We design practical implementations of data structures for compressing bit-vectors to support efficient rank-queries (counting the number of ones up to a given point). Unlike previous approaches, which either store th...
详细信息
We design practical implementations of data structures for compressing bit-vectors to support efficient rank-queries (counting the number of ones up to a given point). Unlike previous approaches, which either store the bit vectors plainly, or focus on compressing bit-vectors with low densities of ones or zeros, we aim at low entropies of higher order, for example 101010 . . . 10. Our implementations achieve very good compression ratios, while showing only a modest increase in query time.
algorithms synthesis is a new approach in the field of design and analysis of algorithms. Darlington (1978) presented a tree structure starting from a high level definition (by defining permutation function) as root-...
详细信息
algorithms synthesis is a new approach in the field of design and analysis of algorithms. Darlington (1978) presented a tree structure starting from a high level definition (by defining permutation function) as root-node and finally obtaining 6 terminal-nodes corresponding to each sorting algorithm he discussed. The algorithms-synthesis approach starts from a high level definition and ultimately results in the required algorithms. An attempt is made to synthesize some scheduling algorithms starting, as Darlington did, from a high level definition, and using program transformation techniques. Three scheduling algorithms are taken into the synthesis: 1. First-Come-First-Serve, 2. Round-Robin, and 3. Selfish-Round-Robin. The rules applied are mainly the unfolding-and-folding technique as examined by Burstall and Darlington (1977).
Given a complete graph G = (V,E), with nonnegative edge costs, two subsets R subset of V and R'subset of R, a partition R = {R-1,R-2, ... ,R-k} of R, R-i boolean AND R-j = phi, i not equal j and Script capital R...
详细信息
Given a complete graph G = (V,E), with nonnegative edge costs, two subsets R subset of V and R'subset of R, a partition R = {R-1,R-2, ... ,R-k} of R, R-i boolean AND R-j = phi, i not equal j and Script capital R' = {R-1',R-2', ...,R-k'} of R', R-i'subset of R-i, a clustered Steiner tree is a tree T of G that spans all vertices in R such that T can be cut into k subtrees T-i by removing k - 1 edges and each subtree T-i spans all vertices in R-i, 1 <= i <= k. The cost of a clustered Steiner tree is defined to be the sum of the costs of all its edges. A clustered selected-internal Steiner tree of G is a clustered Steiner tree for R if all vertices in R-i' are internal vertices of T-i. The clustered selected-internal Steiner tree problem is concerned with the determination of a clustered selected-internal Steiner tree T for R and R' in G with minimum cost. In this paper, we present the first known approximation algorithm with performance ratio (rho + 4) for the clustered selected-internal Steiner tree problem, where rho is the best-known performance ratio for the Steiner tree problem.
Effective and efficient scheduling in a dynamically changing environment is important for real-time control of manufacturing, computer, and telecommunication systems. This paper illustrates the algorithmic and analyti...
详细信息
Effective and efficient scheduling in a dynamically changing environment is important for real-time control of manufacturing, computer, and telecommunication systems. This paper illustrates the algorithmic and analytical issues associated with developing efficient and effective methods to update schedules on-line. We consider the problem of dynamically scheduling precedence-constrained jobs on a single processor to minimize the maximum completion time penalty. We first develop an efficient technique to reoptimize a rolling schedule when new jobs arrive. The effectiveness of reoptimizing the current schedule as a long-term on-line strategy is measured by bounding its performance relative to oracles that have perfect information about future job arrivals.
Let G be a graph with n vertices and m edges. The problem of constructing a spanning tree is to find a connected subgraph of G with n vertices and n - 1 edges. In this paper, we propose an O(log n) time parallel algor...
详细信息
Let G be a graph with n vertices and m edges. The problem of constructing a spanning tree is to find a connected subgraph of G with n vertices and n - 1 edges. In this paper, we propose an O(log n) time parallel algorithm with O(n/log n) processors on an EREW PRAM for constructing a spanning tree on trapezoid graphs.
We study two related problems motivated by molecular biology. Given a graph G and a constant k, does there exist a supergraph G' of G that is a unit interval graph and has clique size at most k? Given a graph G an...
详细信息
We study two related problems motivated by molecular biology. Given a graph G and a constant k, does there exist a supergraph G' of G that is a unit interval graph and has clique size at most k? Given a graph G and a proper k-coloring c of G, does there exist a supergraph G' of G that is properly colored by c and is a unit interval graph? We show that those problems are polynomial for fixed k. On the other hand, we prove that the first problem is equivalent to deciding if the bandwidth of G is at most k - 1. Hence, it is NP-hard and W[t]-hard for all t. We also show that the second problem is W[1]-hard. This implies that for fixed k, both of the problems are unlikely to have an O(n(alpha)) algorithm, where alpha is a constant independent of k. A central tool in our study is a new graph-theoretic parameter closely related to pathwidth. An unexpected useful consequence is the equivalence of this parameter to the bandwidth of the graph.
