488 research outputs found

    Fully Dynamic All-pairs Shortest Paths with Worst-case Update-time revisited

    No full text
    We revisit the classic problem of dynamically maintaining shortest paths between all pairs of nodes of a directed weighted graph. The allowed updates are insertions and deletions of nodes and their incident edges. We give worst-case guarantees on the time needed to process a single update (in contrast to related results, the update time is not amortized over a sequence of updates). Our main result is a simple randomized algorithm that for any parameter c>1c>1 has a worst-case update time of O(cn2+2/3log⁡4/3n)O(cn^{2+2/3} \log^{4/3}{n}) and answers distance queries correctly with probability 1−1/nc1-1/n^c, against an adaptive online adversary if the graph contains no negative cycle. The best deterministic algorithm is by Thorup [STOC 2005] with a worst-case update time of O~(n2+3/4)\tilde O(n^{2+3/4}) and assumes non-negative weights. This is the first improvement for this problem for more than a decade. Conceptually, our algorithm shows that randomization along with a more direct approach can provide better bounds

    Vertex Fault Tolerant Additive Spanners

    Full text link
    A {\em fault-tolerant} structure for a network is required to continue functioning following the failure of some of the network's edges or vertices. In this paper, we address the problem of designing a {\em fault-tolerant} additive spanner, namely, a subgraph HH of the network GG such that subsequent to the failure of a single vertex, the surviving part of HH still contains an \emph{additive} spanner for (the surviving part of) GG, satisfying dist(s,t,H∖{v})≀dist(s,t,G∖{v})+ÎČdist(s,t,H\setminus \{v\}) \leq dist(s,t,G\setminus \{v\})+\beta for every s,t,v∈Vs,t,v \in V. Recently, the problem of constructing fault-tolerant additive spanners resilient to the failure of up to ff \emph{edges} has been considered by Braunschvig et. al. The problem of handling \emph{vertex} failures was left open therein. In this paper we develop new techniques for constructing additive FT-spanners overcoming the failure of a single vertex in the graph. Our first result is an FT-spanner with additive stretch 22 and O~(n5/3)\widetilde{O}(n^{5/3}) edges. Our second result is an FT-spanner with additive stretch 66 and O~(n3/2)\widetilde{O}(n^{3/2}) edges. The construction algorithm consists of two main components: (a) constructing an FT-clustering graph and (b) applying a modified path-buying procedure suitably adopted to failure prone settings. Finally, we also describe two constructions for {\em fault-tolerant multi-source additive spanners}, aiming to guarantee a bounded additive stretch following a vertex failure, for every pair of vertices in S×VS \times V for a given subset of sources S⊆VS\subseteq V. The additive stretch bounds of our constructions are 4 and 8 (using a different number of edges)

    Sparse Fault-Tolerant BFS Trees

    Full text link
    This paper addresses the problem of designing a sparse {\em fault-tolerant} BFS tree, or {\em FT-BFS tree} for short, namely, a sparse subgraph TT of the given network GG such that subsequent to the failure of a single edge or vertex, the surviving part Tâ€ČT' of TT still contains a BFS spanning tree for (the surviving part of) GG. Our main results are as follows. We present an algorithm that for every nn-vertex graph GG and source node ss constructs a (single edge failure) FT-BFS tree rooted at ss with O(n \cdot \min\{\Depth(s), \sqrt{n}\}) edges, where \Depth(s) is the depth of the BFS tree rooted at ss. This result is complemented by a matching lower bound, showing that there exist nn-vertex graphs with a source node ss for which any edge (or vertex) FT-BFS tree rooted at ss has Ω(n3/2)\Omega(n^{3/2}) edges. We then consider {\em fault-tolerant multi-source BFS trees}, or {\em FT-MBFS trees} for short, aiming to provide (following a failure) a BFS tree rooted at each source s∈Ss\in S for some subset of sources S⊆VS\subseteq V. Again, tight bounds are provided, showing that there exists a poly-time algorithm that for every nn-vertex graph and source set S⊆VS \subseteq V of size σ\sigma constructs a (single failure) FT-MBFS tree T∗(S)T^*(S) from each source si∈Ss_i \in S, with O(σ⋅n3/2)O(\sqrt{\sigma} \cdot n^{3/2}) edges, and on the other hand there exist nn-vertex graphs with source sets S⊆VS \subseteq V of cardinality σ\sigma, on which any FT-MBFS tree from SS has Ω(σ⋅n3/2)\Omega(\sqrt{\sigma}\cdot n^{3/2}) edges. Finally, we propose an O(log⁥n)O(\log n) approximation algorithm for constructing FT-BFS and FT-MBFS structures. The latter is complemented by a hardness result stating that there exists no Ω(log⁥n)\Omega(\log n) approximation algorithm for these problems under standard complexity assumptions

