guarantees bound (12) if A > a max (k) or B B > l max (k). For the following analysis of step 2 we may thus restrict attention to those situations where the following two conditions hold: A a max (k), (13) B B l max (k). (14) Notice that bound (12) is identical with the bound presented in Corollary 1 for schedule S k. Hence, if we show that under conditions (13) and (14) schedule S k or a better schedule is found in step 2 we are done. Suppose rst that l max (k) + k B and thus Q = N. If B k then schedule S k exists. Because we obviously have Z k N, algorithm H nds set Z k in the k-th passage of the outer loop of step 2 and thus generates schedule S k. Using Corollary 1 we have that bound (12) holds. Now assume that B < k. In this case algorithm H nds set Z B = B in the passage q = B of the outer loop of step 2 and thus generates an optimal schedule. In the following we may assume that l max (k) + k < B, (15) and thus Q N. Suppose rst that B k and schedule S k exists. If we show that one of the tentative sets Z generated in the inner loop of step 2 is set Z k, then we have shown that schedule S k is found by the algorithm. This task is obviously accomplished if we show that Z k Q holds. Aiming for contradiction suppose that Z k Q does not hold. Then, at least one of the last k positions before the hole in schedule S is taken by a job of set N \ Q. We want to demonstrate that under this condition a minimum number of jobs in set X is processed after the hole in the optimal schedule. Thus, assume 10

11 that as many jobs of set N \ Q as possible are processed before the hole. This is the case if J[i] = J [i],ssp T, i = 1,..., B l max (k) k = B k + 1. This implies that B B = l max (k) + 1, a contradiction to (14). Finally, suppose that B < k. Using (15) this implies l max (k) + B < B, again a contradiction to (14). The time complexity of step 1 of algorithm H is O(n log n). Step 2 of algorithm H is only carried out if A a max (k). As parameters l max (k) and a max (k) are constant for a given k, the number of jobs in set Q is constant as well. Hence, the number of tentative schedules enumerated in step 2 is constant. Each tentative schedule can be generated in O(n log n) time. Thus, the running time of algorithm H for a given k is O(n log n). 3 Computational experiment The previous section dealt with the theoretical worst-case behaviour of algorithm H. In this section we want to quantify the error and computation time of algorithm H using experimental analysis and draw a comparison to the algorithms SPT and MSPT. The data set for the experiment was generated almost in the same way as the data set for the experiment presented in [6]. Job processing times were random integers from a uniform distribution [1, 100]. The number n of jobs in an instance ranged from 10 to The start time of the hole was set to a percentage Rperc of the sum of the processing times in an instance, i.e. we set s = Rperc j N p j where Rperc {0.1, 0.3, 0.5, 0.7, 0.9}. The hole length was set to the average processing time of the instance, i.e. = j N p j /n. For each pair of the parameters n and Rperc ten instances were generated. The algorithms were implemented in the programming language Tcl and the experiment was run on an AMD Duron/1200 MHz personal computer. Algorithm H was tested with the accuracy parameter value k = 3. According to Table 1 the performance guarantee with this setting is 10.21%. Table 2 lists the mean (ME) and worst (WE) relative errors of the algorithms SPT, MSPT and H depending on the number of jobs. All values are percent deviations from the minimal ow-time C. The minimal ow-time was computed using the dynamic programming algorithm presented in [5]. We see that the mean and worst errors of algorithm H are very low (0.31% and 3.18% deviation from C, respectively). Algorithm H improves the SPT results distinctly. On average the mean error of algorithm H is 50% of the mean SPT error (0.31% above C in comparison to 0.62% above C ). This result is astonishing if we 11

12 Table 2: Mean (ME) and worst (WE) percent deviations of algorithms SPT, MSPT and H from the minimal ow-time. n ME(SPT) WE(SPT) ME(MSPT) WE(MSPT) ME(H) WE(H) average take into account that for 52% of the test instances the abort condition A > a max (k) held, i.e. for these instances the algorithm stopped after generating the SPT schedule. The overall average computation time of algorithm H is only 0.8 seconds. For those instances where the abort condition did not hold and step 2 was carried out, the average computation time was 1.7 seconds. The maximum computation time was 9.7 seconds. Taking into account that we used a relatively slow interpreted programming language for the experiment and that our implementation of the algorithm was not optimized we conclude that algorithm H is quite fast and superior to the SPT algorithm unless extreme computation speed is of vital importance. The results in Table 2 also show that algorithm H (for k = 3) is outperformed by algorithm MSPT for instances with n 30 with respect to average and worst solution quality. For the smaller instances algorithm H achieves better results than algorithm MSPT. On average the mean error of the MSPT algorithm is only 11% of the mean SPT error (0.07% above C in comparison to 0.62% above C ). We refrain from reporting computation times for the MSPT algorithm and comparing them to those of algorithm H because our implementations of the algorithms were not optimized. Taking into account the computational experiments reported in [5] it is likely that algorithm MSPT is faster than algorithm H (for k = 3). We conclude that algorithm H (for k = 3) achieves a better 12

