front unit 1 3 back unit
|
|
|
- Deborah Bell
- 10 years ago
- Views:
Transcription
1 GreedyApproximationsofIndependentSetsinLowDegree Magn sm.halld rsson GraphsKiyohitoYoshiharay lemincubicgraphsandgraphsofmaximumdegreethree.thesealgorithmiterativelyselect verticesofminimumdegree,butdierinthesecondaryruleforchoosingamongmanycandidates.westudythreesuchalgorithms,andprovetightperformanceratios,withthebest withthealgorithmwiththebestperformanceratioknownof1:2. algorithmthatgreedilyselectsverticesofminimumhasaperformanceratioatleast1:25on degree-threegraphs,evenifgivenanoracletochooseamongcandidateverticesofminimum degree. Wealsoshowcertaininherentlimitationsinthepowerofthisfamilyofalgorithm:any Weinvestigatethepowerofafamilyofgreedyalgorithmsfortheindependentsetprob- Abstract onebeing9=71:28.allofthesealgorithmsarepracticalandruninlineartime,incontrast AnindependentsetofagraphGisasubsetofverticesinwhichnotwoareadjacent.TheMax 1IndependentSetproblemsisthatofndinganindependentsetofmaximumcardinality.Itis Introduction measuredbytheperformanceratio,orthemaximumratioofthesizeofanoptimalsolution(the alwaysoptimalbutareclosetooptimal.thequalityofanapproximationalgorithmisgenerally toexist.itisthereforeinterestingtoexplorealgorithmsthatproducesolutionsthatarenot oneofthecorenp-hardproblems[4],andthus,polynomialtimeexactalgorithmsareunlikely sizeofthemaximumindependentset)tothesizeofthesolutionfoundbythealgorithm. etal.[1]showedthatitisnp-hardtoobtainaperformanceratiooflessthannforsome >0,wherenisthenumberofvertices.Onspecialclassesofgraphs,however,theproblem doesadmitconstantfactorapproximations. Theindependentsetproblemisknowntobehardtoapproximateongeneralgraphs.Arora followingapaperofhochbaum[9],therehasbeenaurryofresultsontheapproximationof independentsetsinbounded-degreegraphs[3,6,7,2].thecurrentlybestratiosknownare (+3)=5formaximumdegree613[3,2],=6+O(1)forintermediatevaluesof,and Oneimportantsuchclassisthatofbounded-degreegraphs.Afteradecadeofnon-activity O(=loglog)[7,8]forlargevaluesof.. degreeisatmostthree.sincetheindependentsetproblemispolynomialsolvablewhenmaximum degreeistwo,thisproblemcanbethoughtofastheinitialfrontierofnp-hardnessofthe problem.also,manyoftheresultsforhigherdegreesusereductionstolowerdegreecases,in Inthispaperwefocusonacentralcaseofbounded-degreegraphs,namelywhenthemaximum atjapanadvancedinstituteofscienceandtechnologyhokuriku,ibmtokyoresearchlab,andmaxplanck InstitutfuerInformatik. Contactauthor.ScienceInstitute,UniversityofIceland,IS-107Reykjavik,Iceland.Researchpartlyperformed ydepartmentofcomputerscience,tokyoinstituteoftechnology 1
2 three.theproblemremainsnp-hardandmaxsnp-hard(hardtoapproximatewithinsome casetranslatetoimprovementsforallodddegrees. whichthedegree-threeplaystheroleofthebasiscase[3,7,5,2],andimprovementsforthat xedconstantgreaterthanone)evenunderthesestrongrestrictions. Weadditionallyconsidercubicgraphs,i.e.3-regulargraphs,whereallverticesareofdegree thatattainsaperformanceratioof1:25.thishasrecentlybeenbroughtdownto1:2byberman graphs.hochbaum[9]presentedanalgorithmwitha1:5ratio,thatrunsintimeproportional tobipartitematchingoro(n1:5).bermanandf rer[3]gaveapowerfullocalsearchapproach Letusreviewtheknownresultsaboutapproximatingindependentsetsindegree-three andfujito[2]usingadditionaltricks.thedisadvantageofthisapproachisaphenomenallyhigh analysis[7]thecomplexityappearstobenolessthann50.inresponsetothis,halld rssonand timecomplexity:theanalysisof[3,2]yieldsaboundofatleastn2100,whileevenwithatighter Radhakrishnan[7]gaveascaled-downversionofthelocalsearchapproachof[3]whichrunsin lineartimewithaperformanceratioof1:4.generalizations[5]leadtoa1:33+ratiointime O(exp(1=)n). andrepeatuntilthegraphisempty.thisapproachisnon-deterministicinthechoiceofa vertexofminimumdegree,addthevertextothesolution,removethevertexanditsneighbors, particularvertexofminimumdegree.thebasicalgorithm,selectinganarbitraryminimum Thealgorithmparadigmthatweconsiderinthispaperisthatofgreedyalgorithms:selecta alwayschooseminimum-degreevertices,butwithdierentrulestodecideamongcandidate performanceratioondegree-threegraphswasshowntobe5=3. degreevertex,wasanalyzedindetailbyhalld rssonandradhakrishnan[6].inparticular,the vertices.typically,thealgorithmsattempttoeliminatemorethantheminimumnumberof edgesineachreduction,orpreferreductionsthatcomparewellwiththeoptimalsolution.in Weconsiderheregreedyalgorithmswithmoregoal-directedselectionrules.Thealgorithms summary,ourresultsareasfollows: 1.Thebasicgreedyalgorithmattainsaperformanceratioof3=2oncubicgraphs.Further 2.Amodiedgreedyalgorithmispresentedthatattainsaratioof3=2on(general)degreethreegraphs.Theratioimprovestoaratiothatapproaches4=3oncubicgraphswithhigh restrictingtheinputtographsofhighoddgirthyieldsnofurtherimprovements. 3.Asecondmodiedgreedyalgorithmispresentedthatattainsaratioof9=71:28on oddgirth. 4.Anygreedyalgorithmisshowntohaveaperformanceratioatleast1:25ondegree-three degree-threegraphs. Thepaperisorganizedintosectionsfollowingtheabovelist. algorithm. graphs.thus,thewholefamilyhaslimitationswhicharenearlymatchedbyoursecond 22.1Notation Weusestandardsymbolsandnotations.TheinputgraphG=(V;E)isassumedtobeof Preliminaries thenumberofvertices,mthenumberofedges,theindependencenumber(i.e.sizeofthe maximumdegreethree,withfurtherrestrictionsexplicitlystatedwheninplace.letndenote 2
