Ecient approximation algorithm for minimizing makespan. on uniformly related machines. Chandra Chekuri. November 25, 1997.

Size: px
Start display at page:

Download "Ecient approximation algorithm for minimizing makespan. on uniformly related machines. Chandra Chekuri. November 25, 1997."

Transcription

1 Ecient approximation algorithm for minimizing makespan on uniformly related machines Chandra Chekuri November 25, 1997 Abstract We obtain a new ecient approximation algorithm for scheduling precedence constrained jobs on machines with dierent speeds. The setting is as follows. There are n jobs, job j requires p j units of processing. The jobs are to be scheduled on a set of m machines. Machine i has a speed s i ; it takes p j =s i units of time for machine i to process job j. The precedence constraints on the jobs are given in the form of a partial order. If j k, processing of k cannot start until j is completely done. Let C j denote the completion time of job j. The objective is to minimize C max = max j C j conventionally called the makespan of the schedule. We consider non-preemptive schedules where a job is processed on a single machine with no preemptions. Recently Chudak and Shmoys [1] gave an approximation algorithm p with a performance ratio of O(log m) improving upon the earlier ratio of O( m) due to Jae [6]. Their algorithm is based on solving a linear programming relaxation of the problem. Building on some of their ideas, we present a new ecient and combinatorial algorithm which achieves a similar approximation ratio but runs in O(n 3 ) time. In the process we also obtain a new lower bound which is of independent interest. By a general result of Shmoys, Wein, and Williamson [9] this algorithm can be extended to obtain an algorithm with an approximation ratio of O(log m) even if each job j has a release date r j before which it cannot be processed. 1 Introduction The problem of scheduling precedence constrained jobs on a set of identical parallel machines to minimize makespan is one of the oldest problems for which approximation algorithms have been devised. Graham [4] showed that a simple list scheduling gives a ratio of 2 and it is the best known algorithm till date. We consider a generalization of this model in which machines have dierent speeds which in the scheduling literature are called uniformly related. We formalize the problem below. There are n jobs 1; : : :; n, with job j requiring processing of p j units. The jobs are to be scheduled on a set of m machines. Each machine i has a speed factor s i. Job j with a processing requirement p j takes p j =s i time units to run on machine i. We restrict ourselves to non-preemptive schedules where a job once started on a machine has to run to completion on the same machine. Our results carry over to the preemptive case as well. In the scheduling literature [5] where problems are classied in the jj notation, this problem is referred to as QjprecjC max. Supported by an IBM Co-operative Fellowship, an ARO MURI Grant DAAH and NSF Award CCR , with matching funds from IBM, Schlumberger Foundation, Shell Foundation, and erox Corporation. chekuri@cs.stanford.edu. 1

2 Liu and Liu [8] analyzed the performance of Graham's list scheduling algorithm and showed that the approximation guarantee depends on the ratio of the largest to the smallest speed. This ratio could be arbitrarily large even for a small number of machines. The rst algorithm to have a bound independent of the speeds was given by Jae [6], who showed that list scheduling restricted to the set of machines which are within a factor of p m of the fastest machine gives an O( p m) bound. More recently, Chudak and Shymoys [1] improved the ratio considerably and gave an algorithm which has a guarantee of O(log m). At a more basic level their algorithm has a guarantee of O(K) where K is the number of distinct speeds. The above mentioned algorithm relies on solving a linear programming relaxation and uses the information obtained from the solution to allocate jobs to processors. We present a new algorithm which nds an allocation without solving a linear program. The ratio guaranteed by our algorithm is also O(log m) but it oers a couple of advantages. First, our algorithm runs in O(n 3 ) time and is combinatorial, hence is provably more ecient than the algorithm in [1]. Second, we show a new combinatorial lower bound which is natural and might be useful in other contexts. We remark here that our algorithm was inspired by, and builds upon the ideas in [1]. The rest of the paper is organized as follows. Section 2 contains some of the ideas from Chudak and Shmoy's paper [1] that are useful to us. We present the new lower bound in Section 3, and give the approximation algorithm and the analysis in Section 4. 2 Preliminaries We summarize below the basic ideas in the work of Chudak and Shmoys [1]. Their main result is an algorithm which gives a ratio of O(K) for the problem of QjprecjC max where K is the number of distinct speeds. They also show how to reduce the general case with arbitrary speeds to one in which there are only O(log m) distinct speeds as follows. Ignore all machines with speed less than 1=m times the speed of the fastest machine. Round down all speeds to the nearest power of 2. They observe that the above transformation can be done while losing only a constant factor in the approximation ratio. Therefore we will restrict ourselves to the case where we have K distinct speeds. Graham's analysis shows that any schedule produced by list scheduling has a chain of jobs j 1 j 2 : : : j r where a machine is idle only when one of the jobs in the chain is being processed. The time spent processing the above chain is a lower bound on the optimal makespan. Similarly the time spent when all machines are busy is also a lower bound. Combining these two facts give the upper bound of 2 on the performance ratio of list scheduling. One can apply a similar analysis for the multiple speed case. As observed in [1], the diculty stems from the fact that we can no longer claim that the processing time of the chain is a lower bound. All that can be said is that the processing time of any chain on the fastest machine is a lower bound. The jobs in the chain guaranteed by the list scheduling analysis do not necessarily run on the fastest machine. Based on this, the authors of [1] observed that one of the important objectives is to nd an assignment of jobs to speeds (machines) which ensures that the processing time of any chain is bounded by some factor of the optimal. We will follow the notation of [1] for sake of continuity and convenience. Let m k be the number of P machines with speed s k, k = 1; : : :; K, where s 1 > : : : > s K. Let Mu v denote v the sum m l. Let k(j) denote the speed at which job j is assigned to be processed. 2

