Fast FPT-algorithms for cleaning grids
|
|
- Shavonne Andrews
- 8 years ago
- Views:
Transcription
1 Fast FPT-algoithms fo cleaning gids Josep Diaz Dimitios M. Thilikos Abstact We conside the poblem that given a gaph G and a paamete k asks whethe the edit distance of G and a ectangula gid is at most k. Weexaminethegenealcase whee the edit opeation ae vetex/edge emovals and additions. If the dimensions of the gid ae given in advance, then we give a paameteized algoithm that uns in 2 O(log k k) + O(n 3 )steps.inthecasewheethedimensionsofthegidaenotgiven we give a paameteized algoithm that uns in 2 O(log k k) + O(k log k n 3 )steps. We insist on paameteized algoithms with unning times whee the elation between the polynomial and the non-polynomial pat is additive. Fo this, ou algoithm design is based on the technique of kenelization. In paticula we pove that fo each vesion of the above poblem thee exists a kenel of size O(k 4 ). 1 Intoduction An inteesting poblem with many applications in Compute Science is the poblem of measuing the degee of similaity of two gaphs G and H, wheebydegeeofsimilaity is conside to be the minimum numbe of edit opeations (inset, delete, and modify) needed to tansfom one gaph into the othe. This measue of similaity between gaphs is also denoted as the edit distance by analogy with the elated poblem on stings. A paticulaly impotant application has been the ecognition of objects and shapes, whee the objects ae epesented by special type of labelled tees and use the opeations, deletion, insetion and elabelling of nodes. The poblem is NP-Complete in geneal gaphs and can be computed by dynamic pogamming in polynomial time (see fo ex. [10]). Futhe wok has been done of computing the edit distance of moe involve weighted tees, called shock tees, using and extended sets of opeations: slice of edges, contact of edges, defom of edges, (see fo ex. [8]) In this pape, we conside decision poblems associated with theeditingdistance between G and H when H is a gid of size p q (we call such gid (p, q)-gid and we denote it as H p,q ). An edit opeation on a gaph G can be eithe the emoval o the insetion of eithe an edge o a vetex. We epesent these opeations by the membes Depatament de Llenguatges i Sistemes Infomàtics, Univesitat Politècnica de Catalunya, Campus Nod Edifici Ω, c/jodi Giona Salgado 1-3, E-08034, Bacelona, Spain. This eseach was suppoted by the spanish CICYT poject TIN (GRAMMARS). The fist autho was patially suppoted by the Distinció pe a la Pomoció de la Receca de la GC, s:{diaz,sedthilk}@lsi.upc.edu 1
2 of the set U = {e-out, e-in, v-out, v-in}. Given E U,wedenoteE-dist(G, H) asthe edit distance of G and H with espect to E, whichistheminimumnumbeofopeations in the set E that when applied to G can tansfom it to H. Ou study adopts the point of view of paameteized complexity intoduced by Downey and Fellows (see [2]). We conside paameteizations ofhadpoblems,i.e. poblems whose input contains some (in geneal small) paamete k and a some main pat. A paameteized poblem belongs in the class FPT if it can be solved by an algoithm of time complexity g(k) n O(1) whee g is a supe-polynomial function of k and n is the size of the poblem (we call such an algoithm FPT-algoithm). A popula technique on the design of paameteized algoithms is kenelization. Biefly,thistechnique, consists in finding a polynomial time eduction of a paameteized poblem to itself in awaythatthesizesoftheinstancesofthenewpoblem,wecallitkenel depend only on the paamete k. The function that bounds the size of the main pat of the educed poblem detemines the size of the kenel and is usually of polynomial (on k) size. Clealy, a paameteized poblem admits a eduction to a poblem kenel, then it is in FPT because any bute foce algoithm can solve the educed poblem in time that does not depend on the main pat of the oiginal poblem. Notice also that this technique povides FPT-algoithms of time complexity g(k)+n O(1) whee the non-polynomial pat g(k) isjustadditivetotheoveallcomplexity. The fist esult of this pape is the classification in FPT of the following poblem by giving a kenel of size O(k 4 )oo(k 3 )dependingonthesizeofthegidweaelooking fo (see Section 3) k-almost gid Input: AgaphG, twopositiveintegesp, q, anon-negativeintegek, andasete U. Paamete: Anon-negativeintegek. Question: Can G be tansfomed to a (p, q)-gid afte at most k edit opeations fom E? Notice that the non-paameteized vesion of k-almost Gid is NP-complete, as the poblem with q = 1andwithE consisting only in the easing a vetex opeation, is equivalent to the Longest Path poblem, i.e. the poblem of given a gaph G and aconstantk 0decideifG contains a simple path of length at least k (we just set k V (G) k). Theefoe, ou paameteization also includes the dual paameteization of the Longest Path, inthesensethatnowthepaameteisnotthelength of the path but the numbe of vetices in G that ae absent in such a path. The pimal paameteization of the Longest Path poblem was known to be in FTP 1 [6, 1]. 1 In an abuse of notation, we indistinctly efe to FPT poblem o to poblem in the FPT class 2
3 Howeve, no esult was known, so fa, fo he dual paameteiztion of Longest Path. In Section 4 we conside the following moe geneal poblem: k-almost some Gid Input: AgaphG and a set E U. Paamete: Anon-negativeintegek. Question: Decide if thee exist some pai p, q such that G-dist(G, H p,q ) k. Clealy, the above poblem can be solved applying the algoithm fo k-almost Gid fo all possible values of p and q. This implies an algoithm of time complexity O(log n(g(k) +n O(1) )). In Section 4, we explain how to avoid this O(log n) ovehead and pove that thee exists also a time O(g(k) +n O(1) )algoithmfothek-almost some Gid poblem. That way, both of ou algoithms can be seen as pe-pocessing algoithms that educe the size of the poblem input to a function depending only on the paamete k and not on the main pat of the poblem. Adiffeentbutsomehowelatedsetsofpoblems,whichhave eceived plenty of attention is the following: Given a gaph G and a popety Π, decide what is the minimum numbe of edges (nodes) that must be emoved to obtain asubgaphofg with popety Π. In geneal all these poblems ae NP-complete [9, 4, 7]. Some of those poblems have been studied fom the paameteized point of view [5], howeve, all these poblems have the chaacteistic that the popety Π must be an heeditay popety. We stess that the k-almost Gid and k-almost any Gid poblems completely diffeent natue, as the popety of containing a gid is not heeditay. 2 Definitions and basic esults All gaphs we conside ae undiected, loop-less and without multipleedges. Define the neighbouhood of a vetex v V (G) asn G (v) ={u V (G) (u, v) E(G)}. Let (G) =max{ N G (v) v V (G)} (i.e. (G) isthemaximumdegeeofavetexina gaph). We call (p, q)-gid any gaph H p,q that is isomophic to a gaph with vetex set {0,...,p 1} {0,...,q 1} and edge set {{(i, j), (k, l)} (i, j), (k, l) V (H) and i k + j l =1}. The -bode of H s, is defined as B () (H s, )=((i, 0), (i, 1) i =1,..., 1). We call a vetex (edge) of H s, intenal if it is not in (none of its endpoints is in) B () (H s, ). 3