13 solution quality than algorithm MSPT for problem instances with n 20 while algorithm MSPT outperforms algorithm H for the larger problem instances. Sad et al. report in [6] that parameter Rperc has a distinct inuence on the performance of the MSPT algorithm. The mean errors increased as Rperc was increased from to 0.5. Our experiment conrms this result for Rperc values between 0.1 and 0.5. However, as Rperc is further increased (values 0.7 and 0.9) the mean error decreases again. The mean errors for algorithm H decreases from 0.66% to 0.002% as Rperc is increased from 0.1 to Summary We investigated the problem of minimizing the sum of the job completion times on a single machine which is not available during a given time interval. The best known approximation algorithm for this problem, the MSPT algorithm, has a relative worst-case error bound of 17.6%. We presented a parametric O(n log n)-algorithm H with which better worst-case error bounds can be obtained. The best error bound calculated for the algorithm in the paper is 7.4%. In a computational experiment algorithm H was tested exemplarily with a performance guarantee setting of 10.2%. It turned out that instances with up to 1000 jobs were solved with a mean (maximum) error of 0.31% (3.18%) and a mean (maximum) computation time of 0.8 (9.7) seconds. In the experiment algorithm H outperformed the MSPT algorithm with respect to mean and worst error for problem instances with at most 20 jobs. References [1] I. Adiri, J. Bruno, E. Frostig, A.H.G. Rinnooy Kan, Single machine ow-time scheduling with a single breakdown, Acta Informatica 26 (1989) [2] O. Braun, J. Breit, G. Schmidt, Deterministic machine scheduling with limited machine availability, discussion paper B0403 (2004), Department of Economics, University of Saarland. [3] C.-Y. Lee, Machine scheduling with availability constraints, in: J.Y.-T. Leung (Ed.), Handbook of Scheduling, CRC Press, 2004,

14 [4] C.-Y. Lee, S.D. Liman, Single machine ow-time scheduling with scheduled maintenance, Acta Informatica 29 (1992) [5] C. Sad, B. Penz, C. Rapine, A dynamic programming algorithm for the single machine total completion time scheduling problem with availability, 8th International Workshop on Project Management and Scheduling - PMS, Valencia, Spain, (2002) [6] C. Sad, B. Penz, C. Rapine, J. Bªaºewicz, P. Formanowicz, An improved approximation algorithm for the single machine total completion time scheduling problem with availability constraints, European Journal of Operational Research 161 (2005) 310. [7] G. Schmidt, Scheduling with limited machine availability, European Journal of Operational Research 121 (2000) 115. Acknowledgements The author would like to express his gratitude to Dr. Chérif Sad and two anonymous referees for many constructive comments and hints which helped improve the paper. 14

Completion Time Scheduling and the WSRPT Algorithm

Completion Time Scheduling and the WSRPT Algorithm Completion Time Scheduling and the WSRPT Algorithm Bo Xiong, Christine Chung Department of Computer Science, Connecticut College, New London, CT {bxiong,cchung}@conncoll.edu Abstract. We consider the online

More information

Approximability of Two-Machine No-Wait Flowshop Scheduling with Availability Constraints

Approximability of Two-Machine No-Wait Flowshop Scheduling with Availability Constraints Approximability of Two-Machine No-Wait Flowshop Scheduling with Availability Constraints T.C. Edwin Cheng 1, and Zhaohui Liu 1,2 1 Department of Management, The Hong Kong Polytechnic University Kowloon,

More information

An improved on-line algorithm for scheduling on two unrestrictive parallel batch processing machines

An improved on-line algorithm for scheduling on two unrestrictive parallel batch processing machines This is the Pre-Published Version. An improved on-line algorithm for scheduling on two unrestrictive parallel batch processing machines Q.Q. Nong, T.C.E. Cheng, C.T. Ng Department of Mathematics, Ocean

More information

36 CHAPTER 1. LIMITS AND CONTINUITY. Figure 1.17: At which points is f not continuous?

36 CHAPTER 1. LIMITS AND CONTINUITY. Figure 1.17: At which points is f not continuous? 36 CHAPTER 1. LIMITS AND CONTINUITY 1.3 Continuity Before Calculus became clearly de ned, continuity meant that one could draw the graph of a function without having to lift the pen and pencil. While this

