id
stringlengths
9
16
submitter
stringlengths
4
52
authors
stringlengths
4
937
title
stringlengths
7
243
comments
stringlengths
1
472
journal-ref
stringlengths
4
244
doi
stringlengths
14
55
report-no
stringlengths
3
125
categories
stringlengths
5
97
license
stringclasses
9 values
abstract
stringlengths
33
2.95k
versions
list
update_date
unknown
authors_parsed
sequence
cs/0211009
Sung Wing Kin, Ken
Wing-Kai Hon, Ming-Yang Kao, Tak-Wah Lam, Wing-Kin Sung, Siu-Ming Yiu
Improved Phylogeny Comparisons: Non-Shared Edges Nearest Neighbor Interchanges, and Subtree Transfers
null
null
null
null
cs.DS
null
The number of the non-shared edges of two phylogenies is a basic measure of the dissimilarity between the phylogenies. The non-shared edges are also the building block for approximating a more sophisticated metric called the nearest neighbor interchange (NNI) distance. In this paper, we give the first subquadratic-time algorithm for finding the non-shared edges, which are then used to speed up the existing approximating algorithm for the NNI distance from $O(n^2)$ time to $O(n \log n)$ time. Another popular distance metric for phylogenies is the subtree transfer (STT) distance. Previous work on computing the STT distance considered degree-3 trees only. We give an approximation algorithm for the STT distance for degree-$d$ trees with arbitrary $d$ and with generalized STT operations.
[ { "version": "v1", "created": "Mon, 11 Nov 2002 12:02:30 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Hon", "Wing-Kai", "" ], [ "Kao", "Ming-Yang", "" ], [ "Lam", "Tak-Wah", "" ], [ "Sung", "Wing-Kin", "" ], [ "Yiu", "Siu-Ming", "" ] ]
cs/0211010
Erik Demaine
Stephen Alstrup, Michael A. Bender, Erik D. Demaine, Martin Farach-Colton, Theis Rauhe, Mikkel Thorup
Efficient Tree Layout in a Multilevel Memory Hierarchy
18 pages. Version 2 adds faster dynamic programs. Preliminary version appeared in European Symposium on Algorithms, 2002
null
null
null
cs.DS
null
We consider the problem of laying out a tree with fixed parent/child structure in hierarchical memory. The goal is to minimize the expected number of block transfers performed during a search along a root-to-leaf path, subject to a given probability distribution on the leaves. This problem was previously considered by Gil and Itai, who developed optimal but slow algorithms when the block-transfer size B is known. We present faster but approximate algorithms for the same problem; the fastest such algorithm runs in linear time and produces a solution that is within an additive constant of optimal. In addition, we show how to extend any approximately optimal algorithm to the cache-oblivious setting in which the block-transfer size is unknown to the algorithm. The query performance of the cache-oblivious layout is within a constant factor of the query performance of the optimal known-block-size layout. Computing the cache-oblivious layout requires only logarithmically many calls to the layout algorithm for known block size; in particular, the cache-oblivious layout can be computed in O(N lg N) time, where N is the number of nodes. Finally, we analyze two greedy strategies, and show that they have a performance ratio between Omega(lg B / lg lg B) and O(lg B) when compared to the optimal layout.
[ { "version": "v1", "created": "Tue, 12 Nov 2002 03:32:02 GMT" }, { "version": "v2", "created": "Wed, 28 Jul 2004 21:03:35 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Alstrup", "Stephen", "" ], [ "Bender", "Michael A.", "" ], [ "Demaine", "Erik D.", "" ], [ "Farach-Colton", "Martin", "" ], [ "Rauhe", "Theis", "" ], [ "Thorup", "Mikkel", "" ] ]
cs/0211013
Alice Kolakowska
A. Kolakowska, M. A. Novotny, G. Korniss
Algorithmic scalability in globally constrained conservative parallel discrete event simulations of asynchronous systems
14 pages, 11 figures
Phys. Rev. E 67, 046703 (2003)
10.1103/PhysRevE.67.046703
null
cs.DC cond-mat.stat-mech cs.DS physics.comp-ph
null
We consider parallel simulations for asynchronous systems employing L processing elements that are arranged on a ring. Processors communicate only among the nearest neighbors and advance their local simulated time only if it is guaranteed that this does not violate causality. In simulations with no constraints, in the infinite L-limit the utilization scales (Korniss et al, PRL 84, 2000); but, the width of the virtual time horizon diverges (i.e., the measurement phase of the algorithm does not scale). In this work, we introduce a moving window global constraint, which modifies the algorithm so that the measurement phase scales as well. We present results of systematic studies in which the system size (i.e., L and the volume load per processor) as well as the constraint are varied. The constraint eliminates the extreme fluctuations in the virtual time horizon, provides a bound on its width, and controls the average progress rate. The width of the window constraint can serve as a tuning parameter that, for a given volume load per processor, could be adjusted to optimize the utilization so as to maximize the efficiency. This result may find numerous applications in modeling the evolution of general spatially extended short-range interacting systems with asynchronous dynamics, including dynamic Monte Carlo studies.
[ { "version": "v1", "created": "Tue, 12 Nov 2002 23:35:12 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Kolakowska", "A.", "" ], [ "Novotny", "M. A.", "" ], [ "Korniss", "G.", "" ] ]
cs/0211018
Vladimir Pestov
Vladimir Pestov and Aleksandar Stojmirovic
Indexing schemes for similarity search: an illustrated paradigm
19 pages, LaTeX with 8 figures, prepared using Fundamenta Informaticae style file
Fundamenta Informaticae Vol. 70 (2006), No. 4, 367-385
null
null
cs.DS
null
We suggest a variation of the Hellerstein--Koutsoupias--Papadimitriou indexability model for datasets equipped with a similarity measure, with the aim of better understanding the structure of indexing schemes for similarity-based search and the geometry of similarity workloads. This in particular provides a unified approach to a great variety of schemes used to index into metric spaces and facilitates their transfer to more general similarity measures such as quasi-metrics. We discuss links between performance of indexing schemes and high-dimensional geometry. The concepts and results are illustrated on a very large concrete dataset of peptide fragments equipped with a biologically significant similarity measure.
[ { "version": "v1", "created": "Thu, 14 Nov 2002 19:10:16 GMT" }, { "version": "v2", "created": "Thu, 13 Oct 2005 21:06:17 GMT" } ]
"2009-09-29T00:00:00"
[ [ "Pestov", "Vladimir", "" ], [ "Stojmirovic", "Aleksandar", "" ] ]
cs/0211019
Sebastian Brand
Krzysztof R. Apt, Sebastian Brand
Schedulers for Rule-based Constraint Programming
8 pages. To appear in Proc. ACM Symposium on Applied Computing (SAC) 2003
null
null
null
cs.DS cs.PL
null
We study here schedulers for a class of rules that naturally arise in the context of rule-based constraint programming. We systematically derive a scheduler for them from a generic iteration algorithm of Apt [2000]. We apply this study to so-called membership rules of Apt and Monfroy [2001]. This leads to an implementation that yields for these rules a considerably better performance than their execution as standard CHR rules.
[ { "version": "v1", "created": "Fri, 15 Nov 2002 13:38:20 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Apt", "Krzysztof R.", "" ], [ "Brand", "Sebastian", "" ] ]
cs/0212044
Sandor P. Fekete
Sandor P. Fekete, Henk Meijer, Andre Rohe, and Walter Tietze
Solving a "Hard" Problem to Approximate an "Easy" One: Heuristics for Maximum Matchings and Maximum Traveling Salesman Problems
20 pages, 14 figures, Latex, to appear in Journal of Experimental Algorithms, 2002
Journal of Experimental Algorithms, 7 (2002), article 11.
null
null
cs.DS
null
We consider geometric instances of the Maximum Weighted Matching Problem (MWMP) and the Maximum Traveling Salesman Problem (MTSP) with up to 3,000,000 vertices. Making use of a geometric duality relationship between MWMP, MTSP, and the Fermat-Weber-Problem (FWP), we develop a heuristic approach that yields in near-linear time solutions as well as upper bounds. Using various computational tools, we get solutions within considerably less than 1% of the optimum. An interesting feature of our approach is that, even though an FWP is hard to compute in theory and Edmonds' algorithm for maximum weighted matching yields a polynomial solution for the MWMP, the practical behavior is just the opposite, and we can solve the FWP with high accuracy in order to find a good heuristic solution for the MWMP.
[ { "version": "v1", "created": "Mon, 16 Dec 2002 09:39:16 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Fekete", "Sandor P.", "" ], [ "Meijer", "Henk", "" ], [ "Rohe", "Andre", "" ], [ "Tietze", "Walter", "" ] ]
cs/0212047
Giorgio Parisi
Giorgio Parisi
On local equilibrium equations for clustering states
9 pages
null
null
null
cs.CC cond-mat.dis-nn cs.DS
null
In this note we show that local equilibrium equations (the generalization of the TAP equations or of the belief propagation equations) do have solutions in the colorable phase of the coloring problem. The same results extend to other optimization problems where the solutions has cost zero (e.g. K-satisfiability). On a random graph the solutions of the local equilibrium equations are associated to clusters of configurations (clustering states). On a random graph the local equilibrium equations have solutions almost everywhere in the uncolored phase; in this case we have to introduce the concept quasi-solution of the local equilibrium equations.
[ { "version": "v1", "created": "Wed, 18 Dec 2002 22:14:39 GMT" }, { "version": "v2", "created": "Sun, 13 Mar 2005 21:19:46 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Parisi", "Giorgio", "" ] ]
cs/0212054
Hsueh-I. Lu
Ching-Chi Lin, Hsueh-I Lu, I-Fan Sun
Improved Compact Visibility Representation of Planar Graph via Schnyder's Realizer
11 pages, 6 figures, the preliminary version of this paper is to appear in Proceedings of the 20th Annual Symposium on Theoretical Aspects of Computer Science (STACS), Berlin, Germany, 2003
SIAM Journal on Discrete Math, 18(1):19-29, 2004
10.1137/S0895480103420744
null
cs.DS cs.CG
null
Let $G$ be an $n$-node planar graph. In a visibility representation of $G$, each node of $G$ is represented by a horizontal line segment such that the line segments representing any two adjacent nodes of $G$ are vertically visible to each other. In the present paper we give the best known compact visibility representation of $G$. Given a canonical ordering of the triangulated $G$, our algorithm draws the graph incrementally in a greedy manner. We show that one of three canonical orderings obtained from Schnyder's realizer for the triangulated $G$ yields a visibility representation of $G$ no wider than $\frac{22n-40}{15}$. Our easy-to-implement O(n)-time algorithm bypasses the complicated subroutines for four-connected components and four-block trees required by the best previously known algorithm of Kant. Our result provides a negative answer to Kant's open question about whether $\frac{3n-6}{2}$ is a worst-case lower bound on the required width. Also, if $G$ has no degree-three (respectively, degree-five) internal node, then our visibility representation for $G$ is no wider than $\frac{4n-9}{3}$ (respectively, $\frac{4n-7}{3}$). Moreover, if $G$ is four-connected, then our visibility representation for $G$ is no wider than $n-1$, matching the best known result of Kant and He. As a by-product, we obtain a much simpler proof for a corollary of Wagner's Theorem on realizers, due to Bonichon, Sa\"{e}c, and Mosbah.
[ { "version": "v1", "created": "Sun, 29 Dec 2002 12:41:47 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Lin", "Ching-Chi", "" ], [ "Lu", "Hsueh-I", "" ], [ "Sun", "I-Fan", "" ] ]
cs/0301015
Giorgio Parisi
Giorgio Parisi
Some remarks on the survey decimation algorithm for K-satisfiability
null
null
null
null
cs.CC cond-mat.dis-nn cs.DS
null
In this note we study the convergence of the survey decimation algorithm. An analytic formula for the reduction of the complexity during the decimation is derived. The limit of the converge of the algorithm are estimated in the random case: interesting phenomena appear near the boundary of convergence.
[ { "version": "v1", "created": "Thu, 16 Jan 2003 10:38:36 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Parisi", "Giorgio", "" ] ]
cs/0301019
Daniel A. Spielman
Daniel A. Spielman and Shang-Hua Teng
Smoothed Analysis of Interior-Point Algorithms: Termination
to be presented at the 2003 International Symposium on Mathematical Programming
null
null
null
cs.DS
null
We perform a smoothed analysis of the termination phase of an interior-point method. By combining this analysis with the smoothed analysis of Renegar's interior-point algorithm by Dunagan, Spielman and Teng, we show that the smoothed complexity of an interior-point algorithm for linear programming is $O (m^{3} \log (m/\sigma))$. In contrast, the best known bound on the worst-case complexity of linear programming is $O (m^{3} L)$, where $L$ could be as large as $m$. We include an introduction to smoothed analysis and a tutorial on proof techniques that have been useful in smoothed analyses.
[ { "version": "v1", "created": "Tue, 21 Jan 2003 17:47:05 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Spielman", "Daniel A.", "" ], [ "Teng", "Shang-Hua", "" ] ]
cs/0301021
Sostenes Lins
Lauro Lins, Sostenes Lins and Silvio Melo
PHORMA: Perfectly Hashable Order Restricted Multidimensional Arrays
12 pages, 4 figures, 2 tables. Revised version. Submitted to Discrete Applied Mathematics
null
null
null
cs.DS
null
In this paper we propose a simple and efficient data structure yielding a perfect hashing of quite general arrays. The data structure is named phorma, which is an acronym for perfectly hashable order restricted multidimensional array. Keywords: Perfect hash function, Digraph, Implicit enumeration, Nijenhuis-Wilf combinatorial family.
