front unit 1 3 back unit

Size: px
Start display at page:

Download "front unit 1 3 back unit"

Transcription

1 GreedyApproximationsofIndependentSetsinLowDegree Magn sm.halld rsson GraphsKiyohitoYoshiharay lemincubicgraphsandgraphsofmaximumdegreethree.thesealgorithmiterativelyselect verticesofminimumdegree,butdierinthesecondaryruleforchoosingamongmanycandidates.westudythreesuchalgorithms,andprovetightperformanceratios,withthebest withthealgorithmwiththebestperformanceratioknownof1:2. algorithmthatgreedilyselectsverticesofminimumhasaperformanceratioatleast1:25on degree-threegraphs,evenifgivenanoracletochooseamongcandidateverticesofminimum degree. Wealsoshowcertaininherentlimitationsinthepowerofthisfamilyofalgorithm:any Weinvestigatethepowerofafamilyofgreedyalgorithmsfortheindependentsetprob- Abstract onebeing9=71:28.allofthesealgorithmsarepracticalandruninlineartime,incontrast AnindependentsetofagraphGisasubsetofverticesinwhichnotwoareadjacent.TheMax 1IndependentSetproblemsisthatofndinganindependentsetofmaximumcardinality.Itis Introduction measuredbytheperformanceratio,orthemaximumratioofthesizeofanoptimalsolution(the alwaysoptimalbutareclosetooptimal.thequalityofanapproximationalgorithmisgenerally toexist.itisthereforeinterestingtoexplorealgorithmsthatproducesolutionsthatarenot oneofthecorenp-hardproblems[4],andthus,polynomialtimeexactalgorithmsareunlikely sizeofthemaximumindependentset)tothesizeofthesolutionfoundbythealgorithm. etal.[1]showedthatitisnp-hardtoobtainaperformanceratiooflessthannforsome >0,wherenisthenumberofvertices.Onspecialclassesofgraphs,however,theproblem doesadmitconstantfactorapproximations. Theindependentsetproblemisknowntobehardtoapproximateongeneralgraphs.Arora followingapaperofhochbaum[9],therehasbeenaurryofresultsontheapproximationof independentsetsinbounded-degreegraphs[3,6,7,2].thecurrentlybestratiosknownare (+3)=5formaximumdegree613[3,2],=6+O(1)forintermediatevaluesof,and Oneimportantsuchclassisthatofbounded-degreegraphs.Afteradecadeofnon-activity O(=loglog)[7,8]forlargevaluesof.. degreeisatmostthree.sincetheindependentsetproblemispolynomialsolvablewhenmaximum degreeistwo,thisproblemcanbethoughtofastheinitialfrontierofnp-hardnessofthe problem.also,manyoftheresultsforhigherdegreesusereductionstolowerdegreecases,in Inthispaperwefocusonacentralcaseofbounded-degreegraphs,namelywhenthemaximum atjapanadvancedinstituteofscienceandtechnologyhokuriku,ibmtokyoresearchlab,andmaxplanck InstitutfuerInformatik. Contactauthor.ScienceInstitute,UniversityofIceland,IS-107Reykjavik,Iceland.Researchpartlyperformed ydepartmentofcomputerscience,tokyoinstituteoftechnology 1

2 three.theproblemremainsnp-hardandmaxsnp-hard(hardtoapproximatewithinsome casetranslatetoimprovementsforallodddegrees. whichthedegree-threeplaystheroleofthebasiscase[3,7,5,2],andimprovementsforthat xedconstantgreaterthanone)evenunderthesestrongrestrictions. Weadditionallyconsidercubicgraphs,i.e.3-regulargraphs,whereallverticesareofdegree thatattainsaperformanceratioof1:25.thishasrecentlybeenbroughtdownto1:2byberman graphs.hochbaum[9]presentedanalgorithmwitha1:5ratio,thatrunsintimeproportional tobipartitematchingoro(n1:5).bermanandf rer[3]gaveapowerfullocalsearchapproach Letusreviewtheknownresultsaboutapproximatingindependentsetsindegree-three andfujito[2]usingadditionaltricks.thedisadvantageofthisapproachisaphenomenallyhigh analysis[7]thecomplexityappearstobenolessthann50.inresponsetothis,halld rssonand timecomplexity:theanalysisof[3,2]yieldsaboundofatleastn2100,whileevenwithatighter Radhakrishnan[7]gaveascaled-downversionofthelocalsearchapproachof[3]whichrunsin lineartimewithaperformanceratioof1:4.generalizations[5]leadtoa1:33+ratiointime O(exp(1=)n). andrepeatuntilthegraphisempty.thisapproachisnon-deterministicinthechoiceofa vertexofminimumdegree,addthevertextothesolution,removethevertexanditsneighbors, particularvertexofminimumdegree.thebasicalgorithm,selectinganarbitraryminimum Thealgorithmparadigmthatweconsiderinthispaperisthatofgreedyalgorithms:selecta alwayschooseminimum-degreevertices,butwithdierentrulestodecideamongcandidate performanceratioondegree-threegraphswasshowntobe5=3. degreevertex,wasanalyzedindetailbyhalld rssonandradhakrishnan[6].inparticular,the vertices.typically,thealgorithmsattempttoeliminatemorethantheminimumnumberof edgesineachreduction,orpreferreductionsthatcomparewellwiththeoptimalsolution.in Weconsiderheregreedyalgorithmswithmoregoal-directedselectionrules.Thealgorithms summary,ourresultsareasfollows: 1.Thebasicgreedyalgorithmattainsaperformanceratioof3=2oncubicgraphs.Further 2.Amodiedgreedyalgorithmispresentedthatattainsaratioof3=2on(general)degreethreegraphs.Theratioimprovestoaratiothatapproaches4=3oncubicgraphswithhigh restrictingtheinputtographsofhighoddgirthyieldsnofurtherimprovements. 3.Asecondmodiedgreedyalgorithmispresentedthatattainsaratioof9=71:28on oddgirth. 4.Anygreedyalgorithmisshowntohaveaperformanceratioatleast1:25ondegree-three degree-threegraphs. Thepaperisorganizedintosectionsfollowingtheabovelist. algorithm. graphs.thus,thewholefamilyhaslimitationswhicharenearlymatchedbyoursecond 22.1Notation Weusestandardsymbolsandnotations.TheinputgraphG=(V;E)isassumedtobeof Preliminaries thenumberofvertices,mthenumberofedges,theindependencenumber(i.e.sizeofthe maximumdegreethree,withfurtherrestrictionsexplicitlystatedwheninplace.letndenote 2

