id
stringlengths
9
16
submitter
stringlengths
4
52
authors
stringlengths
4
937
title
stringlengths
7
243
comments
stringlengths
1
472
journal-ref
stringlengths
4
244
doi
stringlengths
14
55
report-no
stringlengths
3
125
categories
stringlengths
5
97
license
stringclasses
9 values
abstract
stringlengths
33
2.95k
versions
list
update_date
unknown
authors_parsed
sequence
0806.4735
Shai Gutner
Noga Alon and Shai Gutner
Linear Time Algorithms for Finding a Dominating Set of Fixed Size in Degenerated Graphs
null
Proc. of 13th COCOON (2007), 394-405
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There is substantial literature dealing with fixed parameter algorithms for the dominating set problem on various families of graphs. In this paper, we give a $k^{O(dk)} n$ time algorithm for finding a dominating set of size at most $k$ in a $d$-degenerated graph with $n$ vertices. This proves that the dominating set problem is fixed-parameter tractable for degenerated graphs. For graphs that do not contain $K_h$ as a topological minor, we give an improved algorithm for the problem with running time $(O(h))^{hk} n$. For graphs which are $K_h$-minor-free, the running time is further reduced to $(O(\log h))^{hk/2} n$. Fixed-parameter tractable algorithms that are linear in the number of vertices of the graph were previously known only for planar graphs. For the families of graphs discussed above, the problem of finding an induced cycle of a given length is also addressed. For every fixed $H$ and $k$, we show that if an $H$-minor-free graph $G$ with $n$ vertices contains an induced cycle of size $k$, then such a cycle can be found in O(n) expected time as well as in $O(n \log n)$ worst-case time. Some results are stated concerning the (im)possibility of establishing linear time algorithms for the more general family of degenerated graphs.
[ { "version": "v1", "created": "Sun, 29 Jun 2008 06:09:57 GMT" } ]
"2008-12-18T00:00:00"
[ [ "Alon", "Noga", "" ], [ "Gutner", "Shai", "" ] ]
0806.4790
Vladimir Braverman
Vladimir Braverman, Kai-Min Chung, Zhenming Liu, Michael Mitzenmacher, Rafail Ostrovsky
AMS Without 4-Wise Independence on Product Domains
null
null
null
null
cs.DS
http://creativecommons.org/licenses/by/3.0/
In their seminal work, Alon, Matias, and Szegedy introduced several sketching techniques, including showing that 4-wise independence is sufficient to obtain good approximations of the second frequency moment. In this work, we show that their sketching technique can be extended to product domains $[n]^k$ by using the product of 4-wise independent functions on $[n]$. Our work extends that of Indyk and McGregor, who showed the result for $k = 2$. Their primary motivation was the problem of identifying correlations in data streams. In their model, a stream of pairs $(i,j) \in [n]^2$ arrive, giving a joint distribution $(X,Y)$, and they find approximation algorithms for how close the joint distribution is to the product of the marginal distributions under various metrics, which naturally corresponds to how close $X$ and $Y$ are to being independent. By using our technique, we obtain a new result for the problem of approximating the $\ell_2$ distance between the joint distribution and the product of the marginal distributions for $k$-ary vectors, instead of just pairs, in a single pass. Our analysis gives a randomized algorithm that is a $(1 \pm \epsilon)$ approximation (with probability $1-\delta$) that requires space logarithmic in $n$ and $m$ and proportional to $3^k$.
[ { "version": "v1", "created": "Sun, 29 Jun 2008 21:34:28 GMT" }, { "version": "v2", "created": "Fri, 15 May 2009 19:16:27 GMT" }, { "version": "v3", "created": "Thu, 17 Sep 2009 16:21:56 GMT" }, { "version": "v4", "created": "Tue, 5 Jan 2010 22:23:35 GMT" }, { "version": "v5", "created": "Wed, 3 Feb 2010 14:19:09 GMT" } ]
"2010-02-03T00:00:00"
[ [ "Braverman", "Vladimir", "" ], [ "Chung", "Kai-Min", "" ], [ "Liu", "Zhenming", "" ], [ "Mitzenmacher", "Michael", "" ], [ "Ostrovsky", "Rafail", "" ] ]
0806.4899
Mordecai Golin
Mordecai Golin and Yan Zhang
A Dynamic Programming Approach To Length-Limited Huffman Coding
null
null
null
null
cs.DS cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ``state-of-the-art'' in Length Limited Huffman Coding algorithms is the $\Theta(ND)$-time, $\Theta(N)$-space one of Hirschberg and Larmore, where $D\le N$ is the length restriction on the code. This is a very clever, very problem specific, technique. In this note we show that there is a simple Dynamic-Programming (DP) method that solves the problem with the same time and space bounds. The fact that there was an $\Theta(ND)$ time DP algorithm was previously known; it is a straightforward DP with the Monge property (which permits an order of magnitude speedup). It was not interesting, though, because it also required $\Theta(ND)$ space. The main result of this paper is the technique developed for reducing the space. It is quite simple and applicable to many other problems modeled by DPs with the Monge property. We illustrate this with examples from web-proxy design and wireless mobile paging.
[ { "version": "v1", "created": "Mon, 30 Jun 2008 14:13:18 GMT" } ]
"2008-07-01T00:00:00"
[ [ "Golin", "Mordecai", "" ], [ "Zhang", "Yan", "" ] ]
0807.0038
Changyong Zhang
Changyong Zhang
A Novel Mathematical Model for the Unique Shortest Path Routing Problem
31 pages, 4 figures
null
null
null
math.OC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Link weights are the principal parameters of shortest path routing protocols, the most commonly used protocols for IP networks. The problem of optimally setting link weights for unique shortest path routing is addressed. Due to the complexity of the constraints involved, there exist challenges to formulate the problem properly, so that a solution algorithm may be developed which could prove to be more efficient than those already in existence. In this paper, a novel complete formulation with a polynomial number of constraints is first introduced and then mathematically proved to be correct. It is further illustrated that the formulation has advantages over a prior one in terms of both constraint structure and model size for a proposed decomposition method to solve the problem.
[ { "version": "v1", "created": "Mon, 30 Jun 2008 23:22:47 GMT" }, { "version": "v2", "created": "Thu, 4 Mar 2010 06:54:04 GMT" } ]
"2010-03-04T00:00:00"
[ [ "Zhang", "Changyong", "" ] ]
0807.0222
Sariel Har-Peled
Sariel Har-Peled, S. Muthukrishnan
Range Medians
To appear in ESA 08
null
null
null
cs.DS cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study a generalization of the classical median finding problem to batched query case: given an array of unsorted $n$ items and $k$ (not necessarily disjoint) intervals in the array, the goal is to determine the median in {\em each} of the intervals in the array. We give an algorithm that uses $O(n\log n + k\log k \log n)$ comparisons and show a lower bound of $\Omega(n\log k)$ comparisons for this problem. This is optimal for $k=O(n/\log n)$.
[ { "version": "v1", "created": "Tue, 1 Jul 2008 20:05:29 GMT" } ]
"2008-07-02T00:00:00"
[ [ "Har-Peled", "Sariel", "" ], [ "Muthukrishnan", "S.", "" ] ]
0807.0644
Neal E. Young
Christos Koufogiannakis and Neal E. Young
Greedy D-Approximation Algorithm for Covering with Arbitrary Constraints and Submodular Cost
null
Algorithmica 66(1):113-152 (2013)
10.1007/978-3-642-02927-1_53
null
cs.DS cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes a simple greedy D-approximation algorithm for any covering problem whose objective function is submodular and non-decreasing, and whose feasible region can be expressed as the intersection of arbitrary (closed upwards) covering constraints, each of which constrains at most D variables of the problem. (A simple example is Vertex Cover, with D = 2.) The algorithm generalizes previous approximation algorithms for fundamental covering problems and online paging and caching problems.
[ { "version": "v1", "created": "Fri, 4 Jul 2008 23:31:29 GMT" }, { "version": "v2", "created": "Thu, 20 Nov 2008 01:26:09 GMT" }, { "version": "v3", "created": "Fri, 8 May 2009 02:11:42 GMT" }, { "version": "v4", "created": "Fri, 30 Dec 2011 17:40:35 GMT" } ]
"2015-06-02T00:00:00"
[ [ "Koufogiannakis", "Christos", "" ], [ "Young", "Neal E.", "" ] ]
0807.0807
Mustaq Ahmed
Mustaq Ahmed, Anna Lubiw
Shortest Paths Avoiding Forbidden Subpaths
12 pages, 2 figures. Fixed a few typos, rephrased a few sentences, and used the STACS style
Proceedings of the 26th International Symposium on Theoretical Aspects of Computer Science (STACS), Freiburg, Germany, 2009, pp. 63-74
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we study a variant of the shortest path problem in graphs: given a weighted graph G and vertices s and t, and given a set X of forbidden paths in G, find a shortest s-t path P such that no path in X is a subpath of P. Path P is allowed to repeat vertices and edges. We call each path in X an exception, and our desired path a shortest exception-avoiding path. We formulate a new version of the problem where the algorithm has no a priori knowledge of X, and finds out about an exception x in X only when a path containing x fails. This situation arises in computing shortest paths in optical networks. We give an algorithm that finds a shortest exception avoiding path in time polynomial in |G| and |X|. The main idea is to run Dijkstra's algorithm incrementally after replicating vertices when an exception is discovered.
[ { "version": "v1", "created": "Fri, 4 Jul 2008 19:30:30 GMT" }, { "version": "v2", "created": "Wed, 11 Feb 2009 16:49:43 GMT" } ]
"2009-02-11T00:00:00"
[ [ "Ahmed", "Mustaq", "" ], [ "Lubiw", "Anna", "" ] ]
0807.0928
Denis Charles X.
Denis Charles, Kumar Chellapilla
Bloomier Filters: A second look
13 Pages, 3 figures, to appear in ESA - 2008
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Bloom filter is a space efficient structure for storing static sets, where the space efficiency is gained at the expense of a small probability of false-positives. A Bloomier filter generalizes a Bloom filter to compactly store a function with a static support. In this article we give a simple construction of a Bloomier filter. The construction is linear in space and requires constant time to evaluate. The creation of our Bloomier filter takes linear time which is faster than the existing construction. We show how one can improve the space utilization further at the cost of increasing the time for creating the data structure.
[ { "version": "v1", "created": "Sun, 6 Jul 2008 19:45:37 GMT" } ]
"2008-07-08T00:00:00"
[ [ "Charles", "Denis", "" ], [ "Chellapilla", "Kumar", "" ] ]
0807.1139
Nitish Korula
Nitish Korula, Martin Pal
Algorithms for Secretary Problems on Graphs and Hypergraphs
15 pages, 2 figures
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We examine several online matching problems, with applications to Internet advertising reservation systems. Consider an edge-weighted bipartite graph G, with partite sets L, R. We develop an 8-competitive algorithm for the following secretary problem: Initially given R, and the size of L, the algorithm receives the vertices of L sequentially, in a random order. When a vertex l \in L is seen, all edges incident to l are revealed, together with their weights. The algorithm must immediately either match l to an available vertex of R, or decide that l will remain unmatched. Dimitrov and Plaxton show a 16-competitive algorithm for the transversal matroid secretary problem, which is the special case with weights on vertices, not edges. (Equivalently, one may assume that for each l \in L, the weights on all edges incident to l are identical.) We use a similar algorithm, but simplify and improve the analysis to obtain a better competitive ratio for the more general problem. Perhaps of more interest is the fact that our analysis is easily extended to obtain competitive algorithms for similar problems, such as to find disjoint sets of edges in hypergraphs where edges arrive online. We also introduce secretary problems with adversarially chosen groups. Finally, we give a 2e-competitive algorithm for the secretary problem on graphic matroids, where, with edges appearing online, the goal is to find a maximum-weight acyclic subgraph of a given graph.
[ { "version": "v1", "created": "Mon, 7 Jul 2008 22:51:46 GMT" } ]
"2008-07-09T00:00:00"
[ [ "Korula", "Nitish", "" ], [ "Pal", "Martin", "" ] ]
0807.1277
David Gamarnik
David Gamarnik and David Goldberg
Randomized greedy algorithms for independent sets and matchings in regular graphs: Exact results and finite girth corrections
24 pages
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We derive new results for the performance of a simple greedy algorithm for finding large independent sets and matchings in constant degree regular graphs. We show that for $r$-regular graphs with $n$ nodes and girth at least $g$, the algorithm finds an independent set of expected cardinality $f(r)n - O\big(\frac{(r-1)^{\frac{g}{2}}}{\frac{g}{2}!} n\big)$, where $f(r)$ is a function which we explicitly compute. A similar result is established for matchings. Our results imply improved bounds for the size of the largest independent set in these graphs, and provide the first results of this type for matchings. As an implication we show that the greedy algorithm returns a nearly perfect matching when both the degree $r$ and girth $g$ are large. Furthermore, we show that the cardinality of independent sets and matchings produced by the greedy algorithm in \emph{arbitrary} bounded degree graphs is concentrated around the mean. Finally, we analyze the performance of the greedy algorithm for the case of random i.i.d. weighted independent sets and matchings, and obtain a remarkably simple expression for the limiting expected values produced by the algorithm. In fact, all the other results are obtained as straightforward corollaries from the results for the weighted case.
[ { "version": "v1", "created": "Tue, 8 Jul 2008 15:29:42 GMT" } ]
"2008-07-09T00:00:00"
[ [ "Gamarnik", "David", "" ], [ "Goldberg", "David", "" ] ]
0807.1891
Benjmain Moseley
Chandra Chekuri and Benjamin Moseley
Online Scheduling to Minimize the Maximum Delay Factor
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper two scheduling models are addressed. First is the standard model (unicast) where requests (or jobs) are independent. The other is the broadcast model where broadcasting a page can satisfy multiple outstanding requests for that page. We consider online scheduling of requests when they have deadlines. Unlike previous models, which mainly consider the objective of maximizing throughput while respecting deadlines, here we focus on scheduling all the given requests with the goal of minimizing the maximum {\em delay factor}.We prove strong lower bounds on the achievable competitive ratios for delay factor scheduling even with unit-time requests.For the unicast model we give algorithms that are $(1 + \eps)$-speed $O({1 \over \eps})$-competitive in both the single machine and multiple machine settings. In the broadcast model we give an algorithm for similar-sized pages that is $(2+ \eps)$-speed $O({1 \over \eps^2})$-competitive. For arbitrary page sizes we give an algorithm that is $(4+\eps)$-speed $O({1 \over \eps^2})$-competitive.
[ { "version": "v1", "created": "Fri, 11 Jul 2008 17:00:07 GMT" } ]
"2008-07-14T00:00:00"
[ [ "Chekuri", "Chandra", "" ], [ "Moseley", "Benjamin", "" ] ]
0807.2120
Robin Moser
Robin A. Moser
Derandomizing the Lovasz Local Lemma more effectively
8 pages; added acknowledgement
null
null
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The famous Lovasz Local Lemma [EL75] is a powerful tool to non-constructively prove the existence of combinatorial objects meeting a prescribed collection of criteria. Kratochvil et al. applied this technique to prove that a k-CNF in which each variable appears at most 2^k/(ek) times is always satisfiable [KST93]. In a breakthrough paper, Beck found that if we lower the occurrences to O(2^(k/48)/k), then a deterministic polynomial-time algorithm can find a satisfying assignment to such an instance [Bec91]. Alon randomized the algorithm and required O(2^(k/8)/k) occurrences [Alo91]. In [Mos06], we exhibited a refinement of his method which copes with O(2^(k/6)/k) of them. The hitherto best known randomized algorithm is due to Srinivasan and is capable of solving O(2^(k/4)/k) occurrence instances [Sri08]. Answering two questions asked by Srinivasan, we shall now present an approach that tolerates O(2^(k/2)/k) occurrences per variable and which can most easily be derandomized. The new algorithm bases on an alternative type of witness tree structure and drops a number of limiting aspects common to all previous methods.
[ { "version": "v1", "created": "Mon, 14 Jul 2008 09:55:09 GMT" }, { "version": "v2", "created": "Mon, 15 Sep 2008 13:57:58 GMT" } ]
"2008-09-15T00:00:00"
[ [ "Moser", "Robin A.", "" ] ]
0807.2178
Bernd G\"artner
Bernd G\"artner
Ranking Unit Squares with Few Visibilities
4 pages, 2 EPS-figures
null
null
null
cs.CG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a set of n unit squares in the plane, the goal is to rank them in space in such a way that only few squares see each other vertically. We prove that ranking the squares according to the lexicographic order of their centers results in at most 3n-7 pairwise visibilities for n at least 4. We also show that this bound is best possible, by exhibiting a set of n squares with at least 3n-7 pairwise visibilities under any ranking.
