In the paper a single machine time-dependent scheduling problem is considered. The processing time p(j) of each job is described by a function of the starting time t of the job, p(j) = 1 + alpha(j)t, where the job det...
详细信息
In the paper a single machine time-dependent scheduling problem is considered. The processing time p(j) of each job is described by a function of the starting time t of the job, p(j) = 1 + alpha(j)t, where the job deterioration rate alpha(j) >= 0 for j = 0, 1,..., n and t >= 0. Jobs are nonpreemptable and independent, there are no ready times and no deadlines. The criterion of optimality of a schedule is the total completion time. First, the notion of a signature for a given sequence of job deterioration rates is introduced, two types of the signature are defined and their properties are shown. Next, on the basis of these properties a greedy polynomial-time approximation algorithm for the problem is formulated. This algorithm, starting from an initial sequence, iteratively constructs a new sequence concatenating the previous sequence with new elements, according to the sign of one of the signatures of this sequence. Finally, these results are applied to the problem with job deterioration rates which are consecutive natural numbers, alpha(j) = j for j = 0, 1,..., n. Arguments supporting the conjecture that in this case the greedy algorithm is optimal are presented. (c) 2006 Elsevier B.V. All rights reserved.
As a multivariate generalization of the univariate median, projection depth median (PM) is unique, and enjoys a very high breakdown point, much higher than its affine equivariant competitors such as halfspace depth me...
详细信息
As a multivariate generalization of the univariate median, projection depth median (PM) is unique, and enjoys a very high breakdown point, much higher than its affine equivariant competitors such as halfspace depth median. Nevertheless, its computation is challenging. Until now PM can only be exactly computed efficiently for bivariate data. In this article, we develop an algorithm to approximate PM in higher dimensions. Some data examples indicate that the proposed algorithm performs well in terms of both accuracy and efficiency. As an application, we investigate the finite sample relative efficiency of PM by utilizing the Matlab implementation of this algorithm.
In this paper, we study the problem of discovering a timeline of events in a temporal network. We model events as dense subgraphs that occur within intervals of network activity. We formulate the event discovery task ...
详细信息
In this paper, we study the problem of discovering a timeline of events in a temporal network. We model events as dense subgraphs that occur within intervals of network activity. We formulate the event discovery task as an optimization problem, where we search for a partition of the network timeline into k non-overlapping intervals, such that the intervals span subgraphs with maximum total density. The output is a sequence of dense subgraphs along with corresponding time intervals, capturing the most interesting events during the network lifetime. A naive solution to our optimization problem has polynomial but prohibitively high running time. We adapt existing recent work on dynamic densest subgraph discovery and approximate dynamic programming to design a fast approximation algorithm. Next, to ensure richer structure, we adjust the problem formulation to encourage coverage of a larger set of nodes. This problem is NP-hard;however, we show that on static graphs a simple greedy algorithm leads to approximate solution due to submodularity. We extend this greedy approach for temporal networks, but we lose the approximation guarantee in the process. Finally, we demonstrate empirically that our algorithms recover solutions with good quality.
To solve the multi-dimensional event based query in wireless sensor networks, this paper proposes four bloom filter based query processing algorithms UBP, BBP, SRBP and PBP. The four algorithms proposed can be classif...
详细信息
To solve the multi-dimensional event based query in wireless sensor networks, this paper proposes four bloom filter based query processing algorithms UBP, BBP, SRBP and PBP. The four algorithms proposed can be classified into two classes: two bloom filter based precise algorithms, which are UBP and BBP, and two bloom filter based approximate algorithms, which are SRBP and PBP. By using the bloom filter and introducing the inaccuracy, the communication cost involved by the query processing can be reduced. For the two precise algorithms UBP and BBP, simulation results show that UBP consumes 51% less energy than BBP on average. UBP is better than BBP on energy consumption. For energy consumption comparison between the approximate algorithms and the precise algorithm UBP, simulation results show that SRBP consumes 18% less energy than UBP on average as while as PBP consume approximately the same energy as UBP on average. For query accuracy comparison between the approximate algorithms and the precise algorithm UBP, simulation results show that the average relative error between UBP and PBP is 14% and the average relative error between UBP and SRBP is 2%. SRBP is better than PBP on energy consumption and query accuracy respectively. UBP and SRBP are two preferred bloom filter based query processing algorithms. (C) 2013 Elsevier Ltd. All rights reserved.
作者:
DOBSON, GUniv of Rochester
Graduate Sch of Management Rochester NY USA Univ of Rochester Graduate Sch of Management Rochester NY USA
A worst-case analysis is given for the LPT (longest processing time) heuristic applied to the problem of scheduling independent tasks on uniform processors. A bound of 1912</span
A worst-case analysis is given for the LPT (longest processing time) heuristic applied to the problem of scheduling independent tasks on uniform processors. A bound of 1912
Link quality is important and can greatly affect the performance of wireless transmission algorithms and protocols. Currently, researchers have proposed a variety of approaches to implement link quality estimation. Ho...
