The main objective is to maximize the throughput of the traffic.

Size: px
Start display at page:

Download "The main objective is to maximize the throughput of the traffic."

Transcription

1 Chater 7 Flow Problem 7. Introduction and definition Problem related to tranort have been invetigated ince the early fiftie. The roblem i to route ome good, called commoditie, from roduction ite to conumtion ite, through a network coniting of communication link inter-connecting the ite (ie-line, route, telecommunication network). Moreover, each link ha a maximum admiible throughut, called the caacity of the link. In general, mot of the ite of the network do not roduce nor conume anything, they are only ued to interconnect link. To each roduction or conumtion ite i aociated ome real number that correond to the maximum roduction or conumtion. The main objective i to maximize the throughut of the traffic. We firt conider network with directed link, i.e., that can be ued in one direction. Formally, a flow network i defined a follow. Definition 7. (Flow network). A flow network i a four-tule (G, r max,co max,c) uch that: G i a digrah (or a mulitdigrah), the vertice of which rereent the ite and the arc rereent the link; r max i a function from V (G) to IR + + ; r max (v) correond to the maximum roduction oible in v. If v i not a roduction ite, then r max (v)=0. co max i a function from V (G) to IR + + ; co max (v) correond to the maximum conumtion oible in v. If v i not a conumtion ite, then co max (v)=0. c i a function from E(G) to IR + + ; c(e) correond to the caacity of the link e. Definition 7. (Flow). The flow i a trile F =(r,co, f ) where - r i a function of roduction uch that, for any vertex v, 0 r(v) r max (v); 9

2 9 CHAPTER 7. FLOW PROBLEMS - co i a function of conumtion uch that, for any vertex v, 0 co(v) co max (v); - f i a function over E, called flow function that atifie the following contraint: Poitivity: e E(G), f (e) 0 Caacity contraint: e E(G), f (e) c(e) Flow conervation: v V (G), (u,v) E(G) f ((u,v)) + r(v)= By umming, the V (G) equation of flow conervation, we get: r(v)= co(v) v V (G) v V (G) (v,u) E(G) f ((v,u)) + co(v) In other word, the um of all roduced commoditie equal the um of all conumed commoditie. Thi value correond to the amount of routed traffic, it i the flow value, denoted by v(f). r max = r = r max = r = co 0 max = co = 0 0 r max = r = co max = co = Figure 7.: Examle of flow network (left) and a flow of value 4 in it (right) Hence, the roblem i the following: Problem 7. (Maximum Flow). Intance: a flow network N. Find: a flow with maximum value. A flow with maximum value i aid to be a maximum flow. 7. Reducing to an elementary network Before tudying thi roblem, we how that it i equivalent to conider an elementary roblem where there i a unique roduction ite with infinite maximum roduction and a unique conumtion ite with infinite maximum conumtion.

3 7.. REDUCING TO AN ELEMENTARY NETWORK 9 Definition 7.4 (Elementary network). A flow network (G,,,c) i elementary: - and are two ditinct vertice where i a ource (i. e. d ()=0) and i a ink (i.e. d + ()=0); - ()=+ and (v)=0 for all v = ; - ()=+ and (v)=0 for all v =. We denote (G,,,c) by (G,,,c). Definition 7.5 (Aociated elementary network). If N =(G, r max,co max,c) i a flow network, it aociated elementary network i the following elementary network N =(Ḡ,,, c) obtained from N in the following way: - add a ource and a ink ; - link to all vertice v with non-null roduction with an arc (,v) of caacity r max (v); - link all vertice v with non-null conumtion to with a link (v, ) of caacity co max (v); Figure 7.: Elementary network aociated to the flow network deicted in Figure 7. (right) and the flow in thi network correonding to the one of Figure 7. (left) It i eay to ee that there i a one-to-one correondence between any flow F =(r,co, f ) of the elementary network and a flow F =(r,co, f ) of the initial roblem defined a follow: for any roduction ite u, r (u)= f ((,u)); for any conumtion ite v, co (v)= f ((v, )) and for any arc (x,y), f ((x,y)) = f ((x,y)). Clearly, both flow have ame value v(f)=v(f )=r()=co(). Hence: Finding a maximum flow in a flow network i equivalent to finding a maximum flow olve in it aociated elementary network. In the following, we only conider elementary flow network.

4 94 CHAPTER 7. FLOW PROBLEMS Note that, in an (elementary) flow network N =(G,,,c), the flow conervation contraint can be written: v V (G) \{, }, (u,v) E(G) f ((u,v)) = f ((v,u)) (v,u) E(G) Moreover, a flow F =(r,co, f ) of an (elementary) flow network i well defined by the flow function f ince, by the flow conervation contraint in and, we have v(f) = r() = f ((,u)) u V (G),(,u) E(G) = co() = f ((u, )) u V (G),(u,) E(G) Therefore, for eae of reentation, we often identify a flow F with it function f, and we note the flow value by v( f ). To imlify the notation in the equel, for a flow f or a caacity c, and an arc (u,v), we write f (u, v) intead of f ((u, v)), and c(u, v) intead of c((u, v)). 7. Cut and uer bound on the maximum flow value We will how that the value of a maximum flow in a network i limited by the exitence of ome bottleneck through which the traffic mut go. Roughly, to go from the ource to the ink, the flow mut cro the border of a et of vertice, it ize (the um of the caacitie of the correonding edge) will limit the value of the flow. Such a border i called a cut. Definition 7.6 (Cut). In a flow network N =(G,,,c), an (, )-cut, or imly a cut, i a biartition C =(V,V ) of the vertice of G uch that V and V. The arc form V to V (i.e. with tail in V and head in V ) are the arc of C. Their et i denoted by E(C). The caacity of the cut C, denoted by δ(c), i the um of the caacitie of it arc: e E(C) c(e). Let f be a flow and C =(V,V ) be a cut, out( f,c) denote the flow on arc leaving V and in( f,c) the flow entering V : Note that the flow conervation imlie that out( f,c) = (u,v) E(C), u V,v V f (u,v) in( f,c) = (u,v) E(G), u V,v V f (u,v) for all cut C, v( f )=out( f,c) in( f,c) In articular, the value of the flow i alway at mot out( f,c). But clearly out( f,c) δ(c),o v( f ) δ(c). (7.)

5 7.4. AUXILIARY NETWORK AND PUSH ALGORITHM 95 V V Figure 7.: A flow network and a cut with caacity 4. Bold arc are thoe of the cut A cut can be viewed a a et of arc that the flow mut cro and whoe caacity limit the value of the flow. Let v max = max{v( f ), f a flow} and δ min = min{δ(c), C a cut}. Equation 7. alied to a maximum flow and a minimum-caacity cut yield v max δ min. (7.) In fact, the next theorem,due to Ford and Fulkeron, tate that there i equality. Theorem 7.7 (Ford & Fulkeron). The maximum value of a flow equal the minimum caacity of a cut, i.e., v max = δ min. We often ay that max flow equal min cut. It i an examle of min-max theorem There are many roof of thi theorem, ome being non-contructive roof of thi theorem. In the next ection, we reent the original roof which i baed on an algorithm comuting a maximum flow and a cut with minimum caacity. 7.4 Auxiliary Network and uh Algorithm Mot of the algorithm for comuting maximum flow are baed on the following idea: Starting from an exiting flow (initially, it may be null), the flow i increaed by going from the ource to the ink by uhing the commodity where it i oible. The difference between the algorithm mainly conit of the way ued to decide where and how to uh ome flow. For thi uroe, we define an auxiliary network. Thi grah, denoted by N( f ), deend on the exiting flow f.