3 The average processing allocated to a machine of a specic speed k, denoted by D k is the following. D k = 1 p j : m k s k j:k(j)=k It is also possible to compute the maximum over all chains C, of the following quantity p j s j2c k(j) which will be denoted by C. A natural variant of list scheduling called speed based list scheduling is developed in [1] which is constrained to schedule according the speed assignments of the jobs. As in the classical list scheduling, a job is scheduled as soon as a machine is free, provided the free machine matches the speed assignment of the job. The following theorem whose analysis is a simple generalization of Graham's analysis is from [1]. Theorem 1 (Chudak & Shmoys) For any job assignment k(j), j = 1; : : :; n, the speedbased list scheduling algorithm produces a schedule of length C max C + The authors of [1] use a linear programming relaxation of P the problem to obtain a job K assignment which simultaneously satises the two conditions: k=1 D k (K + p K)Cmax and C ( p K+1)Cmax where C max is the optimal makespan. Combining these with Theorem 1 gives them an O(K) approximation. We will show how to use an alternate method based on chain decompositions to obtain an assignment satisfying similar properties. 3 A new lower bound In this section we develop a simple and natural lower bound which will be used in the analysis of our algorithm. Before formally stating the lower bound we provide some intuition. The two lower bounds used in Graham's analysis for identical parallel machines are the maximum chain length and the average load. As discussed in the previous section, the maximum chain length (maximum according to processing times) has to be redened for the case when machines have dierent speeds. A naive generalization implies that the maximum chain length divided by the fastest speed is a lower bound. However it is easy to generate examples where this bound is a factor of 1=m away from the optimal. We describe the general nature of such examples to motivate the new bound. Suppose we have two speeds with s 1 = D and s 2 = 1, and l > 1 independent chains of jobs each of the same length D. Suppose m 1 = 1, and m 2 = l D. The average load can be seen to be bound by 1. Similarly the time to process any chain on the fastest processor is 1. However if D l it is easy to observe that the optimal is (l) since only l machines can be used at any time. We try to capture these types of situations in our lower bound in a simple way. We can view the precedence relations between the jobs as a weighted poset where each element of the poset has a weight associated with it that is the same as the processing time of the associated job. We will assume that we have the transitive closure of the precedence constraints. We will need a few denitions. Denition 1 A chain P is a set of jobs j 1 ; : : :; j r such that for all 1 i < r, j i j i+1. The length of a chain P denoted by j is the sum of the processing times of the jobs in P. K k=1 D k : 3

4 Denition 2 A chain decomposition P of a set of precedence constrained jobs is a partition of the poset in to a collection of chains fp 1 ; P 2 ; : : :; P r g. A maximal chain decomposition is one in which P 1 is a longest chain and fp 2 ; : : :; P r g is a maximal chain decomposition of the poset with elements of P 1 removed. Denition 3 Let P = fp 1 ; P 2 ; : : :; P r g be any maximal chain decomposition of the precedence graph of the jobs. We dene a quantity called L P associated with P as follows. L P = max 1jmin(r;m) jp ij s i With the above denitions in place we are ready to state and prove the new lower bound. Theorem 2 Let P = fp 1 ; P 2 ; : : :; P r g be any maximal chain decomposition of the precedence n graph of the jobs. Let AL = j=1 p i P m which represents the average load. Then s i C max maxfal; L Pg Moreover the lower bound is valid for the preemptive case as well. Proof: It is easy to observe that Cmax AL. We will show the following for 1 j m Cmax jp ij s i which will prove the theorem. Consider the rst j chains. Suppose our input instance was modied to have only the jobs in rst j chains with the precedence constraints induced by the original instance. It is easy to see that a lower bound for this modied instance is a lower bound for the original instance. Since it is possible to execute only one job from each chain at any time instant, only the fastest j machines are relevant for this modied instance. j The expression jp ij is nothing but the average load for the modied instance, which as s i we observed before is a lower bound. Since the average load is also a lower bound for the preemptive case, the bound is valid for that case as well. 2 Theorem 3 A maximal chain decomposition can be computed in O(n 3 ) time. If all p j the same, the running time can be improved to O(n 2p n). are Proof: It is necessary to nd the transitive closure of the given graph of precedence constraints. This can be done in O(n 3 ) time using a BFS from each vertex. From a theoretical point of view this can be improved to O(n! ) where! 2:376 using fast matrix multiplication [2]. A longest chain in a weighted DAG can be found in O(n 2 ) time using standard algorithms. Using this at most n times, a maximal chain decomposition can be obtained. If all p j are the same (without loss of generality we can assume they are all 1) the length of a chain is the same as the number of vertices in the chain. It is possible to use this additional structure to obtain a maximal chain decomposition in O(n 2p n) time. We defer the details. 2 4

5 1. compute a maximal chain decomposition P = fp 1 ; : : :; P r g of the jobs. 2. set l = 1. set B = maxfal; L P g. 3. foreach speed 1 i k do P (a) let l t r be max index such that ljt j j=(m i s i ) 4B. (b) assign jobs in chains P l ; : : :; P t to speed i. (c) set l = t + 1. If l > r return. 4. return. Figure 1: Algorithm Chain-Alloc 4 The approximation algorithm The approximation algorithm we develop in this section will be based on the maximal chain decompositions dened in the previous section. As mentioned in Section 2, we will describe an algorithm to produce a job assignment where each job is assigned to a specic speed. Then we use the speed based list scheduling of Chudak and Shmoys with the job assignment produced by our algorithm. Essentially, the algorithm in Figure 1 computes a lower bound B on the optimal using a maximum chain decomposition, and allocates the chains in non-increasing lengths to the speeds such that no speed is loaded more than four times the lower bound. We now prove several properties of the above described allocation which leads to the performance guarantee of the algorithm. Lemma 1 If chain is assigned to speed i, then jj s i 2B. Proof: Suppose some chain violates the above condition. Then let be the chain with the least index which violates it (hence longest among the violating chains) and let s u be the speed to which it is assigned. From the denition of L P and B it follows that jp 1 j=s 1 B. Therefore it must be the case that P u > 1 and that j > m 1. Let v be the index such that M v?1 1 < j M1 v (recall that M 1 v = v m l). If j > m, no such index exists and we set v to K, the slowest speed. If j m, for convenience of notation we assume that j = M1 v simply by ignoring other machines of speed P s v. From P the denition of L P, AL, j and B, we get the following. If j m then L P ( jp v ij)=( m is i ). If j > m then m i s i ). In either case we obtain the fact that j P ij v m maxfl P ; ALg = B (1) ls l AL ( jp ij)=( P K Since j j=s u > 2B, it must be the case that jp i j=s u > 2B for all M 1 < i j. This implies that j jp i j > 2B(j? M M1 1 )s u 2B <i 5 v m l s l (2)