More information

An example of a computable

An example of a computable An example of a computable absolutely normal number Verónica Becher Santiago Figueira Abstract The first example of an absolutely normal number was given by Sierpinski in 96, twenty years before the concept

More information

Minimizing the Number of Machines in a Unit-Time Scheduling Problem

Minimizing the Number of Machines in a Unit-Time Scheduling Problem Minimizing the Number of Machines in a Unit-Time Scheduling Problem Svetlana A. Kravchenko 1 United Institute of Informatics Problems, Surganova St. 6, 220012 Minsk, Belarus kravch@newman.bas-net.by Frank

More information

Classification - Examples

Classification - Examples Lecture 2 Scheduling 1 Classification - Examples 1 r j C max given: n jobs with processing times p 1,...,p n and release dates r 1,...,r n jobs have to be scheduled without preemption on one machine taking

More information

Stiffie's On Line Scheduling Algorithm

Stiffie's On Line Scheduling Algorithm A class of on-line scheduling algorithms to minimize total completion time X. Lu R.A. Sitters L. Stougie Abstract We consider the problem of scheduling jobs on-line on a single machine and on identical

More information

Single machine parallel batch scheduling with unbounded capacity

Single machine parallel batch scheduling with unbounded capacity Workshop on Combinatorics and Graph Theory 21th, April, 2006 Nankai University Single machine parallel batch scheduling with unbounded capacity Yuan Jinjiang Department of mathematics, Zhengzhou University

More information

1 if 1 x 0 1 if 0 x 1

1 if 1 x 0 1 if 0 x 1 Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or

More information

Scheduling Single Machine Scheduling. Tim Nieberg

Scheduling Single Machine Scheduling. Tim Nieberg Scheduling Single Machine Scheduling Tim Nieberg Single machine models Observation: for non-preemptive problems and regular objectives, a sequence in which the jobs are processed is sufficient to describe

More information

List Scheduling in Order of α-points on a Single Machine

List Scheduling in Order of α-points on a Single Machine List Scheduling in Order of α-points on a Single Machine Martin Skutella Fachbereich Mathematik, Universität Dortmund, D 4422 Dortmund, Germany martin.skutella@uni-dortmund.de http://www.mathematik.uni-dortmund.de/

More information

How To Find An Optimal Search Protocol For An Oblivious Cell

How To Find An Optimal Search Protocol For An Oblivious Cell The Conference Call Search Problem in Wireless Networks Leah Epstein 1, and Asaf Levin 2 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. lea@math.haifa.ac.il 2 Department of Statistics,

More information

14.1 Rent-or-buy problem

14.1 Rent-or-buy problem CS787: Advanced Algorithms Lecture 14: Online algorithms We now shift focus to a different kind of algorithmic problem where we need to perform some optimization without knowing the input in advance. Algorithms

More information

Why? A central concept in Computer Science. Algorithms are ubiquitous.

Why? A central concept in Computer Science. Algorithms are ubiquitous. Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online

More information

Fairness in Routing and Load Balancing

Fairness in Routing and Load Balancing Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria

More information

Mathematical Induction

Mathematical Induction Mathematical Induction (Handout March 8, 01) The Principle of Mathematical Induction provides a means to prove infinitely many statements all at once The principle is logical rather than strictly mathematical,

More information

8 Divisibility and prime numbers

8 Divisibility and prime numbers 8 Divisibility and prime numbers 8.1 Divisibility In this short section we extend the concept of a multiple from the natural numbers to the integers. We also summarize several other terms that express

More information

Lecture 3: Finding integer solutions to systems of linear equations

Lecture 3: Finding integer solutions to systems of linear equations Lecture 3: Finding integer solutions to systems of linear equations Algorithmic Number Theory (Fall 2014) Rutgers University Swastik Kopparty Scribe: Abhishek Bhrushundi 1 Overview The goal of this lecture

More information

4. Continuous Random Variables, the Pareto and Normal Distributions

4. Continuous Random Variables, the Pareto and Normal Distributions 4. Continuous Random Variables, the Pareto and Normal Distributions A continuous random variable X can take any value in a given range (e.g. height, weight, age). The distribution of a continuous random

More information

SCORE SETS IN ORIENTED GRAPHS

SCORE SETS IN ORIENTED GRAPHS Applicable Analysis and Discrete Mathematics, 2 (2008), 107 113. Available electronically at http://pefmath.etf.bg.ac.yu SCORE SETS IN ORIENTED GRAPHS S. Pirzada, T. A. Naikoo The score of a vertex v in

More information

Row Echelon Form and Reduced Row Echelon Form

Row Echelon Form and Reduced Row Echelon Form These notes closely follow the presentation of the material given in David C Lay s textbook Linear Algebra and its Applications (3rd edition) These notes are intended primarily for in-class presentation

More information

Continued Fractions and the Euclidean Algorithm

Continued Fractions and the Euclidean Algorithm Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction

More information

HOMEWORK 5 SOLUTIONS. n!f n (1) lim. ln x n! + xn x. 1 = G n 1 (x). (2) k + 1 n. (n 1)!

