Fast FPT-algorithms for cleaning grids

Size: px
Start display at page:

Download "Fast FPT-algorithms for cleaning grids"

Transcription

1 Fast FPT-algoithms fo cleaning gids Josep Diaz Dimitios M. Thilikos Abstact We conside the poblem that given a gaph G and a paamete k asks whethe the edit distance of G and a ectangula gid is at most k. Weexaminethegenealcase whee the edit opeation ae vetex/edge emovals and additions. If the dimensions of the gid ae given in advance, then we give a paameteized algoithm that uns in 2 O(log k k) + O(n 3 )steps.inthecasewheethedimensionsofthegidaenotgiven we give a paameteized algoithm that uns in 2 O(log k k) + O(k log k n 3 )steps. We insist on paameteized algoithms with unning times whee the elation between the polynomial and the non-polynomial pat is additive. Fo this, ou algoithm design is based on the technique of kenelization. In paticula we pove that fo each vesion of the above poblem thee exists a kenel of size O(k 4 ). 1 Intoduction An inteesting poblem with many applications in Compute Science is the poblem of measuing the degee of similaity of two gaphs G and H, wheebydegeeofsimilaity is conside to be the minimum numbe of edit opeations (inset, delete, and modify) needed to tansfom one gaph into the othe. This measue of similaity between gaphs is also denoted as the edit distance by analogy with the elated poblem on stings. A paticulaly impotant application has been the ecognition of objects and shapes, whee the objects ae epesented by special type of labelled tees and use the opeations, deletion, insetion and elabelling of nodes. The poblem is NP-Complete in geneal gaphs and can be computed by dynamic pogamming in polynomial time (see fo ex. [10]). Futhe wok has been done of computing the edit distance of moe involve weighted tees, called shock tees, using and extended sets of opeations: slice of edges, contact of edges, defom of edges, (see fo ex. [8]) In this pape, we conside decision poblems associated with theeditingdistance between G and H when H is a gid of size p q (we call such gid (p, q)-gid and we denote it as H p,q ). An edit opeation on a gaph G can be eithe the emoval o the insetion of eithe an edge o a vetex. We epesent these opeations by the membes Depatament de Llenguatges i Sistemes Infomàtics, Univesitat Politècnica de Catalunya, Campus Nod Edifici Ω, c/jodi Giona Salgado 1-3, E-08034, Bacelona, Spain. This eseach was suppoted by the spanish CICYT poject TIN (GRAMMARS). The fist autho was patially suppoted by the Distinció pe a la Pomoció de la Receca de la GC, s:{diaz,sedthilk}@lsi.upc.edu 1

2 of the set U = {e-out, e-in, v-out, v-in}. Given E U,wedenoteE-dist(G, H) asthe edit distance of G and H with espect to E, whichistheminimumnumbeofopeations in the set E that when applied to G can tansfom it to H. Ou study adopts the point of view of paameteized complexity intoduced by Downey and Fellows (see [2]). We conside paameteizations ofhadpoblems,i.e. poblems whose input contains some (in geneal small) paamete k and a some main pat. A paameteized poblem belongs in the class FPT if it can be solved by an algoithm of time complexity g(k) n O(1) whee g is a supe-polynomial function of k and n is the size of the poblem (we call such an algoithm FPT-algoithm). A popula technique on the design of paameteized algoithms is kenelization. Biefly,thistechnique, consists in finding a polynomial time eduction of a paameteized poblem to itself in awaythatthesizesoftheinstancesofthenewpoblem,wecallitkenel depend only on the paamete k. The function that bounds the size of the main pat of the educed poblem detemines the size of the kenel and is usually of polynomial (on k) size. Clealy, a paameteized poblem admits a eduction to a poblem kenel, then it is in FPT because any bute foce algoithm can solve the educed poblem in time that does not depend on the main pat of the oiginal poblem. Notice also that this technique povides FPT-algoithms of time complexity g(k)+n O(1) whee the non-polynomial pat g(k) isjustadditivetotheoveallcomplexity. The fist esult of this pape is the classification in FPT of the following poblem by giving a kenel of size O(k 4 )oo(k 3 )dependingonthesizeofthegidweaelooking fo (see Section 3) k-almost gid Input: AgaphG, twopositiveintegesp, q, anon-negativeintegek, andasete U. Paamete: Anon-negativeintegek. Question: Can G be tansfomed to a (p, q)-gid afte at most k edit opeations fom E? Notice that the non-paameteized vesion of k-almost Gid is NP-complete, as the poblem with q = 1andwithE consisting only in the easing a vetex opeation, is equivalent to the Longest Path poblem, i.e. the poblem of given a gaph G and aconstantk 0decideifG contains a simple path of length at least k (we just set k V (G) k). Theefoe, ou paameteization also includes the dual paameteization of the Longest Path, inthesensethatnowthepaameteisnotthelength of the path but the numbe of vetices in G that ae absent in such a path. The pimal paameteization of the Longest Path poblem was known to be in FTP 1 [6, 1]. 1 In an abuse of notation, we indistinctly efe to FPT poblem o to poblem in the FPT class 2

3 Howeve, no esult was known, so fa, fo he dual paameteiztion of Longest Path. In Section 4 we conside the following moe geneal poblem: k-almost some Gid Input: AgaphG and a set E U. Paamete: Anon-negativeintegek. Question: Decide if thee exist some pai p, q such that G-dist(G, H p,q ) k. Clealy, the above poblem can be solved applying the algoithm fo k-almost Gid fo all possible values of p and q. This implies an algoithm of time complexity O(log n(g(k) +n O(1) )). In Section 4, we explain how to avoid this O(log n) ovehead and pove that thee exists also a time O(g(k) +n O(1) )algoithmfothek-almost some Gid poblem. That way, both of ou algoithms can be seen as pe-pocessing algoithms that educe the size of the poblem input to a function depending only on the paamete k and not on the main pat of the poblem. Adiffeentbutsomehowelatedsetsofpoblems,whichhave eceived plenty of attention is the following: Given a gaph G and a popety Π, decide what is the minimum numbe of edges (nodes) that must be emoved to obtain asubgaphofg with popety Π. In geneal all these poblems ae NP-complete [9, 4, 7]. Some of those poblems have been studied fom the paameteized point of view [5], howeve, all these poblems have the chaacteistic that the popety Π must be an heeditay popety. We stess that the k-almost Gid and k-almost any Gid poblems completely diffeent natue, as the popety of containing a gid is not heeditay. 2 Definitions and basic esults All gaphs we conside ae undiected, loop-less and without multipleedges. Define the neighbouhood of a vetex v V (G) asn G (v) ={u V (G) (u, v) E(G)}. Let (G) =max{ N G (v) v V (G)} (i.e. (G) isthemaximumdegeeofavetexina gaph). We call (p, q)-gid any gaph H p,q that is isomophic to a gaph with vetex set {0,...,p 1} {0,...,q 1} and edge set {{(i, j), (k, l)} (i, j), (k, l) V (H) and i k + j l =1}. The -bode of H s, is defined as B () (H s, )=((i, 0), (i, 1) i =1,..., 1). We call a vetex (edge) of H s, intenal if it is not in (none of its endpoints is in) B () (H s, ). 3

4 Figue 1: A gaph G whee dist(g, H 15,15 ) 13 with a (6, 15)-band J in it and the esult of a 3-contaction of J in G. All the algoithms and esults in this pape will be fo the geneal case whee E = U. The othe cases ae staightfowad simplifications of ou esults 2.Subsequently,wewill also dop the E pat in the E-dist(G, H) notation.ifdist(g, H) k we will denote as V dead /E dead the vetices/edge that should be emoved and V add /E add the vetices/edges that should be added towads tansfoming G to H. Without loss of geneality, we assume that the tansfomation pocedue gives pioity fist to vetex emovals then to edge emovals, then to vetex insetions, and finally to edge insetions. We also use the notation k 1 = V dead, k 2 = E dead, K 3 = V add and k 4 = E add. Finally, we obseve that k 1 + k 2 + k 3 + k 4 k. We say that a gaph G contains an -band J of width s if the following thee conditions ae satisfied: a) G contains H s, as induced subgaph. b) Thee is no edge {x, y} E(G) suchthatx V (G) V (H) andy V (H) B () (J). If G is a gaph and H p,q is a (p, q)-band in G whee p 3andq 1, the esult of the c-contaction of H p,q in G whee 0 c p 3, is the gaph obtained if we contact in G all the edges of H p,q that ae in the set {{(i, m), (i +1,m)} 2 i c +1, 1 m q}. To denote the esult of the opeation we just descibed, we use the notation contact(g, H p,q,c). Notice that outine contact(g, H p,q,c)unso(cq) insteps.foan example of a c-contaction, see Figue 1. Lemma 1 Let G be a gaph containing a (3 + c, q)-band H 3+c,q fo some c> k q,andlet G = contact(g, H p,q,c). Thendist(G, H p,q ) k iff dist(g,h p c ) k. Poof: 2 Ou esults also hold fo moe geneal sets of opeations given that they locally change the stuctue of the input gaph. 4