6 We claim that each of the machines in speeds 1 to u? 1 have an average load greater than 2B. This is because for all 1 i < j we have jp i j=s k(i) 2B and, the algorithm is willing to load the machines to an average load of 4B. In addition it is true that j j=s 2B. Therefore we have jp ij P m ls l > 2B (3) From Equations 1 and 2 we obtain the following sequence of inequalities. M j jp i j B m l s l M1 jp i j j + jp i j B( m l s l + M1 <i M1 jp i v j + 2B m l s l B( m l s l + 1 jp i j + B B v v m l s l B m l s l B v m l s l From Equations 1 and 4 we obtain the following j jp i j B v m l s l B( m l s l + 2B From Equation 1 and above we conclude that j v v m l s l ) m l s l ) using Equation 2 m l s l (4) v m l s l ) m l s l using Equation 4 jp i j 2B m l s l The last inequality above contradicts Equation 3. Hence our assumption about must be incorrect which proves the lemma. 2 Lemma 2 Algorithm Chain-Alloc allocates all chains to some speed. Proof: Let be the rst chain which is not allocated. As in the argument in the proof of Lemma 1, each speed is loaded to an average load greater than 2B. This is a contradiction since that would imply that AL > B where AL is the average load of each machine. 2 Lemma 3 For 1 k K, D k 4C max. 6

7 Proof: Since B C max and the algorithm never loads a speed to more than an average load of 4B the bound follows. 2 Lemma 4 For the job assignment produced C 2KC max. P Proof: Let P be any chain. We will show that p j2=s k(j) 2KCmax. Let A i be the set of jobs in P which are assigned to speed P i. Let P l be the longest chain assigned to speed i by the algorithm. We claim that jp l j j2a i p i. This is because the jobs in A i form a chain when we picked P l to be the longest chain in the max chain decomposition. From Lemma 1 we know that jp l j=s i 2B 2Cmax. Therefore it follows that k j2p p j s k(j) = ja i j s i 2KC max Theorem 4 Using speed based list scheduling on the job assignment produced by Algorithm Chain-Alloc gives a 6K approximation where K is the number of distinct speeds. Furthermore the algorithm runs in O(n 3 ) time. The running time can be improved to O(n 2p n) if all p j are the same. Proof: From Lemmas 3 we obtain that D k 4Cmax for 1 k K and from Lemma 4 we obtain C 2KCmax. Putting these two facts together, for the job assignment produced by the algorithm Chain-Alloc, speed based list scheduling gives the following upper bound by Theorem 1. C max C + K k=1 D k 2KC max + 4KC max 6KC max : It is easy to see that the speed based list scheduling can be implemented in O(n 2 ) time. The running time is dominated by the time to do the maximum chain decomposition. Theorem 3 gives the desired bounds. 2 Corollary 1 There is an algorithm which runs in O(n 3 ) time and gives an O(log m) approximation ratio to the problem of scheduling precedence constrained jobs on uniformly related machines. We remark here that the leading constant in the LP based algorithm in [1] is better. We also observe that the above bound is based on the lower bound which is valid for preemptive schedules as well. Hence our result is valid for preemptive schedules. In [1] it is shown that the lower bound provided by the LP relaxation is a factor of (log m= log log m) away from the optimal. Surprisingly it is easy to show using the same example as in [1] that our lower bound from Section 3 is also a factor of (log m= log log m) away from the optimal. Theorem 5 There are instances where the lower bound given in Theorem 2 is a factor of (log m= log log m) away from the optimal. Proof: The proof of Theorem 3:3 in [1] provides the instance and it is easily veried that any maximum chain decomposition of that instance is a factor of (log m= log log m) away from the optimal

8 4.1 Release Dates Now consider the scenario where each job j has a release date r j before which it cannot be processed. By a general result of Shmoys, Wein, and Williamson an approximation algorithm for the problem without release dates can be tranformed to one with release dates losing only a factor of 2 in the process. Therefore we obtain the following. Theorem 6 There is an O(log m) approximation for the problem Qjprec; r j jc max runs in time O(n 3 ). which 5 Conclusions The main contribution of this paper is a simple and ecient O(log m) approximation to the scheduling problem QjprecjC max. Chudak and Shmoys [1] provide similar approximations for the more general case when the objective function is the average weighted completion time (Qjprecj P w j C j ) using linear programming relaxations. We believe that the techniques of this paper can be extended to obtain a simpler and combinatorial algorithm for that case as well. It is known that the problem of minimizing makespan is hard to approximate to within a factor of 4=3 even if all machines have the same speed [7]. However, for the single speed case a 2 approximation is known, while the best known ratio for the multiple speed case is only O(log m). Obtaining a constant factor approximation, or improving the hardness are interesting open problems. References [1] F. Chudak and D. Shmoys. Approximation algorithms for precedence-constrained scheduling problems on parallel machines that run at dierent speeds. Proceedings of the Eighth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), [2] D. Coppersmith and S. Winograd. Matrix multiplication via arithmetic progression. Proceedings of the 19th ACM Symposium on Thoery of Computing, 1{6, [3] M.R. Garey and D.S. Johnson. Computers and Intractability: A Guide to the Theory of NP-completeness, Freeman, San Francisco (1979). [4] R.L. Graham. Bounds for certain multiprocessor anomalies. Bell System Tech. J. 45:1563{81, [5] R.L. Graham, E.L. Lawler, J.K. Lenstra and A.H.G. Rinnooy Kan. Optimization and approximation in deterministic sequencing and scheduling: a survey. Ann. Discrete Math. 5:287{326, [6] J. Jae. Ecient scheduling of tasks without full use of processor resources. Theoretical Computer Science, 26:1{17, [7] J.K. Lenstra and A.H.G. Rinnooy Kan. Complexity of scheduling under precedence constraints. Operations Research, 26:22{35, [8] J.W.S. Lui and C.L. Lui. Bounds on scheduling algorithms for heterogeneous computing systems. In J.L Rosenfeld (ed.), Information Processing 74, North-Holland, 349{353,

