running time
Recently Published Documents


TOTAL DOCUMENTS

939
(FIVE YEARS 311)

H-INDEX

30
(FIVE YEARS 6)

2022 ◽  
Vol 69 (1) ◽  
pp. 1-26
Author(s):  
Leonid Barenboim ◽  
Michael Elkin ◽  
Uri Goldenberg

We consider graph coloring and related problems in the distributed message-passing model. Locally-iterative algorithms are especially important in this setting. These are algorithms in which each vertex decides about its next color only as a function of the current colors in its 1-hop-neighborhood . In STOC’93 Szegedy and Vishwanathan showed that any locally-iterative Δ + 1-coloring algorithm requires Ω (Δ log Δ + log * n ) rounds, unless there exists “a very special type of coloring that can be very efficiently reduced” [ 44 ]. No such special coloring has been found since then. This led researchers to believe that Szegedy-Vishwanathan barrier is an inherent limitation for locally-iterative algorithms and to explore other approaches to the coloring problem [ 2 , 3 , 19 , 32 ]. The latter gave rise to faster algorithms, but their heavy machinery that is of non-locally-iterative nature made them far less suitable to various settings. In this article, we obtain the aforementioned special type of coloring. Specifically, we devise a locally-iterative Δ + 1-coloring algorithm with running time O (Δ + log * n ), i.e., below Szegedy-Vishwanathan barrier. This demonstrates that this barrier is not an inherent limitation for locally-iterative algorithms. As a result, we also achieve significant improvements for dynamic, self-stabilizing, and bandwidth-restricted settings. This includes the following results: We obtain self-stabilizing distributed algorithms for Δ + 1-vertex-coloring, (2Δ - 1)-edge-coloring, maximal independent set, and maximal matching with O (Δ + log * n ) time. This significantly improves previously known results that have O(n) or larger running times [ 23 ]. We devise a (2Δ - 1)-edge-coloring algorithm in the CONGEST model with O (Δ + log * n ) time and O (Δ)-edge-coloring in the Bit-Round model with O (Δ + log n ) time. The factors of log * n and log n are unavoidable in the CONGEST and Bit-Round models, respectively. Previously known algorithms had superlinear dependency on Δ for (2Δ - 1)-edge-coloring in these models. We obtain an arbdefective coloring algorithm with running time O (√ Δ + log * n ). Such a coloring is not necessarily proper, but has certain helpful properties. We employ it to compute a proper (1 + ε)Δ-coloring within O (√ Δ + log * n ) time and Δ + 1-coloring within O (√ Δ log Δ log * Δ + log * n ) time. This improves the recent state-of-the-art bounds of Barenboim from PODC’15 [ 2 ] and Fraigniaud et al. from FOCS’16 [ 19 ] by polylogarithmic factors. Our algorithms are applicable to the SET-LOCAL model [ 25 ] (also known as the weak LOCAL model). In this model a relatively strong lower bound of Ω (Δ 1/3 ) is known for Δ + 1-coloring. However, most of the coloring algorithms do not work in this model. (In Reference [ 25 ] only Linial’s O (Δ 2 )-time algorithm and Kuhn-Wattenhofer O (Δ log Δ)-time algorithms are shown to work in it.) We obtain the first linear-in-Δ Δ + 1-coloring algorithms that work also in this model.


2022 ◽  
Vol 69 (1) ◽  
pp. 1-82
Author(s):  
Yael Tauman Kalai ◽  
Ran Raz ◽  
Ron D. Rothblum

We construct a 1-round delegation scheme (i.e., argument-system) for every language computable in time t = t ( n ), where the running time of the prover is poly ( t ) and the running time of the verifier is n · polylog ( t ). In particular, for every language in P we obtain a delegation scheme with almost linear time verification. Our construction relies on the existence of a computational sub-exponentially secure private information retrieval ( PIR ) scheme. The proof exploits a curious connection between the problem of computation delegation and the model of multi-prover interactive proofs that are sound against no-signaling (cheating) strategies , a model that was studied in the context of multi-prover interactive proofs with provers that share quantum entanglement, and is motivated by the physical principle that information cannot travel faster than light. For any language computable in time t = t ( n ), we construct a multi-prover interactive proof ( MIP ), that is, sound against no-signaling strategies, where the running time of the provers is poly ( t ), the number of provers is polylog ( t ), and the running time of the verifier is n · polylog ( t ). In particular, this shows that the class of languages that have polynomial-time MIP s that are sound against no-signaling strategies, is exactly EXP . Previously, this class was only known to contain PSPACE . To convert our MIP into a 1-round delegation scheme, we use the method suggested by Aiello et al. (ICALP, 2000), which makes use of a PIR scheme. This method lacked a proof of security. We prove that this method is secure assuming the underlying MIP is secure against no-signaling provers.


