Errol Lloyd Design and Analysis of Algorithms Approximation Algorithms for NP-complete Problems Bin Packing Networks.

Slides:



Advertisements
Similar presentations
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Advertisements

Algorithm Design Methods (I) Fall 2003 CSE, POSTECH.
Algorithm Design Methods Spring 2007 CSE, POSTECH.
 Review: The Greedy Method
Great Theoretical Ideas in Computer Science for Some.
Traffic Grooming in WDM Ring Networks Presented by: Eshcar Hilel.
Complexity ©D Moshkovitz 1 Approximation Algorithms Is Close Enough Good Enough?
S. J. Shyu Chap. 1 Introduction 1 The Design and Analysis of Algorithms Chapter 1 Introduction S. J. Shyu.
© The McGraw-Hill Companies, Inc., Chapter 8 The Theory of NP-Completeness.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
PCPs and Inapproximability Introduction. My T. Thai 2 Why Approximation Algorithms  Problems that we cannot find an optimal solution.
Great Theoretical Ideas in Computer Science.
Errol Lloyd Design and Analysis of Algorithms Approximation Algorithms for NP-complete Problems Bin Packing Computer Networks.
1 Discrete Structures & Algorithms Graphs and Trees: II EECE 320.
1 Minimum-energy broadcasting in multi-hop wireless networks using a single broadcast tree Department of Computer Science and Information Engineering National.
16:36MCS - WG20041 On the Maximum Cardinality Search Lower Bound for Treewidth Hans Bodlaender Utrecht University Arie Koster ZIB Berlin.
Balanced Graph Partitioning Konstantin Andreev Harald Räcke.
E. AlthausMax-Plank-Institut fur Informatik G. CalinescuIllinois Institute of Technology I.I. MandoiuUC San Diego S. Prasad Georgia State University N.
1 -1 Chapter 1 Introduction Why Do We Need to Study Algorithms? To learn strategies to design efficient algorithms. To understand the difficulty.
1 Vertex Cover Problem Given a graph G=(V, E), find V' ⊆ V such that for each edge (u, v) ∈ E at least one of u and v belongs to V’ and |V’| is minimized.
Sublinear time algorithms Ronitt Rubinfeld Blavatnik School of Computer Science Tel Aviv University TexPoint fonts used in EMF. Read the TexPoint manual.
Symmetric Connectivity With Minimum Power Consumption in Radio Networks G. Calinescu (IL-IT) I.I. Mandoiu (UCSD) A. Zelikovsky (GSU)
WiOpt’04: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks March 24-26, 2004, University of Cambridge, UK Session 2 : Energy Management.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 22nd Lecture Christian Schindelhauer.
9-1 Chapter 9 Approximation Algorithms. 9-2 Approximation algorithm Up to now, the best algorithm for solving an NP-complete problem requires exponential.
9-1 Chapter 9 Approximation Algorithms. 9-2 Approximation algorithm Up to now, the best algorithm for solving an NP-complete problem requires exponential.
Approximation Algorithms Motivation and Definitions TSP Vertex Cover Scheduling.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
Approximation Algorithms
Improved results for a memory allocation problem Rob van Stee University of Karlsruhe Germany Leah Epstein University of Haifa Israel WADS 2007 WAOA 2007.
CSE 589 Applied Algorithms Spring Colorability Branch and Bound.
Minimizing interference for the highway model in Wireless Ad-hoc and Sensor Networks Haisheng Tan, Tiancheng, Lou, Francis C.M. Lau, YuexuanWang, Shiteng.