[ { "version": "v1", "created": "Tue, 21 Jan 2003 23:55:17 GMT" }, { "version": "v2", "created": "Sun, 23 Mar 2003 16:33:09 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Lins", "Lauro", "" ], [ "Lins", "Sostenes", "" ], [ "Melo", "Silvio", "" ] ]
cs/0301030
Ronald I. Greenberg
Ronald I. Greenberg
Bounds on the Number of Longest Common Subsequences
13 pages. Corrected typos, corrected operation of hyperlinks, improved presentation
null
null
null
cs.DM cs.DS
null
This paper performs the analysis necessary to bound the running time of known, efficient algorithms for generating all longest common subsequences. That is, we bound the running time as a function of input size for algorithms with time essentially proportional to the output size. This paper considers both the case of computing all distinct LCSs and the case of computing all LCS embeddings. Also included is an analysis of how much better the efficient algorithms are than the standard method of generating LCS embeddings. A full analysis is carried out with running times measured as a function of the total number of input characters, and much of the analysis is also provided for cases in which the two input sequences are of the same specified length or of two independently specified lengths.
[ { "version": "v1", "created": "Tue, 28 Jan 2003 17:53:16 GMT" }, { "version": "v2", "created": "Wed, 6 Aug 2003 20:54:58 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Greenberg", "Ronald I.", "" ] ]
cs/0301034
Ronald I. Greenberg
Ronald I. Greenberg
Computing the Number of Longest Common Subsequences
3 pages, LaTeX
null
null
null
cs.DS cs.DM
null
This note provides very simple, efficient algorithms for computing the number of distinct longest common subsequences of two input strings and for computing the number of LCS embeddings.
[ { "version": "v1", "created": "Wed, 29 Jan 2003 20:02:22 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Greenberg", "Ronald I.", "" ] ]
cs/0301036
Joe Francoeur
Joe Francoeur
Algorithms using Java for Spreadsheet Dependent Cell Recomputation
23 pages, 4 figures, 2 tables
null
null
null
cs.DS cs.DM
null
Java implementations of algorithms used by spreadsheets to automatically recompute the set of cells dependent on a changed cell are described using a mathematical model for spreadsheets based on graph theory. These solutions comprise part of a Java API that allows a client application to read, modify, and maintain spreadsheet data without using the spreadsheet application program that produced it. Features of the Java language that successfully improve the running time performance of the algorithms are also described.
[ { "version": "v1", "created": "Fri, 31 Jan 2003 20:19:21 GMT" }, { "version": "v2", "created": "Mon, 9 Jun 2003 21:21:02 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Francoeur", "Joe", "" ] ]
cs/0302005
Vicky Choi
Vicky Choi and Martin Farach-Colton
Barnacle: An Assembly Algorithm for Clone-based Sequences of Whole Genomes
13 pages, 10 figures
null
null
null
cs.DS cs.DM q-bio
null
We propose an assembly algorithm {\sc Barnacle} for sequences generated by the clone-based approach. We illustrate our approach by assembling the human genome. Our novel method abandons the original physical-mapping-first framework. As we show, {\sc Barnacle} more effectively resolves conflicts due to repeated sequences. The latter is the main difficulty of the sequence assembly problem. Inaddition, we are able to detect inconsistencies in the underlying data. We present and compare our results on the December 2001 freeze of the public working draft of the human genome with NCBI's assembly (Build 28). The assembly of December 2001 freeze of the public working draft generated by {\sc Barnacle} and the source code of {\sc Barnacle} are available at (http://www.cs.rutgers.edu/~vchoi).
[ { "version": "v1", "created": "Mon, 3 Feb 2003 22:42:08 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Choi", "Vicky", "" ], [ "Farach-Colton", "Martin", "" ] ]
cs/0302009
Andrej Brodnik
Andrej Brodnik (1 and 2), Andreas Nilsson (2) ((1) IMFM, Ljubljana, Slovenia, (2) University of Technology, Lulea, Sweden)
Data Structure for a Time-Based Bandwidth Reservations Problem
null
null
null
null
cs.DS cs.NI
null
We discuss a problem of handling resource reservations. The resource can be reserved for some time, it can be freed or it can be queried what is the largest amount of reserved resource during a time interval. We show that the problem has a lower bound of $\Omega(\log n)$ per operation on average and we give a matching upper bound algorithm. Our solution also solves a dynamic version of the related problems of a prefix sum and a partial sum.
[ { "version": "v1", "created": "Thu, 6 Feb 2003 17:48:37 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Brodnik", "Andrej", "", "1 and 2" ], [ "Nilsson", "Andreas", "" ] ]
cs/0302011
Daniel A. Spielman
John Dunagan, Daniel A. Spielman, and Shang-Hua Teng
Smoothed Analysis of Interior-Point Algorithms: Condition Number
Fixed it up quite a bit
null
null
null
cs.DS cs.NA
null
We show that the smoothed complexity of the logarithm of Renegar's condition number is O(log (n/sigma)).
[ { "version": "v1", "created": "Mon, 10 Feb 2003 06:14:26 GMT" }, { "version": "v2", "created": "Fri, 17 Oct 2003 15:38:06 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Dunagan", "John", "" ], [ "Spielman", "Daniel A.", "" ], [ "Teng", "Shang-Hua", "" ] ]
cs/0302022
James Aspnes
James Aspnes, Zoe Diamadi, and Gauri Shah
Fault-tolerant routing in peer-to-peer systems
Full version of PODC 2002 paper. New version corrects missing conditioning in Lemma 9 and some related details in the proof of Theorem 10, with no changes to main results
null
null
null
cs.DS cs.DC
null
We consider the problem of designing an overlay network and routing mechanism that permits finding resources efficiently in a peer-to-peer system. We argue that many existing approaches to this problem can be modeled as the construction of a random graph embedded in a metric space whose points represent resource identifiers, where the probability of a connection between two nodes depends only on the distance between them in the metric space. We study the performance of a peer-to-peer system where nodes are embedded at grid points in a simple metric space: a one-dimensional real line. We prove upper and lower bounds on the message complexity of locating particular resources in such a system, under a variety of assumptions about failures of either nodes or the connections between them. Our lower bounds in particular show that the use of inverse power-law distributions in routing, as suggested by Kleinberg (1999), is close to optimal. We also give efficient heuristics to dynamically maintain such a system as new nodes arrive and old nodes depart. Finally, we give experimental results that suggest promising directions for future work.
[ { "version": "v1", "created": "Sat, 15 Feb 2003 17:15:46 GMT" }, { "version": "v2", "created": "Sun, 22 Jun 2003 18:22:59 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Aspnes", "James", "" ], [ "Diamadi", "Zoe", "" ], [ "Shah", "Gauri", "" ] ]
cs/0302030
David Eppstein
David Eppstein
The traveling salesman problem for cubic graphs
20 pages, 8 figures. A preliminary version of this paper appeared at the 8th Worksh. Algorithms and Data Structures, LNCS 2748, Springer-Verlag, 2003, pp. 307-318. This version generalizes an algorithm from the previous version, to generate all cycles instead of counting them. It also includes a derandomized version of the degree-four algorithm and an implementation of the cycle listing algorithm
J. Graph Algorithms and Applications 11(1):61-81, 2007
null
null
cs.DS
null
We show how to find a Hamiltonian cycle in a graph of degree at most three with n vertices, in time O(2^{n/3}) ~= 1.260^n and linear space. Our algorithm can find the minimum weight Hamiltonian cycle (traveling salesman problem), in the same time bound. We can also count or list all Hamiltonian cycles in a degree three graph in time O(2^{3n/8}) ~= 1.297^n. We also solve the traveling salesman problem in graphs of degree at most four, by randomized and deterministic algorithms with runtime O((27/4)^{n/3}) ~= 1.890^n and O((27/4+epsilon)^{n/3}) respectively. Our algorithms allow the input to specify a set of forced edges which must be part of any generated cycle. Our cycle listing algorithm shows that every degree three graph has O(2^{3n/8}) Hamiltonian cycles; we also exhibit a family of graphs with 2^{n/3} Hamiltonian cycles per graph.
[ { "version": "v1", "created": "Thu, 20 Feb 2003 06:36:35 GMT" }, { "version": "v2", "created": "Mon, 19 Apr 2004 23:32:38 GMT" } ]
"2007-06-14T00:00:00"
[ [ "Eppstein", "David", "" ] ]
cs/0303011
Wim H. Hesselink
Hui Gao, Jan Friso Groote, Wim H. Hesselink
Lock-free dynamic hash tables with open addressing
null
Distributed Computing 17 (2005) 21-42
null
null
cs.DC cs.DS
null
We present an efficient lock-free algorithm for parallel accessible hash tables with open addressing, which promises more robust performance and reliability than conventional lock-based implementations. ``Lock-free'' means that it is guaranteed that always at least one process completes its operation within a bounded number of steps. For a single processor architecture our solution is as efficient as sequential hash tables. On a multiprocessor architecture this is also the case when all processors have comparable speeds. The algorithm allows processors that have widely different speeds or come to a halt. It can easily be implemented using C-like languages and requires on average only constant time for insertion, deletion or accessing of elements. The algorithm allows the hash tables to grow and shrink when needed. Lock-free algorithms are hard to design correctly, even when apparently straightforward. Ensuring the correctness of the design at the earliest possible stage is a major challenge in any responsible system development. In view of the complexity of the algorithm, we turned to the interactive theorem prover PVS for mechanical support. We employ standard deductive verification techniques to prove around 200 invariance properties of our algorithm, and describe how this is achieved with the theorem prover PVS.
[ { "version": "v1", "created": "Tue, 18 Mar 2003 09:38:34 GMT" }, { "version": "v2", "created": "Tue, 13 Apr 2004 09:05:30 GMT" }, { "version": "v3", "created": "Wed, 28 Jul 2004 12:51:56 GMT" }, { "version": "v4", "created": "Wed, 27 Oct 2004 07:24:09 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Gao", "Hui", "" ], [ "Groote", "Jan Friso", "" ], [ "Hesselink", "Wim H.", "" ] ]
cs/0303022
Jean-Camille Birget
Dawei Hong, Jean-Camille Birget, Shushuang Man
Probabilistic behavior of hash tables
null
null
null
null
cs.DS cs.DB
null
We extend a result of Goldreich and Ron about estimating the collision probability of a hash function. Their estimate has a polynomial tail. We prove that when the load factor is greater than a certain constant, the estimator has a gaussian tail. As an application we find an estimate of an upper bound for the average search time in hashing with chaining, for a particular user (we allow the overall key distribution to be different from the key distribution of a particular user). The estimator has a gaussian tail.
[ { "version": "v1", "created": "Fri, 21 Mar 2003 17:25:15 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Hong", "Dawei", "" ], [ "Birget", "Jean-Camille", "" ], [ "Man", "Shushuang", "" ] ]
cs/0304005
Oded Regev
Oded Regev
Quantum Computation and Lattice Problems
null
null
null
null
cs.DS
null
We present the first explicit connection between quantum computation and lattice problems. Namely, we show a solution to the Unique Shortest Vector Problem (SVP) under the assumption that there exists an algorithm that solves the hidden subgroup problem on the dihedral group by coset sampling. Moreover, we solve the hidden subgroup problem on the dihedral group by using an average case subset sum routine. By combining the two results, we get a quantum reduction from $\Theta(n^{2.5})$-unique-SVP to the average case subset sum problem.
[ { "version": "v1", "created": "Tue, 1 Apr 2003 23:35:11 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Regev", "Oded", "" ] ]
cs/0304018
David Eppstein
David Eppstein
Quasiconvex Analysis of Backtracking Algorithms
12 pages, 2 figures. This revision includes a larger example recurrence and reports on a second implementation of the algorithm
null
null
null
cs.DS cs.CG math.CO
null
We consider a class of multivariate recurrences frequently arising in the worst case analysis of Davis-Putnam-style exponential time backtracking algorithms for NP-hard problems. We describe a technique for proving asymptotic upper bounds on these recurrences, by using a suitable weight function to reduce the problem to that of solving univariate linear recurrences; show how to use quasiconvex programming to determine the weight function yielding the smallest upper bound; and prove that the resulting upper bounds are within a polynomial factor of the true asymptotics of the recurrence. We develop and implement a multiple-gradient descent algorithm for the resulting quasiconvex programs, using a real-number arithmetic package for guaranteed accuracy of the computed worst case time bounds.
[ { "version": "v1", "created": "Thu, 10 Apr 2003 20:25:12 GMT" }, { "version": "v2", "created": "Wed, 9 Jul 2003 21:21:21 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Eppstein", "David", "" ] ]
cs/0305002
Marcus Hutter
Monaldo Mastrolilli and Marcus Hutter
Hybrid Rounding Techniques for Knapsack Problems
19 LaTeX pages
Discrete Applied Mathematics, 154:4 (2006) 640-649
10.1016/j.dam.2005.08.004
IDSIA-03-02
cs.CC cs.DM cs.DS
null
We address the classical knapsack problem and a variant in which an upper bound is imposed on the number of items that can be selected. We show that appropriate combinations of rounding techniques yield novel and powerful ways of rounding. As an application of these techniques, we present a linear-storage Polynomial Time Approximation Scheme (PTAS) and a Fully Polynomial Time Approximation Scheme (FPTAS) that compute an approximate solution, of any fixed accuracy, in linear time. This linear complexity bound gives a substantial improvement of the best previously known polynomial bounds.
[ { "version": "v1", "created": "Fri, 2 May 2003 20:40:20 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Mastrolilli", "Monaldo", "" ], [ "Hutter", "Marcus", "" ] ]
cs/0305005
Gianni Franceschini
Gianni Franceschini and Viliam Geffert
An In-Place Sorting with O(n log n) Comparisons and O(n) Moves
null
null
null
null
cs.DS cs.CC
null
We present the first in-place algorithm for sorting an array of size n that performs, in the worst case, at most O(n log n) element comparisons and O(n) element transports. This solves a long-standing open problem, stated explicitly, e.g., in [J.I. Munro and V. Raman, Sorting with minimum data movement, J. Algorithms, 13, 374-93, 1992], of whether there exists a sorting algorithm that matches the asymptotic lower bounds on all computational resources simultaneously.