2022 ◽  
Vol 18 (1) ◽  
pp. 1-11
Author(s):  
Marek Chrobak ◽  
Mordecai Golin ◽  
J. Ian Munro ◽  
Neal E. Young

We present a simple O(n 4 ) -time algorithm for computing optimal search trees with two-way comparisons. The only previous solution to this problem, by Anderson et al., has the same running time but is significantly more complicated and is restricted to the variant where only successful queries are allowed. Our algorithm extends directly to solve the standard full variant of the problem, which also allows unsuccessful queries and for which no polynomial-time algorithm was previously known. The correctness proof of our algorithm relies on a new structural theorem for two-way-comparison search trees.


Algorithmica ◽  
2022 ◽  
Author(s):  
Boris Klemz ◽  
Günter Rote

AbstractA bipartite graph $$G=(U,V,E)$$ G = ( U , V , E ) is convex if the vertices in V can be linearly ordered such that for each vertex $$u\in U$$ u ∈ U , the neighbors of u are consecutive in the ordering of V. An induced matchingH of G is a matching for which no edge of E connects endpoints of two different edges of H. We show that in a convex bipartite graph with n vertices and mweighted edges, an induced matching of maximum total weight can be computed in $$O(n+m)$$ O ( n + m ) time. An unweighted convex bipartite graph has a representation of size O(n) that records for each vertex $$u\in U$$ u ∈ U the first and last neighbor in the ordering of V. Given such a compact representation, we compute an induced matching of maximum cardinality in O(n) time. In convex bipartite graphs, maximum-cardinality induced matchings are dual to minimum chain covers. A chain cover is a covering of the edge set by chain subgraphs, that is, subgraphs that do not contain induced matchings of more than one edge. Given a compact representation, we compute a representation of a minimum chain cover in O(n) time. If no compact representation is given, the cover can be computed in $$O(n+m)$$ O ( n + m ) time. All of our algorithms achieve optimal linear running time for the respective problem and model, and they improve and generalize the previous results in several ways: The best algorithms for the unweighted problem versions had a running time of $$O(n^2)$$ O ( n 2 ) (Brandstädt et al. in Theor. Comput. Sci. 381(1–3):260–265, 2007. 10.1016/j.tcs.2007.04.006). The weighted case has not been considered before.


2022 ◽  
Vol 2022 ◽  
pp. 1-10
Author(s):  
Zhechun Hu ◽  
Yunxing Wang

Aiming at the problems of low optimization accuracy, poor optimization effect, and long running time in current teaching optimization algorithms, a multiclass interactive martial arts teaching optimization method based on the Euclidean distance is proposed. Using the K-means algorithm, the initial population is divided into several subgroups based on the Euclidean distance, so as to effectively use the information of the population neighborhood and strengthen the local search ability of the algorithm. Imitating the school's selection of excellent teachers to guide students with poor performance, after the “teaching” stage, the worst individual in each subgroup will learn from the best individual in the population, and the information interaction in the evolutionary process will be enhanced, so that the poor individuals will quickly move closer to the best individuals. According to different learning levels and situations of students, different teaching stages and contents are divided, mainly by grade, supplemented by different types of learning groups in the form of random matching, so as to improve the learning ability of members with weak learning ability in each group, which effectively guarantees the diversity of the population and realizes multiclass interactive martial arts teaching optimization. Experimental results show that the optimization effect of the proposed method is better, which can effectively improve the accuracy of algorithm optimization and shorten the running time of the algorithm.


2022 ◽  
Vol 2146 (1) ◽  
pp. 012037
Author(s):  
Ying Zou

Abstract Aiming at the problems of high complexity and low accuracy of visual depth map feature recognition, a graph recognition algorithm based on principal component direction depth gradient histogram (pca-hodg) is designed in this study. In order to obtain high-quality depth map, it is necessary to calculate the parallax of the visual image. At the same time, in order to obtain the quantized regional shape histogram, it is necessary to carry out edge detection and gradient calculation on the depth map, then reduce the dimension of the depth map combined with the principal component, and use the sliding window detection method to reduce the dimension again to realize the feature extraction of the depth map. The results show that compared with other algorithms, the pca-hodg algorithm designed in this study improves the average classification accuracy and significantly reduces the average running time. This shows that the algorithm can reduce the running time by reducing the dimension, extract the depth map features more accurately, and has good robustness.