4 Figue 1: A gaph G whee dist(g, H 15,15 ) 13 with a (6, 15)-band J in it and the esult of a 3-contaction of J in G. All the algoithms and esults in this pape will be fo the geneal case whee E = U. The othe cases ae staightfowad simplifications of ou esults 2.Subsequently,wewill also dop the E pat in the E-dist(G, H) notation.ifdist(g, H) k we will denote as V dead /E dead the vetices/edge that should be emoved and V add /E add the vetices/edges that should be added towads tansfoming G to H. Without loss of geneality, we assume that the tansfomation pocedue gives pioity fist to vetex emovals then to edge emovals, then to vetex insetions, and finally to edge insetions. We also use the notation k 1 = V dead, k 2 = E dead, K 3 = V add and k 4 = E add. Finally, we obseve that k 1 + k 2 + k 3 + k 4 k. We say that a gaph G contains an -band J of width s if the following thee conditions ae satisfied: a) G contains H s, as induced subgaph. b) Thee is no edge {x, y} E(G) suchthatx V (G) V (H) andy V (H) B () (J). If G is a gaph and H p,q is a (p, q)-band in G whee p 3andq 1, the esult of the c-contaction of H p,q in G whee 0 c p 3, is the gaph obtained if we contact in G all the edges of H p,q that ae in the set {{(i, m), (i +1,m)} 2 i c +1, 1 m q}. To denote the esult of the opeation we just descibed, we use the notation contact(g, H p,q,c). Notice that outine contact(g, H p,q,c)unso(cq) insteps.foan example of a c-contaction, see Figue 1. Lemma 1 Let G be a gaph containing a (3 + c, q)-band H 3+c,q fo some c> k q,andlet G = contact(g, H p,q,c). Thendist(G, H p,q ) k iff dist(g,h p c ) k. Poof: 2 Ou esults also hold fo moe geneal sets of opeations given that they locally change the stuctue of the input gaph. 4
5 We call an edge of a gaph q-exteme if q>1andbothitsendpointshavedegee3 o p =1andbothitsendpointshavedegee2. Fothesetofq-exteme edges of a gaph G we use the notation E (q) ext (G). find-edge-max-band(g, q, e) Input: AgaphG, apositiveintegeq and a q-exteme edge e of G. Output: Retun a maximal length (3 + c, q)-band H 3+c,q whee c 0ande is also an exteme edge of H. If such a(3 + c, q)-band does not exists, then etun NO. 1 let e = {y 1,0,z 1,0 } and set L {y 1,0 }, R {z 1,0 }, i 2 2 while i q and thee ae vetices y i,0 and z i,0 such that {y i,0,y i,0 }, {z i,0,z i,0 }, {y i,0,z i,0 } E(G) (d(y i,,0 )=d(z i,0 )=4andi<q)o(d(y i,0 )=d(z i,0 )=3andi = q) o (d(y i,0 )=d(z i,0 )=1andq =1), and N(y i,0 ) (L R {y i,0 } = N(z i,0 ) (L R {z i,0 } =, do set L L {y i,0 }, R R {z i,0 },andi i +1, 3 if i = q +1,thendo begin set 1, fo i =1,...,q,let{z i, } = N(z i, 1 ) R while N(z i, ) (L R) ={z i, 1 }, 1 i<j q {z i,,z j, } E(G) j = i +1, and 1 i q (d(z i, )=4and1<i<q)o((d(z i, )=3andi {1,q}) o ((d(z i, )=2andq =1),do R R {z 1,,...,z q, }; +1;foi =1,...,q, {z i, } N(z i, 1 ) R if N(z i, ) R = {z i, 1 } and 1 i<j q {z i,,z j,z } E(G) j = i +1,then R R {z 1,,...,z q, },othewise 1 set l 1, fo i =1,...,q,let{y i,l } = N(y i,l 1 ) L while N(y i,l ) (L R) ={y i,l 1 }, 1 i<j q {y i,l,y j,l } E(G) j = i +1, and 1 i q (d(y i,l )=4and1<i<q)o((d(y i,l )=3andi {1,q}), do L L {y 1,l,...,y q,l }; l l +1;foi =1,...,q, {y i,l } N(y i,l 1 ) L if N(y i,l ) L = {y i,l 1 } and 1 i<j q {y i,l,y j,l } E(G) j = i +1,then L L {y 1,l,...,y q,l },othewisel l 1 if + l>0thenetung[r L] end 4 etun NO. Lemma 2 The algoithm find-edge-max-band(g, q, e) is coect. If the answe is NO the algoithm finishes in O(q) steps. If the answe is a vetex set with (3 + c)q vetices, then the algoithm finishes in O(qc) steps. 5
6 Poof: Lemma 3 If G is a gaph whee (G) d and dist(g, H p,q ) k whee p q, theng contains at most (p 2) + (q 2) + 2dk q-extemal edges. Poof: Suppose that G contains moe than (p 2) + (q 2) + 2dk q-extemal edges. Notice fist that the emoval of the vetices in V dead can decease the size of this set by at most 2dk 1.ThentheemovaloftheedgesofE dead can futhe decease it by at most 5k 2. The addition of V add does not decease this numbe and finally, the addition of E add can decease it by 2k 4.Ask 1 + k 2 + k 4 k, wehavethath will have moe than (p 2) + (q +2) extemal edges, acontadiction as H contains exactly (p 2) + (q 2) q-extemal edges. find-max-band(g, q, c) Input: AgaphG, andtwopositiveintegesq,c Output: Retun a maximal length (3 + c,q)-band H 3+c,q whee c c. (3 + c,q)-band does not exists, then etun NO. If such a 1 Let E E (q) ext (G) 2 fo while E do begin let e be an edge in E. if find-edge-max-band(g, q, e) =H 3+c,q then end 3 etun NO if c c, thenetunh 3+c,q, othewise, set E E E whee E ae the q-intenal exteme edges ofh 3+c,q, othewise set E E {e} Lemma 4 Algoithm find-edge-max-band(g, q) is coect. In case of negative answe it uns in O(q E q ext (G) ) steps. In case of a positive answe it uns in O(qc Eq ext ) steps. Poof: Suppose that G can be tansfomed to H afte a sequence of edit opeations. We call a vetex v G safe if is not emoved by a vetex emoval opeation in this sequence. If a vetex of G is not live then we call it dead. We also say that an safe vetex v is a dity vetex if some of the edit opeations altes the set of edges incident to v in G (i.e. eithe adds o emoves some edge incident to v). If a safe vetex is not dity, when we 6
7 call it clean. Finally,wecallavetexofH that is not a vetex of G (i.e. was intoduced duing some vetex insetion opeation) new. Clealy, if dist(g, H) k, thenthee ae at most k new vetices in H and at most k dead vetices in G and this implies the following lemma. Lemma 5 Let G and H be two gaphs whee dist(g, H) k and such that the tansfomation of G to H involves k 1 vetex emovals and k 2 vetex additions. Then, V (H) k 2 V (G) V (H) + k 1. Poof: Lemma 6 Let G be a gaph such that dist(g, H p,q ) k. Supose also that G does not contain any (3 + c, q)-band whee q c>kand H p,q contains d dity vetices. Then p ( k q +3)(d + k +1). Poof: Assume that H p,q contains d dity vetices and at most k 3 = V in new vetices. Let l = k q.noticethath p,q contains p (l +3) 1distinct(butpossiblyovelapping) (l + 3,q)-bands. We denote this collection as B. A new vetex can be in columns at most l +3 membes of B and a dity vetex can be in columns of at most l +1 membes of B. If H contains a membe of B that does not contain columns with new vetices o inteio columns with dity vetices, then p (l +3)+1 k 3 (l +3) d(l +1)> 0. Theefoe p l +2+k 3 (l +3)+d(l +1) l +2+k(l +3)+d(l +1). Lemma 7 Let G be a gaph with a vetex v of degee moe than k +4 in G and let H p,q be a gid. Then any way to tansfom G to H p,q should involve the opeation of the emoval of v. Inpaticula,dist(G, H p,q ) k iff dist(g[v (G) v],h) k 1. Poof: Lemma 8 Let G be a gaph whee (G) b and let H be some gid. If dist(g, H) k then H will contain at most max{b, 2} k dity vetices. Poof: If v is a dity vetex of H this means that it is eithe adjacent to a vetex in V dead o is incident to an edge in E add E dead. Notice that each vetex in X dead is can be adjacent to at most b dity vetices of H. AlsoanedgeinE dead E dead can be incident to at most two dity vetices of H. Theefoe, each edit opeation ceates at most max{2,b} dity vetices and the esult follows. 3 Looking fo a given gid H p,q In this section, we show that the k-almost gid poblem is in FPT. The next lemma intoduces the function f to bound the size of the kenel. 7