3 optimalindependentset).foravertexv,n(v)denotestheneighborhoodofv,orthesetof adjacentvertices. Adef performanceratioofaisdenedasthemaximumapproximationratiooverallinputgraphs,or denotedbya(g),andtheapproximationratioa(g)isdenedasa(g)def ForanalgorithmAforMaxIndependentSet,thesizeofthesolutionproducedonGis WeletIdenoteaxedbutarbitrarymaximumindependentsetinG.LetOutdenotethe =maxga(g).weareprimarilyinterestedinthelimitofthisvalueasngoestoinnity. =(G)=A(G).The numberofedgeswithbothendpointsinv?i. itisessentialtohaveatonesdisposalagoodupperboundoftheoptimalsolution.thenumber Inordertoanalyzetherelativevalueofaheuristicsolutioncomparedwithanoptimalsolution, OutofedgesoutsidesomemaximumcardinalitysolutionIplaysacrucialrole. 2.2Upperboundingtheoptimalsolution Lemma2.1Foradegree-threegraphG, (G)n?m=3?Out=3: (1) ofendpointsinv?iisatmost3(n?jij).thus, Proof.EachedgehaseitheroneendpointinIorbothendpointsinV?I.Thetotalnumber which,whenrearranged,yieldstheclaim. Inacubicgraph,m=3n=2,andtheinequalitybecomesn=2?Out=3. m3(n?jij)?out; 3Werstconsiderthewell-knownGreedyalgorithm,whichwelabelhereasGreedy.Thealgorithm proceedsalongasequenceofiterationsorreductions,eachofwhichconsistsofthefollowingtwo GreedyAlgorithmonCubicGraphs steps:somevertexofminimumdegreeisaddedtothesolution,andthevertex,itsneighbors,and havebeendeletedfromthegraph.sinceneighborsofaselectedvertexareimmediatelydeleted, allincidentedgesareremovedfromthegraph.thealgorithmterminateswhentheallvertices thesolutionconsistingoftheselectedverticesformaproperindependentset.bymaintaining trackofthedegreesofthevertices,thealgorithmcanbeimplementedino(n+m)time. ondegree-threegraphswasshowntobe5=31:66.abetterratioispossibleinthecaseof cubicgraphs. Greedywasanalyzedforbounded-degreegraphsin[6],whereitsapproximationperformance nected.observethatgreedypicksavertexofmaximumdegreeatmostonce,sincenoproper Theorem3.1TheperformanceratioofGreedyoncubicgraphsis3=2. step.thatis, inducedsubgraphcanberegular.thus,atmostthreeverticesaredeletedinallbuttherst Werstarguetheupperbound.Assumewithoutlossofgeneralitythatthegraphiscon- Min0(n?1)=3: 3

4 If1or2,thenGreedyn=3;if3or4,thenn=2?1=3byLemma2.1.Ineithercase,the Remark.ItcanbearguedthatGreedyndsanoptimalsolutioninregularbipartitegraphs. performanceratioisatmost3=2. Considerthelastreductionmade.Thedeletedverticesmustformacliqueon1to4vertices. 3=2?3=(2n?2). ByapplyingLemma2.1,thatimpliesaperformanceratioofatmost(n=2?1=3)=((n?1)=3)= graphisconstructedfromthreeunits:frontunit,backunit,andmultiplecopiesofrepetition achainwiththreeedgesbetweenadjacentcopies.thechainisankedontheendsbythefront units.therepetitionunitsareintheformofa12-cyclewiththreecords,andareconnectedin WenowconstructahardgraphforGreedythatshowsthattheaboveratioistight.The andrearunits,bothintheformofacompletebipartitegraphk2;3,withthethreeverticesinone bypicture,infigure1. partitionconnectedtotheendsoftherepetitionunitchain.thegraph,g0,isbestdescribed 2 4 uf vf breakingchoices.thealgorithmstartsbychoosingvfandufofthefrontunit.ontherst Figure1:AhardgraphforGreedy. front unit 1 3 repetitionunititchoosesvertices1through4inthatorder.thisleavesanidenticalgraphless Weindicatetheworst-casebehaviorofGreedybypresentingaparticularsequenceofsymmetry- back unit asinglerepetitionunit.hence,thealgorithmpicksthefourshadedverticesofeachrepetition unit,endingwiththreeverticesfromtherearunit. solutioncontains6`+4.thetotalnumberofverticesis12`+10.hence,theapproximation ratioofgreedyong0is: If`isthenumberofrepetitionunits,thealgorithmnds4`+5verticeswhiletheoptimal 3=2.Observethatthesameholdsevenifthegraphsarerequiredtobetriangle-free. WeconcludethattheperformanceratioofGreedyoncubicgraphsasymptoticallyequals 0(G0)=6`+4 4`+5=32? 2(n+5): 21 4TheworstcasebehaviorofGreedy,asseenwhenappliedtothehardgraphsG0intheprevious section,suggestsadirectionformodifyingthestrategyofthealgorithm.asituationwhere AModiedGreedyAlgorithm Greedyappearstobeweakiswhentherearemanyverticesofminimumdegree.Inthissection, weproposeamodiedversionofgreedy,namedmoreedges,whichconsidersthedegreesof verticesadjacenttoavertexasacriteriaforselectingthevertices.thecriteriais: Whenminimumdegreeistwo,selectwheneverpossibleavertexwithaneighbor ofdegreethree. 4

5 solution. composedofseveraldisjointcycles.onthatremainingportion,moreedgesobtainsanoptimal Ifnosuchvertexexistsandtheminimumdegreeistwo,thenwecanshowthatthegraphis degree-threegraphs. Theorem4.1TheperformanceratioofMoreEdgesondegree-threegraphsis3=2. Wendthatthismodiedalgorithmyieldsanimprovementoverthe5=3ratioofGreedyon Upperbound Theoperationofthealgorithmcanbebrokenupintoreductions,eachofwhichconsistsof theadditionofasinglevertextothecurrentsolutionandthedeletionofthisandneighboring verticesalongwiththeincidentedges.iftherecursivedescriptionofthealgorithmismade iterative,areductioncorrespondstoasingleiteration.an(i;j)-reductionreferstoonewhere i?1verticesandjedgesaredeleted. 0,0 1,2 1,1 1,3 2,3 2,4 Selected Deleted Incident 2,4 2,5 2,5 2,6 3,6 3,7 3,8 3,9 theirneighbors(whicharealsodeleted)areingrey,andotherincidentverticesareinwhite. TheformofthepossiblereductionsaregiveninFigure2.Theselectedverticesareinblack, Figure2:Theformsofthevariousreductions. nalityindependentsetiforcomparison. (2;4)and(2;5)reductionsappearintwodierentguises. n(r) Weconsiderthefollowingmeasuresofeachreductionr.Here,wexsomemaximumcardi- Out(r)NumberofdeletededgeswithbothendpointsinV?I. e(r) (r) Numberofverticesdeleted Ourprimarycostmeasureofeachreductionrisgivenby: Numberofedgesdeleted NumberofthedeletedverticesthatbelongtoI forout(r),e(r)arelowerbounds,while(r)andf(r)areupperbounds. Table1givesconservativeboundsforthesemeasuresoneachtypeofreduction.Thevalues f(r)=3n(r)?e(r)?out(r)+(r): 5