Theory of Computing Lecture 10 MAS 714 Hartmut Klauck.
Primal-Dual Meets Local Search: Approximating MST’s with Non-uniform Degree Bounds Author: Jochen Könemann R. Ravi From CMU CS 3150 Presentation by Dan.
On the Construction of Data Aggregation Tree with Minimum Energy Cost in Wireless Sensor Networks: NP-Completeness and Approximation Algorithms National.
Why is bin packing interesting?
Approximation schemes Bin packing problem. Bin Packing problem Given n items with sizes a 1,…,a n  (0,1]. Find a packing in unit-sized bins that minimizes.
+ Mayukha Bairy Disk Intersection graphs and CDS as a backbone in wireless ad hoc networks.
Design Techniques for Approximation Algorithms and Approximation Classes.
Presented by Dajiang Zhu 09/20/2011.  Motivation  Introduction & Conclusion  Pre – Definition Approximation Algorithms  Two problems as examples SUBSET-SUM.
Binary Trees, Binary Search Trees RIZWAN REHMAN CENTRE FOR COMPUTER STUDIES DIBRUGARH UNIVERSITY.
© 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Case Studies: Bin Packing.
Télécom 2A – Algo Complexity (1) Time Complexity and the divide and conquer strategy Or : how to measure algorithm run-time And : design efficient algorithms.
TECH Computer Science NP-Complete Problems Problems  Abstract Problems  Decision Problem, Optimal value, Optimal solution  Encodings  //Data Structure.
Approximation Algorithms
Princeton University COS 423 Theory of Algorithms Spring 2001 Kevin Wayne Approximation Algorithms These lecture slides are adapted from CLRS.
On Non-Disjoint Dominating Sets for the Lifetime of Wireless Sensor Networks Akshaye Dhawan.
Data Structure Introduction.
CSE 589 Part VI. Reading Skiena, Sections 5.5 and 6.8 CLR, chapter 37.
State space representations and search strategies - 2 Spring 2007, Juris Vīksna.
© Yamacraw, Fall 2002 Power Efficient Range Assignment in Ad-hoc Wireless Networks E. Althous (MPI) G. Calinescu (IL-IT) I.I. Mandoiu (UCSD) S. Prasad.
1 Approximation algorithms Algorithms and Networks 2015/2016 Hans L. Bodlaender Johan M. M. van Rooij TexPoint fonts used in EMF. Read the TexPoint manual.
© The McGraw-Hill Companies, Inc., Chapter 1 Introduction.
Onlinedeeneislam.blogspot.com1 Design and Analysis of Algorithms Slide # 1 Download From
Example Apply hierarchical clustering with d min to below data where c=3. Nearest neighbor clustering d min d max will form elongated clusters!
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
E. AlthausMax-Plank-Institut fur Informatik G. CalinescuIllinois Institute of Technology I.I. MandoiuUC San Diego S. Prasad Georgia State University N.
TU/e Algorithms (2IL15) – Lecture 11 1 Approximation Algorithms.
CSC317 Selection problem q p r Randomized‐Select(A,p,r,i)
8.3.2 Constant Distance Approximations
Approximation Algorithms for NP-complete Problems
CS 3343: Analysis of Algorithms
Robustness of wireless ad hoc network topologies
Robustness of wireless ad hoc network topologies
Coverage Approximation Algorithms
Power Efficient Range Assignment in Ad-hoc Wireless Networks
Priority Queues An abstract data type (ADT) Similar to a queue
Algorithm Design Methods
Clustering.
Bin Packing Michael T. Goodrich Some slides adapted from slides from
Presentation transcript:

Errol Lloyd Design and Analysis of Algorithms Approximation Algorithms for NP-complete Problems Bin Packing Networks

2 What is bin packing? unlimited supply of bins (capacity 1) Items of sizes s 1, s 2, … s n 0 < s i < 1 Given Objective Pack the items into a minimum number of bins Restated Assign each item to a bin such that: Number of nonempty bins is minimized Number of nonempty bins is minimized For each bin B, the sum of the sizes of the items in B does For each bin B, the sum of the sizes of the items in B does not exceed 1 not exceed

3 Approximation Methods One difficulty: Bin packing is NP-complete Cannot guarantee optimal packings in polynomial time (unless P = NP) Settle for: Packings that are close to optimal What is close? No more than a constant factor larger than optimal. Example: Packings using twice as many bins as optimal.

4 Any Fit Packing Open one bin for each item S i if there is an open bin where S i will fit thenplace S i into that bin else open a new bin place S i into that new bin Recall: Optimal used 4 bins

5 How bad can Any Fit be? How many bins might Any Fit use compared with optimal? Items:18 items of size 1/2 18 items of size 1/18 Any Fit packing is 1.8 times optimal Examples exist with Any Fit up to 2 times optimal

6 Can Any Fit do worse than 2*optimal? optimal packing uses at least b/2 bins Any Fit never uses more than twice optimal bins Competitive Ratio of Any Fit: 2 Running time of Any Fit: O(n log n)

7 First Fit Open one bin for each item S i if there is an open bin where S i will fit thenplace S i into the leftmost such bin else open a new bin place S i into that new bin Competitive Ratio of First Fit: 1.7 Running Time: O(n log n)

8 First Fit Decreasing A really good bin packing algorithm Sort the items in decreasing order by size Do a First Fit Packing using that sorted list Competitive Ratio: 11/9 (i.e …) Running Time: O(n log n) [Johnson, Demers, Ullman, Garey, Graham, 1974] Loooooooooong proof (originally 100+ pages).3

9 Changing the Rules – Fully Dynamic Bin Packing NOT given the items all at once Instead: given items one at a time – INSERTs (DELETES) Upon an INSERT/DELETE, update the packing NO apriori limitations on this update – the contents of the bins may be changed at will Maintain a good packing at all times O(log n) time per INSERT/DELETE (to update) So, n INSERTs in O(n log n) time

10 Mostly Myopic Packing (MMP) MMP Competitive Ratio: 5/4 = 1.25 Looong proof MMP running time: O(log n) per INSERT or DELETE O(n log n) for sequence of n INSERT/DELETEs A fully dynamic bin packing algorithm

11 Topology Control for Ad-hoc Networks What is an ad hoc network? A collection of nodes that communicate with one another over a wireless medium

12 Applications Military environments Search and rescue Sensor networks

13 High Transmission Power High channel contention High power consumption Low throughput Low Transmission Power Partition Topology What is the topology of an ad hoc network? IETF MANET Group Definition: The topology of the network is described by a graph G = (V, E), where V is the set of nodes and E is the set of links in the network.

14 Our problem Input: Nodes, power thresholds and a graph property Power threshold for x and y: Min power for a signal from x to reach y Output: A power assignment f(u) for each node u, s.t. the induced graph satisfies the specified graph property, and that minimizes: Max u (f(u)) (Max Power) OR Sum u (f(u)) (Total Power)

15 Minimizing Max Power Gave a general framework to compute an optimal solution in polynomial time for where P is monotone and efficiently testable Monotone property: Property unaffected by edge additions Monotone: 1-connectivity Non-monotone: Tree in O(n 2 logn) in O(n 3 logn)

16 Two related problems What if a property is non-monotone? Property: “Tree” Complexity: NP-complete: even with only three power thresholds even if the minimization objective is dropped! Can number of nodes using max power be minimized? NP-complete even for the “1- Connected ” property Approximation algorithm with: Competitive Ratio: 5/3 Running time: O(n e  (n))

17 Minimizing Total Power Problems are NP-complete, even Developed a general approximation framework for monotone and efficiently testable properties Competitive ratio: 2(2-2/n)(2+1/n)

18 Experimental results Implemented and compared: the approximation algorithm for the exact algorithm for

19 TRANSIMS networks TRANSIMS project of LANL and IBM Traffic in the Portland, OR metropolitan area 1716 nodes in a 3x3 km 2 area Uniform transmission range of 75 meters Area 1: 1 km x 1km, 284 nodes Area 2: 0.6 km x 1.65 km, 271 nodes Area 1 Area 2

20 TRANSIMS networks Area 1 Area 2 Area 1 Max Range Avg. Range Max Degree Avg. Degree MaxP158m67.75m TotalP193m55.07m52.72 Area 2 Max Range Avg. Range Max Degree Avg. Degree MaxP153m73.59m TotalP222m51.95m72.73

21 Additional Information