M. Sugumaran / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (3), 2011,
|
|
|
- Laurence Powers
- 10 years ago
- Views:
Transcription
1 A Design of Centralized Meeting Scheduler with Distance Metrics M. Sugumaran Department of Computer Science and Engineering,Pondicherry Engineering College, Puducherry, India. Abstract Meeting scheduling is an important routine task in many organizations. The basic problem in meeting scheduling is to find a common free time for all participants of a meeting satisfying the given requirements. It is a time-consuming, iterative and tedious task. There exists several solutions for centralized calendar management and meeting scheduling, but they are of limited functionalities, not fully automatic and requests are static. Most of the schedulers not considered change of participants, the distance between the places of the participants and the venues of meetings. In this approach equivalent classes of persons, distance between the venue and places of participants with dynamic requests is considered to schedule meetings. This approach performs better and effective for practical meeting scheduling. Index Terms Meeting Scheduling, A*-Algorithm, Artificial Intelligence, Meeting Constraints, Office Automation. I. INTRODUCTION MEETING scheduling is a member of the class of resource scheduling problems that is known to be computationally intractable [1], and hence requires heuristics to reduce the computational effort. The timetable rearrangement problem in [1] is NP-Hard and has been shown that the feasibility problem is NP-Complete [2]. In general, all constraints are not considered in the processing of meeting scheduling. Some interesting approaches in Artificial Intelligence focus on learning user preferences [3, 4, 5]. Sen and Durfee [6] deal with persons time as the primary resources. The meeting scheduling problem is focused to reduce the failures by utilizing the cooperation and rescheduling strategies when there is no common time-slot [7]. The scheduler [1] uses heuristic for the computation of ρ(m i ) from p(m i ) and generates all solutions with common pruning technique, then chooses the optimal one. The common pruning technique may not reduce the computation of some or many problem instances in finding an optimal solution by computing all solutions. So, the concept of A*-Algorithm [8, 9, 10] is applied to choose the best probable node or branch among the available nodes or branches in the search tree. This solution process obtains the optimal or near optimal solution quicker by selecting only one node (or branch) at each time of exploration. That is, most of the branches of the search tree are pruned, a solution is obtained quicker even for larger problem instances without considering all possibilities. At any point of time, the participants may be on their way to attend a meeting, attending a meeting, returning to their hometown after attending a meeting or idle in their home stations. In day-to-day life, travelling time of the participants is to be considered along with the duration of meetings for an effective schedule. But the travelling time required for the participants before scheduling of meetings and minimum time required before cancelling of meetings so as to avoid the travel are not considered in the systems [1, 3, 4, 5, 6, 12, 13, 14]. In this work, a new centralized meeting scheduler with the distance metric, that is, the travelling time required for the participants from their current places to the venues of the meetings with respect to the time of requests along with the duration of meetings, has been designed and implemented, using A*-Algorithm with dynamic requests for scheduling and rescheduling of meetings. Equivalence classes of persons for substitution is used in A*-Algorithm to speed up the process and have flexibility in scheduling of more meetings. II. PROBLEM SPECIFICATION Let n be a positive integer. A timetable of n meetings is represented as 13-tuple T(n) = (P, M n, D m,, h, t, p, w, a, d, f,, ), where P = {1, 2,, m} is a set of m persons; M n = {m 1, m 2,, m n } is a set of n meetings; D m is a 2-D distance matrix of the m persons; is a partial order on M n ; h(m i ) is the host of the meeting m i ; t(m i ) is the time duration of meeting m i ; p(m i ) is a set of groups of persons such that exactly one person in each group is required to attend the meeting m i ; w(m i ) is the weight (or priority) of the meeting m i ; a(m i ) is the time of request (or arrival) of meeting m i ; d(m i ) is the deadline at which meeting m i is to be scheduled; f(m i ) is the time at which meeting m i is fixed; (m i ) is the starting time at which meeting m i is scheduled; and (m i ) is the set of attendants of meeting m i chosen from p(m i ). Further, the schedule also satisfies the following conditions: Let m i and m j be any two meetings. DM1: No person attends more than one meeting simultaneously. DM2: If m i m j, then m j starts after m i ends, as per the need of organizational requirements and in case some persons attending both meetings m i and m j. DM3: For each group g p(m i ), exactly one person can attend the meeting m i. DM4: m i can start at one of the time instances in w(m i ). DM5: The venue of the meeting m i is one of the participants sites. DM6: Each meeting m i should be scheduled at the earliest in one of the time intervals (a(m i ) + max {dist(h(m i ), p(m i ))}, d(m i )). DM7: Scheduling and rescheduling of any meeting m i also should satisfy d(m i ). In a schedule T(n), the parameters, t, p, a, d, D m, h and w represent the input requirements of meetings, whereas and represent a schedule of meetings that satisfies all the 1001
