2,654 research outputs found
On Packet Scheduling with Adversarial Jamming and Speedup
In Packet Scheduling with Adversarial Jamming packets of arbitrary sizes
arrive over time to be transmitted over a channel in which instantaneous
jamming errors occur at times chosen by the adversary and not known to the
algorithm. The transmission taking place at the time of jamming is corrupt, and
the algorithm learns this fact immediately. An online algorithm maximizes the
total size of packets it successfully transmits and the goal is to develop an
algorithm with the lowest possible asymptotic competitive ratio, where the
additive constant may depend on packet sizes.
Our main contribution is a universal algorithm that works for any speedup and
packet sizes and, unlike previous algorithms for the problem, it does not need
to know these properties in advance. We show that this algorithm guarantees
1-competitiveness with speedup 4, making it the first known algorithm to
maintain 1-competitiveness with a moderate speedup in the general setting of
arbitrary packet sizes. We also prove a lower bound of on
the speedup of any 1-competitive deterministic algorithm, showing that our
algorithm is close to the optimum.
Additionally, we formulate a general framework for analyzing our algorithm
locally and use it to show upper bounds on its competitive ratio for speedups
in and for several special cases, recovering some previously known
results, each of which had a dedicated proof. In particular, our algorithm is
3-competitive without speedup, matching both the (worst-case) performance of
the algorithm by Jurdzinski et al. and the lower bound by Anta et al.Comment: Appeared in Proc. of the 15th Workshop on Approximation and Online
Algorithms (WAOA 2017
Highly parallel computer architecture for robotic computation
In a computer having a large number of single instruction multiple data (SIMD) processors, each of the SIMD processors has two sets of three individual processor elements controlled by a master control unit and interconnected among a plurality of register file units where data is stored. The register files input and output data in synchronism with a minor cycle clock under control of two slave control units controlling the register file units connected to respective ones of the two sets of processor elements. Depending upon which ones of the register file units are enabled to store or transmit data during a particular minor clock cycle, the processor elements within an SIMD processor are connected in rings or in pipeline arrays, and may exchange data with the internal bus or with neighboring SIMD processors through interface units controlled by respective ones of the two slave control units
A Mechanism for Fair Distribution of Resources without Payments
We design a mechanism for Fair and Efficient Distribution of Resources
(FEDoR) in the presence of strategic agents. We consider a multiple-instances,
Bayesian setting, where in each round the preference of an agent over the set
of resources is a private information. We assume that in each of r rounds n
agents are competing for k non-identical indivisible goods, (n > k). In each
round the strategic agents declare how much they value receiving any of the
goods in the specific round. The agent declaring the highest valuation receives
the good with the highest value, the agent with the second highest valuation
receives the second highest valued good, etc. Hence we assume a decision
function that assigns goods to agents based on their valuations. The novelty of
the mechanism is that no payment scheme is required to achieve truthfulness in
a setting with rational/strategic agents. The FEDoR mechanism takes advantage
of the repeated nature of the framework, and through a statistical test is able
to punish the misreporting agents and be fair, truthful, and socially
efficient. FEDoR is fair in the sense that, in expectation over the course of
the rounds, all agents will receive the same good the same amount of times.
FEDoR is an eligible candidate for applications that require fair distribution
of resources over time. For example, equal share of bandwidth for nodes through
the same point of access. But further on, FEDoR can be applied in less trivial
settings like sponsored search, where payment is necessary and can be given in
the form of a flat participation fee. To this extent we perform a comparison
with traditional mechanisms applied to sponsored search, presenting the
advantage of FEDoR
Combining quantum and classical density functional theory for ion-electron mixtures
We combine techniques from quantum and from classical density functional
theory (DFT) to describe electron-ion mixtures. For homogeneous systems, we
show how to calculate ion-ion and ion-electron correlation functions within
Chihara's quantum hypernetted chain approximation, which we derive within a DFT
formulation. We also sketch out how to apply the DFT formulation to
inhomogeneous electron-ion mixtures, and use this to study the electron
distribution at the liquid-solid interface of Al.Comment: to be published in J. Non-Cryst. Solids, LAM 11 special issu
- …