In this paper, we deal with multimodal biometric systems based on palmprint recognition. In this regard, several palmprint-based approaches have been already proposed. Although these approaches show interesting results, they have some limitations in terms of recognition rate, running time and storage space. To fill this gap, we propose a novel multimodal biometric system combining left and right palmprints. For building this multimodal system, two compact local descriptors for feature extraction are proposed, fusion of left and right palmprints is performed at feature-level, and feature selection using evolutionary algorithms is introduced. To validate our proposal, we conduct intensive experiments related to performance and running time aspects. The obtained results show that our proposal shows significant improvements in terms of recognition rate, running time and storage space. Also, the comparison with other works shows that the proposed system outperforms some literature approaches and comparable with others.


Author(s):  
Aref Gholizadeh Manghutay ◽  
Mehdi Salay Naderi ◽  
Seyed Hamid Fathi

Purpose Heuristic algorithms have been widely used in different types of optimization problems. Their unique features in terms of running time and flexibility have made them superior to deterministic algorithms. To accurately compare different heuristic algorithms in solving optimization problems, the final optimal solution needs to be known. Existing deterministic methods such as Exhaustive Search and Integer Linear Programming can provide the final global optimal solution for small-scale optimization problems. However, as the system grows the number of calculations and required memory size incredibly increases, so applying existing deterministic methods is no longer possible for medium and large-scale systems. The purpose of this paper is to introduce a novel deterministic method with short running time and small memory size requirement for optimal placement of Micro Phasor Measurement Units (µPMUs) in radial electricity distribution systems to make the system completely observable. Design/methodology/approach First, the principle of the method is explained and the observability of the system is analyzed. Then, the algorithm’s running time and memory usage when applying on some of the modified versions of the Institute of Electrical and Electronics Engineers 123-node test feeder are obtained and compared with those of its deterministic counterparts. Findings Because of the innovative method of step-by-step placement of µPMUs, a unique method is developed. Simulation results elucidate that the proposed method has unique features of short running time and small memory size requirements. Originality/value While the mathematical background of the observability study of electricity distribution systems is very well-presented in the referenced papers, the proposed step-by-step placement method of µPMUs, which shrinks unobservable parts of the system in each step, is not discussed yet. The presented paper is directly applicable to typical problems in the field of power systems.


2021 ◽  
Author(s):  
ZEGOUR Djamel Eddine

Abstract Today, Red-Black trees are becoming a popular data structure typically used to implement dictionaries, associative arrays, symbol tables within some compilers (C++, Java …) and many other systems. In this paper, we present an improvement of the delete algorithm of this kind of binary search tree. The proposed algorithm is very promising since it colors differently the tree while reducing color changes by a factor of about 29%. Moreover, the maintenance operations re-establishing Red-Black tree balance properties are reduced by a factor of about 11%. As a consequence, the proposed algorithm saves about 4% on running time when insert and delete operations are used together while conserving search performance of the standard algorithm.


Author(s):  
G. ESTRADA-RODRIGUEZ ◽  
T. LORENZI

Experimental results on the immune response to cancer indicate that activation of cytotoxic T lymphocytes (CTLs) through interactions with dendritic cells (DCs) can trigger a change in CTL migration patterns. In particular, while CTLs in the pre-activation state move in a non-local search pattern, the search pattern of activated CTLs is more localised. In this paper, we develop a kinetic model for such a switch in CTL migration modes. The model is formulated as a coupled system of balance equations for the one-particle distribution functions of CTLs in the pre-activation state, activated CTLs and DCs. CTL activation is modelled via binary interactions between CTLs in the pre-activation state and DCs. Moreover, cell motion is represented as a velocity-jump process, with the running time of CTLs in the pre-activation state following a long-tailed distribution, which is consistent with a Lévy walk, and the running time of activated CTLs following a Poisson distribution, which corresponds to Brownian motion. We formally show that the macroscopic limit of the model comprises a coupled system of balance equations for the cell densities, whereby activated CTL movement is described via a classical diffusion term, whilst a fractional diffusion term describes the movement of CTLs in the pre-activation state. The modelling approach presented here and its possible generalisations are expected to find applications in the study of the immune response to cancer and in other biological contexts in which switch from non-local to localised migration patterns occurs.


Sign in / Sign up

Export Citation Format

Share Document