6 r(0;0) 1n(r)e(r)Out(r)(r)f(r) (2;4) (2;3) (1;x) y (3;8) (3;7) (3;6) (2;5+) Table1:BoundsonmeasuresofthereductionsperformedbyMoreEdges (3;9) whichvertexitstartswith.thus,itcausesnoharmifweassumethatitchoosesavertexfor of(2;4).whena(2;4)-reductionoccurs,thegraphnecessarilyconsistsofdisjointcycles.the algorithmwilladdthesamenumberofverticestothesolutionfromagivencycle,nomatter ThevaluesinTable1areeasilyveriedfromFigure2,withtheexceptionofthevalue whichatmostoneneighborbelongstoagivenmaximumindependentset. Theclaimoftheupperboundnowfollowseasilyfromthef-valuesofTable1,andLemma2.1: Lowerbound 6t=Xr6Xrfr=3n?e?Out+4: WeconstructahardgraphforMoreEdgesasinFigure3.Itisachainofsimpleunitswith sixverticeseach.eachunitformsasix-cyclewithonecordbetweenthethirdandthefth vertex.thelastvertexineachunitisalsoadjacenttotherstvertexinthesubsequentunit. Formally,weconstructafamilyofgraphsGq,withverticesverticesvi;1;:::;vi;6andedges (vi;j;vi;j+1);(vi;3;vi;5);(vi0;6;vi0+1;1),wherei=1;:::q,j=1;:::6andi0=1;:::q?1. optimalsolutionwillcontainthesecond,fourthandsixth.onlyonthelastunitwillmoreedges MoreEdgesmaybeassumedtoselecttherstandthethirdvertexofeachunit,whilethe Figure3:InitialportionofahardgraphforMoreEdges. 3=2?(1=n). alsondthreevertices.hence,theperformanceratioofmoreedgesisnobetterthan3q=(2q+1)= Furtherresults Wehavefurtheranalyzedthealgorithmforclassesofcubicgraphs.Inparticular,thealgorithm attainsperformanceratiosof17=121:42oncubicgraphs,29=211:38oncubictriangle-free tightastherearegraphswheretheseratiosoccur.weomitthedescriptionsforreasonsofspace. graphs,andingeneral4=3+1=(9k+3)oncubicgraphsofoddgirth2k+1.thosevaluesare 6

7 algorithmperformsthefollowingtwotypesoftransformationswheneverpossible. Weconsiderinthissectionastillstrongermemberofthegreedyparadigm.Inparticular,the 5 ASecondImprovedAlgorithm BranchyreductionWhentwoverticesvanduofdegreetwoareadjacent,someoptimal solutionwillcontainexactlyoneofthesevertices.wecantransformthegraphintoa graphg0thatcontainsallverticesbutvanduandhastheotherneighborsofvandu adjacent.toensurethatmulti-edgesdonotappear,weinsistthatnothirdvertexbe adjacenttobothvandu.thesolutionoftheheuristicwillcontaintheheuristicsolution SimplicialreductionAsimplicialvertexisonewhoseneighborhoodformsaclique.Anoptimalsolutioncancontainatmostonevertexfromthisopenneighborhood,henceselecting eectisoptimal. ong0alongwithoneofvandu.thisisacaseofadelayed-commitmentreduction,whose Simplicialreductionsappearas(1;1?3),(2;3?5)and(3;6)-reductions.Branchyreductions onewhosetwoneighborsareadjacent,wheneverpossible. asimplicialvertexisalwaysoptimal.inparticular,whenminimumdegreeistwo,weselect appearas(1;2)-reductions.thesetrickshaveearlierbeenusedin[2]. Simplicial(G) repeat performreductionsinthefollowingorderofpreference: 1.branchy,simplicial,(2;6) end untildone 3.(3;9) 2.(3;8) algorithmcanbeimplementedinlineartime. Bykeepingtrackoftheshapeoftheneighborhoodofeachvertexinthecurrentgraph,the 4=3+1=[5].Further,byusingthisalgorithmasthesubroutinefordegreethreegraphsin previousbestratioclaimedforanalgorithmwithlow-polynomialtimecomplexity[6,7,5]was theschemaof[7](originatingin[3]),weobtainsimilarimprovementsfortheindependentset Thisalgorithmattainsaratioof9=71:28ondegree-threegraphs.Incomparison,the Theorem5.1TheperformanceratioofSimplicialongraphsofmaximumdegreethreeisexactly probleminotherclassesofbounded-degreegraphs. 9=7ẆerstgiveasimpleconstructionforthelowerboundinFigure4.Firstbuildaunitwith Wedevotetherestofthissectionforprovingourmainresult. byaddingonevertexuconnectedtothev1'softhreeunits. andfthandseventh.allverticesareofdegreethree,exceptv1.thehardgraphisobtained sevenvertices,v1;:::v7formingacyclewithchordsbetweensecondandfourth,thirdandsixth, maychooseanyvertexbutuandv1vertices.onetie-breakingchoiceistoselectv2,followedby v7,u,andtwoverticesfromeachofthetworemainingunits,foratotalofseven.ontheother hand,theoptimalsolutionconsistsoftherst,thirdandfthvertexofeachunit,foratotalof Fortheinitialchoice,thealgorithmwillprefera(3;8)-reductionovera(3;9)-reduction,and nine. 7

8 v 4 v 5 Figure4:AhardgraphforSimplicial. v v 4 5 v 4 v 5 v 3 v 6 v 3 v 6 v 3 v 6 v 2 v 7 v 2 v 7 v 2 v v 1 v1 v isgivenby: 5.1Upperbound UsingthesamemeasuresofthereductionsasforMoreEdges,ourcostmeasureforthisalgorithm 7 1 u problembyconsideringshortsequencesofreductions,oridiomsaswecallthem,andshowing thatthecostmeasureonthesecombinationsbehaveasdesired. Unfortunately,thismeasureistoolargeon(1;1)and(2;3)reductions.Wealleviatethis g(r)=6n(r)?2e(r)?2out(r)+(r): stringcanbelexicallypartitionedintostringsfromarestrictedclass. Claim5.2Thefollowingisanalphabetforthereductionsequenceofthealgorithm: Letusviewtheexecutionofthealgorithmasastringofreductions.Wearguethatthatthis [f(2;6);(3;8);(3;9)gf(1;2);(2;4)g(1;1)],[f(1;3);(2;5);(2;6);(3;9)gf(1;2);(2;4)g(2;3)], f(0;0),(1;2),(1;3),(2;4),(2;5),(2;6),(3;8),(3;9), ThefollowingobservationshavebearingonClaim5.2. [(3;8)f(1;2);(2;4)g(2;3);f(2;5);(2;6)g]. 2.Thepossibilityoftheidiom[(3;9);(2;3);(2;3)]iseliminatedbythethirdcaseofthe 1.A(3;7)-reductionisimpossible,sincesometwooftheverticesinthereductionwouldgive algorithm. risetoa(3;8)-reduction. 4.Followingthesequence[(3;8);(2;3)],theremaininggraphwillbecubicexceptfora 3.Theonlyreductionsthatcanprecedea(2;3)reductionare:(1;3),(2;5),(2;6),or(3;9). Thisignores(1;2)and(2;4)-reductionswhichmaybeinterspersedinvariousways. singlevertex.henceonly(2;5)or(2;6)reductionscanimmediatelyfollow.further, measureofeachreductionintheidiom.further,foranidiom,lett()denotethenumberof Wegeneralizethemeasuresofreductionstomeasuresofidioms,bytakingthesumofthe [(3;8);(2;3);(2;5);(2;3)]isnotpossible. fundamentalidiomsinthealphabet.fortheidiomsthatinclude(2;3),wehaveomittedthe interspersed(1;2)and(2;4)reductions,andcountedthemasindividualidioms.theidioms reductionswithin. involving(1;1)havealsobeencompacted. Table2giveslistslowerboundsforOut()andupperboundsfor()andg()forthe oftheindividualreductionsintheidiom. ThefollowingvaluesaredierentfromTable1oraredierentfromthesumsofthevalues 8

