We present an efficient algorithm for the min-max correlation clustering problem. The input is a complete graph where edges are labeled as either positive (+) or negative (−), and the objective is to find a clustering...
详细信息
Firms’ algorithm development practices are often homogeneous. Whether firms train algorithms on similar data, aim at similar benchmarks, or rely on similar pre-trained models, the result is correlated predictions. We...
详细信息
Computing shortest paths is one of the most fundamental algorithmic graph problems. It is known since decades that this problem can be solved in near-linear time if all weights are nonnegative. A recent break-through ...
详细信息
An extension to triangular domains of the univariate q-Bernstein basis functions is introduced and analyzed. Some recurrence relations and properties such as partition of unity and degree elevation are proved for them...
详细信息
We study efficient algorithms for the Euclidean k-Center problem, focusing on the regime of large k. We take the approach of data reduction by considering α-coreset, which is a small subset S of the dataset P such th...
详细信息
High Performance Computing (HPC) plays a critical role in supporting the computationally intensive tasks of blockchain technologies, such as consensus algorithms, data processing, and validation. However, the growing ...
详细信息
ISBN:
(数字)9798331531935
ISBN:
(纸本)9798331531942
High Performance Computing (HPC) plays a critical role in supporting the computationally intensive tasks of blockchain technologies, such as consensus algorithms, data processing, and validation. However, the growing adoption of blockchain has raised concerns regarding the substantial energy consumption and carbon footprint associated with HPC systems. This paper investigates the energy efficiency and environmental impact of HPC in blockchain applications, with a focus on hardware and associated hashing algorithms for mining. We analyze power consumption and carbon emissions from computational devices such as Central Processing Units (CPUs), Graphics Processing Units (GPUs), Field-Programmable Gate Arrays (FPGAs), and Application-Specific Integrated Circuits (ASICs), particularly in cryptocurrency mining and decentralized applications. Additionally, we assess the environmental implications of different consensus algorithms, providing a comprehensive understanding of their energy demands and carbon emissions. Our findings offer valuable insights into blockchain sustainability, encouraging the adoption of more energy-efficient and environmentally conscious practices in the industry.
We initiate the study of deterministic distributed graph algorithms with predictions in synchronous message passing systems. The process at each node in the graph is given a prediction, which is some extra information...
详细信息
In the classical NP-hard (metric) k-median problem, we are given a set of n clients and centers with metric distances between them, along with an integer parameter k ≥ 1. The objective is to select a subset of k open...
详细信息
In the classical NP-hard (metric) k-median problem, we are given a set of n clients and centers with metric distances between them, along with an integer parameter k ≥ 1. The objective is to select a subset of k open centers that minimizes the total distance from each client to its closest open center. In their seminal work, Jain, Mahdian, Markakis, Saberi, and Vazirani presented the Greedy algorithm for facility location, which implies a 2-approximation algorithm for k-median that opens k centers in expectation. Since then, substantial research has aimed at narrowing the gap between their algorithm and the best achievable approximation by an algorithm guaranteed to open exactly k centers, as required in the k-median problem. During the last decade, all improvements have been achieved by leveraging their algorithm (or a small improvement thereof), followed by a second step called bi-point rounding, which inherently adds an additional factor to the approximation guarantee. Our main result closes this gap: for any Ε > 0, we present a (2 + Ε)-approximation algorithm for the k-median problem, improving the previous best-known approximation factor of 2.613. Our approach builds on a combination of two key algorithms. First, we present a non-trivial modification of the Greedy algorithm that operates with only O(log n/Ε2) adaptive phases. Through a novel walk-between-solutions approach, this enables us to construct a (2 + Ε)-approximation algorithm for k-median that consistently opens at most k + O(log n/Ε2) centers: via known results, this already implies a (2 + Ε)-approximation algorithm that runs in quasi-polynomial time. Second, we develop a novel (2 + Ε)-approximation algorithm tailored for stable instances, where removing any center from an optimal solution increases the cost by at least an Ω(Ε3/ log n) fraction. Achieving this involves several ideas, including a sampling approach inspired by the k-means++ algorithm and a reduction to submodular optimization subject t
In the Subset Feedback Arc Set in Tournaments (Subset-FAST) problem we are given as input a tournament T with a vertex set V (T) and an arc set A(T), along with a terminal set S ⊆ V (T), and an integer k. The objectiv...
详细信息
To reduce the frequency of data exchange in power grid, a novel self-triggered consensus-based optimization algorithm for economic dispatch problem (EDP) is proposed for switching topologies, which guarantees that the...
详细信息
To reduce the frequency of data exchange in power grid, a novel self-triggered consensus-based optimization algorithm for economic dispatch problem (EDP) is proposed for switching topologies, which guarantees that the increment cost converges to an optimal consensus value after iterations. In this brief, sampled-data framework is employed to complete the implementation of algorithm digitally. Based on that, self-triggered mechanism based approach can also avoid infinite number of communication in finite time, which can save communication cost between generators. Further, a time-varying gain function is designed to derive a tradeoff between convergence rate and triggering performance. Finally, some simulation examples are given to illustrate the effectiveness of the relevant theoretical results. (C) 2020 Elsevier Inc. All rights reserved.
暂无评论