[ { "version": "v1", "created": "Mon, 14 Jul 2008 15:23:52 GMT" } ]
"2008-07-15T00:00:00"
[ [ "Gärtner", "Bernd", "" ] ]
0807.2269
Michel Rueher
Alexandre Goldsztejn (LINA), Claude Michel (I3S, Laboratoire I3S), Michel Rueher (I3S, Laboratoire I3S)
An Efficient Algorithm for a Sharp Approximation of Universally Quantified Inequalities
ACM symposium on Applied computing, Fortaleza, Ceara : Br\'esil (2008)
null
null
null
cs.NA cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a new algorithm for solving a sub-class of quantified constraint satisfaction problems (QCSP) where existential quantifiers precede universally quantified inequalities on continuous domains. This class of QCSPs has numerous applications in engineering and design. We propose here a new generic branch and prune algorithm for solving such continuous QCSPs. Standard pruning operators and solution identification operators are specialized for universally quantified inequalities. Special rules are also proposed for handling the parameters of the constraints. First experimentation show that our algorithm outperforms the state of the art methods.
[ { "version": "v1", "created": "Tue, 15 Jul 2008 14:45:38 GMT" } ]
"2008-07-16T00:00:00"
[ [ "Goldsztejn", "Alexandre", "", "LINA" ], [ "Michel", "Claude", "", "I3S, Laboratoire I3S" ], [ "Rueher", "Michel", "", "I3S, Laboratoire I3S" ] ]
0807.2330
Antonios Symvonis
Tamara Mchedlidze, Antonios Symvonis
Optimal Acyclic Hamiltonian Path Completion for Outerplanar Triangulated st-Digraphs (with Application to Upward Topological Book Embeddings)
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given an embedded planar acyclic digraph G, we define the problem of "acyclic hamiltonian path completion with crossing minimization (Acyclic-HPCCM)" to be the problem of determining an hamiltonian path completion set of edges such that, when these edges are embedded on G, they create the smallest possible number of edge crossings and turn G to a hamiltonian digraph. Our results include: --We provide a characterization under which a triangulated st-digraph G is hamiltonian. --For an outerplanar triangulated st-digraph G, we define the st-polygon decomposition of G and, based on its properties, we develop a linear-time algorithm that solves the Acyclic-HPCCM problem with at most one crossing per edge of G. --For the class of st-planar digraphs, we establish an equivalence between the Acyclic-HPCCM problem and the problem of determining an upward 2-page topological book embedding with minimum number of spine crossings. We infer (based on this equivalence) for the class of outerplanar triangulated st-digraphs an upward topological 2-page book embedding with minimum number of spine crossings and at most one spine crossing per edge. To the best of our knowledge, it is the first time that edge-crossing minimization is studied in conjunction with the acyclic hamiltonian completion problem and the first time that an optimal algorithm with respect to spine crossing minimization is presented for upward topological book embeddings.
[ { "version": "v1", "created": "Tue, 15 Jul 2008 10:12:03 GMT" }, { "version": "v2", "created": "Thu, 24 Jul 2008 21:50:12 GMT" } ]
"2008-07-25T00:00:00"
[ [ "Mchedlidze", "Tamara", "" ], [ "Symvonis", "Antonios", "" ] ]
0807.2496
Ashish Goel
Ashish Goel and Kamesh Munagala
Hybrid Keyword Search Auctions
null
null
null
null
cs.GT cs.DS cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Search auctions have become a dominant source of revenue generation on the Internet. Such auctions have typically used per-click bidding and pricing. We propose the use of hybrid auctions where an advertiser can make a per-impression as well as a per-click bid, and the auctioneer then chooses one of the two as the pricing mechanism. We assume that the advertiser and the auctioneer both have separate beliefs (called priors) on the click-probability of an advertisement. We first prove that the hybrid auction is truthful, assuming that the advertisers are risk-neutral. We then show that this auction is superior to the existing per-click auction in multiple ways: 1) It takes into account the risk characteristics of the advertisers. 2) For obscure keywords, the auctioneer is unlikely to have a very sharp prior on the click-probabilities. In such situations, the hybrid auction can result in significantly higher revenue. 3) An advertiser who believes that its click-probability is much higher than the auctioneer's estimate can use per-impression bids to correct the auctioneer's prior without incurring any extra cost. 4) The hybrid auction can allow the advertiser and auctioneer to implement complex dynamic programming strategies. As Internet commerce matures, we need more sophisticated pricing models to exploit all the information held by each of the participants. We believe that hybrid auctions could be an important step in this direction.
[ { "version": "v1", "created": "Wed, 16 Jul 2008 04:04:32 GMT" }, { "version": "v2", "created": "Mon, 26 Jan 2009 01:00:16 GMT" } ]
"2009-01-26T00:00:00"
[ [ "Goel", "Ashish", "" ], [ "Munagala", "Kamesh", "" ] ]
0807.2694
Fei Li
Fei Li
Algorithms for Scheduling Weighted Packets with Deadlines in a Bounded Queue
19 pages. Appears in the Proceedings of the 28th IEEE International Conference on Computer Communications (INFOCOM 2009)
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by the Quality-of-Service (QoS) buffer management problem, we consider online scheduling of packets with hard deadlines in a finite capacity queue. At any time, a queue can store at most $b \in \mathbb Z^+$ packets. Packets arrive over time. Each packet is associated with a non-negative value and an integer deadline. In each time step, only one packet is allowed to be sent. Our objective is to maximize the total value gained by the packets sent by their deadlines in an online manner. Due to the Internet traffic's chaotic characteristics, no stochastic assumptions are made on the packet input sequences. This model is called a {\em finite-queue model}. We use competitive analysis to measure an online algorithm's performance versus an unrealizable optimal offline algorithm who constructs the worst possible input based on the knowledge of the online algorithm. For the finite-queue model, we first present a deterministic 3-competitive memoryless online algorithm. Then, we give a randomized ($\phi^2 = ((1 + \sqrt{5}) / 2)^2 \approx 2.618$)-competitive memoryless online algorithm. The algorithmic framework and its theoretical analysis include several interesting features. First, our algorithms use (possibly) modified characteristics of packets; these characteristics may not be same as those specified in the input sequence. Second, our analysis method is different from the classical potential function approach.
[ { "version": "v1", "created": "Thu, 17 Jul 2008 04:58:30 GMT" }, { "version": "v2", "created": "Wed, 12 Nov 2008 01:44:22 GMT" }, { "version": "v3", "created": "Mon, 17 Nov 2008 22:32:16 GMT" }, { "version": "v4", "created": "Sat, 7 Feb 2009 21:53:00 GMT" } ]
"2009-02-09T00:00:00"
[ [ "Li", "Fei", "" ] ]
0807.3006
Enoch Peserico
Enoch Peserico and Luca Pretto
The rank convergence of HITS can be slow
5 pages, 1 figure. Keywords: algorithm analysis, information retrieval, rank convergence
null
null
null
cs.DS cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that HITS, to "get right" h of the top k ranked nodes of an N>=2k node graph, can require h^(Omega(N h/k)) iterations (i.e. a substantial Omega(N h log(h)/k) matrix multiplications even with a "squaring trick"). Our proof requires no algebraic tools and is entirely self-contained.
[ { "version": "v1", "created": "Fri, 18 Jul 2008 16:42:57 GMT" } ]
"2008-07-21T00:00:00"
[ [ "Peserico", "Enoch", "" ], [ "Pretto", "Luca", "" ] ]
0807.3026
Ryan Williams
Ryan Williams
Finding paths of length k in O*(2^k) time
7 pages. Revised version to appear in Information Processing Letters
Information Processing Letters, 109(6):315--318, February 2009
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a randomized algorithm that determines if a given graph has a simple path of length at least k in O(2^k poly(n,k)) time.
[ { "version": "v1", "created": "Fri, 18 Jul 2008 18:25:15 GMT" }, { "version": "v2", "created": "Wed, 23 Jul 2008 18:54:40 GMT" }, { "version": "v3", "created": "Sun, 9 Nov 2008 01:04:01 GMT" } ]
"2010-01-05T00:00:00"
[ [ "Williams", "Ryan", "" ] ]
0807.3387
Jeremy Sumner
J. G. Sumner and M. A. Charleston
Phylogenetic estimation with partial likelihood tensors
20 pages, 7 figures, 3 tables
null
null
null
q-bio.QM cs.DS q-bio.PE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an alternative method for calculating likelihoods in molecular phylogenetics. Our method is based on partial likelihood tensors, which are generalizations of partial likelihood vectors, as used in Felsenstein's approach. Exploiting a lexicographic sorting and partial likelihood tensors, it is possible to obtain significant computational savings. We show this on a range of simulated data by enumerating all numerical calculations that are required by our method and the standard approach.
[ { "version": "v1", "created": "Tue, 22 Jul 2008 04:24:11 GMT" } ]
"2008-07-23T00:00:00"
[ [ "Sumner", "J. G.", "" ], [ "Charleston", "M. A.", "" ] ]
0807.4234
Stavros Nikolopoulos D.
Kyriaki Ioannidou and Stavros D. Nikolopoulos
Linear Coloring and Linear Graphs
21 pages, 7 figures
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by the definition of linear coloring on simplicial complexes, recently introduced in the context of algebraic topology \cite{Civan}, and the framework through which it was studied, we introduce the linear coloring on graphs. We provide an upper bound for the chromatic number $\chi(G)$, for any graph $G$, and show that $G$ can be linearly colored in polynomial time by proposing a simple linear coloring algorithm. Based on these results, we define a new class of perfect graphs, which we call co-linear graphs, and study their complement graphs, namely linear graphs. The linear coloring of a graph $G$ is a vertex coloring such that two vertices can be assigned the same color, if their corresponding clique sets are associated by the set inclusion relation (a clique set of a vertex $u$ is the set of all maximal cliques containing $u$); the linear chromatic number $\mathcal{\lambda}(G)$ of $G$ is the least integer $k$ for which $G$ admits a linear coloring with $k$ colors. We show that linear graphs are those graphs $G$ for which the linear chromatic number achieves its theoretical lower bound in every induced subgraph of $G$. We prove inclusion relations between these two classes of graphs and other subclasses of chordal and co-chordal graphs, and also study the structure of the forbidden induced subgraphs of the class of linear graphs.
[ { "version": "v1", "created": "Sat, 26 Jul 2008 12:04:27 GMT" } ]
"2008-07-29T00:00:00"
[ [ "Ioannidou", "Kyriaki", "" ], [ "Nikolopoulos", "Stavros D.", "" ] ]
0807.4368
Dimitris Papamichail
Dimitris Papamichail and Georgios Papamichail
Improved Algorithms for Approximate String Matching (Extended Abstract)
10 pages
null
null
null
cs.DS
http://creativecommons.org/licenses/by-nc-sa/3.0/
The problem of approximate string matching is important in many different areas such as computational biology, text processing and pattern recognition. A great effort has been made to design efficient algorithms addressing several variants of the problem, including comparison of two strings, approximate pattern identification in a string or calculation of the longest common subsequence that two strings share. We designed an output sensitive algorithm solving the edit distance problem between two strings of lengths n and m respectively in time O((s-|n-m|)min(m,n,s)+m+n) and linear space, where s is the edit distance between the two strings. This worst-case time bound sets the quadratic factor of the algorithm independent of the longest string length and improves existing theoretical bounds for this problem. The implementation of our algorithm excels also in practice, especially in cases where the two strings compared differ significantly in length. Source code of our algorithm is available at http://www.cs.miami.edu/\~dimitris/edit_distance
[ { "version": "v1", "created": "Mon, 28 Jul 2008 07:17:57 GMT" } ]
"2008-07-29T00:00:00"
[ [ "Papamichail", "Dimitris", "" ], [ "Papamichail", "Georgios", "" ] ]
0807.4479
Yago Ascasibar
Yago Ascasibar
FiEstAS sampling -- a Monte Carlo algorithm for multidimensional numerical integration
18 pages, 3 figures, submitted to Comp. Phys. Comm
null
10.1016/j.cpc.2008.07.011
null
astro-ph cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes a new algorithm for Monte Carlo integration, based on the Field Estimator for Arbitrary Spaces (FiEstAS). The algorithm is discussed in detail, and its performance is evaluated in the context of Bayesian analysis, with emphasis on multimodal distributions with strong parameter degeneracies. Source code is available upon request.
[ { "version": "v1", "created": "Mon, 28 Jul 2008 15:47:20 GMT" } ]
"2009-11-13T00:00:00"
[ [ "Ascasibar", "Yago", "" ] ]
0807.4582
Ashish Goel
Douglas E. Carroll and Ashish Goel
Lower Bounds for Embedding into Distributions over Excluded Minor Graph Families
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It was shown recently by Fakcharoenphol et al that arbitrary finite metrics can be embedded into distributions over tree metrics with distortion O(log n). It is also known that this bound is tight since there are expander graphs which cannot be embedded into distributions over trees with better than Omega(log n) distortion. We show that this same lower bound holds for embeddings into distributions over any minor excluded family. Given a family of graphs F which excludes minor M where |M|=k, we explicitly construct a family of graphs with treewidth-(k+1) which cannot be embedded into a distribution over F with better than Omega(log n) distortion. Thus, while these minor excluded families of graphs are more expressive than trees, they do not provide asymptotically better approximations in general. An important corollary of this is that graphs of treewidth-k cannot be embedded into distributions over graphs of treewidth-(k-3) with distortion less than Omega(log n). We also extend a result of Alon et al by showing that for any k, planar graphs cannot be embedded into distributions over treewidth-k graphs with better than Omega(log n) distortion.
[ { "version": "v1", "created": "Tue, 29 Jul 2008 07:52:57 GMT" } ]
"2008-07-30T00:00:00"
[ [ "Carroll", "Douglas E.", "" ], [ "Goel", "Ashish", "" ] ]
0807.4626
Assaf Naor
Subhash Khot and Assaf Naor
Approximate kernel clustering
null
null
null
null
cs.DS cs.CC math.FA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the kernel clustering problem we are given a large $n\times n$ positive semi-definite matrix $A=(a_{ij})$ with $\sum_{i,j=1}^na_{ij}=0$ and a small $k\times k$ positive semi-definite matrix $B=(b_{ij})$. The goal is to find a partition $S_1,...,S_k$ of $\{1,... n\}$ which maximizes the quantity $$ \sum_{i,j=1}^k (\sum_{(i,j)\in S_i\times S_j}a_{ij})b_{ij}. $$ We study the computational complexity of this generic clustering problem which originates in the theory of machine learning. We design a constant factor polynomial time approximation algorithm for this problem, answering a question posed by Song, Smola, Gretton and Borgwardt. In some cases we manage to compute the sharp approximation threshold for this problem assuming the Unique Games Conjecture (UGC). In particular, when $B$ is the $3\times 3$ identity matrix the UGC hardness threshold of this problem is exactly $\frac{16\pi}{27}$. We present and study a geometric conjecture of independent interest which we show would imply that the UGC threshold when $B$ is the $k\times k$ identity matrix is $\frac{8\pi}{9}(1-\frac{1}{k})$ for every $k\ge 3$.
[ { "version": "v1", "created": "Tue, 29 Jul 2008 10:40:55 GMT" }, { "version": "v2", "created": "Tue, 9 Dec 2008 20:48:32 GMT" } ]
"2008-12-09T00:00:00"
[ [ "Khot", "Subhash", "" ], [ "Naor", "Assaf", "" ] ]
0807.5111
Atish Das Sarma
Atish Das Sarma, Amit Deshpande, Ravi Kannan
Finding Dense Subgraphs in G(n,1/2)
6 pages
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Finding the largest clique is a notoriously hard problem, even on random graphs. It is known that the clique number of a random graph G(n,1/2) is almost surely either k or k+1, where k = 2log n - 2log(log n) - 1. However, a simple greedy algorithm finds a clique of size only (1+o(1))log n, with high probability, and finding larger cliques -- that of size even (1+ epsilon)log n -- in randomized polynomial time has been a long-standing open problem. In this paper, we study the following generalization: given a random graph G(n,1/2), find the largest subgraph with edge density at least (1-delta). We show that a simple modification of the greedy algorithm finds a subset of 2log n vertices whose induced subgraph has edge density at least 0.951, with high probability. To complement this, we show that almost surely there is no subset of 2.784log n vertices whose induced subgraph has edge density 0.951 or more.