3 optimalindependentset).foravertexv,n(v)denotestheneighborhoodofv,orthesetof adjacentvertices. Adef performanceratioofaisdenedasthemaximumapproximationratiooverallinputgraphs,or denotedbya(g),andtheapproximationratioa(g)isdenedasa(g)def ForanalgorithmAforMaxIndependentSet,thesizeofthesolutionproducedonGis WeletIdenoteaxedbutarbitrarymaximumindependentsetinG.LetOutdenotethe =maxga(g).weareprimarilyinterestedinthelimitofthisvalueasngoestoinnity. =(G)=A(G).The numberofedgeswithbothendpointsinv?i. itisessentialtohaveatonesdisposalagoodupperboundoftheoptimalsolution.thenumber Inordertoanalyzetherelativevalueofaheuristicsolutioncomparedwithanoptimalsolution, OutofedgesoutsidesomemaximumcardinalitysolutionIplaysacrucialrole. 2.2Upperboundingtheoptimalsolution Lemma2.1Foradegree-threegraphG, (G)n?m=3?Out=3: (1) ofendpointsinv?iisatmost3(n?jij).thus, Proof.EachedgehaseitheroneendpointinIorbothendpointsinV?I.Thetotalnumber which,whenrearranged,yieldstheclaim. Inacubicgraph,m=3n=2,andtheinequalitybecomesn=2?Out=3. m3(n?jij)?out; 3Werstconsiderthewell-knownGreedyalgorithm,whichwelabelhereasGreedy.Thealgorithm proceedsalongasequenceofiterationsorreductions,eachofwhichconsistsofthefollowingtwo GreedyAlgorithmonCubicGraphs steps:somevertexofminimumdegreeisaddedtothesolution,andthevertex,itsneighbors,and havebeendeletedfromthegraph.sinceneighborsofaselectedvertexareimmediatelydeleted, allincidentedgesareremovedfromthegraph.thealgorithmterminateswhentheallvertices thesolutionconsistingoftheselectedverticesformaproperindependentset.bymaintaining trackofthedegreesofthevertices,thealgorithmcanbeimplementedino(n+m)time. ondegree-threegraphswasshowntobe5=31:66.abetterratioispossibleinthecaseof cubicgraphs. Greedywasanalyzedforbounded-degreegraphsin[6],whereitsapproximationperformance nected.observethatgreedypicksavertexofmaximumdegreeatmostonce,sincenoproper Theorem3.1TheperformanceratioofGreedyoncubicgraphsis3=2. step.thatis, inducedsubgraphcanberegular.thus,atmostthreeverticesaredeletedinallbuttherst Werstarguetheupperbound.Assumewithoutlossofgeneralitythatthegraphiscon- Min0(n?1)=3: 3
4 If1or2,thenGreedyn=3;if3or4,thenn=2?1=3byLemma2.1.Ineithercase,the Remark.ItcanbearguedthatGreedyndsanoptimalsolutioninregularbipartitegraphs. performanceratioisatmost3=2. Considerthelastreductionmade.Thedeletedverticesmustformacliqueon1to4vertices. 3=2?3=(2n?2). ByapplyingLemma2.1,thatimpliesaperformanceratioofatmost(n=2?1=3)=((n?1)=3)= graphisconstructedfromthreeunits:frontunit,backunit,andmultiplecopiesofrepetition achainwiththreeedgesbetweenadjacentcopies.thechainisankedontheendsbythefront units.therepetitionunitsareintheformofa12-cyclewiththreecords,andareconnectedin WenowconstructahardgraphforGreedythatshowsthattheaboveratioistight.The andrearunits,bothintheformofacompletebipartitegraphk2;3,withthethreeverticesinone bypicture,infigure1. partitionconnectedtotheendsoftherepetitionunitchain.thegraph,g0,isbestdescribed 2 4 uf vf breakingchoices.thealgorithmstartsbychoosingvfandufofthefrontunit.ontherst Figure1:AhardgraphforGreedy. front unit 1 3 repetitionunititchoosesvertices1through4inthatorder.thisleavesanidenticalgraphless Weindicatetheworst-casebehaviorofGreedybypresentingaparticularsequenceofsymmetry- back unit asinglerepetitionunit.hence,thealgorithmpicksthefourshadedverticesofeachrepetition unit,endingwiththreeverticesfromtherearunit. solutioncontains6`+4.thetotalnumberofverticesis12`+10.hence,theapproximation ratioofgreedyong0is: If`isthenumberofrepetitionunits,thealgorithmnds4`+5verticeswhiletheoptimal 3=2.Observethatthesameholdsevenifthegraphsarerequiredtobetriangle-free. WeconcludethattheperformanceratioofGreedyoncubicgraphsasymptoticallyequals 0(G0)=6`+4 4`+5=32? 2(n+5): 21 4TheworstcasebehaviorofGreedy,asseenwhenappliedtothehardgraphsG0intheprevious section,suggestsadirectionformodifyingthestrategyofthealgorithm.asituationwhere AModiedGreedyAlgorithm Greedyappearstobeweakiswhentherearemanyverticesofminimumdegree.Inthissection, weproposeamodiedversionofgreedy,namedmoreedges,whichconsidersthedegreesof verticesadjacenttoavertexasacriteriaforselectingthevertices.thecriteriais: Whenminimumdegreeistwo,selectwheneverpossibleavertexwithaneighbor ofdegreethree. 4