8 Lemma 9 Let G be a gaph whee dist(g, H p,q ) k. supposealsothat (G) b and that G does not contain any (3 + c, q)-band whee c>k/qo any (3 + c, p)-band whee c>k/p.then V (G) f(k, b, p, q) whee f(k, b, p, q) = k + k 2 if p k and q k k +5k(b k + k +1) if min{p, q} k<max{p, q} k +16(b k + k +1) 2 if p>kand q>k Poof: Fom Lemma 5 we get that V (G) p q +k. FomLemma8,thedityvetices of H will be at most b k. Fom Lemma 6 we get that p ( k q +3)(b k + k +1) and q ( k q +3)(b k + k +1). If p k and q k then clealy V (G) k + k2. If q k then p ( k q +3)(b k + k +1) ( k q +4)(b k + k +1) and theefoe V (G) k+p q k+q( k q +4)(b k+k+1) k+5k(b k+k+1). The symmetic analysis woks when p k. Ifnowp, q > k then k q = k p =1andtheefoep, q 4(b k+k+1). We conclude that V (G) k +16(b k + k +1) 2. Kenel-fo-Check-Gid(G, p, q, k) Input: AgaphG, twopositiveintegesp, q, andanon-negativeintegek Output: Eithe etuns NO, meaning that that dist(g, H p,q ) >k, o etuns a gaph G and a tiple p,q,k such that dist(g, H p,q ) k iff dist(g,h p,q ) k. 0. Setk = k, G = G, p = p and q = q. 1. AslongasG has a vetex of degee k +4emove it fom G and set k k 1. If afte the end of this poccess k < 0thenetun NO. 2. Applyanyofthefollowingpoceduesaslongasthisispossible: As long as find-max-band(g,q, k q +1) = H 3+c,q,thenG = contact(g,h 3+c,q,c) and set p p c. As long as find-max-band(g,p, k p +1) = H 3+c,p,thenG = contact(g,h 3+c,p,c) and set q q c. 3 If V (G ) >f(k,k+4,p,q )thenetun NO. 4. etung,p,q,k. Theoem 1 Algoithm Kenel-fo-Check-Gid(G, p, q, k) is coect and if it outputs the gaph G then V (G ) f(k, k +4,p,q). Moeove,itunsinO(pq(p + q + k 2 )) steps. Poof: Step 1 is justified by Lemma 7. Notice that befoe the algoithm entes Step 2, (G) k + 4. Step 2 ceates equivalent instances of the poblem because of Lemma 1. Fom Lemma 4, Each time a contaction of step 2 is applied, the coesponding q- band (p-band) equies O(q c(p + q + k 2 )) (O(p c(p + q + k 2 ))) steps. As the the sum of the lengths of the bands cannot exceed q(p) weobtainthatstep2 equies, in total, O(pq(p+q +k 2 )) steps. Moeove, befoe the check of Step 3, alltheconditionsof 8
9 Lemma 9 ae satisfied and theefoe, if the algoithm etuns G,p,q,k,then V (G ) f(k,k+4,p,q ) f(k, k +4,p,q). Check-Gid(G, p, q, k) Input: AgaphG, twopositiveintegesp, q, andanon-negativeintegek Output: Eithe etuns NO, meaning that that dist(g, H p,q ) >k,o etuns a sequence of at most k opeations that tansfoms G to H p,q. 1. foanysetv dead V (G) ofatmostk vetices do if E(G[V (G) V dead ]) 2pq p q + k then fo any set E dead of at most k V dead edges of E(G[V dead ]) do fo any i =0,...,k V dead E dead do begin let G be the gaph obtained fom G afte the emoval of the vetices in V dead and the edges in E dead and the addition of a set V add of i new vetices. let S be the set of vetices in G with degee less than 4. if S 2p +2q 4+2k then do fo any E add S S whee E add k V dead E dead V add do if (V (G ),E(G ) E add )isisomophictoh p,q then etun asequencecontainingthesequenceofopeations 2. etun NO end defined by the sets V dead, E dead, V add,ande add Theoem 2 Algoithm Check-Gid(G, p, q, k) is coect and uns in O(16 k (2n +3k) 2k ) steps. Poof: we ecall the notation k 1 = V dead, k 2 = E dead, K 3 = V add and k 4 = E add. The fist fo of the algoithm guesses the set of vetices V dead that should be emoved while tansfoming G to H p,q.clealy,theeae ( n k) = O(n k 1 )waystomakethisguess. Fom Lemma 5 these guesses ae at most (pq + k 1 ) k 1. If this is a coect guess, then the emaining gaph will be a subgaph of H p,q with at most k edges moe. As H p,q has (p 1)q +(q 1)p edges, then G[V (G) V dead ]willhaveatmost2pq p q + k 2 edges and the filte of the algoithm befoe the second fo is coect. Thesecond fo guesses the set E dead of edges that should be emoved and thee ae at most ( 2pq p q+k2 k 2 ) (2pq + k2 ) k 2 ways to make such a guess. Then comes the tun to guess 9
10 the set of vetices V add that should be added towads constucting H p,q.aswecannot add moe than k 3 vetices, the thid fo makes at most k 3 calls one fo each possible quantity of vetices in V add.noticethatifalltheguessesdonesofaaecoect,g is a subgaph of H p,q with k 4 edges less than H p,q.ash p,q has 2(p 1)+2(q 1) vetices of degee less than 4 V (G )shouldcontainasubsets of at most 2p+2q 4+2k 4 vetices of degee less than 4 (an missing edge can ham the degee of at most 2 vetices). Clealy, the edges to add in G towads constucting H p,q will have endpoints in S and theefoe each choice of an edge to add will be done by a set of ( 2p+2q 4+2k 4 ) 2 4(p + q + k4 ) 2 candidate edges. As thee ae at most k 4 guesses of edges to be done in the fouth fo we finally have at most ( 4(p+q+k 4 ) ) 2 k 4 (4(p + q + k4 )) 2k 4 edge sets to guess. Afte than, we can veify whethe the esulting gaph is isomophic to H p,q,whichcanbedonein O(pq) steps. Resuming,thetotalunningtimeisO((pq + k 1 ) k1 (2pq + k 2 ) k2 k 3 (4(p + q + k 4 )) 2k4 pq) =O(16 k (p + q + k) 2k ). As p + q 2pq, usinglemma5weobseve that (p + q + k) 2pq + k 2(pq k)+3k 2n +3k and we have the equied time bound. Almost-gid(G, p, q, k) Input: AgaphG, twopositiveintegesp, q, andanon-negativeintegek Output: Eithe etuns NO, meaning that that dist(g, H p,q ) >k,o etuns a sequence of at most k opeations that tansfoms G to H p,q. 1. IfKenel-fo-Check-Gid(G, p, q, k) =(G,p,q,k )thenetuncheck-gid(g, p, q, k) 2. etun NO Theoem 3 Algotihm Almost-gid(G, p, q, k) solves the k-almost-gid poblem in 2 O(k log k) + O(n 3 ) steps. Poof: The algoithm we fist calls the algoithm Kenel-fo-Check-Gid(G, p, q, k) that gives some answe in O(pq(p + q + k 2 )) = O(n 3 )steps. etuns that dist(g, H p,q ) >k. Iftheansweis NO then If the algoithm etuns (G,p,q,k )thensolvek- Almost-Gid with input G,p,q,k using bute foce and etun the coesponding answe. Fom Theoem 1 we have that V (G ) k +16(k 2 +5k +1) 2 = O(k 4 ). Fom Theoem 2, Check-Gid(G, p, q, k) equies(o(k)) 8k steps. 4 Looking fo any gid Fo α, β, γ N, wedefinepods(α, β, γ) ={(p, q) N 2 p α and γ β p q γ + β}. 10
