Link scheduling is crucial in improving the throughput in wireless networks and it has been widely studied under various interference models. In this paper, we study the link scheduling problem under physical interfer...
详细信息
ISBN:
(纸本)9781605585239
Link scheduling is crucial in improving the throughput in wireless networks and it has been widely studied under various interference models. In this paper, we study the link scheduling problem under physical interference model where all senders of the links transmit at a given power P and a link can transmit successfully if and only if the Signal-to-Interference-plus-Noise-Ratio (SINR) at the corresponding receiver is at least a certain threshold. The link scheduling problem is to find a maximum -independent set" (MIS) of links, i.e., the maximum number of links that can transmit successfully in one time-slot, given a set of input links. This problem has been shown to be with a constant approximation ratio for arbitrary background noise N >= 0. When each link l has a weight w(l) > 0, we propose a method for weighted MIS with approximation ratio O(min(log maxl is an element of L w(l)/minl is an element of L w(l), log maxl is an element of L parallel to l parallel to/minl is an element of L parallel to l parallel to)), where parallel to l parallel to is the Euclidean length of a link l.
We consider the classical Minimum Crossing Number problem: given an n-vertex graph G, compute a drawing of G in the plane, while minimizing the number of crossings between the images of its edges. This is a fundamenta...
详细信息
ISBN:
(纸本)9781450392648
We consider the classical Minimum Crossing Number problem: given an n-vertex graph G, compute a drawing of G in the plane, while minimizing the number of crossings between the images of its edges. This is a fundamental and extensively studied problem, whose approximability status is widely open. In all currently known approximation algorithms, the approximation factor depends polynomially on. - the maximum vertex degree in G. The best current approximation algorithm achieves an O(n(1/2)-is an element of poly(Delta. logn))-approximation, for a small fixed constant is an element of, while the best negative result is APX-hardness, leaving a large gap in our understanding of this basic problem. In this paper we design a randomized O (2(O((log n)7/8 log log n)) . poly(Delta)) -approximation algorithm for Minimum Crossing Number. This is the first approximation algorithm for the problem that achieves a subpolynomial in n approximation factor (albeit only in graphs whose maximum vertex degree is subpolynomial in n). In order to achieve this approximation factor, we design a new algorithm for a closely related problem called Crossing Number with Rotation System, in which, for every vertex upsilon is an element of V (G), the circular ordering, in which the images of the edges incident to v must enter the image of v in the drawing is fixed as part of input. Combining this result with the recent reduction of [Chuzhoy, Mahabadi, Tan '20] immediately yields the improved approximation algorithm for Minimum Crossing Number.
Boxicity of a graph G(V, E) is the minimum integer k such that G can be represented as the intersection graph of k-dimensional axis parallel boxes in R-k. Equivalently, it is the minimum number of interval graphs on t...
详细信息
ISBN:
(纸本)9783642222993
Boxicity of a graph G(V, E) is the minimum integer k such that G can be represented as the intersection graph of k-dimensional axis parallel boxes in R-k. Equivalently, it is the minimum number of interval graphs on the vertex set V such that the intersection of their edge sets is E. It is known that boxicity cannot be approximated even for graph classes like bipartite, co-bipartite and split graphs below O(n(0.5-epsilon))-factor, for any epsilon > 0 in polynomial time unless NP = ZPP. Till date, there is no well known graph class of unbounded boxicity for which even an n(epsilon)-factor approximation algorithm for computing boxicity is known, for any epsilon < 1. In this paper, we study the boxicity problem on Circular Arc graphs intersection graphs of arcs of a circle. We give a (2+1/k)-factor polynomial time approximation algorithm for computing the boxicity of any circular arc graph along with a corresponding box representation, where k >= 1 is its boxicity. For Normal Circular Arc(NCA) graphs, with an NCA model given, this can be improved to an additive 2-factor approximation algorithm. The time complexity of the algorithms to approximately compute the boxicity is O(mn+n(2)) in both these cases and in O(mn+kn(2)) which is at most O(n(3)) time we also get their corresponding box representations, where a is the number of vertices of the graph and m is its number of edges. The additive 2-factor algorithm directly works for any Proper Circular Arc graph, since computing an NCA model for it can be done in polynomial time.
