30,301 research outputs found

    Beyond Geometry : Towards Fully Realistic Wireless Models

    Full text link
    Signal-strength models of wireless communications capture the gradual fading of signals and the additivity of interference. As such, they are closer to reality than other models. However, nearly all theoretic work in the SINR model depends on the assumption of smooth geometric decay, one that is true in free space but is far off in actual environments. The challenge is to model realistic environments, including walls, obstacles, reflections and anisotropic antennas, without making the models algorithmically impractical or analytically intractable. We present a simple solution that allows the modeling of arbitrary static situations by moving from geometry to arbitrary decay spaces. The complexity of a setting is captured by a metricity parameter Z that indicates how far the decay space is from satisfying the triangular inequality. All results that hold in the SINR model in general metrics carry over to decay spaces, with the resulting time complexity and approximation depending on Z in the same way that the original results depends on the path loss term alpha. For distributed algorithms, that to date have appeared to necessarily depend on the planarity, we indicate how they can be adapted to arbitrary decay spaces. Finally, we explore the dependence on Z in the approximability of core problems. In particular, we observe that the capacity maximization problem has exponential upper and lower bounds in terms of Z in general decay spaces. In Euclidean metrics and related growth-bounded decay spaces, the performance depends on the exact metricity definition, with a polynomial upper bound in terms of Z, but an exponential lower bound in terms of a variant parameter phi. On the plane, the upper bound result actually yields the first approximation of a capacity-type SINR problem that is subexponential in alpha

    Approximating subset kk-connectivity problems

    Get PDF
    A subset TVT \subseteq V of terminals is kk-connected to a root ss in a directed/undirected graph JJ if JJ has kk internally-disjoint vsvs-paths for every vTv \in T; TT is kk-connected in JJ if TT is kk-connected to every sTs \in T. We consider the {\sf Subset kk-Connectivity Augmentation} problem: given a graph G=(V,E)G=(V,E) with edge/node-costs, node subset TVT \subseteq V, and a subgraph J=(V,EJ)J=(V,E_J) of GG such that TT is kk-connected in JJ, find a minimum-cost augmenting edge-set FEEJF \subseteq E \setminus E_J such that TT is (k+1)(k+1)-connected in JFJ \cup F. The problem admits trivial ratio O(T2)O(|T|^2). We consider the case T>k|T|>k and prove that for directed/undirected graphs and edge/node-costs, a ρ\rho-approximation for {\sf Rooted Subset kk-Connectivity Augmentation} implies the following ratios for {\sf Subset kk-Connectivity Augmentation}: (i) b(ρ+k)+(3TTk)2H(3TTk)b(\rho+k) + {(\frac{3|T|}{|T|-k})}^2 H(\frac{3|T|}{|T|-k}); (ii) ρO(TTklogk)\rho \cdot O(\frac{|T|}{|T|-k} \log k), where b=1 for undirected graphs and b=2 for directed graphs, and H(k)H(k) is the kkth harmonic number. The best known values of ρ\rho on undirected graphs are min{T,O(k)}\min\{|T|,O(k)\} for edge-costs and min{T,O(klogT)}\min\{|T|,O(k \log |T|)\} for node-costs; for directed graphs ρ=T\rho=|T| for both versions. Our results imply that unless k=To(T)k=|T|-o(|T|), {\sf Subset kk-Connectivity Augmentation} admits the same ratios as the best known ones for the rooted version. This improves the ratios in \cite{N-focs,L}

    Improved approximation algorithm for k-level UFL with penalties, a simplistic view on randomizing the scaling parameter

    Full text link
    The state of the art in approximation algorithms for facility location problems are complicated combinations of various techniques. In particular, the currently best 1.488-approximation algorithm for the uncapacitated facility location (UFL) problem by Shi Li is presented as a result of a non-trivial randomization of a certain scaling parameter in the LP-rounding algorithm by Chudak and Shmoys combined with a primal-dual algorithm of Jain et al. In this paper we first give a simple interpretation of this randomization process in terms of solving an aux- iliary (factor revealing) LP. Then, armed with this simple view point, Abstract. we exercise the randomization on a more complicated algorithm for the k-level version of the problem with penalties in which the planner has the option to pay a penalty instead of connecting chosen clients, which results in an improved approximation algorithm

    Pseudo-Separation for Assessment of Structural Vulnerability of a Network

    Full text link
    Based upon the idea that network functionality is impaired if two nodes in a network are sufficiently separated in terms of a given metric, we introduce two combinatorial \emph{pseudocut} problems generalizing the classical min-cut and multi-cut problems. We expect the pseudocut problems will find broad relevance to the study of network reliability. We comprehensively analyze the computational complexity of the pseudocut problems and provide three approximation algorithms for these problems. Motivated by applications in communication networks with strict Quality-of-Service (QoS) requirements, we demonstrate the utility of the pseudocut problems by proposing a targeted vulnerability assessment for the structure of communication networks using QoS metrics; we perform experimental evaluations of our proposed approximation algorithms in this context
    corecore