11 Clealy, to solve the k-almost some Gid poblem it is enough to apply Check- Gid(G, p, q, k) foall(p, q) A(n, k) = n k i n+k pods(i, n, k). Clealy, A(n, k) 2k 2 log(k + n). Theefoe, k-almost some Gid can be solved afte O(k 2 log(n + k)) calls of Almost-gid(G, p, q, k) whichgivesaunningtimeofo(log n)(2 O(k log k) )+ O(k 2 n 3 log n) steps. Wecallthisalgoithmcheck-all-cases(G, k). We stess that thee ae cases whee A(n, k) 1 2 log n and theefoe, that way, we may not avoid the log n -ovehead. In what emains we will explain an altenative appoach that gives unning times of the same type as the case of k-almost Gid. We call -band collection C of a gaph G acollectionof C -bands in G of widths s 1,...,s C whee no pai of them have common inteio vetices. The width of such a collection is equal to i=1,..., C (s i 2). find-max-band-collection(g,, w) Input: AgaphG and two positive integes and w Output: Retun YES ifg contains an -band collection of width w; othewise, etun NO. 1 Let E ext be the set of extemal edges of G, t 0 2 while E ext and t<wdo begin t 0 Let e be an edge in E ext set E E ext while find-edge-max-band(g,, e) =H 3+c, do begin set E E E whee E ae the exteme edges of H 3+c, set t t + c +1 let e be an edge in E end set E ext E ext {e} end 3 if t w then etun YES, othewise etun NO. Lemma 10 The algoithm find-max-band-collection(g,, w) is coect and uns in O(w E ext (G) + n) steps. Poof: 11
12 We fist need some conditions on when it is possible to make an estimation of the dimensions of a gid. Lemma 11 Let G be a gaph whee (G) b and let H p,q be a gid whee dist(g, H) k. Then If G does not contain any q-band collection of width > k then V (H) (b k +2) 2. Poof: H p,q contains a single element q-band collection C H of width p 2. We apply back the k opeations that tansfomed G to H. IfweemoveanedgeinY in,inthe wost case, its endpoints may belong in neighboing columns of C H and this can emove at most 2 units fom the width of C H.IfweaddbackanedgeinY out,inthewostcase, its endpoints may belong in diffeent columns of C H and this can emove at most 4 units fom the width of C H.IffinallyweaddbackavetexinX out,inthewostcase,allits neighbous will belong into diffeent columns and this may educe the width of C H by (G) b. Resuming, we have that G contains a q band collection of width at least p 2 e in e out b x out p 2 b k which implies that p b k +2. Woking symmetically, we also conclude that q b k +2andtheesultfollows. Lemma 12 Let G be a gaph whee (G) b and let H be a gid whee dist(g, H) k. Then if G contains an -band collection of width > 3k then H = H s, fo some s [ n k, n+k ]. Moeove at most two such -band collections exist and fo each, s will be unique when >2k. Poof: Let C be the inteio columns in such a collection of bands. We will apply the edit opeations that tansfom G to H. The emoval of a vetex in X out can educe the width of C by at most 3. of C by at most 3. The emoval of an edge in Y out can educe the width The addition of an edge in Y in can educe the width of C by at most 2. Theefoe, in the wost case, H still contains a collection of bands of width 3k +1 3k >1. So, thee exist at least one -band of width at least 1 in H and this means that H = H s, fo some s 1. Suppose now that thee ae thee integes 1 < 2 < 3 and that G contains an i -band collection of width > 3k, foi =1, 2, 3. Let also I i, =1, 2, 3betheinteio columns of each of these band collections. Clealy, fo any i<j,i i I j. Accoding to the pevious analysis, afte the edit opeations, thee, diffeent, size i -bands of width al least 1 will suvive which is impossible to exist in a ectangula gid. Notice now that s = n x out + x in. Let δ = x out x in. We obtain that s [n δ, n + δ] whichimpliesthats [ n k ]containstwointeges,then n+k [ n k, n+k, n+k ], as δ k. If now the inteval n k 1whichimpliesthat 2k. 12
13 Check-some-Gid(G, k) Input: A gaph Gand a non-negative intege k Output: The answe to the k-almost-some-gid poblem with instance G and paamete k. 1. As long as G has a vetex of degee k +4emove itfomg and 2. R set k k 1. If afte the end of this poccess k<0thenetun NO. 3. fo i =1,...,n,iffind-max-band-collection(G, i, 3k +1)= YES, then set R R {i} 4. If R =0thenif V (G) >k+((k +4)k +2) 2 then etun NO, othewise, goto Step 7 5. Fo any R, If >2k, then begin If N [ n k, n+k ]=, then etun NO, othewise, etun Almost-Gid(G,, s, k) whee{s} = N [ n k end othewise, fo (i, j) pods(2k,n,k), begin, n+k ]. If Almost-Gid(G, i, j, k) =YES, then etun Almost-Gid(G, i, j, k). end 6. Retun NO. 7. check-all-cases(g, k). Theoem 4 Algoithm Check-some-Gid(G, k) is coect and the k-almost-any-gid poblem is in FPT and can be solved in time 2 O(k log k) + O(k log k n 3 ). Poof: Step 1 is justified by Lemma 7 and we may assume that befoe the algoithm entes Step 2, (G) k +4. Steps 2 4 ae based on Lemma 11. Step 3 involves O(n) callsoffind-max-band-collection(g, i, 3k +1)whichequiesO(kn 2 )stepsbecause of Lemma 10. Theoefoe, Step 3 equies O(kn 3 )steps. FinallytheloopinStep5 is coect because of Lemma 12. Note that the fist loop in step 5 is applied at most 2 times and that pods(2k, n, k) = O(k log k). Theefoe, step 5 uns in 2 O(k log k) + O(k log k n 3 )steps. Aswenoticedinthebeginingofthissectioncheck-all-cases(G, k) equies O(log n )(2 O(k log k) + O(log n n 3 k 2 )) steps whee n is the numbe of vetices of G in step 7 whee n O(k 4 )andthismeansthatstep7 equies 2 O(k log k) steps. Refeences [1] N, Alon, R. Yuste and U. Zwick. Colo-Coding. Jounal of the ACM, 42(4), ,
14 [2] G. Downey and M. Fellows. Paameteized Complexity. Spinge-Velag,1999. [3] H. Kaplan, R. Shami and R. Tajan.. Tactability of paameteized completion poblems on chodal, stongly chodal and pope inteval gaphs. SIAM Jounal of Computing, 28, ,1999. [4] J. Lewis and M. Yannakakis. The node-deletion poblem fo heeditaypopeties is NP-Complete. Jounal Comput. and Systems Sci. 20(2), , [5] Leizhen Cai. Fixed-Paamete Tactability of Gaph Modification Poblems fo Heeditay Popeties. Infomation Pocessing Lettes, 58(4) , 1996 [6] B. Monien. How to find paths efficiently. Annals of Discete Mathematics, 25, , [7] A. Natanzon, R. Shami and R. Shaan. Complexity classification of some edge modification poblems. Discete Applied Mathematics, 113(1), ,2001. [8] T. Sebastian, P. Klein, and B. Kimia. Recognition of shapes by editing thei shock gaphs. IEEE Tansactions on Patten Matching and Machine Intelligence, 26, , [9] M. Yannakakis. Node and Edge Deletion NP-complete poblems. ACM Symposium on Theoy of Computing (STOC), ,1978. [10] K. Zhang and D. Sasha. Simple fast algoithms fo the editing distance between tees and elated poblems. SIAM Jounal on Computing 18, ,
MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION
MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION K.C. CHANG AND TAN ZHANG In memoy of Pofesso S.S. Chen Abstact. We combine heat flow method with Mose theoy, supe- and subsolution method with
More informationChapter 3 Savings, Present Value and Ricardian Equivalence
Chapte 3 Savings, Pesent Value and Ricadian Equivalence Chapte Oveview In the pevious chapte we studied the decision of households to supply hous to the labo maket. This decision was a static decision,
More informationUNIT CIRCLE TRIGONOMETRY
UNIT CIRCLE TRIGONOMETRY The Unit Cicle is the cicle centeed at the oigin with adius unit (hence, the unit cicle. The equation of this cicle is + =. A diagam of the unit cicle is shown below: + = - - -
More informationFinancing Terms in the EOQ Model
Financing Tems in the EOQ Model Habone W. Stuat, J. Columbia Business School New Yok, NY 1007 hws7@columbia.edu August 6, 004 1 Intoduction This note discusses two tems that ae often omitted fom the standad
More informationSoftware Engineering and Development
I T H E A 67 Softwae Engineeing and Development SOFTWARE DEVELOPMENT PROCESS DYNAMICS MODELING AS STATE MACHINE Leonid Lyubchyk, Vasyl Soloshchuk Abstact: Softwae development pocess modeling is gaining
More informationSTUDENT RESPONSE TO ANNUITY FORMULA DERIVATION
Page 1 STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION C. Alan Blaylock, Hendeson State Univesity ABSTRACT This pape pesents an intuitive appoach to deiving annuity fomulas fo classoom use and attempts
More informationApproximation Algorithms for Data Management in Networks
Appoximation Algoithms fo Data Management in Netwoks Chistof Kick Heinz Nixdof Institute and Depatment of Mathematics & Compute Science adebon Univesity Gemany kueke@upb.de Haald Räcke Heinz Nixdof Institute
More informationAN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM
AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM Main Golub Faculty of Electical Engineeing and Computing, Univesity of Zageb Depatment of Electonics, Micoelectonics,
More informationAn Efficient Group Key Agreement Protocol for Ad hoc Networks
An Efficient Goup Key Ageement Potocol fo Ad hoc Netwoks Daniel Augot, Raghav haska, Valéie Issany and Daniele Sacchetti INRIA Rocquencout 78153 Le Chesnay Fance {Daniel.Augot, Raghav.haska, Valéie.Issany,
More informationConcept and Experiences on using a Wiki-based System for Software-related Seminar Papers
Concept and Expeiences on using a Wiki-based System fo Softwae-elated Semina Papes Dominik Fanke and Stefan Kowalewski RWTH Aachen Univesity, 52074 Aachen, Gemany, {fanke, kowalewski}@embedded.wth-aachen.de,
More informationOver-encryption: Management of Access Control Evolution on Outsourced Data
Ove-encyption: Management of Access Contol Evolution on Outsouced Data Sabina De Capitani di Vimecati DTI - Univesità di Milano 26013 Cema - Italy decapita@dti.unimi.it Stefano Paaboschi DIIMM - Univesità
More informationModeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN
Modeling and Veifying a Pice Model fo Congestion Contol in Compute Netwoks Using PROMELA/SPIN Clement Yuen and Wei Tjioe Depatment of Compute Science Univesity of Toonto 1 King s College Road, Toonto,
More informationQuestions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing
M13914 Questions & Answes Chapte 10 Softwae Reliability Pediction, Allocation and Demonstation Testing 1. Homewok: How to deive the fomula of failue ate estimate. λ = χ α,+ t When the failue times follow
More informationNURBS Drawing Week 5, Lecture 10
CS 43/585 Compute Gaphics I NURBS Dawing Week 5, Lectue 1 David Been, William Regli and Maim Pesakhov Geometic and Intelligent Computing Laboato Depatment of Compute Science Deel Univesit http://gicl.cs.deel.edu
More informationNontrivial lower bounds for the least common multiple of some finite sequences of integers
J. Numbe Theoy, 15 (007), p. 393-411. Nontivial lowe bounds fo the least common multiple of some finite sequences of integes Bai FARHI bai.fahi@gmail.com Abstact We pesent hee a method which allows to
More informationTop K Nearest Keyword Search on Large Graphs
Top K Neaest Keywod Seach on Lage Gaphs Miao Qiao, Lu Qin, Hong Cheng, Jeffey Xu Yu, Wentao Tian The Chinese Univesity of Hong Kong, Hong Kong, China {mqiao,lqin,hcheng,yu,wttian}@se.cuhk.edu.hk ABSTRACT
More informationWeek 3-4: Permutations and Combinations
Week 3-4: Pemutations and Combinations Febuay 24, 2016 1 Two Counting Pinciples Addition Pinciple Let S 1, S 2,, S m be disjoint subsets of a finite set S If S S 1 S 2 S m, then S S 1 + S 2 + + S m Multiplication
More informationSeshadri constants and surfaces of minimal degree
Seshadi constants and sufaces of minimal degee Wioletta Syzdek and Tomasz Szembeg Septembe 29, 2007 Abstact In [] we showed that if the multiple point Seshadi constants of an ample line bundle on a smooth
More informationSpirotechnics! September 7, 2011. Amanda Zeringue, Michael Spannuth and Amanda Zeringue Dierential Geometry Project
Spiotechnics! Septembe 7, 2011 Amanda Zeingue, Michael Spannuth and Amanda Zeingue Dieential Geomety Poject 1 The Beginning The geneal consensus of ou goup began with one thought: Spiogaphs ae awesome.
More informationINITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS
INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS Vesion:.0 Date: June 0 Disclaime This document is solely intended as infomation fo cleaing membes and othes who ae inteested in
More informationCoordinate Systems L. M. Kalnins, March 2009
Coodinate Sstems L. M. Kalnins, Mach 2009 Pupose of a Coodinate Sstem The pupose of a coodinate sstem is to uniquel detemine the position of an object o data point in space. B space we ma liteall mean
More informationRisk Sensitive Portfolio Management With Cox-Ingersoll-Ross Interest Rates: the HJB Equation
Risk Sensitive Potfolio Management With Cox-Ingesoll-Ross Inteest Rates: the HJB Equation Tomasz R. Bielecki Depatment of Mathematics, The Notheasten Illinois Univesity 55 Noth St. Louis Avenue, Chicago,
More informationMining Relatedness Graphs for Data Integration
Mining Relatedness Gaphs fo Data Integation Jeemy T. Engle (jtengle@indiana.edu) Ying Feng (yingfeng@indiana.edu) Robet L. Goldstone (goldsto@indiana.edu) Indiana Univesity Bloomington, IN. 47405 USA Abstact
More informationSymmetric polynomials and partitions Eugene Mukhin
Symmetic polynomials and patitions Eugene Mukhin. Symmetic polynomials.. Definition. We will conside polynomials in n vaiables x,..., x n and use the shotcut p(x) instead of p(x,..., x n ). A pemutation
More informationest using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years.