6 96 CHAPTER 7. FLOW PROBLEMS Definition 7.8 (Auxiliary network). Given a flow network N =(G,,,c) and a flow f, we build the auxiliary network N( f )=(G( f ),,,c f ) a follow. For any air of vertice (u,v), let c f (u,v)=c(u,v) f (u,v)+ f (v,u) with c(u,v), f (u,v) and f (v,u) equal to 0 when they are not defined (if (u,v) i not an arc of G). Note that c f (u,v) 0 ince c(u,v) f (u,v) 0. Then, G( f ) i defined a follow V (G( f )) = V (G) E(G( f )) = {(u,v) c f (u,v) > 0} Note that c f (u,v)+c f (v,u)=c(u,v)+c(v,u). Intuitively, c f (u,v) i the um of the remaining caacity on the arc (u,v), i.e., c(u,v) f (u,v), lu a virtual caacity f (v,u), that allow to remove ome flow on the arc (v,u), which correond to virtually uh ome flow along (u,v). See examle in Figure 7.4 and 7.5. Note that the auxiliary network ha no arc with caacity 0. Thi i imortant becaue it enure that, for any directed ath P in G( f ), the minimum caacity of the arc of P i oitive Flow network Flow Auxiliary network Figure 7.4: A flow network, a flow and the correonding auxiliary network Let P be a directed (, )-ath in N( f ) where the minimum caacity of an arc in P i ε > 0. The flow f obtained by uhing ε unit of flow along P i defined by: For any arc (u,v) E(P), we uh the flow along (u,v), that i, we increae the flow with ε unit on (u,v). Two cae may haen: - If the remaining caacity of (u,v) i ufficient for the ε unit of flow, i.e., f (u,v)+ε c(u,v), then f (u,v)= f (u,v)+ε and f (v,u)= f (v,u). - If the remaining caacity of (u,v) i not ufficient for the ε unit of flow, i.e., f (u,v)+ ε > c(u,v), then, by definition of the auxiliary network, we have f (v,u) f (u,v)+ε c(u,v) > 0. Hence, (v,u) ha a flow exce of f (u,v)+ε c(u,v) unit that we mut remove. We et f (u,v)=c(u,v) and f (v,u)= f (v,u) ( f (u,v)+ε)+c(u,v).

7 7.4. AUXILIARY NETWORK AND PUSH ALGORITHM 97 If (u,v) and (v,u) do not belong to P, the flow remain unchanged on thee arc, f (u,v) = f (u,v) and f (v,u)= f (v,u). Lemma 7.9. If f i a flow of value v( f ), then f i a flow of value v( f )+ε. Proof. See Exercice 7.5. For intance, from the flow deicted in Figure 7.4, by taking the directed (, )-ath deicted in Figure 7.5 with minimum caacity and uhing the flow, we obtain the new flow and the new auxiliary network deicted in Figure (, )-ath New flow New auxiliary network Figure 7.5: Puh along a directed (, )-ath of the auxiliary network in Figure 7.4. Now, we have ome element of an algorithm:. Start with any flow f ;. Comute the auxiliary network N( f );. Find a directed ath from to in G( f ); 4. If uch a directed ath P exit, then uh ome flow along P and udate f. Note that, if there i no directed ath from the ource to the ink in the auxiliary grah, the reviou algorithm doe nothing. We will ee that, in thi cae, the exiting flow i maximum. Prooition 7.0. If G( f ) doe not contain a ath from the ource to the ink, then the flow f i maximum. Proof. Let V be the et of all vertice that can be reached from in G( f ). V doe not contain the ink ince there are no (, )-ath. Hence, V = V \V. Let C be the cut (V,V ). Let (u,v) be an arc of C. By definition of V, the arc (u,v) i not in G( f ). So, by definition of G( f ), thi mean that c f (u,v)=0. Hence, f i uch that f (u,v)=c(u,v) and f (v,u)=0. We get that out( f,c)=δ(c) and in( f,c)=0. Informally, there i no flow entering V and all arc of C (that i leaving V ) are aturated.

8 98 CHAPTER 7. FLOW PROBLEMS But v( f )=out( f,c) in( f,c), therefore v( f )=δ(c) The current flow ha the ame value a the caacity of the cut C. Hence, f i maximum by Equation (7.). Note that thi roof alo exhibit a cut (V,V ) with ame caacity a the maximum value of a flow. Hence it i a minimum-caacity cut. It how that it i eay to find a minimum-caacity cut (V,V ) from a maximum flow: V i the et of the vertice reachable from the ource in the auxiliary network and V it comlement. Now, we can rove Theorem 7.7. Proof of Theorem 7.7: Let f be a flow with maximum value in a flow network (G,,,c), and let N( f ) be the auxiliary network. In G( f ), there are no directed (, )-ath, otherwie we obtain a flow with greater value by uhing ome flow along thi ath (Lemma 7.9). Hence, by the roof of Prooition 7.0, the cut C =(V,V ), where V i the et of vertice v uch that there i a directed (,v)-ath in G( f ), ha caacity v( f )=v max. Therefore, δ min δ(c) v max. 7.5 Ford-Fulkeron algorithm We now have the following algorithm: Algorithm 7. (Ford and Fulkeron (956)).. Start with null flow f = 0;. Comute the auxiliary network N( f );. Look for a directed ath from to in G( f ); 4. If uch a directed ath P exit, then uh ome flow along P, udate f and go to ; 5. Ele terminate and return f. Thi algorithm i correct in the ene that If the algorithm terminate, then it return a maximum olution. But ) doe it alway terminate? ) If it terminate, what i it comlexity?

9 7.5. FORD-FULKERSON ALGORITHM 99 The anwer to quetion i omehow ye and no: we will ee that the algorithm alway terminate if the caacitie are rational, but it can take infinite time if caacitie are real. Beide, even when the caacitie are integer, the running time deend linearly on the value of the maximum flow that may be huge. Analyi of Ford-Fulkeron Algorithm Prooition 7.. (i) If all caacitie are integer, then Algorithm 7. terminate after at mot v max earche of a directed ath. (ii) If all the caacitie are rational, then Algorithm 7. terminate after at mot µ v max earche of a directed ath, with µ the leat common multile of the denominator of the caacitie. Proof. (i) If caacitie are integer, at each iteration, the algorithm uhe at leat one unit of flow (ince, in thi cae, ε i integral). Each iteration require the earch of a ath from to in G( f ). Thi can be done in time O( E(G) ) by any earch algorithm (See Chater ). Hence, it total running time i at mot O( v max E(G) ). (ii) If caacitie are rational, the algorithm terminate ince the flow increae of at leat µ at each iteration. µ can be very large, but it i fixed. Actually, we can olve the roblem by multilying all caacitie by µ and by olving the integral roblem obtained: it i roortional the initial one. Remark 7.. If ome caacitie are integer, then the Ford-Fulkeron algorithm return a maximum flow with integral value. Prooition 7.. If the caacitie are real, the algorithm may not terminate. Moreover, the increaing equence of the flow value may converge to a value a lot maller than the otimal value. Proof. Conider the flow network hown in Figure 7.6 for which the caacitie of all edge are infinite (or if the reader refer, a huge integer M). Let α denote the oitive root of x +x = 0. Clearly / < α <. Let the initial flow f 0 be a hown in Figure 7.6. We hall rove that by emloying a well (or very badly) choen equence of four augmenting ath over and over, Algorithm 7. will roduce an infinite equence of flow, the value of which are monotone increaing and which converge to a limit not exceeding 6. For any m 0, tart from the flow f 4m and uh along the directed ath (,c,d,a,b, ). The uhed amount i α 4m+ becaue of arc (a,b) in the auxiliary network. The reulting flow i f 4m+. Puh along the directed ath (,c,b,a,d, ) an amount of α 4m+ (becaue of (c,b)) to roduce f 4m+, uh along the directed ath (,a,b,c,d, ) an amount of α 4m+ (becaue of (c,d)) to roduce

10 00 CHAPTER 7. FLOW PROBLEMS d d c c α + α b α + α b α α a a Figure 7.6: A flow network and the initial flow f 0 f 4m+ and uh along the directed ath (,a,d,c,b, ) an amount of α 4m+4 (becaue of (a,d)) to roduce f 4m+4. See Figure 7.7. For k, the augmentation of the value from f k to f k i α k and hence v( f k ) = v( f 0 )+α + α + + α r = ( + α + α )+α + α + + α r = α (α + α + α + α + α + + α r+ ) = α (α + α +( α)+α + α + + α r+ ) = α ( + α + α + + α r+ ) < α ( + α + α + α + + α r+ ) < α α = α 4 < 6. From thi contruction, it i eay to contruct an examle of a network where ome caacitie are irrational uch that even tarting with a null flow, the equence of flow obtained by uhing along ome directed ath converge to a value le than 6, while the value of a maximum flow i infinite (or arbitrarily large). See Exercie 7.9. Remark 7.4. While the termination i not enured in cae of irrational caacitie, Theorem 7.7 (v max = δ min ) remain valid. We rove the real cae by taking the limit of the rational cae. In ractice, the rational cae i the only imortant roblem, ince comuter work with a finite reciion.