[ { "version": "v1", "created": "Fri, 9 May 2003 14:56:07 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Franceschini", "Gianni", "" ], [ "Geffert", "Viliam", "" ] ]
cs/0306023
Daniel L. Wang
Adeyemi Adesanya, Jacek Becla, Daniel Wang
The Redesigned BaBar Event Store: Believe the Hype
Presented at the 2003 Computing in High Energy and Nuclear Physics (CHEP03), 5 pages, 2 ps figures, PSN TUKT008
null
null
SLAC-PUB-9893
cs.DB cs.DS
null
As the BaBar experiment progresses, it produces new and unforeseen requirements and increasing demands on capacity and feature base. The current system is being utilized well beyond its original design specifications, and has scaled appropriately, maintaining data consistency and durability. The persistent event storage system has remained largely unchanged since the initial implementation, and thus includes many design features which have become performance bottlenecks. Programming interfaces were designed before sufficient usage information became available. Performance and efficiency were traded off for added flexibility to cope with future demands. With significant experience in managing actual production data under our belt, we are now in a position to recraft the system to better suit current needs. The Event Store redesign is intended to eliminate redundant features while adding new ones, increase overall performance, and contain the physical storage cost of the world's largest database.
[ { "version": "v1", "created": "Wed, 4 Jun 2003 23:51:52 GMT" } ]
"2009-09-29T00:00:00"
[ [ "Adesanya", "Adeyemi", "" ], [ "Becla", "Jacek", "" ], [ "Wang", "Daniel", "" ] ]
cs/0306025
Jie Gao
Jie Gao, and Dianjun Wang
Permutation Generation: Two New Permutation Algorithms
7 pages, 4 figures
null
null
null
cs.DS cs.CC
null
Two completely new algorithms for generating permutations, shift-cursor algorithm and level algorithm, and their efficient implementations are presented in this paper. One implementation of the shift cursor algorithm gives an optimal solution of the permutation generation problem, and one implementation of the level algorithm can be used to generate random permutations.
[ { "version": "v1", "created": "Thu, 5 Jun 2003 11:49:22 GMT" }, { "version": "v2", "created": "Tue, 10 Jun 2003 03:20:45 GMT" }, { "version": "v3", "created": "Wed, 9 Jul 2003 13:25:43 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Gao", "Jie", "" ], [ "Wang", "Dianjun", "" ] ]
cs/0306043
James Aspnes
James Aspnes and Gauri Shah
Skip Graphs
36 pages, 12 figures. Full version of paper appearing in SODA 2003
null
null
null
cs.DS cs.DC
null
Skip graphs are a novel distributed data structure, based on skip lists, that provide the full functionality of a balanced tree in a distributed system where resources are stored in separate nodes that may fail at any time. They are designed for use in searching peer-to-peer systems, and by providing the ability to perform queries based on key ordering, they improve on existing search tools that provide only hash table functionality. Unlike skip lists or other tree data structures, skip graphs are highly resilient, tolerating a large fraction of failed nodes without losing connectivity. In addition, constructing, inserting new nodes into, searching a skip graph, and detecting and repairing errors in the data structure introduced by node failures can be done using simple and straightforward algorithms.
[ { "version": "v1", "created": "Tue, 10 Jun 2003 23:14:16 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Aspnes", "James", "" ], [ "Shah", "Gauri", "" ] ]
cs/0306044
James Aspnes
James Aspnes and Orli Waarts
Compositional competitiveness for distributed algorithms
33 pages, 2 figures; full version of STOC 96 paper titled "Modular competitiveness for distributed algorithms."
null
null
null
cs.DS cs.DC
null
We define a measure of competitive performance for distributed algorithms based on throughput, the number of tasks that an algorithm can carry out in a fixed amount of work. This new measure complements the latency measure of Ajtai et al., which measures how quickly an algorithm can finish tasks that start at specified times. The novel feature of the throughput measure, which distinguishes it from the latency measure, is that it is compositional: it supports a notion of algorithms that are competitive relative to a class of subroutines, with the property that an algorithm that is k-competitive relative to a class of subroutines, combined with an l-competitive member of that class, gives a combined algorithm that is kl-competitive. In particular, we prove the throughput-competitiveness of a class of algorithms for collect operations, in which each of a group of n processes obtains all values stored in an array of n registers. Collects are a fundamental building block of a wide variety of shared-memory distributed algorithms, and we show that several such algorithms are competitive relative to collects. Inserting a competitive collect in these algorithms gives the first examples of competitive distributed algorithms obtained by composition using a general construction.
[ { "version": "v1", "created": "Wed, 11 Jun 2003 03:13:50 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Aspnes", "James", "" ], [ "Waarts", "Orli", "" ] ]
cs/0306046
Sebastiano Vigna
Paolo Boldi and Sebastiano Vigna
Compact Approximation of Lattice Functions with Applications to Large-Alphabet Text Search
null
null
null
292-03
cs.DS
null
We propose a very simple randomised data structure that stores an approximation from above of a lattice-valued function. Computing the function value requires a constant number of steps, and the error probability can be balanced with space usage, much like in Bloom filters. The structure is particularly well suited for functions that are bottom on most of their domain. We then show how to use our methods to store in a compact way the bad-character shift function for variants of the Boyer-Moore text search algorithms. As a result, we obtain practical implementations of these algorithms that can be used with large alphabets, such as Unicode collation elements, with a small setup time. The ideas described in this paper have been implemented as free software under the GNU General Public License within the MG4J project (http://mg4j.dsi.unimi.it/).
[ { "version": "v1", "created": "Wed, 11 Jun 2003 09:13:39 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Boldi", "Paolo", "" ], [ "Vigna", "Sebastiano", "" ] ]
cs/0306104
Ely Porat
Yossi Matias and Ely Porat
Efficient pebbling for list traversal synopses
27 pages
null
null
null
cs.DS
null
We show how to support efficient back traversal in a unidirectional list, using small memory and with essentially no slowdown in forward steps. Using $O(\log n)$ memory for a list of size $n$, the $i$'th back-step from the farthest point reached so far takes $O(\log i)$ time in the worst case, while the overhead per forward step is at most $\epsilon$ for arbitrary small constant $\epsilon>0$. An arbitrary sequence of forward and back steps is allowed. A full trade-off between memory usage and time per back-step is presented: $k$ vs. $kn^{1/k}$ and vice versa. Our algorithms are based on a novel pebbling technique which moves pebbles on a virtual binary, or $t$-ary, tree that can only be traversed in a pre-order fashion. The compact data structures used by the pebbling algorithms, called list traversal synopses, extend to general directed graphs, and have other interesting applications, including memory efficient hash-chain implementation. Perhaps the most surprising application is in showing that for any program, arbitrary rollback steps can be efficiently supported with small overhead in memory, and marginal overhead in its ordinary execution. More concretely: Let $P$ be a program that runs for at most $T$ steps, using memory of size $M$. Then, at the cost of recording the input used by the program, and increasing the memory by a factor of $O(\log T)$ to $O(M \log T)$, the program $P$ can be extended to support an arbitrary sequence of forward execution and rollback steps: the $i$'th rollback step takes $O(\log i)$ time in the worst case, while forward steps take O(1) time in the worst case, and $1+\epsilon$ amortized time per step.
[ { "version": "v1", "created": "Mon, 16 Jun 2003 21:31:36 GMT" } ]
"2009-09-29T00:00:00"
[ [ "Matias", "Yossi", "" ], [ "Porat", "Ely", "" ] ]
cs/0306113
Farn Wang
Farn Wang
Symbolic Parametric Analysis of Embedded Systems with BDD-like Data-Structures
11 pages, 1 figure
null
null
null
cs.DS cs.LO
null
We use dense variable-ordering to define HRD (Hybrid-Restriction Diagram), a new BDD-like data-structure for the representation and manipulation of state-spaces of linear hybrid automata. We present and discuss various manipulation algorithms for HRD, including the basic set-oriented operations, weakest precondition calculation, and normalization. We implemented the ideas and experimented to see their performance. Finally, we have also developed a pruning technique for state-space exploration based on parameter valuation space characterization. The technique showed good promise in our experiment.
[ { "version": "v1", "created": "Thu, 19 Jun 2003 09:57:09 GMT" }, { "version": "v2", "created": "Mon, 27 Oct 2003 03:10:42 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Wang", "Farn", "" ] ]
cs/0306122
Richard Wheeldon
Richard Wheeldon and Mark Levene
The Best Trail Algorithm for Assisted Navigation of Web Sites
11 pages, 11 figures
null
null
null
cs.DS cs.IR
null
We present an algorithm called the Best Trail Algorithm, which helps solve the hypertext navigation problem by automating the construction of memex-like trails through the corpus. The algorithm performs a probabilistic best-first expansion of a set of navigation trees to find relevant and compact trails. We describe the implementation of the algorithm, scoring methods for trails, filtering algorithms and a new metric called \emph{potential gain} which measures the potential of a page for future navigation opportunities.
[ { "version": "v1", "created": "Sun, 22 Jun 2003 17:38:13 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Wheeldon", "Richard", "" ], [ "Levene", "Mark", "" ] ]
cs/0306123
Daniel Etzold
Daniel Etzold
Heuristic to reduce the complexity of complete bipartite graphs to accelerate the search for maximum weighted matchings with small error
5 pages, 2 figures
null
null
null
cs.DS
null
A maximum weighted matching for bipartite graphs $G=(A \cup B,E)$ can be found by using the algorithm of Edmonds and Karp with a Fibonacci Heap and a modified Dijkstra in $O(nm + n^2 \log{n})$ time where n is the number of nodes and m the number of edges. For the case that $|A|=|B|$ the number of edges is $n^2$ and therefore the complexity is $O(n^3)$. In this paper we want to present a simple heuristic method to reduce the number of edges of complete bipartite graphs $G=(A \cup B,E)$ with $|A|=|B|$ such that $m = n\log{n}$ and therefore the complexity of such that $m = n\log{n}$ and therefore the complexity of $O(n^2 \log{n})$. The weights of all edges in G must be uniformly distributed in [0,1].
[ { "version": "v1", "created": "Mon, 23 Jun 2003 19:37:42 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Etzold", "Daniel", "" ] ]
cs/0307005
Erik Demaine
Ilya Baran and Erik D. Demaine
Optimal Adaptive Algorithms for Finding the Nearest and Farthest Point on a Parametric Black-Box Curve
19 pages, 8 figures; v3 adds relative-error results; v2 adds description of related work in introduction
null
null
null
cs.CG cs.DS
null
We consider a general model for representing and manipulating parametric curves, in which a curve is specified by a black box mapping a parameter value between 0 and 1 to a point in Euclidean d-space. In this model, we consider the nearest-point-on-curve and farthest-point-on-curve problems: given a curve C and a point p, find a point on C nearest to p or farthest from p. In the general black-box model, no algorithm can solve these problems. Assuming a known bound on the speed of the curve (a Lipschitz condition), the answer can be estimated up to an additive error of epsilon using O(1/epsilon) samples, and this bound is tight in the worst case. However, many instances can be solved with substantially fewer samples, and we give algorithms that adapt to the inherent difficulty of the particular instance, up to a logarithmic factor. More precisely, if OPT(C,p,epsilon) is the minimum number of samples of C that every correct algorithm must perform to achieve tolerance epsilon, then our algorithm performs O(OPT(C,p,epsilon) log (epsilon^(-1)/OPT(C,p,epsilon))) samples. Furthermore, any algorithm requires Omega(k log (epsilon^(-1)/k)) samples for some instance C' with OPT(C',p,epsilon) = k; except that, for the nearest-point-on-curve problem when the distance between C and p is less than epsilon, OPT is 1 but the upper and lower bounds on the number of samples are both Theta(1/epsilon). When bounds on relative error are desired, we give algorithms that perform O(OPT log (2+(1+epsilon^(-1)) m^(-1)/OPT)) samples (where m is the exact minimum or maximum distance from p to C) and prove that Omega(OPT log (1/epsilon)) samples are necessary on some problem instances.
[ { "version": "v1", "created": "Thu, 3 Jul 2003 01:14:57 GMT" }, { "version": "v2", "created": "Wed, 17 Dec 2003 17:58:49 GMT" }, { "version": "v3", "created": "Thu, 10 Jun 2004 15:48:24 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Baran", "Ilya", "" ], [ "Demaine", "Erik D.", "" ] ]
cs/0307034
Pat Morin
Danny Krizanc, Pat Morin and Michiel Smid
Range Mode and Range Median Queries on Lists and Trees
12 pages, 6 figures
null
null
null
cs.DS
null
We consider algorithms for preprocessing labelled lists and trees so that, for any two nodes u and v we can answer queries of the form: What is the mode or median label in the sequence of labels on the path from u to v.
[ { "version": "v1", "created": "Sat, 12 Jul 2003 21:41:56 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Krizanc", "Danny", "" ], [ "Morin", "Pat", "" ], [ "Smid", "Michiel", "" ] ]
cs/0307043
Aravind Srinivasan
Aravind Srinivasan
An Extension of the Lovasz Local Lemma, and its Applications to Integer Programming
22 pages, preliminary version appeared in the SODA 1996 conference
null
null
null
cs.DS
null
The Lovasz Local Lemma due to Erdos and Lovasz is a powerful tool in proving the existence of rare events. We present an extension of this lemma, which works well when the event to be shown to exist is a conjunction of individual events, each of which asserts that a random variable does not deviate much from its mean. As applications, we consider two classes of NP-hard integer programs: minimax and covering integer programs. A key technique, randomized rounding of linear relaxations, was developed by Raghavan and Thompson to derive good approximation algorithms for such problems. We use our extension of the Local Lemma to prove that randomized rounding produces, with non-zero probability, much better feasible solutions than known before, if the constraint matrices of these integer programs are column-sparse (e.g., routing using short paths, problems on hypergraphs with small dimension/degree). This complements certain well-known results from discrepancy theory. We also generalize the method of pessimistic estimators due to Raghavan, to obtain constructive (algorithmic) versions of our results for covering integer programs.
[ { "version": "v1", "created": "Fri, 18 Jul 2003 04:02:18 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Srinivasan", "Aravind", "" ] ]
cs/0307062
Viviane Baladi
Viviane Baladi and Brigitte Vallee
Euclidean algorithms are Gaussian
fourth revised version - 2 figures - the strict convexity condition used has been clarified
null
null
null
cs.DS cs.CC
null
This study provides new results about the probabilistic behaviour of a class of Euclidean algorithms: the asymptotic distribution of a whole class of cost-parameters associated to these algorithms is normal. For the cost corresponding to the number of steps Hensley already has proved a Local Limit Theorem; we give a new proof, and extend his result to other euclidean algorithms and to a large class of digit costs, obtaining a faster, optimal, rate of convergence. The paper is based on the dynamical systems methodology, and the main tool is the transfer operator. In particular, we use recent results of Dolgopyat.
