Despite elegance being universally recognized as a goal for system design, there is little guidance in the related research and literature that is relevant to the design, development, or evaluation of elegant systems....
详细信息
Despite elegance being universally recognized as a goal for system design, there is little guidance in the related research and literature that is relevant to the design, development, or evaluation of elegant systems. This paper begins by reviewing the rather loose usage of elegance as a property of a system and shows that there are both abstract and practical views. Further, from analysis of the practical views of elegance in systems, it is clear that most current definitions of elegance are focused on the sufficiency of the system as a solution to the stated problem, rather than on elegance, perse. This paper disambiguates the usage of sufficiency and elegance, offers a formal definition of the two terms, and then provides several simple examples by way of illustration. Elegance and sufficiency must he considered as separate properties of a system, if only because the essential act of validation is an examination of the sufficiency of a solution, not its elegance. Any system attribute desired by the customer must be included as part of the solution's sufficiency and designed into the solution, not be a serendipitous unintended outcome of that design. Sufficiency is shown to be binary-a solution is either sufficient or it is not-and there may be more than one sufficient solution. Elegance is then defined to be the least complex sufficient solution. Furthermore, an elegant solution must be sufficient, but a sufficient system does not have to be (and is not always desirable to be) elegant.
One-way two-counter machines represent a universal model of computation. Here we consider the polynomial-time classes of multicounter machines with a constant number of reversals and separate the computational power o...
详细信息
One-way two-counter machines represent a universal model of computation. Here we consider the polynomial-time classes of multicounter machines with a constant number of reversals and separate the computational power of nondeterminism, randomization and determinism. For instance. we show that polynomial-time one-way multicounter machines. with error probability tending to zero with growing input length, can recognize languages that cannot be accepted by polynomial-time nondeterministic two-way multicounter machines with a bounded number of reversals. A similar result holds for the comparison of determinism and one-sided-error randomization. and of determinism and Las Vegas randomization. (C) 2004 Elsevier B.V. All rights reserved.
The recent growth in real-time, high-capacity ride-sharing has made on-demand public transit (ODPT) a reality. ODPT systems serving passengers using a vehicle fleet that operates with flexible routes, strive to minimi...
详细信息
The recent growth in real-time, high-capacity ride-sharing has made on-demand public transit (ODPT) a reality. ODPT systems serving passengers using a vehicle fleet that operates with flexible routes, strive to minimise fleet travel distance. Heuristic routing algorithms have been integrated in ODPT systems in order to improve responsiveness. However, route computation time in such algorithms depends on problem complexity and hence increases for large scale problems. Thus, network segmentation techniques that exploit parallel computing have been proposed in order to reduce route computation time. Even though computation time can be reduced using segmentation in existing techniques, it comes at the cost of degradation of route quality due to static demarcation of boundaries and disregarding real road network distances. Thus, this work proposes, a directionality-centric bus transit network segmentation technique that exploits parallel computation capable of computing routes in near real-time while providing high scalability. Additionally, a dynamic fleet allocation algorithm that exploits proximity and flexibility to minimise vehicle detours while maximising fleet utilisation is proposed. Experimental evaluations on a real road network confirm that the proposed method achieves notable speed-up in flexible route computation without compromising route quality compared to a widely used unsupervised learning technique.
This paper considers a problem of scheduling on parallel machines where each machine requires maintenance activity once over a given time window. The objective is to find a coordinated schedule for jobs and maintenanc...
详细信息
This paper considers a problem of scheduling on parallel machines where each machine requires maintenance activity once over a given time window. The objective is to find a coordinated schedule for jobs and maintenance activities to minimize the scheduling cost represented by either one of several objective measures including makespan, (weighted) sum of completion times, maximum lateness and sum of lateness. The problem is proved to be NP-hard in the strong sense in each case of the objective measures. Some restricted cases of the problem are also characterized for their complexities, for which the associated dynamic programming algorithms are derived. (C) 2016 Elsevier Ltd. All rights reserved.
Software size is a fundamental product measure that can be used for assessment, prediction, and improvement purposes. However, existing software size measures, such as Function Points, do not address the underlying pr...
详细信息
Software size is a fundamental product measure that can be used for assessment, prediction, and improvement purposes. However, existing software size measures, such as Function Points, do not address the underlying problem complexity of software systems adequately. This can result in disproportional measures of software size for different types of systems. We propose a Vector Size Measure (VSM) that incorporates both functionality and problem complexity in a balanced and orthogonal manner. VSM is used as the input to a Vector Prediction Model (VPM) which can be used to estimate development effort early in the software life cycle. We theoretically validate the approach against a formal framework. We also empirically validate the approach with a pilot study. The results indicate that the approach provides a mechanism to measure the size of software systems, classify software systems, and estimate development effort early in the software life cycle to within +/-20 percent across a range of application types.