5 We call an edge of a gaph q-exteme if q>1andbothitsendpointshavedegee3 o p =1andbothitsendpointshavedegee2. Fothesetofq-exteme edges of a gaph G we use the notation E (q) ext (G). find-edge-max-band(g, q, e) Input: AgaphG, apositiveintegeq and a q-exteme edge e of G. Output: Retun a maximal length (3 + c, q)-band H 3+c,q whee c 0ande is also an exteme edge of H. If such a(3 + c, q)-band does not exists, then etun NO. 1 let e = {y 1,0,z 1,0 } and set L {y 1,0 }, R {z 1,0 }, i 2 2 while i q and thee ae vetices y i,0 and z i,0 such that {y i,0,y i,0 }, {z i,0,z i,0 }, {y i,0,z i,0 } E(G) (d(y i,,0 )=d(z i,0 )=4andi<q)o(d(y i,0 )=d(z i,0 )=3andi = q) o (d(y i,0 )=d(z i,0 )=1andq =1), and N(y i,0 ) (L R {y i,0 } = N(z i,0 ) (L R {z i,0 } =, do set L L {y i,0 }, R R {z i,0 },andi i +1, 3 if i = q +1,thendo begin set 1, fo i =1,...,q,let{z i, } = N(z i, 1 ) R while N(z i, ) (L R) ={z i, 1 }, 1 i<j q {z i,,z j, } E(G) j = i +1, and 1 i q (d(z i, )=4and1<i<q)o((d(z i, )=3andi {1,q}) o ((d(z i, )=2andq =1),do R R {z 1,,...,z q, }; +1;foi =1,...,q, {z i, } N(z i, 1 ) R if N(z i, ) R = {z i, 1 } and 1 i<j q {z i,,z j,z } E(G) j = i +1,then R R {z 1,,...,z q, },othewise 1 set l 1, fo i =1,...,q,let{y i,l } = N(y i,l 1 ) L while N(y i,l ) (L R) ={y i,l 1 }, 1 i<j q {y i,l,y j,l } E(G) j = i +1, and 1 i q (d(y i,l )=4and1<i<q)o((d(y i,l )=3andi {1,q}), do L L {y 1,l,...,y q,l }; l l +1;foi =1,...,q, {y i,l } N(y i,l 1 ) L if N(y i,l ) L = {y i,l 1 } and 1 i<j q {y i,l,y j,l } E(G) j = i +1,then L L {y 1,l,...,y q,l },othewisel l 1 if + l>0thenetung[r L] end 4 etun NO. Lemma 2 The algoithm find-edge-max-band(g, q, e) is coect. If the answe is NO the algoithm finishes in O(q) steps. If the answe is a vetex set with (3 + c)q vetices, then the algoithm finishes in O(qc) steps. 5

6 Poof: Lemma 3 If G is a gaph whee (G) d and dist(g, H p,q ) k whee p q, theng contains at most (p 2) + (q 2) + 2dk q-extemal edges. Poof: Suppose that G contains moe than (p 2) + (q 2) + 2dk q-extemal edges. Notice fist that the emoval of the vetices in V dead can decease the size of this set by at most 2dk 1.ThentheemovaloftheedgesofE dead can futhe decease it by at most 5k 2. The addition of V add does not decease this numbe and finally, the addition of E add can decease it by 2k 4.Ask 1 + k 2 + k 4 k, wehavethath will have moe than (p 2) + (q +2) extemal edges, acontadiction as H contains exactly (p 2) + (q 2) q-extemal edges. find-max-band(g, q, c) Input: AgaphG, andtwopositiveintegesq,c Output: Retun a maximal length (3 + c,q)-band H 3+c,q whee c c. (3 + c,q)-band does not exists, then etun NO. If such a 1 Let E E (q) ext (G) 2 fo while E do begin let e be an edge in E. if find-edge-max-band(g, q, e) =H 3+c,q then end 3 etun NO if c c, thenetunh 3+c,q, othewise, set E E E whee E ae the q-intenal exteme edges ofh 3+c,q, othewise set E E {e} Lemma 4 Algoithm find-edge-max-band(g, q) is coect. In case of negative answe it uns in O(q E q ext (G) ) steps. In case of a positive answe it uns in O(qc Eq ext ) steps. Poof: Suppose that G can be tansfomed to H afte a sequence of edit opeations. We call a vetex v G safe if is not emoved by a vetex emoval opeation in this sequence. If a vetex of G is not live then we call it dead. We also say that an safe vetex v is a dity vetex if some of the edit opeations altes the set of edges incident to v in G (i.e. eithe adds o emoves some edge incident to v). If a safe vetex is not dity, when we 6

7 call it clean. Finally,wecallavetexofH that is not a vetex of G (i.e. was intoduced duing some vetex insetion opeation) new. Clealy, if dist(g, H) k, thenthee ae at most k new vetices in H and at most k dead vetices in G and this implies the following lemma. Lemma 5 Let G and H be two gaphs whee dist(g, H) k and such that the tansfomation of G to H involves k 1 vetex emovals and k 2 vetex additions. Then, V (H) k 2 V (G) V (H) + k 1. Poof: Lemma 6 Let G be a gaph such that dist(g, H p,q ) k. Supose also that G does not contain any (3 + c, q)-band whee q c>kand H p,q contains d dity vetices. Then p ( k q +3)(d + k +1). Poof: Assume that H p,q contains d dity vetices and at most k 3 = V in new vetices. Let l = k q.noticethath p,q contains p (l +3) 1distinct(butpossiblyovelapping) (l + 3,q)-bands. We denote this collection as B. A new vetex can be in columns at most l +3 membes of B and a dity vetex can be in columns of at most l +1 membes of B. If H contains a membe of B that does not contain columns with new vetices o inteio columns with dity vetices, then p (l +3)+1 k 3 (l +3) d(l +1)> 0. Theefoe p l +2+k 3 (l +3)+d(l +1) l +2+k(l +3)+d(l +1). Lemma 7 Let G be a gaph with a vetex v of degee moe than k +4 in G and let H p,q be a gid. Then any way to tansfom G to H p,q should involve the opeation of the emoval of v. Inpaticula,dist(G, H p,q ) k iff dist(g[v (G) v],h) k 1. Poof: Lemma 8 Let G be a gaph whee (G) b and let H be some gid. If dist(g, H) k then H will contain at most max{b, 2} k dity vetices. Poof: If v is a dity vetex of H this means that it is eithe adjacent to a vetex in V dead o is incident to an edge in E add E dead. Notice that each vetex in X dead is can be adjacent to at most b dity vetices of H. AlsoanedgeinE dead E dead can be incident to at most two dity vetices of H. Theefoe, each edit opeation ceates at most max{2,b} dity vetices and the esult follows. 3 Looking fo a given gid H p,q In this section, we show that the k-almost gid poblem is in FPT. The next lemma intoduces the function f to bound the size of the kenel. 7