[ { "version": "v1", "created": "Thu, 31 Jul 2008 17:12:25 GMT" }, { "version": "v2", "created": "Mon, 22 Sep 2008 15:23:43 GMT" } ]
"2008-09-22T00:00:00"
[ [ "Sarma", "Atish Das", "" ], [ "Deshpande", "Amit", "" ], [ "Kannan", "Ravi", "" ] ]
0808.0084
Frederic Magniez
Frederic Magniez, Ashwin Nayak, Peter C. Richter, and Miklos Santha
On the hitting times of quantum versus random walks
null
null
null
null
quant-ph cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we define new Monte Carlo type classical and quantum hitting times, and we prove several relationships among these and the already existing Las Vegas type definitions. In particular, we show that for some marked state the two types of hitting time are of the same order in both the classical and the quantum case. Further, we prove that for any reversible ergodic Markov chain $P$, the quantum hitting time of the quantum analogue of $P$ has the same order as the square root of the classical hitting time of $P$. We also investigate the (im)possibility of achieving a gap greater than quadratic using an alternative quantum walk. Finally, we present new quantum algorithms for the detection and finding problems. The complexities of both algorithms are related to the new, potentially smaller, quantum hitting times. The detection algorithm is based on phase estimation and is particularly simple. The finding algorithm combines a similar phase estimation based procedure with ideas of Tulsi from his recent theorem for the 2D grid. Extending his result, we show that for any state-transitive Markov chain with unique marked state, the quantum hitting time is of the same order for both the detection and finding problems.
[ { "version": "v1", "created": "Fri, 1 Aug 2008 14:45:51 GMT" } ]
"2018-03-22T00:00:00"
[ [ "Magniez", "Frederic", "" ], [ "Nayak", "Ashwin", "" ], [ "Richter", "Peter C.", "" ], [ "Santha", "Miklos", "" ] ]
0808.0148
James Lee
Punyashloka Biswal, James R. Lee, Satish Rao
Eigenvalue bounds, spectral partitioning, and metrical deformations via flows
Minor revisions
null
null
null
cs.DS cs.CG math.MG math.SP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a new method for upper bounding the second eigenvalue of the Laplacian of graphs. Our approach uses multi-commodity flows to deform the geometry of the graph; we embed the resulting metric into Euclidean space to recover a bound on the Rayleigh quotient. Using this, we show that every $n$-vertex graph of genus $g$ and maximum degree $d$ satisfies $\lambda_2(G) = O((g+1)^3 d/n)$. This recovers the $O(d/n)$ bound of Spielman and Teng for planar graphs, and compares to Kelner's bound of $O((g+1) poly(d)/n)$, but our proof does not make use of conformal mappings or circle packings. We are thus able to extend this to resolve positively a conjecture of Spielman and Teng, by proving that $\lambda_2(G) = O(d h^6 \log h/n)$ whenever $G$ is $K_h$-minor free. This shows, in particular, that spectral partitioning can be used to recover $O(\sqrt{n})$-sized separators in bounded degree graphs that exclude a fixed minor. We extend this further by obtaining nearly optimal bounds on $\lambda_2$ for graphs which exclude small-depth minors in the sense of Plotkin, Rao, and Smith. Consequently, we show that spectral algorithms find small separators in a general class of geometric graphs. Moreover, while the standard "sweep" algorithm applied to the second eigenvector may fail to find good quotient cuts in graphs of unbounded degree, our approach produces a vector that works for arbitrary graphs. This yields an alternate proof of the result of Alon, Seymour, and Thomas that every excluded-minor family of graphs has $O(\sqrt{n})$-node balanced separators.
[ { "version": "v1", "created": "Fri, 1 Aug 2008 16:45:16 GMT" }, { "version": "v2", "created": "Sat, 9 Aug 2008 15:54:35 GMT" } ]
"2008-08-09T00:00:00"
[ [ "Biswal", "Punyashloka", "" ], [ "Lee", "James R.", "" ], [ "Rao", "Satish", "" ] ]
0808.0159
Eli Ben-Naim
T. Antal, D. ben-Avraham, E. Ben-Naim, P.L. Krapivsky
Front Propagation with Rejuvenation in Flipping Processes
10 pages, 9 figures, 4 tables
J. Phys. A 41, 465002 (2008)
10.1088/1751-8113/41/46/465002
null
cond-mat.stat-mech cs.DS math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study a directed flipping process that underlies the performance of the random edge simplex algorithm. In this stochastic process, which takes place on a one-dimensional lattice whose sites may be either occupied or vacant, occupied sites become vacant at a constant rate and simultaneously cause all sites to the right to change their state. This random process exhibits rich phenomenology. First, there is a front, defined by the position of the left-most occupied site, that propagates at a nontrivial velocity. Second, the front involves a depletion zone with an excess of vacant sites. The total excess D_k increases logarithmically, D_k ~ ln k, with the distance k from the front. Third, the front exhibits rejuvenation -- young fronts are vigorous but old fronts are sluggish. We investigate these phenomena using a quasi-static approximation, direct solutions of small systems, and numerical simulations.
[ { "version": "v1", "created": "Fri, 1 Aug 2008 17:44:13 GMT" } ]
"2008-10-16T00:00:00"
[ [ "Antal", "T.", "" ], [ "ben-Avraham", "D.", "" ], [ "Ben-Naim", "E.", "" ], [ "Krapivsky", "P. L.", "" ] ]
0808.0163
Daniel A. Spielman
Joshua Batson, Daniel A. Spielman, Nikhil Srivastava
Twice-Ramanujan Sparsifiers
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that every graph has a spectral sparsifier with a number of edges linear in its number of vertices. As linear-sized spectral sparsifiers of complete graphs are expanders, our sparsifiers of arbitrary graphs can be viewed as generalizations of expander graphs. In particular, we prove that for every $d>1$ and every undirected, weighted graph $G=(V,E,w)$ on $n$ vertices, there exists a weighted graph $H=(V,F,\tilde{w})$ with at most $\ceil{d(n-1)}$ edges such that for every $x \in \R^{V}$, \[ x^{T}L_{G}x \leq x^{T}L_{H}x \leq (\frac{d+1+2\sqrt{d}}{d+1-2\sqrt{d}})\cdot x^{T}L_{G}x \] where $L_{G}$ and $L_{H}$ are the Laplacian matrices of $G$ and $H$, respectively. Thus, $H$ approximates $G$ spectrally at least as well as a Ramanujan expander with $dn/2$ edges approximates the complete graph. We give an elementary deterministic polynomial time algorithm for constructing $H$.
[ { "version": "v1", "created": "Fri, 1 Aug 2008 18:19:17 GMT" }, { "version": "v2", "created": "Mon, 1 Dec 2008 19:13:09 GMT" }, { "version": "v3", "created": "Wed, 18 Nov 2009 07:27:03 GMT" } ]
"2009-11-18T00:00:00"
[ [ "Batson", "Joshua", "" ], [ "Spielman", "Daniel A.", "" ], [ "Srivastava", "Nikhil", "" ] ]
0808.0298
Dmitrii V. Pasechnik
Edith Elkind and Dmitrii V. Pasechnik
Computing the nucleolus of weighted voting games
LaTeX, 12 pages, COMSOC-2008 workshop
Proceedings of SODA 2009, pp. 327-335
10.1145/1496770.1496807
null
cs.GT cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Weighted voting games (WVG) are coalitional games in which an agent's contribution to a coalition is given by his it weight, and a coalition wins if its total weight meets or exceeds a given quota. These games model decision-making in political bodies as well as collaboration and surplus division in multiagent domains. The computational complexity of various solution concepts for weighted voting games received a lot of attention in recent years. In particular, Elkind et al.(2007) studied the complexity of stability-related solution concepts in WVGs, namely, of the core, the least core, and the nucleolus. While they have completely characterized the algorithmic complexity of the core and the least core, for the nucleolus they have only provided an NP-hardness result. In this paper, we solve an open problem posed by Elkind et al. by showing that the nucleolus of WVGs, and, more generally, k-vector weighted voting games with fixed k, can be computed in pseudopolynomial time, i.e., there exists an algorithm that correctly computes the nucleolus and runs in time polynomial in the number of players and the maximum weight. In doing so, we propose a general framework for computing the nucleolus, which may be applicable to a wider of class of games.
[ { "version": "v1", "created": "Sun, 3 Aug 2008 05:22:47 GMT" } ]
"2010-10-21T00:00:00"
[ [ "Elkind", "Edith", "" ], [ "Pasechnik", "Dmitrii V.", "" ] ]
0808.0540
Paul Tarau
Paul Tarau
Executable Set Theory and Arithmetic Encodings in Prolog
Unpublished draft
null
null
null
cs.LO cs.DM cs.DS cs.MS cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper is organized as a self-contained literate Prolog program that implements elements of an executable finite set theory with focus on combinatorial generation and arithmetic encodings. The complete Prolog code is available at http://logic.csci.unt.edu/tarau/research/2008/pHFS.zip . First, ranking and unranking functions for some "mathematically elegant" data types in the universe of Hereditarily Finite Sets with Urelements are provided, resulting in arithmetic encodings for powersets, hypergraphs, ordinals and choice functions. After implementing a digraph representation of Hereditarily Finite Sets we define {\em decoration functions} that can recover well-founded sets from encodings of their associated acyclic digraphs. We conclude with an encoding of arbitrary digraphs and discuss a concept of duality induced by the set membership relation. In the process, we uncover the surprising possibility of internally sharing isomorphic objects, independently of their language level types and meanings.
[ { "version": "v1", "created": "Tue, 5 Aug 2008 04:59:56 GMT" } ]
"2009-09-29T00:00:00"
[ [ "Tarau", "Paul", "" ] ]
0808.0753
Paul Tarau
Paul Tarau
Ranking Catamorphisms and Unranking Anamorphisms on Hereditarily Finite Datatypes
unpublished draft
null
null
null
cs.SC cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Using specializations of unfold and fold on a generic tree data type we derive unranking and ranking functions providing natural number encodings for various Hereditarily Finite datatypes. In this context, we interpret unranking operations as instances of a generic anamorphism and ranking operations as instances of the corresponding catamorphism. Starting with Ackerman's Encoding from Hereditarily Finite Sets to Natural Numbers we define pairings and tuple encodings that provide building blocks for a theory of Hereditarily Finite Functions. The more difficult problem of ranking and unranking Hereditarily Finite Permutations is then tackled using Lehmer codes and factoradics. The self-contained source code of the paper, as generated from a literate Haskell program, is available at \url{http://logic.csci.unt.edu/tarau/research/2008/fFUN.zip}. Keywords: ranking/unranking, pairing/tupling functions, Ackermann encoding, hereditarily finite sets, hereditarily finite functions, permutations and factoradics, computational mathematics, Haskell data representations
[ { "version": "v1", "created": "Wed, 6 Aug 2008 00:54:05 GMT" } ]
"2008-08-07T00:00:00"
[ [ "Tarau", "Paul", "" ] ]
0808.0754
Paul Tarau
Paul Tarau
A Functional Hitchhiker's Guide to Hereditarily Finite Sets, Ackermann Encodings and Pairing Functions
unpublished draft
null
null
null
cs.MS cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper is organized as a self-contained literate Haskell program that implements elements of an executable finite set theory with focus on combinatorial generation and arithmetic encodings. The code, tested under GHC 6.6.1, is available at http://logic.csci.unt.edu/tarau/research/2008/fSET.zip . We introduce ranking and unranking functions generalizing Ackermann's encoding to the universe of Hereditarily Finite Sets with Urelements. Then we build a lazy enumerator for Hereditarily Finite Sets with Urelements that matches the unranking function provided by the inverse of Ackermann's encoding and we describe functors between them resulting in arithmetic encodings for powersets, hypergraphs, ordinals and choice functions. After implementing a digraph representation of Hereditarily Finite Sets we define {\em decoration functions} that can recover well-founded sets from encodings of their associated acyclic digraphs. We conclude with an encoding of arbitrary digraphs and discuss a concept of duality induced by the set membership relation. Keywords: hereditarily finite sets, ranking and unranking functions, executable set theory, arithmetic encodings, Haskell data representations, functional programming and computational mathematics
[ { "version": "v1", "created": "Wed, 6 Aug 2008 01:05:09 GMT" } ]
"2008-08-07T00:00:00"
[ [ "Tarau", "Paul", "" ] ]
0808.0760
Paul Tarau
Paul Tarau
Declarative Combinatorics: Boolean Functions, Circuit Synthesis and BDDs in Haskell
unpublished draft
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe Haskell implementations of interesting combinatorial generation algorithms with focus on boolean functions and logic circuit representations. First, a complete exact combinational logic circuit synthesizer is described as a combination of catamorphisms and anamorphisms. Using pairing and unpairing functions on natural number representations of truth tables, we derive an encoding for Binary Decision Diagrams (BDDs) with the unique property that its boolean evaluation faithfully mimics its structural conversion to a a natural number through recursive application of a matching pairing function. We then use this result to derive ranking and unranking functions for BDDs and reduced BDDs. Finally, a generalization of the encoding techniques to Multi-Terminal BDDs is provided. The paper is organized as a self-contained literate Haskell program, available at http://logic.csci.unt.edu/tarau/research/2008/fBDD.zip . Keywords: exact combinational logic synthesis, binary decision diagrams, encodings of boolean functions, pairing/unpairing functions, ranking/unranking functions for BDDs and MTBDDs, declarative combinatorics in Haskell
[ { "version": "v1", "created": "Wed, 6 Aug 2008 01:41:51 GMT" } ]
"2008-08-07T00:00:00"
[ [ "Tarau", "Paul", "" ] ]
0808.0980
Gregory Gutin
Peter Dankelmann, Gregory Gutin, Eun Jung Kim
On Complexity of Minimum Leaf Out-branching Problem
null
null
null
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a digraph $D$, the Minimum Leaf Out-Branching problem (MinLOB) is the problem of finding in $D$ an out-branching with the minimum possible number of leaves, i.e., vertices of out-degree 0. Gutin, Razgon and Kim (2008) proved that MinLOB is polynomial time solvable for acyclic digraphs which are exactly the digraphs of directed path-width (DAG-width, directed tree-width, respectively) 0. We investigate how much one can extend this polynomiality result. We prove that already for digraphs of directed path-width (directed tree-width, DAG-width, respectively) 1, MinLOB is NP-hard. On the other hand, we show that for digraphs of restricted directed tree-width (directed path-width, DAG-width, respectively) and a fixed integer $k$, the problem of checking whether there is an out-branching with at most $k$ leaves is polynomial time solvable.
[ { "version": "v1", "created": "Thu, 7 Aug 2008 08:41:48 GMT" } ]
"2008-08-08T00:00:00"
[ [ "Dankelmann", "Peter", "" ], [ "Gutin", "Gregory", "" ], [ "Kim", "Eun Jung", "" ] ]
0808.1108
Nicolas Bock
Nicolas Bock and Emanuel H. Rubensson and Pawe{\l} Sa{\l}ek and Anders M. N. Niklasson and Matt Challacombe
Cache oblivious storage and access heuristics for blocked matrix-matrix multiplication
Fixed typos
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate effects of ordering in blocked matrix--matrix multiplication. We find that submatrices do not have to be stored contiguously in memory to achieve near optimal performance. Instead it is the choice of execution order of the submatrix multiplications that leads to a speedup of up to four times for small block sizes. This is in contrast to results for single matrix elements showing that contiguous memory allocation quickly becomes irrelevant as the blocksize increases.
[ { "version": "v1", "created": "Thu, 7 Aug 2008 22:49:29 GMT" }, { "version": "v2", "created": "Fri, 15 Aug 2008 14:34:31 GMT" } ]
"2008-08-15T00:00:00"
[ [ "Bock", "Nicolas", "" ], [ "Rubensson", "Emanuel H.", "" ], [ "Sałek", "Paweł", "" ], [ "Niklasson", "Anders M. N.", "" ], [ "Challacombe", "Matt", "" ] ]
0808.1128
Mihai Patrascu
Timothy M. Chan and Mihai Patrascu and Liam Roditty
Dynamic Connectivity: Connecting to Networks and Geometry
Full version of a paper to appear in FOCS 2008
null
null
null
cs.DS cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dynamic connectivity is a well-studied problem, but so far the most compelling progress has been confined to the edge-update model: maintain an understanding of connectivity in an undirected graph, subject to edge insertions and deletions. In this paper, we study two more challenging, yet equally fundamental problems. Subgraph connectivity asks to maintain an understanding of connectivity under vertex updates: updates can turn vertices on and off, and queries refer to the subgraph induced by "on" vertices. (For instance, this is closer to applications in networks of routers, where node faults may occur.) We describe a data structure supporting vertex updates in O (m^{2/3}) amortized time, where m denotes the number of edges in the graph. This greatly improves over the previous result [Chan, STOC'02], which required fast matrix multiplication and had an update time of O(m^0.94). The new data structure is also simpler. Geometric connectivity asks to maintain a dynamic set of n geometric objects, and query connectivity in their intersection graph. (For instance, the intersection graph of balls describes connectivity in a network of sensors with bounded transmission radius.) Previously, nontrivial fully dynamic results were known only for special cases like axis-parallel line segments and rectangles. We provide similarly improved update times, O (n^{2/3}), for these special cases. Moreover, we show how to obtain sublinear update bounds for virtually all families of geometric objects which allow sublinear-time range queries, such as arbitrary 2D line segments, d-dimensional simplices, and d-dimensional balls.
