This paper addresses the problem of finding the route with maximum end-to-end spectral efficiency, under the constraint of equal bandwidth sharing, in multihop wireless networks. This problem has been addressed recent...
详细信息
This paper addresses the problem of finding the route with maximum end-to-end spectral efficiency, under the constraint of equal bandwidth sharing, in multihop wireless networks. This problem has been addressed recently in the literature, and only exhaustive search with exponential computational complexity or suboptimal heuristics are known. This paper closes the algorithmic gap by introducing two algorithms that provide provably optimal solutions to the problem in polynomial-time. The proposed algorithms rely on the iterative use of a shortest path procedure. Our computational results further illustrate the efficiency of the proposed approach.
In this paper we consider the problem of no-wait cyclic scheduling of identical parts in an m-machine production line in which a robot is responsible for moving each part from a machine to another. The aim is to rind ...
详细信息
In this paper we consider the problem of no-wait cyclic scheduling of identical parts in an m-machine production line in which a robot is responsible for moving each part from a machine to another. The aim is to rind the minimum cycle time for the so-called 2-cyclic schedules, in which exactly two parts enter and two parts leave the production line during each cycle. The earlier known polynomial-time algorithms for this problem are applicable only under the additional assumption that the robot travel times satisfy the triangle inequalities. We lift this assumption on robot travel times and present a polynomial-time algorithm with the same time complexity as in the metric case, O(m(5) log m). (C) 2008 Elsevier B.V. All rights reserved.
We consider the problem of preemptively scheduling n independent jobs {J(1),J(2), ..., J(n)} on m parallel machines {M(1),M(2), ..., M(m)}, where each job J(j) can only be processed on a prespecified subset M(j) of ma...
详细信息
We consider the problem of preemptively scheduling n independent jobs {J(1),J(2), ..., J(n)} on m parallel machines {M(1),M(2), ..., M(m)}, where each job J(j) can only be processed on a prespecified subset M(j) of machines called its processing set. The machines are linearly ordered, and the processing set of J(j) is specified by two machine indexes a(j) and b(j);i.e., M(j) = {M(aj),M(aj+1), ..., M(bj)}. The processing sets are nested;i.e., for i not equal j, we have M(i) subset of M(j), or M(j) subset of M(i),or M(j) boolean AND M(i) = phi..Our goal is to minimize the makespan. We first give an O(n logn)-time algorithm to find an optimal schedule. We then give an O(mn + nlogn)-time algorithm to find a maximal schedule, where a schedule is said to be maximal if it processes as much work as any other schedule in any time interval [0, t], t>0.
We consider approximation of linear multivariate problems defined over weighted tensor product Hilbert spaces with finite-order weights. This means we consider functions of d variables that can be represented as sums ...
详细信息
We consider approximation of linear multivariate problems defined over weighted tensor product Hilbert spaces with finite-order weights. This means we consider functions of d variables that can be represented as sums of functions of at most q* variables. Here, q* is fixed (and presumably small) and d may be arbitrarily large. For the univariate problem, d = 1, we assume we know algorithms A(1,epsilon) that use O(epsilon(-p)) function or linear functional evaluations to achieve an error epsilon in the worst case setting. Based on these algorithms A(1,epsilon), we provide a construction of polynomial-time algorithms A(d,epsilon) for the general d-variate problem with the number of evaluations bounded roughly by epsilon(-p)d(q*) to achieve an error epsilon in the worst case setting.
We present a decentralized auction-based scheme for bandwidth allocation and pricing in a differentiated service-based network. Different classes of clients provide their own expected bandwidth price and required amou...
详细信息
We present a decentralized auction-based scheme for bandwidth allocation and pricing in a differentiated service-based network. Different classes of clients provide their own expected bandwidth price and required amount of bandwidth. A service provider decides the admission price and differentiated service provided for each class of clients. We introduce mathematical formulations and provide a solution approach to maximize the service provider's revenue. For a single bottleneck link case, a polynomial-time algorithm is developed to obtain an optimal solution. For a multiple bottleneck link case, a heuristic algorithm is developed to solve the problem. The effectiveness of our solution approach is validated by simulation results, which compare our algorithms against the traditional flat-rate pricing approach. (c) 2007 Elsevier Ltd. All rights reserved.
Network coding substantially increases network throughput. But since it involves mixing of information inside the network, a single corrupted packet generated by a malicious node can end up contaminating all the infor...