[ { "version": "v1", "created": "Mon, 28 Jul 2003 10:31:53 GMT" }, { "version": "v2", "created": "Tue, 9 Sep 2003 13:30:45 GMT" }, { "version": "v3", "created": "Fri, 24 Oct 2003 14:21:38 GMT" }, { "version": "v4", "created": "Wed, 5 May 2004 16:00:09 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Baladi", "Viviane", "" ], [ "Vallee", "Brigitte", "" ] ]
cs/0308004
Gene Cooperman
Gene Cooperman, Xiaoqin Ma and Viet Ha Nguyen
DPG: A Cache-Efficient Accelerator for Sorting and for Join Operators
12 pages, 11 figures
null
null
null
cs.DB cs.DS
null
We present a new algorithm for fast record retrieval, distribute-probe-gather, or DPG. DPG has important applications both in sorting and in joins. Current main memory sorting algorithms split their work into three phases: extraction of key-pointer pairs; sorting of the key-pointer pairs; and copying of the original records into the destination array according the sorted key-pointer pairs. The copying in the last phase dominates today's sorting time. Hence, the use of DPG in the third phase provides an accelerator for existing sorting algorithms. DPG also provides two new join methods for foreign key joins: DPG-move join and DPG-sort join. The resulting join methods with DPG are faster because DPG join is cache-efficient and at the same time DPG join avoids the need for sorting or for hashing. The ideas presented for foreign key join can also be extended to faster record pair retrieval for spatial and temporal databases.
[ { "version": "v1", "created": "Sat, 2 Aug 2003 08:13:06 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Cooperman", "Gene", "" ], [ "Ma", "Xiaoqin", "" ], [ "Nguyen", "Viet Ha", "" ] ]
cs/0308006
Sandor P. Fekete
Sandor P. Fekete and Ekkehard Koehler and Juergen Teich
Higher-Dimensional Packing with Order Constraints
23 pages, 14 figures, 5 tables, Latex; revision clarifies various minor points, fixes typos, etc. To appear in SIAM Journal on Discrete Mathematics
null
null
null
cs.DS cs.DM
null
We present a first exact study on higher-dimensional packing problems with order constraints. Problems of this type occur naturally in applications such as logistics or computer architecture and can be interpreted as higher-dimensional generalizations of scheduling problems. Using graph-theoretic structures to describe feasible solutions, we develop a novel exact branch-and-bound algorithm. This extends previous work by Fekete and Schepers; a key tool is a new order-theoretic characterization of feasible extensions of a partial order to a given complementarity graph that is tailor-made for use in a branch-and-bound environment. The usefulness of our approach is validated by computational results.
[ { "version": "v1", "created": "Mon, 4 Aug 2003 14:28:00 GMT" }, { "version": "v2", "created": "Thu, 28 Jul 2005 00:24:34 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Fekete", "Sandor P.", "" ], [ "Koehler", "Ekkehard", "" ], [ "Teich", "Juergen", "" ] ]
cs/0308011
Matjaz Zaversnik
V. Batagelj, M. Zaversnik
Short Cycles Connectivity
null
DISCRETE MATH 307 (3-5): 310-318 FEB 6 2007
null
null
cs.DS cs.DM
null
Short cycles connectivity is a generalization of ordinary connectivity. Instead by a path (sequence of edges), two vertices have to be connected by a sequence of short cycles, in which two adjacent cycles have at least one common vertex. If all adjacent cycles in the sequence share at least one edge, we talk about edge short cycles connectivity. It is shown that the short cycles connectivity is an equivalence relation on the set of vertices, while the edge short cycles connectivity components determine an equivalence relation on the set of edges. Efficient algorithms for determining equivalence classes are presented. Short cycles connectivity can be extended to directed graphs (cyclic and transitive connectivity). For further generalization we can also consider connectivity by small cliques or other families of graphs.
[ { "version": "v1", "created": "Tue, 5 Aug 2003 12:58:10 GMT" }, { "version": "v2", "created": "Wed, 10 Sep 2003 13:19:36 GMT" } ]
"2013-01-22T00:00:00"
[ [ "Batagelj", "V.", "" ], [ "Zaversnik", "M.", "" ] ]
cs/0308039
Andreas Schaale
Andreas Schaale, Carsten Wulf-Mathies, Soenke Lieberam-Schmidt
A new approach to relevancy in Internet searching - the "Vox Populi Algorithm"
9 pages Latex
null
null
null
cs.DS cond-mat.dis-nn cs.IR
null
In this paper we will derive a new algorithm for Internet searching. The main idea of this algorithm is to extend the existing algorithms by a component, which reflects the interests of the users more than existing methods. The "Vox Populi Algorithm" (VPA) creates a feedback from the users to the content of the search index. The information derived from the users query analysis is used to modify the existing crawling algorithms. The VPA controls the distribution of the resources of the crawler. Finally, we also discuss methods of suppressing unwanted content (spam).
[ { "version": "v1", "created": "Sat, 23 Aug 2003 13:34:25 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Schaale", "Andreas", "" ], [ "Wulf-Mathies", "Carsten", "" ], [ "Lieberam-Schmidt", "Soenke", "" ] ]
cs/0308041
Andrej Brodnik
Andrej Brodnik and Andreas Nilsson
Static Data Structure for Discrete Advance Bandwidth Reservations on the Internet
null
null
null
IMFM-(2003)-PS-889
cs.DS
null
In this paper we present a discrete data structure for reservations of limited resources. A reservation is defined as a tuple consisting of the time interval of when the resource should be reserved, $I_R$, and the amount of the resource that is reserved, $B_R$, formally $R=\{I_R,B_R\}$. The data structure is similar to a segment tree. The maximum spanning interval of the data structure is fixed and defined in advance. The granularity and thereby the size of the intervals of the leaves is also defined in advance. The data structure is built only once. Neither nodes nor leaves are ever inserted, deleted or moved. Hence, the running time of the operations does not depend on the number of reservations previously made. The running time does not depend on the size of the interval of the reservation either. Let $n$ be the number of leaves in the data structure. In the worst case, the number of touched (i.e. traversed) nodes is in any operation $O(\log n)$, hence the running time of any operation is also $O(\log n)$.
[ { "version": "v1", "created": "Sun, 24 Aug 2003 06:30:41 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Brodnik", "Andrej", "" ], [ "Nilsson", "Andreas", "" ] ]
cs/0308044
Grigorii Pivovarov
Grigorii Pivovarov and Sergei Trunov
EqRank: A Self-Consistent Equivalence Relation on Graph Vertexes
a kdd cup 2003 submission
null
null
null
cs.DS cs.DL
null
A new method of hierarchical clustering of graph vertexes is suggested. In the method, the graph partition is determined with an equivalence relation satisfying a recursive definition stating that vertexes are equivalent if the vertexes they point to (or vertexes pointing to them) are equivalent. Iterative application of the partitioning yields a hierarchical clustering of graph vertexes. The method is applied to the citation graph of hep-th. The outcome is a two-level classification scheme for the subject field presented in hep-th, and indexing of the papers from hep-th in this scheme. A number of tests show that the classification obtained is adequate.
[ { "version": "v1", "created": "Fri, 29 Aug 2003 13:20:03 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Pivovarov", "Grigorii", "" ], [ "Trunov", "Sergei", "" ] ]
cs/0309005
Aleksandar Stojmirovic
Aleksandar Stojmirovic and Vladimir Pestov
Indexing Schemes for Similarity Search In Datasets of Short Protein Fragments
34 pages, 12 figures, 4 tables - Timings for experiments added upon referees' request, and a number of less substantial modifications made
Information Systems 32 (2007), 1145-1165
null
null
cs.DS q-bio.BM
null
We propose a family of very efficient hierarchical indexing schemes for ungapped, score matrix-based similarity search in large datasets of short (4-12 amino acid) protein fragments. This type of similarity search has importance in both providing a building block to more complex algorithms and for possible use in direct biological investigations where datasets are of the order of 60 million objects. Our scheme is based on the internal geometry of the amino acid alphabet and performs exceptionally well, for example outputting 100 nearest neighbours to any possible fragment of length 10 after scanning on average less than one per cent of the entire dataset.
[ { "version": "v1", "created": "Fri, 5 Sep 2003 22:59:40 GMT" }, { "version": "v2", "created": "Sat, 14 Jan 2006 00:45:57 GMT" }, { "version": "v3", "created": "Tue, 11 Jul 2006 17:30:29 GMT" }, { "version": "v4", "created": "Fri, 9 Feb 2007 02:33:56 GMT" } ]
"2007-09-04T00:00:00"
[ [ "Stojmirovic", "Aleksandar", "" ], [ "Pestov", "Vladimir", "" ] ]
cs/0309014
Sandor P. Fekete
Esther M. Arkin, Michael A. Bender, Erik D. Demaine, Sandor P. Fekete, Joseph S. B. Mitchell, and Saurabh Sethia
Optimal Covering Tours with Turn Costs
36 pages, 19 figures, 2 tables, Latex; to appear in SIAM Journal on Computing. New version contains more technical details in Sections 4.1, 5.1, 5.2, 5.5, four more figures, four more pages, as well as numerous smaller changes
null
null
null
cs.DS cs.CG
null
We give the first algorithmic study of a class of ``covering tour'' problems related to the geometric Traveling Salesman Problem: Find a polygonal tour for a cutter so that it sweeps out a specified region (``pocket''), in order to minimize a cost that depends mainly on the number of em turns. These problems arise naturally in manufacturing applications of computational geometry to automatic tool path generation and automatic inspection systems, as well as arc routing (``postman'') problems with turn penalties. We prove the NP-completeness of minimum-turn milling and give efficient approximation algorithms for several natural versions of the problem, including a polynomial-time approximation scheme based on a novel adaptation of the m-guillotine method.
[ { "version": "v1", "created": "Tue, 9 Sep 2003 20:16:30 GMT" }, { "version": "v2", "created": "Tue, 21 Jun 2005 08:25:48 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Arkin", "Esther M.", "" ], [ "Bender", "Michael A.", "" ], [ "Demaine", "Erik D.", "" ], [ "Fekete", "Sandor P.", "" ], [ "Mitchell", "Joseph S. B.", "" ], [ "Sethia", "Saurabh", "" ] ]
cs/0309016
Liam Wagner
Stuart McDonald and Liam Wagner
Using Simulated Annealing to Calculate the Trembles of Trembling Hand Perfection
To appear in the Proceedings of IEEE Congress on Evolutionary Computation 2003 (CEC'03)
Proceedings of IEEE Congress on Evolutionary Computation 2003, vol.4, pp. 2482-2489
null
null
cs.GT cs.CC cs.DS cs.LG cs.NE q-bio.PE
null
Within the literature on non-cooperative game theory, there have been a number of attempts to propose logorithms which will compute Nash equilibria. Rather than derive a new algorithm, this paper shows that the family of algorithms known as Markov chain Monte Carlo (MCMC) can be used to calculate Nash equilibria. MCMC is a type of Monte Carlo simulation that relies on Markov chains to ensure its regularity conditions. MCMC has been widely used throughout the statistics and optimization literature, where variants of this algorithm are known as simulated annealing. This paper shows that there is interesting connection between the trembles that underlie the functioning of this algorithm and the type of Nash refinement known as trembling hand perfection.
[ { "version": "v1", "created": "Wed, 10 Sep 2003 15:11:44 GMT" } ]
"2007-05-23T00:00:00"
[ [ "McDonald", "Stuart", "" ], [ "Wagner", "Liam", "" ] ]
cs/0309023
Vladimir Batagelj
Vladimir Batagelj (University of Ljubljana, Slovenia)
Efficient Algorithms for Citation Network Analysis
null
inside the book: V. Batagelj, P. Doreian, A. Ferligoj, N. Kej\v{z}ar: Understanding Large Temporal Networks and Spatial Networks. Wiley, 2014. ISBN: 978-0-470-71452-2
null
IMFM 897
cs.DL cs.DM cs.DS
null
In the paper very efficient, linear in number of arcs, algorithms for determining Hummon and Doreian's arc weights SPLC and SPNP in citation network are proposed, and some theoretical properties of these weights are presented. The nonacyclicity problem in citation networks is discussed. An approach to identify on the basis of arc weights an important small subnetwork is proposed and illustrated on the citation networks of SOM (self organizing maps) literature and US patents.
[ { "version": "v1", "created": "Sun, 14 Sep 2003 03:53:49 GMT" } ]
"2015-05-07T00:00:00"
[ [ "Batagelj", "Vladimir", "", "University of Ljubljana, Slovenia" ] ]
cs/0309033
Pranab Sen
Pranab Sen and S. Venkatesh
Lower bounds for predecessor searching in the cell probe model
Journal version of a paper at ICALP 2001 (quant-ph/0104100) and a paper at CCC 2003. 27 pages
null
null
null
cs.CC cs.DS quant-ph
null
We consider a fundamental problem in data structures, static predecessor searching: Given a subset S of size n from the universe [m], store S so that queries of the form "What is the predecessor of x in S?" can be answered efficiently. We study this problem in the cell probe model introduced by Yao. Recently, Beame and Fich obtained optimal bounds on the number of probes needed by any deterministic query scheme if the associated storage scheme uses only n^{O(1)} cells of word size (\log m)^{O(1)} bits. We give a new lower bound proof for this problem that matches the bounds of Beame and Fich. Our lower bound proof has the following advantages: it works for randomised query schemes too, while Beame and Fich's proof works for deterministic query schemes only. It also extends to `quantum address-only' query schemes that we define in this paper, and is simpler than Beame and Fich's proof. We prove our lower bound using the round elimination approach of Miltersen, Nisan, Safra and Wigderson. Using tools from information theory, we prove a strong round elimination lemma for communication complexity that enables us to obtain a tight lower bound for the predecessor problem. Our strong round elimination lemma also extends to quantum communication complexity. We also use our round elimination lemma to obtain a rounds versus communication tradeoff for the `greater-than' problem, improving on the tradeoff in Miltersen et al. We believe that our round elimination lemma is of independent interest and should have other applications.