[ { "version": "v1", "created": "Thu, 7 Aug 2008 22:16:15 GMT" } ]
"2008-08-11T00:00:00"
[ [ "Chan", "Timothy M.", "" ], [ "Patrascu", "Mihai", "" ], [ "Roditty", "Liam", "" ] ]
0808.1246
Mugurel Ionut Andreica
Mugurel Ionut Andreica, Romulus Andreica, Angela Andreica
Minimum Dissatisfaction Personnel Scheduling
Some of the algorithmic techniques presented in this paper were later used by the first author for developing solutions to several algorithmic contest tasks (see the attached zip archive for some examples)
ARA Congress, Boston : United States (2008)
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we consider two problems regarding the scheduling of available personnel in order to perform a given quantity of work, which can be arbitrarily decomposed into a sequence of activities. We are interested in schedules which minimize the overall dissatisfaction, where each employee's dissatisfaction is modeled as a time-dependent linear function. For the two situations considered we provide a detailed mathematical analysis, as well as efficient algorithms for determining optimal schedules.
[ { "version": "v1", "created": "Fri, 8 Aug 2008 17:15:34 GMT" }, { "version": "v2", "created": "Mon, 21 Jan 2013 17:26:48 GMT" } ]
"2013-01-22T00:00:00"
[ [ "Andreica", "Mugurel Ionut", "" ], [ "Andreica", "Romulus", "" ], [ "Andreica", "Angela", "" ] ]
0808.1671
Shuchi Chawla
Shuchi Chawla and Jason Hartline and Robert Kleinberg
Algorithmic Pricing via Virtual Valuations
A preliminary version of this work appeared at the ACM EC'07 conference. The current version contains improved results and simpler algorithms
null
null
null
cs.GT cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Algorithmic pricing is the computational problem that sellers (e.g., in supermarkets) face when trying to set prices for their items to maximize their profit in the presence of a known demand. Guruswami et al. (2005) propose this problem and give logarithmic approximations (in the number of consumers) when each consumer's values for bundles are known precisely. Subsequently several versions of the problem have been shown to have poly-logarithmic inapproximability. This problem has direct ties to the important open question of better understanding the Bayesian optimal mechanism in multi-parameter settings; however, logarithmic approximations are inadequate for this purpose. It is therefore of vital interest to consider special cases where constant approximations are possible. We consider the unit-demand variant of this problem. Here a consumer has a valuation for each different item and their value for a set of items is simply the maximum value they have for any item in the set. We assume that the preferences of the consumers are drawn from a distribution, the standard assumption in economics; furthermore, the setting of a specific set of customers with known preferences, which is employed in all prior work in algorithmic pricing, is a special case of this general problem, where there is a discrete Bayesian distribution for preferences specified by picking one consumer uniformly from the given set of consumers. Our work complements these existing works by considering the case where the consumer's valuations for the different items are independent random variables. Our main result is a constant approximation that makes use of an interesting connection between this problem and the concept of virtual valuations from the single-parameter Bayesian optimal mechanism design literature.
[ { "version": "v1", "created": "Tue, 12 Aug 2008 18:08:21 GMT" } ]
"2008-08-13T00:00:00"
[ [ "Chawla", "Shuchi", "" ], [ "Hartline", "Jason", "" ], [ "Kleinberg", "Robert", "" ] ]
0808.1766
Ping Li
Ping Li
The Optimal Quantile Estimator for Compressed Counting
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compressed Counting (CC) was recently proposed for very efficiently computing the (approximate) $\alpha$th frequency moments of data streams, where $0<\alpha <= 2$. Several estimators were reported including the geometric mean estimator, the harmonic mean estimator, the optimal power estimator, etc. The geometric mean estimator is particularly interesting for theoretical purposes. For example, when $\alpha -> 1$, the complexity of CC (using the geometric mean estimator) is $O(1/\epsilon)$, breaking the well-known large-deviation bound $O(1/\epsilon^2)$. The case $\alpha\approx 1$ has important applications, for example, computing entropy of data streams. For practical purposes, this study proposes the optimal quantile estimator. Compared with previous estimators, this estimator is computationally more efficient and is also more accurate when $\alpha> 1$.
[ { "version": "v1", "created": "Wed, 13 Aug 2008 01:38:45 GMT" } ]
"2008-08-14T00:00:00"
[ [ "Li", "Ping", "" ] ]
0808.1771
Ping Li
Ping Li
A Very Efficient Scheme for Estimating Entropy of Data Streams Using Compressed Counting
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compressed Counting (CC)} was recently proposed for approximating the $\alpha$th frequency moments of data streams, for $0<\alpha \leq 2$. Under the relaxed strict-Turnstile model, CC dramatically improves the standard algorithm based on symmetric stable random projections}, especially as $\alpha\to 1$. A direct application of CC is to estimate the entropy, which is an important summary statistic in Web/network measurement and often serves a crucial "feature" for data mining. The R\'enyi entropy and the Tsallis entropy are functions of the $\alpha$th frequency moments; and both approach the Shannon entropy as $\alpha\to 1$. A recent theoretical work suggested using the $\alpha$th frequency moment to approximate the Shannon entropy with $\alpha=1+\delta$ and very small $|\delta|$ (e.g., $<10^{-4}$). In this study, we experiment using CC to estimate frequency moments, R\'enyi entropy, Tsallis entropy, and Shannon entropy, on real Web crawl data. We demonstrate the variance-bias trade-off in estimating Shannon entropy and provide practical recommendations. In particular, our experiments enable us to draw some important conclusions: (1) As $\alpha\to 1$, CC dramatically improves {\em symmetric stable random projections} in estimating frequency moments, R\'enyi entropy, Tsallis entropy, and Shannon entropy. The improvements appear to approach "infinity." (2) Using {\em symmetric stable random projections} and $\alpha = 1+\delta$ with very small $|\delta|$ does not provide a practical algorithm because the required sample size is enormous.
[ { "version": "v1", "created": "Wed, 13 Aug 2008 03:05:33 GMT" }, { "version": "v2", "created": "Thu, 21 Aug 2008 17:36:19 GMT" } ]
"2008-08-21T00:00:00"
[ [ "Li", "Ping", "" ] ]
0808.1787
Arnab Bhattacharyya
Arnab Bhattacharyya, Elena Grigorescu, Kyomin Jung, Sofya Raskhodnikova, David P. Woodruff
Transitive-Closure Spanners
Extended abstract with appendices
null
null
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a directed graph G = (V,E) and an integer k>=1, a k-transitive-closure-spanner (k-TC-spanner) of G is a directed graph H = (V, E_H) that has (1) the same transitive-closure as G and (2) diameter at most k. These spanners were implicitly studied in access control, data structures, and property testing, and properties of these spanners have been rediscovered over the span of 20 years. The main goal in each of these applications is to obtain the sparsest k-TC-spanners. We bring these diverse areas under the unifying framework of TC-spanners. We initiate the study of approximability of the size of the sparsest k-TC-spanner for a given directed graph. We completely resolve the approximability of 2-TC-spanners, showing that it is Theta(log n) unless P = NP. For k>2, we present a polynomial-time algorithm that finds a k-TC-spanner with size within O((n log n)^{1-1/k}) of the optimum. Our algorithmic techniques also yield algorithms with the best-known approximation ratio for well-studied problems on directed spanners when k>3: DIRECTED k-SPANNER, CLIENT/SERVER DIRECTED k-SPANNER, and k-DIAMETER SPANNING SUBGRAPH. For constant k>=3, we show that the size of the sparsest k-TC-spanner is hard to approximate with 2^{log^{1-eps} n} ratio unless NP \subseteq DTIME(n^{polylog n}}). Finally, we study the size of the sparsest k-TC-spanners for H-minor-free graph families. Combining our constructions with our insight that 2-TC-spanners can be used for designing property testers, we obtain a monotonicity tester with O(log^2 n /eps) queries for any poset whose transitive reduction is an H-minor free digraph, improving the Theta(sqrt(n) log n/eps)-queries required of the tester due to Fischer et al (2002).
[ { "version": "v1", "created": "Wed, 13 Aug 2008 06:44:10 GMT" } ]
"2008-08-14T00:00:00"
[ [ "Bhattacharyya", "Arnab", "" ], [ "Grigorescu", "Elena", "" ], [ "Jung", "Kyomin", "" ], [ "Raskhodnikova", "Sofya", "" ], [ "Woodruff", "David P.", "" ] ]
0808.2017
Ittai Abraham
Ittai Abraham, Yair Bartal, and Ofer Neiman
Nearly Tight Low Stretch Spanning Trees
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that any graph $G$ with $n$ points has a distribution $\mathcal{T}$ over spanning trees such that for any edge $(u,v)$ the expected stretch $E_{T \sim \mathcal{T}}[d_T(u,v)/d_G(u,v)]$ is bounded by $\tilde{O}(\log n)$. Our result is obtained via a new approach of building ``highways'' between portals and a new strong diameter probabilistic decomposition theorem.
[ { "version": "v1", "created": "Thu, 14 Aug 2008 15:58:55 GMT" } ]
"2008-08-15T00:00:00"
[ [ "Abraham", "Ittai", "" ], [ "Bartal", "Yair", "" ], [ "Neiman", "Ofer", "" ] ]
0808.2222
Andrew McGregor
Alexandr Andoni, Andrew McGregor, Krzysztof Onak, Rina Panigrahy
Better Bounds for Frequency Moments in Random-Order Streams
4 pages
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Estimating frequency moments of data streams is a very well studied problem and tight bounds are known on the amount of space that is necessary and sufficient when the stream is adversarially ordered. Recently, motivated by various practical considerations and applications in learning and statistics, there has been growing interest into studying streams that are randomly ordered. In the paper we improve the previous lower bounds on the space required to estimate the frequency moments of a randomly ordered streams.
[ { "version": "v1", "created": "Sat, 16 Aug 2008 00:43:14 GMT" } ]
"2008-08-19T00:00:00"
[ [ "Andoni", "Alexandr", "" ], [ "McGregor", "Andrew", "" ], [ "Onak", "Krzysztof", "" ], [ "Panigrahy", "Rina", "" ] ]
0808.2953
Paul Tarau
Paul Tarau
Declarative Combinatorics: Isomorphisms, Hylomorphisms and Hereditarily Finite Data Types in Haskell
unpublished draft, revision 3, added various new encodings, with focus on primes and multisets, now 104 pages
null
null
null
cs.PL cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is an exploration in a functional programming framework of {\em isomorphisms} between elementary data types (natural numbers, sets, multisets, finite functions, permutations binary decision diagrams, graphs, hypergraphs, parenthesis languages, dyadic rationals, primes, DNA sequences etc.) and their extension to hereditarily finite universes through {\em hylomorphisms} derived from {\em ranking/unranking} and {\em pairing/unpairing} operations. An embedded higher order {\em combinator language} provides any-to-any encodings automatically. Besides applications to experimental mathematics, a few examples of ``free algorithms'' obtained by transferring operations between data types are shown. Other applications range from stream iterators on combinatorial objects to self-delimiting codes, succinct data representations and generation of random instances. The paper covers 59 data types and, through the use of the embedded combinator language, provides 3540 distinct bijective transformations between them. The self-contained source code of the paper, as generated from a literate Haskell program, is available at \url{http://logic.csci.unt.edu/tarau/research/2008/fISO.zip}. {\bf Keywords}: Haskell data representations, data type isomorphisms, declarative combinatorics, computational mathematics, Ackermann encoding, G\"{o}del numberings, arithmetization, ranking/unranking, hereditarily finite sets, functions and permutations, encodings of binary decision diagrams, dyadic rationals, DNA encodings
[ { "version": "v1", "created": "Thu, 21 Aug 2008 16:47:38 GMT" }, { "version": "v2", "created": "Mon, 20 Oct 2008 18:47:59 GMT" }, { "version": "v3", "created": "Tue, 9 Dec 2008 01:28:15 GMT" }, { "version": "v4", "created": "Mon, 19 Jan 2009 19:39:51 GMT" } ]
"2009-01-19T00:00:00"
[ [ "Tarau", "Paul", "" ] ]
0808.3197
Ming-Zhe Chen
Ming-Zhe Chen
On the Monotonicity of Work Function in k-Server Conjecture
3 pages, corrected typos
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a mistake in work function algorithm of k-server conjecture. That is, the monotonicity of the work function is not always true.
[ { "version": "v1", "created": "Sun, 24 Aug 2008 15:37:35 GMT" } ]
"2008-08-26T00:00:00"
[ [ "Chen", "Ming-Zhe", "" ] ]
0808.3331
Gregory Karagiorgos
Gregory Karagiorgos, Dimitrios Poulakis
Efficient algorithms for the basis of finite Abelian groups
11 pages
null
null
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $G$ be a finite abelian group $G$ with $N$ elements. In this paper we give a O(N) time algorithm for computing a basis of $G$. Furthermore, we obtain an algorithm for computing a basis from a generating system of $G$ with $M$ elements having time complexity $O(M\sum_{p|N} e(p)\lceil p^{1/2}\rceil^{\mu(p)})$, where $p$ runs over all the prime divisors of $N$, and $p^{e(p)}$, $\mu(p)$ are the exponent and the number of cyclic groups which are direct factors of the $p$-primary component of $G$, respectively. In case where $G$ is a cyclic group having a generating system with $M$ elements, a $O(MN^{\epsilon})$ time algorithm for the computation of a basis of $G$ is obtained.
[ { "version": "v1", "created": "Mon, 25 Aug 2008 11:01:15 GMT" } ]
"2008-08-26T00:00:00"
[ [ "Karagiorgos", "Gregory", "" ], [ "Poulakis", "Dimitrios", "" ] ]
0808.3881
Paul Bonsma
Paul Bonsma, Felix Breuer
Counting Hexagonal Patches and Independent Sets in Circle Graphs
null
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A hexagonal patch is a plane graph in which inner faces have length 6, inner vertices have degree 3, and boundary vertices have degree 2 or 3. We consider the following counting problem: given a sequence of twos and threes, how many hexagonal patches exist with this degree sequence along the outer face? This problem is motivated by the study of benzenoid hydrocarbons and fullerenes in computational chemistry. We give the first polynomial time algorithm for this problem. We show that it can be reduced to counting maximum independent sets in circle graphs, and give a simple and fast algorithm for this problem.
[ { "version": "v1", "created": "Thu, 28 Aug 2008 10:39:10 GMT" }, { "version": "v2", "created": "Wed, 15 Jul 2009 15:27:00 GMT" } ]
"2009-07-15T00:00:00"
[ [ "Bonsma", "Paul", "" ], [ "Breuer", "Felix", "" ] ]
0808.4134
Daniel A. Spielman
Daniel A. Spielman and Shang-Hua Teng
Spectral Sparsification of Graphs
This revision addresses comments of the referees. In particular, we have completely re-written the proof of the main graph partitioning theorem in section 8
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new notion of graph sparsificaiton based on spectral similarity of graph Laplacians: spectral sparsification requires that the Laplacian quadratic form of the sparsifier approximate that of the original. This is equivalent to saying that the Laplacian of the sparsifier is a good preconditioner for the Laplacian of the original. We prove that every graph has a spectral sparsifier of nearly linear size. Moreover, we present an algorithm that produces spectral sparsifiers in time $\softO{m}$, where $m$ is the number of edges in the original graph. This construction is a key component of a nearly-linear time algorithm for solving linear equations in diagonally-dominant matrcies. Our sparsification algorithm makes use of a nearly-linear time algorithm for graph partitioning that satisfies a strong guarantee: if the partition it outputs is very unbalanced, then the larger part is contained in a subgraph of high conductance.