2 requirements. The assignment of rooms to meetings can easily be incorporated into the schedule by considering rooms as pseudo-persons. In this model, meetings are scheduled among a given set of persons. For any meeting, the person who proposes a meeting is called host of the meeting. The persons who are invited to attend that meeting are called participants or invitees. The invitees are considered for change of persons for most of the applications. At any point of time a participant may act as a host or an invitee of a meeting, but not both. A. Example 1 Consider an example of timetable T(5) of 5 meetings, shown in Fig. 1. That is, five meetings {m 1,, m 5 } are scheduled among eight persons {p 1,, p 8 } in a calendar of time intervals between 0 and 24. The eight persons are represented in the rows where as the time intervals are represented in the columns. Horizontal lines are used to represent the duration (or length) of meetings, and the names of the meetings written just above the horizontal lines. For example, the persons {p 2, p 8 } are assigned for m 3 in (3, 5) and {p 1, p 3, p 7 } are assigned for m 4 in (12, 15). For any person p i, the interval between any two meetings represents the minimum time required to travel between the venues of two meetings. Fig. 1 Graphical Representation of T(5) with DM P = {1, 2, 3, 4, 5, 6, 7, 8}. M 5 = {m 1, m 2, m 3, m 4, m 5 }. m 1 m 5 and m 2 m 4. h(m 1 ) = 2, h(m 2 ) = 4, h(m 3 ) = 7, h(m 4 ) = 3, & h(m 5 ) = 4. t(m 1 ) = 2, t(m 2 ) = 4, t(m 3 ) = 3, t(m 4 ) = 3 & t(m 5 ) = 2. p(m 1 ) = {{2,3}, {7,8}}, p(m 2 ) = {{1},{2},{3},{4},{7},{8}}, p(m 3 ) = {{2},{5},{6,7,8}}, p(m 4 ) = {{1,2},{3,4},{6,7,8}}, & p(m 5 ) = {{1,2},{3,4},{6,7}}. w(m 1 ) = 3, w(m 2 ) = 3, w(m 3 ) = 4, w(m 4 ) = 3, & w(m 5 ) = 5. a(m 1 ) = 0, a(m 2 ) = 0, a(m 3 ) = 1, a(m 4 ) = 2, & a(m 5 ) = 2. d(m 1 ) = 16, d(m 2 ) = 16, d(m 3 ) = 20, d(m 4 ) = 22, & d(m 5 ) = 24. f(m 1 ) = 0, f(m 2 ) = 0, f(m 3 ) = 1, f(m 4 ) = 2, & f(m 5 ) = 2. (m 1 ) = 3, (m 2 ) = 7, (m 3 ) = 14, (m 4 ) = 12, & (m 5 ) = 16. (m 1 ) = {2, 8}, (m 2 ) = {1, 2, 3, 4, 7, 8}, (m 3 ) = {2, 5, 7}, (m 4 ) = {1, 3, 6}, & (m 5 ) = {1, 3, 6}. The timetable rearrangement problem is done dynamically. That is, as soon as a meeting request comes, the scheduler tries to schedule the meeting by considering the travelling distance between the host of the meeting request and the current places of the participants with respect to the time of request. For instance, the input parameters required for the new timetable T(n+1) by rearrangement is defined as I1: A timetable T(n) = (P, M n, D m,, h, t, p, w, a, d, f,, ). I2: A partial order on M n+1 = M n {m n+1 }. I3: t(m n+1 ), p(m n+1 ), w(m n+1 ), a(m n+1 ), and d(m n+1 ). I4: A set F ( M n ) of meetings whose start times are fixed. The meetings that have higher priorities than m n+1 are kept in the set F. B. Example 2 Consider an instance to schedule a new meeting m 6 in Example1 with the following input parameters. I1: T(5) as in Example 1, shown in Fig. 1. I2: m 1 m 5, and m 2 m 4. I3: t(m 6 ) =3, p(m 6 ) ={{1},{3, 4},{6}}, h(m 6 ) = 6, a(m 6 ) = 6, w(m 6 ) = 1, & d(m 6 ) = 16. I4: F = {}. Fig. 2 Weighted Distance Matrix of venues The distance among the venues is shown in Fig. 2, and the corresponding input parameters for the Example 1 are given below. Fig. 3 Graphical Representation of T(6) with DM Fig. 3 shows an optimum timetable T(6) = (P, M 6, D m,, h, t, 1002
3 p, w, a, d, f,, ) by rescheduling of meetings in T(5) with a set of operations given in the next section, where (m 4 ) = 19, (m 5 ) = {2, 4, 7}, (m 6 ) = 13 and (m 6 ) = {1, 3, 6}. The fixing of meeting m 6 by rescheduling is explained in Section 4. III. CENTRALIZED MEETING SCHEDULER WITH DISTANCE METRICS In this model, six operations such as CP (Change of Person), XP (exchange of Person), SL (Shift Left), SR (Shift Right), CSL (Continuous Shift Left) and CSR (Continuous Shift Right) are used to rearrange the scheduled meetings so as to schedule the current meeting request. The rescheduling of meetings takes place if no free slots are available. Based on these operations, heuristic value is determined. The heuristic value will be the deciding factor for selecting the next node in the search tree expansion. The method of A*-Algorithm is applied with this heuristic value for the generation of search tree. This process will speed up the searching optimally. Let m n+1 be the current meeting to be scheduled and p(m n+1 ) = {g 1, g 2,, g r } be the set of groups of persons to be considered for scheduling m n+1. Let (m n+1 ) would be the set of attendees for m n+1, that is a set of candidates to be chosen from p(m n+1 ) one person per group. Further, let (x, x + t(m n+1 )) be the current interval considered for scheduling the meeting m n+1. These assumptions are used in the illustration of six operations, which are given in the following section. A. Rescheduling of Meetings with Distance Metrics Consider Fig. 1 for the illustration of the rescheduling operations. Let a(m n+1 ) and d(m n+1 ) be the arrival and deadline of meeting m n+1. The earliest feasible time for scheduling the meeting m n+1 (i.e., the function, eft(m n+1 )) and its feasible period are shown in Fig. 4. If free slots for all persons of m n+1 is available in the feasible period, then the meeting m n+1 is scheduled, otherwise rescheduling operations for those meetings with the required persons in the feasible period will take place. rescheduling. The following assumptions are considered for rescheduling of meetings: The processing time and communication time of events are not taken into account. To cancel a meeting m i, it is required that the cancellation message should reach the attendants of m i, (m i ), before they start for venue of m i, otherwise the meeting m i is not cancelled. SL: Shifts a meeting horizontally to the left. For each person p j (m n+1 ) and each meeting m i (x, x + t(m n+1 )), if there is a free time interval (s, s + t(m i )) to the left of (x, x + t(m n+1 )) such that s eft(m i ) with respect to the time at which the operation SL is applied, no person in (m i ) attends any meeting during (s, s + t(m i )), and there is enough time for the message about the change to reach (m i ) before they leave for venue of m i, then send the message to (m i ) and change the start time of m i to s. SR: Shifts a meeting horizontally to the right. For each person p j (m n+1 ) and each meeting m i (x, x + t(m n+1 )), if there is a free time interval (s, s + t(m i )) to the right of (x, x + t(m n+1 )) such that s + t(m i ) d(m i ) with respect to the time at which the operation SR is applied, no person in (m i ) attends any meeting during (s, s + t(m i )), and there is enough time for the message about the change to reach (m i ) before they leave for venue of m i, then send the message to (m i ) and change the start time of m i to s. Consider Fig. 1 for the illustration of SR operation. For example, let us consider the SR of meeting m 3 so as to