8 Lemma 9 Let G be a gaph whee dist(g, H p,q ) k. supposealsothat (G) b and that G does not contain any (3 + c, q)-band whee c>k/qo any (3 + c, p)-band whee c>k/p.then V (G) f(k, b, p, q) whee f(k, b, p, q) = k + k 2 if p k and q k k +5k(b k + k +1) if min{p, q} k<max{p, q} k +16(b k + k +1) 2 if p>kand q>k Poof: Fom Lemma 5 we get that V (G) p q +k. FomLemma8,thedityvetices of H will be at most b k. Fom Lemma 6 we get that p ( k q +3)(b k + k +1) and q ( k q +3)(b k + k +1). If p k and q k then clealy V (G) k + k2. If q k then p ( k q +3)(b k + k +1) ( k q +4)(b k + k +1) and theefoe V (G) k+p q k+q( k q +4)(b k+k+1) k+5k(b k+k+1). The symmetic analysis woks when p k. Ifnowp, q > k then k q = k p =1andtheefoep, q 4(b k+k+1). We conclude that V (G) k +16(b k + k +1) 2. Kenel-fo-Check-Gid(G, p, q, k) Input: AgaphG, twopositiveintegesp, q, andanon-negativeintegek Output: Eithe etuns NO, meaning that that dist(g, H p,q ) >k, o etuns a gaph G and a tiple p,q,k such that dist(g, H p,q ) k iff dist(g,h p,q ) k. 0. Setk = k, G = G, p = p and q = q. 1. AslongasG has a vetex of degee k +4emove it fom G and set k k 1. If afte the end of this poccess k < 0thenetun NO. 2. Applyanyofthefollowingpoceduesaslongasthisispossible: As long as find-max-band(g,q, k q +1) = H 3+c,q,thenG = contact(g,h 3+c,q,c) and set p p c. As long as find-max-band(g,p, k p +1) = H 3+c,p,thenG = contact(g,h 3+c,p,c) and set q q c. 3 If V (G ) >f(k,k+4,p,q )thenetun NO. 4. etung,p,q,k. Theoem 1 Algoithm Kenel-fo-Check-Gid(G, p, q, k) is coect and if it outputs the gaph G then V (G ) f(k, k +4,p,q). Moeove,itunsinO(pq(p + q + k 2 )) steps. Poof: Step 1 is justified by Lemma 7. Notice that befoe the algoithm entes Step 2, (G) k + 4. Step 2 ceates equivalent instances of the poblem because of Lemma 1. Fom Lemma 4, Each time a contaction of step 2 is applied, the coesponding q- band (p-band) equies O(q c(p + q + k 2 )) (O(p c(p + q + k 2 ))) steps. As the the sum of the lengths of the bands cannot exceed q(p) weobtainthatstep2 equies, in total, O(pq(p+q +k 2 )) steps. Moeove, befoe the check of Step 3, alltheconditionsof 8

9 Lemma 9 ae satisfied and theefoe, if the algoithm etuns G,p,q,k,then V (G ) f(k,k+4,p,q ) f(k, k +4,p,q). Check-Gid(G, p, q, k) Input: AgaphG, twopositiveintegesp, q, andanon-negativeintegek Output: Eithe etuns NO, meaning that that dist(g, H p,q ) >k,o etuns a sequence of at most k opeations that tansfoms G to H p,q. 1. foanysetv dead V (G) ofatmostk vetices do if E(G[V (G) V dead ]) 2pq p q + k then fo any set E dead of at most k V dead edges of E(G[V dead ]) do fo any i =0,...,k V dead E dead do begin let G be the gaph obtained fom G afte the emoval of the vetices in V dead and the edges in E dead and the addition of a set V add of i new vetices. let S be the set of vetices in G with degee less than 4. if S 2p +2q 4+2k then do fo any E add S S whee E add k V dead E dead V add do if (V (G ),E(G ) E add )isisomophictoh p,q then etun asequencecontainingthesequenceofopeations 2. etun NO end defined by the sets V dead, E dead, V add,ande add Theoem 2 Algoithm Check-Gid(G, p, q, k) is coect and uns in O(16 k (2n +3k) 2k ) steps. Poof: we ecall the notation k 1 = V dead, k 2 = E dead, K 3 = V add and k 4 = E add. The fist fo of the algoithm guesses the set of vetices V dead that should be emoved while tansfoming G to H p,q.clealy,theeae ( n k) = O(n k 1 )waystomakethisguess. Fom Lemma 5 these guesses ae at most (pq + k 1 ) k 1. If this is a coect guess, then the emaining gaph will be a subgaph of H p,q with at most k edges moe. As H p,q has (p 1)q +(q 1)p edges, then G[V (G) V dead ]willhaveatmost2pq p q + k 2 edges and the filte of the algoithm befoe the second fo is coect. Thesecond fo guesses the set E dead of edges that should be emoved and thee ae at most ( 2pq p q+k2 k 2 ) (2pq + k2 ) k 2 ways to make such a guess. Then comes the tun to guess 9

10 the set of vetices V add that should be added towads constucting H p,q.aswecannot add moe than k 3 vetices, the thid fo makes at most k 3 calls one fo each possible quantity of vetices in V add.noticethatifalltheguessesdonesofaaecoect,g is a subgaph of H p,q with k 4 edges less than H p,q.ash p,q has 2(p 1)+2(q 1) vetices of degee less than 4 V (G )shouldcontainasubsets of at most 2p+2q 4+2k 4 vetices of degee less than 4 (an missing edge can ham the degee of at most 2 vetices). Clealy, the edges to add in G towads constucting H p,q will have endpoints in S and theefoe each choice of an edge to add will be done by a set of ( 2p+2q 4+2k 4 ) 2 4(p + q + k4 ) 2 candidate edges. As thee ae at most k 4 guesses of edges to be done in the fouth fo we finally have at most ( 4(p+q+k 4 ) ) 2 k 4 (4(p + q + k4 )) 2k 4 edge sets to guess. Afte than, we can veify whethe the esulting gaph is isomophic to H p,q,whichcanbedonein O(pq) steps. Resuming,thetotalunningtimeisO((pq + k 1 ) k1 (2pq + k 2 ) k2 k 3 (4(p + q + k 4 )) 2k4 pq) =O(16 k (p + q + k) 2k ). As p + q 2pq, usinglemma5weobseve that (p + q + k) 2pq + k 2(pq k)+3k 2n +3k and we have the equied time bound. Almost-gid(G, p, q, k) Input: AgaphG, twopositiveintegesp, q, andanon-negativeintegek Output: Eithe etuns NO, meaning that that dist(g, H p,q ) >k,o etuns a sequence of at most k opeations that tansfoms G to H p,q. 1. IfKenel-fo-Check-Gid(G, p, q, k) =(G,p,q,k )thenetuncheck-gid(g, p, q, k) 2. etun NO Theoem 3 Algotihm Almost-gid(G, p, q, k) solves the k-almost-gid poblem in 2 O(k log k) + O(n 3 ) steps. Poof: The algoithm we fist calls the algoithm Kenel-fo-Check-Gid(G, p, q, k) that gives some answe in O(pq(p + q + k 2 )) = O(n 3 )steps. etuns that dist(g, H p,q ) >k. Iftheansweis NO then If the algoithm etuns (G,p,q,k )thensolvek- Almost-Gid with input G,p,q,k using bute foce and etun the coesponding answe. Fom Theoem 1 we have that V (G ) k +16(k 2 +5k +1) 2 = O(k 4 ). Fom Theoem 2, Check-Gid(G, p, q, k) equies(o(k)) 8k steps. 4 Looking fo any gid Fo α, β, γ N, wedefinepods(α, β, γ) ={(p, q) N 2 p α and γ β p q γ + β}. 10

11 Clealy, to solve the k-almost some Gid poblem it is enough to apply Check- Gid(G, p, q, k) foall(p, q) A(n, k) = n k i n+k pods(i, n, k). Clealy, A(n, k) 2k 2 log(k + n). Theefoe, k-almost some Gid can be solved afte O(k 2 log(n + k)) calls of Almost-gid(G, p, q, k) whichgivesaunningtimeofo(log n)(2 O(k log k) )+ O(k 2 n 3 log n) steps. Wecallthisalgoithmcheck-all-cases(G, k). We stess that thee ae cases whee A(n, k) 1 2 log n and theefoe, that way, we may not avoid the log n -ovehead. In what emains we will explain an altenative appoach that gives unning times of the same type as the case of k-almost Gid. We call -band collection C of a gaph G acollectionof C -bands in G of widths s 1,...,s C whee no pai of them have common inteio vetices. The width of such a collection is equal to i=1,..., C (s i 2). find-max-band-collection(g,, w) Input: AgaphG and two positive integes and w Output: Retun YES ifg contains an -band collection of width w; othewise, etun NO. 1 Let E ext be the set of extemal edges of G, t 0 2 while E ext and t<wdo begin t 0 Let e be an edge in E ext set E E ext while find-edge-max-band(g,, e) =H 3+c, do begin set E E E whee E ae the exteme edges of H 3+c, set t t + c +1 let e be an edge in E end set E ext E ext {e} end 3 if t w then etun YES, othewise etun NO. Lemma 10 The algoithm find-max-band-collection(g,, w) is coect and uns in O(w E ext (G) + n) steps. Poof: 11

