731 research outputs found

    Minimizing sum of completion times on a single machine with sequence-dependent family setup times

    Get PDF
    This paper presents a branch-and-bound (B&B) algorithm for minimizing the sum of completion times in a singlemachine scheduling setting with sequence-dependent family setup times. The main feature of the B&B algorithm is a new lower bounding scheme that is based on a networkformulation of the problem. With extensive computational tests, we demonstrate that the B&B algorithm can solve problems with up to 60 jobs and 12 families, where setup and processing times are uniformly distributed in various combinations of the [1,50] and [1,100] ranges

    Finding Connected Dense kk-Subgraphs

    Full text link
    Given a connected graph GG on nn vertices and a positive integer knk\le n, a subgraph of GG on kk vertices is called a kk-subgraph in GG. We design combinatorial approximation algorithms for finding a connected kk-subgraph in GG such that its density is at least a factor Ω(max{n2/5,k2/n2})\Omega(\max\{n^{-2/5},k^2/n^2\}) of the density of the densest kk-subgraph in GG (which is not necessarily connected). These particularly provide the first non-trivial approximations for the densest connected kk-subgraph problem on general graphs

    Throughput Maximization in Multiprocessor Speed-Scaling

    Full text link
    We are given a set of nn jobs that have to be executed on a set of mm speed-scalable machines that can vary their speeds dynamically using the energy model introduced in [Yao et al., FOCS'95]. Every job jj is characterized by its release date rjr_j, its deadline djd_j, its processing volume pi,jp_{i,j} if jj is executed on machine ii and its weight wjw_j. We are also given a budget of energy EE and our objective is to maximize the weighted throughput, i.e. the total weight of jobs that are completed between their respective release dates and deadlines. We propose a polynomial-time approximation algorithm where the preemption of the jobs is allowed but not their migration. Our algorithm uses a primal-dual approach on a linearized version of a convex program with linear constraints. Furthermore, we present two optimal algorithms for the non-preemptive case where the number of machines is bounded by a fixed constant. More specifically, we consider: {\em (a)} the case of identical processing volumes, i.e. pi,j=pp_{i,j}=p for every ii and jj, for which we present a polynomial-time algorithm for the unweighted version, which becomes a pseudopolynomial-time algorithm for the weighted throughput version, and {\em (b)} the case of agreeable instances, i.e. for which rirjr_i \le r_j if and only if didjd_i \le d_j, for which we present a pseudopolynomial-time algorithm. Both algorithms are based on a discretization of the problem and the use of dynamic programming

    Exploring Graphs with Time Constraints by Unreliable Collections of Mobile Robots

    Get PDF
    A graph environment must be explored by a collection of mobile robots. Some of the robots, a priori unknown, may turn out to be unreliable. The graph is weighted and each node is assigned a deadline. The exploration is successful if each node of the graph is visited before its deadline by a reliable robot. The edge weight corresponds to the time needed by a robot to traverse the edge. Given the number of robots which may crash, is it possible to design an algorithm, which will always guarantee the exploration, independently of the choice of the subset of unreliable robots by the adversary? We find the optimal time, during which the graph may be explored. Our approach permits to find the maximal number of robots, which may turn out to be unreliable, and the graph is still guaranteed to be explored. We concentrate on line graphs and rings, for which we give positive results. We start with the case of the collections involving only reliable robots. We give algorithms finding optimal times needed for exploration when the robots are assigned to fixed initial positions as well as when such starting positions may be determined by the algorithm. We extend our consideration to the case when some number of robots may be unreliable. Our most surprising result is that solving the line exploration problem with robots at given positions, which may involve crash-faulty ones, is NP-hard. The same problem has polynomial solutions for a ring and for the case when the initial robots' positions on the line are arbitrary. The exploration problem is shown to be NP-hard for star graphs, even when the team consists of only two reliable robots

    Polynomial Delay Algorithm for Listing Minimal Edge Dominating sets in Graphs

    Full text link
    The Transversal problem, i.e, the enumeration of all the minimal transversals of a hypergraph in output-polynomial time, i.e, in time polynomial in its size and the cumulated size of all its minimal transversals, is a fifty years old open problem, and up to now there are few examples of hypergraph classes where the problem is solved. A minimal dominating set in a graph is a subset of its vertex set that has a non empty intersection with the closed neighborhood of every vertex. It is proved in [M. M. Kant\'e, V. Limouzy, A. Mary, L. Nourine, On the Enumeration of Minimal Dominating Sets and Related Notions, In Revision 2014] that the enumeration of minimal dominating sets in graphs and the enumeration of minimal transversals in hypergraphs are two equivalent problems. Hoping this equivalence can help to get new insights in the Transversal problem, it is natural to look inside graph classes. It is proved independently and with different techniques in [Golovach et al. - ICALP 2013] and [Kant\'e et al. - ISAAC 2012] that minimal edge dominating sets in graphs (i.e, minimal dominating sets in line graphs) can be enumerated in incremental output-polynomial time. We provide the first polynomial delay and polynomial space algorithm that lists all the minimal edge dominating sets in graphs, answering an open problem of [Golovach et al. - ICALP 2013]. Besides the result, we hope the used techniques that are a mix of a modification of the well-known Berge's algorithm and a strong use of the structure of line graphs, are of great interest and could be used to get new output-polynomial time algorithms.Comment: proofs simplified from previous version, 12 pages, 2 figure