[ { "version": "v1", "created": "Fri, 29 Aug 2008 17:17:29 GMT" }, { "version": "v2", "created": "Fri, 19 Sep 2008 14:20:42 GMT" }, { "version": "v3", "created": "Tue, 20 Jul 2010 20:48:36 GMT" } ]
"2010-07-22T00:00:00"
[ [ "Spielman", "Daniel A.", "" ], [ "Teng", "Shang-Hua", "" ] ]
0809.0188
Marek Karpinski
Piotr Berman, Bhaskar DasGupta and Marek Karpinski
Approximating Transitivity in Directed Networks
null
null
null
null
cs.CC cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of computing a minimum equivalent digraph (also known as the problem of computing a strong transitive reduction) and its maximum objective function variant, with two types of extensions. First, we allow to declare a set $D\subset E$ and require that a valid solution $A$ satisfies $D\subset A$ (it is sometimes called transitive reduction problem). In the second extension (called $p$-ary transitive reduction), we have integer edge labeling and we view two paths as equivalent if they have the same beginning, ending and the sum of labels modulo $p$. A solution $A\subseteq E$ is valid if it gives an equivalent path for every original path. For all problems we establish the following: polynomial time minimization of $|A|$ within ratio 1.5, maximization of $|E-A|$ within ratio 2, MAX-SNP hardness even of the length of simple cycles is limited to 5. Furthermore, we believe that the combinatorial technique behind the approximation algorithm for the minimization version might be of interest to other graph connectivity problems as well.
[ { "version": "v1", "created": "Mon, 1 Sep 2008 08:58:32 GMT" } ]
"2008-09-02T00:00:00"
[ [ "Berman", "Piotr", "" ], [ "DasGupta", "Bhaskar", "" ], [ "Karpinski", "Marek", "" ] ]
0809.0400
Xuan Cai
Xuan Cai
Canonical Coin Systems for Change-Making Problems
7 pages
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Change-Making Problem is to represent a given value with the fewest coins under a given coin system. As a variation of the knapsack problem, it is known to be NP-hard. Nevertheless, in most real money systems, the greedy algorithm yields optimal solutions. In this paper, we study what type of coin systems that guarantee the optimality of the greedy algorithm. We provide new proofs for a sufficient and necessary condition for the so-called \emph{canonical} coin systems with four or five types of coins, and a sufficient condition for non-canonical coin systems, respectively. Moreover, we present an $O(m^2)$ algorithm that decides whether a tight coin system is canonical.
[ { "version": "v1", "created": "Tue, 2 Sep 2008 11:04:19 GMT" }, { "version": "v2", "created": "Sat, 21 Mar 2009 16:12:55 GMT" } ]
"2009-03-21T00:00:00"
[ [ "Cai", "Xuan", "" ] ]
0809.0460
Shipra Agrawal
Shipra Agrawal, Amin Saberi, Yinyu Ye
Stochastic Combinatorial Optimization under Probabilistic Constraints
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present approximation algorithms for combinatorial optimization problems under probabilistic constraints. Specifically, we focus on stochastic variants of two important combinatorial optimization problems: the k-center problem and the set cover problem, with uncertainty characterized by a probability distribution over set of points or elements to be covered. We consider these problems under adaptive and non-adaptive settings, and present efficient approximation algorithms for the case when underlying distribution is a product distribution. In contrast to the expected cost model prevalent in stochastic optimization literature, our problem definitions support restrictions on the probability distributions of the total costs, via incorporating constraints that bound the probability with which the incurred costs may exceed a given threshold.
[ { "version": "v1", "created": "Tue, 2 Sep 2008 16:07:42 GMT" } ]
"2008-09-03T00:00:00"
[ [ "Agrawal", "Shipra", "" ], [ "Saberi", "Amin", "" ], [ "Ye", "Yinyu", "" ] ]
0809.0949
Michael Baer
Michael B. Baer
Efficient Implementation of the Generalized Tunstall Code Generation Algorithm
5 pages, 5 figures, accepted to ISIT 2009
null
null
null
cs.IT cs.DS math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A method is presented for constructing a Tunstall code that is linear time in the number of output items. This is an improvement on the state of the art for non-Bernoulli sources, including Markov sources, which require a (suboptimal) generalization of Tunstall's algorithm proposed by Savari and analytically examined by Tabus and Rissanen. In general, if n is the total number of output leaves across all Tunstall trees, s is the number of trees (states), and D is the number of leaves of each internal node, then this method takes O((1+(log s)/D) n) time and O(n) space.
[ { "version": "v1", "created": "Fri, 5 Sep 2008 05:14:10 GMT" }, { "version": "v2", "created": "Thu, 30 Apr 2009 19:58:44 GMT" }, { "version": "v3", "created": "Fri, 8 May 2009 00:10:57 GMT" } ]
"2009-05-08T00:00:00"
[ [ "Baer", "Michael B.", "" ] ]
0809.1171
Cheng-Wei Luo
Cheng-Wei Luo, Hsiao-Fei Liu, Peng-An Chen, and Kun-Mao Chao
Minkowski Sum Selection and Finding
23 pages, 10 figures, accepted by ISAAC 2008
null
null
null
cs.DS cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For the \textsc{Minkowski Sum Selection} problem with linear objective functions, we obtain the following results: (1) optimal $O(n\log n)$ time algorithms for $\lambda=1$; (2) $O(n\log^2 n)$ time deterministic algorithms and expected $O(n\log n)$ time randomized algorithms for any fixed $\lambda>1$. For the \textsc{Minkowski Sum Finding} problem with linear objective functions or objective functions of the form $f(x,y)=\frac{by}{ax}$, we construct optimal $O(n\log n)$ time algorithms for any fixed $\lambda\geq 1$.
[ { "version": "v1", "created": "Sat, 6 Sep 2008 14:31:49 GMT" } ]
"2008-09-09T00:00:00"
[ [ "Luo", "Cheng-Wei", "" ], [ "Liu", "Hsiao-Fei", "" ], [ "Chen", "Peng-An", "" ], [ "Chao", "Kun-Mao", "" ] ]
0809.1681
Rafael Laufer
Rafael Laufer and Leonard Kleinrock
Multirate Anypath Routing in Wireless Mesh Networks
13 pages, 8 figures
IEEE INFOCOM 2009
10.1109/INFCOM.2009.5061904
UCLA-CSD-TR080025
cs.NI cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a new routing paradigm that generalizes opportunistic routing in wireless mesh networks. In multirate anypath routing, each node uses both a set of next hops and a selected transmission rate to reach a destination. Using this rate, a packet is broadcast to the nodes in the set and one of them forwards the packet on to the destination. To date, there is no theory capable of jointly optimizing both the set of next hops and the transmission rate used by each node. We bridge this gap by introducing a polynomial-time algorithm to this problem and provide the proof of its optimality. The proposed algorithm runs in the same running time as regular shortest-path algorithms and is therefore suitable for deployment in link-state routing protocols. We conducted experiments in a 802.11b testbed network, and our results show that multirate anypath routing performs on average 80% and up to 6.4 times better than anypath routing with a fixed rate of 11 Mbps. If the rate is fixed at 1 Mbps instead, performance improves by up to one order of magnitude.
[ { "version": "v1", "created": "Tue, 9 Sep 2008 21:49:04 GMT" } ]
"2010-11-01T00:00:00"
[ [ "Laufer", "Rafael", "" ], [ "Kleinrock", "Leonard", "" ] ]
0809.1715
Bodo Manthey
Bodo Manthey and Heiko R\"oglin
Improved Smoothed Analysis of the k-Means Method
To be presented at the 20th ACM-SIAM Symposium on Discrete Algorithms (SODA 2009)
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The k-means method is a widely used clustering algorithm. One of its distinguished features is its speed in practice. Its worst-case running-time, however, is exponential, leaving a gap between practical and theoretical performance. Arthur and Vassilvitskii (FOCS 2006) aimed at closing this gap, and they proved a bound of $\poly(n^k, \sigma^{-1})$ on the smoothed running-time of the k-means method, where n is the number of data points and $\sigma$ is the standard deviation of the Gaussian perturbation. This bound, though better than the worst-case bound, is still much larger than the running-time observed in practice. We improve the smoothed analysis of the k-means method by showing two upper bounds on the expected running-time of k-means. First, we prove that the expected running-time is bounded by a polynomial in $n^{\sqrt k}$ and $\sigma^{-1}$. Second, we prove an upper bound of $k^{kd} \cdot \poly(n, \sigma^{-1})$, where d is the dimension of the data space. The polynomial is independent of k and d, and we obtain a polynomial bound for the expected running-time for $k, d \in O(\sqrt{\log n/\log \log n})$. Finally, we show that k-means runs in smoothed polynomial time for one-dimensional instances.
[ { "version": "v1", "created": "Wed, 10 Sep 2008 07:00:38 GMT" } ]
"2008-09-11T00:00:00"
[ [ "Manthey", "Bodo", "" ], [ "Röglin", "Heiko", "" ] ]
0809.1810
Felipe Cruz
Felipe A. Cruz, L. A. Barba
Characterization of the errors of the FMM in particle simulations
34 pages, 38 images
Int. J. Num. Meth. Engrg., 79(13):1577-1604 (2009)
10.1002/nme.2611
null
cs.DS physics.comp-ph
http://creativecommons.org/licenses/by/3.0/
The Fast Multipole Method (FMM) offers an acceleration for pairwise interaction calculation, known as $N$-body problems, from $\mathcal{O}(N^2)$ to $\mathcal{O}(N)$ with $N$ particles. This has brought dramatic increase in the capability of particle simulations in many application areas, such as electrostatics, particle formulations of fluid mechanics, and others. Although the literature on the subject provides theoretical error bounds for the FMM approximation, there are not many reports of the measured errors in a suite of computational experiments. We have performed such an experimental investigation, and summarized the results of about 1000 calculations using the FMM algorithm, to characterize the accuracy of the method in relation with the different parameters available to the user. In addition to the more standard diagnostic of the maximum error, we supply illustrations of the spatial distribution of the errors, which offers visual evidence of all the contributing factors to the overall approximation accuracy: multipole expansion, local expansion, hierarchical spatial decomposition (interaction lists, local domain, far domain). This presentation is a contribution to any researcher wishing to incorporate the FMM acceleration to their application code, as it aids in understanding where accuracy is gained or compromised.
[ { "version": "v1", "created": "Wed, 10 Sep 2008 15:06:08 GMT" } ]
"2011-09-21T00:00:00"
[ [ "Cruz", "Felipe A.", "" ], [ "Barba", "L. A.", "" ] ]
0809.1895
Benjamin Birnbaum
Yossi Azar, Benjamin Birnbaum, Anna R. Karlin, and C. Thach Nguyen
Thinking Twice about Second-Price Ad Auctions
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent work has addressed the algorithmic problem of allocating advertisement space for keywords in sponsored search auctions so as to maximize revenue, most of which assume that pricing is done via a first-price auction. This does not realistically model the Generalized Second Price (GSP) auction used in practice, in which bidders pay the next-highest bid for keywords that they are allocated. Towards the goal of more realistically modeling these auctions, we introduce the Second-Price Ad Auctions problem, in which bidders' payments are determined by the GSP mechanism. We show that the complexity of the Second-Price Ad Auctions problem is quite different than that of the more studied First-Price Ad Auctions problem. First, unlike the first-price variant, for which small constant-factor approximations are known, it is NP-hard to approximate the Second-Price Ad Auctions problem to any non-trivial factor, even when the bids are small compared to the budgets. Second, this discrepancy extends even to the 0-1 special case that we call the Second-Price Matching problem (2PM). Offline 2PM is APX-hard, and for online 2PM there is no deterministic algorithm achieving a non-trivial competitive ratio and no randomized algorithm achieving a competitive ratio better than 2. This contrasts with the results for the analogous special case in the first-price model, the standard bipartite matching problem, which is solvable in polynomial time and which has deterministic and randomized online algorithms achieving better competitive ratios. On the positive side, we provide a 2-approximation for offline 2PM and a 5.083-competitive randomized algorithm for online 2PM. The latter result makes use of a new generalization of a result on the performance of the "Ranking" algorithm for online bipartite matching.
[ { "version": "v1", "created": "Wed, 10 Sep 2008 23:33:47 GMT" } ]
"2008-09-12T00:00:00"
[ [ "Azar", "Yossi", "" ], [ "Birnbaum", "Benjamin", "" ], [ "Karlin", "Anna R.", "" ], [ "Nguyen", "C. Thach", "" ] ]
0809.1902
Manor Mendel
Manor Mendel, Chaya Schwob
Fast C-K-R Partitions of Sparse Graphs
15 pages, title changed, a small error in the running time was fixed. Many errors in English were eliminated
Chicago J. Theoretical Comp. Sci., 2009(2), 2009
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present fast algorithms for constructing probabilistic embeddings and approximate distance oracles in sparse graphs. The main ingredient is a fast algorithm for sampling the probabilistic partitions of Calinescu, Karloff, and Rabani in sparse graphs.
[ { "version": "v1", "created": "Thu, 11 Sep 2008 02:10:29 GMT" }, { "version": "v2", "created": "Wed, 9 Sep 2009 02:47:44 GMT" } ]
"2009-09-09T00:00:00"
[ [ "Mendel", "Manor", "" ], [ "Schwob", "Chaya", "" ] ]
0809.1906
Shiva Kintali
Shiva Kintali
Betweenness Centrality : Algorithms and Lower Bounds
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the most fundamental problems in large scale network analysis is to determine the importance of a particular node in a network. Betweenness centrality is the most widely used metric to measure the importance of a node in a network. In this paper, we present a randomized parallel algorithm and an algebraic method for computing betweenness centrality of all nodes in a network. We prove that any path-comparison based algorithm cannot compute betweenness in less than O(nm) time.
[ { "version": "v1", "created": "Thu, 11 Sep 2008 02:49:07 GMT" }, { "version": "v2", "created": "Sun, 19 Oct 2008 04:24:21 GMT" } ]
"2008-10-19T00:00:00"
[ [ "Kintali", "Shiva", "" ] ]
0809.2075
Jittat Fakcharoenphol
Jittat Fakcharoenphol, Boonserm Kijsirikul
Low congestion online routing and an improved mistake bound for online prediction of graph labeling
5 pages
null
null
null
cs.DS cs.DM cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we show a connection between a certain online low-congestion routing problem and an online prediction of graph labeling. More specifically, we prove that if there exists a routing scheme that guarantees a congestion of $\alpha$ on any edge, there exists an online prediction algorithm with mistake bound $\alpha$ times the cut size, which is the size of the cut induced by the label partitioning of graph vertices. With previous known bound of $O(\log n)$ for $\alpha$ for the routing problem on trees with $n$ vertices, we obtain an improved prediction algorithm for graphs with high effective resistance. In contrast to previous approaches that move the graph problem into problems in vector space using graph Laplacian and rely on the analysis of the perceptron algorithm, our proof are purely combinatorial. Further more, our approach directly generalizes to the case where labels are not binary.
[ { "version": "v1", "created": "Thu, 11 Sep 2008 19:32:49 GMT" }, { "version": "v2", "created": "Fri, 12 Sep 2008 07:02:37 GMT" } ]
"2008-09-12T00:00:00"
[ [ "Fakcharoenphol", "Jittat", "" ], [ "Kijsirikul", "Boonserm", "" ] ]
0809.2097
Hsiao-Fei Liu
Hsiao-Fei Liu, Peng-An Chen, and Kun-Mao Chao
Algorithms for Locating Constrained Optimal Intervals
An earlier version of the second part of this work appeared in Proceedings of the 18th International Symposium on Algorithms and Computation, Japan, 2007
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we obtain the following new results. 1. Given a sequence $D=((h_1,s_1), (h_2,s_2) ..., (h_n,s_n))$ of number pairs, where $s_i>0$ for all $i$, and a number $L_h$, we propose an O(n)-time algorithm for finding an index interval $[i,j]$ that maximizes $\frac{\sum_{k=i}^{j} h_k}{\sum_{k=i}^{j} s_k}$ subject to $\sum_{k=i}^{j} h_k \geq L_h$. 2. Given a sequence $D=((h_1,s_1), (h_2,s_2) ..., (h_n,s_n))$ of number pairs, where $s_i=1$ for all $i$, and an integer $L_s$ with $1\leq L_s\leq n$, we propose an $O(n\frac{T(L_s^{1/2})}{L_s^{1/2}})$-time algorithm for finding an index interval $[i,j]$ that maximizes $\frac{\sum_{k=i}^{j} h_k}{\sqrt{\sum_{k=i}^{j} s_k}}$ subject to $\sum_{k=i}^{j} s_k \geq L_s$, where $T(n')$ is the time required to solve the all-pairs shortest paths problem on a graph of $n'$ nodes. By the latest result of Chan \cite{Chan}, $T(n')=O(n'^3 \frac{(\log\log n')^3}{(\log n')^2})$, so our algorithm runs in subquadratic time $O(nL_s\frac{(\log\log L_s)^3}{(\log L_s)^2})$.