9.2 Inteest Objectives 1. Undestand the simple inteest fomula. 2. Use the compound inteest fomula to find futue value. 3. Solve the compound inteest fomula fo diffeent unknowns, such as the pesent value,
More informationThe Binomial Distribution
The Binomial Distibution A. It would be vey tedious if, evey time we had a slightly diffeent poblem, we had to detemine the pobability distibutions fom scatch. Luckily, thee ae enough similaities between
More informationSaturated and weakly saturated hypergraphs
Satuated and weakly satuated hypegaphs Algebaic Methods in Combinatoics, Lectues 6-7 Satuated hypegaphs Recall the following Definition. A family A P([n]) is said to be an antichain if we neve have A B
More informationCarter-Penrose diagrams and black holes
Cate-Penose diagams and black holes Ewa Felinska The basic intoduction to the method of building Penose diagams has been pesented, stating with obtaining a Penose diagam fom Minkowski space. An example
More informationUncertain Version Control in Open Collaborative Editing of Tree-Structured Documents
Uncetain Vesion Contol in Open Collaboative Editing of Tee-Stuctued Documents M. Lamine Ba Institut Mines Télécom; Télécom PaisTech; LTCI Pais, Fance mouhamadou.ba@ telecom-paistech.f Talel Abdessalem
More informationIlona V. Tregub, ScD., Professor
Investment Potfolio Fomation fo the Pension Fund of Russia Ilona V. egub, ScD., Pofesso Mathematical Modeling of Economic Pocesses Depatment he Financial Univesity unde the Govenment of the Russian Fedeation
More informationSUPPORT VECTOR MACHINE FOR BANDWIDTH ANALYSIS OF SLOTTED MICROSTRIP ANTENNA
Intenational Jounal of Compute Science, Systems Engineeing and Infomation Technology, 4(), 20, pp. 67-7 SUPPORT VECTOR MACHIE FOR BADWIDTH AALYSIS OF SLOTTED MICROSTRIP ATEA Venmathi A.R. & Vanitha L.
More informationResearch on Risk Assessment of the Transformer Based on Life Cycle Cost
ntenational Jounal of Smat Gid and lean Enegy eseach on isk Assessment of the Tansfome Based on Life ycle ost Hui Zhou a, Guowei Wu a, Weiwei Pan a, Yunhe Hou b, hong Wang b * a Zhejiang Electic Powe opoation,
More informationON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS
ON THE R POLICY IN PRODUCTION-INVENTORY SYSTEMS Saifallah Benjaafa and Joon-Seok Kim Depatment of Mechanical Engineeing Univesity of Minnesota Minneapolis MN 55455 Abstact We conside a poduction-inventoy
More informationMETHODOLOGICAL APPROACH TO STRATEGIC PERFORMANCE OPTIMIZATION
ETHODOOGICA APPOACH TO STATEGIC PEFOANCE OPTIIZATION ao Hell * Stjepan Vidačić ** Željo Gaača *** eceived: 4. 07. 2009 Peliminay communication Accepted: 5. 0. 2009 UDC 65.02.4 This pape pesents a matix
More informationReduced Pattern Training Based on Task Decomposition Using Pattern Distributor
> PNN05-P762 < Reduced Patten Taining Based on Task Decomposition Using Patten Distibuto Sheng-Uei Guan, Chunyu Bao, and TseNgee Neo Abstact Task Decomposition with Patten Distibuto (PD) is a new task
More informationHow To Write A Theory Of The Concept Of The Mind In A Quey
Jounal of Atificial Intelligence Reseach 31 (2008) 157-204 Submitted 06/07; published 01/08 Conjunctive Quey Answeing fo the Desciption Logic SHIQ Bite Glimm Ian Hoocks Oxfod Univesity Computing Laboatoy,
More informationContinuous Compounding and Annualization
Continuous Compounding and Annualization Philip A. Viton Januay 11, 2006 Contents 1 Intoduction 1 2 Continuous Compounding 2 3 Pesent Value with Continuous Compounding 4 4 Annualization 5 5 A Special Poblem
More informationA framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods
A famewok fo the selection of entepise esouce planning (ERP) system based on fuzzy decision making methods Omid Golshan Tafti M.s student in Industial Management, Univesity of Yazd Omidgolshan87@yahoo.com
More informationCollege Enrollment, Dropouts and Option Value of Education
College Enollment, Dopouts and Option Value of Education Ozdagli, Ali Tachte, Nicholas y Febuay 5, 2008 Abstact Psychic costs ae the most impotant component of the papes that ae tying to match empiical
More informationAutomatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN*
Automatic Testing of Neighbo Discovey Potocol Based on FSM and TTCN* Zhiliang Wang, Xia Yin, Haibin Wang, and Jianping Wu Depatment of Compute Science, Tsinghua Univesity Beijing, P. R. China, 100084 Email:
More informationHow To Find The Optimal Stategy For Buying Life Insuance
Life Insuance Puchasing to Reach a Bequest Ehan Bayakta Depatment of Mathematics, Univesity of Michigan Ann Abo, Michigan, USA, 48109 S. David Pomislow Depatment of Mathematics, Yok Univesity Toonto, Ontaio,
More informationStrength Analysis and Optimization Design about the key parts of the Robot
Intenational Jounal of Reseach in Engineeing and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Pint): 2320-9356 www.ijes.og Volume 3 Issue 3 ǁ Mach 2015 ǁ PP.25-29 Stength Analysis and Optimization Design
More informationChris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment
Chis J. Skinne The pobability of identification: applying ideas fom foensic statistics to disclosue isk assessment Aticle (Accepted vesion) (Refeeed) Oiginal citation: Skinne, Chis J. (2007) The pobability
More informationTowards Automatic Update of Access Control Policy
Towads Automatic Update of Access Contol Policy Jinwei Hu, Yan Zhang, and Ruixuan Li Intelligent Systems Laboatoy, School of Computing and Mathematics Univesity of Westen Sydney, Sydney 1797, Austalia
More informationThe Supply of Loanable Funds: A Comment on the Misconception and Its Implications
JOURNL OF ECONOMICS ND FINNCE EDUCTION Volume 7 Numbe 2 Winte 2008 39 The Supply of Loanable Funds: Comment on the Misconception and Its Implications. Wahhab Khandke and mena Khandke* STRCT Recently Fields-Hat
More informationCloud Service Reliability: Modeling and Analysis
Cloud Sevice eliability: Modeling and Analysis Yuan-Shun Dai * a c, Bo Yang b, Jack Dongaa a, Gewei Zhang c a Innovative Computing Laboatoy, Depatment of Electical Engineeing & Compute Science, Univesity
More informationYARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH
nd INTERNATIONAL TEXTILE, CLOTHING & ESIGN CONFERENCE Magic Wold of Textiles Octobe 03 d to 06 th 004, UBROVNIK, CROATIA YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH Jana VOBOROVA; Ashish GARG; Bohuslav
More informationAn Introduction to Omega
An Intoduction to Omega Con Keating and William F. Shadwick These distibutions have the same mean and vaiance. Ae you indiffeent to thei isk-ewad chaacteistics? The Finance Development Cente 2002 1 Fom
More informationHow to create a default user profile in Windows 7
AnswesThatWok TM How to ceate a default use pofile in Windows 7 (Win 7) How to ceate a default use pofile in Windows 7 When to use this document Use this document wheneve you want to ceate a default use
More informationPAN STABILITY TESTING OF DC CIRCUITS USING VARIATIONAL METHODS XVIII - SPETO - 1995. pod patronatem. Summary
PCE SEMINIUM Z PODSTW ELEKTOTECHNIKI I TEOII OBWODÓW 8 - TH SEMIN ON FUNDMENTLS OF ELECTOTECHNICS ND CICUIT THEOY ZDENĚK BIOLEK SPŠE OŽNO P.., CZECH EPUBLIC DLIBO BIOLEK MILITY CDEMY, BNO, CZECH EPUBLIC
More informationEfficient Redundancy Techniques for Latency Reduction in Cloud Systems
Efficient Redundancy Techniques fo Latency Reduction in Cloud Systems 1 Gaui Joshi, Emina Soljanin, and Gegoy Wonell Abstact In cloud computing systems, assigning a task to multiple seves and waiting fo
More informationComparing Availability of Various Rack Power Redundancy Configurations
Compaing Availability of Vaious Rack Powe Redundancy Configuations By Victo Avela White Pape #48 Executive Summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance the availability
More informationFigure 2. So it is very likely that the Babylonians attributed 60 units to each side of the hexagon. Its resulting perimeter would then be 360!