The problem of minimizing the maximum delivery times while scheduling jobs on the single processor is a classical combinatorial optimization problem. This problem is denoted by 1|r(j), q(j)|C-max, has many application...
详细信息
ISBN:
(纸本)9788395918384
The problem of minimizing the maximum delivery times while scheduling jobs on the single processor is a classical combinatorial optimization problem. This problem is denoted by 1|r(j), q(j)|C-max, has many applications, and it is NP-hard in strong sense. The goal of this paper is to propose a new 3/2-approximation algorithm, which runs in O(n log n) time. We proved that the bound of 3/2 is tight. To check the efficiency of the algorithm we tested it on random generated problems of up to 5000 jobs.
This paper presents a simple and fast polynomial time algorithm, the clever, steady strategy algorithm (CSSA). The proposed algorithm consists of three stages which produces optimal or approximate vertex cover for any...
详细信息
ISBN:
(纸本)9781509003297
This paper presents a simple and fast polynomial time algorithm, the clever, steady strategy algorithm (CSSA). The proposed algorithm consists of three stages which produces optimal or approximate vertex cover for any unknown un-weighted and undirected G = (V, E). In the first step the degree of each node of the given graph is calculated. In second step the minimum degree node(s) is find and also the adjacent nodes of minimum degree nodes are find. In the third stage the minimum degree node in all adjacent nodes of minimum degree is searched out and is selected as a candidate for MVC and all its edges are deleted. These three steps are processed repeatedly until no edge remains in the graph. The CSSA is tested on small as well as on large benchmark instances. The experimental results and comparative analysis show that the CSSA yields better and fast solution than those approximation algorithms found in literature for solving minimum vertex cover problem.
Given a set S of n disjoint line segments in R-2, the visibility counting problem (VCP) is to preprocess S such that the number of segments in S visible from any query point p can be computed quickly. This problem can...
详细信息
ISBN:
(纸本)9783319426341;9783319426334
Given a set S of n disjoint line segments in R-2, the visibility counting problem (VCP) is to preprocess S such that the number of segments in S visible from any query point p can be computed quickly. This problem can trivially be solved in logarithmic query time using O(n(4)) preprocessing time and space. Gudmundsson and Morin proposed a 2-approximation algorithm for this problem with a trade-off between the space and the query time. They answer any query in O epsilon(n (1-alpha)) with O epsilon (n(2+2 alpha)) of preprocessing time and space, where alpha is a constant 0 <= alpha <= 1, epsilon > 0 is another constant that can be made arbitrarily small, and O epsilon(f(n)) = O(f( n)n(epsilon)). In this paper, we propose a randomized approximation algorithm for VCP with a tradeoff between the space and the query time. We will show that for an arbitrary constants 0 <= beta <= 2/3 and 0 < delta < 1, the expected preprocessing time, the expected space, and the query time of our algorithm are O( n(4-3 beta) log n), O(n(4-3 beta)), and O(1/delta(3)n(beta) log n), respectively. The algorithm computes the number of visible segments from p, or mp, exactly if m(p) <= (1)/(3)(delta)n(beta) log ***, it computes a ( 1+ delta)-approximation m'(p) with the probability of at least 1- 1/log n, where m(p) <= m'(p) <= ( 1 + delta) m(p).
We study a version of the graph 2-clustering problem. In this version, for a given undirected graph, one has to find a nearest 2-cluster graph, i.e., the graph on the same vertex set with exactly 2 non-empty connected...
详细信息
ISBN:
(纸本)9783030226299;9783030226282
We study a version of the graph 2-clustering problem. In this version, for a given undirected graph, one has to find a nearest 2-cluster graph, i.e., the graph on the same vertex set with exactly 2 non-empty connected components each of which is a complete graph. The distance between two graphs is the number of noncoinciding edges. The problem under consideration is NP-hard. In 2004, Bansal, Blum, and Chawla presented a simple polynomial time 3-approximation algorithm for the similar correlation clustering problem in which the number of clusters doesn't exceed 2. In 2008, Coleman, Saunderson, and Wirth presented a 2-approximation algorithm for this problem applying local search to every feasible solution obtained by the 3-approximation algorithm of Bansal, Blum, and Chawla. Unfortunately, the method of proving the performance guarantee of the Coleman, Saunderson, and Wirth's algorithm is not suitable for the graph 2-clustering. Coleman, Saunderson, and Wirth used switching technique that allows to reduce clustering any graph to the equivalent problem whose optimal solution is the complete graph, i.e., the cluster graph consisting of the single cluster. In the graph 2-clustering problem any optimal solution has to consist of exactly 2 clusters, so we need another approximation algorithm and another method of proving a bound on its worst-case behaviour. We present a polynomial time 2-approximation algorithm for the 2-clustering problem on general graphs. In contrast to the proof of Coleman, Saunderson, and Wirth, our proof of the performance guarantee of this algorithm doesn't use switchings.