make free slots for scheduling m 6 in (14, 17). The meeting m 3 is shifted to the right for the persons in ρ(m 3 ) = {2, 5, 6}from the time instance 14 to 17. Now, the number of slots available for m 6 is increased from one to two, shown in Fig. 5. Time a(m n+1) d(m n+1) Earliest feasible time for m n+1 Feasible period of scheduling for m n+1 Fig. 4 Feasibility of scheduling meeting m n+1 When a new meeting, say m n+1, is scheduled, if none of the slots is free in the feasible period of m n+1, then the set of six operations (CP, XP, SL, SR, CSL and CSR), at a time only one operation, is applied to reschedule the scheduled meetings out of the feasible period, and then the meeting m n+1 is scheduled. When these operations are applied for the generation of nodes of the search tree, the feasibility of scheduling meeting is verified with respect to the time of Fig. 5 SR on m 3 with DM CP: Changes person vertically within a group. This operation makes free slots for the persons (m n+1 ) in (x, x + t(m n+1 )) by changing one person with another within the respective groups. For each meeting m i (x, x + t(m n+1 )), if no person in (m i ) except some person p j (m i ) attends m i and if there is a person p k in {a a, p j g r and g r p(m i ), p k p j } who does not attend any meeting during ( (m i ), (m i ) + t(m i )), and both p j and p k satisfy the time constraints before and after the current meeting, then change the attendant p j of m i to p k. The 1003
4 operation CP m 3 p 6 p 8, changes person p 6 with person p 8 for the meeting m 3, is shown in Fig. 6. Fig. 6 CP on m 3 with DM XP: Exchanges persons within a group on different meetings. This makes free slots for the current meeting by making changes diagonally. That is, for any two persons p j, p k g p in p(m i ) and p j, p k g q in p(m n ) such that p j (m i ) and p k (m n ), then swap p j and p k between (m i ) and (m n ) if p j is free in (x, x + t(m n )), p k is free in (x, x + t(m i )) and both p j and p k satisfy the constraints after the previous meeting and before the next meetings. CSL (Continuous Shift Left): Shifts the meetings in (x, x + t(m n+1 )) horizontally to the left in order. For each person p j (m n+1 ) and each meeting m i (x, x + t(m n+1 )), if there is a time interval (s, s + t(m i )) to the left and disjoint with (x, x + t(m n+1 )) such that s eft(m i ), no person in (m i ) attends any meeting during (s, s + t(m i )), the message about the change to reach all of (m i ) before they leave for venue of m i and shifting the meetings in (s, s + t(m i )) to the left which are satisfying the constraints, then change the start time of m i to s and send the message to (m i ). CSR (Continuous Shift Right): Shifts the meetings in (x, x + t(m n+1 )) horizontally to the right in order. For each person p j (m n+1 ) and each meeting m i (x, x + t(m n+1 )), if there is a time interval (s, s + t(m i )) to the right and disjoint with (x, x + t(m n+1 )) such that s + t(m i ) d(m i ), no person in (m i ) attends any meeting during (s, s + t(m i )), the message about the change to reach all of (m i ) before they leave for venue of m i and shifting the meetings in (s, s + t(m i )) to the right which are satisfying the constraints, then change the start time of m i to s and send the message to (m i ). The CSR of meetings m 4 and m 5 with reference to Fig. 1 is shown in Fig. 7. Fig. 7 CSR of m 4 and m 5 with DM IV. A*-ALGORITHM WITH DISTANCE METRICS Scheduling of meetings in centralized meeting scheduling with distance metrics is done dynamically. That is, when a meeting request arrives, the scheduler tries to schedule the meeting by satisfying the conditions along with the traveling distance between the host of the meeting request and the participants current positions is considered with respect to the time of request. When a new meeting, say m n+1, is scheduled, if none of the slots is free in the feasible period, then the set of six operations is applied for generation of nodes of search tree to reschedule the scheduled meetings and then the new meeting m n+1 is fixed. When these operations are applied at the time of generation, the feasibility of scheduling meeting with respect to the time of request is verified. A*-Algorithm with rescheduling operations for the scheduler with distance metric, is given below. Algorithm Schedule(start-time(m n+1 ), deadline(m n+1 ),p(m n+1 )) //start-time(m n+1 ) a start time at which m n+1 could be //scheduled; deadline(m n+1 ) before which m n+1 should be //scheduled; p(m n+1 ) a set of group of persons considered //for m n Initialize the open-heap and the node-set. 2. Create a search tree, G, starting with the root node s of the schedule T(n). 3. Insert s into the open-heap and the node-set. 4. While(answer is not found) 5. Begin 6. if(open-heap is empty) 7. Print the error message and exit. 8. n delete the root of the open-heap 9. if(n is a goal node) 10. Schedule the meeting m n+1 and terminates. 11. Generate a set M of successors which are satisfying the distance factor and are not in the node-set by applying the operations: CP, XP, SL, SR, CSL, and CSR on n; insert into the node-set. 12. For each node in M, apply the heuristic function and establish a pointer to n. 13. Insert the nodes of M into the open-heap according to their heuristic values. 14. End 15. End Schedule A. Example 3 As an example of meeting scheduling with distance metric, scheduling of a new meeting, m 6, may be considered with the root configuration, which is shown in Fig. 1. To schedule the meeting m 6, A*-Algorithm is applied with distance metric to the root configuration, T(5). The request of m 6 arrives at the time instance 6, so the earliest time at which m 6 could be scheduled is calculated using the function etimeins(m i ): 1004