11 7.6. PUSHING ALONG SHORTEST PATHS 0 d d d d α 4m α 4m+ α 4m+ α 4m+ c α 4m+ c α 4m+ c α 4m+4 α 4m+ c α 4m+4 b b b b α 4m+ α 4m+ α 4m+5 a a a a f 4m f 4m+ f 4m+ f 4m+ Figure 7.7: The equence of flow. The arc leaving and the arc entering are not drawn The bound of Prooition 7. on the number of uhe i not good becaue it deend on the value of the maximum flow which may be huge. Figure 7.8 how an examle where v max uhe, if they are badly choen, are neceary to reach a flow with maximum value. Indeed, if k a k k k b Figure 7.8: Examle where k = v max uhe may be erformed. the uhe are alternatively erformed along P =(,a,b, ) and P =(,b,a, ), then one unit of flow i uhed at each iteration becaue the caacity of (a,b) or (b,a) equal. Therefore, k = v max uhe are neceary (k along P and k along P ). To imrove the reviou algorithm and to enure it quick termination in all cae, the idea i to conider the uhe on ome ecific directed ath. 7.6 Puhing along hortet ath Intead of uhing the flow along an arbitrary directed ath (, )-ath in the auxiliary network, a better algorithm conit in uhing along a hortet directed (, )-ath. Here, by hortet

12 0 CHAPTER 7. FLOW PROBLEMS ath, we mean a hortet ath in term of number of arc, not of total caacity. Algorithm 7. (Edmond-Kar, 970).. Start with null flow f = 0;. Comute the auxiliary network N( f ) ;. Look for a hortet directed ath from to in G( f ); 4. If uch a ath P exit, uh ome flow along P, udate f and go to ; 5. Ele terminate and return f. E(G) V (G) We will how that uch an algorithm erform at mot iteration. That i, it time E(G) V (G) comlexity i at mot time the comlexity of finding a hortet ath. Note that, contrary to the Ford-Fulkeron Algorithm (7.), thi bound i indeendent from the caacitie. The roof i baed on two imle roertie. ) During the iteration, the ditance between and in the auxiliary grah cannot decreae. ) During the iteration, the ditance between and remain unchanged at mot E(G) conecutive iteration. Let f 0 be a flow and let G 0 = G( f 0 ); We et: - E the et of arc of G 0 that belong to a hortet ath from to in G 0 ; - E the arc obtained by revering the one in E ; - G the grah obtained from G 0 by adding the arc in E. Lemma 7.5. The grah G ha the following roertie: (i) A directed ath from to with length dit G0 (, ) doe not ue any arc in E. (ii) The ditance from to in G i dit G0 (, ); Proof. (i) Let P be a directed (, )-ath in G that contain ome arc in E, and let (v,u) be the lat arc of E that belong to P. Let u how that P i not a hortet directed (, )-ath. Since (u,v) belong to a hortet directed (, )-ath, we have dit G0 (u, ) =dit G0 (v, )+. Since between u and, the ath P ue only arc in G 0, it length i l ++dit G0 (u, ) (where l i the length of the ubath of P between and v). Hence, P ha length l + + dit G0 (v, ). The ath P obtained by following P until v and then uing a hortet directed (v, )-ath ha length l + dit G0 (v, )=l + dit G0 (v, ). Therefore, P i not a hortet directed (, )-ath. (ii) Follow from (i).

13 7.7. ALGORITHM USING A SCALE FACTOR 0 Theorem 7.6. Algorithm 7. erform at mot E(G) V (G) iteration. It time-comlexity i E(G) V (G) earche of hortet directed ath, o O( E(G) V (G) ). Proof. During a uh, we add to the auxiliary network the arc in E. By Lemma 7.5, it doe not decreae the ditance between and. The algorithm conit of V te correonding to the et of all oible ditance between and. A te conit of a et of iteration when the ditance between and remain unchanged. Let u conider ucceive iteration that let the ditance dit(, ) unchanged. During ome iteration, the auxiliary network G 0 change ince ome arc are added and other arc are removed. However, ince d(, ) remain the ame, the ath along which uhe are erformed ue only arc of G 0. Since at each iteration, at leat one arc of G 0 i removed (we uh the maximum oible along the choen ath, o one arc i removed), at mot E(G) uch iteration are erformed. Since dit(, ) V (G), we have at mot V (G) te of at mot E(G) iteration each. At each iteration we mainly have to find a hortet directed (, )-ath. Thi can be done in time O( E(G) ) by any earch algorithm (See Chater ). Hence the total comlexity i O( E(G) V (G) ). 7.7 Algorithm uing a cale factor If the caacitie are integral then Algorithm 7. may take time to find the maximum flow becaue of the diarity of the value of the caacitie. In the examle in Figure 7.8, the uhe may be erformed along an arc with caacity, while there i a ath between the ource and the ink with caacity k. Thi roblem may be overcome by uing a cale factor. The idea i to try to work with caacitie with imilar value, to aturate them and then to conider caacitie with maller value. The idea i to tart with the greatet caacitie, to uh ome flow in a network that conit only of thee link and to try to aturate them a much a oible. Then, the network i relaced by the current auxiliary network to which we add new link with maller caacitie than the one conidered yet. Algorithm 7. (Scaling Algorithm). 0. Comute the mallet integer m uch that c(e) < m for any arc e. For all e E(G), et c(e)= m j=0 j c j (e) with c j (e) {0,}.. k := m ; for all e E(G), c (e) := 0 and f (e) := 0;. If k < 0, then terminate, ele for all e E(G), c (e) := c (e)+ k c k (e).. Increae a much a oible the flow f in (G,,,c ); k := k ; go to Ste.

14 04 CHAPTER 7. FLOW PROBLEMS Clearly, thi algorithm comute a maximum flow becaue, at the end, all caacitie are taken into account. Let u conider the comlexity of thi algorithm. For thi uroe, we need the following rooition the roof of which i left in Exercie 7.0. Prooition 7.7. Let N =(G,,,c) be a flow network and α a oitive real. Let e be an arc of G and N be the flow network (G,,,c ) where c i defined by c (e) =c(e)+α and c ( f )=c( f ) for all f = e. Then v max (N ) v max (N)+α. Theorem 7.8. Algorithm 7. erform le than (log (v max )+) E(G) uhe. Proof. Let c i = m j=i j c j be the caacity at Ste when k = i, g i be the flow added during thi te, and f i+ be the total flow before thi te. Hence f i = f i+ + g i. Let u rove by decreaing induction that at Ste -(i) Algorithm 7. erform at mot E(G) uhe and that f i (e) i a multile of i for every arc e. The reult hold trivially for i = n. Suoe now that the reult hold for i +. Since the caacity c i and the flow f i+ are multile of i, in the auxiliary network, the caacity of the arc are multile of i. Hence finding g i correond to finding a maximum flow g i in the network with integral caacitie (G,,,(c i f i+)/ i ) with v(g i ) v(g i)/ i. Moreover, at the end of Ste -(i + ), the flow could not be increaed anymore, therefore, there are no directed ath with minimum caacity i+. Hence, at Ste.(i), any directed ath in the auxiliary network ha minimal caacity i. Hence, each iteration uhe exactly i unit of flow at Ste.(i). Thu v(g i ) i E(G) and o v(g i ) i E(G). By Prooition 7., finding g i and g i i done in at mot E(G) uhe. In addition, by Remark 7., the flow g i ha integral value and o the value of g i are multile of i. Let i 0 be the larget integer uch that a uh ha been done at i 0. If i 0 v max, then after uhing once at Ste -(i 0 ), we obtained a flow of value i 0, which mut be a maximum flow. Otherwie, i 0 < log (v max ) and for each i, 0 i i 0, Algorithm 7. erform at mot E(G) uhe. Hence in total, the number of uhe it at mot (i 0 + ) E(G) (log (v max )+ ) E(G). 7.8 Flow in undirected grah Until now, we have conidered the roblem in directed grah. However, there are ome context in which the correonding network i undirected. For intance, when the link are bidirectional. In thi cae, each link ha one maximum caacity but the flow may circulate in both direction if the um of the two traffic i at mot the caacity of the link. A undirected flow network N =(G, r max,co max,c) i defined imilarily to the direct cae. The definition of the flow i a bit modified ince two value mut be aociated to each edge uv: f (u,v) correond to the traffic from u to v and f (v,u) correond to the traffic from v to u. Definition 7.9 (Undirected Flow). The flow i a three-tule F =(r,co, f ) where