    Path-Fault-Tolerant Approximate Shortest-Path Trees

    Full text link
    Let G=(V,E)G=(V,E) be an nn-nodes non-negatively real-weighted undirected graph. In this paper we show how to enrich a {\em single-source shortest-path tree} (SPT) of GG with a \emph{sparse} set of \emph{auxiliary} edges selected from EE, in order to create a structure which tolerates effectively a \emph{path failure} in the SPT. This consists of a simultaneous fault of a set FF of at most ff adjacent edges along a shortest path emanating from the source, and it is recognized as one of the most frequent disruption in an SPT. We show that, for any integer parameter k≄1k \geq 1, it is possible to provide a very sparse (i.e., of size O(kn⋅f1+1/k)O(kn\cdot f^{1+1/k})) auxiliary structure that carefully approximates (i.e., within a stretch factor of (2k−1)(2∣F∣+1)(2k-1)(2|F|+1)) the true shortest paths from the source during the lifetime of the failure. Moreover, we show that our construction can be further refined to get a stretch factor of 33 and a size of O(nlog⁥n)O(n \log n) for the special case f=2f=2, and that it can be converted into a very efficient \emph{approximate-distance sensitivity oracle}, that allows to quickly (even in optimal time, if k=1k=1) reconstruct the shortest paths (w.r.t. our structure) from the source after a path failure, thus permitting to perform promptly the needed rerouting operations. Our structure compares favorably with previous known solutions, as we discuss in the paper, and moreover it is also very effective in practice, as we assess through a large set of experiments.Comment: 21 pages, 3 figures, SIROCCO 201

    Fault-Tolerant Hotelling Games

    Full text link
    The nn-player Hotelling game calls for each player to choose a point on the line segment, so as to maximize the size of his Voronoi cell. This paper studies fault-tolerant versions of the Hotelling game. Two fault models are studied: line faults and player faults. The first model assumes that the environment is prone to failure: with some probability, a disconnection occurs at a random point on the line, splitting it into two separate segments and modifying each player's Voronoi cell accordingly. A complete characterization of the Nash equilibria of this variant is provided for every nn. Additionally, a one to one correspondence is shown between equilibria of this variant and of the Hotelling game with no faults. The second fault model assumes the players are prone to failure: each player is removed from the game with i.i.d. probability, changing the payoffs of the remaining players accordingly. It is shown that for n≄3n \geq 3 this variant of the game has no Nash equilibria

    Matroid and Knapsack Center Problems

    Full text link
    In the classic kk-center problem, we are given a metric graph, and the objective is to open kk nodes as centers such that the maximum distance from any vertex to its closest center is minimized. In this paper, we consider two important generalizations of kk-center, the matroid center problem and the knapsack center problem. Both problems are motivated by recent content distribution network applications. Our contributions can be summarized as follows: 1. We consider the matroid center problem in which the centers are required to form an independent set of a given matroid. We show this problem is NP-hard even on a line. We present a 3-approximation algorithm for the problem on general metrics. We also consider the outlier version of the problem where a given number of vertices can be excluded as the outliers from the solution. We present a 7-approximation for the outlier version. 2. We consider the (multi-)knapsack center problem in which the centers are required to satisfy one (or more) knapsack constraint(s). It is known that the knapsack center problem with a single knapsack constraint admits a 3-approximation. However, when there are at least two knapsack constraints, we show this problem is not approximable at all. To complement the hardness result, we present a polynomial time algorithm that gives a 3-approximate solution such that one knapsack constraint is satisfied and the others may be violated by at most a factor of 1+ϔ1+\epsilon. We also obtain a 3-approximation for the outlier version that may violate the knapsack constraint by 1+ϔ1+\epsilon.Comment: A preliminary version of this paper is accepted to IPCO 201

    Mapping the Sensitive Volume of an Ion-Counting Nanodosimeter

    Full text link
    We present two methods of independently mapping the dimensions of the sensitive volume in an ion-counting nanodosimeter. The first method is based on a calculational approach simulating the extraction of ions from the sensitive volume, and the second method on probing the sensitive volume with 250 MeV protons. Sensitive-volume maps obtained with both methods are compared and systematic errors inherent in both methods are quantified.Comment: 27 pages, 8 figures. Submitted to JINST, Jan. 16 200

    Interactive Content-Based Image Retrieval with Deep Neural Networks

    Get PDF
    Peer reviewe

    THGEM operation in Ne and Ne/CH4

    Full text link
    The operation of Thick Gaseous Electron Multipliers (THGEM) in Ne and Ne/CH4 mixtures, features high multiplication factors at relatively low operation potentials, in both single- and double-THGEM configurations. We present some systematic data measured with UV-photons and soft x-rays, in various Ne mixtures. It includes gain dependence on hole diameter and gas purity, photoelectron extraction efficiency from CsI photocathodes into the gas, long-term gain stability and pulse rise-time. Position resolution of a 100x100 mm^2 X-rays imaging detector is presented. Possible applications are discussed.Comment: Submitted to JINST, 25 pages, 33 figure

    Accelerated test execution using GPUs

    Get PDF
    As product life-cycles become shorter and the scale and complexity of systems increase, accelerating the execution of large test suites gains importance. Existing research has primarily focussed on techniques that reduce the size of the test suite. By contrast, we propose a technique that accelerates test execution, allowing test suites to run in a fraction of the original time, by parallel execution with a Graphics Processing Unit (GPU). Program testing, which is in essence execution of the same program with multiple sets of test data, naturally exhibits the kind of data parallelism that can be exploited with GPUs. Our approach simultaneously executes the program with one test case per GPU thread. GPUs have severe limitations, and we discuss these in the context of our approach and define the scope of our applications. We observe speed-ups up to a factor of 27 compared to single-core execution on conventional CPUs with embedded systems benchmark programs
    • 

    corecore