HOMEWORK 5 SOLUTIONS. n!f n (1) lim. ln x n! + xn x. 1 = G n 1 (x). (2) k + 1 n. (n 1)! Math 7 Fall 205 HOMEWORK 5 SOLUTIONS Problem. 2008 B2 Let F 0 x = ln x. For n 0 and x > 0, let F n+ x = 0 F ntdt. Evaluate n!f n lim n ln n. By directly computing F n x for small n s, we obtain the following

More information

MATH10040 Chapter 2: Prime and relatively prime numbers

MATH10040 Chapter 2: Prime and relatively prime numbers MATH10040 Chapter 2: Prime and relatively prime numbers Recall the basic definition: 1. Prime numbers Definition 1.1. Recall that a positive integer is said to be prime if it has precisely two positive

More information

3 Some Integer Functions

3 Some Integer Functions 3 Some Integer Functions A Pair of Fundamental Integer Functions The integer function that is the heart of this section is the modulo function. However, before getting to it, let us look at some very simple

More information

Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 2

Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 2 CS 70 Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 2 Proofs Intuitively, the concept of proof should already be familiar We all like to assert things, and few of us

More information

The Prime Numbers. Definition. A prime number is a positive integer with exactly two positive divisors.

The Prime Numbers. Definition. A prime number is a positive integer with exactly two positive divisors. The Prime Numbers Before starting our study of primes, we record the following important lemma. Recall that integers a, b are said to be relatively prime if gcd(a, b) = 1. Lemma (Euclid s Lemma). If gcd(a,

More information

The Mean Value Theorem

The Mean Value Theorem The Mean Value Theorem THEOREM (The Extreme Value Theorem): If f is continuous on a closed interval [a, b], then f attains an absolute maximum value f(c) and an absolute minimum value f(d) at some numbers

More information

Tiers, Preference Similarity, and the Limits on Stable Partners

Tiers, Preference Similarity, and the Limits on Stable Partners Tiers, Preference Similarity, and the Limits on Stable Partners KANDORI, Michihiro, KOJIMA, Fuhito, and YASUDA, Yosuke February 7, 2010 Preliminary and incomplete. Do not circulate. Abstract We consider

More information

Lecture 2: Universality

Lecture 2: Universality CS 710: Complexity Theory 1/21/2010 Lecture 2: Universality Instructor: Dieter van Melkebeek Scribe: Tyson Williams In this lecture, we introduce the notion of a universal machine, develop efficient universal

More information

Dynamic TCP Acknowledgement: Penalizing Long Delays

Dynamic TCP Acknowledgement: Penalizing Long Delays Dynamic TCP Acknowledgement: Penalizing Long Delays Karousatou Christina Network Algorithms June 8, 2010 Karousatou Christina (Network Algorithms) Dynamic TCP Acknowledgement June 8, 2010 1 / 63 Layout

More information

Two-Job Shop Scheduling Problems with Availability Constraints

Two-Job Shop Scheduling Problems with Availability Constraints rom: ICAPS- Proceedings. Copyright, AAAI (www.aaai.org). All rights reserved. Two-Job Shop Scheduling Problems with Availability Constraints Riad Aggoune Laboratoire des Technologies Industrielles Centre

More information

Chapter 3. Cartesian Products and Relations. 3.1 Cartesian Products

Chapter 3. Cartesian Products and Relations. 3.1 Cartesian Products Chapter 3 Cartesian Products and Relations The material in this chapter is the first real encounter with abstraction. Relations are very general thing they are a special type of subset. After introducing

More information

Pricing of Limit Orders in the Electronic Security Trading System Xetra

Pricing of Limit Orders in the Electronic Security Trading System Xetra Pricing of Limit Orders in the Electronic Security Trading System Xetra Li Xihao Bielefeld Graduate School of Economics and Management Bielefeld University, P.O. Box 100 131 D-33501 Bielefeld, Germany

More information

The power of -points in preemptive single machine scheduling

The power of -points in preemptive single machine scheduling JOURNAL OF SCHEDULING J. Sched. 22; 5:121 133 (DOI: 1.12/jos.93) The power of -points in preemptive single machine scheduling Andreas S. Schulz 1; 2; ; and Martin Skutella 1 Massachusetts Institute of

More information

3. Mathematical Induction

3. Mathematical Induction 3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)

More information

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one

More information

Near Optimal Solutions

Near Optimal Solutions Near Optimal Solutions Many important optimization problems are lacking efficient solutions. NP-Complete problems unlikely to have polynomial time solutions. Good heuristics important for such problems.