15 7.8. FLOWS IN UNDIRECTED GRAPHS 05 - r i a function of roduction uch that, for any vertex v, 0 r(v) r max (v); - co i a function of conumtion uch that, for any vertex v, 0 co(v) co max (v); - f i a function over the ordered air (u,v) (with u and v adjacent), called flow function that atifie the following contraint: Poitivity: e E, f (e) 0 Caacity contraint: uv E, f ((u,v)) + f ((v,u)) c(uv) Flow conervation: v V, (u,v) E f ((u,v)) + r(v)= A in the directed cae, the value of the flow F i v(f)= r(v)= co(v) v V v V (v,u) E f ((v,u)) + co(v) Let N =(G, r max,co max,c) be an undirected flow network. The (directed) flow network aociated to N i N =(G, r max,co max,c) obtained by relacing each edge uv by an arc (u,v) and an arc (v,u) each of which ha caacity c(u,v). Formally, (G =(V (G), {(u,v),(v,u)}) uv E(G) andc((u,v)) =c((v,u)) = c(uv). Clearly, a flow function f in N and a flow function f in N atify the ame contraint but the caacity contraint. The one in N: i tronger than the one in N: uv E(G), f ((u,v)) + f ((v,u)) c(uv) uv E(G),f ((u,v)) c(uv) et f ((v,u)) c(uv) Hence, any flow of N i a flow in N. Hence, the maximum value of a flow in N i at mot the maximum value of a flow in N. In other word, v max (N) v max (N). We how that they are equal. Definition 7.0 (imle flow). A flow i imle if, for any air of vertice {u,v}, we have either f (u,v)=0 or f (v,u)=0. To any flow, there i a correonding imle flow defined a follow. If f (u,v) f (v,u) > 0 then f (u,v) = f (u,v) f (v,u) and f (v,u) =0. It i eay to ee that v( f )=v( f ) ince f (v,)=0 for any vertex v becaue d ()=0 and o f (,v)= f (,v). Prooition 7.. Let N be an undirected flow network and let N be the aociated flow network: v max (N)=v max (N) Proof. Let F =(r,co,f ) be a flow in N. Let F =(r,co, f ) be the imle flow of F. Then v(f) =v(f). Since F i imle, for any edge uv E(G), we have f (u,v) =0 or f (v,u) =0. Beide, the caacity contraint in N give f (u, v) c(uv) ou f (v, u) c(uv). Hence, for any uv E(G), f ((u,v)) + f ((v,u)) c(uv). Then, F i a flow for N. Therefore, any flow of N correond to a flow of N with ame value. Thi rooition allow u to reduce the undirected roblem to the directed cae. To find a maximum flow in an undirected network, it i ufficient to olve the roblem in the aociated directed network and to take the correonding imle flow.

16 06 CHAPTER 7. FLOW PROBLEMS 7.9 Alication of flow 7.9. Connectivity in grah Menger Theorem (Theorem 5.8 i very cloely related to Theorem 7.7. Oberve that the arc et of an (, )-cut in a flow network correond to an (, )-edge-earator. Hence one can deduce Menger Theorem from Theorem 7.7. We now do it for Theorem 5.8-(ii) for digrah. In fact the roof of thi reult we gave in Section 5.6 wa uing the uh technique (in diguie). Proof of Theorem 5.8-(ii) for digrah. Let G be a digrah. The edge-connectivity κ (,t) i the value of the caacity of a cut in the flow network N obtained by aigning to each arc a caacity of, and chooing a ource and t a ink. Indeed, if C =(V,V t ) i a cut, then after the removal of the arc of C, there remain no (,t)-ath. Hence κ (,t) δ min (N). Recirocally, let E be an arc-earator of G and G = G \ E. Let V be the et of vertice w of G uch that there exit a directed (,w)-ath in G, and V t = V \V u. By definition of V, any arc (x,y) with x V and y V t i in E. Hence, δ((v,v t )) E. Therefore, δ min (N) κ (,t). From Theorem 7.7, there i a flow of value κ (,t) in thi network. Moreover, by Remark 7., we may aume that thi flow i integral. Since the edge have unit caacity, the flow of value κ (,t) can be decomoed into a et of κ (,t) airwie edge-dijoint (,t)-ath. Hence κ (,t)=π (,t). The other cae of Menger Theorem may alo be derived from Theorem 7.7. See Exercie 7.. Thu Menger Theorem can be viewed a a articular cae of Theorem 7.7. In fact, they are equivalent and it i not too difficult to rove Theorem 7.7 from Menger Theorem. See Exercie Maximum matching in biartite grah The theorem on matching in biartite grah that we roved in Chater 6 are direct alication of flow. Indeed to every biartite grah G =((A,B),E), one can aociate the flow network N G =(H,,,c) defined a follow: H i the digrah obtained from G by orienting all edge of G from A to B and adding a ource and a ink, all arc (,a) for a A and (b, ) for b B; the caacity equal for all arc. See Figure 7.9. Figure 7.9: A biartite grah and it aociated flow network

17 7.9. APPLICATIONS OF FLOWS 07 There i a one-to-one correondence between the matching of G and the integral flow in N G : to every matching M correond the flow f M with value on the arc et (a,b) E(G){(,a),(a,b),(b, )}. Moreover the ize of M i equal to the value of the flow f M. In addition, an M-augmenting ath in G correond to a directed (, -ath in the auxiliary network N G ( f M ). Hence Algorithm 6. i a articular cae of Algorithm 7.. One can alo deduce all the reult of Chater 6 from Theorem 7.7. For examle, we now give a roof of Theorem 6. ( Let G =(A,B) biartite, there i a matching of ize k if and only if S A, A S + N(S) k ) uing flow. Proof of Theorem 6.. Let u rove that the maximum ize µ of a matching in G i equal to the maximum value of a flow in N G. If M i a matching of ize µ in G, then f M ha value µ. Hence µ v max. Recirocally, from Remark 7., there i a maximum flow f with integral value. It i in one-to-one correondence with a matching M of ize v( f )=v max. Hence, µ v max. Let C =(V,V ) be a minimum cut. Let A = A V and B = B V. If there i a vertex b (B N(A ))\B, then etting C =(V {b},v \{b}), we get δ(c ) δ(c) + = δ(c). So, by adding the vertice of (B N(A ))\B in V if needed, we may aume that the minimum cut that we conider i uch that N(A ) B. Let u conider the caacity of C. δ min = δ(c) = {(,a) a A \ A } + {(b, ) b B } + {(a,b)} a A,b B \ B } = A A + B Since N(A ) B, it follow that δ min A A + N(A ). Moreover, the cut (A N(A ),V (H) \ (A N(A ))) ha caacity A A + N(A. So δ min = A A + N(A ). We conclude that δ min = min{s A A S + N(S)} Hence, from Theorem 7.7, µ = v max = δ min = min{s A A S + N(S)} Maximum-gain cloure In thi roblem, we have everal tak. Each tak t T i aociated to a gain g(t). The gain may be negative (if o, it correond to a lo). We note T + (re. T ) the et of tak with oitive gain (re., negative gain). Beide, there are everal cloure contraint.that i, the choice of a tak may imly the choice of one or everal other tak. We rereent thi cloure relation (e.g., imlication relation) by an imlication digrah D T : it vertice are the tak and there i an arc (t,t ) if and only if the choice of t imlie the choice of t. The objective i to find a et of comatibletak with maximum gain, that i a ubet A of T uch that: - there are no arc leaving A (E((A,A)) = /0) i.e. A i a cloure in D T ; - t A g(t) i maximum.

18 08 CHAPTER 7. FLOW PROBLEMS Let u how how thi roblem can be reduced to a roblem of cut with minimum caacity, hence to a maximum flow roblem. Let N =(G,,,c) be the following flow network (See Figure 7.0: - V (G)=T {, }; - for any tak t with oitive gain, link the ource to the tak t with an arc (,t) with caacity c(,t)=g(t); - for any tak t with non-oitive gain, link t to the ink with an arc (t, ) with caacity c(t, )= g(t); - if a tak t imlie a tak t, we add the arc (t,t ) with infinite caacity in the network. T T 5 5 Figure 7.0: An imlication digrah and it correonding flow network Let u conider a cut C =(V,V ) with finite caacity in the network. We have S = {} A with A T. Moreover, ince the cut ha finite caacity, it arc et contain no arc of D T, o A i a et of comatible tak. Let A + = A T + and A = A T. The caacity of C i: δ(c) = t T + \A + c(,t)+ t A c(t, ) = t T + \A + g(t) t A g(t) = g(t) g(t) g(t) t T + t A + t A = g(t) g(t) t T + t A Since t T + g(t), the um of all oitive gain, i a contant, minimizing the caacity of the cut S = {} A i equivalent to maximizing the gain of A.