12 We fist need some conditions on when it is possible to make an estimation of the dimensions of a gid. Lemma 11 Let G be a gaph whee (G) b and let H p,q be a gid whee dist(g, H) k. Then If G does not contain any q-band collection of width > k then V (H) (b k +2) 2. Poof: H p,q contains a single element q-band collection C H of width p 2. We apply back the k opeations that tansfomed G to H. IfweemoveanedgeinY in,inthe wost case, its endpoints may belong in neighboing columns of C H and this can emove at most 2 units fom the width of C H.IfweaddbackanedgeinY out,inthewostcase, its endpoints may belong in diffeent columns of C H and this can emove at most 4 units fom the width of C H.IffinallyweaddbackavetexinX out,inthewostcase,allits neighbous will belong into diffeent columns and this may educe the width of C H by (G) b. Resuming, we have that G contains a q band collection of width at least p 2 e in e out b x out p 2 b k which implies that p b k +2. Woking symmetically, we also conclude that q b k +2andtheesultfollows. Lemma 12 Let G be a gaph whee (G) b and let H be a gid whee dist(g, H) k. Then if G contains an -band collection of width > 3k then H = H s, fo some s [ n k, n+k ]. Moeove at most two such -band collections exist and fo each, s will be unique when >2k. Poof: Let C be the inteio columns in such a collection of bands. We will apply the edit opeations that tansfom G to H. The emoval of a vetex in X out can educe the width of C by at most 3. of C by at most 3. The emoval of an edge in Y out can educe the width The addition of an edge in Y in can educe the width of C by at most 2. Theefoe, in the wost case, H still contains a collection of bands of width 3k +1 3k >1. So, thee exist at least one -band of width at least 1 in H and this means that H = H s, fo some s 1. Suppose now that thee ae thee integes 1 < 2 < 3 and that G contains an i -band collection of width > 3k, foi =1, 2, 3. Let also I i, =1, 2, 3betheinteio columns of each of these band collections. Clealy, fo any i<j,i i I j. Accoding to the pevious analysis, afte the edit opeations, thee, diffeent, size i -bands of width al least 1 will suvive which is impossible to exist in a ectangula gid. Notice now that s = n x out + x in. Let δ = x out x in. We obtain that s [n δ, n + δ] whichimpliesthats [ n k ]containstwointeges,then n+k [ n k, n+k, n+k ], as δ k. If now the inteval n k 1whichimpliesthat 2k. 12

13 Check-some-Gid(G, k) Input: A gaph Gand a non-negative intege k Output: The answe to the k-almost-some-gid poblem with instance G and paamete k. 1. As long as G has a vetex of degee k +4emove itfomg and 2. R set k k 1. If afte the end of this poccess k<0thenetun NO. 3. fo i =1,...,n,iffind-max-band-collection(G, i, 3k +1)= YES, then set R R {i} 4. If R =0thenif V (G) >k+((k +4)k +2) 2 then etun NO, othewise, goto Step 7 5. Fo any R, If >2k, then begin If N [ n k, n+k ]=, then etun NO, othewise, etun Almost-Gid(G,, s, k) whee{s} = N [ n k end othewise, fo (i, j) pods(2k,n,k), begin, n+k ]. If Almost-Gid(G, i, j, k) =YES, then etun Almost-Gid(G, i, j, k). end 6. Retun NO. 7. check-all-cases(g, k). Theoem 4 Algoithm Check-some-Gid(G, k) is coect and the k-almost-any-gid poblem is in FPT and can be solved in time 2 O(k log k) + O(k log k n 3 ). Poof: Step 1 is justified by Lemma 7 and we may assume that befoe the algoithm entes Step 2, (G) k +4. Steps 2 4 ae based on Lemma 11. Step 3 involves O(n) callsoffind-max-band-collection(g, i, 3k +1)whichequiesO(kn 2 )stepsbecause of Lemma 10. Theoefoe, Step 3 equies O(kn 3 )steps. FinallytheloopinStep5 is coect because of Lemma 12. Note that the fist loop in step 5 is applied at most 2 times and that pods(2k, n, k) = O(k log k). Theefoe, step 5 uns in 2 O(k log k) + O(k log k n 3 )steps. Aswenoticedinthebeginingofthissectioncheck-all-cases(G, k) equies O(log n )(2 O(k log k) + O(log n n 3 k 2 )) steps whee n is the numbe of vetices of G in step 7 whee n O(k 4 )andthismeansthatstep7 equies 2 O(k log k) steps. Refeences [1] N, Alon, R. Yuste and U. Zwick. Colo-Coding. Jounal of the ACM, 42(4), ,

14 [2] G. Downey and M. Fellows. Paameteized Complexity. Spinge-Velag,1999. [3] H. Kaplan, R. Shami and R. Tajan.. Tactability of paameteized completion poblems on chodal, stongly chodal and pope inteval gaphs. SIAM Jounal of Computing, 28, ,1999. [4] J. Lewis and M. Yannakakis. The node-deletion poblem fo heeditaypopeties is NP-Complete. Jounal Comput. and Systems Sci. 20(2), , [5] Leizhen Cai. Fixed-Paamete Tactability of Gaph Modification Poblems fo Heeditay Popeties. Infomation Pocessing Lettes, 58(4) , 1996 [6] B. Monien. How to find paths efficiently. Annals of Discete Mathematics, 25, , [7] A. Natanzon, R. Shami and R. Shaan. Complexity classification of some edge modification poblems. Discete Applied Mathematics, 113(1), ,2001. [8] T. Sebastian, P. Klein, and B. Kimia. Recognition of shapes by editing thei shock gaphs. IEEE Tansactions on Patten Matching and Machine Intelligence, 26, , [9] M. Yannakakis. Node and Edge Deletion NP-complete poblems. ACM Symposium on Theoy of Computing (STOC), ,1978. [10] K. Zhang and D. Sasha. Simple fast algoithms fo the editing distance between tees and elated poblems. SIAM Jounal on Computing 18, ,

MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION

MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION K.C. CHANG AND TAN ZHANG In memoy of Pofesso S.S. Chen Abstact. We combine heat flow method with Mose theoy, supe- and subsolution method with

More information

Chapter 3 Savings, Present Value and Ricardian Equivalence

Chapter 3 Savings, Present Value and Ricardian Equivalence Chapte 3 Savings, Pesent Value and Ricadian Equivalence Chapte Oveview In the pevious chapte we studied the decision of households to supply hous to the labo maket. This decision was a static decision,

More information

UNIT CIRCLE TRIGONOMETRY

UNIT CIRCLE TRIGONOMETRY UNIT CIRCLE TRIGONOMETRY The Unit Cicle is the cicle centeed at the oigin with adius unit (hence, the unit cicle. The equation of this cicle is + =. A diagam of the unit cicle is shown below: + = - - -

More information

Financing Terms in the EOQ Model

Financing Terms in the EOQ Model Financing Tems in the EOQ Model Habone W. Stuat, J. Columbia Business School New Yok, NY 1007 hws7@columbia.edu August 6, 004 1 Intoduction This note discusses two tems that ae often omitted fom the standad

More information

Software Engineering and Development

Software Engineering and Development I T H E A 67 Softwae Engineeing and Development SOFTWARE DEVELOPMENT PROCESS DYNAMICS MODELING AS STATE MACHINE Leonid Lyubchyk, Vasyl Soloshchuk Abstact: Softwae development pocess modeling is gaining

More information

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION Page 1 STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION C. Alan Blaylock, Hendeson State Univesity ABSTRACT This pape pesents an intuitive appoach to deiving annuity fomulas fo classoom use and attempts