5 solution. composedofseveraldisjointcycles.onthatremainingportion,moreedgesobtainsanoptimal Ifnosuchvertexexistsandtheminimumdegreeistwo,thenwecanshowthatthegraphis degree-threegraphs. Theorem4.1TheperformanceratioofMoreEdgesondegree-threegraphsis3=2. Wendthatthismodiedalgorithmyieldsanimprovementoverthe5=3ratioofGreedyon Upperbound Theoperationofthealgorithmcanbebrokenupintoreductions,eachofwhichconsistsof theadditionofasinglevertextothecurrentsolutionandthedeletionofthisandneighboring verticesalongwiththeincidentedges.iftherecursivedescriptionofthealgorithmismade iterative,areductioncorrespondstoasingleiteration.an(i;j)-reductionreferstoonewhere i?1verticesandjedgesaredeleted. 0,0 1,2 1,1 1,3 2,3 2,4 Selected Deleted Incident 2,4 2,5 2,5 2,6 3,6 3,7 3,8 3,9 theirneighbors(whicharealsodeleted)areingrey,andotherincidentverticesareinwhite. TheformofthepossiblereductionsaregiveninFigure2.Theselectedverticesareinblack, Figure2:Theformsofthevariousreductions. nalityindependentsetiforcomparison. (2;4)and(2;5)reductionsappearintwodierentguises. n(r) Weconsiderthefollowingmeasuresofeachreductionr.Here,wexsomemaximumcardi- Out(r)NumberofdeletededgeswithbothendpointsinV?I. e(r) (r) Numberofverticesdeleted Ourprimarycostmeasureofeachreductionrisgivenby: Numberofedgesdeleted NumberofthedeletedverticesthatbelongtoI forout(r),e(r)arelowerbounds,while(r)andf(r)areupperbounds. Table1givesconservativeboundsforthesemeasuresoneachtypeofreduction.Thevalues f(r)=3n(r)?e(r)?out(r)+(r): 5
6 r(0;0) 1n(r)e(r)Out(r)(r)f(r) (2;4) (2;3) (1;x) y (3;8) (3;7) (3;6) (2;5+) Table1:BoundsonmeasuresofthereductionsperformedbyMoreEdges (3;9) whichvertexitstartswith.thus,itcausesnoharmifweassumethatitchoosesavertexfor of(2;4).whena(2;4)-reductionoccurs,thegraphnecessarilyconsistsofdisjointcycles.the algorithmwilladdthesamenumberofverticestothesolutionfromagivencycle,nomatter ThevaluesinTable1areeasilyveriedfromFigure2,withtheexceptionofthevalue whichatmostoneneighborbelongstoagivenmaximumindependentset. Theclaimoftheupperboundnowfollowseasilyfromthef-valuesofTable1,andLemma2.1: Lowerbound 6t=Xr6Xrfr=3n?e?Out+4: WeconstructahardgraphforMoreEdgesasinFigure3.Itisachainofsimpleunitswith sixverticeseach.eachunitformsasix-cyclewithonecordbetweenthethirdandthefth vertex.thelastvertexineachunitisalsoadjacenttotherstvertexinthesubsequentunit. Formally,weconstructafamilyofgraphsGq,withverticesverticesvi;1;:::;vi;6andedges (vi;j;vi;j+1);(vi;3;vi;5);(vi0;6;vi0+1;1),wherei=1;:::q,j=1;:::6andi0=1;:::q?1. optimalsolutionwillcontainthesecond,fourthandsixth.onlyonthelastunitwillmoreedges MoreEdgesmaybeassumedtoselecttherstandthethirdvertexofeachunit,whilethe Figure3:InitialportionofahardgraphforMoreEdges. 3=2?(1=n). alsondthreevertices.hence,theperformanceratioofmoreedgesisnobetterthan3q=(2q+1)= Furtherresults Wehavefurtheranalyzedthealgorithmforclassesofcubicgraphs.Inparticular,thealgorithm attainsperformanceratiosof17=121:42oncubicgraphs,29=211:38oncubictriangle-free tightastherearegraphswheretheseratiosoccur.weomitthedescriptionsforreasonsofspace. graphs,andingeneral4=3+1=(9k+3)oncubicgraphsofoddgirth2k+1.thosevaluesare 6
7 algorithmperformsthefollowingtwotypesoftransformationswheneverpossible. Weconsiderinthissectionastillstrongermemberofthegreedyparadigm.Inparticular,the 5 ASecondImprovedAlgorithm BranchyreductionWhentwoverticesvanduofdegreetwoareadjacent,someoptimal solutionwillcontainexactlyoneofthesevertices.wecantransformthegraphintoa graphg0thatcontainsallverticesbutvanduandhastheotherneighborsofvandu adjacent.toensurethatmulti-edgesdonotappear,weinsistthatnothirdvertexbe adjacenttobothvandu.thesolutionoftheheuristicwillcontaintheheuristicsolution SimplicialreductionAsimplicialvertexisonewhoseneighborhoodformsaclique.Anoptimalsolutioncancontainatmostonevertexfromthisopenneighborhood,henceselecting eectisoptimal. ong0alongwithoneofvandu.thisisacaseofadelayed-commitmentreduction,whose Simplicialreductionsappearas(1;1?3),(2;3?5)and(3;6)-reductions.Branchyreductions onewhosetwoneighborsareadjacent,wheneverpossible. asimplicialvertexisalwaysoptimal.inparticular,whenminimumdegreeistwo,weselect appearas(1;2)-reductions.thesetrickshaveearlierbeenusedin[2]. Simplicial(G) repeat performreductionsinthefollowingorderofpreference: 1.branchy,simplicial,(2;6) end untildone 3.(3;9) 2.(3;8) algorithmcanbeimplementedinlineartime. Bykeepingtrackoftheshapeoftheneighborhoodofeachvertexinthecurrentgraph,the 4=3+1=[5].Further,byusingthisalgorithmasthesubroutinefordegreethreegraphsin previousbestratioclaimedforanalgorithmwithlow-polynomialtimecomplexity[6,7,5]was theschemaof[7](originatingin[3]),weobtainsimilarimprovementsfortheindependentset Thisalgorithmattainsaratioof9=71:28ondegree-threegraphs.Incomparison,the Theorem5.1TheperformanceratioofSimplicialongraphsofmaximumdegreethreeisexactly probleminotherclassesofbounded-degreegraphs. 9=7ẆerstgiveasimpleconstructionforthelowerboundinFigure4.Firstbuildaunitwith Wedevotetherestofthissectionforprovingourmainresult. byaddingonevertexuconnectedtothev1'softhreeunits. andfthandseventh.allverticesareofdegreethree,exceptv1.thehardgraphisobtained sevenvertices,v1;:::v7formingacyclewithchordsbetweensecondandfourth,thirdandsixth, maychooseanyvertexbutuandv1vertices.onetie-breakingchoiceistoselectv2,followedby v7,u,andtwoverticesfromeachofthetworemainingunits,foratotalofseven.ontheother hand,theoptimalsolutionconsistsoftherst,thirdandfthvertexofeachunit,foratotalof Fortheinitialchoice,thealgorithmwillprefera(3;8)-reductionovera(3;9)-reduction,and nine. 7