19 7.0. EXERCICES Exercice Exercie 7.. Let N be the flow network and f 0 the (, )-flow in N a deicted in the figure below. 4 network initial flow ) Start from f 0 and find a maximum (, )-flow. Detail the te of the algorithm. ) Decribe a minimum cut of thi network. Exercie 7.. Find a maximum (, )-flow and a minimum (, )-cut in the network deicted below. (Detail the te of the uh algorithm.) Exercie 7.. There are roduction ite A,B,C and 5 conumtion ite,,,4,5; their roduction and conumtion, reectively, are given in the following table. A B C Finally, each roduction ite can only erve the conumtion ite a ummarized in the following table. A B C 4 45 The roblem i to atify the conumtion ite. Model the following roblem in term of flow and give a olution to the roblem or exlain why it could not exit. Exercie 7.4. Prove the following roerty: for all (, )-cut C =(V,V ),v( f )=out( f,c) in( f,c). Why i the hyothei V and V imortant? Exercie 7.5. Prove Lemma 7.9. Verify that the oitivity, the caacity contraint and the flow conervation are atified for f.

20 0 CHAPTER 7. FLOW PROBLEMS Exercie 7.6. The uort of a flow i the et of arc on which the flow function i oitive. Show that there alway exit a maximum flow whoe uort ha no directed cycle. Exercie 7.7. Let N =(G,,,c) be a flow netwrok uch that, for all arc e, c(e) i an even integer. ) Prove that the maximum value of a flow i an even integer. ) Show that there i a maximum flow f uch that, for all arc e, f (e) i an even integer. Exercie 7.8. Modify Algorithm 7. to obtain an algorithm finding a minimum cut in a flow network. Exercie 7.9. Contruct a flow network for which Algorithm 7. roduce a equence of flow whoe value converge to a finite value when uhing on ome equence of directed ath, while the value of a maximum flow i infinite (or arbitrarily large). Exercie 7.0. Prove Prooition 7.7. Exercie 7.. In thi exercie, we tudy a variant of the algorithm for finding a maximum flow, in which we uh the flow along a directed ath of maximum reidual caacity. ) Give an algorithm finding a directed ath of maximum reidual caacity. ) Show that if we uh an amount of x at one te, then we uh an amount of at leat x at each following te. Exercie 7.. Let N =(G,,,c) be a flow network. To each vertex v V (G), we aociate an real w(v). We want to comute a flow f of maximum value atifying the following extra contraint: v V (G) the flow entering v i at mot w(v) (i.e. u N (v) f (uv) w(v)). Show how to find uch a flow by comuting a maximum flow on a network obtained from N by light modification. Exercie 7.. Deduce Menger Theorem (5.8) from Theorem 7.7. (Hint: One can ue Exercie 7. to rove Theorem 5.8-(i). Exercie 7.4. Deduce Theorem 7.7 from Menger Theorem (5.8). Exercie 7.5. Several comanie end member to a conference; the ith comany end m i member. During the conference, everal workho are organized imulteanouly; the ith workho can receive at mot n j articiant. The organizer want to diatch articiant into workho o that two member of a ame comany are not in a ame workho. (The workho do not need to be full.) a) Show how to ue a flow network for teting if the contraint may be atified. b) If there are comanie and q workho indexed in uch a way that m m and n n q. Show that there exit a diatching of articiant into groue atifying the contraint if and only if, for all 0 k and all 0 l q, we have k(q l)+ l j= n j k i= m i.

21 7.0. EXERCICES Exercie 7.6 (Unlittable flow). We conider a flow network with one roduction ite and many conumtion ite, ay,,... n. The conumtion at ite i i d i. We want to route commoditie for to i with the following additionnal contraint: the traffic from to i mut be routed along a unique directed ath (it cannot be lit). Show that thi roblem i NP-comlete.

22 CHAPTER 7. FLOW PROBLEMS

A note on profit maximization and monotonicity for inbound call centers

A note on profit maximization and monotonicity for inbound call centers A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an

More information

Partial optimal labeling search for a NP-hard subclass of (max,+) problems

Partial optimal labeling search for a NP-hard subclass of (max,+) problems Partial optimal labeling earch for a NP-hard ubcla of (max,+) problem Ivan Kovtun International Reearch and Training Center of Information Technologie and Sytem, Kiev, Uraine, ovtun@image.iev.ua Dreden

More information

Online Budgeted Matching in Random Input Models with applications to Adwords

Online Budgeted Matching in Random Input Models with applications to Adwords Online Budgeted Matching in Random Inut Model with alication to Adword Gagan Goel Aranyak Mehta Abtract We tudy an online aignment roblem, motivated by Adword Allocation, in which querie are to be aigned

More information

Unit 11 Using Linear Regression to Describe Relationships

Unit 11 Using Linear Regression to Describe Relationships Unit 11 Uing Linear Regreion to Decribe Relationhip Objective: To obtain and interpret the lope and intercept of the leat quare line for predicting a quantitative repone variable from a quantitative explanatory

More information

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL Excerpt from the Proceeding of the COMSO Conference 0 India Two Dimenional FEM Simulation of Ultraonic Wave Propagation in Iotropic Solid Media uing COMSO Bikah Ghoe *, Krihnan Balaubramaniam *, C V Krihnamurthy

More information

Bidding for Representative Allocations for Display Advertising

Bidding for Representative Allocations for Display Advertising Bidding for Rereentative Allocation for Dilay Advertiing Arita Ghoh Preton McAfee Kihore Paineni Sergei Vailvitkii Abtract Dilay advertiing ha traditionally been old via guaranteed contract a guaranteed

More information

Regulated Maximal Matching: A Distributed Scheduling Algorithm for Multi-Hop Wireless Networks With Node-Exclusive Spectrum Sharing

Regulated Maximal Matching: A Distributed Scheduling Algorithm for Multi-Hop Wireless Networks With Node-Exclusive Spectrum Sharing Proceeding of the 44th IEEE Conference on Deciion and Control, and the Euroean Control Conference 005 Seville, Sain, December 1-15, 005 WeB14.5 Regulated Maximal Matching: A Ditributed Scheduling Algorithm

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com

More information

Name: SID: Instructions

Name: SID: Instructions CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/

More information

NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET

NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET Chapter 1 NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET S. Srivatava Univerity of Miouri Kana City, USA hekhar@conrel.ice.umkc.edu S. R. Thirumalaetty now

More information

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada

More information

Scheduling of Jobs and Maintenance Activities on Parallel Machines

Scheduling of Jobs and Maintenance Activities on Parallel Machines Scheduling of Job and Maintenance Activitie on Parallel Machine Chung-Yee Lee* Department of Indutrial Engineering Texa A&M Univerity College Station, TX 77843-3131 cylee@ac.tamu.edu Zhi-Long Chen** Department

More information

v = x t = x 2 x 1 t 2 t 1 The average speed of the particle is absolute value of the average velocity and is given Distance travelled t

v = x t = x 2 x 1 t 2 t 1 The average speed of the particle is absolute value of the average velocity and is given Distance travelled t Chapter 2 Motion in One Dimenion 2.1 The Important Stuff 2.1.1 Poition, Time and Diplacement We begin our tudy of motion by conidering object which are very mall in comparion to the ize of their movement

More information

LECTURE 2. TURÁN S THEOREM : BIPARTITE GRAPHS

LECTURE 2. TURÁN S THEOREM : BIPARTITE GRAPHS LECTURE 2. TURÁN S THEOREM : BIPARTITE GRAPHS. Complete bipartite graph.. Kövari-Só-Turán theorem. When H i a bipartite graph, i.e., when χ(h) = 2, Erdő and Stone theorem aert that π H = 0. In other word,

More information

Introduction to NP-Completeness Written and copyright c by Jie Wang 1

Introduction to NP-Completeness Written and copyright c by Jie Wang 1 91.502 Foundations of Comuter Science 1 Introduction to Written and coyright c by Jie Wang 1 We use time-bounded (deterministic and nondeterministic) Turing machines to study comutational comlexity of