[ { "version": "v1", "created": "Thu, 11 Sep 2008 20:12:08 GMT" } ]
"2008-09-15T00:00:00"
[ [ "Liu", "Hsiao-Fei", "" ], [ "Chen", "Peng-An", "" ], [ "Chao", "Kun-Mao", "" ] ]
0809.2489
Petteri Kaski
Andreas Bj\"orklund, Thore Husfeldt, Petteri Kaski, Mikko Koivisto
The fast intersection transform with applications to counting paths
11 pages
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an algorithm for evaluating a linear ``intersection transform'' of a function defined on the lattice of subsets of an $n$-element set. In particular, the algorithm constructs an arithmetic circuit for evaluating the transform in ``down-closure time'' relative to the support of the function and the evaluation domain. As an application, we develop an algorithm that, given as input a digraph with $n$ vertices and bounded integer weights at the edges, counts paths by weight and given length $0\leq\ell\leq n-1$ in time $O^*(\exp(n\cdot H(\ell/(2n))))$, where $H(p)=-p\log p-(1-p)\log(1-p)$, and the notation $O^*(\cdot)$ suppresses a factor polynomial in $n$.
[ { "version": "v1", "created": "Mon, 15 Sep 2008 11:15:05 GMT" } ]
"2008-09-16T00:00:00"
[ [ "Björklund", "Andreas", "" ], [ "Husfeldt", "Thore", "" ], [ "Kaski", "Petteri", "" ], [ "Koivisto", "Mikko", "" ] ]
0809.2554
Kanat Tangwongsan
Anupam Gupta and Kanat Tangwongsan
Simpler Analyses of Local Search Algorithms for Facility Location
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study local search algorithms for metric instances of facility location problems: the uncapacitated facility location problem (UFL), as well as uncapacitated versions of the $k$-median, $k$-center and $k$-means problems. All these problems admit natural local search heuristics: for example, in the UFL problem the natural moves are to open a new facility, close an existing facility, and to swap a closed facility for an open one; in $k$-medians, we are allowed only swap moves. The local-search algorithm for $k$-median was analyzed by Arya et al. (SIAM J. Comput. 33(3):544-562, 2004), who used a clever ``coupling'' argument to show that local optima had cost at most constant times the global optimum. They also used this argument to show that the local search algorithm for UFL was 3-approximation; their techniques have since been applied to other facility location problems. In this paper, we give a proof of the $k$-median result which avoids this coupling argument. These arguments can be used in other settings where the Arya et al. arguments have been used. We also show that for the problem of opening $k$ facilities $F$ to minimize the objective function $\Phi_p(F) = \big(\sum_{j \in V} d(j, F)^p\big)^{1/p}$, the natural swap-based local-search algorithm is a $\Theta(p)$-approximation. This implies constant-factor approximations for $k$-medians (when $p=1$), and $k$-means (when $p = 2$), and an $O(\log n)$-approximation algorithm for the $k$-center problem (which is essentially $p = \log n$).
[ { "version": "v1", "created": "Mon, 15 Sep 2008 15:42:47 GMT" } ]
"2008-09-16T00:00:00"
[ [ "Gupta", "Anupam", "" ], [ "Tangwongsan", "Kanat", "" ] ]
0809.2858
Christophe Paul
Stephane Bessy and Christophe Paul and Anthony Perez
Polynomial kernels for 3-leaf power graph modification problems
Submitted
null
10.1007/978-3-642-10217-2_10
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A graph G=(V,E) is a 3-leaf power iff there exists a tree T whose leaves are V and such that (u,v) is an edge iff u and v are at distance at most 3 in T. The 3-leaf power graph edge modification problems, i.e. edition (also known as the closest 3-leaf power), completion and edge-deletion, are FTP when parameterized by the size of the edge set modification. However polynomial kernel was known for none of these three problems. For each of them, we provide cubic kernels that can be computed in linear time for each of these problems. We thereby answer an open problem first mentioned by Dom, Guo, Huffner and Niedermeier (2005).
[ { "version": "v1", "created": "Wed, 17 Sep 2008 06:16:37 GMT" }, { "version": "v2", "created": "Wed, 17 Sep 2008 20:10:57 GMT" } ]
"2015-05-13T00:00:00"
[ [ "Bessy", "Stephane", "" ], [ "Paul", "Christophe", "" ], [ "Perez", "Anthony", "" ] ]
0809.2957
Sergi Elizalde
Sergi Elizalde, Peter Winkler
Sorting by Placement and Shift
13 pages, 4 figures, Proceedings of SODA 2009
null
null
null
math.CO cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In sorting situations where the final destination of each item is known, it is natural to repeatedly choose items and place them where they belong, allowing the intervening items to shift by one to make room. (In fact, a special case of this algorithm is commonly used to hand-sort files.) However, it is not obvious that this algorithm necessarily terminates. We show that in fact the algorithm terminates after at most $2^{n-1}-1$ steps in the worst case (confirming a conjecture of L. Larson), and that there are super-exponentially many permutations for which this exact bound can be achieved. The proof involves a curious symmetrical binary representation.
[ { "version": "v1", "created": "Wed, 17 Sep 2008 16:29:38 GMT" } ]
"2008-09-18T00:00:00"
[ [ "Elizalde", "Sergi", "" ], [ "Winkler", "Peter", "" ] ]
0809.2970
Raphael Yuster
Raphael Yuster
Single source shortest paths in $H$-minor free graphs
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an algorithm for the Single Source Shortest Paths (SSSP) problem in \emph{$H$-minor free} graphs. For every fixed $H$, if $G$ is a graph with $n$ vertices having integer edge lengths and $s$ is a designated source vertex of $G$, the algorithm runs in $\tilde{O}(n^{\sqrt{11.5}-2} \log L) \le O(n^{1.392} \log L)$ time, where $L$ is the absolute value of the smallest edge length. The algorithm computes shortest paths and the distances from $s$ to all vertices of the graph, or else provides a certificate that $G$ is not $H$-minor free. Our result improves an earlier $O(n^{1.5} \log L)$ time algorithm for this problem, which follows from a general SSSP algorithm of Goldberg.
[ { "version": "v1", "created": "Wed, 17 Sep 2008 17:51:09 GMT" } ]
"2008-09-18T00:00:00"
[ [ "Yuster", "Raphael", "" ] ]
0809.3232
Daniel A. Spielman
Daniel A. Spielman, Shang-Hua Teng
A Local Clustering Algorithm for Massive Graphs and its Application to Nearly-Linear Time Graph Partitioning
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the design of local algorithms for massive graphs. A local algorithm is one that finds a solution containing or near a given vertex without looking at the whole graph. We present a local clustering algorithm. Our algorithm finds a good cluster--a subset of vertices whose internal connections are significantly richer than its external connections--near a given vertex. The running time of our algorithm, when it finds a non-empty local cluster, is nearly linear in the size of the cluster it outputs. Our clustering algorithm could be a useful primitive for handling massive graphs, such as social networks and web-graphs. As an application of this clustering algorithm, we present a partitioning algorithm that finds an approximate sparsest cut with nearly optimal balance. Our algorithm takes time nearly linear in the number edges of the graph. Using the partitioning algorithm of this paper, we have designed a nearly-linear time algorithm for constructing spectral sparsifiers of graphs, which we in turn use in a nearly-linear time algorithm for solving linear systems in symmetric, diagonally-dominant matrices. The linear system solver also leads to a nearly linear-time algorithm for approximating the second-smallest eigenvalue and corresponding eigenvector of the Laplacian matrix of a graph. These other results are presented in two companion papers.
[ { "version": "v1", "created": "Thu, 18 Sep 2008 19:20:07 GMT" } ]
"2008-09-19T00:00:00"
[ [ "Spielman", "Daniel A.", "" ], [ "Teng", "Shang-Hua", "" ] ]
0809.3527
Mugurel Ionut Andreica
Mugurel Ionut Andreica, Angela Andreica, Romulus Andreica
Inferring Company Structure from Limited Available Information
Some of the algorithmic techniques presented in this paper were used as part of the solutions for some of the tasks proposed in several programming contests in which the first author participated (see the related materials for several such tasks and their solutions)
International Symposium on Social Development and Economic Performance, Satu Mare : Romania (2008)
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present several algorithmic techniques for inferring the structure of a company when only a limited amount of information is available. We consider problems with two types of inputs: the number of pairs of employees with a given property and restricted information about the hierarchical structure of the company. We provide dynamic programming and greedy algorithms for these problems.
[ { "version": "v1", "created": "Sat, 20 Sep 2008 20:05:21 GMT" }, { "version": "v2", "created": "Sun, 23 Dec 2012 06:56:16 GMT" } ]
"2012-12-27T00:00:00"
[ [ "Andreica", "Mugurel Ionut", "" ], [ "Andreica", "Angela", "" ], [ "Andreica", "Romulus", "" ] ]
0809.3528
Mugurel Ionut Andreica
Mugurel Ionut Andreica, Cristina Teodora Andreica, Madalina Ecaterina Andreica
Locating Restricted Facilities on Binary Maps
The algorithmic techniques presented in this paper were used by the first author in the implementation of solutions to various algorithmic contest tasks (see the attached zip archive for some examples)
International Symposium on Social Development and Economic Performance, Satu Mare : Romania (2008)
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we consider several facility location problems with applications to cost and social welfare optimization, when the area map is encoded as a binary (0,1) mxn matrix. We present algorithmic solutions for all the problems. Some cases are too particular to be used in practical situations, but they are at least a starting point for more generic solutions.
[ { "version": "v1", "created": "Sat, 20 Sep 2008 20:06:34 GMT" }, { "version": "v2", "created": "Wed, 30 Jan 2013 07:48:10 GMT" } ]
"2013-01-31T00:00:00"
[ [ "Andreica", "Mugurel Ionut", "" ], [ "Andreica", "Cristina Teodora", "" ], [ "Andreica", "Madalina Ecaterina", "" ] ]
0809.3577
Philippe Robert
Han\`ene Mohamed, Philippe Robert
Dynamic tree algorithms
Published in at http://dx.doi.org/10.1214/09-AAP617 the Annals of Applied Probability (http://www.imstat.org/aap/) by the Institute of Mathematical Statistics (http://www.imstat.org)
Annals of Applied Probability 2010, Vol. 20, No. 1, 26-51
10.1214/09-AAP617
IMS-AAP-AAP617
math.PR cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a general tree algorithm processing a random flow of arrivals is analyzed. Capetanakis--Tsybakov--Mikhailov's protocol in the context of communication networks with random access is an example of such an algorithm. In computer science, this corresponds to a trie structure with a dynamic input. Mathematically, it is related to a stopped branching process with exogeneous arrivals (immigration). Under quite general assumptions on the distribution of the number of arrivals and on the branching procedure, it is shown that there exists a positive constant $\lambda_c$ so that if the arrival rate is smaller than $\lambda_c$, then the algorithm is stable under the flow of requests, that is, that the total size of an associated tree is integrable. At the same time, a gap in the earlier proofs of stability in the literature is fixed. When the arrivals are Poisson, an explicit characterization of $\lambda_c$ is given. Under the stability condition, the asymptotic behavior of the average size of a tree starting with a large number of individuals is analyzed. The results are obtained with the help of a probabilistic rewriting of the functional equations describing the dynamics of the system. The proofs use extensively this stochastic background throughout the paper. In this analysis, two basic limit theorems play a key role: the renewal theorem and the convergence to equilibrium of an auto-regressive process with a moving average.
[ { "version": "v1", "created": "Sun, 21 Sep 2008 11:46:05 GMT" }, { "version": "v2", "created": "Wed, 13 Jan 2010 13:51:20 GMT" } ]
"2010-01-13T00:00:00"
[ [ "Mohamed", "Hanène", "" ], [ "Robert", "Philippe", "" ] ]
0809.3646
Petr Golovach
Fedor V. Fomin, Petr A. Golovach and Dimitrios M. Thilikos
Approximating acyclicity parameters of sparse hypergraphs
null
null
null
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The notions of hypertree width and generalized hypertree width were introduced by Gottlob, Leone, and Scarcello in order to extend the concept of hypergraph acyclicity. These notions were further generalized by Grohe and Marx, who introduced the fractional hypertree width of a hypergraph. All these width parameters on hypergraphs are useful for extending tractability of many problems in database theory and artificial intelligence. In this paper, we study the approximability of (generalized, fractional) hyper treewidth of sparse hypergraphs where the criterion of sparsity reflects the sparsity of their incidence graphs. Our first step is to prove that the (generalized, fractional) hypertree width of a hypergraph H is constant-factor sandwiched by the treewidth of its incidence graph, when the incidence graph belongs to some apex-minor-free graph class. This determines the combinatorial borderline above which the notion of (generalized, fractional) hypertree width becomes essentially more general than treewidth, justifying that way its functionality as a hypergraph acyclicity measure. While for more general sparse families of hypergraphs treewidth of incidence graphs and all hypertree width parameters may differ arbitrarily, there are sparse families where a constant factor approximation algorithm is possible. In particular, we give a constant factor approximation polynomial time algorithm for (generalized, fractional) hypertree width on hypergraphs whose incidence graphs belong to some H-minor-free graph class.
[ { "version": "v1", "created": "Mon, 22 Sep 2008 08:17:22 GMT" } ]
"2008-09-23T00:00:00"
[ [ "Fomin", "Fedor V.", "" ], [ "Golovach", "Petr A.", "" ], [ "Thilikos", "Dimitrios M.", "" ] ]
0809.4398
Philipp Schuetz
Philipp Schuetz, Amedeo Caflisch
Multistep greedy algorithm identifies community structure in real-world and computer-generated networks
17 pages, 2 figures
Phys. Rev. E 78, 026112 (2008)
10.1103/PhysRevE.78.026112
null
cs.DS cond-mat.dis-nn physics.soc-ph q-bio.MN q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We have recently introduced a multistep extension of the greedy algorithm for modularity optimization. The extension is based on the idea that merging l pairs of communities (l>1) at each iteration prevents premature condensation into few large communities. Here, an empirical formula is presented for the choice of the step width l that generates partitions with (close to) optimal modularity for 17 real-world and 1100 computer-generated networks. Furthermore, an in-depth analysis of the communities of two real-world networks (the metabolic network of the bacterium E. coli and the graph of coappearing words in the titles of papers coauthored by Martin Karplus) provides evidence that the partition obtained by the multistep greedy algorithm is superior to the one generated by the original greedy algorithm not only with respect to modularity but also according to objective criteria. In other words, the multistep extension of the greedy algorithm reduces the danger of getting trapped in local optima of modularity and generates more reasonable partitions.
[ { "version": "v1", "created": "Thu, 25 Sep 2008 13:46:30 GMT" } ]
"2008-09-26T00:00:00"
[ [ "Schuetz", "Philipp", "" ], [ "Caflisch", "Amedeo", "" ] ]
0809.4577
Jiajin Yu
Mordecai Golin, Xiaoming Xu and Jiajin Yu
A Generic Top-Down Dynamic-Programming Approach to Prefix-Free Coding
null
null
null
null
cs.DS cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a probability distribution over a set of n words to be transmitted, the Huffman Coding problem is to find a minimal-cost prefix free code for transmitting those words. The basic Huffman coding problem can be solved in O(n log n) time but variations are more difficult. One of the standard techniques for solving these variations utilizes a top-down dynamic programming approach. In this paper we show that this approach is amenable to dynamic programming speedup techniques, permitting a speedup of an order of magnitude for many algorithms in the literature for such variations as mixed radix, reserved length and one-ended coding. These speedups are immediate implications of a general structural property that permits batching together the calculation of many DP entries.