5 etimeins(m 6 ) = a(m 6 ) + max {min {dist(h(m 6 ), p 1 )}, min {dist(h(m 6 ), p 3 ), dist(h(m 6 ), p 4 )}, min {dist(h(m 6 ), p 6 )}} = 6 + max {3, min {3, 2}, 0} = 9. This means that m 6 could be scheduled at the earliest time instance 9. Since the dead line of the meeting m 6, d(m 6 ) = 16, the duration (9, 16) can be considered feasible duration for scheduling m 6. That is, m 6 could be scheduled in one of the time instances {9, 10,, 16}. After computing the feasible duration of a meeting, the scheduler has three choices in terms of increasing complexities to proceed further. That is, it has to look for (a) free time slots for all participants of the new meeting; (b) reschedule the scheduled meetings so as to find free time slots for the new meeting, or (c) cancel one or more meetings so as to schedule the new meeting. Generally, it depends on the meeting request and the current status of the calendar. Suppose that the scheduler decides to schedule the current meeting request m 6 at the earliest time instance of the feasible duration. In this case, the scheduler has to try from the time instance 9 one after another. Since all of the participants of the meeting m 6 are not free in the time interval (9, 12) and m 2 is already scheduled in that duration, the scheduler may decide to cancel the meeting m 2 and schedule m 6. To cancel the meeting m 2 at the time instance 6, ρ(m 2 ) should not have left for h(m 2 ) before the time instance 6 from their current positions. That is, if at least one of them in ρ(m 2 ) left before the time instance 6, the meeting m 2 could not be cancelled. The earliest leaving time of ρ(m 2 ) for m 2 = min {start(m 2 ) min {dist (current place of p i, h(m 2 )), dist(current place of p i, home(p i ) + dist(home(p i ), h(m 2 ))), for p(m 2 ) = {1, 2, 3, 4, 7, 8}}} = min {7 {3, 2, 1, 0, 3, 2}} = 4. That is, the earliest time of leaving for ρ(m 2 ) to m 2 is 4, at least one of ρ(m 2 ) would have left at the time instance 4. So the meeting m 2 is not cancelled to schedule the meeting m 6 and hence the scheduler decides to schedule m 6 after m 2, that is, at the time instance 11 onwards. Since p(m 6 ) = {{1}, {3, 4}, {6}}, the possible start-time for m 6 after m 2 is max {11 + dist(h(m 2 ), h(m 6 )), min{11 + dist(h(m 2 ), h(m 6 )), 11 + dist(h(m 2 ), h(m 6 ))}, 0 + dist(home(m 6 ), h(m 6 ))} = max {11 + 2, min {12, 12}, 0} = 13. So, the required time interval for scheduling m 6 is reduced to (13, 16) from (9, 16). For this time interval, there are four slots {(13, 16), (14, 17), (15, 18), and (16, 19)} of length three. For these four slots, the root node with four branches for scheduling of m 6 is given in Fig. 8, and the search tree is shown in Fig. 9. The node numbers are given at the left of the nodes. The heuristic values of the nodes (or branches) and their costs are given as (heuristic-value:cost) at the right side of each node. All four branches have the same heuristic value, 1. Here any branch can be taken for expansion of the search tree. The branch could be the first one or any one by random selection. Assume that the first slot, (13, 16) is chosen for expansion. The edges of the search tree are provided with the operations applied in A*-Algorithm. The node-id of the root is 0 and the expanded nodes are given node-ids from 1 onwards. Fig. 8 Possibilities of slot (13, 16) The operations applied for rescheduling of meetings can be divided into two sets. They are relevant-set and common-set of operations. Relevant-set operations are applied to the meetings and the participants of the meetings that are scheduled in a slot where the current request of a meeting is to be scheduled. The relevant-set operations increase the heuristic values of the children rather than the parent. Sometimes the relevant set operations may reduce the heuristic value of the children but increase the heuristic value of the grand children and their children and so on. The common-set includes all operations, that is, relevant-set and other operations applied in a search tree. For example, the relevantset operations can be applied for shorter solution path, minimum cost path, solutions with minimum number of nodes generation and solutions to be obtained with simple operations. Fig. 9 shows that there are 14 nodes in the search tree. The nodes are given numbers according to the levels. The root node is explored with the common-set operations. Six nodes are generated in the level one, numbered 1 to 6. The nodes with node-ids 1, 4 and 6 have heuristic value 2. Now the scheduler has to decide which node to choose to expand the search tree further. Since all three nodes have the same heuristic value, the scheduler selects the node 1 as the current node for expansion, as it has the minimum cost. - Solution - Heuristic value : cost Fig. 9 Search tree for m 6 with DM 1005
6 When node 1 is explored, two nodes with node-ids 7 and 8 are generated in the second level. As the node 7 is the solution node, the expansion of the search tree is terminated. So, eight nodes are generated in Fig. 9 when the common-set of operation is applied. VI. CONCLUSION Centralized meeting scheduling with distance metrics satisfies the dynamic requests of meeting and timing requirements before scheduling and cancellation of meetings with A*-Algorithm. This approach for the meeting scheduling with distance metrics using A*-Algorithm gives solutions with less memory requirements and processing time as the scheduler chooses only one node or branch at each level of the search tree during expansion. The number of meetings scheduled with distance metrics is less than that of scheduling of meetings without distance metrics. Further, the overheads involved in the processing time of the scheduler with distance metrics are little more than that of without distance metrics. REFERENCES Fig. 10 Search tree for m 6 with relevant set of operations Fig. 10 shows a search tree for the same problem as with Fig. 9 considering the relevant-set operations. At the level 1, nodes 1 and 2 are generated from the root node 0. Both nodes have heuristic value 2, but the cost of the nodes is different. At this point, A*-Algorithm chooses node 1 for expansion, and generates node 3. Since node 3 is a solution node, the process is terminated. So, in this search tree only three nodes are generated, two nodes at the first level and one node in the second level. Having less number of nodes generated, the processing time as well as the overhead involved in the generation of the search tree is reduced. Thus the relevant-set operations save a considerable amount of memory as well processing time, compared to the common-set of operations. V. RESULTS The simulation of the meeting scheduler with distance metrics using A*-Algorithm was carried out and the performance was compared by considering various combinations of parameters from different sets like distance