More information

On the largest prime factor of x 2 1

On the largest prime factor of x 2 1 On the largest prime factor of x 2 1 Florian Luca and Filip Najman Abstract In this paper, we find all integers x such that x 2 1 has only prime factors smaller than 100. This gives some interesting numerical

More information

NP-Completeness and Cook s Theorem

NP-Completeness and Cook s Theorem NP-Completeness and Cook s Theorem Lecture notes for COM3412 Logic and Computation 15th January 2002 1 NP decision problems The decision problem D L for a formal language L Σ is the computational task:

More information

Mechanisms for Fair Attribution

Mechanisms for Fair Attribution Mechanisms for Fair Attribution Eric Balkanski Yaron Singer Abstract We propose a new framework for optimization under fairness constraints. The problems we consider model procurement where the goal is

More information

Math Circle Beginners Group October 18, 2015

Math Circle Beginners Group October 18, 2015 Math Circle Beginners Group October 18, 2015 Warm-up problem 1. Let n be a (positive) integer. Prove that if n 2 is odd, then n is also odd. (Hint: Use a proof by contradiction.) Suppose that n 2 is odd

More information

arxiv:1112.0829v1 [math.pr] 5 Dec 2011

arxiv:1112.0829v1 [math.pr] 5 Dec 2011 How Not to Win a Million Dollars: A Counterexample to a Conjecture of L. Breiman Thomas P. Hayes arxiv:1112.0829v1 [math.pr] 5 Dec 2011 Abstract Consider a gambling game in which we are allowed to repeatedly

More information

Real-Time Scheduling (Part 1) (Working Draft) Real-Time System Example

Real-Time Scheduling (Part 1) (Working Draft) Real-Time System Example Real-Time Scheduling (Part 1) (Working Draft) Insup Lee Department of Computer and Information Science School of Engineering and Applied Science University of Pennsylvania www.cis.upenn.edu/~lee/ CIS 41,

More information

Scheduling Jobs and Preventive Maintenance Activities on Parallel Machines

Scheduling Jobs and Preventive Maintenance Activities on Parallel Machines Scheduling Jobs and Preventive Maintenance Activities on Parallel Machines Maher Rebai University of Technology of Troyes Department of Industrial Systems 12 rue Marie Curie, 10000 Troyes France maher.rebai@utt.fr

More information

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013 FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,

More information

A Constant-Approximate Feasibility Test for Multiprocessor Real-Time Scheduling

A Constant-Approximate Feasibility Test for Multiprocessor Real-Time Scheduling Algorithmica manuscript No. (will be inserted by the editor) A Constant-Approximate Feasibility Test for Multiprocessor Real-Time Scheduling Vincenzo Bonifaci Alberto Marchetti-Spaccamela Sebastian Stiller

More information

11 Multivariate Polynomials

11 Multivariate Polynomials CS 487: Intro. to Symbolic Computation Winter 2009: M. Giesbrecht Script 11 Page 1 (These lecture notes were prepared and presented by Dan Roche.) 11 Multivariate Polynomials References: MC: Section 16.6

More information

Some Polynomial Theorems. John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 rkennedy@ix.netcom.

Some Polynomial Theorems. John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 rkennedy@ix.netcom. Some Polynomial Theorems by John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 rkennedy@ix.netcom.com This paper contains a collection of 31 theorems, lemmas,

More information

Applied Algorithm Design Lecture 5

Applied Algorithm Design Lecture 5 Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design

More information

FEGYVERNEKI SÁNDOR, PROBABILITY THEORY AND MATHEmATICAL

FEGYVERNEKI SÁNDOR, PROBABILITY THEORY AND MATHEmATICAL FEGYVERNEKI SÁNDOR, PROBABILITY THEORY AND MATHEmATICAL STATIsTICs 4 IV. RANDOm VECTORs 1. JOINTLY DIsTRIBUTED RANDOm VARIABLEs If are two rom variables defined on the same sample space we define the joint

More information

Research Article Batch Scheduling on Two-Machine Flowshop with Machine-Dependent Setup Times

Research Article Batch Scheduling on Two-Machine Flowshop with Machine-Dependent Setup Times Hindawi Publishing Corporation Advances in Operations Research Volume 2009, Article ID 153910, 10 pages doi:10.1155/2009/153910 Research Article Batch Scheduling on Two-Machine Flowshop with Machine-Dependent

