455 research outputs found
A Dichotomy Result for Cyclic-Order Traversing Games
Traversing game is a two-person game played on a connected undirected simple graph with a source node and a destination node. A pebble is placed on the source node initially and then moves autonomously according to some rules. Alice is the player who wants to set up rules for each node to determine where to forward the pebble while the pebble reaches the node, so that the pebble can reach the destination node. Bob is the second player who tries to deter Alice\u27s effort by removing edges. Given access to Alice\u27s rules, Bob can remove as many edges as he likes, while retaining the source and destination nodes connected. Under the guide of Alice\u27s rules, if the pebble arrives at the destination node, then we say Alice wins the traversing game; otherwise the pebble enters an endless loop without passing through the destination node, then Bob wins. We assume that Alice and Bob both play optimally.
We study the problem: When will Alice have a winning strategy? This actually models a routing recovery problem in Software Defined Networking in which some links may be broken. In this paper, we prove a dichotomy result for certain traversing games, called cyclic-order traversing games. We also give a linear-time algorithm to find the corresponding winning strategy, if one exists
A framework for fine-grain synthesis optimization of operational amplifiers
This thesis presents a cell-level framework for Operational Amplifiers Synthesis (OASYN) coupling both circuit design and layout. For circuit design, the tool applies a corner-driven optimization, accounting for on-chip performance variations. By exploring the process, voltage, and temperature variations space, the tool extracts design worst case solution. The tool undergoes sensitivity analysis along with Pareto-optimality to achieve required specifications. For layout phase, OASYN generates a DRC proved automated layout based on a sized circuit-level description. Morata et al. (1996) introduced an elegant representation of block placement called sequence pair for general floorplans (SP). Like TCG and BSG, but unlike O-tree, B*tree, and CBL, SP is P-admissible. Unlike SP, TCG supports incremental update during operation and keeps the information of the boundary modules as well as their relative positions in the representation. Block placement algorithms that are based on SP use heuristic optimization algorithms, e.g., simulated annealing where generation of large number of sequence pairs are required. Therefore a fast algorithm is needed to generate sequence pairs after each solution perturbation. The thesis presents a new simple and efficient O(n) runtime algorithm for fast realization of incremental update for cost evaluation. The algorithm integrates sequence pair and transitive closure graph advantages into TCG-S* a superior topology update scheme which facilitates the search for optimum desired floorplan. Experiments show that TCG-S* is better than existing works in terms of area utilization and convergence speed. Routing-aware placement is implemented in OASYN, handling symmetry constraints, e.g., interdigitization, common centroid, along with congestion elimination and the enhancement of placement routability
Virtual Network Embedding Approximations: Leveraging Randomized Rounding
© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.The Virtual Network Embedding Problem (VNEP) captures the essence of many resource allocation problems. In the VNEP, customers request resources in the form of Virtual Networks. An embedding of a virtual network on a shared physical infrastructure is the joint mapping of (virtual) nodes to physical servers together with the mapping of (virtual) edges onto paths in the physical network connecting the respective servers. This work initiates the study of approximation algorithms for the VNEP for general request graphs. Concretely, we study the offline setting with admission control: given multiple requests, the task is to embed the most profitable subset while not exceeding resource capacities. Our approximation is based on the randomized rounding of Linear Programming (LP) solutions. Interestingly, we uncover that the standard LP formulation for the VNEP exhibits an inherent structural deficit when considering general virtual network topologies: its solutions cannot be decomposed into valid embeddings. In turn, focusing on the class of cactus request graphs, we devise a novel LP formulation, whose solutions can be decomposed. Proving performance guarantees of our rounding scheme, we obtain the first approximation algorithm for the VNEP in the resource augmentation model. We propose different types of rounding heuristics and evaluate their performance in an extensive computational study. Our results indicate that good solutions can be achieved even without resource augmentations. Specifically, heuristical rounding achieves 77.2% of the baseline’s profit on average while respecting capacities.BMBF, 01IS12056, Software Campus GrantEC/H2020/679158/EU/Resolving the Tussle in the Internet: Mapping, Architecture, and Policy Making/ResolutioNe