1. What ae angles? Last time, we looked at how the Geeks intepeted measument of lengths. Howeve, as fascinated as they wee with geomety, thee was a shape that was much moe enticing than any othe : the
More informationSemipartial (Part) and Partial Correlation
Semipatial (Pat) and Patial Coelation his discussion boows heavily fom Applied Multiple egession/coelation Analysis fo the Behavioal Sciences, by Jacob and Paticia Cohen (975 edition; thee is also an updated
More informationChannel selection in e-commerce age: A strategic analysis of co-op advertising models
Jounal of Industial Engineeing and Management JIEM, 013 6(1):89-103 Online ISSN: 013-0953 Pint ISSN: 013-843 http://dx.doi.og/10.396/jiem.664 Channel selection in e-commece age: A stategic analysis of
More informationStatistics and Data Analysis
Pape 274-25 An Extension to SAS/OR fo Decision System Suppot Ali Emouznead Highe Education Funding Council fo England, Nothavon house, Coldhabou Lane, Bistol, BS16 1QD U.K. ABSTRACT This pape exploes the
More informationThe transport performance evaluation system building of logistics enterprises
Jounal of Industial Engineeing and Management JIEM, 213 6(4): 194-114 Online ISSN: 213-953 Pint ISSN: 213-8423 http://dx.doi.og/1.3926/jiem.784 The tanspot pefomance evaluation system building of logistics
More informationCHAPTER 10 Aggregate Demand I
CHAPTR 10 Aggegate Demand I Questions fo Review 1. The Keynesian coss tells us that fiscal policy has a multiplied effect on income. The eason is that accoding to the consumption function, highe income
More informationEffect of Contention Window on the Performance of IEEE 802.11 WLANs
Effect of Contention Window on the Pefomance of IEEE 82.11 WLANs Yunli Chen and Dhama P. Agawal Cente fo Distibuted and Mobile Computing, Depatment of ECECS Univesity of Cincinnati, OH 45221-3 {ychen,
More information2. TRIGONOMETRIC FUNCTIONS OF GENERAL ANGLES
. TRIGONOMETRIC FUNCTIONS OF GENERAL ANGLES In ode to etend the definitions of the si tigonometic functions to geneal angles, we shall make use of the following ideas: In a Catesian coodinate sstem, an
More informationExplicit, analytical solution of scaling quantum graphs. Abstract
Explicit, analytical solution of scaling quantum gaphs Yu. Dabaghian and R. Blümel Depatment of Physics, Wesleyan Univesity, Middletown, CT 06459-0155, USA E-mail: ydabaghian@wesleyan.edu (Januay 6, 2003)
More informationModel Question Paper Mathematics Class XII
Model Question Pape Mathematics Class XII Time Allowed : 3 hous Maks: 100 Ma: Geneal Instuctions (i) The question pape consists of thee pats A, B and C. Each question of each pat is compulsoy. (ii) Pat
More informationConverting knowledge Into Practice
Conveting knowledge Into Pactice Boke Nightmae srs Tend Ride By Vladimi Ribakov Ceato of Pips Caie 20 of June 2010 2 0 1 0 C o p y i g h t s V l a d i m i R i b a k o v 1 Disclaime and Risk Wanings Tading
More informationInteger sequences from walks in graphs
otes on umbe Theoy and Discete Mathematics Vol. 9, 3, o. 3, 78 84 Intege seuences fom walks in gahs Enesto Estada, and José A. de la Peña Deatment of Mathematics and Statistics, Univesity of Stathclyde
More informationVISCOSITY OF BIO-DIESEL FUELS
VISCOSITY OF BIO-DIESEL FUELS One of the key assumptions fo ideal gases is that the motion of a given paticle is independent of any othe paticles in the system. With this assumption in place, one can use
More informationHEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING
U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available
More informationOffice of Family Assistance. Evaluation Resource Guide for Responsible Fatherhood Programs
Office of Family Assistance Evaluation Resouce Guide fo Responsible Fathehood Pogams Contents Intoduction........................................................ 4 Backgound..........................................................
More information10. Collisions. Before During After
10. Collisions Use conseation of momentum and enegy and the cente of mass to undestand collisions between two objects. Duing a collision, two o moe objects exet a foce on one anothe fo a shot time: -F(t)
More informationThings to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request.
Retiement Benefit 1 Things to Remembe Complete all of the sections on the Retiement Benefit fom that apply to you equest. If this is an initial equest, and not a change in a cuent distibution, emembe to
More informationUnveiling the MPLS Structure on Internet Topology
Unveiling the MPLS Stuctue on Intenet Topology Gabiel Davila Revelo, Mauicio Andeson Ricci, Benoit Donnet, José Ignacio Alvaez-Hamelin INTECIN, Facultad de Ingenieía, Univesidad de Buenos Aies Agentina
More informationComparing Availability of Various Rack Power Redundancy Configurations
Compaing Availability of Vaious Rack Powe Redundancy Configuations White Pape 48 Revision by Victo Avela > Executive summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance
More informationQuestions for Review. By buying bonds This period you save s, next period you get s(1+r)
MACROECONOMICS 2006 Week 5 Semina Questions Questions fo Review 1. How do consumes save in the two-peiod model? By buying bonds This peiod you save s, next peiod you get s() 2. What is the slope of a consume
More informationOptimal Peer Selection in a Free-Market Peer-Resource Economy
Optimal Pee Selection in a Fee-Maket Pee-Resouce Economy Micah Adle, Rakesh Kuma, Keith Ross, Dan Rubenstein, David Tune and David D Yao Dept of Compute Science Univesity of Massachusetts Amhest, MA; Email:
More informationResearch Article A Reputation-Based Identity Management Model for Cloud Computing
Mathematical Poblems in Engineeing Volume 2015, Aticle ID 238245, 15 pages http://dx.doi.og/10.1155/2015/238245 Reseach Aticle A Reputation-Based Identity Management Model fo Cloud Computing Lifa Wu, 1
More informationPhysics 235 Chapter 5. Chapter 5 Gravitation
Chapte 5 Gavitation In this Chapte we will eview the popeties of the gavitational foce. The gavitational foce has been discussed in geat detail in you intoductoy physics couses, and we will pimaily focus
More informationData Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation
(213) 1 28 Data Cente Demand Response: Avoiding the Coincident Peak via Wokload Shifting and Local Geneation Zhenhua Liu 1, Adam Wieman 1, Yuan Chen 2, Benjamin Razon 1, Niangjun Chen 1 1 Califonia Institute
More informationModel-Driven Engineering of Adaptation Engines for Self-Adaptive Software: Executable Runtime Megamodels