详细信息
Network coding substantially increases network throughput. But since it involves mixing of information inside the network, a single corrupted packet generated by a malicious node can end up contaminating all the information reaching a destination, preventing decoding. This paper introduces distributed polynomial-time rate-optimal network codes that work in the presence of Byzantine nodes. We present algorithms that target adversaries with different attacking capabilities. When the adversary can eavesdrop on all links and jam z(O) links, our first algorithm achieves a rate of C - 2z(O), where C is the network capacity. In contrast,, when the adversary has limited eavesdropping capabilities, we provide algorithms that achieve the higher rate of C - z(O). Our algorithms attain the optimal rate given the strength of the adversary. They are information-theoretically secure. They operate in a distributed manner, assume no knowledge of the topology, and can be designed and implemented in polynomialtime. Furthermore, only the source and destination need to be modified;nonmalicious nodes inside the network are oblivious to the presence of adversaries and implement a classical distributed network code. Finally, our algorithms work over wired and wireless networks.
In this paper, we discuss the computational complexity of the strategic cores of a class of n-person games defined by Masuzawa (Int J Game Theory 32:479-483, 2003), which includes economic situations with monotone ext...
详细信息
In this paper, we discuss the computational complexity of the strategic cores of a class of n-person games defined by Masuzawa (Int J Game Theory 32:479-483, 2003), which includes economic situations with monotone externality. We propose an algorithm for finding an alpha-core strategy of any game in this class which, counting the evaluation of a payoff for a strategy profile as one step, terminates after O(n(3). M) operations, where M is the maximum size of a strategy set of any of the n players. The idea underlying this method is based on the property of reduced games.
This paper provides a polynomial-time algorithm to estimate returns to scale in FDH models, having many strong computational advantages. The equivalence of this method and the only current approach is proved. (c) 2005...
详细信息
This paper provides a polynomial-time algorithm to estimate returns to scale in FDH models, having many strong computational advantages. The equivalence of this method and the only current approach is proved. (c) 2005 Published by Elsevier Ltd.
This paper focuses on veto supertree methods;i.e., methods that aim at producing a conservative synthesis of the relationships agreed upon by all source trees. We propose desirable properties that a supertree should s...
详细信息
This paper focuses on veto supertree methods;i.e., methods that aim at producing a conservative synthesis of the relationships agreed upon by all source trees. We propose desirable properties that a supertree should satisfy in this framework, namely the non-contradiction property (PC) and the induction property (PI). The former requires that the supertree does not contain relationships that contradict one or a combination of the source topologies, whereas the latter requires that all topological information contained in the supertree is present in a source tree or collectively induced by several source trees. We provide simple examples to illustrate their relevance and that allow a comparison with previously advocated properties. We show that these properties can be checked in polynomialtime for any given rooted supertree. Moreover, we introduce the PhySIC method (PHYlogenetic Signal with induction and non-Contradiction). For k input trees spanning a set of n taxa, this method produces a supertree that satisfies the above-mentioned properties in O(kn(3) + n(4)) computing time. The polytornies of the produced supertree are also tagged by labels indicating areas of conflict as well as those with insufficient overlap. As a whole, PhySIC enables the user to quickly summarize consensual information of a set of trees and localize groups of taxa for which the data require consolidation. Lastly, we illustrate the behaviour of PhySIC on primate data sets of various sizes, and propose a supertree covering 95% of all primate extant genera. The PhySIC algorithm is available at http:/ /***/cgi-bin/PhySIC. [Formal properties;phylogenetics;polynomial-time algorithms;primates;software;supertrees;triplets;veto methods.]
Consider n independent jobs and m uniform machines in parallel. Each job has a processing requirement and a deadline. All jobs are available for processing at time t = 0. Job j must complete its processing before or a...
详细信息
Consider n independent jobs and m uniform machines in parallel. Each job has a processing requirement and a deadline. All jobs are available for processing at time t = 0. Job j must complete its processing before or at its deadline and preemptions are allowed. A set of jobs is said to be feasible if there exists a schedule that meets all the deadlines. We present a polynomial-time algorithm that given a feasible set of jobs, constructs a schedule that minimizes the total completion time Sigma C-j. In the classical alpha vertical bar beta vertical bar gamma scheduling notation, this problem is referred to as Qm vertical bar prmt, (d) over bar (j )vertical bar Sigma C-j. It is well known that a generalization of this problem with regard to its machine environment results in an NP-hard problem.
暂无评论