9 (0;0) (1;1) (1;2) 1n()e()Out()()g()g()=t() (1;3) 012 (2;4) 2 3 (2;5) 4 (2;6) (3;8) f(2;6);(2;3)g f(1;3);(2;3)g f(3;9);(2;3)g :5 f(2;5);(2;3)g f(3;8);(2;3);(2;5)g10 f(3;8);(2;3);(2;6)g : andOutfor(2;4)and(2;5):Noticethatonlythelatterformofthesereductionsin Figure2cannowappearduetothepreferencetothedelayed-commitmentreduction. Table2:BoundsonmeasuresofthereductionsperformedbySimplicial 2.Outfor(1;1):Whicheveridioma(1;1)-reductionappearsin,anadditionaledgemustbe 3.TheOutvaluesof(2;5)(2;3)and(3;9)(2;3)andvaluesof(2;6)(2;3)and(3;9)(2;3): Thereasonsareclearwhenwelookatthesubgraphsinducedbythesepairsofreductions. outsideofi. theindependencenumberoroutsideedgesinthesubgraphinducedbytheidiom. vertices,thus,havinginterspersedwithinanidiomdoesnotaectanyargumentabout (1;2)and(2;4)-reductionsyieldoptimalresultsonthesubgraphinducedbythedeleted alwaysatmost9.9t=9xt()xg()6n?2e?2out+7: ThetheoremnowfollowsfromLemma2.1alongwiththefactthatg()=t()inTable2is Greedy,MoreEdgesandSimplicial.Thesetwoalgorithmshaveacommonbasicstrategyofremovingavertexwiththeminimumdegreeinacurrentgraphateachstage.Wecaneasilysee bytheirhardgraphsthattheweaknessesofthegreedyalgorithmsappearwhentheyhaveseveralwaysofchoosingaminimum-degreevertex.ifwecouldgivethesealgorithmssomeadvice suchthattheycouldproceedoptimallywhenevertheyfaceabranchroad,howmuchwouldthe algorithmsimprove?orwouldanalgorithmthatwasgivenperfectadvicenecessarilyndan optimalsolution? 6Intheprevioussections,weconsideredtheperformanceratiosofthreegreedyalgorithms: AlgorithmwithAdvice,Ultimate 9

10 oracleforselectingamongalternatives.theonlyrequirementisthatthealgorithmmustchoose oneoftheminimumdegreeverticesatanystep.werefertothisultimatealgorithmasultimate, indicatingthatthealgorithmhasinnitevisibility(orarbitrarydistancefromthegivennode) Inthissection,westudythepowerofalgorithmsthataregiventheadditionalbenetofan forchoosingamongminimumdegreevertices. cannotndanoptimalsolution.infact,itcannotguaranteeamuchbetterperformanceratio thanthealgorithmoftheprevioussection.thisrevealsalimitationonthepowerofthefamily ofgreedyalgorithms. WeshallshowthatevenbyemployingUltimate,thereremainsgraphsforwhichUltimate setofh4issix,whereasultimatendsonlyvevertices.oneoptimalsolutionconsistsofthe WerstformasubgraphH4asontheleftofFigure5.Thesizeofthemaximumindependent Figure5:ConstructionofH4,H6,andG1. shadedverticesinfigure5.weconstructapseudobinarytreeh6withfourh4'sasleaves.it byrepeatingthesameoperationq?2times. isillustratedinthecenteroffigure5.weformapseudobinarytreeh2qwith2q(q2)levels HEU(H2q)=1+4HEU(H2(q?1))= q?2+4q?15=4q?116=3?1=3; Thesizeofthesolutionfoundbythealgorithmis: whilethesizeoftheoptimalsolutionis: Asqgrows,theratioofHEUtoOPTapproaches5=4. OPT(H2q)=2+4OPT(H2(q?1))=2( q?2)+4q?16=4q?120=3?2=3: rightoffigure5inordertomaketheentiregraphcubic,andcalltheresultinggraphg1. UltimatepicksanyvertexinaH2qattherststep.ItiseasytoverifythatMin1thenproceeds Wecanalsoobtainahardnessresultforregular(i.e.cubic)graphs.JointwoH2qsasonthe optimallyonthathalfofthegraph.thatleavestheotherh2qleft,forwhichthealgorithmwill, byinduction,benon-optimal. AnoptimalsolutionofG1containsallverticesontheevenlevelsofeachH2q.Supposethat Thus, highoddgirth),byreplacingthetrianglesatthebottomofh5byave-cycle(oranappropriately Wecanobtainsimilarhardnessresultsfortriangle-freegraphs(ormoregenerallygraphsof 1(G1)= OPT(H2q)+HEU(H2q)= OPT(H2q) 20+16=10 9=1:1: largeoddcycle)andconnectingthepairstogetherasneeded. triangle-freecubicgraphs. Theorem6.1Anygreedyalgorithmthatselectsverticesofminimumdegreemusthaveperformanceratiosatleast:1:25,fordegree-three;1:11,forcubicgraphs;and16=151:06,for 10 H 4 H6 H4 H4 H4 H4 H2q root root H2q

11 Acknowledgments forinformativecommentsanddiscussions. References WearemuchindebtedtoProfessorOsamuWatanabeandProfessorJaikumarRadhakrishnan [1]S.Arora,C.Lund,R.Motwani,M.Sudan,andM.Szegedy.Proofvericationandhardness [2]P.BermanandT.Fujito.Ontheapproximationpropertiesofindependentsetproblemin ofapproximationproblems.focs1992. [3]P.BermanandM.F rer.approximatingmaximumindependentsetinboundeddegree degree3graphs.wads1995. [4]M.R.GareyandD.S.Johnson.ComputersandIntractibility:AGuidetotheTheoryof graphs.soda1994. [5]M.M.Halld rsson.approximatingdiscretecollectionsvialocalimprovements.soda1995. [6]M.M.Halld rssonandj.radhakrishnan.greedisgood:approximatingindependentsets NP-completeness.Freeman,1979. [7]M.M.Halld rssonandj.radhakrishnan.improvedapproximationsofindependentsetsin bounded-degreegraphs.swat1994. insparseandbounded-degreegraphs.stoc1994.toappearinalgorithmica. [9]D.S.Hochbaum.Ecientboundsforthestableset,vertexcover,andsetpackingproblems. [8]M.M.Halld rssonandj.radhakrishnan.improvedapproximationsofindependentsetsin Disc.AppliedMath.,6:243254,1983. bounded-degreeviasubgraphremoval.nordicj.computing,1(4):475492,