More information

Approximation Algorithms for Data Management in Networks

Approximation Algorithms for Data Management in Networks Appoximation Algoithms fo Data Management in Netwoks Chistof Kick Heinz Nixdof Institute and Depatment of Mathematics & Compute Science adebon Univesity Gemany kueke@upb.de Haald Räcke Heinz Nixdof Institute

More information

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM Main Golub Faculty of Electical Engineeing and Computing, Univesity of Zageb Depatment of Electonics, Micoelectonics,

More information

An Efficient Group Key Agreement Protocol for Ad hoc Networks

An Efficient Group Key Agreement Protocol for Ad hoc Networks An Efficient Goup Key Ageement Potocol fo Ad hoc Netwoks Daniel Augot, Raghav haska, Valéie Issany and Daniele Sacchetti INRIA Rocquencout 78153 Le Chesnay Fance {Daniel.Augot, Raghav.haska, Valéie.Issany,

More information

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers Concept and Expeiences on using a Wiki-based System fo Softwae-elated Semina Papes Dominik Fanke and Stefan Kowalewski RWTH Aachen Univesity, 52074 Aachen, Gemany, {fanke, kowalewski}@embedded.wth-aachen.de,

More information

Over-encryption: Management of Access Control Evolution on Outsourced Data

Over-encryption: Management of Access Control Evolution on Outsourced Data Ove-encyption: Management of Access Contol Evolution on Outsouced Data Sabina De Capitani di Vimecati DTI - Univesità di Milano 26013 Cema - Italy decapita@dti.unimi.it Stefano Paaboschi DIIMM - Univesità

More information

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN Modeling and Veifying a Pice Model fo Congestion Contol in Compute Netwoks Using PROMELA/SPIN Clement Yuen and Wei Tjioe Depatment of Compute Science Univesity of Toonto 1 King s College Road, Toonto,

More information

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing M13914 Questions & Answes Chapte 10 Softwae Reliability Pediction, Allocation and Demonstation Testing 1. Homewok: How to deive the fomula of failue ate estimate. λ = χ α,+ t When the failue times follow

More information

NURBS Drawing Week 5, Lecture 10

NURBS Drawing Week 5, Lecture 10 CS 43/585 Compute Gaphics I NURBS Dawing Week 5, Lectue 1 David Been, William Regli and Maim Pesakhov Geometic and Intelligent Computing Laboato Depatment of Compute Science Deel Univesit http://gicl.cs.deel.edu

More information

Nontrivial lower bounds for the least common multiple of some finite sequences of integers

Nontrivial lower bounds for the least common multiple of some finite sequences of integers J. Numbe Theoy, 15 (007), p. 393-411. Nontivial lowe bounds fo the least common multiple of some finite sequences of integes Bai FARHI bai.fahi@gmail.com Abstact We pesent hee a method which allows to

More information

Top K Nearest Keyword Search on Large Graphs

Top K Nearest Keyword Search on Large Graphs Top K Neaest Keywod Seach on Lage Gaphs Miao Qiao, Lu Qin, Hong Cheng, Jeffey Xu Yu, Wentao Tian The Chinese Univesity of Hong Kong, Hong Kong, China {mqiao,lqin,hcheng,yu,wttian}@se.cuhk.edu.hk ABSTRACT

More information

Week 3-4: Permutations and Combinations

Week 3-4: Permutations and Combinations Week 3-4: Pemutations and Combinations Febuay 24, 2016 1 Two Counting Pinciples Addition Pinciple Let S 1, S 2,, S m be disjoint subsets of a finite set S If S S 1 S 2 S m, then S S 1 + S 2 + + S m Multiplication

More information

Seshadri constants and surfaces of minimal degree

Seshadri constants and surfaces of minimal degree Seshadi constants and sufaces of minimal degee Wioletta Syzdek and Tomasz Szembeg Septembe 29, 2007 Abstact In [] we showed that if the multiple point Seshadi constants of an ample line bundle on a smooth

More information

Spirotechnics! September 7, 2011. Amanda Zeringue, Michael Spannuth and Amanda Zeringue Dierential Geometry Project

Spirotechnics! September 7, 2011. Amanda Zeringue, Michael Spannuth and Amanda Zeringue Dierential Geometry Project Spiotechnics! Septembe 7, 2011 Amanda Zeingue, Michael Spannuth and Amanda Zeingue Dieential Geomety Poject 1 The Beginning The geneal consensus of ou goup began with one thought: Spiogaphs ae awesome.

More information

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS Vesion:.0 Date: June 0 Disclaime This document is solely intended as infomation fo cleaing membes and othes who ae inteested in

More information

Coordinate Systems L. M. Kalnins, March 2009

Coordinate Systems L. M. Kalnins, March 2009 Coodinate Sstems L. M. Kalnins, Mach 2009 Pupose of a Coodinate Sstem The pupose of a coodinate sstem is to uniquel detemine the position of an object o data point in space. B space we ma liteall mean

More information

Risk Sensitive Portfolio Management With Cox-Ingersoll-Ross Interest Rates: the HJB Equation

Risk Sensitive Portfolio Management With Cox-Ingersoll-Ross Interest Rates: the HJB Equation Risk Sensitive Potfolio Management With Cox-Ingesoll-Ross Inteest Rates: the HJB Equation Tomasz R. Bielecki Depatment of Mathematics, The Notheasten Illinois Univesity 55 Noth St. Louis Avenue, Chicago,

More information

Mining Relatedness Graphs for Data Integration

Mining Relatedness Graphs for Data Integration Mining Relatedness Gaphs fo Data Integation Jeemy T. Engle (jtengle@indiana.edu) Ying Feng (yingfeng@indiana.edu) Robet L. Goldstone (goldsto@indiana.edu) Indiana Univesity Bloomington, IN. 47405 USA Abstact

More information

Symmetric polynomials and partitions Eugene Mukhin

Symmetric polynomials and partitions Eugene Mukhin Symmetic polynomials and patitions Eugene Mukhin. Symmetic polynomials.. Definition. We will conside polynomials in n vaiables x,..., x n and use the shotcut p(x) instead of p(x,..., x n ). A pemutation

More information

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years.

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years. 9.2 Inteest Objectives 1. Undestand the simple inteest fomula. 2. Use the compound inteest fomula to find futue value. 3. Solve the compound inteest fomula fo diffeent unknowns, such as the pesent value,

More information

The Binomial Distribution

The Binomial Distribution The Binomial Distibution A. It would be vey tedious if, evey time we had a slightly diffeent poblem, we had to detemine the pobability distibutions fom scatch. Luckily, thee ae enough similaities between

More information

Saturated and weakly saturated hypergraphs

Saturated and weakly saturated hypergraphs Satuated and weakly satuated hypegaphs Algebaic Methods in Combinatoics, Lectues 6-7 Satuated hypegaphs Recall the following Definition. A family A P([n]) is said to be an antichain if we neve have A B

More information

Carter-Penrose diagrams and black holes

Carter-Penrose diagrams and black holes Cate-Penose diagams and black holes Ewa Felinska The basic intoduction to the method of building Penose diagams has been pesented, stating with obtaining a Penose diagam fom Minkowski space. An example

More information

Uncertain Version Control in Open Collaborative Editing of Tree-Structured Documents

Uncertain Version Control in Open Collaborative Editing of Tree-Structured Documents Uncetain Vesion Contol in Open Collaboative Editing of Tee-Stuctued Documents M. Lamine Ba Institut Mines Télécom; Télécom PaisTech; LTCI Pais, Fance mouhamadou.ba@ telecom-paistech.f Talel Abdessalem

More information

Ilona V. Tregub, ScD., Professor

Ilona V. Tregub, ScD., Professor Investment Potfolio Fomation fo the Pension Fund of Russia Ilona V. egub, ScD., Pofesso Mathematical Modeling of Economic Pocesses Depatment he Financial Univesity unde the Govenment of the Russian Fedeation

More information

SUPPORT VECTOR MACHINE FOR BANDWIDTH ANALYSIS OF SLOTTED MICROSTRIP ANTENNA

SUPPORT VECTOR MACHINE FOR BANDWIDTH ANALYSIS OF SLOTTED MICROSTRIP ANTENNA Intenational Jounal of Compute Science, Systems Engineeing and Infomation Technology, 4(), 20, pp. 67-7 SUPPORT VECTOR MACHIE FOR BADWIDTH AALYSIS OF SLOTTED MICROSTRIP ATEA Venmathi A.R. & Vanitha L.