8 v 4 v 5 Figure4:AhardgraphforSimplicial. v v 4 5 v 4 v 5 v 3 v 6 v 3 v 6 v 3 v 6 v 2 v 7 v 2 v 7 v 2 v v 1 v1 v isgivenby: 5.1Upperbound UsingthesamemeasuresofthereductionsasforMoreEdges,ourcostmeasureforthisalgorithm 7 1 u problembyconsideringshortsequencesofreductions,oridiomsaswecallthem,andshowing thatthecostmeasureonthesecombinationsbehaveasdesired. Unfortunately,thismeasureistoolargeon(1;1)and(2;3)reductions.Wealleviatethis g(r)=6n(r)?2e(r)?2out(r)+(r): stringcanbelexicallypartitionedintostringsfromarestrictedclass. Claim5.2Thefollowingisanalphabetforthereductionsequenceofthealgorithm: Letusviewtheexecutionofthealgorithmasastringofreductions.Wearguethatthatthis [f(2;6);(3;8);(3;9)gf(1;2);(2;4)g(1;1)],[f(1;3);(2;5);(2;6);(3;9)gf(1;2);(2;4)g(2;3)], f(0;0),(1;2),(1;3),(2;4),(2;5),(2;6),(3;8),(3;9), ThefollowingobservationshavebearingonClaim5.2. [(3;8)f(1;2);(2;4)g(2;3);f(2;5);(2;6)g]. 2.Thepossibilityoftheidiom[(3;9);(2;3);(2;3)]iseliminatedbythethirdcaseofthe 1.A(3;7)-reductionisimpossible,sincesometwooftheverticesinthereductionwouldgive algorithm. risetoa(3;8)-reduction. 4.Followingthesequence[(3;8);(2;3)],theremaininggraphwillbecubicexceptfora 3.Theonlyreductionsthatcanprecedea(2;3)reductionare:(1;3),(2;5),(2;6),or(3;9). Thisignores(1;2)and(2;4)-reductionswhichmaybeinterspersedinvariousways. singlevertex.henceonly(2;5)or(2;6)reductionscanimmediatelyfollow.further, measureofeachreductionintheidiom.further,foranidiom,lett()denotethenumberof Wegeneralizethemeasuresofreductionstomeasuresofidioms,bytakingthesumofthe [(3;8);(2;3);(2;5);(2;3)]isnotpossible. fundamentalidiomsinthealphabet.fortheidiomsthatinclude(2;3),wehaveomittedthe interspersed(1;2)and(2;4)reductions,andcountedthemasindividualidioms.theidioms reductionswithin. involving(1;1)havealsobeencompacted. Table2giveslistslowerboundsforOut()andupperboundsfor()andg()forthe oftheindividualreductionsintheidiom. ThefollowingvaluesaredierentfromTable1oraredierentfromthesumsofthevalues 8
9 (0;0) (1;1) (1;2) 1n()e()Out()()g()g()=t() (1;3) 012 (2;4) 2 3 (2;5) 4 (2;6) (3;8) f(2;6);(2;3)g f(1;3);(2;3)g f(3;9);(2;3)g :5 f(2;5);(2;3)g f(3;8);(2;3);(2;5)g10 f(3;8);(2;3);(2;6)g : andOutfor(2;4)and(2;5):Noticethatonlythelatterformofthesereductionsin Figure2cannowappearduetothepreferencetothedelayed-commitmentreduction. Table2:BoundsonmeasuresofthereductionsperformedbySimplicial 2.Outfor(1;1):Whicheveridioma(1;1)-reductionappearsin,anadditionaledgemustbe 3.TheOutvaluesof(2;5)(2;3)and(3;9)(2;3)andvaluesof(2;6)(2;3)and(3;9)(2;3): Thereasonsareclearwhenwelookatthesubgraphsinducedbythesepairsofreductions. outsideofi. theindependencenumberoroutsideedgesinthesubgraphinducedbytheidiom. vertices,thus,havinginterspersedwithinanidiomdoesnotaectanyargumentabout (1;2)and(2;4)-reductionsyieldoptimalresultsonthesubgraphinducedbythedeleted alwaysatmost9.9t=9xt()xg()6n?2e?2out+7: ThetheoremnowfollowsfromLemma2.1alongwiththefactthatg()=t()inTable2is Greedy,MoreEdgesandSimplicial.Thesetwoalgorithmshaveacommonbasicstrategyofremovingavertexwiththeminimumdegreeinacurrentgraphateachstage.Wecaneasilysee bytheirhardgraphsthattheweaknessesofthegreedyalgorithmsappearwhentheyhaveseveralwaysofchoosingaminimum-degreevertex.ifwecouldgivethesealgorithmssomeadvice suchthattheycouldproceedoptimallywhenevertheyfaceabranchroad,howmuchwouldthe algorithmsimprove?orwouldanalgorithmthatwasgivenperfectadvicenecessarilyndan optimalsolution? 6Intheprevioussections,weconsideredtheperformanceratiosofthreegreedyalgorithms: AlgorithmwithAdvice,Ultimate 9
10 oracleforselectingamongalternatives.theonlyrequirementisthatthealgorithmmustchoose oneoftheminimumdegreeverticesatanystep.werefertothisultimatealgorithmasultimate, indicatingthatthealgorithmhasinnitevisibility(orarbitrarydistancefromthegivennode) Inthissection,westudythepowerofalgorithmsthataregiventheadditionalbenetofan forchoosingamongminimumdegreevertices. cannotndanoptimalsolution.infact,itcannotguaranteeamuchbetterperformanceratio thanthealgorithmoftheprevioussection.thisrevealsalimitationonthepowerofthefamily ofgreedyalgorithms. WeshallshowthatevenbyemployingUltimate,thereremainsgraphsforwhichUltimate setofh4issix,whereasultimatendsonlyvevertices.oneoptimalsolutionconsistsofthe WerstformasubgraphH4asontheleftofFigure5.Thesizeofthemaximumindependent Figure5:ConstructionofH4,H6,andG1. shadedverticesinfigure5.weconstructapseudobinarytreeh6withfourh4'sasleaves.it byrepeatingthesameoperationq?2times. isillustratedinthecenteroffigure5.weformapseudobinarytreeh2qwith2q(q2)levels HEU(H2q)=1+4HEU(H2(q?1))= q?2+4q?15=4q?116=3?1=3; Thesizeofthesolutionfoundbythealgorithmis: whilethesizeoftheoptimalsolutionis: Asqgrows,theratioofHEUtoOPTapproaches5=4. OPT(H2q)=2+4OPT(H2(q?1))=2( q?2)+4q?16=4q?120=3?2=3: rightoffigure5inordertomaketheentiregraphcubic,andcalltheresultinggraphg1. UltimatepicksanyvertexinaH2qattherststep.ItiseasytoverifythatMin1thenproceeds Wecanalsoobtainahardnessresultforregular(i.e.cubic)graphs.JointwoH2qsasonthe optimallyonthathalfofthegraph.thatleavestheotherh2qleft,forwhichthealgorithmwill, byinduction,benon-optimal. AnoptimalsolutionofG1containsallverticesontheevenlevelsofeachH2q.Supposethat Thus, highoddgirth),byreplacingthetrianglesatthebottomofh5byave-cycle(oranappropriately Wecanobtainsimilarhardnessresultsfortriangle-freegraphs(ormoregenerallygraphsof 1(G1)= OPT(H2q)+HEU(H2q)= OPT(H2q) 20+16=10 9=1:1: largeoddcycle)andconnectingthepairstogetherasneeded. triangle-freecubicgraphs. Theorem6.1Anygreedyalgorithmthatselectsverticesofminimumdegreemusthaveperformanceratiosatleast:1:25,fordegree-three;1:11,forcubicgraphs;and16=151:06,for 10 H 4 H6 H4 H4 H4 H4 H2q root root H2q