[ { "version": "v1", "created": "Fri, 26 Sep 2008 09:42:04 GMT" } ]
"2008-09-29T00:00:00"
[ [ "Golin", "Mordecai", "" ], [ "Xu", "Xiaoming", "" ], [ "Yu", "Jiajin", "" ] ]
0809.4743
Boris Ryabko
Boris Ryabko
The Imaginary Sliding Window As a New Data Structure for Adaptive Algorithms
Published in: Problems of information transmission,1996,v.32,#2
null
null
null
cs.IT cs.DS math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The scheme of the sliding window is known in Information Theory, Computer Science, the problem of predicting and in stastistics. Let a source with unknown statistics generate some word $... x_{-1}x_{0}x_{1}x_{2}...$ in some alphabet $A$. For every moment $t, t=... $ $-1, 0, 1, ...$, one stores the word ("window") $ x_{t-w} x_{t-w+1}... x_{t-1}$ where $w$,$w \geq 1$, is called "window length". In the theory of universal coding, the code of the $x_{t}$ depends on source ststistics estimated by the window, in the problem of predicting, each letter $x_{t}$ is predicted using information of the window, etc. After that the letter $x_{t}$ is included in the window on the right, while $x_{t-w}$ is removed from the window. It is the sliding window scheme. This scheme has two merits: it allows one i) to estimate the source statistics quite precisely and ii) to adapt the code in case of a change in the source' statistics. However this scheme has a defect, namely, the necessity to store the window (i.e. the word $x_{t-w}... x_{t-1})$ which needs a large memory size for large $w$. A new scheme named "the Imaginary Sliding Window (ISW)" is constructed. The gist of this scheme is that not the last element $x_{t-w}$ but rather a random one is removed from the window. This allows one to retain both merits of the sliding window as well as the possibility of not storing the window and thus significantly decreasing the memory size.
[ { "version": "v1", "created": "Sat, 27 Sep 2008 07:42:44 GMT" } ]
"2008-09-30T00:00:00"
[ [ "Ryabko", "Boris", "" ] ]
0809.4794
Adam Smith
Adam Smith
Efficient, Differentially Private Point Estimators
9 pages
null
null
null
cs.CR cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Differential privacy is a recent notion of privacy for statistical databases that provides rigorous, meaningful confidentiality guarantees, even in the presence of an attacker with access to arbitrary side information. We show that for a large class of parametric probability models, one can construct a differentially private estimator whose distribution converges to that of the maximum likelihood estimator. In particular, it is efficient and asymptotically unbiased. This result provides (further) compelling evidence that rigorous notions of privacy in statistical databases can be consistent with statistically valid inference.
[ { "version": "v1", "created": "Sat, 27 Sep 2008 19:57:34 GMT" } ]
"2008-09-30T00:00:00"
[ [ "Smith", "Adam", "" ] ]
0809.4882
Aleksandrs Slivkins
Robert Kleinberg, Aleksandrs Slivkins and Eli Upfal
Multi-Armed Bandits in Metric Spaces
16 pages, 0 figures
null
null
null
cs.DS cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a multi-armed bandit problem, an online algorithm chooses from a set of strategies in a sequence of trials so as to maximize the total payoff of the chosen strategies. While the performance of bandit algorithms with a small finite strategy set is quite well understood, bandit problems with large strategy sets are still a topic of very active investigation, motivated by practical applications such as online auctions and web advertisement. The goal of such research is to identify broad and natural classes of strategy sets and payoff functions which enable the design of efficient solutions. In this work we study a very general setting for the multi-armed bandit problem in which the strategies form a metric space, and the payoff function satisfies a Lipschitz condition with respect to the metric. We refer to this problem as the "Lipschitz MAB problem". We present a complete solution for the multi-armed problem in this setting. That is, for every metric space (L,X) we define an isometry invariant which bounds from below the performance of Lipschitz MAB algorithms for X, and we present an algorithm which comes arbitrarily close to meeting this bound. Furthermore, our technique gives even better results for benign payoff functions.
[ { "version": "v1", "created": "Mon, 29 Sep 2008 01:58:13 GMT" } ]
"2008-09-30T00:00:00"
[ [ "Kleinberg", "Robert", "" ], [ "Slivkins", "Aleksandrs", "" ], [ "Upfal", "Eli", "" ] ]
0810.0052
Martin Ziegler
Matthias Fischer, Matthias Hilbig, Claudius J\"ahn, Friedhelm Meyer auf der Heide and Martin Ziegler
Planar Visibility Counting
added Section 4: Implementation and Empirical Evaluation
null
null
null
cs.CG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For a fixed virtual scene (=collection of simplices) S and given observer position p, how many elements of S are weakly visible (i.e. not fully occluded by others) from p? The present work explores the trade-off between query time and preprocessing space for these quantities in 2D: exactly, in the approximate deterministic, and in the probabilistic sense. We deduce the EXISTENCE of an O(m^2/n^2) space data structure for S that, given p and time O(log n), allows to approximate the ratio of occluded segments up to arbitrary constant absolute error; here m denotes the size of the Visibility Graph--which may be quadratic, but typically is just linear in the size n of the scene S. On the other hand, we present a data structure CONSTRUCTIBLE in O(n*log(n)+m^2*polylog(n)/k) preprocessing time and space with similar approximation properties and query time O(k*polylog n), where k<n is an arbitrary parameter. We describe an implementation of this approach and demonstrate the practical benefit of the parameter k to trade memory for query time in an empirical evaluation on three classes of benchmark scenes.
[ { "version": "v1", "created": "Wed, 1 Oct 2008 01:53:52 GMT" }, { "version": "v2", "created": "Thu, 9 Oct 2008 02:43:08 GMT" }, { "version": "v3", "created": "Thu, 5 Feb 2009 09:51:22 GMT" } ]
"2009-02-05T00:00:00"
[ [ "Fischer", "Matthias", "" ], [ "Hilbig", "Matthias", "" ], [ "Jähn", "Claudius", "" ], [ "der Heide", "Friedhelm Meyer auf", "" ], [ "Ziegler", "Martin", "" ] ]
0810.0075
Alvaro Salas Humberto
Alvaro Salas (Universidad de Caldas, Universidad Nacional de Colombia, sede Manizales)
Acerca del Algoritmo de Dijkstra
In spanish, the paper contains illustrations
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we prove the correctness of Dijkstra's algorithm. We also discuss it and at the end we show an application.
[ { "version": "v1", "created": "Wed, 1 Oct 2008 04:55:11 GMT" } ]
"2008-10-02T00:00:00"
[ [ "Salas", "Alvaro", "", "Universidad de Caldas, Universidad Nacional de Colombia,\n sede Manizales" ] ]
0810.0264
David Musser
David R. Musser, Gor V. Nishanov
A Fast Generic Sequence Matching Algorithm
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A string matching -- and more generally, sequence matching -- algorithm is presented that has a linear worst-case computing time bound, a low worst-case bound on the number of comparisons (2n), and sublinear average-case behavior that is better than that of the fastest versions of the Boyer-Moore algorithm. The algorithm retains its efficiency advantages in a wide variety of sequence matching problems of practical interest, including traditional string matching; large-alphabet problems (as in Unicode strings); and small-alphabet, long-pattern problems (as in DNA searches). Since it is expressed as a generic algorithm for searching in sequences over an arbitrary type T, it is well suited for use in generic software libraries such as the C++ Standard Template Library. The algorithm was obtained by adding to the Knuth-Morris-Pratt algorithm one of the pattern-shifting techniques from the Boyer-Moore algorithm, with provision for use of hashing in this technique. In situations in which a hash function or random access to the sequences is not available, the algorithm falls back to an optimized version of the Knuth-Morris-Pratt algorithm.
[ { "version": "v1", "created": "Wed, 1 Oct 2008 19:54:51 GMT" } ]
"2008-10-02T00:00:00"
[ [ "Musser", "David R.", "" ], [ "Nishanov", "Gor V.", "" ] ]
0810.0558
Ashish Goel
Ashish Goel, Sanjeev Khanna, Brad Null
The Ratio Index for Budgeted Learning, with Applications
This paper has a substantial bug that we are trying to fix. Many thanks to Joe Halpern for pointing this bug out. Please do not cite in the meantime. Please let us know if you would like to understand and/or try to fix the bug
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the budgeted learning problem, we are allowed to experiment on a set of alternatives (given a fixed experimentation budget) with the goal of picking a single alternative with the largest possible expected payoff. Approximation algorithms for this problem were developed by Guha and Munagala by rounding a linear program that couples the various alternatives together. In this paper we present an index for this problem, which we call the ratio index, which also guarantees a constant factor approximation. Index-based policies have the advantage that a single number (i.e. the index) can be computed for each alternative irrespective of all other alternatives, and the alternative with the highest index is experimented upon. This is analogous to the famous Gittins index for the discounted multi-armed bandit problem. The ratio index has several interesting structural properties. First, we show that it can be computed in strongly polynomial time. Second, we show that with the appropriate discount factor, the Gittins index and our ratio index are constant factor approximations of each other, and hence the Gittins index also gives a constant factor approximation to the budgeted learning problem. Finally, we show that the ratio index can be used to create an index-based policy that achieves an O(1)-approximation for the finite horizon version of the multi-armed bandit problem. Moreover, the policy does not require any knowledge of the horizon (whereas we compare its performance against an optimal strategy that is aware of the horizon). This yields the following surprising result: there is an index-based policy that achieves an O(1)-approximation for the multi-armed bandit problem, oblivious to the underlying discount factor.
[ { "version": "v1", "created": "Fri, 3 Oct 2008 01:37:45 GMT" }, { "version": "v2", "created": "Mon, 11 Apr 2016 18:47:16 GMT" } ]
"2016-04-12T00:00:00"
[ [ "Goel", "Ashish", "" ], [ "Khanna", "Sanjeev", "" ], [ "Null", "Brad", "" ] ]
0810.0674
Shuchi Chawla
Siddharth Barman and Shuchi Chawla
Packing multiway cuts in capacitated graphs
The conference version of this paper is to appear at SODA 2009. This is the full version
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the following "multiway cut packing" problem in undirected graphs: we are given a graph G=(V,E) and k commodities, each corresponding to a set of terminals located at different vertices in the graph; our goal is to produce a collection of cuts {E_1,...,E_k} such that E_i is a multiway cut for commodity i and the maximum load on any edge is minimized. The load on an edge is defined to be the number of cuts in the solution crossing the edge. In the capacitated version of the problem the goal is to minimize the maximum relative load on any edge--the ratio of the edge's load to its capacity. Multiway cut packing arises in the context of graph labeling problems where we are given a partial labeling of a set of items and a neighborhood structure over them, and, informally, the goal is to complete the labeling in the most consistent way. This problem was introduced by Rabani, Schulman, and Swamy (SODA'08), who developed an O(log n/log log n) approximation for it in general graphs, as well as an improved O(log^2 k) approximation in trees. Here n is the number of nodes in the graph. We present the first constant factor approximation for this problem in arbitrary undirected graphs. Our approach is based on the observation that every instance of the problem admits a near-optimal laminar solution (that is, one in which no pair of cuts cross each other).
[ { "version": "v1", "created": "Fri, 3 Oct 2008 16:13:00 GMT" } ]
"2008-10-06T00:00:00"
[ [ "Barman", "Siddharth", "" ], [ "Chawla", "Shuchi", "" ] ]
0810.0906
Hirotaka Ono
Toru Hasunuma, Toshimasa Ishii, Hirotaka Ono, Yushi Uno
A linear time algorithm for L(2,1)-labeling of trees
23 pages, 3 figures
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An L(2,1)-labeling of a graph $G$ is an assignment $f$ from the vertex set $V(G)$ to the set of nonnegative integers such that $|f(x)-f(y)|\ge 2$ if $x$ and $y$ are adjacent and $|f(x)-f(y)|\ge 1$ if $x$ and $y$ are at distance 2, for all $x$ and $y$ in $V(G)$. A $k$-L(2,1)-labeling is an assignment $f:V(G)\to\{0,..., k\}$, and the L(2,1)-labeling problem asks the minimum $k$, which we denote by $\lambda(G)$, among all possible assignments. It is known that this problem is NP-hard even for graphs of treewidth 2, and tree is one of a very few classes for which the problem is polynomially solvable. The running time of the best known algorithm for trees had been $\mO(\Delta^{4.5} n)$ for more than a decade, however, an $\mO(n^{1.75})$-time algorithm has been proposed recently, which substantially improved the previous one, where $\Delta$ is the maximum degree of $T$ and $n=|V(T)|$. In this paper, we finally establish a linear time algorithm for L(2,1)-labeling of trees.
[ { "version": "v1", "created": "Mon, 6 Oct 2008 08:21:17 GMT" }, { "version": "v2", "created": "Wed, 24 Nov 2010 07:06:08 GMT" } ]
"2010-11-25T00:00:00"
[ [ "Hasunuma", "Toru", "" ], [ "Ishii", "Toshimasa", "" ], [ "Ono", "Hirotaka", "" ], [ "Uno", "Yushi", "" ] ]
0810.1355
Michael Mahoney
Jure Leskovec, Kevin J. Lang, Anirban Dasgupta, and Michael W. Mahoney
Community Structure in Large Networks: Natural Cluster Sizes and the Absence of Large Well-Defined Clusters
66 pages, a much expanded version of our WWW 2008 paper
null
null
null
cs.DS physics.data-an physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A large body of work has been devoted to defining and identifying clusters or communities in social and information networks. We explore from a novel perspective several questions related to identifying meaningful communities in large social and information networks, and we come to several striking conclusions. We employ approximation algorithms for the graph partitioning problem to characterize as a function of size the statistical and structural properties of partitions of graphs that could plausibly be interpreted as communities. In particular, we define the network community profile plot, which characterizes the "best" possible community--according to the conductance measure--over a wide range of size scales. We study over 100 large real-world social and information networks. Our results suggest a significantly more refined picture of community structure in large networks than has been appreciated previously. In particular, we observe tight communities that are barely connected to the rest of the network at very small size scales; and communities of larger size scales gradually "blend into" the expander-like core of the network and thus become less "community-like." This behavior is not explained, even at a qualitative level, by any of the commonly-used network generation models. Moreover, it is exactly the opposite of what one would expect based on intuition from expander graphs, low-dimensional or manifold-like graphs, and from small social networks that have served as testbeds of community detection algorithms. We have found that a generative graph model, in which new edges are added via an iterative "forest fire" burning process, is able to produce graphs exhibiting a network community profile plot similar to what we observe in our network datasets.
[ { "version": "v1", "created": "Wed, 8 Oct 2008 05:42:43 GMT" } ]
"2008-10-13T00:00:00"
[ [ "Leskovec", "Jure", "" ], [ "Lang", "Kevin J.", "" ], [ "Dasgupta", "Anirban", "" ], [ "Mahoney", "Michael W.", "" ] ]
0810.1499
Lenka Zdeborova
Lenka Zdeborov\'a and Marc M\'ezard
Constraint satisfaction problems with isolated solutions are hard
19 pages, 12 figures
J. Stat. Mech. (2008) P12004
10.1088/1742-5468/2008/12/P12004
null
cond-mat.dis-nn cond-mat.stat-mech cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the phase diagram and the algorithmic hardness of the random `locked' constraint satisfaction problems, and compare them to the commonly studied 'non-locked' problems like satisfiability of boolean formulas or graph coloring. The special property of the locked problems is that clusters of solutions are isolated points. This simplifies significantly the determination of the phase diagram, which makes the locked problems particularly appealing from the mathematical point of view. On the other hand we show empirically that the clustered phase of these problems is extremely hard from the algorithmic point of view: the best known algorithms all fail to find solutions. Our results suggest that the easy/hard transition (for currently known algorithms) in the locked problems coincides with the clustering transition. These should thus be regarded as new benchmarks of really hard constraint satisfaction problems.
[ { "version": "v1", "created": "Wed, 8 Oct 2008 18:28:28 GMT" }, { "version": "v2", "created": "Thu, 4 Dec 2008 07:53:25 GMT" } ]
"2008-12-09T00:00:00"
[ [ "Zdeborová", "Lenka", "" ], [ "Mézard", "Marc", "" ] ]
0810.1639
Gabriel Istrate
Gabriel Istrate
Identifying almost sorted permutations from TCP buffer dynamics
null
null
null
null
cs.DS cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Associate to each sequence $A$ of integers (intending to represent packet IDs) a sequence of positive integers of the same length ${\mathcal M}(A)$. The $i$'th entry of ${\mathcal M}(A)$ is the size (at time $i$) of the smallest buffer needed to hold out-of-order packets, where space is accounted for unreceived packets as well. Call two sequences $A$, $B$ {\em equivalent} (written $A\equiv_{FB} B$) if ${\mathcal M}(A)={\mathcal M}(B)$. We prove the following result: any two permutations $A,B$ of the same length with $SUS(A)$, $SUS(B)\leq 3$ (where SUS is the {\em shuffled-up-sequences} reordering measure), and such that $A\equiv_{FB} B$ are identical. The result (which is no longer valid if we replace the upper bound 3 by 4) was motivated by RESTORED, a receiver-oriented model of network traffic we have previously introduced.