More information

Research on Risk Assessment of the Transformer Based on Life Cycle Cost

Research on Risk Assessment of the Transformer Based on Life Cycle Cost ntenational Jounal of Smat Gid and lean Enegy eseach on isk Assessment of the Tansfome Based on Life ycle ost Hui Zhou a, Guowei Wu a, Weiwei Pan a, Yunhe Hou b, hong Wang b * a Zhejiang Electic Powe opoation,

More information

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS ON THE R POLICY IN PRODUCTION-INVENTORY SYSTEMS Saifallah Benjaafa and Joon-Seok Kim Depatment of Mechanical Engineeing Univesity of Minnesota Minneapolis MN 55455 Abstact We conside a poduction-inventoy

More information

METHODOLOGICAL APPROACH TO STRATEGIC PERFORMANCE OPTIMIZATION

METHODOLOGICAL APPROACH TO STRATEGIC PERFORMANCE OPTIMIZATION ETHODOOGICA APPOACH TO STATEGIC PEFOANCE OPTIIZATION ao Hell * Stjepan Vidačić ** Željo Gaača *** eceived: 4. 07. 2009 Peliminay communication Accepted: 5. 0. 2009 UDC 65.02.4 This pape pesents a matix

More information

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor > PNN05-P762 < Reduced Patten Taining Based on Task Decomposition Using Patten Distibuto Sheng-Uei Guan, Chunyu Bao, and TseNgee Neo Abstact Task Decomposition with Patten Distibuto (PD) is a new task

More information

How To Write A Theory Of The Concept Of The Mind In A Quey

How To Write A Theory Of The Concept Of The Mind In A Quey Jounal of Atificial Intelligence Reseach 31 (2008) 157-204 Submitted 06/07; published 01/08 Conjunctive Quey Answeing fo the Desciption Logic SHIQ Bite Glimm Ian Hoocks Oxfod Univesity Computing Laboatoy,

More information

Continuous Compounding and Annualization

Continuous Compounding and Annualization Continuous Compounding and Annualization Philip A. Viton Januay 11, 2006 Contents 1 Intoduction 1 2 Continuous Compounding 2 3 Pesent Value with Continuous Compounding 4 4 Annualization 5 5 A Special Poblem

More information

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods A famewok fo the selection of entepise esouce planning (ERP) system based on fuzzy decision making methods Omid Golshan Tafti M.s student in Industial Management, Univesity of Yazd Omidgolshan87@yahoo.com

More information

College Enrollment, Dropouts and Option Value of Education

College Enrollment, Dropouts and Option Value of Education College Enollment, Dopouts and Option Value of Education Ozdagli, Ali Tachte, Nicholas y Febuay 5, 2008 Abstact Psychic costs ae the most impotant component of the papes that ae tying to match empiical

More information

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN*

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN* Automatic Testing of Neighbo Discovey Potocol Based on FSM and TTCN* Zhiliang Wang, Xia Yin, Haibin Wang, and Jianping Wu Depatment of Compute Science, Tsinghua Univesity Beijing, P. R. China, 100084 Email:

More information

How To Find The Optimal Stategy For Buying Life Insuance

How To Find The Optimal Stategy For Buying Life Insuance Life Insuance Puchasing to Reach a Bequest Ehan Bayakta Depatment of Mathematics, Univesity of Michigan Ann Abo, Michigan, USA, 48109 S. David Pomislow Depatment of Mathematics, Yok Univesity Toonto, Ontaio,

More information

Strength Analysis and Optimization Design about the key parts of the Robot

Strength Analysis and Optimization Design about the key parts of the Robot Intenational Jounal of Reseach in Engineeing and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Pint): 2320-9356 www.ijes.og Volume 3 Issue 3 ǁ Mach 2015 ǁ PP.25-29 Stength Analysis and Optimization Design

More information

Chris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment

Chris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment Chis J. Skinne The pobability of identification: applying ideas fom foensic statistics to disclosue isk assessment Aticle (Accepted vesion) (Refeeed) Oiginal citation: Skinne, Chis J. (2007) The pobability

More information

Towards Automatic Update of Access Control Policy

Towards Automatic Update of Access Control Policy Towads Automatic Update of Access Contol Policy Jinwei Hu, Yan Zhang, and Ruixuan Li Intelligent Systems Laboatoy, School of Computing and Mathematics Univesity of Westen Sydney, Sydney 1797, Austalia

More information

The Supply of Loanable Funds: A Comment on the Misconception and Its Implications

The Supply of Loanable Funds: A Comment on the Misconception and Its Implications JOURNL OF ECONOMICS ND FINNCE EDUCTION Volume 7 Numbe 2 Winte 2008 39 The Supply of Loanable Funds: Comment on the Misconception and Its Implications. Wahhab Khandke and mena Khandke* STRCT Recently Fields-Hat

More information

Cloud Service Reliability: Modeling and Analysis

Cloud Service Reliability: Modeling and Analysis Cloud Sevice eliability: Modeling and Analysis Yuan-Shun Dai * a c, Bo Yang b, Jack Dongaa a, Gewei Zhang c a Innovative Computing Laboatoy, Depatment of Electical Engineeing & Compute Science, Univesity

More information

YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH

YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH nd INTERNATIONAL TEXTILE, CLOTHING & ESIGN CONFERENCE Magic Wold of Textiles Octobe 03 d to 06 th 004, UBROVNIK, CROATIA YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH Jana VOBOROVA; Ashish GARG; Bohuslav

More information

An Introduction to Omega

An Introduction to Omega An Intoduction to Omega Con Keating and William F. Shadwick These distibutions have the same mean and vaiance. Ae you indiffeent to thei isk-ewad chaacteistics? The Finance Development Cente 2002 1 Fom

More information

How to create a default user profile in Windows 7

How to create a default user profile in Windows 7 AnswesThatWok TM How to ceate a default use pofile in Windows 7 (Win 7) How to ceate a default use pofile in Windows 7 When to use this document Use this document wheneve you want to ceate a default use

More information

PAN STABILITY TESTING OF DC CIRCUITS USING VARIATIONAL METHODS XVIII - SPETO - 1995. pod patronatem. Summary

PAN STABILITY TESTING OF DC CIRCUITS USING VARIATIONAL METHODS XVIII - SPETO - 1995. pod patronatem. Summary PCE SEMINIUM Z PODSTW ELEKTOTECHNIKI I TEOII OBWODÓW 8 - TH SEMIN ON FUNDMENTLS OF ELECTOTECHNICS ND CICUIT THEOY ZDENĚK BIOLEK SPŠE OŽNO P.., CZECH EPUBLIC DLIBO BIOLEK MILITY CDEMY, BNO, CZECH EPUBLIC

More information

Efficient Redundancy Techniques for Latency Reduction in Cloud Systems

Efficient Redundancy Techniques for Latency Reduction in Cloud Systems Efficient Redundancy Techniques fo Latency Reduction in Cloud Systems 1 Gaui Joshi, Emina Soljanin, and Gegoy Wonell Abstact In cloud computing systems, assigning a task to multiple seves and waiting fo

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations By Victo Avela White Pape #48 Executive Summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance the availability

More information

Figure 2. So it is very likely that the Babylonians attributed 60 units to each side of the hexagon. Its resulting perimeter would then be 360!