The aim of this paper is to develop an improved polynomial-time approximation algorithm belonging to the family of the fully polynomial time approximation schemes (FPTAS), for an ancient scheduling problem with deadli...
详细信息
ISBN:
(纸本)9781479967735
The aim of this paper is to develop an improved polynomial-time approximation algorithm belonging to the family of the fully polynomial time approximation schemes (FPTAS), for an ancient scheduling problem with deadlines. The algorithm permits to answer a question posed more than three decades ago in Gens & Levner (1981): "Can an epsilon-approximation algorithm be found for the minimization version of the job-sequencing-with-deadlines problem running with the same complexity as the algorithms for the maximization form of the problem?" The new algorithm provides the positive answer.
We consider the problem of finding a spanning tree that maximizes the number of leaves (MAXLEAF). We provide a 3/2-approximation algorithm for this problem when restricted to cubic graphs, improving on the previous 5/...
详细信息
ISBN:
(纸本)9783540922476
We consider the problem of finding a spanning tree that maximizes the number of leaves (MAXLEAF). We provide a 3/2-approximation algorithm for this problem when restricted to cubic graphs, improving on the previous 5/3-approximation for this class. To obtain this approximation we define a graph parameter x(G), and construct a tree with at least (n - x(G) + 4)/3 leaves, and prove that no tree with more than (n - x(G) + 2)/2 leaves exists. In contrast to previous approximation algorithms for MAXLEAF;our algorithm works with connected dominating sets instead of constructing a tree directly. The algorithm also yields a 4/3-approximation for Minimum Connected Dominating Set in cubic graphs.
Scaffold filling is a critical step in DNA assembly. In the scaffold filling problem, we are given a reference (complete) genome, and a scaffold composed of contigs which are matched to fix positions on the reference ...
详细信息
ISBN:
(数字)9789819750870
ISBN:
(纸本)9789819750863;9789819750870
Scaffold filling is a critical step in DNA assembly. In the scaffold filling problem, we are given a reference (complete) genome, and a scaffold composed of contigs which are matched to fix positions on the reference genome, as well as some unmatched fragments, the purpose is to insert the unmatched fragments between the contigs in the scaffold, such that the resulting genome is similar to the reference genome. Let M be a one-to-one matching between common letters of the scaffold and the reference genome. A duo-preservation is an ordered pair of consecutive letters in the scaffold, which are matched to two consecutive letters in the reference genome based on M. The problem of scaffold filling to maximize increased duo-preservations is described as: given an incomplete scaffold with some fragments missing and a reference genome, inserting the missing fragments back into the incomplete scaffold to maximize the number of increased duo-preservations between the filled scaffold and the reference genome. In [19], this problem was shown to be MAX-SNP-complete and can not be approximated within 16263/16262. In this paper, we firstly improve the inapproximability gap to 2363/2362, then we devise a new approximation algorithm with an approximation factor of 3/2 + epsilon by a local search method. The running time of the approximation algorithm is O(n(O(1/epsilon))), where epsilon is an arbitrary small constant. Finally, we apply our algorithm to simulated genomic data, yielding the average approximation factors of 1.034 for s = 1 and 1.030 for s = 2, where s denotes the range of local search, indicating the maximum number of elements substituted in the current solution per iteration. The experimental findings show that our algorithm's approximation factor primarily reflects a theoretical worst-case. However, practical datasets rarely encounter such extremes cases. Therefore, our approximation algorithm shows exceptional performance in real-world datasets compared with the the
暂无评论