More information

Ph.D. Thesis. Judit Nagy-György. Supervisor: Péter Hajnal Associate Professor

Ph.D. Thesis. Judit Nagy-György. Supervisor: Péter Hajnal Associate Professor Online algorithms for combinatorial problems Ph.D. Thesis by Judit Nagy-György Supervisor: Péter Hajnal Associate Professor Doctoral School in Mathematics and Computer Science University of Szeged Bolyai

More information

Duplicating and its Applications in Batch Scheduling

Duplicating and its Applications in Batch Scheduling Duplicating and its Applications in Batch Scheduling Yuzhong Zhang 1 Chunsong Bai 1 Shouyang Wang 2 1 College of Operations Research and Management Sciences Qufu Normal University, Shandong 276826, China

More information

n k=1 k=0 1/k! = e. Example 6.4. The series 1/k 2 converges in R. Indeed, if s n = n then k=1 1/k, then s 2n s n = 1 n + 1 +...

n k=1 k=0 1/k! = e. Example 6.4. The series 1/k 2 converges in R. Indeed, if s n = n then k=1 1/k, then s 2n s n = 1 n + 1 +... 6 Series We call a normed space (X, ) a Banach space provided that every Cauchy sequence (x n ) in X converges. For example, R with the norm = is an example of Banach space. Now let (x n ) be a sequence

More information

Primality - Factorization

Primality - Factorization Primality - Factorization Christophe Ritzenthaler November 9, 2009 1 Prime and factorization Definition 1.1. An integer p > 1 is called a prime number (nombre premier) if it has only 1 and p as divisors.

More information

JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004

JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004 Scientiae Mathematicae Japonicae Online, Vol. 10, (2004), 431 437 431 JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS Ondřej Čepeka and Shao Chin Sung b Received December May 12, 2003; revised February

More information

How To Know If A Domain Is Unique In An Octempo (Euclidean) Or Not (Ecl)

How To Know If A Domain Is Unique In An Octempo (Euclidean) Or Not (Ecl) Subsets of Euclidean domains possessing a unique division algorithm Andrew D. Lewis 2009/03/16 Abstract Subsets of a Euclidean domain are characterised with the following objectives: (1) ensuring uniqueness

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm. Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three

More information

Algorithm Design and Analysis

Algorithm Design and Analysis Algorithm Design and Analysis LECTURE 27 Approximation Algorithms Load Balancing Weighted Vertex Cover Reminder: Fill out SRTEs online Don t forget to click submit Sofya Raskhodnikova 12/6/2011 S. Raskhodnikova;

More information

Scheduling Parallel Jobs with Monotone Speedup 1

Scheduling Parallel Jobs with Monotone Speedup 1 Scheduling Parallel Jobs with Monotone Speedup 1 Alexander Grigoriev, Marc Uetz Maastricht University, Quantitative Economics, P.O.Box 616, 6200 MD Maastricht, The Netherlands, {a.grigoriev@ke.unimaas.nl,

More information

Scheduling Shop Scheduling. Tim Nieberg

Scheduling Shop Scheduling. Tim Nieberg Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm. Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of

More information

Mathematical Induction. Mary Barnes Sue Gordon

Mathematical Induction. Mary Barnes Sue Gordon Mathematics Learning Centre Mathematical Induction Mary Barnes Sue Gordon c 1987 University of Sydney Contents 1 Mathematical Induction 1 1.1 Why do we need proof by induction?.... 1 1. What is proof by

More information

Lecture 1: Course overview, circuits, and formulas

Lecture 1: Course overview, circuits, and formulas Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik

More information

A Sublinear Bipartiteness Tester for Bounded Degree Graphs

A Sublinear Bipartiteness Tester for Bounded Degree Graphs A Sublinear Bipartiteness Tester for Bounded Degree Graphs Oded Goldreich Dana Ron February 5, 1998 Abstract We present a sublinear-time algorithm for testing whether a bounded degree graph is bipartite

More information

So let us begin our quest to find the holy grail of real analysis.

So let us begin our quest to find the holy grail of real analysis. 1 Section 5.2 The Complete Ordered Field: Purpose of Section We present an axiomatic description of the real numbers as a complete ordered field. The axioms which describe the arithmetic of the real numbers

More information

a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2.

a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2. Chapter 1 LINEAR EQUATIONS 1.1 Introduction to linear equations A linear equation in n unknowns x 1, x,, x n is an equation of the form a 1 x 1 + a x + + a n x n = b, where a 1, a,..., a n, b are given

More information

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples

More information

Clustering and scheduling maintenance tasks over time

Clustering and scheduling maintenance tasks over time Clustering and scheduling maintenance tasks over time Per Kreuger 2008-04-29 SICS Technical Report T2008:09 Abstract We report results on a maintenance scheduling problem. The problem consists of allocating