In this paper, we introduce new geometric ad-hoc routing algorithms to route queries in static sensor networks. For singlesource-queries routing, we utilise a centralised mechanism to accomplish a query using an asymp...
详细信息
In this paper, we introduce new geometric ad-hoc routing algorithms to route queries in static sensor networks. For singlesource-queries routing, we utilise a centralised mechanism to accomplish a query using an asymptotically optimal number of transmissions O(c), where c is the length of the shortest path between the source and the destination. For multiple-source-queries routing, the number of transmissions for each query is bounded by O(c log n), where n is the number of nodes in the network. For both single-source and multiple-source queries, the routing stage is preceded by preprocessing stages requiring O(nD) and O(n(2)D) transmissions, respectively, where D is the diameter of the network. Our algorithm improves the complexity of the currently best known algorithms in terms of the number of transmissions for each query. The preprocessing is worthwhile if it is followed by frequent queries. We could also imagine that there is an extra initial power (say, batteries) available during the preprocessing stage or alternatively the positions of the sensors are known in advance and the preprocessing can be done before the sensors are deployed in the field. It is also worth mentioning that a lower bound of Omega(c(2)) transmissions has been proved if preprocessing is not allowed [***, ***, ***, Asymptotically optimal geometric mobile ad-hoc routing, in: Proceedings of the Sixth International Workshop on Discrete Algorithm and Methods for Mobility, Atlanta, GA, September 2002, pp. 24-33]. (C) 2006 Elsevier B.V. All rights reserved.
A complete characterization of the class of graphs that admit a cylindric visibility representation is presented, where vertices are represented by intervals parallel to the axis of the cylinder and the edges correspo...
详细信息
A complete characterization of the class of graphs that admit a cylindric visibility representation is presented, where vertices are represented by intervals parallel to the axis of the cylinder and the edges correspond to pairs of visible intervals. Moreover, linear time algorithms are given for testing the existence of and constructing such a representation. Important applications of cylindric visibility representations can be found in the layout of regular VLSI circuits, such as linear systolic arrays and bit-slice architectures. Also, alternative "dual" characterizations are presented of the graphs that admit visibility representations in the plane and in the cylinder. It is interesting to observe that neither of these two classes is contained in the other, although they have a nonempty intersection.
One of the main challenges in algorithmic mechanism design is to turn (existing) efficient algorithmic Solutions into efficient truthful mechanisms. Building a truthful mechanism is indeed a difficult process since th...
详细信息
ISBN:
(纸本)3540681388
One of the main challenges in algorithmic mechanism design is to turn (existing) efficient algorithmic Solutions into efficient truthful mechanisms. Building a truthful mechanism is indeed a difficult process since the underlying algorithm must obey certain "monotonicity" properties and suitable payment functions need to be computed (this task usually represents the bottleneck in the overall time complexity). We provide a general technique for building truthful mechanisms that provide optimal solutions in strongly polynomial time. We show that the entire mechanism can be obtained if one is able to express/write a strongly polynomial-time algorithm (for the corresponding optimization problem) as a "suitable combination" of simpler algorithms. This approach applies to a wide class of mechanism design graph problems, where each selfish agent corresponds to a weighted edge in a graph (the weight of the edge is the cost of using that edge). Our technique can be applied to several optimization problems which prior results cannot handle (e.g., MIN-MAX optimization problems). As an application, we design the first (strongly polynomial-time) truthful mechanism for the minimum diameter spanning tree problem, by obtaining it directly from an existing algorithm for solving this problem. For this non-utilitarian MIN-MAX problem, no truthful mechanism was known, even considering those running in exponential time (indeed, exact algorithms do not necessarily yield truthful mechanisms). Also, standard techniques for payment computations may result in a running time which is not polynomial in the size of the input graph. The overall running time of our mechanism, instead, is polynomial in the number n of nodes and in of edges, and it is only a factor O(n alpha(n, n)) away from the best known canonical centralized algorithm. (C) 2009 Elsevier B.V. All rights reserved.
Repetitive substructures in two-dimensional arrays emerge in speeding up searches and have been recently studied also independently in an attempt to parallel some of the classical derivations concerning repetitions in...
详细信息
Repetitive substructures in two-dimensional arrays emerge in speeding up searches and have been recently studied also independently in an attempt to parallel some of the classical derivations concerning repetitions in strings. The present paper focuses on repetitions in two dimensions that manifest themselves in form of two "tandem" occurrences of a same primitive rectangular pattern W where the two replicas touch each other with either one side or corner. Being primitive here means that W cannot be expressed in turn by repeated tiling of another array. The main result of the paper is an O(n(3) log n) algorithm for detecting all "side-sharing" repetitions in an n x n array. This is optimal, based on bounds on the number of such repetitions established in previous work. With easy adaptations, these constructions lead to an equally optimal, O(n(4)) algorithm for repetitions of the second type. (c) 2005 Elsevier B.V. All rights reserved.
暂无评论