9 [9] D. Shmoys, J. Wein, and D. Williamson. Scheduling parallel machines on-line. SIAM Journal on Computing, vol 24, 1313{31,

Completion Time Scheduling and the WSRPT Algorithm

Completion Time Scheduling and the WSRPT Algorithm Completion Time Scheduling and the WSRPT Algorithm Bo Xiong, Christine Chung Department of Computer Science, Connecticut College, New London, CT {bxiong,cchung}@conncoll.edu Abstract. We consider the online

More information

Scheduling Parallel Jobs with Linear Speedup

Scheduling Parallel Jobs with Linear Speedup Scheduling Parallel Jobs with Linear Speedup Alexander Grigoriev and Marc Uetz Maastricht University, Quantitative Economics, P.O.Box 616, 6200 MD Maastricht, The Netherlands. Email: {a.grigoriev,m.uetz}@ke.unimaas.nl

More information

An improved on-line algorithm for scheduling on two unrestrictive parallel batch processing machines

An improved on-line algorithm for scheduling on two unrestrictive parallel batch processing machines This is the Pre-Published Version. An improved on-line algorithm for scheduling on two unrestrictive parallel batch processing machines Q.Q. Nong, T.C.E. Cheng, C.T. Ng Department of Mathematics, Ocean

More information

Scheduling Parallel Jobs with Monotone Speedup 1

Scheduling Parallel Jobs with Monotone Speedup 1 Scheduling Parallel Jobs with Monotone Speedup 1 Alexander Grigoriev, Marc Uetz Maastricht University, Quantitative Economics, P.O.Box 616, 6200 MD Maastricht, The Netherlands, {a.grigoriev@ke.unimaas.nl,

More information

The power of -points in preemptive single machine scheduling

The power of -points in preemptive single machine scheduling JOURNAL OF SCHEDULING J. Sched. 22; 5:121 133 (DOI: 1.12/jos.93) The power of -points in preemptive single machine scheduling Andreas S. Schulz 1; 2; ; and Martin Skutella 1 Massachusetts Institute of

More information

Optimal and nearly optimal online and semi-online algorithms for some scheduling problems

Optimal and nearly optimal online and semi-online algorithms for some scheduling problems Optimal and nearly optimal online and semi-online algorithms for some scheduling problems Ph.D. thesis Made by: Dósa György Supervisor: Vízvári Béla University of Szeged, Faculty of Science Doctoral School

More information

JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004

JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004 Scientiae Mathematicae Japonicae Online, Vol. 10, (2004), 431 437 431 JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS Ondřej Čepeka and Shao Chin Sung b Received December May 12, 2003; revised February

More information

Duplicating and its Applications in Batch Scheduling

Duplicating and its Applications in Batch Scheduling Duplicating and its Applications in Batch Scheduling Yuzhong Zhang 1 Chunsong Bai 1 Shouyang Wang 2 1 College of Operations Research and Management Sciences Qufu Normal University, Shandong 276826, China

More information

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one

More information

Stiffie's On Line Scheduling Algorithm

Stiffie's On Line Scheduling Algorithm A class of on-line scheduling algorithms to minimize total completion time X. Lu R.A. Sitters L. Stougie Abstract We consider the problem of scheduling jobs on-line on a single machine and on identical

More information

Single machine parallel batch scheduling with unbounded capacity

Single machine parallel batch scheduling with unbounded capacity Workshop on Combinatorics and Graph Theory 21th, April, 2006 Nankai University Single machine parallel batch scheduling with unbounded capacity Yuan Jinjiang Department of mathematics, Zhengzhou University

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm. Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm. Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three

More information

List Scheduling in Order of α-points on a Single Machine

List Scheduling in Order of α-points on a Single Machine List Scheduling in Order of α-points on a Single Machine Martin Skutella Fachbereich Mathematik, Universität Dortmund, D 4422 Dortmund, Germany martin.skutella@uni-dortmund.de http://www.mathematik.uni-dortmund.de/

More information

Applied Algorithm Design Lecture 5

Applied Algorithm Design Lecture 5 Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design

More information

Algorithm Design and Analysis

Algorithm Design and Analysis Algorithm Design and Analysis LECTURE 27 Approximation Algorithms Load Balancing Weighted Vertex Cover Reminder: Fill out SRTEs online Don t forget to click submit Sofya Raskhodnikova 12/6/2011 S. Raskhodnikova;

More information

Scheduling Shop Scheduling. Tim Nieberg

Scheduling Shop Scheduling. Tim Nieberg Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations

More information

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,

More information

Batch Scheduling of Deteriorating Products

Batch Scheduling of Deteriorating Products Decision Making in Manufacturing and Services Vol. 1 2007 No. 1 2 pp. 25 34 Batch Scheduling of Deteriorating Products Maksim S. Barketau, T.C. Edwin Cheng, Mikhail Y. Kovalyov, C.T. Daniel Ng Abstract.

More information

The Goldberg Rao Algorithm for the Maximum Flow Problem

The Goldberg Rao Algorithm for the Maximum Flow Problem The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }

More information

Ronald Graham: Laying the Foundations of Online Optimization

Ronald Graham: Laying the Foundations of Online Optimization Documenta Math. 239 Ronald Graham: Laying the Foundations of Online Optimization Susanne Albers Abstract. This chapter highlights fundamental contributions made by Ron Graham in the area of online optimization.