    Application of submodular optimization to single machine scheduling with controllable processing times subject to release dates and deadlines

    Get PDF
    In this paper, we study a scheduling problem on a single machine, provided that the jobs have individual release dates and deadlines, and the processing times are controllable. The objective is to find a feasible schedule that minimizes the total cost of reducing the processing times. We reformulate the problem in terms of maximizing a linear function over a submodular polyhedron intersected with a box. For the latter problem of submodular optimization, we develop a recursive decomposition algorithm and apply it to solving the single machine scheduling problem to achieve the best possible running time

    Lower Bounds for the Graph Homomorphism Problem

    Full text link
    The graph homomorphism problem (HOM) asks whether the vertices of a given nn-vertex graph GG can be mapped to the vertices of a given hh-vertex graph HH such that each edge of GG is mapped to an edge of HH. The problem generalizes the graph coloring problem and at the same time can be viewed as a special case of the 22-CSP problem. In this paper, we prove several lower bound for HOM under the Exponential Time Hypothesis (ETH) assumption. The main result is a lower bound 2Ω(nloghloglogh)2^{\Omega\left( \frac{n \log h}{\log \log h}\right)}. This rules out the existence of a single-exponential algorithm and shows that the trivial upper bound 2O(nlogh)2^{{\mathcal O}(n\log{h})} is almost asymptotically tight. We also investigate what properties of graphs GG and HH make it difficult to solve HOM(G,H)(G,H). An easy observation is that an O(hn){\mathcal O}(h^n) upper bound can be improved to O(hvc(G)){\mathcal O}(h^{\operatorname{vc}(G)}) where vc(G)\operatorname{vc}(G) is the minimum size of a vertex cover of GG. The second lower bound hΩ(vc(G))h^{\Omega(\operatorname{vc}(G))} shows that the upper bound is asymptotically tight. As to the properties of the "right-hand side" graph HH, it is known that HOM(G,H)(G,H) can be solved in time (f(Δ(H)))n(f(\Delta(H)))^n and (f(tw(H)))n(f(\operatorname{tw}(H)))^n where Δ(H)\Delta(H) is the maximum degree of HH and tw(H)\operatorname{tw}(H) is the treewidth of HH. This gives single-exponential algorithms for graphs of bounded maximum degree or bounded treewidth. Since the chromatic number χ(H)\chi(H) does not exceed tw(H)\operatorname{tw}(H) and Δ(H)+1\Delta(H)+1, it is natural to ask whether similar upper bounds with respect to χ(H)\chi(H) can be obtained. We provide a negative answer to this question by establishing a lower bound (f(χ(H)))n(f(\chi(H)))^n for any function ff. We also observe that similar lower bounds can be obtained for locally injective homomorphisms.Comment: 19 page

    On The Power of Tree Projections: Structural Tractability of Enumerating CSP Solutions

    Full text link
    The problem of deciding whether CSP instances admit solutions has been deeply studied in the literature, and several structural tractability results have been derived so far. However, constraint satisfaction comes in practice as a computation problem where the focus is either on finding one solution, or on enumerating all solutions, possibly projected to some given set of output variables. The paper investigates the structural tractability of the problem of enumerating (possibly projected) solutions, where tractability means here computable with polynomial delay (WPD), since in general exponentially many solutions may be computed. A general framework based on the notion of tree projection of hypergraphs is considered, which generalizes all known decomposition methods. Tractability results have been obtained both for classes of structures where output variables are part of their specification, and for classes of structures where computability WPD must be ensured for any possible set of output variables. These results are shown to be tight, by exhibiting dichotomies for classes of structures having bounded arity and where the tree decomposition method is considered

    The trade-off between taxi time and fuel consumption in airport ground movement

    Get PDF
    Environmental impact is a very important agenda item in many sectors nowadays, which the air transportation sector is also trying to reduce as much as possible. One area which has remained relatively unexplored in this context is the ground movement problem for aircraft on the airport’s surface. Aircraft have to be routed from a gate to a runway and vice versa and it is still unknown whether fuel burn and environmental impact reductions will best result from purely minimising the taxi times or whether it is also important to avoid multiple acceleration phases. This paper presents a newly developed multi-objective approach for analysing the trade-off between taxi time and fuel consumption during taxiing. The approach consists of a combination of a graph-based routing algorithm and a population adaptive immune algorithm to discover different speed profiles of aircraft. Analysis with data from a European hub airport has highlighted the impressive performance of the new approach. Furthermore, it is shown that the trade-off between taxi time and fuel consumption is very sensitive to the fuel-related objective function which is used

    A note on reverse scheduling with maximum lateness objective

    Get PDF
    The inverse and reverse counterparts of the single-machine scheduling problem 1||Lmax are studied in [2], in which the complexity classification is provided for various combinations of adjustable parameters (due dates and processing times) and for five different types of norm: ℓ1,ℓ2,ℓ∞,ℓΣH , and ℓmaxH . It appears that the O(n2) -time algorithm for the reverse problem with adjustable due dates contains a flaw. In this note, we present the structural properties of the reverse model, establishing a link with the forward scheduling problem with due dates and deadlines. For the four norms ℓ1,ℓ∞,ℓΣH , and ℓmaxH , the complexity results are derived based on the properties of the corresponding forward problems, while the case of the norm ℓ2 is treated separately. As a by-product, we resolve an open question on the complexity of problem 1||∑αjT2j
    corecore