[ { "version": "v1", "created": "Wed, 17 Sep 2003 19:14:05 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Sen", "Pranab", "" ], [ "Venkatesh", "S.", "" ] ]
cs/0309043
Valmir Barbosa
A. H. L. Porto, V. C. Barbosa
Finding approximate palindromes in strings
null
Pattern Recognition 35 (2002), 2581-2591
10.1016/S0031-3203(01)00179-0
null
cs.DS
null
We introduce a novel definition of approximate palindromes in strings, and provide an algorithm to find all maximal approximate palindromes in a string with up to $k$ errors. Our definition is based on the usual edit operations of approximate pattern matching, and the algorithm we give, for a string of size $n$ on a fixed alphabet, runs in $O(k^2 n)$ time. We also discuss two implementation-related improvements to the algorithm, and demonstrate their efficacy in practice by means of both experiments and an average-case analysis.
[ { "version": "v1", "created": "Tue, 23 Sep 2003 13:45:48 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Porto", "A. H. L.", "" ], [ "Barbosa", "V. C.", "" ] ]
cs/0310003
Darin Goldstein
Darin Goldstein and Nick Meyer
The Wake Up and Report Problem is Time-Equivalent to the Firing Squad Synchronization Problem
13 pages, 4 figures, in Symposium on Discrete Algorithms, (SODA) pp. 578-587, January 6-8, 2002 (journal version to appear in the Journal of Distributed Computing)
null
null
null
cs.DC cs.DS
null
We consider several problems relating to strongly-connected directed networks of identical finite-state processors that work synchronously in discrete time steps. The conceptually simplest of these is the Wake Up and Report Problem; this is the problem of having a unique "root" processor send a signal to all other processors in the network and then enter a special "done" state only when all other processors have received the signal. The most difficult of the problems we consider is the classic Firing Squad Synchronization Problem; this is the much-studied problem of achieving macro-synchronization in a network given micro-synchronization. We show via a complex algorithmic application of the "snake" data structure first introduced in Even, Litman, and Winkler [ELW], that these two problems are asymptotically time-equivalent up to a constant factor. This result leads immediately to the inclusion of several other related problems into this new asymptotic time-class.
[ { "version": "v1", "created": "Sun, 5 Oct 2003 18:27:22 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Goldstein", "Darin", "" ], [ "Meyer", "Nick", "" ] ]
cs/0310004
Darin Goldstein
Darin Goldstein
Determination of the Topology of a Directed Network
9 pages, no figures, accepted to appear in IPDPS 2002 (unable to attend), (journal version to appear in Information Processing Letters)
null
null
null
cs.DC cs.DS
null
We consider strongly-connected directed networks of identical synchronous, finite-state processors with in- and out-degree uniformly bounded by a network constant. Via a straightforward extension of Ostrovsky and Wilkerson's Backwards Communication Algorithm in [OW], we exhibit a protocol which solves the Global Topology Determination Problem, the problem of having the root processor map the global topology of a network of unknown size and topology, with running time O(ND) where N represents the number of processors and D represents the diameter of the network. A simple counting argument suffices to show that the Global Topology Determination Problem has time-complexity Omega(N logN) which makes the protocol presented asymptotically time-optimal for many large networks.
[ { "version": "v1", "created": "Sun, 5 Oct 2003 18:41:16 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Goldstein", "Darin", "" ] ]
cs/0310019
Koskas Michel
Michel Koskas
A hierarchical Algorithm to Solve the Shortest Path Problem in Valued Graphs
18 pages, 5 figures
null
null
null
cs.DS cs.DM
null
This paper details a new algorithm to solve the shortest path problem in valued graphs. Its complexity is $O(D \log v)$ where $D$ is the graph diameter and $v$ its number of vertices. This complexity has to be compared to the one of the Dijkstra's algorithm, which is $O(e\log v)$ where $e$ is the number of edges of the graph. This new algorithm lies on a hierarchical representation of the graph, using radix trees. The performances of this algorithm show a major improvement over the ones of the algorithms known up to now.
[ { "version": "v1", "created": "Fri, 10 Oct 2003 18:01:25 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Koskas", "Michel", "" ] ]
cs/0310022
Daniel A. Spielman
Arvind Sankar, Daniel A. Spielman, Shang-Hua Teng
Smoothed Analysis of the Condition Numbers and Growth Factors of Matrices
corrected some minor mistakes
null
null
null
cs.NA cs.DS
null
Let $\orig{A}$ be any matrix and let $A$ be a slight random perturbation of $\orig{A}$. We prove that it is unlikely that $A$ has large condition number. Using this result, we prove it is unlikely that $A$ has large growth factor under Gaussian elimination without pivoting. By combining these results, we bound the smoothed precision needed by Gaussian elimination without pivoting. Our results improve the average-case analysis of Gaussian elimination without pivoting performed by Yeung and Chan (SIAM J. Matrix Anal. Appl., 1997).
[ { "version": "v1", "created": "Sun, 12 Oct 2003 04:06:09 GMT" }, { "version": "v2", "created": "Tue, 14 Oct 2003 19:29:06 GMT" }, { "version": "v3", "created": "Mon, 21 Mar 2005 20:18:49 GMT" }, { "version": "v4", "created": "Mon, 21 Nov 2005 15:39:14 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Sankar", "Arvind", "" ], [ "Spielman", "Daniel A.", "" ], [ "Teng", "Shang-Hua", "" ] ]
cs/0310027
Sandor P. Fekete
Sandor P. Fekete and Joseph S.B. Mitchell and Karin Beurer
On the continuous Fermat-Weber problem
28 pages, 18 figures, Latex, to appear in Operations Research, extended abstract version appeared in SoCG 2000
null
null
null
cs.CG cs.DS
null
We give the first exact algorithmic study of facility location problems that deal with finding a median for a continuum of demand points. In particular, we consider versions of the ``continuous k-median (Fermat-Weber) problem'' where the goal is to select one or more center points that minimize the average distance to a set of points in a demand region. In such problems, the average is computed as an integral over the relevant region, versus the usual discrete sum of distances. The resulting facility location problems are inherently geometric, requiring analysis techniques of computational geometry. We provide polynomial-time algorithms for various versions of the L1 1-median (Fermat-Weber) problem. We also consider the multiple-center version of the L1 k-median problem, which we prove is NP-hard for large k.
[ { "version": "v1", "created": "Wed, 15 Oct 2003 15:59:30 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Fekete", "Sandor P.", "" ], [ "Mitchell", "Joseph S. B.", "" ], [ "Beurer", "Karin", "" ] ]
cs/0310032
Sandor P. Fekete
Sandor P. Fekete and Joerg Schepers
A combinatorial characterization of higher-dimensional orthogonal packing
21 pages, 8 figures, Latex, to appear in Mathematics of Operations Research
null
null
null
cs.DS cs.CG
null
Higher-dimensional orthogonal packing problems have a wide range of practical applications, including packing, cutting, and scheduling. Previous efforts for exact algorithms have been unable to avoid structural problems that appear for instances in two- or higher-dimensional space. We present a new approach for modeling packings, using a graph-theoretical characterization of feasible packings. Our characterization allows it to deal with classes of packings that share a certain combinatorial structure, instead of having to consider one packing at a time. In addition, we can make use of elegant algorithmic properties of certain classes of graphs. This allows our characterization to be the basis for a successful branch-and-bound framework. This is the first in a series of papers describing new approaches to higher-dimensional packing.
[ { "version": "v1", "created": "Thu, 16 Oct 2003 08:27:08 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Fekete", "Sandor P.", "" ], [ "Schepers", "Joerg", "" ] ]
cs/0310034
Sandor P. Fekete
Sandor P. Fekete and Marco Luebbecke and Henk Meijer
Minimizing the stabbing number of matchings, trees, and triangulations
25 pages, 12 figures, Latex. To appear in "Discrete and Computational Geometry". Previous version (extended abstract) appears in SODA 2004, pp. 430-439
null
10.1007/s00454-008-9114-6
null
cs.CG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The (axis-parallel) stabbing number of a given set of line segments is the maximum number of segments that can be intersected by any one (axis-parallel) line. This paper deals with finding perfect matchings, spanning trees, or triangulations of minimum stabbing number for a given set of points. The complexity of these problems has been a long-standing open question; in fact, it is one of the original 30 outstanding open problems in computational geometry on the list by Demaine, Mitchell, and O'Rourke. The answer we provide is negative for a number of minimum stabbing problems by showing them NP-hard by means of a general proof technique. It implies non-trivial lower bounds on the approximability. On the positive side we propose a cut-based integer programming formulation for minimizing the stabbing number of matchings and spanning trees. We obtain lower bounds (in polynomial time) from the corresponding linear programming relaxations, and show that an optimal fractional solution always contains an edge of at least constant weight. This result constitutes a crucial step towards a constant-factor approximation via an iterated rounding scheme. In computational experiments we demonstrate that our approach allows for actually solving problems with up to several hundred points optimally or near-optimally.
[ { "version": "v1", "created": "Thu, 16 Oct 2003 14:01:32 GMT" }, { "version": "v2", "created": "Wed, 7 Sep 2005 12:20:58 GMT" }, { "version": "v3", "created": "Fri, 5 Sep 2008 17:02:14 GMT" } ]
"2008-09-05T00:00:00"
[ [ "Fekete", "Sandor P.", "" ], [ "Luebbecke", "Marco", "" ], [ "Meijer", "Henk", "" ] ]
cs/0310036
Daniel A. Spielman
Daniel A. Spielman and Shang-Hua Teng
Solving Sparse, Symmetric, Diagonally-Dominant Linear Systems in Time $O (m^{1.31})$
fixed a typo on page 9
null
null
null
cs.DS cs.NA
null
We present a linear-system solver that, given an $n$-by-$n$ symmetric positive semi-definite, diagonally dominant matrix $A$ with $m$ non-zero entries and an $n$-vector $\bb $, produces a vector $\xxt$ within relative distance $\epsilon$ of the solution to $A \xx = \bb$ in time $O (m^{1.31} \log (n \kappa_{f} (A)/\epsilon)^{O (1)})$, where $\kappa_{f} (A)$ is the log of the ratio of the largest to smallest non-zero eigenvalue of $A$. In particular, $\log (\kappa_{f} (A)) = O (b \log n)$, where $b$ is the logarithm of the ratio of the largest to smallest non-zero entry of $A$. If the graph of $A$ has genus $m^{2\theta}$ or does not have a $K_{m^{\theta}} $ minor, then the exponent of $m$ can be improved to the minimum of $1 + 5 \theta $ and $(9/8) (1+\theta)$. The key contribution of our work is an extension of Vaidya's techniques for constructing and analyzing combinatorial preconditioners.
[ { "version": "v1", "created": "Fri, 17 Oct 2003 15:43:01 GMT" }, { "version": "v2", "created": "Wed, 31 Mar 2004 22:28:12 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Spielman", "Daniel A.", "" ], [ "Teng", "Shang-Hua", "" ] ]
cs/0310037
Sandor P. Fekete
Sandor P. Fekete and Henk Meijer
Maximum dispersion and geometric maximum weight cliques
13 pages, 1 figure, Latex, to appear in Algorithmica
Algorithmica, 38 (3) 2004, 501-511.
null
null
cs.DS cs.CG
null
We consider a facility location problem, where the objective is to ``disperse'' a number of facilities, i.e., select a given number k of locations from a discrete set of n candidates, such that the average distance between selected locations is maximized. In particular, we present algorithmic results for the case where vertices are represented by points in d-dimensional space, and edge weights correspond to rectilinear distances. Problems of this type have been considered before, with the best result being an approximation algorithm with performance ratio 2. For the case where k is fixed, we establish a linear-time algorithm that finds an optimal solution. For the case where k is part of the input, we present a polynomial-time approximation scheme.
[ { "version": "v1", "created": "Fri, 17 Oct 2003 15:48:46 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Fekete", "Sandor P.", "" ], [ "Meijer", "Henk", "" ] ]
cs/0310049
Matjaz Zaversnik
V. Batagelj and M. Zaversnik
An O(m) Algorithm for Cores Decomposition of Networks
null
Advances in Data Analysis and Classification, 2011. Volume 5, Number 2, 129-145
null
null
cs.DS cs.DM
null
The structure of large networks can be revealed by partitioning them to smaller parts, which are easier to handle. One of such decompositions is based on $k$--cores, proposed in 1983 by Seidman. In the paper an efficient, $O(m)$, $m$ is the number of lines, algorithm for determining the cores decomposition of a given network is presented.
