94 research outputs found

    Improved Algorithm for Degree Bounded Survivable Network Design Problem

    Full text link
    We consider the Degree-Bounded Survivable Network Design Problem: the objective is to find a minimum cost subgraph satisfying the given connectivity requirements as well as the degree bounds on the vertices. If we denote the upper bound on the degree of a vertex v by b(v), then we present an algorithm that finds a solution whose cost is at most twice the cost of the optimal solution while the degree of a degree constrained vertex v is at most 2b(v) + 2. This improves upon the results of Lau and Singh and that of Lau, Naor, Salavatipour and Singh

    Placing regenerators in optical networks to satisfy multiple sets of requests.

    Get PDF
    The placement of regenerators in optical networks has become an active area of research during the last years. Given a set of lightpaths in a network G and a positive integer d, regenerators must be placed in such a way that in any lightpath there are no more than d hops without meeting a regenerator. While most of the research has focused on heuristics and simulations, the first theoretical study of the problem has been recently provided in [10], where the considered cost function is the number of locations in the network hosting regenerators. Nevertheless, in many situations a more accurate estimation of the real cost of the network is given by the total number of regenerators placed at the nodes, and this is the cost function we consider. Furthermore, in our model we assume that we are given a finite set of p possible traffic patterns (each given by a set of lightpaths), and our objective is to place the minimum number of regenerators at the nodes so that each of the traffic patterns is satisfied. While this problem can be easily solved when d = 1 or p = 1, we prove that for any fixed d,p ≥ 2 it does not admit a PTASUnknown control sequence '\textsc', even if G has maximum degree at most 3 and the lightpaths have length O(d)(d). We complement this hardness result with a constant-factor approximation algorithm with ratio ln (d ·p). We then study the case where G is a path, proving that the problem is NP-hard for any d,p ≥ 2, even if there are two edges of the path such that any lightpath uses at least one of them. Interestingly, we show that the problem is polynomial-time solvable in paths when all the lightpaths share the first edge of the path, as well as when the number of lightpaths sharing an edge is bounded. Finally, we generalize our model in two natural directions, which allows us to capture the model of [10] as a particular case, and we settle some questions that were left open in [10]

    2-Player Nash and Nonsymmetric Bargaining Games: Algorithms and Structural Properties

    Full text link
    The solution to a Nash or a nonsymmetric bargaining game is obtained by maximizing a concave function over a convex set, i.e., it is the solution to a convex program. We show that each 2-player game whose convex program has linear constraints, admits a rational solution and such a solution can be found in polynomial time using only an LP solver. If in addition, the game is succinct, i.e., the coefficients in its convex program are ``small'', then its solution can be found in strongly polynomial time. We also give a non-succinct linear game whose solution can be found in strongly polynomial time

    Approximability of the Subset Sum Reconfiguration Problem

    Get PDF
    The subset sum problem is a well-known NP-complete problem in which we wish to find a packing (subset) of items (integers) into a knapsack with capacity so that the sum of the integers in the packing is at most the capacity of the knapsack and at least a given integer threshold. In this paper, we study the problem of reconfiguring one packing into another packing by moving only one item at a time, while at all times maintaining the feasibility of packings. First we show that this decision problem is strongly NP-hard, and is PSPACE-complete if we are given a conflict graph for the set of items in which each vertex corresponds to an item and each edge represents a pair of items that are not allowed to be packed together into the knapsack. We then study an optimization version of the problem: we wish to maximize the minimum sum among all packings in the reconfiguration. We show that this maximization problem admits a polynomial-time approximation scheme (PTAS), while the problem is APX-hard if we are given a conflict graph

    Self-stabilizing algorithms for Connected Vertex Cover and Clique decomposition problems

    Full text link
    In many wireless networks, there is no fixed physical backbone nor centralized network management. The nodes of such a network have to self-organize in order to maintain a virtual backbone used to route messages. Moreover, any node of the network can be a priori at the origin of a malicious attack. Thus, in one hand the backbone must be fault-tolerant and in other hand it can be useful to monitor all network communications to identify an attack as soon as possible. We are interested in the minimum \emph{Connected Vertex Cover} problem, a generalization of the classical minimum Vertex Cover problem, which allows to obtain a connected backbone. Recently, Delbot et al.~\cite{DelbotLP13} proposed a new centralized algorithm with a constant approximation ratio of 22 for this problem. In this paper, we propose a distributed and self-stabilizing version of their algorithm with the same approximation guarantee. To the best knowledge of the authors, it is the first distributed and fault-tolerant algorithm for this problem. The approach followed to solve the considered problem is based on the construction of a connected minimal clique partition. Therefore, we also design the first distributed self-stabilizing algorithm for this problem, which is of independent interest

    A local 2-approximation algorithm for the vertex cover problem

    Get PDF
    We present a distributed 2-approximation algorithm for the minimum vertex cover problem. The algorithm is deterministic, and it runs in (Δ + 1)2 synchronous communication rounds, where Δ is the maximum degree of the graph. For Δ = 3, we give a 2-approximation algorithm also for the weighted version of the problem.Peer reviewe

    A computer simulation study of tilted smetic mesophases.

    Get PDF
    Results are presented from a series of simulations undertaken to determine the effect of a novel form of molecular biaxiality upon the phase behaviour of the well established Gay-Berne (GB) liquid crystal model. Firstly, the simulation of a bulk system interacting via the Internally-Rotated Gay-Berne (IRGB) potential, which offers a single-site representation of a molecule rigidly constrained into a zig-zag conformation, is presented. The results of simulations performed for systems of IRGB particles with an aspect ratio of 3:1 confirm that the introduction of biaxiality into the model results in the destabilisation of the orientationally ordered phases. For particles with a sufficiently pronounced zig-zag conformation, this results in the complete destabilisation of the smectic A phase and the smectic B phase being replaced by the tilted smectic J phase. Following these observations, the effect upon the phase behaviour of increasing molecular elongation is also considered, with an increase in the aspect ratio from 3:1 to 4:1 resulting in the nematic and smectic J phases being replaced by smectic A and smectic G phases respectively. Secondly, a version of the IRGB potential modified to include a degree of molecular flexibility is considered. Results obtained from bulk systems interacting via the flexible IRGB for 3:1 and 4:1 molecules show that the introduction of flexibility results in the destabilisation of the smectic A phase and the stabilisation of the nematic and tilted hexatic phases. Finally, the effect upon the phase behaviour of the rigid IRGB model of the inclusion of a longitudinal linear quadrupole is examined. These results show that increasing quadrupole moment results in the destabilisation of the tilted hexatic phase, although the biaxial order parameter is increased with increasing quadrupole moment. There is no clear correlation between quadrupole magnitude and the other observed phase transitions, with the nematic and smectic A phases being variously stabilised and destabilised with increasing quadrupole magnitude. For the 4:1 molecules with large quadrupole moments, buckled smectic layers are observed where some molecules are tilted with respect to a local layer normal. Of all the systems considered here, this buckled structure is the one which most closely resembles the elusive smectic C phase

    Greedy D-Approximation Algorithm for Covering with Arbitrary Constraints and Submodular Cost

    Full text link
    This paper describes a simple greedy D-approximation algorithm for any covering problem whose objective function is submodular and non-decreasing, and whose feasible region can be expressed as the intersection of arbitrary (closed upwards) covering constraints, each of which constrains at most D variables of the problem. (A simple example is Vertex Cover, with D = 2.) The algorithm generalizes previous approximation algorithms for fundamental covering problems and online paging and caching problems
    • …
    corecore