matrix, number of slots in a calendar, number of persons, maximum number of groups, maximum number of persons in groups, maximum duration of meetings, and maximum number of time instances (that is, number of time instances between the arrival time and the deadline of the meeting request). It was observed that the participants of a meeting are required not only be available during the time of meeting t(m i ) but also for the time of travel from their current place to the venue of that particular meeting (t tra ). So, the time required for a meeting m i from the participants view is that t tra + t(m i ). Since t tra + t(m i ) t(m i ) for all m i, the number of meetings scheduled with distance metrics is less than scheduled meetings without distance metric. Further, for any meeting m i, the constraints before and after m i are to be checked for all ρ(m i ), so, the processing time of the scheduler with distance metric is more than that of without distance metrics. [1] Sugihara K., Kikuno T. and Yoshida N. (1989), A Meeting Scheduler for Office Automation, IEEE Transactions on Software Engineering, Vol.15, No.10, pp [2] Garey M.R. and Johnson D.S. (1979), Computers and Intractability: A Guide to the Theory of NP-Completeness, San Francisco, CA: Freeman. [3] Crawford E. and Veloso M. (2004), Opportunities for Learning in Multi-Agent Meeting Scheduling, [4] Maes P. (1994), Agents that Reduce Work and Information Overload, Communications of the ACM, Vol.37, No.7, pp [5] Mitchell T., Caruana R., Dayne F., McDermott J. and Zabowski D. (1994), Experience with a Learning Personal Assistant, Communications of the ACM, Vol.37, No.7, pp [6] Sen, S. and Durfee E.H. (1991), A Formal Study of Distributed Meeting Scheduling: Preliminary Results, Proceedings of the ACM Conference on Organizational Computing Systems, pp [7] Jeong W.S., Yun J.S. and Jo G.S. (1999), Cooperation in Multi-Agent System for Meeting Scheduling, Proceedings of the IEEE TENCON, pp [8] Nilsson N.J. (1990), Principles of Artificial Intelligence, Narosa Publishing House [9] Rich E. and Knight K (1995), Artificial Intelligence, Tata McGraw- Hill. [10] Russell S.J. and Norvig P. (2004), Artificial Intelligence - A Modern Approach, Second Edition, Pearson Education Series in Artificial Intelligence. [11] Ashir A., Joo K.H., Kinoshita T. and Shirotori N, (1997), Multi-Agent Based Decision Mechanism for Distributed Meeting Scheduling System, Proceedings of the International Conference on Parallel and Distributed Systems, pp [12] Ephrati E., Zlotkin G. and Rosenschein J.S. (1994), A Non- Manipulable Meeting Scheduling System, Thirteenth International Distributed Artificial Intelligence Workshop, pp [13] Garrido L. and Sycara K. (1996), Multi-Agent Meeting Scheduling: Preliminary Experimental Results, Proceedings of the First International Conference on Multi-Agent Systems, pp [14] Sen S. (1997), Developing an Automated Distributed Meeting Scheduler, IEEE Expert, July/August, pp M. Sugumaran received his M.Sc degree in mathematics from University of Madras in 1986, M.Tech degree in computer science and data processing from Indian Institute of Technology, Kharagpur, in 1991 and Ph.D in computer science and engineering from Anna University, Chennai in He is a life member of ISTE and CSI. He is currently working as Associate Professor in the Department of Computer Science and Engineering at Pondicherry Engineering College. His areas of interests include theoretical computer science, analysis of algorithms, parallel and distributed computing, spatialtemporal data and information security. 1006
An Effective Approach for Distributed Meeting Scheduler
International Journal of Information Technology Vol. 12 No. 8 26 M. Sugumaran 1, P. Narayanasamy 2, and K. S. Easwarakumar 2 1 Department of Computer Science and Engineering, Pondicherry Engineering College
Development of a personal agenda and a distributed meeting scheduler based on JADE agents
Development of a personal agenda and a distributed meeting scheduler based on JADE agents Miguel Ángel Sánchez Álvaro Rayón Alonso Grupo de Sistemas Inteligentes Departamento de Ingeniería Telemática Universidad
JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004
Scientiae Mathematicae Japonicae Online, Vol. 10, (2004), 431 437 431 JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS Ondřej Čepeka and Shao Chin Sung b Received December May 12, 2003; revised February
Meeting Scheduling with Multi Agent Systems: Design and Implementation
Proceedings of the 6th WSEAS Int. Conf. on Software Engineering, Parallel and Distributed Systems, Corfu Island, Greece, February 16-19, 2007 92 Meeting Scheduling with Multi Agent Systems: Design and
HYBRID GENETIC ALGORITHMS FOR SCHEDULING ADVERTISEMENTS ON A WEB PAGE
HYBRID GENETIC ALGORITHMS FOR SCHEDULING ADVERTISEMENTS ON A WEB PAGE Subodha Kumar University of Washington [email protected] Varghese S. Jacob University of Texas at Dallas [email protected]
Approximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows
TECHNISCHE UNIVERSITEIT EINDHOVEN Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows Lloyd A. Fasting May 2014 Supervisors: dr. M. Firat dr.ir. M.A.A. Boon J. van Twist MSc. Contents
Network (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 [email protected],
Load Balancing. Load Balancing 1 / 24
Load Balancing Backtracking, branch & bound and alpha-beta pruning: how to assign work to idle processes without much communication? Additionally for alpha-beta pruning: implementing the young-brothers-wait
STUDY OF PROJECT SCHEDULING AND RESOURCE ALLOCATION USING ANT COLONY OPTIMIZATION 1
STUDY OF PROJECT SCHEDULING AND RESOURCE ALLOCATION USING ANT COLONY OPTIMIZATION 1 Prajakta Joglekar, 2 Pallavi Jaiswal, 3 Vandana Jagtap Maharashtra Institute of Technology, Pune Email: 1 [email protected],
A SIMULATION MODEL FOR RESOURCE CONSTRAINED SCHEDULING OF MULTIPLE PROJECTS
A SIMULATION MODEL FOR RESOURCE CONSTRAINED SCHEDULING OF MULTIPLE PROJECTS B. Kanagasabapathi 1 and K. Ananthanarayanan 2 Building Technology and Construction Management Division, Department of Civil
A STUDY OF TASK SCHEDULING IN MULTIPROCESSOR ENVIROMENT Ranjit Rajak 1, C.P.Katti 2, Nidhi Rajak 3
A STUDY OF TASK SCHEDULING IN MULTIPROCESSOR ENVIROMENT Ranjit Rajak 1, C.P.Katti, Nidhi Rajak 1 Department of Computer Science & Applications, Dr.H.S.Gour Central University, Sagar, India, [email protected]