[ { "version": "v1", "created": "Sat, 25 Oct 2003 16:03:58 GMT" } ]
"2013-01-22T00:00:00"
[ [ "Batagelj", "V.", "" ], [ "Zaversnik", "M.", "" ] ]
cs/0310051
Daniel A. Spielman
Daniel A. Spielman and Shang-Hua Teng
Nearly-Linear Time Algorithms for Graph Partitioning, Graph Sparsification, and Solving Linear Systems
withdrawn by author
null
null
null
cs.DS cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper has been divided into three papers. arXiv:0809.3232, arXiv:0808.4134, arXiv:cs/0607105
[ { "version": "v1", "created": "Tue, 28 Oct 2003 09:23:25 GMT" }, { "version": "v10", "created": "Fri, 19 Sep 2008 14:33:26 GMT" }, { "version": "v2", "created": "Sat, 1 Nov 2003 01:43:10 GMT" }, { "version": "v3", "created": "Mon, 17 Nov 2003 19:48:14 GMT" }, { "version": "v4", "created": "Mon, 24 Nov 2003 02:41:36 GMT" }, { "version": "v5", "created": "Wed, 3 Dec 2003 02:58:55 GMT" }, { "version": "v6", "created": "Thu, 4 Dec 2003 04:17:12 GMT" }, { "version": "v7", "created": "Sat, 6 Dec 2003 21:43:47 GMT" }, { "version": "v8", "created": "Wed, 25 Feb 2004 20:06:50 GMT" }, { "version": "v9", "created": "Thu, 11 Mar 2004 21:44:00 GMT" } ]
"2009-09-29T00:00:00"
[ [ "Spielman", "Daniel A.", "" ], [ "Teng", "Shang-Hua", "" ] ]
cs/0310065
Mikkel Thorup
Stephen Alstrup, Jacob Holm, Kristian de Lichtenberg, Mikkel Thorup
Maintaining Information in Fully-Dynamic Trees with Top Trees
Preliminary versions of this work presented at ICALP'97 and SWAT'00. The new version takes layered top trees into account
null
null
null
cs.DS
null
We introduce top trees as a design of a new simpler interface for data structures maintaining information in a fully-dynamic forest. We demonstrate how easy and versatile they are to use on a host of different applications. For example, we show how to maintain the diameter, center, and median of each tree in the forest. The forest can be updated by insertion and deletion of edges and by changes to vertex and edge weights. Each update is supported in O(log n) time, where n is the size of the tree(s) involved in the update. Also, we show how to support nearest common ancestor queries and level ancestor queries with respect to arbitrary roots in O(log n) time. Finally, with marked and unmarked vertices, we show how to compute distances to a nearest marked vertex. The later has applications to approximate nearest marked vertex in general graphs, and thereby to static optimization problems over shortest path metrics. Technically speaking, top trees are easily implemented either with Frederickson's topology trees [Ambivalent Data Structures for Dynamic 2-Edge-Connectivity and k Smallest Spanning Trees, SIAM J. Comput. 26 (2) pp. 484-538, 1997] or with Sleator and Tarjan's dynamic trees [A Data Structure for Dynamic Trees. J. Comput. Syst. Sc. 26 (3) pp. 362-391, 1983]. However, we claim that the interface is simpler for many applications, and indeed our new bounds are quadratic improvements over previous bounds where they exist.
[ { "version": "v1", "created": "Fri, 31 Oct 2003 18:37:47 GMT" }, { "version": "v2", "created": "Fri, 21 Nov 2003 21:09:18 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Alstrup", "Stephen", "" ], [ "Holm", "Jacob", "" ], [ "de Lichtenberg", "Kristian", "" ], [ "Thorup", "Mikkel", "" ] ]
cs/0311018
Carla Piazza
Carla Piazza (1) and Alberto Policriti (2) ((1) Universita' Ca' Foscari di Venezia (2) Universita' degli Studi di Udine)
Ackermann Encoding, Bisimulations, and OBDDs
To appear on 'Theory and Practice of Logic Programming'
null
null
null
cs.LO cs.DS
null
We propose an alternative way to represent graphs via OBDDs based on the observation that a partition of the graph nodes allows sharing among the employed OBDDs. In the second part of the paper we present a method to compute at the same time the quotient w.r.t. the maximum bisimulation and the OBDD representation of a given graph. The proposed computation is based on an OBDD-rewriting of the notion of Ackermann encoding of hereditarily finite sets into natural numbers.
[ { "version": "v1", "created": "Sun, 16 Nov 2003 19:30:28 GMT" } ]
"2009-09-29T00:00:00"
[ [ "Piazza", "Carla", "" ], [ "Policriti", "Alberto", "" ] ]
cs/0311020
Hsueh-I. Lu
Kai-min Chung and Hsueh-I Lu
An Optimal Algorithm for the Maximum-Density Segment Problem
15 pages, 12 figures, an early version of this paper was presented at 11th Annual European Symposium on Algorithms (ESA 2003), Budapest, Hungary, September 15-20, 2003
SIAM Journal on Computing, 34(2):373-387, 2004
10.1137/S0097539704440430
null
cs.DS cs.DM
null
We address a fundamental problem arising from analysis of biomolecular sequences. The input consists of two numbers $w_{\min}$ and $w_{\max}$ and a sequence $S$ of $n$ number pairs $(a_i,w_i)$ with $w_i>0$. Let {\em segment} $S(i,j)$ of $S$ be the consecutive subsequence of $S$ between indices $i$ and $j$. The {\em density} of $S(i,j)$ is $d(i,j)=(a_i+a_{i+1}+...+a_j)/(w_i+w_{i+1}+...+w_j)$. The {\em maximum-density segment problem} is to find a maximum-density segment over all segments $S(i,j)$ with $w_{\min}\leq w_i+w_{i+1}+...+w_j \leq w_{\max}$. The best previously known algorithm for the problem, due to Goldwasser, Kao, and Lu, runs in $O(n\log(w_{\max}-w_{\min}+1))$ time. In the present paper, we solve the problem in O(n) time. Our approach bypasses the complicated {\em right-skew decomposition}, introduced by Lin, Jiang, and Chao. As a result, our algorithm has the capability to process the input sequence in an online manner, which is an important feature for dealing with genome-scale sequences. Moreover, for a type of input sequences $S$ representable in $O(m)$ space, we show how to exploit the sparsity of $S$ and solve the maximum-density segment problem for $S$ in $O(m)$ time.
[ { "version": "v1", "created": "Mon, 17 Nov 2003 09:37:57 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Chung", "Kai-min", "" ], [ "Lu", "Hsueh-I", "" ] ]
cs/0311030
Zoe Abrams
Zoe Abrams, Ashish Goel, Serge Plotkin
Set K-Cover Algorithms for Energy Efficient Monitoring in Wireless Sensor Networks
null
null
null
null
cs.DS
null
Wireless sensor networks (WSNs) are emerging as an effective means for environment monitoring. This paper investigates a strategy for energy efficient monitoring in WSNs that partitions the sensors into covers, and then activates the covers iteratively in a round-robin fashion. This approach takes advantage of the overlap created when many sensors monitor a single area. Our work builds upon previous work in "Power Efficient Organization of Wireless Sensor Networks" by Slijepcevic and Potkonjak, where the model is first formulated. We have designed three approximation algorithms for a variation of the SET K-COVER problem, where the objective is to partition the sensors into covers such that the number of covers that include an area, summed over all areas, is maximized. The first algorithm is randomized and partitions the sensors, in expectation, within a fraction 1 - 1/e (~.63) of the optimum. We present two other deterministic approximation algorithms. One is a distributed greedy algorithm with a 1/2 approximation ratio and the other is a centralized greedy algorithm with a 1 - 1/e approximation ratio. We show that it is NP-Complete to guarantee better than 15/16 of the optimal coverage, indicating that all three algorithms perform well with respect to the best approximation algorithm possible. Simulations indicate that in practice, the deterministic algorithms perform far above their worst case bounds, consistently covering more than 72% of what is covered by an optimum solution. Simulations also indicate that the increase in longevity is proportional to the amount of overlap amongst the sensors. The algorithms are fast, easy to use, and according to simulations, significantly increase the longevity of sensor networks. The randomized algorithm in particular seems quite practical.
[ { "version": "v1", "created": "Thu, 20 Nov 2003 22:47:11 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Abrams", "Zoe", "" ], [ "Goel", "Ashish", "" ], [ "Plotkin", "Serge", "" ] ]
cs/0312011
Giorgio Parisi
Giorgio Parisi
Constraint Optimization and Statistical Mechanics
22 pages, 1 figure Lectures given at the Varenna summer school
null
null
null
cs.CC cond-mat.dis-nn cs.DS
null
In these lectures I will present an introduction to the results that have been recently obtained in constraint optimization of random problems using statistical mechanics techniques. After presenting the general results, in order to simplify the presentation I will describe in details only the problems related to the coloring of a random graph.
[ { "version": "v1", "created": "Fri, 5 Dec 2003 16:46:59 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Parisi", "Giorgio", "" ] ]
cs/0312054
Krzysztof C. Kiwiel
Krzysztof C. Kiwiel
Partitioning schemes for quicksort and quickselect
21 pages
null
null
PMMO-03-01
cs.DS
null
We introduce several modifications of the partitioning schemes used in Hoare's quicksort and quickselect algorithms, including ternary schemes which identify keys less or greater than the pivot. We give estimates for the numbers of swaps made by each scheme. Our computational experiments indicate that ternary schemes allow quickselect to identify all keys equal to the selected key at little additional cost.
[ { "version": "v1", "created": "Tue, 23 Dec 2003 03:47:55 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Kiwiel", "Krzysztof C.", "" ] ]
cs/0312055
Krzysztof C. Kiwiel
Krzysztof C. Kiwiel
Randomized selection with quintary partitions
21 pages
null
null
PMMO-03-02
cs.DS
null
We show that several versions of Floyd and Rivest's algorithm Select for finding the $k$th smallest of $n$ elements require at most $n+\min\{k,n-k\}+o(n)$ comparisons on average and with high probability. This rectifies the analysis of Floyd and Rivest, and extends it to the case of nondistinct elements. Our computational results confirm that Select may be the best algorithm in practice.
[ { "version": "v1", "created": "Tue, 23 Dec 2003 04:12:30 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Kiwiel", "Krzysztof C.", "" ] ]
cs/0401001
Johan Bollen
Terry L. Harrison, Aravind Elango, Johan Bollen and Michael Nelson
Initial Experiences Re-Exporting Duplicate and Similarity Computation with an OAI-PMH aggregator
10 pages
null
null
null
cs.DL cs.DS
null
The proliferation of the Open Archive Initiative Protocol for Metadata Harvesting (OAI-PMH) has resulted in the creation of a large number of service providers, all harvesting from either data providers or aggregators. If data were available regarding the similarity of metadata records, service providers could track redundant records across harvests from multiple sources as well as provide additional end-user services. Due to the large number of metadata formats and the diverse mapping strategies employed by data providers, similarity calculation requirements necessitate the use of information retrieval strategies. We describe an OAI-PMH aggregator implementation that uses the optional ``<about>'' container to re-export the results of similarity calculations. Metadata records (3751) were harvested from a NASA data provider and similarities for the records were computed. The results were useful for detecting duplicates, similarities and metadata errors.
[ { "version": "v1", "created": "Mon, 5 Jan 2004 05:41:12 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Harrison", "Terry L.", "" ], [ "Elango", "Aravind", "" ], [ "Bollen", "Johan", "" ], [ "Nelson", "Michael", "" ] ]
cs/0401003
Krzysztof C. Kiwiel
Krzysztof C. Kiwiel
Randomized selection with tripartitioning
19 pages
null
null
PMMO-04-01
cs.DS
null
We show that several versions of Floyd and Rivest's algorithm Select [Comm.\ ACM {\bf 18} (1975) 173] for finding the $k$th smallest of $n$ elements require at most $n+\min\{k,n-k\}+o(n)$ comparisons on average, even when equal elements occur. This parallels our recent analysis of another variant due to Floyd and Rivest [Comm. ACM {\bf 18} (1975) 165--172]. Our computational results suggest that both variants perform well in practice, and may compete with other selection methods, such as Hoare's Find or quickselect with median-of-3 pivots.
[ { "version": "v1", "created": "Sun, 4 Jan 2004 05:29:58 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Kiwiel", "Krzysztof C.", "" ] ]
cs/0401011
Remi Monasson
Simona Cocco, Remi Monasson
Heuristic average-case analysis of the backtrack resolution of random 3-Satisfiability instances
to appear in Theoretical Computer Science
Theoretical Computer Science (2004) A 320, 345
null
null
cs.DS cond-mat.stat-mech cs.CC
null
An analysis of the average-case complexity of solving random 3-Satisfiability (SAT) instances with backtrack algorithms is presented. We first interpret previous rigorous works in a unifying framework based on the statistical physics notions of dynamical trajectories, phase diagram and growth process. It is argued that, under the action of the Davis--Putnam--Loveland--Logemann (DPLL) algorithm, 3-SAT instances are turned into 2+p-SAT instances whose characteristic parameters (ratio alpha of clauses per variable, fraction p of 3-clauses) can be followed during the operation, and define resolution trajectories. Depending on the location of trajectories in the phase diagram of the 2+p-SAT model, easy (polynomial) or hard (exponential) resolutions are generated. Three regimes are identified, depending on the ratio alpha of the 3-SAT instance to be solved. Lower sat phase: for small ratios, DPLL almost surely finds a solution in a time growing linearly with the number N of variables. Upper sat phase: for intermediate ratios, instances are almost surely satisfiable but finding a solution requires exponential time (2 ^ (N omega) with omega>0) with high probability. Unsat phase: for large ratios, there is almost always no solution and proofs of refutation are exponential. An analysis of the growth of the search tree in both upper sat and unsat regimes is presented, and allows us to estimate omega as a function of alpha. This analysis is based on an exact relationship between the average size of the search tree and the powers of the evolution operator encoding the elementary steps of the search heuristic.
[ { "version": "v1", "created": "Wed, 14 Jan 2004 12:47:57 GMT" } ]
"2008-06-20T00:00:00"
[ [ "Cocco", "Simona", "" ], [ "Monasson", "Remi", "" ] ]
cs/0401012
Hatem HADJ Kacem
Gerard Duchamp (LIFAR, LIPN), Hatem Hadj Kacem (LIFAR), Eric Laugerotte (LIFAR)
Algebraic Elimination of epsilon-transitions
13 decembre 2004
null
null
null
cs.SC cs.DS
null
We present here algebraic formulas associating a k-automaton to a k-epsilon-automaton. The existence depends on the definition of the star of matrices and of elements in the semiring k. For this reason, we present the theorem which allows the transformation of k-epsilon-automata into k-automata. The two automata have the same behaviour.
[ { "version": "v1", "created": "Thu, 15 Jan 2004 16:12:51 GMT" }, { "version": "v2", "created": "Mon, 13 Dec 2004 09:47:42 GMT" } ]
"2009-09-29T00:00:00"
[ [ "Duchamp", "Gerard", "", "LIFAR, LIPN" ], [ "Kacem", "Hatem Hadj", "", "LIFAR" ], [ "Laugerotte", "Eric", "", "LIFAR" ] ]
cs/0402005
Krzysztof C. Kiwiel
Krzysztof C. Kiwiel
Improved randomized selection
14 pages
null
null
PMMO-04-02
cs.DS
null
We show that several versions of Floyd and Rivest's improved algorithm Select for finding the $k$th smallest of $n$ elements require at most $n+\min\{k,n-k\}+O(n^{1/2}\ln^{1/2}n)$ comparisons on average and with high probability. This rectifies the analysis of Floyd and Rivest, and extends it to the case of nondistinct elements. Encouraging computational results on large median-finding problems are reported.