The Beginning Balance for Meal Plan #1 is: $210.00 (Your daily average should be $2.96)

The Beginning Balance for Meal Plan #1 is: $210.00 (Your daily average should be $2.96) Resident Meal Plan Goal for the week ending: April 4, 2015 Week one of 11 Weeks, March 29-April 4 The Beginning Balance for is: $225.00 The Beginning Balance for is: $350.00 The Beginning Balance for Meal

More information

How to change the decimal precision of qty, price and cost in the PROMPT Inventory System

How to change the decimal precision of qty, price and cost in the PROMPT Inventory System How to change the decimal precision of qty, price and cost in the PROMPT Inventory System The standard release of PROMPT Business System is 2 decimal quantities and 3 decimal unit prices and unit cost.

More information

Math 115 Spring 2011 Written Homework 5 Solutions

Math 115 Spring 2011 Written Homework 5 Solutions . Evaluate each series. a) 4 7 0... 55 Math 5 Spring 0 Written Homework 5 Solutions Solution: We note that the associated sequence, 4, 7, 0,..., 55 appears to be an arithmetic sequence. If the sequence

More information

Instruction scheduling

Instruction scheduling Instruction ordering Instruction scheduling Advanced Compiler Construction Michel Schinz 2015 05 21 When a compiler emits the instructions corresponding to a program, it imposes a total order on them.

More information

Domain of a Composition

Domain of a Composition Domain of a Composition Definition Given the function f and g, the composition of f with g is a function defined as (f g)() f(g()). The domain of f g is the set of all real numbers in the domain of g such

More information

Exponents, Radicals, and Scientific Notation

Exponents, Radicals, and Scientific Notation General Exponent Rules: Exponents, Radicals, and Scientific Notation x m x n = x m+n Example 1: x 5 x = x 5+ = x 7 (x m ) n = x mn Example : (x 5 ) = x 5 = x 10 (x m y n ) p = x mp y np Example : (x) =

More information

DistributedSharedMemorySystems? AdaptiveLoadBalancinginSoftware CompilerandRun-TimeSupportfor SotirisIoannidisandSandhyaDwarkadas fsi,[email protected] DepartmentofComputerScience Rochester,NY14627{0226

More information

A Framework for A Business Intelligence-Enabled Adaptive Enterprise Architecture

A Framework for A Business Intelligence-Enabled Adaptive Enterprise Architecture A Framework for A Business Intelligence-Enabled Adaptive Enterprise Architecture Okhaide Akhigbe, Daniel Amyot and Gregory Richards [email protected] Business IT Alignment Aligning business objectives

More information

Modules Available by Distance Studies and Evening Course Offerings

Modules Available by Distance Studies and Evening Course Offerings Modules Available by Distance Studies and Evening Course Offerings The following review is based on past course offerings over the last five years. While the future cannot be predicted, courses offered

More information

5. A full binary tree with n leaves contains [A] n nodes. [B] log n 2 nodes. [C] 2n 1 nodes. [D] n 2 nodes.

5. A full binary tree with n leaves contains [A] n nodes. [B] log n 2 nodes. [C] 2n 1 nodes. [D] n 2 nodes. 1. The advantage of.. is that they solve the problem if sequential storage representation. But disadvantage in that is they are sequential lists. [A] Lists [B] Linked Lists [A] Trees [A] Queues 2. The

More information

Binary Search Trees. Data in each node. Larger than the data in its left child Smaller than the data in its right child

Binary Search Trees. Data in each node. Larger than the data in its left child Smaller than the data in its right child Binary Search Trees Data in each node Larger than the data in its left child Smaller than the data in its right child FIGURE 11-6 Arbitrary binary tree FIGURE 11-7 Binary search tree Data Structures Using

More information

Senders and Receivers

Senders and Receivers Senders and Receivers Unifaun Online 26 November 2013 2 Contents 1 Senders... 3 1.1 New sender (and receiver)... 3 1.2 Search existing senders... 4 1.3 Show and copy details... 4 1.4 Change details...

More information

PES Institute of Technology-BSC QUESTION BANK

PES Institute of Technology-BSC QUESTION BANK PES Institute of Technology-BSC Faculty: Mrs. R.Bharathi CS35: Data Structures Using C QUESTION BANK UNIT I -BASIC CONCEPTS 1. What is an ADT? Briefly explain the categories that classify the functions

More information

Unified Communications Self Care Portal

Unified Communications Self Care Portal Headquarters Desktop Phone Management September 2015 Use the Unified Communications Self Care Portal to customize your phone, forward your calls to another location, or access your phone user guide. This

More information

Introduction to Algebraic Geometry. Bézout s Theorem and Inflection Points

Introduction to Algebraic Geometry. Bézout s Theorem and Inflection Points Introduction to Algebraic Geometry Bézout s Theorem and Inflection Points 1. The resultant. Let K be a field. Then the polynomial ring K[x] is a unique factorisation domain (UFD). Another example of a

More information

Classification/Decision Trees (II)

Classification/Decision Trees (II) Classification/Decision Trees (II) Department of Statistics The Pennsylvania State University Email: [email protected] Right Sized Trees Let the expected misclassification rate of a tree T be R (T ).

More information

Algorithms and Data Structures

Algorithms and Data Structures Algorithms and Data Structures Part 2: Data Structures PD Dr. rer. nat. habil. Ralf-Peter Mundani Computation in Engineering (CiE) Summer Term 2016 Overview general linked lists stacks queues trees 2 2

More information

Positional Numbering System

Positional Numbering System APPENDIX B Positional Numbering System A positional numbering system uses a set of symbols. The value that each symbol represents, however, depends on its face value and its place value, the value associated

More information

Data Structure [Question Bank]

Data Structure [Question Bank] Unit I (Analysis of Algorithms) 1. What are algorithms and how they are useful? 2. Describe the factor on best algorithms depends on? 3. Differentiate: Correct & Incorrect Algorithms? 4. Write short note:

More information

Cours de C++ Utilisations des conteneurs

Cours de C++ Utilisations des conteneurs Cours de C++ Utilisations des conteneurs Cécile Braunstein [email protected] 1 / 18 Introduction Containers - Why? Help to solve messy problems Provide useful function and data structure Consistency

More information

Representing feature models as class diagrams

Representing feature models as class diagrams Representing feature models as class diagrams Abel Gómez, Isidro Ramos Technical University of Valencia. Departamento de Sistemas Informáticos y Computación. 1 Abel Gómez, Isidro Ramos - Universidad Politécnica