Model-Diven Engineeing of Adaptation Engines fo Self-Adaptive Softwae: Executable Runtime Megamodels Thomas Vogel, Holge Giese Technische Beichte N. 66 des Hasso-Plattne-Instituts fü Softwaesystemtechnik
More informationValuation of Floating Rate Bonds 1
Valuation of Floating Rate onds 1 Joge uz Lopez us 316: Deivative Secuities his note explains how to value plain vanilla floating ate bonds. he pupose of this note is to link the concepts that you leaned
More informationLiquidity and Insurance for the Unemployed
Liquidity and Insuance fo the Unemployed Robet Shime Univesity of Chicago and NBER shime@uchicago.edu Iván Wening MIT, NBER and UTDT iwening@mit.edu Fist Daft: July 15, 2003 This Vesion: Septembe 22, 2005
More informationPromised Lead-Time Contracts Under Asymmetric Information
OPERATIONS RESEARCH Vol. 56, No. 4, July August 28, pp. 898 915 issn 3-364X eissn 1526-5463 8 564 898 infoms doi 1.1287/ope.18.514 28 INFORMS Pomised Lead-Time Contacts Unde Asymmetic Infomation Holly
More informationVector Calculus: Are you ready? Vectors in 2D and 3D Space: Review
Vecto Calculus: Ae you eady? Vectos in D and 3D Space: Review Pupose: Make cetain that you can define, and use in context, vecto tems, concepts and fomulas listed below: Section 7.-7. find the vecto defined
More informationINVESTIGATION OF FLOW INSIDE AN AXIAL-FLOW PUMP OF GV IMP TYPE
1 INVESTIGATION OF FLOW INSIDE AN AXIAL-FLOW PUMP OF GV IMP TYPE ANATOLIY A. YEVTUSHENKO 1, ALEXEY N. KOCHEVSKY 1, NATALYA A. FEDOTOVA 1, ALEXANDER Y. SCHELYAEV 2, VLADIMIR N. KONSHIN 2 1 Depatment of
More informationLoad Balancing in Processor Sharing Systems
Load Balancing in ocesso Shaing Systems Eitan Altman INRIA Sophia Antipolis 2004, oute des Lucioles 06902 Sophia Antipolis, Fance altman@sophia.inia.f Utzi Ayesta LAAS-CNRS Univesité de Toulouse 7, Avenue
More informationLoad Balancing in Processor Sharing Systems
Load Balancing in ocesso Shaing Systems Eitan Altman INRIA Sophia Antipolis 2004, oute des Lucioles 06902 Sophia Antipolis, Fance altman@sophia.inia.f Utzi Ayesta LAAS-CNRS Univesité de Toulouse 7, Avenue
More informationSTABILITY ANALYSIS IN MILLING BASED ON OPERATIONAL MODAL DATA 1. INTRODUCTION
Jounal of Machine Engineeing, Vol. 11, No. 4, 211 Batosz POWALKA 1 Macin CHODZKO 1 Kzysztof JEMIELNIAK 2 milling, chatte, opeational modal analysis STABILITY ANALYSIS IN MILLING BASED ON OPERATIONAL MODAL
More informationOptimal Capital Structure with Endogenous Bankruptcy:
Univesity of Pisa Ph.D. Pogam in Mathematics fo Economic Decisions Leonado Fibonacci School cotutelle with Institut de Mathématique de Toulouse Ph.D. Dissetation Optimal Capital Stuctue with Endogenous
More informationInstructions to help you complete your enrollment form for HPHC's Medicare Supplemental Plan
Instuctions to help you complete you enollment fom fo HPHC's Medicae Supplemental Plan Thank you fo applying fo membeship to HPHC s Medicae Supplement plan. Pio to submitting you enollment fom fo pocessing,
More informationContingent capital with repeated interconversion between debt and equity
Contingent capital with epeated inteconvesion between debt and equity Zhaojun Yang 1, Zhiming Zhao School of Finance and Statistics, Hunan Univesity, Changsha 410079, China Abstact We develop a new type
More informationTransmittal 198 Date: DECEMBER 9, 2005. SUBJECT: Termination of the Existing Eligibility-File Based Crossover Process at All Medicare Contractors
anual ystem Depatment of ealth & uman evices (D) entes fo edicae & Pub 100-20 One-Time Notification edicaid evices () Tansmittal 198 Date: DEEBE 9, 2005 hange equest 4231 UBJET: Temination of the Existing
More informationMechanics 1: Motion in a Central Force Field
Mechanics : Motion in a Cental Foce Field We now stud the popeties of a paticle of (constant) ass oving in a paticula tpe of foce field, a cental foce field. Cental foces ae ve ipotant in phsics and engineeing.
More informationHow to create RAID 1 mirroring with a hard disk that already has data or an operating system on it
AnswesThatWok TM How to set up a RAID1 mio with a dive which aleady has Windows installed How to ceate RAID 1 mioing with a had disk that aleady has data o an opeating system on it Date Company PC / Seve
More informationSupporting Efficient Top-k Queries in Type-Ahead Search
Suppoting Efficient Top-k Queies in Type-Ahead Seach Guoliang Li Jiannan Wang Chen Li Jianhua Feng Depatment of Compute Science, Tsinghua National Laboatoy fo Infomation Science and Technology (TNList),
More informationExperimentation under Uninsurable Idiosyncratic Risk: An Application to Entrepreneurial Survival
Expeimentation unde Uninsuable Idiosyncatic Risk: An Application to Entepeneuial Suvival Jianjun Miao and Neng Wang May 28, 2007 Abstact We popose an analytically tactable continuous-time model of expeimentation
More informationCONCEPTUAL FRAMEWORK FOR DEVELOPING AND VERIFICATION OF ATTRIBUTION MODELS. ARITHMETIC ATTRIBUTION MODELS
CONCEPUAL FAMEOK FO DEVELOPING AND VEIFICAION OF AIBUION MODELS. AIHMEIC AIBUION MODELS Yui K. Shestopaloff, is Diecto of eseach & Deelopment at SegmentSoft Inc. He is a Docto of Sciences and has a Ph.D.
More informationLab #7: Energy Conservation
Lab #7: Enegy Consevation Photo by Kallin http://www.bungeezone.com/pics/kallin.shtml Reading Assignment: Chapte 7 Sections 1,, 3, 5, 6 Chapte 8 Sections 1-4 Intoduction: Pehaps one of the most unusual
More informationLiquidity and Insurance for the Unemployed*
Fedeal Reseve Bank of Minneapolis Reseach Depatment Staff Repot 366 Decembe 2005 Liquidity and Insuance fo the Unemployed* Robet Shime Univesity of Chicago and National Bueau of Economic Reseach Iván Wening
More informationVoltage ( = Electric Potential )
V-1 of 9 Voltage ( = lectic Potential ) An electic chage altes the space aound it. Thoughout the space aound evey chage is a vecto thing called the electic field. Also filling the space aound evey chage
More informationScheduling Hadoop Jobs to Meet Deadlines
Scheduling Hadoop Jobs to Meet Deadlines Kamal Kc, Kemafo Anyanwu Depatment of Compute Science Noth Caolina State Univesity {kkc,kogan}@ncsu.edu Abstact Use constaints such as deadlines ae impotant equiements
More informationSecure Smartcard-Based Fingerprint Authentication
Secue Smatcad-Based Fingepint Authentication [full vesion] T. Chales Clancy Compute Science Univesity of Mayland, College Pak tcc@umd.edu Nega Kiyavash, Dennis J. Lin Electical and Compute Engineeing Univesity
More informationNUCLEAR MAGNETIC RESONANCE
19 Jul 04 NMR.1 NUCLEAR MAGNETIC RESONANCE In this expeiment the phenomenon of nuclea magnetic esonance will be used as the basis fo a method to accuately measue magnetic field stength, and to study magnetic
More information