Cost Models for Vehicle Routing Problems. 8850 Stanford Boulevard, Suite 260 R. H. Smith School of Business
0-7695-1435-9/02 $17.00 (c) 2002 IEEE 1 Cost Models for Vehicle Routing Problems John Sniezek Lawerence Bodin RouteSmart Technologies Decision and Information Technologies 8850 Stanford Boulevard, Suite
CSE 4351/5351 Notes 7: Task Scheduling & Load Balancing
CSE / Notes : Task Scheduling & Load Balancing Task Scheduling A task is a (sequential) activity that uses a set of inputs to produce a set of outputs. A task (precedence) graph is an acyclic, directed
Optimizing agent-based meeting scheduling through preference estimation
Engineering Applications of Artificial Intelligence 16 (2003) 727 743 Optimizing agent-based meeting scheduling through preference estimation Andy Chun, Hon Wai*, Rebecca Y.M. Wong Department of Computer
Backward Scheduling An effective way of scheduling Warehouse activities
Backward Scheduling An effective way of scheduling Warehouse activities Traditionally, scheduling algorithms were used in capital intensive production processes where there was a need to optimize the production
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)
A Performance Comparison of Five Algorithms for Graph Isomorphism
A Performance Comparison of Five Algorithms for Graph Isomorphism P. Foggia, C.Sansone, M. Vento Dipartimento di Informatica e Sistemistica Via Claudio, 21 - I 80125 - Napoli, Italy {foggiapa, carlosan,
A Formal Study of Distributed Meeting Scheduling
DISTRIBUTED MEETING SCHEDULING Group Decision and Negotiation 7: 265 289, 1998 1998 Kluwer Academic Publishers. Printed in the Netherlands 265 A Formal Study of Distributed Meeting Scheduling SANDIP SEN
Memory Allocation Technique for Segregated Free List Based on Genetic Algorithm
Journal of Al-Nahrain University Vol.15 (2), June, 2012, pp.161-168 Science Memory Allocation Technique for Segregated Free List Based on Genetic Algorithm Manal F. Younis Computer Department, College
Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar
Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples
MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM
MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM J. Arokia Renjit Asst. Professor/ CSE Department, Jeppiaar Engineering College, Chennai, TamilNadu,India 600119. Dr.K.L.Shunmuganathan
Resource Allocation Schemes for Gang Scheduling
Resource Allocation Schemes for Gang Scheduling B. B. Zhou School of Computing and Mathematics Deakin University Geelong, VIC 327, Australia D. Walsh R. P. Brent Department of Computer Science Australian
Keywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age.
Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Load Measurement
Classification - Examples
Lecture 2 Scheduling 1 Classification - Examples 1 r j C max given: n jobs with processing times p 1,...,p n and release dates r 1,...,r n jobs have to be scheduled without preemption on one machine taking
Scheduling Shop Scheduling. Tim Nieberg
Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations
An Interactive Train Scheduling Tool for Solving and Plotting Running Maps
An Interactive Train Scheduling Tool for Solving and Plotting Running Maps F. Barber 1, M.A. Salido 2, L. Ingolotti 1, M. Abril 1, A. Lova 3, P. Tormos 3 1 DSIC, 3 DEIOAC, Universidad Politécnica de Valencia,
A Direct Numerical Method for Observability Analysis
IEEE TRANSACTIONS ON POWER SYSTEMS, VOL 15, NO 2, MAY 2000 625 A Direct Numerical Method for Observability Analysis Bei Gou and Ali Abur, Senior Member, IEEE Abstract This paper presents an algebraic method
Traffic Engineering for Multiple Spanning Tree Protocol in Large Data Centers
Traffic Engineering for Multiple Spanning Tree Protocol in Large Data Centers Ho Trong Viet, Yves Deville, Olivier Bonaventure, Pierre François ICTEAM, Université catholique de Louvain (UCL), Belgium.
Weighted Graph Approach for Trust Reputation Management
Weighted Graph Approach for Reputation Management K.Thiagarajan, A.Raghunathan, Ponnammal Natarajan, G.Poonkuzhali and Prashant Ranjan Abstract In this paper, a two way approach of developing trust between
International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.
RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article
On the k-path cover problem for cacti
On the k-path cover problem for cacti Zemin Jin and Xueliang Li Center for Combinatorics and LPMC Nankai University Tianjin 300071, P.R. China [email protected], [email protected] Abstract In this paper we
A Locality Enhanced Scheduling Method for Multiple MapReduce Jobs In a Workflow Application
2012 International Conference on Information and Computer Applications (ICICA 2012) IPCSIT vol. 24 (2012) (2012) IACSIT Press, Singapore A Locality Enhanced Scheduling Method for Multiple MapReduce Jobs
Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs
Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,
ANALYSIS OF WORKFLOW SCHEDULING PROCESS USING ENHANCED SUPERIOR ELEMENT MULTITUDE OPTIMIZATION IN CLOUD
ANALYSIS OF WORKFLOW SCHEDULING PROCESS USING ENHANCED SUPERIOR ELEMENT MULTITUDE OPTIMIZATION IN CLOUD Mrs. D.PONNISELVI, M.Sc., M.Phil., 1 E.SEETHA, 2 ASSISTANT PROFESSOR, M.PHIL FULL-TIME RESEARCH SCHOLAR,
ACO Hypercube Framework for Solving a University Course Timetabling Problem
ACO Hypercube Framework for Solving a University Course Timetabling Problem José Miguel Rubio, Franklin Johnson and Broderick Crawford Abstract We present a resolution technique of the University course
Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration
Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration 1 Harish H G, 2 Dr. R Girisha 1 PG Student, 2 Professor, Department of CSE, PESCE Mandya (An Autonomous Institution under
On-line scheduling algorithm for real-time multiprocessor systems with ACO
International Journal of Intelligent Information Systems 2015; 4(2-1): 13-17 Published online January 28, 2015 (http://www.sciencepublishinggroup.com/j/ijiis) doi: 10.11648/j.ijiis.s.2015040201.13 ISSN:
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 10, 2015 ISSN (online): 2321-0613
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 10, 2015 ISSN (online): 2321-0613 Planning, Scheduling and Resource Optimization for A Villa by using Ms-Project 2010 Mr.