[ { "version": "v1", "created": "Thu, 9 Oct 2008 12:27:32 GMT" } ]
"2008-11-04T00:00:00"
[ [ "Istrate", "Gabriel", "" ] ]
0810.1756
Milan Bradonjic
Milan Bradonjic, Eddie Kohler, Rafail Ostrovsky
Near-Optimal Radio Use For Wireless Network Synchronization
23 pages
null
10.1016/j.tcs.2011.09.026
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the model of communication where wireless devices can either switch their radios off to save energy, or switch their radios on and engage in communication. We distill a clean theoretical formulation of this problem of minimizing radio use and present near-optimal solutions. Our base model ignores issues of communication interference, although we also extend the model to handle this requirement. We assume that nodes intend to communicate periodically, or according to some time-based schedule. Clearly, perfectly synchronized devices could switch their radios on for exactly the minimum periods required by their joint schedules. The main challenge in the deployment of wireless networks is to synchronize the devices' schedules, given that their initial schedules may be offset relative to one another (even if their clocks run at the same speed). We significantly improve previous results, and show optimal use of the radio for two processors and near-optimal use of the radio for synchronization of an arbitrary number of processors. In particular, for two processors we prove deterministically matching $\Theta(\sqrt{n})$ upper and lower bounds on the number of times the radio has to be on, where $n$ is the discretized uncertainty period of the clock shift between the two processors. (In contrast, all previous results for two processors are randomized.) For $m=n^\beta$ processors (for any $\beta < 1$) we prove $\Omega(n^{(1-\beta)/2})$ is the lower bound on the number of times the radio has to be switched on (per processor), and show a nearly matching (in terms of the radio use) $\~{O}(n^{(1-\beta)/2})$ randomized upper bound per processor, with failure probability exponentially close to 0. For $\beta \geq 1$ our algorithm runs with at most $poly-log(n)$ radio invocations per processor. Our bounds also hold in a radio-broadcast model where interference must be taken into account.
[ { "version": "v1", "created": "Thu, 9 Oct 2008 20:41:23 GMT" }, { "version": "v2", "created": "Mon, 13 Feb 2012 22:44:09 GMT" } ]
"2012-02-15T00:00:00"
[ [ "Bradonjic", "Milan", "" ], [ "Kohler", "Eddie", "" ], [ "Ostrovsky", "Rafail", "" ] ]
0810.1823
Christophe Paul
Emeric Gioan and Christophe Paul
Split decomposition and graph-labelled trees: characterizations and fully-dynamic algorithms for totally decomposable graphs
extended abstract appeared in ISAAC 2007: Dynamic distance hereditary graphs using split decompositon. In International Symposium on Algorithms and Computation - ISAAC. Number 4835 in Lecture Notes, pages 41-51, 2007
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we revisit the split decomposition of graphs and give new combinatorial and algorithmic results for the class of totally decomposable graphs, also known as the distance hereditary graphs, and for two non-trivial subclasses, namely the cographs and the 3-leaf power graphs. Precisely, we give strutural and incremental characterizations, leading to optimal fully-dynamic recognition algorithms for vertex and edge modifications, for each of these classes. These results rely on a new framework to represent the split decomposition, namely the graph-labelled trees, which also captures the modular decomposition of graphs and thereby unify these two decompositions techniques. The point of the paper is to use bijections between these graph classes and trees whose nodes are labelled by cliques and stars. Doing so, we are also able to derive an intersection model for distance hereditary graphs, which answers an open problem.
[ { "version": "v1", "created": "Fri, 10 Oct 2008 07:49:30 GMT" }, { "version": "v2", "created": "Mon, 18 Apr 2011 12:53:57 GMT" } ]
"2011-04-19T00:00:00"
[ [ "Gioan", "Emeric", "" ], [ "Paul", "Christophe", "" ] ]
0810.1851
Marek Karpinski
Piotr Berman, Marek Karpinski, Alex Zelikovsky
1.25 Approximation Algorithm for the Steiner Tree Problem with Distances One and Two
null
null
null
null
cs.CC cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a 1.25 approximation algorithm for the Steiner Tree Problem with distances one and two, improving on the best known bound for that problem.
[ { "version": "v1", "created": "Fri, 10 Oct 2008 11:25:09 GMT" } ]
"2008-10-13T00:00:00"
[ [ "Berman", "Piotr", "" ], [ "Karpinski", "Marek", "" ], [ "Zelikovsky", "Alex", "" ] ]
0810.2150
Christine Task
Christine Task, Arun Chauhan
A Model for Communication in Clusters of Multi-core Machines
This paper has been withdrawn by the author because it was basically a short-hand write-up of an incompletely formed idea from her Masters, and she'd like to start using her ArXiv account for her formal PhD research
null
null
null
cs.DC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A common paradigm for scientific computing is distributed message-passing systems, and a common approach to these systems is to implement them across clusters of high-performance workstations. As multi-core architectures become increasingly mainstream, these clusters are very likely to include multi-core machines. However, the theoretical models which are currently used to develop communication algorithms across these systems do not take into account the unique properties of processes running on shared-memory architectures, including shared external network connections and communication via shared memory locations. Because of this, existing algorithms are far from optimal for modern clusters. Additionally, recent attempts to adapt these algorithms to multicore systems have proceeded without the introduction of a more accurate formal model and have generally neglected to capitalize on the full power these systems offer. We propose a new model which simply and effectively captures the strengths of multi-core machines in collective communications patterns and suggest how it could be used to properly optimize these patterns.
[ { "version": "v1", "created": "Mon, 13 Oct 2008 04:04:42 GMT" }, { "version": "v2", "created": "Mon, 30 Apr 2012 19:16:37 GMT" } ]
"2012-05-01T00:00:00"
[ [ "Task", "Christine", "" ], [ "Chauhan", "Arun", "" ] ]
0810.2390
Simone Faro
Simone Faro and Thierry Lecroq
Efficient Pattern Matching on Binary Strings
12 pages
null
null
null
cs.DS cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The binary string matching problem consists in finding all the occurrences of a pattern in a text where both strings are built on a binary alphabet. This is an interesting problem in computer science, since binary data are omnipresent in telecom and computer network applications. Moreover the problem finds applications also in the field of image processing and in pattern matching on compressed texts. Recently it has been shown that adaptations of classical exact string matching algorithms are not very efficient on binary data. In this paper we present two efficient algorithms for the problem adapted to completely avoid any reference to bits allowing to process pattern and text byte by byte. Experimental results show that the new algorithms outperform existing solutions in most cases.
[ { "version": "v1", "created": "Tue, 14 Oct 2008 08:44:27 GMT" }, { "version": "v2", "created": "Wed, 15 Oct 2008 12:15:24 GMT" } ]
"2008-10-15T00:00:00"
[ [ "Faro", "Simone", "" ], [ "Lecroq", "Thierry", "" ] ]
0810.3058
Dimitrios Tsolis Dr
Dimitrios K. Tsolis, Spyros Sioutas and Theodore S. Papatheodorou
Watermarking Digital Images Based on a Content Based Image Retrieval Technique
18 pages, 4 figures, 4 tables, submitted to Multimedia Tools and Applications Journal, Springer
null
null
null
cs.DS cs.CR
http://creativecommons.org/licenses/by/3.0/
The current work is focusing on the implementation of a robust watermarking algorithm for digital images, which is based on an innovative spread spectrum analysis algorithm for watermark embedding and on a content-based image retrieval technique for watermark detection. The highly robust watermark algorithms are applying "detectable watermarks" for which a detection mechanism checks if the watermark exists or no (a Boolean decision) based on a watermarking key. The problem is that the detection of a watermark in a digital image library containing thousands of images means that the watermark detection algorithm is necessary to apply all the keys to the digital images. This application is non-efficient for very large image databases. On the other hand "readable" watermarks may prove weaker but easier to detect as only the detection mechanism is required. The proposed watermarking algorithm combine's the advantages of both "detectable" and "readable" watermarks. The result is a fast and robust watermarking algorithm.
[ { "version": "v1", "created": "Fri, 17 Oct 2008 04:22:01 GMT" } ]
"2009-09-29T00:00:00"
[ [ "Tsolis", "Dimitrios K.", "" ], [ "Sioutas", "Spyros", "" ], [ "Papatheodorou", "Theodore S.", "" ] ]
0810.3203
David Harvey
David Harvey
A cache-friendly truncated FFT
14 pages, 11 figures, uses algorithm2e package
null
null
null
cs.SC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a cache-friendly version of van der Hoeven's truncated FFT and inverse truncated FFT, focusing on the case of `large' coefficients, such as those arising in the Schonhage--Strassen algorithm for multiplication in Z[x]. We describe two implementations and examine their performance.
[ { "version": "v1", "created": "Fri, 17 Oct 2008 17:36:27 GMT" } ]
"2008-10-20T00:00:00"
[ [ "Harvey", "David", "" ] ]
0810.3227
Oliver Kennedy
Oliver Kennedy, Christoph Koch, Al Demers
Dynamic Approaches to In-Network Aggregation
null
null
null
null
cs.DC cs.DB cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Collaboration between small-scale wireless devices hinges on their ability to infer properties shared across multiple nearby nodes. Wireless-enabled mobile devices in particular create a highly dynamic environment not conducive to distributed reasoning about such global properties. This paper addresses a specific instance of this problem: distributed aggregation. We present extensions to existing unstructured aggregation protocols that enable estimation of count, sum, and average aggregates in highly dynamic environments. With the modified protocols, devices with only limited connectivity can maintain estimates of the aggregate, despite \textit{unexpected} peer departures and arrivals. Our analysis of these aggregate maintenance extensions demonstrates their effectiveness in unstructured environments despite high levels of node mobility.
[ { "version": "v1", "created": "Fri, 17 Oct 2008 19:48:38 GMT" } ]
"2008-10-20T00:00:00"
[ [ "Kennedy", "Oliver", "" ], [ "Koch", "Christoph", "" ], [ "Demers", "Al", "" ] ]
0810.3438
Amit Bhosle
Amit M Bhosle and Teofilo F Gonzalez
Efficient Algorithms and Routing Protocols for Handling Transient Single Node Failures
6 pages, 2 columns, 3 figures. To appear in: Proceedings of the 20th IASTED International Conference on Parallel and Distributed Computing and Systems (Nov 16-18, 2008, Orlando, FL, USA)
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Single node failures represent more than 85% of all node failures in the today's large communication networks such as the Internet. Also, these node failures are usually transient. Consequently, having the routing paths globally recomputed does not pay off since the failed nodes recover fairly quickly, and the recomputed routing paths need to be discarded. Instead, we develop algorithms and protocols for dealing with such transient single node failures by suppressing the failure (instead of advertising it across the network), and routing messages to the destination via alternate paths that do not use the failed node. We compare our solution to that of Ref. [11] wherein the authors have presented a "Failure Insensitive Routing" protocol as a proactive recovery scheme for handling transient node failures. We show that our algorithms are faster by an order of magnitude while our paths are equally good. We show via simulation results that our paths are usually within 15% of the optimal for randomly generated graph with 100-1000 nodes.
[ { "version": "v1", "created": "Sun, 19 Oct 2008 22:57:53 GMT" } ]
"2008-10-21T00:00:00"
[ [ "Bhosle", "Amit M", "" ], [ "Gonzalez", "Teofilo F", "" ] ]
0810.4002
Laetitia Omer
Julien Allali (LaBRI), Marie-France Sagot (ENS Lyon / Insa Lyon / INRIA Grenoble Rh\^one-Alpes)
A new distance for high level RNA secondary structure comparison
null
IEEE/ACM Transactions on Computational Biology and Bioinformatics 2 (2005) 3--14
null
null
cs.DS q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe an algorithm for comparing two RNA secondary structures coded in the form of trees that introduces two new operations, called node fusion and edge fusion, besides the tree edit operations of deletion, insertion, and relabeling classically used in the literature. This allows us to address some serious limitations of the more traditional tree edit operations when the trees represent RNAs and what is searched for is a common structural core of two RNAs. Although the algorithm complexity has an exponential term, this term depends only on the number of successive fusions that may be applied to a same node, not on the total number of fusions. The algorithm remains therefore efficient in practice and is used for illustrative purposes on ribosomal as well as on other types of RNAs.
[ { "version": "v1", "created": "Wed, 22 Oct 2008 08:24:53 GMT" } ]
"2008-10-23T00:00:00"
[ [ "Allali", "Julien", "", "LaBRI" ], [ "Sagot", "Marie-France", "", "ENS Lyon / Insa Lyon /\n INRIA Grenoble Rhône-Alpes" ] ]
0810.4061
Satu Elisa Schaeffer
Pekka Orponen, Satu Elisa Schaeffer, Vanesa Avalos Gayt\'an
Locally computable approximations for spectral clustering and absorption times of random walks
21 pages, 8 figures
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address the problem of determining a natural local neighbourhood or "cluster" associated to a given seed vertex in an undirected graph. We formulate the task in terms of absorption times of random walks from other vertices to the vertex of interest, and observe that these times are well approximated by the components of the principal eigenvector of the corresponding fundamental matrix of the graph's adjacency matrix. We further present a locally computable gradient-descent method to estimate this Dirichlet-Fiedler vector, based on minimising the respective Rayleigh quotient. Experimental evaluation shows that the approximations behave well and yield well-defined local clusters.
[ { "version": "v1", "created": "Wed, 22 Oct 2008 17:48:12 GMT" } ]
"2008-10-23T00:00:00"
[ [ "Orponen", "Pekka", "" ], [ "Schaeffer", "Satu Elisa", "" ], [ "Gaytán", "Vanesa Avalos", "" ] ]
0810.4423
Mugurel Ionut Andreica
Mugurel Ionut Andreica
Efficient Algorithmic Techniques for Several Multidimensional Geometric Data Management and Analysis Problems
The algorithmic techniques presented in this paper were later used by the author in developing solutions for algorithmic tasks in several contests in which the author participated (see the attached zip archive for some examples of task statements and solutions). Knowledge Management - Projects, Systems and Technologies, Bucharest : Romania (2008)
null
null
null
cs.CG cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper I present several novel, efficient, algorithmic techniques for solving some multidimensional geometric data management and analysis problems. The techniques are based on several data structures from computational geometry (e.g. segment tree and range tree) and on the well-known sweep-line method.
[ { "version": "v1", "created": "Fri, 24 Oct 2008 09:44:03 GMT" }, { "version": "v2", "created": "Tue, 1 Jan 2013 20:58:46 GMT" } ]
"2013-01-03T00:00:00"
[ [ "Andreica", "Mugurel Ionut", "" ] ]
0810.4796
Daniel Raible
Henning Fernau, Fedor V. Fomin, Daniel Lokshtanov, Daniel Raible, Saket Saurabh, Yngve Villanger
Kernel(s) for Problems With no Kernel: On Out-Trees With Many Leaves
null
null
null
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The {\sc $k$-Leaf Out-Branching} problem is to find an out-branching (i.e. a rooted oriented spanning tree) with at least $k$ leaves in a given digraph. The problem has recently received much attention from the viewpoint of parameterized algorithms {alonLNCS4596,AlonFGKS07fsttcs,BoDo2,KnLaRo}. In this paper we step aside and take a kernelization based approach to the {\sc $k$-Leaf-Out-Branching} problem. We give the first polynomial kernel for {\sc Rooted $k$-Leaf-Out-Branching}, a variant of {\sc $k$-Leaf-Out-Branching} where the root of the tree searched for is also a part of the input. Our kernel has cubic size and is obtained using extremal combinatorics. For the {\sc $k$-Leaf-Out-Branching} problem we show that no polynomial kernel is possible unless polynomial hierarchy collapses to third level %$PH=\Sigma_p^3$ by applying a recent breakthrough result by Bodlaender et al. {BDFH08} in a non-trivial fashion. However our positive results for {\sc Rooted $k$-Leaf-Out-Branching} immediately imply that the seemingly intractable the {\sc $k$-Leaf-Out-Branching} problem admits a data reduction to $n$ independent $O(k^3)$ kernels. These two results, tractability and intractability side by side, are the first separating {\it many-to-one kernelization} from {\it Turing kernelization}. This answers affirmatively an open problem regarding "cheat kernelization" raised in {IWPECOPEN08}.
[ { "version": "v1", "created": "Mon, 27 Oct 2008 11:53:47 GMT" }, { "version": "v2", "created": "Thu, 6 Nov 2008 09:17:43 GMT" } ]
"2008-11-06T00:00:00"
[ [ "Fernau", "Henning", "" ], [ "Fomin", "Fedor V.", "" ], [ "Lokshtanov", "Daniel", "" ], [ "Raible", "Daniel", "" ], [ "Saurabh", "Saket", "" ], [ "Villanger", "Yngve", "" ] ]