More information

1. Prove that the empty set is a subset of every set.

1. Prove that the empty set is a subset of every set. 1. Prove that the empty set is a subset of every set. Basic Topology Written by Men-Gen Tsai email: b89902089@ntu.edu.tw Proof: For any element x of the empty set, x is also an element of every set since

More information

Math 319 Problem Set #3 Solution 21 February 2002

Math 319 Problem Set #3 Solution 21 February 2002 Math 319 Problem Set #3 Solution 21 February 2002 1. ( 2.1, problem 15) Find integers a 1, a 2, a 3, a 4, a 5 such that every integer x satisfies at least one of the congruences x a 1 (mod 2), x a 2 (mod

More information

Exact Nonparametric Tests for Comparing Means - A Personal Summary

Exact Nonparametric Tests for Comparing Means - A Personal Summary Exact Nonparametric Tests for Comparing Means - A Personal Summary Karl H. Schlag European University Institute 1 December 14, 2006 1 Economics Department, European University Institute. Via della Piazzuola

More information

The Fundamental Theorem of Arithmetic

The Fundamental Theorem of Arithmetic The Fundamental Theorem of Arithmetic 1 Introduction: Why this theorem? Why this proof? One of the purposes of this course 1 is to train you in the methods mathematicians use to prove mathematical statements,

More information

Triangle deletion. Ernie Croot. February 3, 2010

Triangle deletion. Ernie Croot. February 3, 2010 Triangle deletion Ernie Croot February 3, 2010 1 Introduction The purpose of this note is to give an intuitive outline of the triangle deletion theorem of Ruzsa and Szemerédi, which says that if G = (V,

More information

Abstract Title: Planned Preemption for Flexible Resource Constrained Project Scheduling

Abstract Title: Planned Preemption for Flexible Resource Constrained Project Scheduling Abstract number: 015-0551 Abstract Title: Planned Preemption for Flexible Resource Constrained Project Scheduling Karuna Jain and Kanchan Joshi Shailesh J. Mehta School of Management, Indian Institute

More information

Scheduling Parallel Jobs with Linear Speedup

Scheduling Parallel Jobs with Linear Speedup Scheduling Parallel Jobs with Linear Speedup Alexander Grigoriev and Marc Uetz Maastricht University, Quantitative Economics, P.O.Box 616, 6200 MD Maastricht, The Netherlands. Email: {a.grigoriev,m.uetz}@ke.unimaas.nl

More information

BANACH AND HILBERT SPACE REVIEW

BANACH AND HILBERT SPACE REVIEW BANACH AND HILBET SPACE EVIEW CHISTOPHE HEIL These notes will briefly review some basic concepts related to the theory of Banach and Hilbert spaces. We are not trying to give a complete development, but

More information

TAKE-AWAY GAMES. ALLEN J. SCHWENK California Institute of Technology, Pasadena, California INTRODUCTION

TAKE-AWAY GAMES. ALLEN J. SCHWENK California Institute of Technology, Pasadena, California INTRODUCTION TAKE-AWAY GAMES ALLEN J. SCHWENK California Institute of Technology, Pasadena, California L INTRODUCTION Several games of Tf take-away?f have become popular. The purpose of this paper is to determine the

More information

8 Primes and Modular Arithmetic

8 Primes and Modular Arithmetic 8 Primes and Modular Arithmetic 8.1 Primes and Factors Over two millennia ago already, people all over the world were considering the properties of numbers. One of the simplest concepts is prime numbers.

More information

Offline sorting buffers on Line

Offline sorting buffers on Line Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: rkhandekar@gmail.com 2 IBM India Research Lab, New Delhi. email: pvinayak@in.ibm.com

More information

Algebraic and Transcendental Numbers

Algebraic and Transcendental Numbers Pondicherry University July 2000 Algebraic and Transcendental Numbers Stéphane Fischler This text is meant to be an introduction to algebraic and transcendental numbers. For a detailed (though elementary)

More information

CHAPTER 3. Methods of Proofs. 1. Logical Arguments and Formal Proofs

CHAPTER 3. Methods of Proofs. 1. Logical Arguments and Formal Proofs CHAPTER 3 Methods of Proofs 1. Logical Arguments and Formal Proofs 1.1. Basic Terminology. An axiom is a statement that is given to be true. A rule of inference is a logical rule that is used to deduce

More information

Math 4310 Handout - Quotient Vector Spaces

Math 4310 Handout - Quotient Vector Spaces Math 4310 Handout - Quotient Vector Spaces Dan Collins The textbook defines a subspace of a vector space in Chapter 4, but it avoids ever discussing the notion of a quotient space. This is understandable