Scheduling Algorithm for Delivery and Collection System
Scheduling Algorithm for Delivery and Collection System Kanwal Prakash Singh Data Scientist, DSL, Housing.com Abstract Extreme teams, large-scale agents teams operating in dynamic environments are quite
The Problem of Scheduling Technicians and Interventions in a Telecommunications Company
The Problem of Scheduling Technicians and Interventions in a Telecommunications Company Sérgio Garcia Panzo Dongala November 2008 Abstract In 2007 the challenge organized by the French Society of Operational
TEST CASE SELECTION & PRIORITIZATION USING ANT COLONY OPTIMIZATION
TEST CASE SELECTION & PRIORITIZATION USING ANT COLONY OPTIMIZATION Bharti Suri Computer Science Department Assistant Professor, USIT, GGSIPU New Delhi, India [email protected] Shweta Singhal Information
Load balancing Static Load Balancing
Chapter 7 Load Balancing and Termination Detection Load balancing used to distribute computations fairly across processors in order to obtain the highest possible execution speed. Termination detection
New binary representation in Genetic Algorithms for solving TSP by mapping permutations to a list of ordered numbers
Proceedings of the 5th WSEAS Int Conf on COMPUTATIONAL INTELLIGENCE, MAN-MACHINE SYSTEMS AND CYBERNETICS, Venice, Italy, November 0-, 006 363 New binary representation in Genetic Algorithms for solving
IMPROVING RESOURCE LEVELING IN AGILE SOFTWARE DEVELOPMENT PROJECTS THROUGH AGENT-BASED APPROACH
IMPROVING RESOURCE LEVELING IN AGILE SOFTWARE DEVELOPMENT PROJECTS THROUGH AGENT-BASED APPROACH Constanta Nicoleta BODEA PhD, University Professor, Economic Informatics Department University of Economics,
Scheduling Allowance Adaptability in Load Balancing technique for Distributed Systems
Scheduling Allowance Adaptability in Load Balancing technique for Distributed Systems G.Rajina #1, P.Nagaraju #2 #1 M.Tech, Computer Science Engineering, TallaPadmavathi Engineering College, Warangal,
Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1
Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Maitreya Natu Dept. of Computer and Information Sciences University of Delaware, Newark, DE, USA, 19716 Email: [email protected]
Decentralized Utility-based Sensor Network Design
Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA [email protected], [email protected]
Load Balancing and Termination Detection
Chapter 7 Load Balancing and Termination Detection 1 Load balancing used to distribute computations fairly across processors in order to obtain the highest possible execution speed. Termination detection
Introduction to Logic in Computer Science: Autumn 2006
Introduction to Logic in Computer Science: Autumn 2006 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today Now that we have a basic understanding
5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1
5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 General Integer Linear Program: (ILP) min c T x Ax b x 0 integer Assumption: A, b integer The integrality condition
The truck scheduling problem at cross-docking terminals
The truck scheduling problem at cross-docking terminals Lotte Berghman,, Roel Leus, Pierre Lopez To cite this version: Lotte Berghman,, Roel Leus, Pierre Lopez. The truck scheduling problem at cross-docking
INTEGER PROGRAMMING. Integer Programming. Prototype example. BIP model. BIP models
Integer Programming INTEGER PROGRAMMING In many problems the decision variables must have integer values. Example: assign people, machines, and vehicles to activities in integer quantities. If this is
Picture Maze Generation by Successive Insertion of Path Segment
1 2 3 Picture Maze Generation by Successive Insertion of Path Segment 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32. ABSTRACT Tomio Kurokawa 1* 1 Aichi Institute of Technology,
A Genetic Algorithm Approach for Solving a Flexible Job Shop Scheduling Problem
A Genetic Algorithm Approach for Solving a Flexible Job Shop Scheduling Problem Sayedmohammadreza Vaghefinezhad 1, Kuan Yew Wong 2 1 Department of Manufacturing & Industrial Engineering, Faculty of Mechanical
Interactive Timetabling
Interactive Timetabling Tomáš Müller, Roman Barták * Charles University Department of Theoretical Computer Science Malostranské náměstí 2/25, Praha 1, Czech Republic [email protected] [email protected]
Lossless Grey-scale Image Compression using Source Symbols Reduction and Huffman Coding
Lossless Grey-scale Image Compression using Source Symbols Reduction and Huffman Coding C. SARAVANAN [email protected] Assistant Professor, Computer Centre, National Institute of Technology, Durgapur,WestBengal,
Distributed Dynamic Load Balancing for Iterative-Stencil Applications
Distributed Dynamic Load Balancing for Iterative-Stencil Applications G. Dethier 1, P. Marchot 2 and P.A. de Marneffe 1 1 EECS Department, University of Liege, Belgium 2 Chemical Engineering Department,
FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM
International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT
CMRadar: A Personal Assistant Agent for Calendar Management
CMRadar: A Personal Assistant Agent for Calendar Management Pragnesh Jay Modi, Manuela Veloso, Stephen F. Smith, Jean Oh Department of Computer Science Carnegie Mellon University Pittsburgh PA 15213 {pmodi,mmv,sfs,jeanoh}@cs.cmu.edu
Modeling and Performance Evaluation of Computer Systems Security Operation 1
Modeling and Performance Evaluation of Computer Systems Security Operation 1 D. Guster 2 St.Cloud State University 3 N.K. Krivulin 4 St.Petersburg State University 5 Abstract A model of computer system
Load balancing in a heterogeneous computer system by self-organizing Kohonen network
Bull. Nov. Comp. Center, Comp. Science, 25 (2006), 69 74 c 2006 NCC Publisher Load balancing in a heterogeneous computer system by self-organizing Kohonen network Mikhail S. Tarkov, Yakov S. Bezrukov Abstract.