More information

Project Management Basics

Project Management Basics Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management

More information

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems, MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS

More information

! Search engines are highly profitable. n 99% of Google s revenue from ads. n Yahoo, bing also uses similar model

! Search engines are highly profitable. n 99% of Google s revenue from ads. n Yahoo, bing also uses similar model Search engine Advertiement The Economic of Web Search! Search engine are highly profitable Revenue come from elling ad related to querie 99% of Google revenue from ad Yahoo, bing alo ue imilar model CS315

More information

A Note on Profit Maximization and Monotonicity for Inbound Call Centers

A Note on Profit Maximization and Monotonicity for Inbound Call Centers OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright

More information

HOMOTOPY PERTURBATION METHOD FOR SOLVING A MODEL FOR HIV INFECTION OF CD4 + T CELLS

HOMOTOPY PERTURBATION METHOD FOR SOLVING A MODEL FOR HIV INFECTION OF CD4 + T CELLS İtanbul icaret Üniveritei Fen Bilimleri Dergii Yıl: 6 Sayı: Güz 7/. 9-5 HOMOOPY PERURBAION MEHOD FOR SOLVING A MODEL FOR HIV INFECION OF CD4 + CELLS Mehmet MERDAN ABSRAC In thi article, homotopy perturbation

More information

Online story scheduling in web advertising

Online story scheduling in web advertising Online tory cheduling in web advertiing Anirban Dagupta Arpita Ghoh Hamid Nazerzadeh Prabhakar Raghavan Abtract We tudy an online job cheduling problem motivated by toryboarding in web advertiing, where

More information

Group Mutual Exclusion Based on Priorities

Group Mutual Exclusion Based on Priorities Group Mutual Excluion Baed on Prioritie Karina M. Cenci Laboratorio de Invetigación en Sitema Ditribuido Univeridad Nacional del Sur Bahía Blanca, Argentina kmc@c.un.edu.ar and Jorge R. Ardenghi Laboratorio

More information

MSc Financial Economics: International Finance. Bubbles in the Foreign Exchange Market. Anne Sibert. Revised Spring 2013. Contents

MSc Financial Economics: International Finance. Bubbles in the Foreign Exchange Market. Anne Sibert. Revised Spring 2013. Contents MSc Financial Economic: International Finance Bubble in the Foreign Exchange Market Anne Sibert Revied Spring 203 Content Introduction................................................. 2 The Mone Market.............................................

More information

DUE to the small size and low cost of a sensor node, a

DUE to the small size and low cost of a sensor node, a 1992 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 10, OCTOBER 2015 A Networ Coding Baed Energy Efficient Data Bacup in Survivability-Heterogeneou Senor Networ Jie Tian, Tan Yan, and Guiling Wang

More information

Bidding for Representative Allocations for Display Advertising

Bidding for Representative Allocations for Display Advertising Bidding for Repreentative Allocation for Diplay Advertiing Arpita Ghoh, Preton McAfee, Kihore Papineni, and Sergei Vailvitkii Yahoo! Reearch. {arpita, mcafee, kpapi, ergei}@yahoo-inc.com Abtract. Diplay

More information

In this paper, we investigate toll setting as a policy tool to regulate the use of roads for dangerous goods

In this paper, we investigate toll setting as a policy tool to regulate the use of roads for dangerous goods Vol. 43, No. 2, May 2009, pp. 228 243 in 0041-1655 ein 1526-5447 09 4302 0228 inform doi 10.1287/trc.1080.0236 2009 INFORMS Toll Policie for Mitigating Hazardou Material Tranport Rik Patrice Marcotte,

More information

Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS

Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS Chapter Stoc and Their Valuation ANSWERS TO EN-OF-CHAPTER QUESTIONS - a. A proxy i a document giving one peron the authority to act for another, typically the power to vote hare of common toc. If earning

More information

Senior Thesis. Horse Play. Optimal Wagers and the Kelly Criterion. Author: Courtney Kempton. Supervisor: Professor Jim Morrow

Senior Thesis. Horse Play. Optimal Wagers and the Kelly Criterion. Author: Courtney Kempton. Supervisor: Professor Jim Morrow Senior Thei Hore Play Optimal Wager and the Kelly Criterion Author: Courtney Kempton Supervior: Profeor Jim Morrow June 7, 20 Introduction The fundamental problem in gambling i to find betting opportunitie

More information

CASE STUDY BRIDGE. www.future-processing.com

CASE STUDY BRIDGE. www.future-processing.com CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION

More information

1 Gambler s Ruin Problem

1 Gambler s Ruin Problem Coyright c 2009 by Karl Sigman 1 Gambler s Ruin Problem Let N 2 be an integer and let 1 i N 1. Consider a gambler who starts with an initial fortune of $i and then on each successive gamble either wins

More information

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations Proceeding of the 0 Indutrial Engineering Reearch Conference T. Doolen and E. Van Aken, ed. Profitability of Loyalty Program in the Preence of Uncertainty in Cutomer Valuation Amir Gandomi and Saeed Zolfaghari

More information

MECH 2110 - Statics & Dynamics

MECH 2110 - Statics & Dynamics Chapter D Problem 3 Solution 1/7/8 1:8 PM MECH 11 - Static & Dynamic Chapter D Problem 3 Solution Page 7, Engineering Mechanic - Dynamic, 4th Edition, Meriam and Kraige Given: Particle moving along a traight

More information

Review of Multiple Regression Richard Williams, University of Notre Dame, http://www3.nd.edu/~rwilliam/ Last revised January 13, 2015

Review of Multiple Regression Richard Williams, University of Notre Dame, http://www3.nd.edu/~rwilliam/ Last revised January 13, 2015 Review of Multiple Regreion Richard William, Univerity of Notre Dame, http://www3.nd.edu/~rwilliam/ Lat revied January 13, 015 Aumption about prior nowledge. Thi handout attempt to ummarize and yntheize

More information

Assigning Tasks for Efficiency in Hadoop

Assigning Tasks for Efficiency in Hadoop Aigning Tak for Efficiency in Hadoop [Extended Abtract] Michael J. Ficher Computer Science Yale Univerity P.O. Box 208285 New Haven, CT, USA michael.ficher@yale.edu Xueyuan Su Computer Science Yale Univerity

More information

Numerical Simulation and Experimental Verification of Air Flow through a Heated Pipe

Numerical Simulation and Experimental Verification of Air Flow through a Heated Pipe International Journal of Mechanical & Mechatronic Engineering IJMME-IJENS Vol:0 No:02 7 Numerical Simulation and Exerimental Verification of Air Flow through a Heated Pie Qaier Abba, M. Mahabat Khan, Rizwan

More information

Congestion and price competition in the cloud

Congestion and price competition in the cloud Congetion and rice cometition in the cloud Jonatha Anelmi, Danilo Ardagna, Adam Wierman 3 BCAM, Politecnico di Milano, 3 California Intitute of Technolog Abtract Thi aer rooe a model to tud the interaction

More information

TRADING rules are widely used in financial market as

TRADING rules are widely used in financial market as Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a

More information

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,

More information

Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11)

Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11) Point Location Prerocess a lanar, olygonal subdivision for oint location ueries. = (18, 11) Inut is a subdivision S of comlexity n, say, number of edges. uild a data structure on S so that for a uery oint

More information

12.4 Problems. Excerpt from "Introduction to Geometry" 2014 AoPS Inc. Copyrighted Material CHAPTER 12. CIRCLES AND ANGLES

12.4 Problems. Excerpt from Introduction to Geometry 2014 AoPS Inc.  Copyrighted Material CHAPTER 12. CIRCLES AND ANGLES HTER 1. IRLES N NGLES Excerpt from "Introduction to Geometry" 014 os Inc. onider the circle with diameter O. all thi circle. Why mut hit O in at leat two di erent point? (b) Why i it impoible for to hit

More information

The Goldberg Rao Algorithm for the Maximum Flow Problem

The Goldberg Rao Algorithm for the Maximum Flow Problem The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }

More information

The Online Freeze-tag Problem

The Online Freeze-tag Problem The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden mikael.hammar@atus.com School of Technology and Society, Malmö University,

More information

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms Tap Into Smartphone Demand: Mobile-izing Enterprie Webite by Uing Flexible, Open Source Platform acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Tap Into Smartphone Demand:

More information

Math 22B, Homework #8 1. y 5y + 6y = 2e t

Math 22B, Homework #8 1. y 5y + 6y = 2e t Math 22B, Homework #8 3.7 Problem # We find a particular olution of the ODE y 5y + 6y 2e t uing the method of variation of parameter and then verify the olution uing the method of undetermined coefficient.