11 Acknowledgments forinformativecommentsanddiscussions. References WearemuchindebtedtoProfessorOsamuWatanabeandProfessorJaikumarRadhakrishnan [1]S.Arora,C.Lund,R.Motwani,M.Sudan,andM.Szegedy.Proofvericationandhardness [2]P.BermanandT.Fujito.Ontheapproximationpropertiesofindependentsetproblemin ofapproximationproblems.focs1992. [3]P.BermanandM.F rer.approximatingmaximumindependentsetinboundeddegree degree3graphs.wads1995. [4]M.R.GareyandD.S.Johnson.ComputersandIntractibility:AGuidetotheTheoryof graphs.soda1994. [5]M.M.Halld rsson.approximatingdiscretecollectionsvialocalimprovements.soda1995. [6]M.M.Halld rssonandj.radhakrishnan.greedisgood:approximatingindependentsets NP-completeness.Freeman,1979. [7]M.M.Halld rssonandj.radhakrishnan.improvedapproximationsofindependentsetsin bounded-degreegraphs.swat1994. insparseandbounded-degreegraphs.stoc1994.toappearinalgorithmica. [9]D.S.Hochbaum.Ecientboundsforthestableset,vertexcover,andsetpackingproblems. [8]M.M.Halld rssonandj.radhakrishnan.improvedapproximationsofindependentsetsin Disc.AppliedMath.,6:243254,1983. bounded-degreeviasubgraphremoval.nordicj.computing,1(4):475492,
The Beginning Balance for Meal Plan #1 is: $210.00 (Your daily average should be $2.96)
Resident Meal Plan Goal for the week ending: April 4, 2015 Week one of 11 Weeks, March 29-April 4 The Beginning Balance for is: $225.00 The Beginning Balance for is: $350.00 The Beginning Balance for Meal
How to change the decimal precision of qty, price and cost in the PROMPT Inventory System
How to change the decimal precision of qty, price and cost in the PROMPT Inventory System The standard release of PROMPT Business System is 2 decimal quantities and 3 decimal unit prices and unit cost.
Math 115 Spring 2011 Written Homework 5 Solutions
. Evaluate each series. a) 4 7 0... 55 Math 5 Spring 0 Written Homework 5 Solutions Solution: We note that the associated sequence, 4, 7, 0,..., 55 appears to be an arithmetic sequence. If the sequence
Instruction scheduling
Instruction ordering Instruction scheduling Advanced Compiler Construction Michel Schinz 2015 05 21 When a compiler emits the instructions corresponding to a program, it imposes a total order on them.
Domain of a Composition
Domain of a Composition Definition Given the function f and g, the composition of f with g is a function defined as (f g)() f(g()). The domain of f g is the set of all real numbers in the domain of g such
Exponents, Radicals, and Scientific Notation
General Exponent Rules: Exponents, Radicals, and Scientific Notation x m x n = x m+n Example 1: x 5 x = x 5+ = x 7 (x m ) n = x mn Example : (x 5 ) = x 5 = x 10 (x m y n ) p = x mp y np Example : (x) =
DistributedSharedMemorySystems? AdaptiveLoadBalancinginSoftware CompilerandRun-TimeSupportfor SotirisIoannidisandSandhyaDwarkadas fsi,[email protected] DepartmentofComputerScience Rochester,NY14627{0226
A Framework for A Business Intelligence-Enabled Adaptive Enterprise Architecture
A Framework for A Business Intelligence-Enabled Adaptive Enterprise Architecture Okhaide Akhigbe, Daniel Amyot and Gregory Richards [email protected] Business IT Alignment Aligning business objectives
Modules Available by Distance Studies and Evening Course Offerings
Modules Available by Distance Studies and Evening Course Offerings The following review is based on past course offerings over the last five years. While the future cannot be predicted, courses offered
5. A full binary tree with n leaves contains [A] n nodes. [B] log n 2 nodes. [C] 2n 1 nodes. [D] n 2 nodes.
1. The advantage of.. is that they solve the problem if sequential storage representation. But disadvantage in that is they are sequential lists. [A] Lists [B] Linked Lists [A] Trees [A] Queues 2. The
Binary Search Trees. Data in each node. Larger than the data in its left child Smaller than the data in its right child
Binary Search Trees Data in each node Larger than the data in its left child Smaller than the data in its right child FIGURE 11-6 Arbitrary binary tree FIGURE 11-7 Binary search tree Data Structures Using
Senders and Receivers
Senders and Receivers Unifaun Online 26 November 2013 2 Contents 1 Senders... 3 1.1 New sender (and receiver)... 3 1.2 Search existing senders... 4 1.3 Show and copy details... 4 1.4 Change details...