DATA ANALYSIS IN PUBLIC SOCIAL NETWORKS
International Scientific Conference & International Workshop Present Day Trends of Innovations 2012 28 th 29 th May 2012 Łomża, Poland DATA ANALYSIS IN PUBLIC SOCIAL NETWORKS Lubos Takac 1 Michal Zabovsky
Reliability Guarantees in Automata Based Scheduling for Embedded Control Software
1 Reliability Guarantees in Automata Based Scheduling for Embedded Control Software Santhosh Prabhu, Aritra Hazra, Pallab Dasgupta Department of CSE, IIT Kharagpur West Bengal, India - 721302. Email: {santhosh.prabhu,
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management
Applied Algorithm Design Lecture 5
Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design
Two Approaches to Internet Traffic Engineering for End-to-End Quality of Service Provisioning
Two Approaches to Internet Engineering for End-to-End Quality of Service Provisioning Kin-Hon Ho, Michael Howarth, Ning Wang, George Pavlou and Stylianos Georgoulas Centre for Communication Systems Research,
Determination of the normalization level of database schemas through equivalence classes of attributes
Computer Science Journal of Moldova, vol.17, no.2(50), 2009 Determination of the normalization level of database schemas through equivalence classes of attributes Cotelea Vitalie Abstract In this paper,
A Comparative Study of Scheduling Algorithms for Real Time Task
, Vol. 1, No. 4, 2010 A Comparative Study of Scheduling Algorithms for Real Time Task M.Kaladevi, M.C.A.,M.Phil., 1 and Dr.S.Sathiyabama, M.Sc.,M.Phil.,Ph.D, 2 1 Assistant Professor, Department of M.C.A,
GA as a Data Optimization Tool for Predictive Analytics
GA as a Data Optimization Tool for Predictive Analytics Chandra.J 1, Dr.Nachamai.M 2,Dr.Anitha.S.Pillai 3 1Assistant Professor, Department of computer Science, Christ University, Bangalore,India, [email protected]
A New Approach For Estimating Software Effort Using RBFN Network
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.7, July 008 37 A New Approach For Estimating Software Using RBFN Network Ch. Satyananda Reddy, P. Sankara Rao, KVSVN Raju,
A Constraint Programming based Column Generation Approach to Nurse Rostering Problems
Abstract A Constraint Programming based Column Generation Approach to Nurse Rostering Problems Fang He and Rong Qu The Automated Scheduling, Optimisation and Planning (ASAP) Group School of Computer Science,
A New Nature-inspired Algorithm for Load Balancing
A New Nature-inspired Algorithm for Load Balancing Xiang Feng East China University of Science and Technology Shanghai, China 200237 Email: xfeng{@ecusteducn, @cshkuhk} Francis CM Lau The University of
An ACO Approach to Solve a Variant of TSP
An ACO Approach to Solve a Variant of TSP Bharat V. Chawda, Nitesh M. Sureja Abstract This study is an investigation on the application of Ant Colony Optimization to a variant of TSP. This paper presents
IST 301. Class Exercise: Simulating Business Processes
IST 301 Class Exercise: Simulating Business Processes Learning Objectives: To use simulation to analyze and design business processes. To implement scenario and sensitivity analysis As-Is Process The As-Is
The number of marks is given in brackets [ ] at the end of each question or part question. The total number of marks for this paper is 72.
ADVANCED SUBSIDIARY GCE UNIT 4736/01 MATHEMATICS Decision Mathematics 1 THURSDAY 14 JUNE 2007 Afternoon Additional Materials: Answer Booklet (8 pages) List of Formulae (MF1) Time: 1 hour 30 minutes INSTRUCTIONS
Smart Graphics: Methoden 3 Suche, Constraints
Smart Graphics: Methoden 3 Suche, Constraints Vorlesung Smart Graphics LMU München Medieninformatik Butz/Boring Smart Graphics SS2007 Methoden: Suche 2 Folie 1 Themen heute Suchverfahren Hillclimbing Simulated
AC 2012-4561: MATHEMATICAL MODELING AND SIMULATION US- ING LABVIEW AND LABVIEW MATHSCRIPT
AC 2012-4561: MATHEMATICAL MODELING AND SIMULATION US- ING LABVIEW AND LABVIEW MATHSCRIPT Dr. Nikunja Swain, South Carolina State University Nikunja Swain is a professor in the College of Science, Mathematics,
A Multi-Agent Approach to a Distributed Schedule Management System
UDC 001.81: 681.3 A Multi-Agent Approach to a Distributed Schedule Management System VYuji Wada VMasatoshi Shiouchi VYuji Takada (Manuscript received June 11,1997) More and more people are engaging in
Bicolored Shortest Paths in Graphs with Applications to Network Overlay Design
Bicolored Shortest Paths in Graphs with Applications to Network Overlay Design Hongsik Choi and Hyeong-Ah Choi Department of Electrical Engineering and Computer Science George Washington University Washington,
Home Page. Data Structures. Title Page. Page 1 of 24. Go Back. Full Screen. Close. Quit
Data Structures Page 1 of 24 A.1. Arrays (Vectors) n-element vector start address + ielementsize 0 +1 +2 +3 +4... +n-1 start address continuous memory block static, if size is known at compile time dynamic,
Measuring the Performance of an Agent
25 Measuring the Performance of an Agent The rational agent that we are aiming at should be successful in the task it is performing To assess the success we need to have a performance measure What is rational
Energy Constrained Resource Scheduling for Cloud Environment
Energy Constrained Resource Scheduling for Cloud Environment 1 R.Selvi, 2 S.Russia, 3 V.K.Anitha 1 2 nd Year M.E.(Software Engineering), 2 Assistant Professor Department of IT KSR Institute for Engineering
