The Optical Transpose Interconnection System (OTIS) is a recently proposed model of computing that exploits the special features of both electronic and optical technologies. in this paper we present efficient algorith...
详细信息
The Optical Transpose Interconnection System (OTIS) is a recently proposed model of computing that exploits the special features of both electronic and optical technologies. in this paper we present efficient algorithms for packet routing, sorting, and selection on the OTIS-Mesh. The diameter of an N-2-processor OTIS-Mesh is 4 root N - 3. We present an algorithm for routing any partial permutation in 4 root N + o(root N) time. Our selection algorithm runs in time 6 root N + o(root N) and our sorting algorithm runs in 8 root N + o(root N) time. All these algorithms are randomized and the stated time bounds hold with high probability. Also, the queue size needed for these algorithms is O(1) with high probability.
A naming protocol assigns unique names (keys) to every process out of a set of communicating processes. We construct a randomized wait-free naming protocol using wait-free atomic read/write registers (shared variables...
详细信息
A naming protocol assigns unique names (keys) to every process out of a set of communicating processes. We construct a randomized wait-free naming protocol using wait-free atomic read/write registers (shared variables) as process intercommunication primitives. Each process has its own private register and can read all others. The addresses/names each one uses for the others are possibly different: Processes p and q address the register of process r in a way not known to each other. For n processes and is an element of > 0, the protocol uses a name space of size (1 + is an element of)n and O(n log n log log n) running time (read/writes to shared bits) with probability at least 1-o(1), and O(n log(2) n) overall expected running time. The protocol is based on the wait-free implementation of a novel alpha-Test&SetOnce object that randomly and fast selects a winner from a set of q contenders with probability at least alpha in the face of the strongest possible adaptive adversary.
Two new heuristics are presented for inferring a small size Boolean function from complete and incomplete examples in polynomial time. These examples are vectors defined in {1, 0}(n) for the complete case, or in {1,0,...
详细信息
Two new heuristics are presented for inferring a small size Boolean function from complete and incomplete examples in polynomial time. These examples are vectors defined in {1, 0}(n) for the complete case, or in {1,0, *}(n) for the incomplete case (where n is the number of binary attributes or atoms and "*" indicates unknown value). Each example is either positive or negative, if it must be accepted or rejected by the target function, respectively. For the incomplete case, however, some examples may be unclassifiable. Moreover, computational results indicate that the proposed heuristics may also be effective in solving very large problems with thousands of examples.
We study on-line scheduling in overloaded systems. Requests for jobs arrive one by one as time proceeds;the serving agents have limited capacity and not all requests can be served. Still, we want to serve the "be...
详细信息
We study on-line scheduling in overloaded systems. Requests for jobs arrive one by one as time proceeds;the serving agents have limited capacity and not all requests can be served. Still, we want to serve the "best" set of requests according to some criterion. In this situation, the ability to preempt (i.e., abort) jobs in service in order to make room for better jobs that would otherwise be rejected has proven to be of great help in some scenarios. We show that, surprisingly, in many other scenarios this is not the case. In a simple, generic model, we prove a polylogarithmic lower bound on the competitiveness of randomized and preemptive on-line scheduling algorithms. Our bound applies to several recently studied problems. In fact, in certain scenarios our bound is quite close to the competitiveness achieved by known deterministic, nonpreemptive algorithms.
The need for solving multivariate optimization problems is pervasive in engineering and the physical and social sciences. The simultaneous perturbation stochastic approximation (SPSA) algorithm has recently attracted ...
详细信息
The need for solving multivariate optimization problems is pervasive in engineering and the physical and social sciences. The simultaneous perturbation stochastic approximation (SPSA) algorithm has recently attracted considerable attention for challenging optimization problems where it is difficult or impossible to directly obtain a gradient of the objective function with respect to the parameters being optimized. SPSA is based on an easily implemented and highly efficient gradient approximation that relies on measurements of the objective function, not on measurements of the gradient of the objective function. The gradient approximation is based on only two function measurements (regardless of the dimension of the gradient vector). This contrasts with standard finite-difference approaches, which require a number of function measurements proportional to the dimension of the gradient vector. This paper presents a simple step-by-step guide to implementation of SPSA in generic optimization problems and offers some practical suggestions for choosing certain algorithm coefficients.
The focal point of this paper is a control system subjected to parametric uncertainty. Motivated by the newly emerging theory of probabilistic robustness, the risk of performance violation is assessed with uncertainty...