Network Coding: Exploiting Broadcast and Superposition in Wireless Networks
In this thesis we investigate improvements in efficiency of wireless communication networks, based on methods that are fundamentally different from the principles that form the basis of state-of-the-art technology. The first difference is that broadcast and superposition are exploited instead of reducing the wireless medium to a network of point-to-point links. The second difference is that the problem of transporting information through the network is not treated as a flow problem. Instead we allow for network coding to be used.\ud
\ud
First, we consider multicast network coding in settings where the multicast configuration changes over time. We show that for certain problem classes a universal network code can be constructed. One application is to efficiently tradeoff throughput against cost.\ud
\ud
Next, we deal with increasing energy efficiency by means of network coding in the presence of broadcast. It is demonstrated that for multiple unicast traffic in networks with nodes arranged on two and three dimensional rectangular lattices, network coding can reduce energy consumption by factors of four and six, respectively, compared to routing.\ud
\ud
Finally, we consider the use of superposition by allowing nodes to decode sums of messages. We introduce different deterministic models of wireless networks, representing various ways of handling broadcast and superposition. We provide lower and upper bounds on the transport capacity under these models. For networks with nodes arranged on a hexagonal lattice it is found that the capacity under a model exploiting both broadcast and superposition is at least 2.5 times, and no more than six times, the transport capacity under a model of point-to-point links
Dominators in Directed Graphs: A Survey of Recent Results, Applications, and Open Problems
The computation of dominators is a central tool in program optimization and code generation, and it has applications in other diverse areas includingconstraint programming, circuit testing, and biology. In this paper we survey recent results, applications, and open problems related to the notion of dominators in directed graphs,including dominator verification and certification, computing independent spanning trees, and connectivity and path-determination problems in directed graphs
Scalable and Efficient Multipath Routing: Complexity and Algorithms
A fundamental unsolved challenge in multipath
routing is to provide disjoint end-to-end paths, each one satisfying
certain operational goals (e.g., shortest possible), without overwhelming
the data plane with prohibitive amount of forwarding
state. In this paper, we study the problem of finding a pair
of shortest disjoint paths that can be represented by only two
forwarding table entries per destination. Building on prior work
on minimum length redundant trees, we show that the underlying
mathematical problem is NP-complete and we present heuristic
algorithms that improve the known complexity bounds from
cubic to the order of a single shortest path search. Finally, by
extensive simulations we find that it is possible to very closely
attain the absolute optimal path length with our algorithms (the
gap is just 1–5%), eventually opening the door for wide-scale
multipath routing deployments
Recommended from our members
Physically Equivalent Intelligent Systems for Reasoning Under Uncertainty at Nanoscale
Machines today lack the inherent ability to reason and make decisions, or operate in the presence of uncertainty. Machine-learning methods such as Bayesian Networks (BNs) are widely acknowledged for their ability to uncover relationships and generate causal models for complex interactions. However, their massive computational requirement, when implemented on conventional computers, hinders their usefulness in many critical problem areas e.g., genetic basis of diseases, macro finance, text classification, environment monitoring, etc. We propose a new non-von Neumann technology framework purposefully architected across all layers for solving these problems efficiently through physical equivalence, enabled by emerging nanotechnology. The architecture builds on a probabilistic information representation and multi-domain mixed-signal circuit style, and is tightly coupled to a nanoscale physical layer that spans magnetic and electrical domains. Based on bottom-up device-circuit-architecture simulations, we show up to four orders of magnitude performance improvement (using computational resolution of 0.1) vs. best-of-breed multi-core machines with 100 processors, for BNs with about a million variables. Smaller problem sizes of ~100 variables can be realized at 20 mW power consumption and very low area around a few tenths of a mm2. Our vision is to enable solving complex Bayesian problems in real time, as well as enable intelligence capabilities at a small scale everywhere, ushering in a new era of machine intelligence
- …