More information

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare

More information

Ohm s Law. Ohmic relationship V=IR. Electric Power. Non Ohmic devises. Schematic representation. Electric Power

Ohm s Law. Ohmic relationship V=IR. Electric Power. Non Ohmic devises. Schematic representation. Electric Power Ohm Law Ohmic relationhip V=IR Ohm law tate that current through the conductor i directly proportional to the voltage acro it if temperature and other phyical condition do not change. In many material,

More information

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4

More information

Maximizing Acceptance Probability for Active Friending in Online Social Networks

Maximizing Acceptance Probability for Active Friending in Online Social Networks Maximizing for Active Friending in Online Social Network De-Nian Yang, Hui-Ju Hung, Wang-Chien Lee, Wei Chen Academia Sinica, Taipei, Taiwan The Pennylvania State Univerity, State College, Pennylvania,

More information

How To Write A Powerline

How To Write A Powerline The Stragegy for Fat I/O in Degrae Moe of RAID-5 *DONG-JAE, KANG *CHANG-SOO, KIM **BUM-JOO,SHIN *Comuter & Sytem Lab. ETRI 161 Gajeong-Dong, Yueong-Gu, Deajeon, 35-35 KOERA **125-1 Naei-Dong Miryang Gyeongnam

More information

Bi-Objective Optimization for the Clinical Trial Supply Chain Management

Bi-Objective Optimization for the Clinical Trial Supply Chain Management Ian David Lockhart Bogle and Michael Fairweather (Editor), Proceeding of the 22nd European Sympoium on Computer Aided Proce Engineering, 17-20 June 2012, London. 2012 Elevier B.V. All right reerved. Bi-Objective

More information

Lecture 14: Transformers. Ideal Transformers

Lecture 14: Transformers. Ideal Transformers White, EE 3 Lecture 14 Page 1 of 9 Lecture 14: Tranforer. deal Tranforer n general, a tranforer i a ultiort ac device that convert voltage, current and iedance fro one value to another. Thi device only

More information

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME RADMILA KOCURKOVÁ Sileian Univerity in Opava School of Buine Adminitration in Karviná Department of Mathematical Method in Economic Czech Republic

More information

Health Insurance and Social Welfare. Run Liang. China Center for Economic Research, Peking University, Beijing 100871, China,

Health Insurance and Social Welfare. Run Liang. China Center for Economic Research, Peking University, Beijing 100871, China, Health Inurance and Social Welfare Run Liang China Center for Economic Reearch, Peking Univerity, Beijing 100871, China, Email: rliang@ccer.edu.cn and Hao Wang China Center for Economic Reearch, Peking

More information

On Secure Network Coding with Unequal Link Capacities and Restricted Wiretapping Sets

On Secure Network Coding with Unequal Link Capacities and Restricted Wiretapping Sets On Secure Network Coing with Unequal Link Capacitie an Retricte Wiretapping Set Tao Cui an Tracey Ho Department of Electrical Engineering California Intitute of Technology Paaena, CA 9115, USA Email: {taocui,

More information

A New Optimum Jitter Protection for Conversational VoIP

A New Optimum Jitter Protection for Conversational VoIP Proc. Int. Conf. Wirele Commun., Signal Proceing (Nanjing, China), 5 pp., Nov. 2009 A New Optimum Jitter Protection for Converational VoIP Qipeng Gong, Peter Kabal Electrical & Computer Engineering, McGill

More information

Abstract parsing: static analysis of dynamically generated string output using LR-parsing technology

Abstract parsing: static analysis of dynamically generated string output using LR-parsing technology Abtract paring: tatic analyi of dynamically generated tring output uing LR-paring technology Kyung-Goo Doh 1, Hyunha Kim 1, David A. Schmidt 2 1 Hanyang Univerity, Anan, South Korea 2 Kana State Univerity,

More information

Support Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data.

Support Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data. The Sixth International Power Engineering Conference (IPEC23, 27-29 November 23, Singapore Support Vector Machine Baed Electricity Price Forecating For Electricity Maret utiliing Projected Aement of Sytem

More information

Algorithms for Advance Bandwidth Reservation in Media Production Networks

Algorithms for Advance Bandwidth Reservation in Media Production Networks Algorithm for Advance Bandwidth Reervation in Media Production Network Maryam Barhan 1, Hendrik Moen 1, Jeroen Famaey 2, Filip De Turck 1 1 Department of Information Technology, Ghent Univerity imind Gaton

More information

Distributed Monitoring and Aggregation in Wireless Sensor Networks

Distributed Monitoring and Aggregation in Wireless Sensor Networks Ditributed Monitoring and Aggregation in Wirele Senor Network Changlei Liu and Guohong Cao Department of Computer Science & Engineering The Pennylvania State Univerity E-mail: {chaliu, gcao}@ce.pu.edu

More information

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad

More information

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International

More information

A Modified Measure of Covert Network Performance

A Modified Measure of Covert Network Performance A Modified Measure of Covert Network Performance LYNNE L DOTY Marist College Deartment of Mathematics Poughkeesie, NY UNITED STATES lynnedoty@maristedu Abstract: In a covert network the need for secrecy

More information

Mixed Method of Model Reduction for Uncertain Systems

Mixed Method of Model Reduction for Uncertain Systems SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol 4 No June Mixed Method of Model Reduction for Uncertain Sytem N Selvaganean Abtract: A mixed method for reducing a higher order uncertain ytem to a table reduced

More information

Auction-Based Resource Allocation for Sharing Cloudlets in Mobile Cloud Computing

Auction-Based Resource Allocation for Sharing Cloudlets in Mobile Cloud Computing 1 Auction-Baed Reource Allocation for Sharing Cloudlet in Mobile Cloud Computing A-Long Jin, Wei Song, Senior Member, IEEE, and Weihua Zhuang, Fellow, IEEE Abtract Driven by pervaive mobile device and

More information

A technical guide to 2014 key stage 2 to key stage 4 value added measures

A technical guide to 2014 key stage 2 to key stage 4 value added measures A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool

More information

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms Rik Management for a Global Supply Chain Planning under Uncertainty: Model and Algorithm Fengqi You 1, John M. Waick 2, Ignacio E. Gromann 1* 1 Dept. of Chemical Engineering, Carnegie Mellon Univerity,

More information

Chapter 10 Velocity, Acceleration, and Calculus

Chapter 10 Velocity, Acceleration, and Calculus Chapter 10 Velocity, Acceleration, and Calculu The firt derivative of poition i velocity, and the econd derivative i acceleration. Thee derivative can be viewed in four way: phyically, numerically, ymbolically,

More information

McAfee Total Protection

McAfee Total Protection McAfee Total Protection Reduce the comlexity and cot of managing ecurity Protect what you value. 06 0 o t 4-- N #4 O VERSI 8 07020 McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054 888.847.8766 www.mcafee.com

More information

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,

More information

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring Redeigning Rating: Aeing the Dicriminatory Power of Credit Score under Cenoring Holger Kraft, Gerald Kroiandt, Marlene Müller Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Thi verion: June

More information

Demand-Driven Scheduling of Movies in a Multiplex

Demand-Driven Scheduling of Movies in a Multiplex Demand-Driven Scheduling of Movie in a Multilex Jehohua Eliahberg The Wharton School, Univerity of Pennylvania, Philadelhia, Pennylvania 19104 eliahberg@wharton.uenn.edu Quintu Hegie School of Economic,

More information

Linear Momentum and Collisions

Linear Momentum and Collisions Chapter 7 Linear Momentum and Colliion 7.1 The Important Stuff 7.1.1 Linear Momentum The linear momentum of a particle with ma m moving with velocity v i defined a p = mv (7.1) Linear momentum i a vector.