The importance of optimal routing arises in high traffic networks where the average delay across a link is sensitive to the assignment of routes to source-destination pairs. The current single path routing algorithms ...
详细信息
The importance of optimal routing arises in high traffic networks where the average delay across a link is sensitive to the assignment of routes to source-destination pairs. The current single path routing algorithms do not take into account the effects of routing multiple source-destination pairs over common links and, consequently, may not lead to a minimum delay allocation of routes. In this paper we formulate and study the problem of minimizing queueing delays by explicitly considering the impact of overlapping routes on links. The problem is shown to be NP-Complete. Specifically, we prove that the problem of finding a feasible solution is NP-Complete and thus no polynomial time approximation algorithms exist that provide solutions within a bounded distance from the optimum. Similar complexity results are shown when we consider the special case of a ring network and where it is desirable to minimize packet losses. We provide a polynomial time algorithm for constructing a minimum spanning tree within our routing model for the purpose of broadcasting. A new heuristic to minimize delays, the Sequential Minimum Costs algorithm is proposed for the case of a single source and multiple destinations.
The paper deals with recovering band- and energy-limited signals from a finite set of perturbed inner products involving the prolate spheroidal wavefunctions. The measurement noise ( bounded by delta) and jitter meant...
详细信息
The paper deals with recovering band- and energy-limited signals from a finite set of perturbed inner products involving the prolate spheroidal wavefunctions. The measurement noise ( bounded by delta) and jitter meant as perturbation of the ends of the integration interval ( bounded by gamma) are considered. The upper and lower bounds on the radius of information are established. We show how the error of the best algorithms depends on gamma and delta. We prove that jitter causes error of order Omega 3/2 gamma, where [-Omega, Omega] is a bandwidth, which is similar to the error caused by jitter in the case of recovering signals from samples.
A normal Hall subgroup N of a group G is a normal subgroup with its order coprime with its index. Schur- Zassenhaus theorem states that every normal Hall subgroup has a complement subgroup, that is a set of coset repr...
详细信息
A normal Hall subgroup N of a group G is a normal subgroup with its order coprime with its index. Schur- Zassenhaus theorem states that every normal Hall subgroup has a complement subgroup, that is a set of coset representatives H which also forms a subgroup of G. In this paper, we present a framework to test isomorphism of groups with at least one normal Hall subgroup, when groups are given as multiplication tables. To establish the framework, we first observe that a proof of Schur-Zassenhaus theorem is constructive, and formulate a necessary and sufficient condition for testing isomorphism in terms of the associated actions of the semidirect products, and isomorphisms of the normal parts and complement parts. We then focus on the case when the normal subgroup is abelian. Utilizing basic facts of representation theory of finite groups and a technique by Le Gall (STACS 2009), we first get an efficient isomorphism testing algorithm when the complement has bounded number of generators. For the case when the complement subgroup is elementary abelian, which does not necessarily have bounded number of generators, we obtain a polynomial time isomorphism testing algorithm by reducing to generalized code isomorphism problem, which asks whether two linear subspaces are the same up to permutation of coordinates. A solution to the latter can be obtained by a mild extension of the singly exponential (in the number of coordinates) time algorithm for code isomorphism problem developed recently by Babai et al. (SODA 2011). Enroute to obtaining the above reduction, we study the following computational problem in representation theory of finite groups: given two representations ρandτ- of a group H over Zp^d, a prime, determine if there exists an automorphism : ФH→ H, such that the induced representation p Ф= ρ o Ф and τ are equivalent, in time poly(|H|, p^d).
The complexity of divide-and-conquer algorithms is often described by recurrences of various forms. In this paper, we develop general techniques and master theorems for solving several kinds of recurrences, and we giv...
详细信息
The complexity of divide-and-conquer algorithms is often described by recurrences of various forms. In this paper, we develop general techniques and master theorems for solving several kinds of recurrences, and we give several applications of our results. In particular, almost ail of the earlier work on solving the recurrences considered here is subsumed by our work. In the process of solving such recurrences, we establish interesting connections between some elegant mathematics and analysis of recurrences. Using our results and improved bipartite matching algorithms, we also improve existing bounds in the literature for several problems, viz, associative-commutative (AC) matching of linear terms, associative matching of linear terms, rooted subtree isomorphism, and rooted subgraph homeomorphism for trees.
暂无评论