PES Institute of Technology-BSC QUESTION BANK
PES Institute of Technology-BSC Faculty: Mrs. R.Bharathi CS35: Data Structures Using C QUESTION BANK UNIT I -BASIC CONCEPTS 1. What is an ADT? Briefly explain the categories that classify the functions
Unified Communications Self Care Portal
Headquarters Desktop Phone Management September 2015 Use the Unified Communications Self Care Portal to customize your phone, forward your calls to another location, or access your phone user guide. This
Introduction to Algebraic Geometry. Bézout s Theorem and Inflection Points
Introduction to Algebraic Geometry Bézout s Theorem and Inflection Points 1. The resultant. Let K be a field. Then the polynomial ring K[x] is a unique factorisation domain (UFD). Another example of a
Classification/Decision Trees (II)
Classification/Decision Trees (II) Department of Statistics The Pennsylvania State University Email: [email protected] Right Sized Trees Let the expected misclassification rate of a tree T be R (T ).
Algorithms and Data Structures
Algorithms and Data Structures Part 2: Data Structures PD Dr. rer. nat. habil. Ralf-Peter Mundani Computation in Engineering (CiE) Summer Term 2016 Overview general linked lists stacks queues trees 2 2
Positional Numbering System
APPENDIX B Positional Numbering System A positional numbering system uses a set of symbols. The value that each symbol represents, however, depends on its face value and its place value, the value associated
Data Structure [Question Bank]
Unit I (Analysis of Algorithms) 1. What are algorithms and how they are useful? 2. Describe the factor on best algorithms depends on? 3. Differentiate: Correct & Incorrect Algorithms? 4. Write short note:
Cours de C++ Utilisations des conteneurs
Cours de C++ Utilisations des conteneurs Cécile Braunstein [email protected] 1 / 18 Introduction Containers - Why? Help to solve messy problems Provide useful function and data structure Consistency
Representing feature models as class diagrams
Representing feature models as class diagrams Abel Gómez, Isidro Ramos Technical University of Valencia. Departamento de Sistemas Informáticos y Computación. 1 Abel Gómez, Isidro Ramos - Universidad Politécnica
Selected Radio Frequency Exposure Limits
ENVIRONMENT, SAFETY & HEALTH DIVISION Chapter 50: Non-ionizing Radiation Selected Radio Frequency Exposure Limits Product ID: 94 Revision ID: 1736 Date published: 30 June 2015 Date effective: 30 June 2015
OPRC Level II COMMUNICATIONS AND INFORMATION SHARING
OPRC Level II COMMUNICATIONS AND INFORMATION SARING Outline Common Communications Problems Communications Management Communications Plan and Network Briefings Common Communications Problems Too many calls
Databasesystemer, forår 2005 IT Universitetet i København. Forelæsning 3: Business rules, constraints & triggers. 3. marts 2005
Databasesystemer, forår 2005 IT Universitetet i København Forelæsning 3: Business rules, constraints & triggers. 3. marts 2005 Forelæser: Rasmus Pagh Today s lecture Constraints and triggers Uniqueness
SIMSON Security Incident Management System
It s a dangerous business going out your front door. J.R.R. Tolkien (1892-1973) SIMSON Security Incident Management System Purpose: Method: Participants: Location: Language: A web based platform to record,
Chapter 8 The Enhanced Entity- Relationship (EER) Model
Chapter 8 The Enhanced Entity- Relationship (EER) Model Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 8 Outline Subclasses, Superclasses, and Inheritance Specialization
Copyright 2011 - Bizagi. Change Management Construction Document Bizagi Process Modeler
Copyright 2011 - Bizagi Change Management Bizagi Process Modeler Table of Contents Change Management... 4 Description... 4 Main Facts in the Process Construction... 5 Data Model... 5 Parameter Entities...
Using Peer to Peer Dynamic Querying in Grid Information Services
Using Peer to Peer Dynamic Querying in Grid Information Services Domenico Talia and Paolo Trunfio DEIS University of Calabria HPC 2008 July 2, 2008 Cetraro, Italy Using P2P for Large scale Grid Information
Document Management. For Microsoft Dynamics CRM 2013
Document Management For Microsoft Dynamics CRM 2013 Contents Overview... 3 Document Management Interface... 4 Toolbar Options... 5 Creating a Folder Template... 8 About AbleBridge... 9 2 Overview 3 Document
136 CHAPTER 4. INDUCTION, GRAPHS AND TREES
136 TER 4. INDUCTION, GRHS ND TREES 4.3 Graphs In this chapter we introduce a fundamental structural idea of discrete mathematics, that of a graph. Many situations in the applications of discrete mathematics
hand-e-pix Windows Mobile Client
hand-e-pix Windows Mobile Client User Guide May 2012 Issue 2 Page 1 Table of Contents Table of Contents... 2 General... 3 Getting Started... 3 1. Installation... 3 2. Loading the application... 3 3. Login...