详细信息
Link quality is important and can greatly affect the performance of wireless transmission algorithms and protocols. Currently, researchers have proposed a variety of approaches to implement link quality estimation. However, the estimated result of link quality is not accurate enough and the error is large, so they may lead to the failure of routing algorithm and protocol. In this paper, a novel method is proposed to achieve the more accurate estimation of link quality than before. This method employs Bernoulli sampling-based algorithm to complete the estimation of link quality. The problem is modeled as calculation of estimators based on Bernoulli sampling data. The authors further prove that the calculation results are accurate by probability theory. Furthermore, according to link quality estimation, the authors also provide a centralized routing algorithm and a distributed improvement algorithm in order to switch the data transmission on the better quality link. Finally, the extensive experiment results indicate that the proposed methods obtain high performance in terms of energy consumption and accuracy.
Data uncertainty is inherent in many real-world applications such as environmental surveillance and mobile tracking. Mining sequential patterns from inaccurate data, such as those data arising from sensor readings and...
详细信息
Data uncertainty is inherent in many real-world applications such as environmental surveillance and mobile tracking. Mining sequential patterns from inaccurate data, such as those data arising from sensor readings and GPS trajectories, is important for discovering hidden knowledge in such applications. In this paper, we propose to measure pattern frequentness based on the possible world semantics. We establish two uncertain sequence data models abstracted from many real-life applications involving uncertain sequence data, and formulate the problem of mining probabilistically frequent sequential patterns (or p-FSPs) from data that conform to our models. However, the number of possible worlds is extremely large, which makes the mining prohibitively expensive. Inspired by the famous PrefixSpan algorithm, we develop two new algorithms, collectively called U-PrefixSpan, for p-FSP mining. U-PrefixSpan effectively avoids the problem of "possible worlds explosion", and when combined with our four pruning and validating methods, achieves even better performance. We also propose a fast validating method to further speed up our U-PrefixSpan algorithm. The efficiency and effectiveness of U-PrefixSpan are verified through extensive experiments on both real and synthetic datasets.
Multicast greatly benefits many emerging applications such as federated learning, metaverse, and data warehouse. Recently, due to frequent cyber-attacks, multicast services have tended to request rigorous security agr...
详细信息
Multicast greatly benefits many emerging applications such as federated learning, metaverse, and data warehouse. Recently, due to frequent cyber-attacks, multicast services have tended to request rigorous security agreements, which likely differ among the destinations. To meet such agreements, one can employ security-aware service functions (SFs) to construct the security-aware SF tree (S-SFT) for multicast services. A security-aware SF can be provided by various vendors with diverse configurations and implementation costs. The multi-configured SFs and the various security agreements will add significant complexity to the deployment process of the security-aware multicast request. In this work, for the first time, we study how to effectively compose and embed an S-SFT over the network with multiple vendors. We formulate the problem of security- aware SFT composing and embedding. We develop a new technique called cost-security-centrality (CSC) based on the pigeonhole' s principle and propose a heuristic algorithm called CSC-based S-SFT deployment (CSC-SD). Via thorough mathematical proofs, we show that CSC-SD is logarithm approximate. Extensive simulations show that CSC-SD significantly outperforms the benchmarks and reveal that more function sharing facilitates saving implementation cost, but more routing sharing does not indicate saving routing cost.
In this paper, we study a machine scheduling problem with job transportation coordination. The orders including different amount of the same product will be delivered to their customers after being completed on a sing...
详细信息
In this paper, we study a machine scheduling problem with job transportation coordination. The orders including different amount of the same product will be delivered to their customers after being completed on a single machine and each order has a delivery due date which is promised by the manufacturer to its customer. A third-party logistics provider picks up the finished orders at the end of each day and charges each order a delivery cost, which is linearly decreasing with the delivery time and linearly increasing with its quantity. The goal is to find a schedule minimizing total delivery cost under the constraint that all the orders are delivered to the customers before the due dates. The problem is strongly NP-hard. We propose an improved approximate algorithm with worst-case ratio of , which improves the existing one with worst-case ratio of .
Network function virtualization (NFV) is introduced to effectively deliver end-to-end network services for the emerging Internet of Things (IoT), multiaccess edge computing, and 5G communication techniques. In NFV, th...
详细信息
Network function virtualization (NFV) is introduced to effectively deliver end-to-end network services for the emerging Internet of Things (IoT), multiaccess edge computing, and 5G communication techniques. In NFV, the network service request can be accommodated in the form of a service function chain (SFC). The SFC will have to reserve abundant resources, such as link bandwidth, service functions, and computation in the physical network to meet the demands of customers. Minimizing the cost from the resource reservation in NFV remains challenging, even though a few works in the literature proposed cost-optimization methodologies with assumptions to guarantee their correctness. In this article, we comprehensively investigate how to minimize the cost when delivering network services as SFCs with provable bounds and fewer assumptions. We formally define the problem of minimum cost service function chaining and embedding (MC-SFCE) and propose an algorithm, namely, cost factor-based SFCE optimization with shortcut (COFO-SC), for MC-SFCE. Novel mathematical analysis is provided to demonstrate the correctness of our approaches and related bounds. Our extensive simulations and analysis also show that the proposed COFO-SC outperforms the schemes directly extended from the existing work.
暂无评论