More information

Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs

Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Stavros Athanassopoulos, Ioannis Caragiannis, and Christos Kaklamanis Research Academic Computer Technology Institute

More information

Linear Programming I

Linear Programming I Linear Programming I November 30, 2003 1 Introduction In the VCR/guns/nuclear bombs/napkins/star wars/professors/butter/mice problem, the benevolent dictator, Bigus Piguinus, of south Antarctica penguins

More information

Online Scheduling with Bounded Migration

Online Scheduling with Bounded Migration Online Scheduling with Bounded Migration Peter Sanders, Naveen Sivadasan, and Martin Skutella Max-Planck-Institut für Informatik, Saarbrücken, Germany, {sanders,ns,skutella}@mpi-sb.mpg.de Abstract. Consider

More information

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH 31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,

More information

Distributed Load Balancing for Machines Fully Heterogeneous

Distributed Load Balancing for Machines Fully Heterogeneous Internship Report 2 nd of June - 22 th of August 2014 Distributed Load Balancing for Machines Fully Heterogeneous Nathanaël Cheriere nathanael.cheriere@ens-rennes.fr ENS Rennes Academic Year 2013-2014

More information

Scheduling Real-time Tasks: Algorithms and Complexity

Scheduling Real-time Tasks: Algorithms and Complexity Scheduling Real-time Tasks: Algorithms and Complexity Sanjoy Baruah The University of North Carolina at Chapel Hill Email: baruah@cs.unc.edu Joël Goossens Université Libre de Bruxelles Email: joel.goossens@ulb.ac.be

More information

THE SCHEDULING OF MAINTENANCE SERVICE

THE SCHEDULING OF MAINTENANCE SERVICE THE SCHEDULING OF MAINTENANCE SERVICE Shoshana Anily Celia A. Glass Refael Hassin Abstract We study a discrete problem of scheduling activities of several types under the constraint that at most a single

More information

Fairness in Routing and Load Balancing

Fairness in Routing and Load Balancing Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria

More information

Best Monotone Degree Bounds for Various Graph Parameters

Best Monotone Degree Bounds for Various Graph Parameters Best Monotone Degree Bounds for Various Graph Parameters D. Bauer Department of Mathematical Sciences Stevens Institute of Technology Hoboken, NJ 07030 S. L. Hakimi Department of Electrical and Computer

More information

Introduction to Scheduling Theory

Introduction to Scheduling Theory Introduction to Scheduling Theory Arnaud Legrand Laboratoire Informatique et Distribution IMAG CNRS, France arnaud.legrand@imag.fr November 8, 2004 1/ 26 Outline 1 Task graphs from outer space 2 Scheduling

More information

arxiv:1112.0829v1 [math.pr] 5 Dec 2011

arxiv:1112.0829v1 [math.pr] 5 Dec 2011 How Not to Win a Million Dollars: A Counterexample to a Conjecture of L. Breiman Thomas P. Hayes arxiv:1112.0829v1 [math.pr] 5 Dec 2011 Abstract Consider a gambling game in which we are allowed to repeatedly

More information

Topic: Greedy Approximations: Set Cover and Min Makespan Date: 1/30/06

Topic: Greedy Approximations: Set Cover and Min Makespan Date: 1/30/06 CS880: Approximations Algorithms Scribe: Matt Elder Lecturer: Shuchi Chawla Topic: Greedy Approximations: Set Cover and Min Makespan Date: 1/30/06 3.1 Set Cover The Set Cover problem is: Given a set of

More information

Bi-objective approximation scheme for makespan and reliability optimization on uniform parallel machines

Bi-objective approximation scheme for makespan and reliability optimization on uniform parallel machines Bi-objective approximation scheme for makespan and reliability optimization on uniform parallel machines Emmanuel Jeannot 1, Erik Saule 2, and Denis Trystram 2 1 INRIA-Lorraine : emmanuel.jeannot@loria.fr

More information

8.1 Min Degree Spanning Tree

8.1 Min Degree Spanning Tree CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree

More information

Online and Offline Selling in Limit Order Markets

Online and Offline Selling in Limit Order Markets Online and Offline Selling in Limit Order Markets Kevin L. Chang 1 and Aaron Johnson 2 1 Yahoo Inc. klchang@yahoo-inc.com 2 Yale University ajohnson@cs.yale.edu Abstract. Completely automated electronic

More information

Adaptive Online Gradient Descent

Adaptive Online Gradient Descent Adaptive Online Gradient Descent Peter L Bartlett Division of Computer Science Department of Statistics UC Berkeley Berkeley, CA 94709 bartlett@csberkeleyedu Elad Hazan IBM Almaden Research Center 650

More information

Scheduling Single Machine Scheduling. Tim Nieberg

Scheduling Single Machine Scheduling. Tim Nieberg Scheduling Single Machine Scheduling Tim Nieberg Single machine models Observation: for non-preemptive problems and regular objectives, a sequence in which the jobs are processed is sufficient to describe

More information

Online Adwords Allocation

Online Adwords Allocation Online Adwords Allocation Shoshana Neuburger May 6, 2009 1 Overview Many search engines auction the advertising space alongside search results. When Google interviewed Amin Saberi in 2004, their advertisement

More information

Research Article Batch Scheduling on Two-Machine Flowshop with Machine-Dependent Setup Times

Research Article Batch Scheduling on Two-Machine Flowshop with Machine-Dependent Setup Times Hindawi Publishing Corporation Advances in Operations Research Volume 2009, Article ID 153910, 10 pages doi:10.1155/2009/153910 Research Article Batch Scheduling on Two-Machine Flowshop with Machine-Dependent

More information

A Near-linear Time Constant Factor Algorithm for Unsplittable Flow Problem on Line with Bag Constraints

A Near-linear Time Constant Factor Algorithm for Unsplittable Flow Problem on Line with Bag Constraints A Near-linear Time Constant Factor Algorithm for Unsplittable Flow Problem on Line with Bag Constraints Venkatesan T. Chakaravarthy, Anamitra R. Choudhury, and Yogish Sabharwal IBM Research - India, New