More information

Selected Radio Frequency Exposure Limits

Selected Radio Frequency Exposure Limits ENVIRONMENT, SAFETY & HEALTH DIVISION Chapter 50: Non-ionizing Radiation Selected Radio Frequency Exposure Limits Product ID: 94 Revision ID: 1736 Date published: 30 June 2015 Date effective: 30 June 2015

More information

OPRC Level II COMMUNICATIONS AND INFORMATION SHARING

OPRC Level II COMMUNICATIONS AND INFORMATION SHARING OPRC Level II COMMUNICATIONS AND INFORMATION SARING Outline Common Communications Problems Communications Management Communications Plan and Network Briefings Common Communications Problems Too many calls

More information

Databasesystemer, forår 2005 IT Universitetet i København. Forelæsning 3: Business rules, constraints & triggers. 3. marts 2005

Databasesystemer, forår 2005 IT Universitetet i København. Forelæsning 3: Business rules, constraints & triggers. 3. marts 2005 Databasesystemer, forår 2005 IT Universitetet i København Forelæsning 3: Business rules, constraints & triggers. 3. marts 2005 Forelæser: Rasmus Pagh Today s lecture Constraints and triggers Uniqueness

More information

SIMSON Security Incident Management System

SIMSON Security Incident Management System It s a dangerous business going out your front door. J.R.R. Tolkien (1892-1973) SIMSON Security Incident Management System Purpose: Method: Participants: Location: Language: A web based platform to record,

More information

Chapter 8 The Enhanced Entity- Relationship (EER) Model

Chapter 8 The Enhanced Entity- Relationship (EER) Model Chapter 8 The Enhanced Entity- Relationship (EER) Model Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 8 Outline Subclasses, Superclasses, and Inheritance Specialization

More information

Copyright 2011 - Bizagi. Change Management Construction Document Bizagi Process Modeler

Copyright 2011 - Bizagi. Change Management Construction Document Bizagi Process Modeler Copyright 2011 - Bizagi Change Management Bizagi Process Modeler Table of Contents Change Management... 4 Description... 4 Main Facts in the Process Construction... 5 Data Model... 5 Parameter Entities...

More information

Using Peer to Peer Dynamic Querying in Grid Information Services

Using Peer to Peer Dynamic Querying in Grid Information Services Using Peer to Peer Dynamic Querying in Grid Information Services Domenico Talia and Paolo Trunfio DEIS University of Calabria HPC 2008 July 2, 2008 Cetraro, Italy Using P2P for Large scale Grid Information

More information

Document Management. For Microsoft Dynamics CRM 2013

Document Management. For Microsoft Dynamics CRM 2013 Document Management For Microsoft Dynamics CRM 2013 Contents Overview... 3 Document Management Interface... 4 Toolbar Options... 5 Creating a Folder Template... 8 About AbleBridge... 9 2 Overview 3 Document

More information

136 CHAPTER 4. INDUCTION, GRAPHS AND TREES

136 CHAPTER 4. INDUCTION, GRAPHS AND TREES 136 TER 4. INDUCTION, GRHS ND TREES 4.3 Graphs In this chapter we introduce a fundamental structural idea of discrete mathematics, that of a graph. Many situations in the applications of discrete mathematics

More information

hand-e-pix Windows Mobile Client

hand-e-pix Windows Mobile Client hand-e-pix Windows Mobile Client User Guide May 2012 Issue 2 Page 1 Table of Contents Table of Contents... 2 General... 3 Getting Started... 3 1. Installation... 3 2. Loading the application... 3 3. Login...

More information

hp calculators HP 12C Loan Amortizations Amortization The HP12C amortization approach Practice amortizing loans

hp calculators HP 12C Loan Amortizations Amortization The HP12C amortization approach Practice amortizing loans Amortization The HP12C amortization approach Practice amortizing loans Amortization The word 'amortization' comes from a Latin word meaning "about to die". When a loan earning interest has regular, fixed

More information

5-1 NUMBER THEORY: DIVISIBILITY; PRIME & COMPOSITE NUMBERS 210 f8

5-1 NUMBER THEORY: DIVISIBILITY; PRIME & COMPOSITE NUMBERS 210 f8 5-1 NUMBER THEORY: DIVISIBILITY; PRIME & COMPOSITE NUMBERS 210 f8 Note: Integers are the w hole numbers and their negatives (additive inverses). While our text discusses only whole numbers, all these ideas

More information

Container loading by GRASP

Container loading by GRASP Container loading by GRASP Hugo Duque Caldeira - ISEP; INESC Porto José Soeiro Ferreira - FEUP; INESC Porto Container loading by GRASP 1. Introduction 2. Problem 3.Resolution methods 4.Application of GRASP

More information

Methods Used for Counting

Methods Used for Counting COUNTING METHODS From our preliminary work in probability, we often found ourselves wondering how many different scenarios there were in a given situation. In the beginning of that chapter, we merely tried

More information

2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8]

2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8] Code No: R05220502 Set No. 1 1. (a) Describe the performance analysis in detail. (b) Show that f 1 (n)+f 2 (n) = 0(max(g 1 (n), g 2 (n)) where f 1 (n) = 0(g 1 (n)) and f 2 (n) = 0(g 2 (n)). [8+8] 2. (a)

More information

Completion Time Scheduling and the WSRPT Algorithm

Completion Time Scheduling and the WSRPT Algorithm Completion Time Scheduling and the WSRPT Algorithm Bo Xiong, Christine Chung Department of Computer Science, Connecticut College, New London, CT {bxiong,cchung}@conncoll.edu Abstract. We consider the online

More information

Design of LDPC codes

Design of LDPC codes Design of LDPC codes Codes from finite geometries Random codes: Determine the connections of the bipartite Tanner graph by using a (pseudo)random algorithm observing the degree distribution of the code

More information

SUPPORTED ACTIVE DIRECTORY TOPOLOGIES BY LYNC 2013

SUPPORTED ACTIVE DIRECTORY TOPOLOGIES BY LYNC 2013 SUPPORTED ACTIVE DIRECTORY TOPOLOGIES BY LYNC 2013 LYNC SERVER 2013 Lync Server 2013 supports the same Active Directory Domain Services topologies as Microsoft Lync Server 2010 and Microsoft Office Communications

More information

Home Page. Data Structures. Title Page. Page 1 of 24. Go Back. Full Screen. Close. Quit

Home Page. Data Structures. Title Page. Page 1 of 24. Go Back. Full Screen. Close. Quit Data Structures Page 1 of 24 A.1. Arrays (Vectors) n-element vector start address + ielementsize 0 +1 +2 +3 +4... +n-1 start address continuous memory block static, if size is known at compile time dynamic,

More information

Nonparametric tests these test hypotheses that are not statements about population parameters (e.g.,

Nonparametric tests these test hypotheses that are not statements about population parameters (e.g., CHAPTER 13 Nonparametric and Distribution-Free Statistics Nonparametric tests these test hypotheses that are not statements about population parameters (e.g., 2 tests for goodness of fit and independence).