详细信息
The focal point of this paper is a control system subjected to parametric uncertainty. Motivated by the newly emerging theory of probabilistic robustness, the risk of performance violation is assessed with uncertainty bounds which exceed classical deterministic margins. For a wide class of problems, the Uniformity Principle (UP) developed by Barmish and Lagoa (Math. Control Signals Systems 10 (1997) 203-222), makes it possible to estimate the probability of performance satisfaction with almost no a priori statistical information about the uncertainty. The application of the UP is, however, limited to problems satisfying certain convexity and symmetricity conditions. Since such conditions are violated in many practical problems, the objective in this paper is to extend the application of the UP. To this end, by working with a so-called unirectangularity condition, a procedure is implemented for computing probabilities of performance and the associated improvements of deterministic robustness margins. That is, given any robustness radius ro which is computable via deterministic methods, a probabilistic enhancement of this margin R(0)(epsilon)greater than or equal to r(0) with pre-specified level of risk epsilon>0 is provided. The radius R(0)(epsilon) is called a risk-adjusted robustness margin. (C) 1998 Published by Elsevier Science B.V. All rights reserved.
作者:
Agarwal, PKSharir, MDuke Univ
Dept Comp Sci Ctr Geometr Comp Durham NC 27708 USA Tel Aviv Univ
Sch Math Sci IL-69978 Tel Aviv Israel NYU
Courant Inst Math Sci New York NY 10012 USA
We review the recent progress in the design of efficient algorithms for various problems in geometric optimization. We present several techniques used to attack these problems, such as parametric searching, geometric ...
详细信息
We review the recent progress in the design of efficient algorithms for various problems in geometric optimization. We present several techniques used to attack these problems, such as parametric searching, geometric alternatives to parametric searching, prune-and-search techniques for linear programming and related problems, and LP-type problems and their efficient solution. We then describe a wide range of applications of these and other techniques to numerous problems in geometric optimization, including facility location, proximity problems, statistical estimators and metrology, placement and intersection of polygons and polyhedra, and ray shooting and other query-type problems.
The list marking problem involves marking the nodes of an L-node linked list stored in the memory of a (p, n)-PRAM, when only the position of the head of the list is initially known, while the remaining list nodes are...
详细信息
The list marking problem involves marking the nodes of an L-node linked list stored in the memory of a (p, n)-PRAM, when only the position of the head of the list is initially known, while the remaining list nodes are stored in arbitrary memory locations. Under the assumption that cells containing list nodes bear no distinctive tags distinguishing them from other cells, we establish an Omega(min{l, n/p}) randomized lower bound for l-node lists and present a deterministic algorithm whose running time is within a logarithmic additive term of this bound. Such a result implies that randomization cannot be exploited in any significant way in this setting. For the case where list cells are tagged in a way that differentiates them from other cells, the above lower bound still applies to deterministic algorithms, while we establish a tight Theta(min {l, l/p + root(n/p) log n }) bound for randomized algorithms. Therefore, in the latter case, randomization yields a better performance for a wide range of parameter values. (C) 1998 Academic Press.
We consider the problem of coloring k-colorable graphs with the fewest possible colors. We present a randomized polynomial time algorithm that colors a 3-colorable graph on n vertices with min {O(Delta(1/3) log(1/2) D...
详细信息
We consider the problem of coloring k-colorable graphs with the fewest possible colors. We present a randomized polynomial time algorithm that colors a 3-colorable graph on n vertices with min {O(Delta(1/3) log(1/2) Delta log n), O(n(1/4) log(1/2) n)} colors where Delta is the maximum degree of any vertex. Besides giving the best known approximation ratio in terms of n, this marks the first nontrivial approximation result as a function of the maximum degree Delta. This result can be generalized to k-colorable graphs to obtain a coloring using min {O(Delta(1-2/k) log(1/2) Delta log n), O(n(1-3/(k+1)) log(1/2) n)} colors. Our results are inspired by the recent work of Goemans and Williamson who used an algorithm for semidefinite optimization problems, which generalize linear programs, to obtain improved approximations for the MAX CUT and MAX 2-SAT problems. An intriguing outcome of our work is a duality relationship established between the value of the optimum solution to our semidefinite program and the Lovasz theta-function. We show lower bounds on the gap between the optimum solution of our semidefinite program and the actual chromatic number;by duality this also demonstrates interesting new facts about the theta-function.
We describe routing algorithms on networks composed of optical busses. Using networks with short busses and small degree we are able to give very fast routing algorithms. First, we describe a leveled optical network a...
详细信息
We describe routing algorithms on networks composed of optical busses. Using networks with short busses and small degree we are able to give very fast routing algorithms. First, we describe a leveled optical network and a routing algorithm for it. Next, we show how to simulate this network on high-dimensional meshes of optical busses (MOBs). We present algorithms for routing, e.g., h-relations with runtime being linear in h, doubly logarithmic in size and polynomial in the dimension of the mesh. Previous results are exponential in the dimension. E.g., routing an h-relation on a d-dimensional MOB of size N requires O(d(5) log d log log N + d(3)h) steps, with high probability. (C) 1998-Elsevier Science B.V. All rights reserved.
暂无评论