hp calculators HP 12C Loan Amortizations Amortization The HP12C amortization approach Practice amortizing loans
Amortization The HP12C amortization approach Practice amortizing loans Amortization The word 'amortization' comes from a Latin word meaning "about to die". When a loan earning interest has regular, fixed
5-1 NUMBER THEORY: DIVISIBILITY; PRIME & COMPOSITE NUMBERS 210 f8
5-1 NUMBER THEORY: DIVISIBILITY; PRIME & COMPOSITE NUMBERS 210 f8 Note: Integers are the w hole numbers and their negatives (additive inverses). While our text discusses only whole numbers, all these ideas
Container loading by GRASP
Container loading by GRASP Hugo Duque Caldeira - ISEP; INESC Porto José Soeiro Ferreira - FEUP; INESC Porto Container loading by GRASP 1. Introduction 2. Problem 3.Resolution methods 4.Application of GRASP
Methods Used for Counting
COUNTING METHODS From our preliminary work in probability, we often found ourselves wondering how many different scenarios there were in a given situation. In the beginning of that chapter, we merely tried
2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8]
Code No: R05220502 Set No. 1 1. (a) Describe the performance analysis in detail. (b) Show that f 1 (n)+f 2 (n) = 0(max(g 1 (n), g 2 (n)) where f 1 (n) = 0(g 1 (n)) and f 2 (n) = 0(g 2 (n)). [8+8] 2. (a)
Completion Time Scheduling and the WSRPT Algorithm
Completion Time Scheduling and the WSRPT Algorithm Bo Xiong, Christine Chung Department of Computer Science, Connecticut College, New London, CT {bxiong,cchung}@conncoll.edu Abstract. We consider the online
Design of LDPC codes
Design of LDPC codes Codes from finite geometries Random codes: Determine the connections of the bipartite Tanner graph by using a (pseudo)random algorithm observing the degree distribution of the code
SUPPORTED ACTIVE DIRECTORY TOPOLOGIES BY LYNC 2013
SUPPORTED ACTIVE DIRECTORY TOPOLOGIES BY LYNC 2013 LYNC SERVER 2013 Lync Server 2013 supports the same Active Directory Domain Services topologies as Microsoft Lync Server 2010 and Microsoft Office Communications
Home Page. Data Structures. Title Page. Page 1 of 24. Go Back. Full Screen. Close. Quit
Data Structures Page 1 of 24 A.1. Arrays (Vectors) n-element vector start address + ielementsize 0 +1 +2 +3 +4... +n-1 start address continuous memory block static, if size is known at compile time dynamic,
Nonparametric tests these test hypotheses that are not statements about population parameters (e.g.,
CHAPTER 13 Nonparametric and Distribution-Free Statistics Nonparametric tests these test hypotheses that are not statements about population parameters (e.g., 2 tests for goodness of fit and independence).
Workers Compensation. Initial Procedures
Workers Compensation Initial Procedures INJURY HOTLINE Available 24 hours / 7 days a week Registered Nurses Nationwide Coverage Translation Services Medical referral to designated clinic or ER Document
Section 8.4 - Composite and Inverse Functions
Math 127 - Section 8.4 - Page 1 Section 8.4 - Composite and Inverse Functions I. Composition of Functions A. If f and g are functions, then the composite function of f and g (written f g) is: (f g)( =
Basic Use of the TI-84 Plus
Basic Use of the TI-84 Plus Topics: Key Board Sections Key Functions Screen Contrast Numerical Calculations Order of Operations Built-In Templates MATH menu Scientific Notation The key VS the (-) Key Navigation
SPICE EduGuide EG0015 Security of Administrative Accounts
This SPICE EduGuide applies to HSC information systems, specifically Administrative login accounts; (aka Admin accounts) and the faculty, staff and students who use them. Admin accounts are logon IDs and
Rotation Operation for Binary Search Trees Idea:
Rotation Operation for Binary Search Trees Idea: Change a few pointers at a particular place in the tree so that one subtree becomes less deep in exchange for another one becoming deeper. A sequence of
Analysis of Algorithms I: Optimal Binary Search Trees
Analysis of Algorithms I: Optimal Binary Search Trees Xi Chen Columbia University Given a set of n keys K = {k 1,..., k n } in sorted order: k 1 < k 2 < < k n we wish to build an optimal binary search
#1-12: Write the first 4 terms of the sequence. (Assume n begins with 1.)
Section 9.1: Sequences #1-12: Write the first 4 terms of the sequence. (Assume n begins with 1.) 1) a n = 3n a 1 = 3*1 = 3 a 2 = 3*2 = 6 a 3 = 3*3 = 9 a 4 = 3*4 = 12 3) a n = 3n 5 Answer: 3,6,9,12 a 1
Derivatives Math 120 Calculus I D Joyce, Fall 2013
Derivatives Mat 20 Calculus I D Joyce, Fall 203 Since we ave a good understanding of its, we can develop derivatives very quickly. Recall tat we defined te derivative f x of a function f at x to be te
A binary heap is a complete binary tree, where each node has a higher priority than its children. This is called heap-order property
CmSc 250 Intro to Algorithms Chapter 6. Transform and Conquer Binary Heaps 1. Definition A binary heap is a complete binary tree, where each node has a higher priority than its children. This is called
Symantec Control Compliance Suite. Overview
Symantec Control Compliance Suite Overview Addressing IT Risk and Compliance Challenges Only 1 in 8 best performing organizations feel their Information Security teams can effectively influence business
Operating Systems. 07.02 File system mounting, sharing, and protection. File System Mounting
07.02 File system mounting, sharing, and protection emanuele lattanzi isti information science and technology institute 1/15 File System Mounting A file system must be mounted before it can be accessed
DATA STRUCTURES USING C
DATA STRUCTURES USING C QUESTION BANK UNIT I 1. Define data. 2. Define Entity. 3. Define information. 4. Define Array. 5. Define data structure. 6. Give any two applications of data structures. 7. Give
14 Databases. Source: Foundations of Computer Science Cengage Learning. Objectives After studying this chapter, the student should be able to:
14 Databases 14.1 Source: Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: Define a database and a database management system (DBMS)
Array Abstract Data Type
1 Array Abstract Data Type Table of Contents What this module is about... 1 Introduction... 2 Data type objects... 3 Array elements... 3.1 Sub -arrays... 3.2 Array descriptor... 3.3 Data type operations...
CHAPTER_3 SOFTWARE ENGINEERING (PROCESS MODELS)
CHAPTER_3 SOFTWARE ENGINEERING (PROCESS MODELS) Prescriptive Process Model Defines a distinct set of activities, actions, tasks, milestones, and work products that are required to engineer high quality
Simplification of Radical Expressions
8. Simplification of Radical Expressions 8. OBJECTIVES 1. Simplify a radical expression by using the product property. Simplify a radical expression by using the quotient property NOTE A precise set of
SFTP Server User Login Instructions. Open Internet explorer and enter the following url: https://sftp.sae.org
SFTP Server User Login Instructions Open Internet explorer and enter the following url: https://sftp.sae.org You will be prompted for a user id and password as such. Please enter your account id and password.
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK A REVIEW ON THE USAGE OF OLD AND NEW DATA STRUCTURE ARRAYS, LINKED LIST, STACK,
Audit of Employee Self-Service Payroll System Access
Audit of Employee Self-Service Payroll System Access MARTIN MATSON City Comptroller STACEY MAZMANIAN Audit Manager City of Milwaukee, Wisconsin September 2015 TABLE OF CONTENTS Transmittal Letter..1 I.