[ { "version": "v1", "created": "Mon, 2 Feb 2004 14:16:52 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Kiwiel", "Krzysztof C.", "" ] ]
cs/0402019
Thom Fruehwirth
Thom Fruehwirth and Slim Abdennadher
The Munich Rent Advisor: A Success for Logic Programming on the Internet
null
null
null
null
cs.AI cs.DS
null
Most cities in Germany regularly publish a booklet called the {\em Mietspiegel}. It basically contains a verbal description of an expert system. It allows the calculation of the estimated fair rent for a flat. By hand, one may need a weekend to do so. With our computerized version, the {\em Munich Rent Advisor}, the user just fills in a form in a few minutes and the rent is calculated immediately. We also extended the functionality and applicability of the {\em Mietspiegel} so that the user need not answer all questions on the form. The key to computing with partial information using high-level programming was to use constraint logic programming. We rely on the internet, and more specifically the World Wide Web, to provide this service to a broad user group. More than ten thousand people have used our service in the last three years. This article describes the experiences in implementing and using the {\em Munich Rent Advisor}. Our results suggests that logic programming with constraints can be an important ingredient in intelligent internet systems.
[ { "version": "v1", "created": "Tue, 10 Feb 2004 15:10:36 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Fruehwirth", "Thom", "" ], [ "Abdennadher", "Slim", "" ] ]
cs/0402028
David Eppstein
David Eppstein
The lattice dimension of a graph
6 pages, 3 figures
Eur. J. Combinatorics 26(6):585-592, 2005
10.1016/j.ejc.2004.05.001
null
cs.DS math.CO
null
We describe a polynomial time algorithm for, given an undirected graph G, finding the minimum dimension d such that G may be isometrically embedded into the d-dimensional integer lattice Z^d.
[ { "version": "v1", "created": "Fri, 13 Feb 2004 05:23:03 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Eppstein", "David", "" ] ]
cs/0402044
Sandor P. Fekete
Sandor P. Fekete and Joerg Schepers
A General Framework for Bounds for Higher-Dimensional Orthogonal Packing Problems
16 pages, 4 figures, Latex, to appear in Mathematical Methods of Operations Research
null
null
null
cs.DS cs.CG
null
Higher-dimensional orthogonal packing problems have a wide range of practical applications, including packing, cutting, and scheduling. In the context of a branch-and-bound framework for solving these packing problems to optimality, it is of crucial importance to have good and easy bounds for an optimal solution. Previous efforts have produced a number of special classes of such bounds. Unfortunately, some of these bounds are somewhat complicated and hard to generalize. We present a new approach for obtaining classes of lower bounds for higher-dimensional packing problems; our bounds improve and simplify several well-known bounds from previous literature. In addition, our approach provides an easy framework for proving correctness of new bounds.
[ { "version": "v1", "created": "Wed, 18 Feb 2004 16:05:16 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Fekete", "Sandor P.", "" ], [ "Schepers", "Joerg", "" ] ]
cs/0402045
Sandor P. Fekete
Esther M. Arkin, Michael A. Bender, Sandor P. Fekete, Joseph S. B. Mitchell, and Martin Skutella
The Freeze-Tag Problem: How to Wake Up a Swarm of Robots
27 pages, 9 figures, Latex, to appear in Algorithmica. Cleaned up various parts of the paper, removed one overly technical section
null
null
null
cs.DS
null
An optimization problem that naturally arises in the study of swarm robotics is the Freeze-Tag Problem (FTP) of how to awaken a set of ``asleep'' robots, by having an awakened robot move to their locations. Once a robot is awake, it can assist in awakening other slumbering robots.The objective is to have all robots awake as early as possible. While the FTP bears some resemblance to problems from areas in combinatorial optimization such as routing, broadcasting, scheduling, and covering, its algorithmic characteristics are surprisingly different. We consider both scenarios on graphs and in geometric environments.In graphs, robots sleep at vertices and there is a length function on the edges. Awake robots travel along edges, with time depending on edge length. For most scenarios, we consider the offline version of the problem, in which each awake robot knows the position of all other robots. We prove that the problem is NP-hard, even for the special case of star graphs. We also establish hardness of approximation, showing that it is NP-hard to obtain an approximation factor better than 5/3, even for graphs of bounded degree.These lower bounds are complemented with several positive algorithmic results, including: (1) We show that the natural greedy strategy on star graphs has a tight worst-case performance of 7/3 and give a polynomial-time approximation scheme (PTAS) for star graphs. (2) We give a simple O(log D)-competitive online algorithm for graphs with maximum degree D and locally bounded edge weights. (3) We give a PTAS, running in nearly linear time, for geometrically embedded instances.
[ { "version": "v1", "created": "Wed, 18 Feb 2004 20:49:02 GMT" }, { "version": "v2", "created": "Wed, 7 Sep 2005 23:31:08 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Arkin", "Esther M.", "" ], [ "Bender", "Michael A.", "" ], [ "Fekete", "Sandor P.", "" ], [ "Mitchell", "Joseph S. B.", "" ], [ "Skutella", "Martin", "" ] ]
cs/0403022
Martin Ziegler
Michael N\"usken, Martin Ziegler
Fast Multipoint-Evaluation of Bivariate Polynomials
12 pages, 1 figure. To appear in Proc. 12th ESA 2004
null
null
null
cs.DS
null
We generalize univariate multipoint evaluation of polynomials of degree n at sublinear amortized cost per point. More precisely, it is shown how to evaluate a bivariate polynomial p of maximum degree less than n, specified by its n^2 coefficients, simultaneously at n^2 given points using a total of O(n^{2.667}) arithmetic operations. In terms of the input size N being quadratic in n, this amounts to an amortized cost of O(N^{0.334}) per point.
[ { "version": "v1", "created": "Fri, 12 Mar 2004 14:31:43 GMT" }, { "version": "v2", "created": "Fri, 25 Jun 2004 17:17:17 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Nüsken", "Michael", "" ], [ "Ziegler", "Martin", "" ] ]
cs/0403028
Manuel Carro
Manuel Carro
An Application of Rational Trees in a Logic Programming Interpreter for a Procedural Language
LaTeX2e, 13 pages, 2 tables, 11 figures (several of them, text). Yet unpublished
null
null
null
cs.DS cs.LO
null
We describe here a simple application of rational trees to the implementation of an interpreter for a procedural language written in a logic programming language. This is possible in languages designed to support rational trees (such as Prolog II and its descendants), but also in traditional Prolog, whose data structures are initially based on Herbrand terms, but in which implementations often omit the occurs check needed to avoid the creation of infinite data structures. We provide code implementing two interpreters, one of which needs non-occurs-check unification, which makes it faster (and more economic). We provide experimental data supporting this, and we argue that rational trees are interesting enough as to receive thorough support inside the language.
[ { "version": "v1", "created": "Tue, 16 Mar 2004 16:48:38 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Carro", "Manuel", "" ] ]
cs/0403037
Sebastian Brand
Sebastian Brand and Krzysztof R. Apt
Schedulers and Redundancy for a Class of Constraint Propagation Rules
25 pages, to appear in the journal "Theory and Practice of Logic Programming"
null
null
null
cs.DS cs.PL
null
We study here schedulers for a class of rules that naturally arise in the context of rule-based constraint programming. We systematically derive a scheduler for them from a generic iteration algorithm of [Apt 2000]. We apply this study to so-called membership rules of [Apt and Monfroy 2001]. This leads to an implementation that yields a considerably better performance for these rules than their execution as standard CHR rules. Finally, we show how redundant rules can be identified and how appropriately reduced sets of rules can be computed.
[ { "version": "v1", "created": "Tue, 23 Mar 2004 11:42:45 GMT" }, { "version": "v2", "created": "Tue, 27 Apr 2004 18:31:17 GMT" }, { "version": "v3", "created": "Tue, 2 Nov 2004 12:47:09 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Brand", "Sebastian", "" ], [ "Apt", "Krzysztof R.", "" ] ]
cs/0403040
Fabrice Philippe
Guy Melancon, Fabrice Philippe
Generating connected acyclic digraphs uniformly at random
6 pages
null
null
null
cs.DM cs.DS
null
We describe a simple algorithm based on a Markov chain process to generate simply connected acyclic directed graphs over a fixed set of vertices. This algorithm is an extension of a previous one, designed to generate acyclic digraphs, non necessarily connected.
[ { "version": "v1", "created": "Thu, 25 Mar 2004 08:41:38 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Melancon", "Guy", "" ], [ "Philippe", "Fabrice", "" ] ]
cs/0404028
Saju Jude Dominic
Saju Jude Dominic and G. Sajith
The Random Buffer Tree : A Randomized Technique for I/O-efficient Algorithms
13 pages with no figures, unpublished
null
null
null
cs.DS
null
In this paper, we present a probabilistic self-balancing dictionary data structure for massive data sets, and prove expected amortized I/O-optimal bounds on the dictionary operations. We show how to use the structure as an I/O-optimal priority queue. The data structure, which we call as the random buffer tree, abstracts the properties of the random treap and the buffer tree and has the same expected I/O-bounds as the buffer tree.
[ { "version": "v1", "created": "Tue, 13 Apr 2004 13:49:11 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Dominic", "Saju Jude", "" ], [ "Sajith", "G.", "" ] ]
cs/0404036
Sandor P. Fekete
Sandor P. Fekete and Rolf Klein and Andreas Nuechter
Online Searching with an Autonomous Robot
16 pages, 8 figures, 12 photographs, 1 table, Latex, submitted for publication
null
null
null
cs.RO cs.DS
null
We discuss online strategies for visibility-based searching for an object hidden behind a corner, using Kurt3D, a real autonomous mobile robot. This task is closely related to a number of well-studied problems. Our robot uses a three-dimensional laser scanner in a stop, scan, plan, go fashion for building a virtual three-dimensional environment. Besides planning trajectories and avoiding obstacles, Kurt3D is capable of identifying objects like a chair. We derive a practically useful and asymptotically optimal strategy that guarantees a competitive ratio of 2, which differs remarkably from the well-studied scenario without the need of stopping for surveying the environment. Our strategy is used by Kurt3D, documented in a separate video.
[ { "version": "v1", "created": "Fri, 16 Apr 2004 21:46:15 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Fekete", "Sandor P.", "" ], [ "Klein", "Rolf", "" ], [ "Nuechter", "Andreas", "" ] ]
cs/0404046
Sanjay Rana
Sanjay Rana and Mike Batty
Visualising the structure of architectural open spaces based on shape analysis
10 pages, 9 figures
International Journal of Architectural Computing, 2(1), 2004
null
null
cs.CV cs.CG cs.DS
null
This paper proposes the application of some well known two-dimensional geometrical shape descriptors for the visualisation of the structure of architectural open spaces. The paper demonstrates the use of visibility measures such as distance to obstacles and amount of visible space to calculate shape descriptors such as convexity and skeleton of the open space. The aim of the paper is to indicate a simple, objective and quantifiable approach to understand the structure of open spaces otherwise impossible due to the complex construction of built structures.
[ { "version": "v1", "created": "Thu, 22 Apr 2004 13:42:48 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Rana", "Sanjay", "" ], [ "Batty", "Mike", "" ] ]
cs/0404058
Maggie McLoughlin
Donald E. Knuth, Frank Ruskey
Efficient coroutine generation of constrained Gray sequences
null
Lecture Notes in Computer Science 2635 (2004), 183--204
null
Knuth migration 11/2004
cs.DS
null
We study an interesting family of cooperating coroutines, which is able to generate all patterns of bits that satisfy certain fairly general ordering constraints, changing only one bit at a time. (More precisely, the directed graph of constraints is required to be cycle-free when it is regarded as an undirected graph.) If the coroutines are implemented carefully, they yield an algorithm that needs only a bounded amount of computation per bit change, thereby solving an open problem in the field of combinatorial pattern generation.
[ { "version": "v1", "created": "Fri, 30 Apr 2004 00:00:00 GMT" } ]
"2009-09-29T00:00:00"
[ [ "Knuth", "Donald E.", "" ], [ "Ruskey", "Frank", "" ] ]
cs/0405006
Docteur Gregory Mounie
Pierre-Francois Dutot (ID - IMAG), Lionel Eyraud (ID - IMAG), Gr\'egory Mouni\'e (ID - IMAG), Denis Trystram (ID - IMAG)
Bi-criteria Algorithm for Scheduling Jobs on Cluster Platforms
null
ACM Symposium on Parallel Algorithms and Architectures (2004) 125-132
null
null
cs.DC cs.DS
null
We describe in this paper a new method for building an efficient algorithm for scheduling jobs in a cluster. Jobs are considered as parallel tasks (PT) which can be scheduled on any number of processors. The main feature is to consider two criteria that are optimized together. These criteria are the makespan and the weighted minimal average completion time (minsum). They are chosen for their complementarity, to be able to represent both user-oriented objectives and system administrator objectives. We propose an algorithm based on a batch policy with increasing batch sizes, with a smart selection of jobs in each batch. This algorithm is assessed by intensive simulation results, compared to a new lower bound (obtained by a relaxation of ILP) of the optimal schedules for both criteria separately. It is currently implemented in an actual real-size cluster platform.
[ { "version": "v1", "created": "Tue, 4 May 2004 14:51:55 GMT" }, { "version": "v2", "created": "Fri, 22 Oct 2004 13:06:35 GMT" }, { "version": "v3", "created": "Thu, 20 Jan 2005 15:52:59 GMT" } ]
"2016-08-16T00:00:00"
[ [ "Dutot", "Pierre-Francois", "", "ID - IMAG" ], [ "Eyraud", "Lionel", "", "ID - IMAG" ], [ "Mounié", "Grégory", "", "ID - IMAG" ], [ "Trystram", "Denis", "", "ID - IMAG" ] ]
cs/0405041
Vladimir Migunov
Vladimir V. Migunov
The modulus in the CAD system drawings as a base of developing of the problem-oriented extensions
2 pages, no figures, in Russian
null
null
null
cs.CE cs.DS
null
The concept of the "modulus" in the CAD system drawings is characterized, being a base of developing of the problem-oriented extensions. The modulus consists of visible geometric elements of the drawing and invisible parametric representation of the modelling object. The technological advantages of moduluss in a complex CAD system developing are described.