More information

Workers Compensation. Initial Procedures

Workers Compensation. Initial Procedures Workers Compensation Initial Procedures INJURY HOTLINE Available 24 hours / 7 days a week Registered Nurses Nationwide Coverage Translation Services Medical referral to designated clinic or ER Document

More information

Section 8.4 - Composite and Inverse Functions

Section 8.4 - Composite and Inverse Functions Math 127 - Section 8.4 - Page 1 Section 8.4 - Composite and Inverse Functions I. Composition of Functions A. If f and g are functions, then the composite function of f and g (written f g) is: (f g)( =

More information

Basic Use of the TI-84 Plus

Basic Use of the TI-84 Plus Basic Use of the TI-84 Plus Topics: Key Board Sections Key Functions Screen Contrast Numerical Calculations Order of Operations Built-In Templates MATH menu Scientific Notation The key VS the (-) Key Navigation

More information

SPICE EduGuide EG0015 Security of Administrative Accounts

SPICE EduGuide EG0015 Security of Administrative Accounts This SPICE EduGuide applies to HSC information systems, specifically Administrative login accounts; (aka Admin accounts) and the faculty, staff and students who use them. Admin accounts are logon IDs and

More information

Rotation Operation for Binary Search Trees Idea:

Rotation Operation for Binary Search Trees Idea: Rotation Operation for Binary Search Trees Idea: Change a few pointers at a particular place in the tree so that one subtree becomes less deep in exchange for another one becoming deeper. A sequence of

More information

Analysis of Algorithms I: Optimal Binary Search Trees

Analysis of Algorithms I: Optimal Binary Search Trees Analysis of Algorithms I: Optimal Binary Search Trees Xi Chen Columbia University Given a set of n keys K = {k 1,..., k n } in sorted order: k 1 < k 2 < < k n we wish to build an optimal binary search

More information

#1-12: Write the first 4 terms of the sequence. (Assume n begins with 1.)

#1-12: Write the first 4 terms of the sequence. (Assume n begins with 1.) Section 9.1: Sequences #1-12: Write the first 4 terms of the sequence. (Assume n begins with 1.) 1) a n = 3n a 1 = 3*1 = 3 a 2 = 3*2 = 6 a 3 = 3*3 = 9 a 4 = 3*4 = 12 3) a n = 3n 5 Answer: 3,6,9,12 a 1

More information

Derivatives Math 120 Calculus I D Joyce, Fall 2013

Derivatives Math 120 Calculus I D Joyce, Fall 2013 Derivatives Mat 20 Calculus I D Joyce, Fall 203 Since we ave a good understanding of its, we can develop derivatives very quickly. Recall tat we defined te derivative f x of a function f at x to be te

More information

A binary heap is a complete binary tree, where each node has a higher priority than its children. This is called heap-order property

A binary heap is a complete binary tree, where each node has a higher priority than its children. This is called heap-order property CmSc 250 Intro to Algorithms Chapter 6. Transform and Conquer Binary Heaps 1. Definition A binary heap is a complete binary tree, where each node has a higher priority than its children. This is called

More information

Symantec Control Compliance Suite. Overview

Symantec Control Compliance Suite. Overview Symantec Control Compliance Suite Overview Addressing IT Risk and Compliance Challenges Only 1 in 8 best performing organizations feel their Information Security teams can effectively influence business

More information

Operating Systems. 07.02 File system mounting, sharing, and protection. File System Mounting

Operating Systems. 07.02 File system mounting, sharing, and protection. File System Mounting 07.02 File system mounting, sharing, and protection emanuele lattanzi isti information science and technology institute 1/15 File System Mounting A file system must be mounted before it can be accessed

More information

DATA STRUCTURES USING C

DATA STRUCTURES USING C DATA STRUCTURES USING C QUESTION BANK UNIT I 1. Define data. 2. Define Entity. 3. Define information. 4. Define Array. 5. Define data structure. 6. Give any two applications of data structures. 7. Give

More information

14 Databases. Source: Foundations of Computer Science Cengage Learning. Objectives After studying this chapter, the student should be able to:

14 Databases. Source: Foundations of Computer Science Cengage Learning. Objectives After studying this chapter, the student should be able to: 14 Databases 14.1 Source: Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: Define a database and a database management system (DBMS)

More information

Array Abstract Data Type

Array Abstract Data Type 1 Array Abstract Data Type Table of Contents What this module is about... 1 Introduction... 2 Data type objects... 3 Array elements... 3.1 Sub -arrays... 3.2 Array descriptor... 3.3 Data type operations...

More information

CHAPTER_3 SOFTWARE ENGINEERING (PROCESS MODELS)

CHAPTER_3 SOFTWARE ENGINEERING (PROCESS MODELS) CHAPTER_3 SOFTWARE ENGINEERING (PROCESS MODELS) Prescriptive Process Model Defines a distinct set of activities, actions, tasks, milestones, and work products that are required to engineer high quality

More information

Simplification of Radical Expressions

Simplification of Radical Expressions 8. Simplification of Radical Expressions 8. OBJECTIVES 1. Simplify a radical expression by using the product property. Simplify a radical expression by using the quotient property NOTE A precise set of

More information

SFTP Server User Login Instructions. Open Internet explorer and enter the following url: https://sftp.sae.org

SFTP Server User Login Instructions. Open Internet explorer and enter the following url: https://sftp.sae.org SFTP Server User Login Instructions Open Internet explorer and enter the following url: https://sftp.sae.org You will be prompted for a user id and password as such. Please enter your account id and password.

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK A REVIEW ON THE USAGE OF OLD AND NEW DATA STRUCTURE ARRAYS, LINKED LIST, STACK,

More information

Audit of Employee Self-Service Payroll System Access

Audit of Employee Self-Service Payroll System Access Audit of Employee Self-Service Payroll System Access MARTIN MATSON City Comptroller STACEY MAZMANIAN Audit Manager City of Milwaukee, Wisconsin September 2015 TABLE OF CONTENTS Transmittal Letter..1 I.

More information

CumuLogic Load Balancer Overview Guide. March 2013. CumuLogic Load Balancer Overview Guide 1

CumuLogic Load Balancer Overview Guide. March 2013. CumuLogic Load Balancer Overview Guide 1 CumuLogic Load Balancer Overview Guide March 2013 CumuLogic Load Balancer Overview Guide 1 Table of Contents CumuLogic Load Balancer... 3 Architectural Overview of CumuLogic Load Balancer... 4 How to Use

More information

Row Echelon Form and Reduced Row Echelon Form

Row Echelon Form and Reduced Row Echelon Form These notes closely follow the presentation of the material given in David C Lay s textbook Linear Algebra and its Applications (3rd edition) These notes are intended primarily for in-class presentation

More information

Theory of Relational Database Design and Normalization

Theory of Relational Database Design and Normalization Theory of Relational Database Design and Normalization (Based on Chapter 14 and some part of Chapter 15 in Fundamentals of Database Systems by Elmasri and Navathe, Ed. 3) 1 Informal Design Guidelines for

More information

Application of Stacks: Postfix Expressions Calculator (cont d.)