CumuLogic Load Balancer Overview Guide. March 2013. CumuLogic Load Balancer Overview Guide 1
CumuLogic Load Balancer Overview Guide March 2013 CumuLogic Load Balancer Overview Guide 1 Table of Contents CumuLogic Load Balancer... 3 Architectural Overview of CumuLogic Load Balancer... 4 How to Use
Row Echelon Form and Reduced Row Echelon Form
These notes closely follow the presentation of the material given in David C Lay s textbook Linear Algebra and its Applications (3rd edition) These notes are intended primarily for in-class presentation
Theory of Relational Database Design and Normalization
Theory of Relational Database Design and Normalization (Based on Chapter 14 and some part of Chapter 15 in Fundamentals of Database Systems by Elmasri and Navathe, Ed. 3) 1 Informal Design Guidelines for
Application of Stacks: Postfix Expressions Calculator (cont d.)
Application of Stacks: Postfix Expressions Calculator (cont d.) Postfix expression: 6 3 + 2 * = FIGURE 7-15 Evaluating the postfix expression: 6 3 + 2 * = Data Structures Using C++ 2E 1 Application of
Big Data trifft Industrie Im Internet der Bosch-Dinge und -Dienste
Big Data trifft Industrie Im Internet der Bosch-Dinge und -Dienste Dr. Lothar Baum Februar 2015 1 Bosch Business Areas Automotive Technology Industrial Technology Energy and Building Technology Consumer
What is a CMS? Why Node.js? Joel Barna. Professor Mike Gildersleeve IT 704 10/28/14. Content Management Systems: Comparison of Tools
Joel Barna Professor Mike Gildersleeve IT 704 10/28/14 Content Management Systems: Comparison of Tools What is a CMS? A content management system (CMS) is a system that provides a central interface for
Project Management Software
Project Management Software www.wetrack.com Project management software everyone can understand WeTrack provides a new way to manage projects. Born out of the London 2012 Olympic Games, WeTrack is our
Getting Started with Web Based Data Reporting. November, 2005
Getting Started with Web Based Data Reporting November, 2005 This is a brief overview describing how to use the Colorado EMS Data Collection web based reporting tool. It is not a comprehensive manual,
A permutation can also be represented by describing its cycles. What do you suppose is meant by this?
Shuffling, Cycles, and Matrices Warm up problem. Eight people stand in a line. From left to right their positions are numbered,,,... 8. The eight people then change places according to THE RULE which directs
Flying NZ - Aero Club Safety Management System Checklist
One SAFETY POLICY AND ACCOUNTABILITY Is there a written Safety Policy and Safety Commitment Statement confirming Safety is a priority Is the Safety Policy approved and signed by President Is the Safety
Odd induced subgraphs in graphs of maximum degree three
Odd induced subgraphs in graphs of maximum degree three David M. Berman, Hong Wang, and Larry Wargo Department of Mathematics University of New Orleans New Orleans, Louisiana, USA 70148 Abstract A long-standing
This is a square root. The number under the radical is 9. (An asterisk * means multiply.)
Page of Review of Radical Expressions and Equations Skills involving radicals can be divided into the following groups: Evaluate square roots or higher order roots. Simplify radical expressions. Rationalize
Microsoft Trusted Root Certificate: Program Requirements
Microsoft Trusted Root Certificate: Program Requirements 1. Introduction The Microsoft Root Certificate Program supports the distribution of root certificates, enabling customers to trust Windows products.
Signs of Substance Abuse in Broward County, Florida
Adult Summer 8 The chart below summarizes the severity and trends for indicators of drug use and abuse in Broward County, Florida. The Severity Index is based on the number of drug-related deaths, emergency
LinkProof And VPN Load Balancing
LinkProof And Load Balancing Technical Application Note May 2008 North America Radware Inc. 575 Corporate Dr. Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware Ltd. 22 Raoul Wallenberg
About Support Center Ciena s Service Ticketing System for Customers. March 2006 (r 1)
About Support Center Ciena s Service Ticketing System for Customers March 2006 (r 1) Outline» Support Center Overview» Why Support Center So Important to Our Customers» Ciena Support Portal Review» Connecting
Customizing the SSOSessionTimeout.jsp page for Kofax Front Office Server 3.5.2
Customizing the SSOSessionTimeout.jsp page for Kofax Front Office Server 3.5.2 Date July 23, 2014 Applies To Kofax Front Office Server (KFS) 3.5.2.10 Summary This application note provides instructions
Recall the process used for adding decimal numbers. 1. Place the numbers to be added in vertical format, aligning the decimal points.
2 MODULE 4. DECIMALS 4a Decimal Arithmetic Adding Decimals Recall the process used for adding decimal numbers. Adding Decimals. To add decimal numbers, proceed as follows: 1. Place the numbers to be added
IE 680 Special Topics in Production Systems: Networks, Routing and Logistics*
IE 680 Special Topics in Production Systems: Networks, Routing and Logistics* Rakesh Nagi Department of Industrial Engineering University at Buffalo (SUNY) *Lecture notes from Network Flows by Ahuja, Magnanti
Test Project IT Software Solutions for Business
Test Project IT Software Solutions for Business Written by: AbdulRahman Al Marzouqi Date 27.10.14 1 of 9 CONTENTS This Test Project document contains the rules of the competition, the software provided,
A simple criterion on degree sequences of graphs
Discrete Applied Mathematics 156 (2008) 3513 3517 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam Note A simple criterion on degree
Vantage RADIUS 50. Quick Start Guide Version 1.0 3/2005
Vantage RADIUS 50 Quick Start Guide Version 1.0 3/2005 1 Introducing Vantage RADIUS 50 The Vantage RADIUS (Remote Authentication Dial-In User Service) 50 (referred to in this guide as Vantage RADIUS)
Adding Digital Signature and Encryption in Outlook
Adding Digital Signature and Encryption in Outlook Using Outlook, the email messages can be signed and encrypted by a digital certificate. To digitally sign a message in Outlook some conditions must be
Define and Configure an Application Request Routing Server Farm
1 of 6 12/28/2011 3:26 PM Home > Learn > Installing and Configuring IIS 7 > Application Request Routing Module > Define and Configure an Application Request Routing Server Farm Define and Configure an
How To Find Out What A Key Is In A Database Engine
Database design theory, Part I Functional dependencies Introduction As we saw in the last segment, designing a good database is a non trivial matter. The E/R model gives a useful rapid prototyping tool,
