16,715 research outputs found
Parameterized Complexity of Graph Constraint Logic
Graph constraint logic is a framework introduced by Hearn and Demaine, which
provides several problems that are often a convenient starting point for
reductions. We study the parameterized complexity of Constraint Graph
Satisfiability and both bounded and unbounded versions of Nondeterministic
Constraint Logic (NCL) with respect to solution length, treewidth and maximum
degree of the underlying constraint graph as parameters. As a main result we
show that restricted NCL remains PSPACE-complete on graphs of bounded
bandwidth, strengthening Hearn and Demaine's framework. This allows us to
improve upon existing results obtained by reduction from NCL. We show that
reconfiguration versions of several classical graph problems (including
independent set, feedback vertex set and dominating set) are PSPACE-complete on
planar graphs of bounded bandwidth and that Rush Hour, generalized to boards, is PSPACE-complete even when is at most a constant
Path computation in multi-layer networks: Complexity and algorithms
Carrier-grade networks comprise several layers where different protocols
coexist. Nowadays, most of these networks have different control planes to
manage routing on different layers, leading to a suboptimal use of the network
resources and additional operational costs. However, some routers are able to
encapsulate, decapsulate and convert protocols and act as a liaison between
these layers. A unified control plane would be useful to optimize the use of
the network resources and automate the routing configurations. Software-Defined
Networking (SDN) based architectures, such as OpenFlow, offer a chance to
design such a control plane. One of the most important problems to deal with in
this design is the path computation process. Classical path computation
algorithms cannot resolve the problem as they do not take into account
encapsulations and conversions of protocols. In this paper, we propose
algorithms to solve this problem and study several cases: Path computation
without bandwidth constraint, under bandwidth constraint and under other
Quality of Service constraints. We study the complexity and the scalability of
our algorithms and evaluate their performances on real topologies. The results
show that they outperform the previous ones proposed in the literature.Comment: IEEE INFOCOM 2016, Apr 2016, San Francisco, United States. To be
published in IEEE INFOCOM 2016, \<http://infocom2016.ieee-infocom.org/\&g
Exact Algorithm for Graph Homomorphism and Locally Injective Graph Homomorphism
For graphs and , a homomorphism from to is a function , which maps vertices adjacent in to adjacent vertices
of . A homomorphism is locally injective if no two vertices with a common
neighbor are mapped to a single vertex in . Many cases of graph homomorphism
and locally injective graph homomorphism are NP-complete, so there is little
hope to design polynomial-time algorithms for them. In this paper we present an
algorithm for graph homomorphism and locally injective homomorphism working in
time , where is the bandwidth of the
complement of
Network Utility Maximization under Maximum Delay Constraints and Throughput Requirements
We consider the problem of maximizing aggregate user utilities over a
multi-hop network, subject to link capacity constraints, maximum end-to-end
delay constraints, and user throughput requirements. A user's utility is a
concave function of the achieved throughput or the experienced maximum delay.
The problem is important for supporting real-time multimedia traffic, and is
uniquely challenging due to the need of simultaneously considering maximum
delay constraints and throughput requirements. We first show that it is
NP-complete either (i) to construct a feasible solution strictly meeting all
constraints, or (ii) to obtain an optimal solution after we relax maximum delay
constraints or throughput requirements up to constant ratios. We then develop a
polynomial-time approximation algorithm named PASS. The design of PASS
leverages a novel understanding between non-convex maximum-delay-aware problems
and their convex average-delay-aware counterparts, which can be of independent
interest and suggest a new avenue for solving maximum-delay-aware network
optimization problems. Under realistic conditions, PASS achieves constant or
problem-dependent approximation ratios, at the cost of violating maximum delay
constraints or throughput requirements by up to constant or problem-dependent
ratios. PASS is practically useful since the conditions for PASS are satisfied
in many popular application scenarios. We empirically evaluate PASS using
extensive simulations of supporting video-conferencing traffic across Amazon
EC2 datacenters. Compared to existing algorithms and a conceivable baseline,
PASS obtains up to improvement of utilities, by meeting the throughput
requirements but relaxing the maximum delay constraints that are acceptable for
practical video conferencing applications
A note on the data-driven capacity of P2P networks
We consider two capacity problems in P2P networks. In the first one, the
nodes have an infinite amount of data to send and the goal is to optimally
allocate their uplink bandwidths such that the demands of every peer in terms
of receiving data rate are met. We solve this problem through a mapping from a
node-weighted graph featuring two labels per node to a max flow problem on an
edge-weighted bipartite graph. In the second problem under consideration, the
resource allocation is driven by the availability of the data resource that the
peers are interested in sharing. That is a node cannot allocate its uplink
resources unless it has data to transmit first. The problem of uplink bandwidth
allocation is then equivalent to constructing a set of directed trees in the
overlay such that the number of nodes receiving the data is maximized while the
uplink capacities of the peers are not exceeded. We show that the problem is
NP-complete, and provide a linear programming decomposition decoupling it into
a master problem and multiple slave subproblems that can be resolved in
polynomial time. We also design a heuristic algorithm in order to compute a
suboptimal solution in a reasonable time. This algorithm requires only a local
knowledge from nodes, so it should support distributed implementations.
We analyze both problems through a series of simulation experiments featuring
different network sizes and network densities. On large networks, we compare
our heuristic and its variants with a genetic algorithm and show that our
heuristic computes the better resource allocation. On smaller networks, we
contrast these performances to that of the exact algorithm and show that
resource allocation fulfilling a large part of the peer can be found, even for
hard configuration where no resources are in excess.Comment: 10 pages, technical report assisting a submissio
Energy-Efficient Heterogeneous Cellular Networks with Spectrum Underlay and Overlay Access
In this paper, we provide joint subcarrier assignment and power allocation
schemes for quality-of-service (QoS)-constrained energy-efficiency (EE)
optimization in the downlink of an orthogonal frequency division multiple
access (OFDMA)-based two-tier heterogeneous cellular network (HCN). Considering
underlay transmission, where spectrum-efficiency (SE) is fully exploited, the
EE solution involves tackling a complex mixed-combinatorial and non-convex
optimization problem. With appropriate decomposition of the original problem
and leveraging on the quasi-concavity of the EE function, we propose a
dual-layer resource allocation approach and provide a complete solution using
difference-of-two-concave-functions approximation, successive convex
approximation, and gradient-search methods. On the other hand, the inherent
inter-tier interference from spectrum underlay access may degrade EE
particularly under dense small-cell deployment and large bandwidth utilization.
We therefore develop a novel resource allocation approach based on the concepts
of spectrum overlay access and resource efficiency (RE) (normalized EE-SE
trade-off). Specifically, the optimization procedure is separated in this case
such that the macro-cell optimal RE and corresponding bandwidth is first
determined, then the EE of small-cells utilizing the remaining spectrum is
maximized. Simulation results confirm the theoretical findings and demonstrate
that the proposed resource allocation schemes can approach the optimal EE with
each strategy being superior under certain system settings
- …