More information

LEARNING OBJECTIVES FOR THIS CHAPTER

LEARNING OBJECTIVES FOR THIS CHAPTER CHAPTER 2 American mathematician Paul Halmos (1916 2006), who in 1942 published the first modern linear algebra book. The title of Halmos s book was the same as the title of this chapter. Finite-Dimensional

More information

7.6 Approximation Errors and Simpson's Rule

7.6 Approximation Errors and Simpson's Rule WileyPLUS: Home Help Contact us Logout Hughes-Hallett, Calculus: Single and Multivariable, 4/e Calculus I, II, and Vector Calculus Reading content Integration 7.1. Integration by Substitution 7.2. Integration

More information

Elementary Number Theory and Methods of Proof. CSE 215, Foundations of Computer Science Stony Brook University http://www.cs.stonybrook.

Elementary Number Theory and Methods of Proof. CSE 215, Foundations of Computer Science Stony Brook University http://www.cs.stonybrook. Elementary Number Theory and Methods of Proof CSE 215, Foundations of Computer Science Stony Brook University http://www.cs.stonybrook.edu/~cse215 1 Number theory Properties: 2 Properties of integers (whole

More information

The Goldberg Rao Algorithm for the Maximum Flow Problem

The Goldberg Rao Algorithm for the Maximum Flow Problem The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }

More information

Notes from Week 1: Algorithms for sequential prediction

Notes from Week 1: Algorithms for sequential prediction CS 683 Learning, Games, and Electronic Markets Spring 2007 Notes from Week 1: Algorithms for sequential prediction Instructor: Robert Kleinberg 22-26 Jan 2007 1 Introduction In this course we will be looking

More information

Follow links for Class Use and other Permissions. For more information send email to: permissions@pupress.princeton.edu

Follow links for Class Use and other Permissions. For more information send email to: permissions@pupress.princeton.edu COPYRIGHT NOTICE: Ariel Rubinstein: Lecture Notes in Microeconomic Theory is published by Princeton University Press and copyrighted, c 2006, by Princeton University Press. All rights reserved. No part

More information

Batch Scheduling of Deteriorating Products

Batch Scheduling of Deteriorating Products Decision Making in Manufacturing and Services Vol. 1 2007 No. 1 2 pp. 25 34 Batch Scheduling of Deteriorating Products Maksim S. Barketau, T.C. Edwin Cheng, Mikhail Y. Kovalyov, C.T. Daniel Ng Abstract.

More information

Online Adwords Allocation

Online Adwords Allocation Online Adwords Allocation Shoshana Neuburger May 6, 2009 1 Overview Many search engines auction the advertising space alongside search results. When Google interviewed Amin Saberi in 2004, their advertisement

More information

Predict the Popularity of YouTube Videos Using Early View Data

Predict the Popularity of YouTube Videos Using Early View Data 000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050

More information

On-line machine scheduling with batch setups

On-line machine scheduling with batch setups On-line machine scheduling with batch setups Lele Zhang, Andrew Wirth Department of Mechanical Engineering The University of Melbourne, VIC 3010, Australia Abstract We study a class of scheduling problems

More information

Load balancing of temporary tasks in the l p norm

Load balancing of temporary tasks in the l p norm Load balancing of temporary tasks in the l p norm Yossi Azar a,1, Amir Epstein a,2, Leah Epstein b,3 a School of Computer Science, Tel Aviv University, Tel Aviv, Israel. b School of Computer Science, The

More information

Regular Languages and Finite Automata

Regular Languages and Finite Automata Regular Languages and Finite Automata 1 Introduction Hing Leung Department of Computer Science New Mexico State University Sep 16, 2010 In 1943, McCulloch and Pitts [4] published a pioneering work on a

More information

Systems of Linear Equations

Systems of Linear Equations Systems of Linear Equations Beifang Chen Systems of linear equations Linear systems A linear equation in variables x, x,, x n is an equation of the form a x + a x + + a n x n = b, where a, a,, a n and

More information

This unit will lay the groundwork for later units where the students will extend this knowledge to quadratic and exponential functions.

This unit will lay the groundwork for later units where the students will extend this knowledge to quadratic and exponential functions. Algebra I Overview View unit yearlong overview here Many of the concepts presented in Algebra I are progressions of concepts that were introduced in grades 6 through 8. The content presented in this course

More information

Binary Adders: Half Adders and Full Adders

Binary Adders: Half Adders and Full Adders Binary Adders: Half Adders and Full Adders In this set of slides, we present the two basic types of adders: 1. Half adders, and 2. Full adders. Each type of adder functions to add two binary bits. In order

More information