More information

Online Scheduling for Cloud Computing and Different Service Levels

Online Scheduling for Cloud Computing and Different Service Levels 2012 IEEE 201226th IEEE International 26th International Parallel Parallel and Distributed and Distributed Processing Processing Symposium Symposium Workshops Workshops & PhD Forum Online Scheduling for

More information

An Eective Load Balancing Policy for

An Eective Load Balancing Policy for An Eective Load Balancing Policy for Geometric Decaying Algorithms Joseph Gil y Dept. of Computer Science The Technion, Israel Technion City, Haifa 32000 ISRAEL Yossi Matias z AT&T Bell Laboratories 600

More information

On the approximability of average completion time scheduling under precedence constraints

On the approximability of average completion time scheduling under precedence constraints On the approximability of average completion time scheduling under precedence constraints Gerhard J. Woeginger Abstract We consider the scheduling problem of minimizing the average weighted job completion

More information

Ph.D. Thesis. Judit Nagy-György. Supervisor: Péter Hajnal Associate Professor

Ph.D. Thesis. Judit Nagy-György. Supervisor: Péter Hajnal Associate Professor Online algorithms for combinatorial problems Ph.D. Thesis by Judit Nagy-György Supervisor: Péter Hajnal Associate Professor Doctoral School in Mathematics and Computer Science University of Szeged Bolyai

More information

Classification - Examples

Classification - Examples Lecture 2 Scheduling 1 Classification - Examples 1 r j C max given: n jobs with processing times p 1,...,p n and release dates r 1,...,r n jobs have to be scheduled without preemption on one machine taking

More information

11. APPROXIMATION ALGORITHMS

11. APPROXIMATION ALGORITHMS 11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: vertex cover LP rounding: vertex cover generalized load balancing knapsack problem Lecture slides by Kevin Wayne Copyright 2005

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

More information

A constant-factor approximation algorithm for the k-median problem

A constant-factor approximation algorithm for the k-median problem A constant-factor approximation algorithm for the k-median problem Moses Charikar Sudipto Guha Éva Tardos David B. Shmoys July 23, 2002 Abstract We present the first constant-factor approximation algorithm

More information

MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research

MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research MapReduce and Distributed Data Analysis Google Research 1 Dealing With Massive Data 2 2 Dealing With Massive Data Polynomial Memory Sublinear RAM Sketches External Memory Property Testing 3 3 Dealing With

More information

Dimensioning an inbound call center using constraint programming

Dimensioning an inbound call center using constraint programming Dimensioning an inbound call center using constraint programming Cyril Canon 1,2, Jean-Charles Billaut 2, and Jean-Louis Bouquard 2 1 Vitalicom, 643 avenue du grain d or, 41350 Vineuil, France ccanon@fr.snt.com

More information

Definition 11.1. Given a graph G on n vertices, we define the following quantities:

Definition 11.1. Given a graph G on n vertices, we define the following quantities: Lecture 11 The Lovász ϑ Function 11.1 Perfect graphs We begin with some background on perfect graphs. graphs. First, we define some quantities on Definition 11.1. Given a graph G on n vertices, we define

More information

Nan Kong, Andrew J. Schaefer. Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA

Nan Kong, Andrew J. Schaefer. Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA A Factor 1 2 Approximation Algorithm for Two-Stage Stochastic Matching Problems Nan Kong, Andrew J. Schaefer Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA Abstract We introduce

More information

ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN. Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015

ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN. Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015 ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015 ONLINE STEINER FOREST PROBLEM An initially given graph G. s 1 s 2 A sequence of demands (s i, t i ) arriving

More information

A simpler and better derandomization of an approximation algorithm for Single Source Rent-or-Buy

A simpler and better derandomization of an approximation algorithm for Single Source Rent-or-Buy A simpler and better derandomization of an approximation algorithm for Single Source Rent-or-Buy David P. Williamson Anke van Zuylen School of Operations Research and Industrial Engineering, Cornell University,

More information

Partitioned real-time scheduling on heterogeneous shared-memory multiprocessors

Partitioned real-time scheduling on heterogeneous shared-memory multiprocessors Partitioned real-time scheduling on heterogeneous shared-memory multiprocessors Martin Niemeier École Polytechnique Fédérale de Lausanne Discrete Optimization Group Lausanne, Switzerland martin.niemeier@epfl.ch

More information

All trees contain a large induced subgraph having all degrees 1 (mod k)

All trees contain a large induced subgraph having all degrees 1 (mod k) All trees contain a large induced subgraph having all degrees 1 (mod k) David M. Berman, A.J. Radcliffe, A.D. Scott, Hong Wang, and Larry Wargo *Department of Mathematics University of New Orleans New

More information

Cost Model: Work, Span and Parallelism. 1 The RAM model for sequential computation:

Cost Model: Work, Span and Parallelism. 1 The RAM model for sequential computation: CSE341T 08/31/2015 Lecture 3 Cost Model: Work, Span and Parallelism In this lecture, we will look at how one analyze a parallel program written using Cilk Plus. When we analyze the cost of an algorithm

More information

Combinatorial PCPs with ecient veriers

Combinatorial PCPs with ecient veriers Combinatorial PCPs with ecient veriers Or Meir Abstract The PCP theorem asserts the existence of proofs that can be veried by a verier that reads only a very small part of the proof. The theorem was originally

More information

1 Solving LPs: The Simplex Algorithm of George Dantzig

1 Solving LPs: The Simplex Algorithm of George Dantzig Solving LPs: The Simplex Algorithm of George Dantzig. Simplex Pivoting: Dictionary Format We illustrate a general solution procedure, called the simplex algorithm, by implementing it on a very simple example.