Figure 2. So it is very likely that the Babylonians attributed 60 units to each side of the hexagon. Its resulting perimeter would then be 360! 1. What ae angles? Last time, we looked at how the Geeks intepeted measument of lengths. Howeve, as fascinated as they wee with geomety, thee was a shape that was much moe enticing than any othe : the

More information

Semipartial (Part) and Partial Correlation

Semipartial (Part) and Partial Correlation Semipatial (Pat) and Patial Coelation his discussion boows heavily fom Applied Multiple egession/coelation Analysis fo the Behavioal Sciences, by Jacob and Paticia Cohen (975 edition; thee is also an updated

More information

Channel selection in e-commerce age: A strategic analysis of co-op advertising models

Channel selection in e-commerce age: A strategic analysis of co-op advertising models Jounal of Industial Engineeing and Management JIEM, 013 6(1):89-103 Online ISSN: 013-0953 Pint ISSN: 013-843 http://dx.doi.og/10.396/jiem.664 Channel selection in e-commece age: A stategic analysis of

More information

Statistics and Data Analysis

Statistics and Data Analysis Pape 274-25 An Extension to SAS/OR fo Decision System Suppot Ali Emouznead Highe Education Funding Council fo England, Nothavon house, Coldhabou Lane, Bistol, BS16 1QD U.K. ABSTRACT This pape exploes the

More information

The transport performance evaluation system building of logistics enterprises

The transport performance evaluation system building of logistics enterprises Jounal of Industial Engineeing and Management JIEM, 213 6(4): 194-114 Online ISSN: 213-953 Pint ISSN: 213-8423 http://dx.doi.og/1.3926/jiem.784 The tanspot pefomance evaluation system building of logistics

More information

CHAPTER 10 Aggregate Demand I

CHAPTER 10 Aggregate Demand I CHAPTR 10 Aggegate Demand I Questions fo Review 1. The Keynesian coss tells us that fiscal policy has a multiplied effect on income. The eason is that accoding to the consumption function, highe income

More information

Effect of Contention Window on the Performance of IEEE 802.11 WLANs

Effect of Contention Window on the Performance of IEEE 802.11 WLANs Effect of Contention Window on the Pefomance of IEEE 82.11 WLANs Yunli Chen and Dhama P. Agawal Cente fo Distibuted and Mobile Computing, Depatment of ECECS Univesity of Cincinnati, OH 45221-3 {ychen,

More information

2. TRIGONOMETRIC FUNCTIONS OF GENERAL ANGLES

2. TRIGONOMETRIC FUNCTIONS OF GENERAL ANGLES . TRIGONOMETRIC FUNCTIONS OF GENERAL ANGLES In ode to etend the definitions of the si tigonometic functions to geneal angles, we shall make use of the following ideas: In a Catesian coodinate sstem, an

More information

Explicit, analytical solution of scaling quantum graphs. Abstract

Explicit, analytical solution of scaling quantum graphs. Abstract Explicit, analytical solution of scaling quantum gaphs Yu. Dabaghian and R. Blümel Depatment of Physics, Wesleyan Univesity, Middletown, CT 06459-0155, USA E-mail: ydabaghian@wesleyan.edu (Januay 6, 2003)

More information

Model Question Paper Mathematics Class XII

Model Question Paper Mathematics Class XII Model Question Pape Mathematics Class XII Time Allowed : 3 hous Maks: 100 Ma: Geneal Instuctions (i) The question pape consists of thee pats A, B and C. Each question of each pat is compulsoy. (ii) Pat

More information

Converting knowledge Into Practice

Converting knowledge Into Practice Conveting knowledge Into Pactice Boke Nightmae srs Tend Ride By Vladimi Ribakov Ceato of Pips Caie 20 of June 2010 2 0 1 0 C o p y i g h t s V l a d i m i R i b a k o v 1 Disclaime and Risk Wanings Tading

More information

Integer sequences from walks in graphs

Integer sequences from walks in graphs otes on umbe Theoy and Discete Mathematics Vol. 9, 3, o. 3, 78 84 Intege seuences fom walks in gahs Enesto Estada, and José A. de la Peña Deatment of Mathematics and Statistics, Univesity of Stathclyde

More information

VISCOSITY OF BIO-DIESEL FUELS

VISCOSITY OF BIO-DIESEL FUELS VISCOSITY OF BIO-DIESEL FUELS One of the key assumptions fo ideal gases is that the motion of a given paticle is independent of any othe paticles in the system. With this assumption in place, one can use

More information

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available

More information

Office of Family Assistance. Evaluation Resource Guide for Responsible Fatherhood Programs

Office of Family Assistance. Evaluation Resource Guide for Responsible Fatherhood Programs Office of Family Assistance Evaluation Resouce Guide fo Responsible Fathehood Pogams Contents Intoduction........................................................ 4 Backgound..........................................................

More information

10. Collisions. Before During After

10. Collisions. Before During After 10. Collisions Use conseation of momentum and enegy and the cente of mass to undestand collisions between two objects. Duing a collision, two o moe objects exet a foce on one anothe fo a shot time: -F(t)

More information

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request.

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request. Retiement Benefit 1 Things to Remembe Complete all of the sections on the Retiement Benefit fom that apply to you equest. If this is an initial equest, and not a change in a cuent distibution, emembe to

More information

Unveiling the MPLS Structure on Internet Topology

Unveiling the MPLS Structure on Internet Topology Unveiling the MPLS Stuctue on Intenet Topology Gabiel Davila Revelo, Mauicio Andeson Ricci, Benoit Donnet, José Ignacio Alvaez-Hamelin INTECIN, Facultad de Ingenieía, Univesidad de Buenos Aies Agentina

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations White Pape 48 Revision by Victo Avela > Executive summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance

More information

Questions for Review. By buying bonds This period you save s, next period you get s(1+r)

Questions for Review. By buying bonds This period you save s, next period you get s(1+r) MACROECONOMICS 2006 Week 5 Semina Questions Questions fo Review 1. How do consumes save in the two-peiod model? By buying bonds This peiod you save s, next peiod you get s() 2. What is the slope of a consume

More information

Optimal Peer Selection in a Free-Market Peer-Resource Economy

Optimal Peer Selection in a Free-Market Peer-Resource Economy Optimal Pee Selection in a Fee-Maket Pee-Resouce Economy Micah Adle, Rakesh Kuma, Keith Ross, Dan Rubenstein, David Tune and David D Yao Dept of Compute Science Univesity of Massachusetts Amhest, MA; Email:

More information

Research Article A Reputation-Based Identity Management Model for Cloud Computing

Research Article A Reputation-Based Identity Management Model for Cloud Computing Mathematical Poblems in Engineeing Volume 2015, Aticle ID 238245, 15 pages http://dx.doi.og/10.1155/2015/238245 Reseach Aticle A Reputation-Based Identity Management Model fo Cloud Computing Lifa Wu, 1

More information

Physics 235 Chapter 5. Chapter 5 Gravitation

Physics 235 Chapter 5. Chapter 5 Gravitation Chapte 5 Gavitation In this Chapte we will eview the popeties of the gavitational foce. The gavitational foce has been discussed in geat detail in you intoductoy physics couses, and we will pimaily focus

More information

Data Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation

Data Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation (213) 1 28 Data Cente Demand Response: Avoiding the Coincident Peak via Wokload Shifting and Local Geneation Zhenhua Liu 1, Adam Wieman 1, Yuan Chen 2, Benjamin Razon 1, Niangjun Chen 1 1 Califonia Institute

More information

Model-Driven Engineering of Adaptation Engines for Self-Adaptive Software: Executable Runtime Megamodels

Model-Driven Engineering of Adaptation Engines for Self-Adaptive Software: Executable Runtime Megamodels Model-Diven Engineeing of Adaptation Engines fo Self-Adaptive Softwae: Executable Runtime Megamodels Thomas Vogel, Holge Giese Technische Beichte N. 66 des Hasso-Plattne-Instituts fü Softwaesystemtechnik

More information

Valuation of Floating Rate Bonds 1

Valuation of Floating Rate Bonds 1 Valuation of Floating Rate onds 1 Joge uz Lopez us 316: Deivative Secuities his note explains how to value plain vanilla floating ate bonds. he pupose of this note is to link the concepts that you leaned

More information

Liquidity and Insurance for the Unemployed

Liquidity and Insurance for the Unemployed Liquidity and Insuance fo the Unemployed Robet Shime Univesity of Chicago and NBER shime@uchicago.edu Iván Wening MIT, NBER and UTDT iwening@mit.edu Fist Daft: July 15, 2003 This Vesion: Septembe 22, 2005