[ { "version": "v1", "created": "Wed, 12 May 2004 07:55:34 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Migunov", "Vladimir V.", "" ] ]
cs/0405047
Vladimir Migunov
Vladimir V. Migunov
Modular technology of developing of the problem-oriented extensions of a CAD system of reconstruction of the plant
8 pages, no figures, in Russian
null
null
null
cs.CE cs.DS
null
The modular technology of creation of the problem-oriented extensions of a CAD system is described, which was realised in a system TechnoCAD GlassX for designing of reconstruction of the plants. The modularity of the technology is expressed in storage of all parameters of the design in one element of the drawing - modulus, with automatic generation of a geometrical part of the modulus from these parameters. The common principles of the system organization of extensions developing are described: separation of the part of the design to automize in this extension, architecture of parameters in the form of the lists of objects with their properties and links to another objects, separation of common and special operations, stages of the developing, boundaries of applicability of technology.
[ { "version": "v1", "created": "Fri, 14 May 2004 17:43:33 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Migunov", "Vladimir V.", "" ] ]
cs/0405053
Boris D. Lubachevsky
Boris Lubachevsky and Alan Weiss
Synchronous Relaxation for Parallel Ising Spin Simulations
Extended abstract. Conference version. The full paper in preparation
15th Workshop on Parallel and Distributed Simulation, Lake Arrowhead, California, May 2001, pp.185-192
null
null
cs.DC cond-mat.mtrl-sci cs.DS physics.comp-ph
null
A new parallel algorithm for simulating Ising spin systems is presented. The sequential prototype is the n-fold way algorithm cite{BKL75}, which is efficient but is hard to parallelize using conservative methods. Our parallel algorithm is optimistic. Unlike other optimistic algorithms, e.g., Time Warp, our algorithm is synchronous. It also belongs to the class of simulations known as ``relaxation'' cite{CS8 hence it is named ``synchronous relaxation.'' We derive performance guarantees for this algorithm. If N is the number of PEs, then under weak assumptions we show that the number of correct events processed per unit of time is, on average, at least of order N/log(N). All communication delays, processing time, and busy waits are taken into account.
[ { "version": "v1", "created": "Mon, 17 May 2004 01:32:16 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Lubachevsky", "Boris", "" ], [ "Weiss", "Alan", "" ] ]
cs/0405054
Vladimir Migunov
Vladimir V. Migunov
The model of the tables in design documentation for operating with the electronic catalogs and for specifications making in a CAD system
5 pages, 4 figures, in Russian
null
null
null
cs.CE cs.DS
null
The hierarchic block model of the tables in design documentation as a part of a CAD system is described, intended for automatic specifications making of elements of the drawings, with usage of the electronic catalogs. The model is created for needs of a CAD system of reconstruction of the industrial plants, where the result of designing are the drawings, which include the specifications of different types. The adequate simulation of the specification tables is ensured with technology of storing in the drawing of the visible geometric elements and invisible parametric representation, sufficient for generation of this elements.
[ { "version": "v1", "created": "Mon, 17 May 2004 09:39:03 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Migunov", "Vladimir V.", "" ] ]
cs/0405055
Vladimir Migunov
Vladimir V. Migunov, Rustem R. Kafiatullov, Ilsur T. Safin
Modular technology of developing of the extensions of a CAD system. Axonometric piping diagrams. Parametric representation
8 pages, 1 figure, in Russian
null
null
null
cs.CE cs.DS
null
Applying the modular technology of developing of the problem-oriented extensions of a CAD system to a problem of automation of creating of the axonometric piping diagrams on an example of the program system TechnoCAD GlassX is described. The proximity of composition of the schemas is detected for special technological pipe lines, systems of a water line and water drain, heating, heat supply, ventilating, air conditioning. The structured parametric representation of the schemas, including properties of objects, their link, common settings, settings by default and the special links of compatibility is reviewed.
[ { "version": "v1", "created": "Mon, 17 May 2004 09:46:02 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Migunov", "Vladimir V.", "" ], [ "Kafiatullov", "Rustem R.", "" ], [ "Safin", "Ilsur T.", "" ] ]
cs/0405056
Vladimir Migunov
Ilsur T. Safin, Vladimir V. Migunov, Rustem R. Kafiatullov
Modular technology of developing of the extensions of a CAD system. The axonometric piping diagrams. Common and special operations
8 pages, 7 figures, in Russian
null
null
null
cs.CE cs.DS
null
Applying the modular technology of developing of the problem-oriented extensions of a CAD system to a problem of automation of creating of the axonometric piping diagrams on an example of the program system TechnoCAD GlassX is described. The features of realization of common operations, composition and realization of special operations of a designing of the schemas of the special technological pipe lines, systems of a water line and water drain, heating, heat supply, ventilating, air conditioning are reviewed.
[ { "version": "v1", "created": "Mon, 17 May 2004 10:14:12 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Safin", "Ilsur T.", "" ], [ "Migunov", "Vladimir V.", "" ], [ "Kafiatullov", "Rustem R.", "" ] ]
cs/0405057
Vladimir Migunov
Vladimir V. Migunov
Mathematical and programming toolkit of the computer aided design of the axonometric piping diagrams
3 pages, no figures, in Russian
null
null
null
cs.CE cs.DS
null
The problem of the automation of the designing of the axonometric piping diagrams include, as the minimum, manipulations with the flat schemas of three-dimensional wireframe objects (with dimension of 2,5). The specialized model, methodical and mathematical approaches are required because of large bulk of calculuss. Coordinate systems, data types, common principles of realization of operation with data and composition of the basic operations are described which are realised in the complex CAD system of the reconstruction of the plants TechnoCAD GlassX.
[ { "version": "v1", "created": "Mon, 17 May 2004 10:34:16 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Migunov", "Vladimir V.", "" ] ]
cs/0405058
Sandor P. Fekete
Sandor P. Fekete, Alexander Kroeller, Dennis Pfisterer, Stefan Fischer, and Carsten Buschmann
Neighborhood-Based Topology Recognition in Sensor Networks
14 pages, 6 figures, Latex, to appear in Workshop on Algorithms Aspects of Sensor Networks (ALGOSENSORS 2004)
null
null
null
cs.DS cs.DC
null
We consider a crucial aspect of self-organization of a sensor network consisting of a large set of simple sensor nodes with no location hardware and only very limited communication range. After having been distributed randomly in a given two-dimensional region, the nodes are required to develop a sense for the environment, based on a limited amount of local communication. We describe algorithmic approaches for determining the structure of boundary nodes of the region, and the topology of the region. We also develop methods for determining the outside boundary, the distance to the closest boundary for each point, the Voronoi diagram of the different boundaries, and the geometric thickness of the network. Our methods rely on a number of natural assumptions that are present in densely distributed sets of nodes, and make use of a combination of stochastics, topology, and geometry. Evaluation requires only a limited number of simple local computations.
[ { "version": "v1", "created": "Mon, 17 May 2004 12:16:08 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Fekete", "Sandor P.", "" ], [ "Kroeller", "Alexander", "" ], [ "Pfisterer", "Dennis", "" ], [ "Fischer", "Stefan", "" ], [ "Buschmann", "Carsten", "" ] ]
cs/0405077
Boris D. Lubachevsky
Boris D. Lubachevsky
Fast Simulation of Multicomponent Dynamic Systems
38 pages, 9 figures
Bell Labs Technical Journal, Vol.5, No.2, April-June 2000, pp.134-156
null
null
cs.DS cond-mat.mtrl-sci cs.DC
null
A computer simulation has to be fast to be helpful, if it is employed to study the behavior of a multicomponent dynamic system. This paper discusses modeling concepts and algorithmic techniques useful for creating such fast simulations. Concrete examples of simulations that range from econometric modeling to communications to material science are used to illustrate these techniques and concepts. The algorithmic and modeling methods discussed include event-driven processing, ``anticipating'' data structures, and ``lazy'' evaluation, Poisson dispenser, parallel processing by cautious advancements and by synchronous relaxations. The paper gives examples of how these techniques and models are employed in assessing efficiency of capacity management methods in wireless and wired networks, in studies of magnetization, crystalline structure, and sediment formation in material science, in studies of competition in economics.
[ { "version": "v1", "created": "Sat, 22 May 2004 16:51:48 GMT" }, { "version": "v2", "created": "Fri, 28 Jul 2006 20:52:52 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Lubachevsky", "Boris D.", "" ] ]
cs/0405094
Taneli Mielik\"ainen
Taneli Mielik\"ainen and Esko Ukkonen
The Complexity of Maximum Matroid-Greedoid Intersection and Weighted Greedoid Maximization
null
null
null
Report C-2004-2, Department of Computer Science, University of Helsinki
cs.DS
null
The maximum intersection problem for a matroid and a greedoid, given by polynomial-time oracles, is shown $NP$-hard by expressing the satisfiability of boolean formulas in 3-conjunctive normal form as such an intersection. The corresponding approximation problems are shown $NP$-hard for certain approximation performance bounds. Moreover, some natural parameterized variants of the problem are shown $W[P]$-hard. The results are in contrast with the maximum matroid-matroid intersection which is solvable in polynomial time by an old result of Edmonds. We also prove that it is $NP$-hard to approximate the weighted greedoid maximization within $2^{n^{O(1)}}$ where $n$ is the size of the domain of the greedoid. A preliminary version ``The Complexity of Maximum Matroid-Greedoid Intersection'' appeared in Proc. FCT 2001, LNCS 2138, pp. 535--539, Springer-Verlag 2001.
[ { "version": "v1", "created": "Tue, 25 May 2004 12:09:34 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Mielikäinen", "Taneli", "" ], [ "Ukkonen", "Esko", "" ] ]
cs/0405110
Gopal Ananthraman
Gopal Ananthraman
An analysis of a bounded resource search puzzle
4 Pages
null
null
null
cs.DS cs.DM
null
Consider the commonly known puzzle, given $k$ glass balls, find an optimal algorithm to determine the lowest floor of a building of $n$ floors from which a thrown glass ball will break. This puzzle was originally posed in its original form in \cite{focs1980}and was later cited in the book \cite{algthc}. There are several internet sites that presents this puzzle and its solution to the special case of $k=2$ balls. This is the first such analysis of the puzzle in its general form. Several variations of this puzzle have been studied with applications in Network Loading \cite{cgstctl} which analyzes a case similar to a scenario where an adversary is changing the lowest floor with time. Although the algorithm specified in \cite{algthc} solves the problem, it is not an efficient algorithm. In this paper another algorithm for the same problem is analyzed. It is shown that if $m$ is the minimum number of attempts required then for $k \geq m$ we have $m = \log (n+1)$ and for $k < m$ we have, $1 + \sum_{i=1}^{k}{{m-1}\choose{i}} < n \leq \sum_{i=1}^{k}{{m}\choose{i}}$
[ { "version": "v1", "created": "Fri, 28 May 2004 21:26:10 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Ananthraman", "Gopal", "" ] ]
cs/0406003
Andr\'e Kempe
Andre Kempe (1), Franck Guingne (1,2), Florent Nicart (1,2) ((1) Xerox Research Centre Europe, France, (2) Rouen University, France)
Algorithms for weighted multi-tape automata
28 pages, 7 figures, LaTeX (+ .eps)
null
null
XRCE Research Report 2004/031
cs.CL cs.DS
null
This report defines various operations for weighted multi-tape automata (WMTAs) and describes algorithms that have been implemented for those operations in the WFSC toolkit. Some algorithms are new, others are known or similar to known algorithms. The latter will be recalled to make this report more complete and self-standing. We present a new approach to multi-tape intersection, meaning the intersection of a number of tapes of one WMTA with the same number of tapes of another WMTA. In our approach, multi-tape intersection is not considered as an atomic operation but rather as a sequence of more elementary ones, which facilitates its implementation. We show an example of multi-tape intersection, actually transducer intersection, that can be compiled with our approach but not with several other methods that we analysed. To show the practical relavance of our work, we include an example of application: the preservation of intermediate results in transduction cascades.
[ { "version": "v1", "created": "Wed, 2 Jun 2004 18:51:52 GMT" } ]
"2009-09-29T00:00:00"
[ [ "Kempe", "Andre", "" ], [ "Guingne", "Franck", "" ], [ "Nicart", "Florent", "" ] ]
cs/0406020
David Eppstein
David Eppstein
Algorithms for Drawing Media
13 pages, 11 figures
null
null
null
cs.DS cs.CG
null
We describe algorithms for drawing media, systems of states, tokens and actions that have state transition graphs in the form of partial cubes. Our algorithms are based on two principles: embedding the state transition graph in a low-dimensional integer lattice and projecting the lattice onto the plane, or drawing the medium as a planar graph with centrally symmetric faces.
[ { "version": "v1", "created": "Wed, 16 Jun 2004 00:49:40 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Eppstein", "David", "" ] ]
cs/0406028
Manor Mendel
Yair Bartal, Bela Bollobas, Manor Mendel
Ramsey-type theorems for metric spaces with applications to online problems
Fix an error in the metadata. 31 pages, 0 figures. Preliminary version in FOCS '01. To be published in J. Comput. System Sci
J. Comput. System Sci. 72(5):890-921, 2006
10.1016/j.jcss.2005.05.008
null
cs.DS
null
A nearly logarithmic lower bound on the randomized competitive ratio for the metrical task systems problem is presented. This implies a similar lower bound for the extensively studied k-server problem. The proof is based on Ramsey-type theorems for metric spaces, that state that every metric space contains a large subspace which is approximately a hierarchically well-separated tree (and in particular an ultrametric). These Ramsey-type theorems may be of independent interest.
[ { "version": "v1", "created": "Wed, 16 Jun 2004 21:56:48 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Bartal", "Yair", "" ], [ "Bollobas", "Bela", "" ], [ "Mendel", "Manor", "" ] ]