More information

On the k-path cover problem for cacti

On the k-path cover problem for cacti On the k-path cover problem for cacti Zemin Jin and Xueliang Li Center for Combinatorics and LPMC Nankai University Tianjin 300071, P.R. China zeminjin@eyou.com, x.li@eyou.com Abstract In this paper we

More information

CS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010

CS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010 CS 598CSC: Combinatorial Optimization Lecture date: /4/010 Instructor: Chandra Chekuri Scribe: David Morrison Gomory-Hu Trees (The work in this section closely follows [3]) Let G = (V, E) be an undirected

More information

The Relative Worst Order Ratio for On-Line Algorithms

The Relative Worst Order Ratio for On-Line Algorithms The Relative Worst Order Ratio for On-Line Algorithms Joan Boyar 1 and Lene M. Favrholdt 2 1 Department of Mathematics and Computer Science, University of Southern Denmark, Odense, Denmark, joan@imada.sdu.dk

More information

CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma

CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are

More information

2.3 Convex Constrained Optimization Problems

2.3 Convex Constrained Optimization Problems 42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions

More information

Lecture 3: Finding integer solutions to systems of linear equations

Lecture 3: Finding integer solutions to systems of linear equations Lecture 3: Finding integer solutions to systems of linear equations Algorithmic Number Theory (Fall 2014) Rutgers University Swastik Kopparty Scribe: Abhishek Bhrushundi 1 Overview The goal of this lecture

More information

Large induced subgraphs with all degrees odd

Large induced subgraphs with all degrees odd Large induced subgraphs with all degrees odd A.D. Scott Department of Pure Mathematics and Mathematical Statistics, University of Cambridge, England Abstract: We prove that every connected graph of order

More information

A binary search algorithm for a special case of minimizing the lateness on a single machine

A binary search algorithm for a special case of minimizing the lateness on a single machine Issue 3, Volume 3, 2009 45 A binary search algorithm for a special case of minimizing the lateness on a single machine Nodari Vakhania Abstract We study the problem of scheduling jobs with release times

More information

Load balancing of temporary tasks in the l p norm

Load balancing of temporary tasks in the l p norm Load balancing of temporary tasks in the l p norm Yossi Azar a,1, Amir Epstein a,2, Leah Epstein b,3 a School of Computer Science, Tel Aviv University, Tel Aviv, Israel. b School of Computer Science, The

More information

Data Management in Hierarchical Bus Networks

Data Management in Hierarchical Bus Networks Data Management in Hierarchical Bus Networks F. Meyer auf der Heide Department of Mathematics and Computer Science and Heinz Nixdorf Institute, Paderborn University, Germany fmadh@upb.de H. Räcke Department

More information

Competitive Analysis of On line Randomized Call Control in Cellular Networks

Competitive Analysis of On line Randomized Call Control in Cellular Networks Competitive Analysis of On line Randomized Call Control in Cellular Networks Ioannis Caragiannis Christos Kaklamanis Evi Papaioannou Abstract In this paper we address an important communication issue arising

More information

Mathematical finance and linear programming (optimization)

Mathematical finance and linear programming (optimization) Mathematical finance and linear programming (optimization) Geir Dahl September 15, 2009 1 Introduction The purpose of this short note is to explain how linear programming (LP) (=linear optimization) may

More information

Integrating job parallelism in real-time scheduling theory

Integrating job parallelism in real-time scheduling theory Integrating job parallelism in real-time scheduling theory Sébastien Collette Liliana Cucu Joël Goossens Abstract We investigate the global scheduling of sporadic, implicit deadline, real-time task systems

More information

PRIME FACTORS OF CONSECUTIVE INTEGERS

PRIME FACTORS OF CONSECUTIVE INTEGERS PRIME FACTORS OF CONSECUTIVE INTEGERS MARK BAUER AND MICHAEL A. BENNETT Abstract. This note contains a new algorithm for computing a function f(k) introduced by Erdős to measure the minimal gap size in

More information

Scheduling to Minimize Power Consumption using Submodular Functions

Scheduling to Minimize Power Consumption using Submodular Functions Scheduling to Minimize Power Consumption using Submodular Functions Erik D. Demaine MIT edemaine@mit.edu Morteza Zadimoghaddam MIT morteza@mit.edu ABSTRACT We develop logarithmic approximation algorithms

More information

One-Restart Algorithm for Scheduling and Offloading in a Hybrid Cloud

One-Restart Algorithm for Scheduling and Offloading in a Hybrid Cloud One-Restart Algorithm for Scheduling and Offloading in a Hybrid Cloud Jaya Prakash Champati and Ben Liang Department of Electrical and Computer Engineering, University of Toronto {champati,liang}@comm.utoronto.ca

More information

Triangle deletion. Ernie Croot. February 3, 2010

Triangle deletion. Ernie Croot. February 3, 2010 Triangle deletion Ernie Croot February 3, 2010 1 Introduction The purpose of this note is to give an intuitive outline of the triangle deletion theorem of Ruzsa and Szemerédi, which says that if G = (V,

More information

Minimal Cost Reconfiguration of Data Placement in a Storage Area Network

Minimal Cost Reconfiguration of Data Placement in a Storage Area Network Minimal Cost Reconfiguration of Data Placement in a Storage Area Network Hadas Shachnai Gal Tamir Tami Tamir Abstract Video-on-Demand (VoD) services require frequent updates in file configuration on the

More information

ARTICLE IN PRESS. European Journal of Operational Research xxx (2004) xxx xxx. Discrete Optimization. Nan Kong, Andrew J.