Application of Stacks: Postfix Expressions Calculator (cont d.) Application of Stacks: Postfix Expressions Calculator (cont d.) Postfix expression: 6 3 + 2 * = FIGURE 7-15 Evaluating the postfix expression: 6 3 + 2 * = Data Structures Using C++ 2E 1 Application of

More information

Big Data trifft Industrie Im Internet der Bosch-Dinge und -Dienste

Big Data trifft Industrie Im Internet der Bosch-Dinge und -Dienste Big Data trifft Industrie Im Internet der Bosch-Dinge und -Dienste Dr. Lothar Baum Februar 2015 1 Bosch Business Areas Automotive Technology Industrial Technology Energy and Building Technology Consumer

More information

What is a CMS? Why Node.js? Joel Barna. Professor Mike Gildersleeve IT 704 10/28/14. Content Management Systems: Comparison of Tools

What is a CMS? Why Node.js? Joel Barna. Professor Mike Gildersleeve IT 704 10/28/14. Content Management Systems: Comparison of Tools Joel Barna Professor Mike Gildersleeve IT 704 10/28/14 Content Management Systems: Comparison of Tools What is a CMS? A content management system (CMS) is a system that provides a central interface for

More information

Project Management Software

Project Management Software Project Management Software www.wetrack.com Project management software everyone can understand WeTrack provides a new way to manage projects. Born out of the London 2012 Olympic Games, WeTrack is our

More information

Getting Started with Web Based Data Reporting. November, 2005

Getting Started with Web Based Data Reporting. November, 2005 Getting Started with Web Based Data Reporting November, 2005 This is a brief overview describing how to use the Colorado EMS Data Collection web based reporting tool. It is not a comprehensive manual,

More information

A permutation can also be represented by describing its cycles. What do you suppose is meant by this?

A permutation can also be represented by describing its cycles. What do you suppose is meant by this? Shuffling, Cycles, and Matrices Warm up problem. Eight people stand in a line. From left to right their positions are numbered,,,... 8. The eight people then change places according to THE RULE which directs

More information

Flying NZ - Aero Club Safety Management System Checklist

Flying NZ - Aero Club Safety Management System Checklist One SAFETY POLICY AND ACCOUNTABILITY Is there a written Safety Policy and Safety Commitment Statement confirming Safety is a priority Is the Safety Policy approved and signed by President Is the Safety

More information

Odd induced subgraphs in graphs of maximum degree three

Odd induced subgraphs in graphs of maximum degree three Odd induced subgraphs in graphs of maximum degree three David M. Berman, Hong Wang, and Larry Wargo Department of Mathematics University of New Orleans New Orleans, Louisiana, USA 70148 Abstract A long-standing

More information

This is a square root. The number under the radical is 9. (An asterisk * means multiply.)

This is a square root. The number under the radical is 9. (An asterisk * means multiply.) Page of Review of Radical Expressions and Equations Skills involving radicals can be divided into the following groups: Evaluate square roots or higher order roots. Simplify radical expressions. Rationalize

More information

Microsoft Trusted Root Certificate: Program Requirements

Microsoft Trusted Root Certificate: Program Requirements Microsoft Trusted Root Certificate: Program Requirements 1. Introduction The Microsoft Root Certificate Program supports the distribution of root certificates, enabling customers to trust Windows products.

More information

Signs of Substance Abuse in Broward County, Florida

Signs of Substance Abuse in Broward County, Florida Adult Summer 8 The chart below summarizes the severity and trends for indicators of drug use and abuse in Broward County, Florida. The Severity Index is based on the number of drug-related deaths, emergency

More information

LinkProof And VPN Load Balancing

LinkProof And VPN Load Balancing LinkProof And Load Balancing Technical Application Note May 2008 North America Radware Inc. 575 Corporate Dr. Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware Ltd. 22 Raoul Wallenberg

More information

About Support Center Ciena s Service Ticketing System for Customers. March 2006 (r 1)

About Support Center Ciena s Service Ticketing System for Customers. March 2006 (r 1) About Support Center Ciena s Service Ticketing System for Customers March 2006 (r 1) Outline» Support Center Overview» Why Support Center So Important to Our Customers» Ciena Support Portal Review» Connecting

More information

Customizing the SSOSessionTimeout.jsp page for Kofax Front Office Server 3.5.2

Customizing the SSOSessionTimeout.jsp page for Kofax Front Office Server 3.5.2 Customizing the SSOSessionTimeout.jsp page for Kofax Front Office Server 3.5.2 Date July 23, 2014 Applies To Kofax Front Office Server (KFS) 3.5.2.10 Summary This application note provides instructions

More information

Recall the process used for adding decimal numbers. 1. Place the numbers to be added in vertical format, aligning the decimal points.

Recall the process used for adding decimal numbers. 1. Place the numbers to be added in vertical format, aligning the decimal points. 2 MODULE 4. DECIMALS 4a Decimal Arithmetic Adding Decimals Recall the process used for adding decimal numbers. Adding Decimals. To add decimal numbers, proceed as follows: 1. Place the numbers to be added

More information

IE 680 Special Topics in Production Systems: Networks, Routing and Logistics*

IE 680 Special Topics in Production Systems: Networks, Routing and Logistics* IE 680 Special Topics in Production Systems: Networks, Routing and Logistics* Rakesh Nagi Department of Industrial Engineering University at Buffalo (SUNY) *Lecture notes from Network Flows by Ahuja, Magnanti

More information

Test Project IT Software Solutions for Business

Test Project IT Software Solutions for Business Test Project IT Software Solutions for Business Written by: AbdulRahman Al Marzouqi Date 27.10.14 1 of 9 CONTENTS This Test Project document contains the rules of the competition, the software provided,

More information

A simple criterion on degree sequences of graphs

A simple criterion on degree sequences of graphs Discrete Applied Mathematics 156 (2008) 3513 3517 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam Note A simple criterion on degree

More information

Vantage RADIUS 50. Quick Start Guide Version 1.0 3/2005

Vantage RADIUS 50. Quick Start Guide Version 1.0 3/2005 Vantage RADIUS 50 Quick Start Guide Version 1.0 3/2005 1 Introducing Vantage RADIUS 50 The Vantage RADIUS (Remote Authentication Dial-In User Service) 50 (referred to in this guide as Vantage RADIUS)

More information

Adding Digital Signature and Encryption in Outlook

Adding Digital Signature and Encryption in Outlook Adding Digital Signature and Encryption in Outlook Using Outlook, the email messages can be signed and encrypted by a digital certificate. To digitally sign a message in Outlook some conditions must be

More information

Define and Configure an Application Request Routing Server Farm

Define and Configure an Application Request Routing Server Farm 1 of 6 12/28/2011 3:26 PM Home > Learn > Installing and Configuring IIS 7 > Application Request Routing Module > Define and Configure an Application Request Routing Server Farm Define and Configure an

More information

How To Find Out What A Key Is In A Database Engine

How To Find Out What A Key Is In A Database Engine Database design theory, Part I Functional dependencies Introduction As we saw in the last segment, designing a good database is a non trivial matter. The E/R model gives a useful rapid prototyping tool,

More information