More information

Promised Lead-Time Contracts Under Asymmetric Information

Promised Lead-Time Contracts Under Asymmetric Information OPERATIONS RESEARCH Vol. 56, No. 4, July August 28, pp. 898 915 issn 3-364X eissn 1526-5463 8 564 898 infoms doi 1.1287/ope.18.514 28 INFORMS Pomised Lead-Time Contacts Unde Asymmetic Infomation Holly

More information

Vector Calculus: Are you ready? Vectors in 2D and 3D Space: Review

Vector Calculus: Are you ready? Vectors in 2D and 3D Space: Review Vecto Calculus: Ae you eady? Vectos in D and 3D Space: Review Pupose: Make cetain that you can define, and use in context, vecto tems, concepts and fomulas listed below: Section 7.-7. find the vecto defined

More information

INVESTIGATION OF FLOW INSIDE AN AXIAL-FLOW PUMP OF GV IMP TYPE

INVESTIGATION OF FLOW INSIDE AN AXIAL-FLOW PUMP OF GV IMP TYPE 1 INVESTIGATION OF FLOW INSIDE AN AXIAL-FLOW PUMP OF GV IMP TYPE ANATOLIY A. YEVTUSHENKO 1, ALEXEY N. KOCHEVSKY 1, NATALYA A. FEDOTOVA 1, ALEXANDER Y. SCHELYAEV 2, VLADIMIR N. KONSHIN 2 1 Depatment of

More information

Load Balancing in Processor Sharing Systems

Load Balancing in Processor Sharing Systems Load Balancing in ocesso Shaing Systems Eitan Altman INRIA Sophia Antipolis 2004, oute des Lucioles 06902 Sophia Antipolis, Fance altman@sophia.inia.f Utzi Ayesta LAAS-CNRS Univesité de Toulouse 7, Avenue

More information

Load Balancing in Processor Sharing Systems

Load Balancing in Processor Sharing Systems Load Balancing in ocesso Shaing Systems Eitan Altman INRIA Sophia Antipolis 2004, oute des Lucioles 06902 Sophia Antipolis, Fance altman@sophia.inia.f Utzi Ayesta LAAS-CNRS Univesité de Toulouse 7, Avenue

More information

STABILITY ANALYSIS IN MILLING BASED ON OPERATIONAL MODAL DATA 1. INTRODUCTION

STABILITY ANALYSIS IN MILLING BASED ON OPERATIONAL MODAL DATA 1. INTRODUCTION Jounal of Machine Engineeing, Vol. 11, No. 4, 211 Batosz POWALKA 1 Macin CHODZKO 1 Kzysztof JEMIELNIAK 2 milling, chatte, opeational modal analysis STABILITY ANALYSIS IN MILLING BASED ON OPERATIONAL MODAL

More information

Optimal Capital Structure with Endogenous Bankruptcy:

Optimal Capital Structure with Endogenous Bankruptcy: Univesity of Pisa Ph.D. Pogam in Mathematics fo Economic Decisions Leonado Fibonacci School cotutelle with Institut de Mathématique de Toulouse Ph.D. Dissetation Optimal Capital Stuctue with Endogenous

More information

Instructions to help you complete your enrollment form for HPHC's Medicare Supplemental Plan

Instructions to help you complete your enrollment form for HPHC's Medicare Supplemental Plan Instuctions to help you complete you enollment fom fo HPHC's Medicae Supplemental Plan Thank you fo applying fo membeship to HPHC s Medicae Supplement plan. Pio to submitting you enollment fom fo pocessing,

More information

Contingent capital with repeated interconversion between debt and equity

Contingent capital with repeated interconversion between debt and equity Contingent capital with epeated inteconvesion between debt and equity Zhaojun Yang 1, Zhiming Zhao School of Finance and Statistics, Hunan Univesity, Changsha 410079, China Abstact We develop a new type

More information

Transmittal 198 Date: DECEMBER 9, 2005. SUBJECT: Termination of the Existing Eligibility-File Based Crossover Process at All Medicare Contractors

Transmittal 198 Date: DECEMBER 9, 2005. SUBJECT: Termination of the Existing Eligibility-File Based Crossover Process at All Medicare Contractors anual ystem Depatment of ealth & uman evices (D) entes fo edicae & Pub 100-20 One-Time Notification edicaid evices () Tansmittal 198 Date: DEEBE 9, 2005 hange equest 4231 UBJET: Temination of the Existing

More information

Mechanics 1: Motion in a Central Force Field

Mechanics 1: Motion in a Central Force Field Mechanics : Motion in a Cental Foce Field We now stud the popeties of a paticle of (constant) ass oving in a paticula tpe of foce field, a cental foce field. Cental foces ae ve ipotant in phsics and engineeing.

More information

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it AnswesThatWok TM How to set up a RAID1 mio with a dive which aleady has Windows installed How to ceate RAID 1 mioing with a had disk that aleady has data o an opeating system on it Date Company PC / Seve

More information

Supporting Efficient Top-k Queries in Type-Ahead Search

Supporting Efficient Top-k Queries in Type-Ahead Search Suppoting Efficient Top-k Queies in Type-Ahead Seach Guoliang Li Jiannan Wang Chen Li Jianhua Feng Depatment of Compute Science, Tsinghua National Laboatoy fo Infomation Science and Technology (TNList),

More information

Experimentation under Uninsurable Idiosyncratic Risk: An Application to Entrepreneurial Survival

Experimentation under Uninsurable Idiosyncratic Risk: An Application to Entrepreneurial Survival Expeimentation unde Uninsuable Idiosyncatic Risk: An Application to Entepeneuial Suvival Jianjun Miao and Neng Wang May 28, 2007 Abstact We popose an analytically tactable continuous-time model of expeimentation

More information

CONCEPTUAL FRAMEWORK FOR DEVELOPING AND VERIFICATION OF ATTRIBUTION MODELS. ARITHMETIC ATTRIBUTION MODELS

CONCEPTUAL FRAMEWORK FOR DEVELOPING AND VERIFICATION OF ATTRIBUTION MODELS. ARITHMETIC ATTRIBUTION MODELS CONCEPUAL FAMEOK FO DEVELOPING AND VEIFICAION OF AIBUION MODELS. AIHMEIC AIBUION MODELS Yui K. Shestopaloff, is Diecto of eseach & Deelopment at SegmentSoft Inc. He is a Docto of Sciences and has a Ph.D.

More information

Lab #7: Energy Conservation

Lab #7: Energy Conservation Lab #7: Enegy Consevation Photo by Kallin http://www.bungeezone.com/pics/kallin.shtml Reading Assignment: Chapte 7 Sections 1,, 3, 5, 6 Chapte 8 Sections 1-4 Intoduction: Pehaps one of the most unusual

More information

Liquidity and Insurance for the Unemployed*

Liquidity and Insurance for the Unemployed* Fedeal Reseve Bank of Minneapolis Reseach Depatment Staff Repot 366 Decembe 2005 Liquidity and Insuance fo the Unemployed* Robet Shime Univesity of Chicago and National Bueau of Economic Reseach Iván Wening

More information

Voltage ( = Electric Potential )

Voltage ( = Electric Potential ) V-1 of 9 Voltage ( = lectic Potential ) An electic chage altes the space aound it. Thoughout the space aound evey chage is a vecto thing called the electic field. Also filling the space aound evey chage

More information

Scheduling Hadoop Jobs to Meet Deadlines

Scheduling Hadoop Jobs to Meet Deadlines Scheduling Hadoop Jobs to Meet Deadlines Kamal Kc, Kemafo Anyanwu Depatment of Compute Science Noth Caolina State Univesity {kkc,kogan}@ncsu.edu Abstact Use constaints such as deadlines ae impotant equiements

More information

Secure Smartcard-Based Fingerprint Authentication

Secure Smartcard-Based Fingerprint Authentication Secue Smatcad-Based Fingepint Authentication [full vesion] T. Chales Clancy Compute Science Univesity of Mayland, College Pak tcc@umd.edu Nega Kiyavash, Dennis J. Lin Electical and Compute Engineeing Univesity

More information

NUCLEAR MAGNETIC RESONANCE

NUCLEAR MAGNETIC RESONANCE 19 Jul 04 NMR.1 NUCLEAR MAGNETIC RESONANCE In this expeiment the phenomenon of nuclea magnetic esonance will be used as the basis fo a method to accuately measue magnetic field stength, and to study magnetic

More information