More information

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation Proceeding on Privacy Enhancing Technologie 2015; 2015 (2):1 17 Reza Shokri* Privacy Game: Optimal Uer-Centric Data Obfucation Abtract: Conider uer who hare their data (e.g., location) with an untruted

More information

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC

More information

Assessing the Discriminatory Power of Credit Scores

Assessing the Discriminatory Power of Credit Scores Aeing the Dicriminatory Power of Credit Score Holger Kraft 1, Gerald Kroiandt 1, Marlene Müller 1,2 1 Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Gottlieb-Daimler-Str. 49, 67663 Kaierlautern,

More information

Cost Models for Selecting Materialized Views in Public Clouds

Cost Models for Selecting Materialized Views in Public Clouds International Journal of Data Warehouing and Mining, 0(4), -25, October-December 204 Cot Model for Selecting Materialized View in ublic Cloud Romain erriot, Clermont Univerité, Univerité Blaie acal, Aubière

More information

AN OVERVIEW ON CLUSTERING METHODS

AN OVERVIEW ON CLUSTERING METHODS IOSR Journal Engineering AN OVERVIEW ON CLUSTERING METHODS T. Soni Madhulatha Aociate Preor, Alluri Intitute Management Science, Warangal. ABSTRACT Clutering i a common technique for tatitical data analyi,

More information

INFORMATION Technology (IT) infrastructure management

INFORMATION Technology (IT) infrastructure management IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, MAY 214 1 Buine-Driven Long-term Capacity Planning for SaaS Application David Candeia, Ricardo Araújo Santo and Raquel Lope Abtract Capacity Planning

More information

Magnetic levitation technique for active vibration control

Magnetic levitation technique for active vibration control Magnetic levitation technique for active vibration control 41 X 3 Magnetic levitation technique for active vibration control Md. Emdadul Hoque and Takehi Miuno Saitama Univerity Jaan 1. Introduction Thi

More information

Pythagorean Triples and Rational Points on the Unit Circle

Pythagorean Triples and Rational Points on the Unit Circle Pythagorean Triles and Rational Points on the Unit Circle Solutions Below are samle solutions to the roblems osed. You may find that your solutions are different in form and you may have found atterns

More information

1 - Introduction to hypergraphs

1 - Introduction to hypergraphs 1 - Introduction to hypergraph Jacque Vertraëte jacque@ucd.edu 1 Introduction In thi coure you will learn broad combinatorial method for addreing ome of the main problem in extremal combinatoric and then

More information

Increasing the Operating Safety of the Machine-Tools by Using Hydro-pneumatic Accumulators. Modeling - Simulation

Increasing the Operating Safety of the Machine-Tools by Using Hydro-pneumatic Accumulators. Modeling - Simulation ISBN 978-1-8466-xxx-x Proceeding of 011 International Conference on Otimization of the Robot and Maniulator (OPTIROB 011) Sinaia, Romania, 6-8 Mai, 011,. xxx-xxx Increaing the Oerating Safety of the Machine-Tool

More information

HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * Michael Spagat Royal Holloway, University of London, CEPR and Davidson Institute.

HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * Michael Spagat Royal Holloway, University of London, CEPR and Davidson Institute. HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * By Michael Spagat Royal Holloway, Univerity of London, CEPR and Davidon Intitute Abtract Tranition economie have an initial condition of high human

More information

SCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto

More information

Performance of Multiple TFRC in Heterogeneous Wireless Networks

Performance of Multiple TFRC in Heterogeneous Wireless Networks Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding

More information

a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2.

a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2. Chapter 1 LINEAR EQUATIONS 1.1 Introduction to linear equations A linear equation in n unknowns x 1, x,, x n is an equation of the form a 1 x 1 + a x + + a n x n = b, where a 1, a,..., a n, b are given

More information

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE Progre In Electromagnetic Reearch Letter, Vol. 3, 51, 08 BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE S. H. Zainud-Deen Faculty of Electronic Engineering Menoufia

More information

A GUIDE TO VALUE ADDED KEY STAGE 2 TO 4 IN 2011 SCHOOL & COLLEGE PERFORMANCE TABLES & RAISE ONLINE

A GUIDE TO VALUE ADDED KEY STAGE 2 TO 4 IN 2011 SCHOOL & COLLEGE PERFORMANCE TABLES & RAISE ONLINE A GUIDE TO LUE ADDED KEY STAGE 2 TO 4 IN 2011 SCHOOL & COLLEGE PERFORMANCE TABLES & RAISE ONLINE Content Pae No. Summary Interretin School Value Added Score 2 What i Value Added? 3 Calculatin Puil Value

More information

Solutions to Sample Problems for Test 3

Solutions to Sample Problems for Test 3 22 Differential Equation Intructor: Petronela Radu November 8 25 Solution to Sample Problem for Tet 3 For each of the linear ytem below find an interval in which the general olution i defined (a) x = x

More information

Very Sparse Random Projections

Very Sparse Random Projections Very Sare Random Projection Ping i eartment of Statitic Stanford Univerity Stanford CA 9435 USA ingli@tattanfordedu Trevor J Hatie eartment of Statitic Stanford Univerity Stanford CA 9435 USA hatie@tanfordedu

More information

Socially Optimal Pricing of Cloud Computing Resources

Socially Optimal Pricing of Cloud Computing Resources Socially Optimal Pricing of Cloud Computing Reource Ihai Menache Microoft Reearch New England Cambridge, MA 02142 t-imena@microoft.com Auman Ozdaglar Laboratory for Information and Deciion Sytem Maachuett

More information

Module 8. Three-phase Induction Motor. Version 2 EE IIT, Kharagpur

Module 8. Three-phase Induction Motor. Version 2 EE IIT, Kharagpur Module 8 Three-phae Induction Motor Verion EE IIT, Kharagpur Leon 33 Different Type of Starter for Induction Motor (IM Verion EE IIT, Kharagpur Inructional Objective Need of uing arter for Induction motor

More information

1) Assume that the sample is an SRS. The problem state that the subjects were randomly selected.

1) Assume that the sample is an SRS. The problem state that the subjects were randomly selected. 12.1 Homework for t Hypothei Tet 1) Below are the etimate of the daily intake of calcium in milligram for 38 randomly elected women between the age of 18 and 24 year who agreed to participate in a tudy

More information

January 21, 2015. Abstract

January 21, 2015. Abstract T S U I I E P : T R M -C S J. R January 21, 2015 Abtract Thi paper evaluate the trategic behavior of a monopolit to influence environmental policy, either with taxe or with tandard, comparing two alternative

More information

Network Architecture for Joint Failure Recovery and Traffic Engineering

Network Architecture for Joint Failure Recovery and Traffic Engineering Network Architecture for Joint Failure Recovery and Traffic Engineering Martin Suchara Dept. of Computer Science Princeton Univerity, NJ 08544 muchara@princeton.edu Dahai Xu AT&T Lab Reearch Florham Park,

More information

EXISTENCE AND NON-EXISTENCE OF SOLUTIONS TO ELLIPTIC EQUATIONS WITH A GENERAL CONVECTION TERM

EXISTENCE AND NON-EXISTENCE OF SOLUTIONS TO ELLIPTIC EQUATIONS WITH A GENERAL CONVECTION TERM EXISTENCE AND NON-EXISTENCE OF SOLUTIONS TO ELLIPTIC EQUATIONS WITH A GENERAL CONVECTION TERM SALOMÓN ALARCÓN, JORGE GARCÍA-MELIÁN AND ALEXANDER QUAAS Abtract. In thi paper we conider the nonlinear elliptic

More information

Chapter 13. Network Flow III Applications. 13.1 Edge disjoint paths. 13.1.1 Edge-disjoint paths in a directed graphs

Chapter 13. Network Flow III Applications. 13.1 Edge disjoint paths. 13.1.1 Edge-disjoint paths in a directed graphs Chaper 13 Nework Flow III Applicaion CS 573: Algorihm, Fall 014 Ocober 9, 014 13.1 Edge dijoin pah 13.1.1 Edge-dijoin pah in a direced graph 13.1.1.1 Edge dijoin pah queiong: graph (dir/undir)., : verice.

More information

How To Understand The Hort Term Power Market

How To Understand The Hort Term Power Market Short-term allocation of ga network and ga-electricity input forecloure Miguel Vazquez a,, Michelle Hallack b a Economic Intitute (IE), Federal Univerity of Rio de Janeiro (UFRJ) b Economic Department,

More information

6. Friction, Experiment and Theory

6. Friction, Experiment and Theory 6. Friction, Experiment and Theory The lab thi wee invetigate the rictional orce and the phyical interpretation o the coeicient o riction. We will mae ue o the concept o the orce o gravity, the normal

More information