ARTICLE IN PRESS. European Journal of Operational Research xxx (2004) xxx xxx. Discrete Optimization. Nan Kong, Andrew J. A factor 1 European Journal of Operational Research xxx (00) xxx xxx Discrete Optimization approximation algorithm for two-stage stochastic matching problems Nan Kong, Andrew J. Schaefer * Department of

More information

Topology-based network security

Topology-based network security Topology-based network security Tiit Pikma Supervised by Vitaly Skachek Research Seminar in Cryptography University of Tartu, Spring 2013 1 Introduction In both wired and wireless networks, there is the

More information

Permutation Betting Markets: Singleton Betting with Extra Information

Permutation Betting Markets: Singleton Betting with Extra Information Permutation Betting Markets: Singleton Betting with Extra Information Mohammad Ghodsi Sharif University of Technology ghodsi@sharif.edu Hamid Mahini Sharif University of Technology mahini@ce.sharif.edu

More information

No: 10 04. Bilkent University. Monotonic Extension. Farhad Husseinov. Discussion Papers. Department of Economics

No: 10 04. Bilkent University. Monotonic Extension. Farhad Husseinov. Discussion Papers. Department of Economics No: 10 04 Bilkent University Monotonic Extension Farhad Husseinov Discussion Papers Department of Economics The Discussion Papers of the Department of Economics are intended to make the initial results

More information

Distributed Computing over Communication Networks: Maximal Independent Set

Distributed Computing over Communication Networks: Maximal Independent Set Distributed Computing over Communication Networks: Maximal Independent Set What is a MIS? MIS An independent set (IS) of an undirected graph is a subset U of nodes such that no two nodes in U are adjacent.

More information

Determination of the normalization level of database schemas through equivalence classes of attributes

Determination of the normalization level of database schemas through equivalence classes of attributes Computer Science Journal of Moldova, vol.17, no.2(50), 2009 Determination of the normalization level of database schemas through equivalence classes of attributes Cotelea Vitalie Abstract In this paper,

More information

2.1 Complexity Classes

2.1 Complexity Classes 15-859(M): Randomized Algorithms Lecturer: Shuchi Chawla Topic: Complexity classes, Identity checking Date: September 15, 2004 Scribe: Andrew Gilpin 2.1 Complexity Classes In this lecture we will look

More information

Every tree contains a large induced subgraph with all degrees odd

Every tree contains a large induced subgraph with all degrees odd Every tree contains a large induced subgraph with all degrees odd A.J. Radcliffe Carnegie Mellon University, Pittsburgh, PA A.D. Scott Department of Pure Mathematics and Mathematical Statistics University

More information

Improved Results for Data Migration and Open Shop Scheduling

Improved Results for Data Migration and Open Shop Scheduling Improved Results for Data Migration and Open Shop Scheduling Rajiv Gandhi 1, Magnús M. Halldórsson, Guy Kortsarz 1, and Hadas Shachnai 3 1 Department of Computer Science, Rutgers University, Camden, NJ

More information

Approximability of Two-Machine No-Wait Flowshop Scheduling with Availability Constraints

Approximability of Two-Machine No-Wait Flowshop Scheduling with Availability Constraints Approximability of Two-Machine No-Wait Flowshop Scheduling with Availability Constraints T.C. Edwin Cheng 1, and Zhaohui Liu 1,2 1 Department of Management, The Hong Kong Polytechnic University Kowloon,

More information

Portable Bushy Processing Trees for Join Queries

Portable Bushy Processing Trees for Join Queries Reihe Informatik 11 / 1996 Constructing Optimal Bushy Processing Trees for Join Queries is NP-hard Wolfgang Scheufele Guido Moerkotte 1 Constructing Optimal Bushy Processing Trees for Join Queries is NP-hard

More information

Finding and counting given length cycles

Finding and counting given length cycles Finding and counting given length cycles Noga Alon Raphael Yuster Uri Zwick Abstract We present an assortment of methods for finding and counting simple cycles of a given length in directed and undirected

More information

Commonly Used Approaches to Real-Time Scheduling

Commonly Used Approaches to Real-Time Scheduling Integre Technical Publishing Co., Inc. Liu January 13, 2000 8:46 a.m. chap4 page 60 C H A P T E R 4 Commonly Used Approaches to Real-Time Scheduling This chapter provides a brief overview of three commonly

More information

Minimizing the Number of Machines in a Unit-Time Scheduling Problem

Minimizing the Number of Machines in a Unit-Time Scheduling Problem Minimizing the Number of Machines in a Unit-Time Scheduling Problem Svetlana A. Kravchenko 1 United Institute of Informatics Problems, Surganova St. 6, 220012 Minsk, Belarus kravch@newman.bas-net.by Frank

More information

The positive minimum degree game on sparse graphs

The positive minimum degree game on sparse graphs The positive minimum degree game on sparse graphs József Balogh Department of Mathematical Sciences University of Illinois, USA jobal@math.uiuc.edu András Pluhár Department of Computer Science University

More information

Stochastic Inventory Control

Stochastic Inventory Control Chapter 3 Stochastic Inventory Control 1 In this chapter, we consider in much greater details certain dynamic inventory control problems of the type already encountered in section 1.3. In addition to the

More information

14.1 Rent-or-buy problem

14.1 Rent-or-buy problem CS787: Advanced Algorithms Lecture 14: Online algorithms We now shift focus to a different kind of algorithmic problem where we need to perform some optimization without knowing the input in advance. Algorithms

More information

How To Find An Optimal Search Protocol For An Oblivious Cell

How To Find An Optimal Search Protocol For An Oblivious Cell The Conference Call Search Problem in Wireless Networks Leah Epstein 1, and Asaf Levin 2 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. lea@math.haifa.ac.il 2 Department of Statistics,

More information

Stationary random graphs on Z with prescribed iid degrees and finite mean connections

Stationary random graphs on Z with prescribed iid degrees and finite mean connections Stationary random graphs on Z with prescribed iid degrees and finite mean connections Maria Deijfen Johan Jonasson February 2006 Abstract Let F be a probability distribution with support on the non-negative

More information

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013 FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 3, JUNE 2011 709

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 3, JUNE 2011 709 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 19, NO 3, JUNE 2011 709 Improved Bounds on the Throughput Efficiency of Greedy Maximal Scheduling in Wireless Networks Mathieu Leconte, Jian Ni, Member, IEEE, R

More information

Dynamic TCP Acknowledgement: Penalizing Long Delays

Dynamic TCP Acknowledgement: Penalizing Long Delays Dynamic TCP Acknowledgement: Penalizing Long Delays Karousatou Christina Network Algorithms June 8, 2010 Karousatou Christina (Network Algorithms) Dynamic TCP Acknowledgement June 8, 2010 1 / 63 Layout

More information