Errol Lloyd Design and Analysis of Algorithms Approximation Algorithms for NP-complete Problems Bin Packing Computer Networks.

Slides:



Advertisements
Similar presentations
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Advertisements

Algorithm Design Methods (I) Fall 2003 CSE, POSTECH.
Algorithm Design Methods Spring 2007 CSE, POSTECH.
 Review: The Greedy Method
Dynamic Graph Algorithms - I
Traffic Grooming in WDM Ring Networks Presented by: Eshcar Hilel.
Evolving Graphs & Dynamic Networks : Old questions  New insights Afonso Ferreira S. Bhadra CNRS I3S & INRIA Sophia Antipolis
S. J. Shyu Chap. 1 Introduction 1 The Design and Analysis of Algorithms Chapter 1 Introduction S. J. Shyu.
© The McGraw-Hill Companies, Inc., Chapter 8 The Theory of NP-Completeness.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
PCPs and Inapproximability Introduction. My T. Thai 2 Why Approximation Algorithms  Problems that we cannot find an optimal solution.
1 Minimum-energy broadcasting in multi-hop wireless networks using a single broadcast tree Department of Computer Science and Information Engineering National.
16:36MCS - WG20041 On the Maximum Cardinality Search Lower Bound for Treewidth Hans Bodlaender Utrecht University Arie Koster ZIB Berlin.
E. AlthausMax-Plank-Institut fur Informatik G. CalinescuIllinois Institute of Technology I.I. MandoiuUC San Diego S. Prasad Georgia State University N.
1 -1 Chapter 1 Introduction Why Do We Need to Study Algorithms? To learn strategies to design efficient algorithms. To understand the difficulty.
1 Vertex Cover Problem Given a graph G=(V, E), find V' ⊆ V such that for each edge (u, v) ∈ E at least one of u and v belongs to V’ and |V’| is minimized.
Sublinear time algorithms Ronitt Rubinfeld Blavatnik School of Computer Science Tel Aviv University TexPoint fonts used in EMF. Read the TexPoint manual.
Symmetric Connectivity With Minimum Power Consumption in Radio Networks G. Calinescu (IL-IT) I.I. Mandoiu (UCSD) A. Zelikovsky (GSU)
WiOpt’04: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks March 24-26, 2004, University of Cambridge, UK Session 2 : Energy Management.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
9-1 Chapter 9 Approximation Algorithms. 9-2 Approximation algorithm Up to now, the best algorithm for solving an NP-complete problem requires exponential.
9-1 Chapter 9 Approximation Algorithms. 9-2 Approximation algorithm Up to now, the best algorithm for solving an NP-complete problem requires exponential.
CS541 Advanced Networking 1 Static Channel Assignment and Routing in Multi-Radio Wireless Mesh Networks Neil Tang 3/9/2009.
CSE 550 Computer Network Design Dr. Mohammed H. Sqalli COE, KFUPM Spring 2007 (Term 062)
Approximation Algorithms Motivation and Definitions TSP Vertex Cover Scheduling.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
Approximation Algorithms
A Fair Scheduling for Wireless Mesh Networks Naouel Ben Salem and Jean-Pierre Hubaux Laboratory of Computer Communications and Applications (LCA) EPFL.
CSE 589 Applied Algorithms Spring Colorability Branch and Bound.
Special Topics on Algorithmic Aspects of Wireless Networking Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central.
Primal-Dual Meets Local Search: Approximating MST’s with Non-uniform Degree Bounds Author: Jochen Könemann R. Ravi From CMU CS 3150 Presentation by Dan.
On the Construction of Data Aggregation Tree with Minimum Energy Cost in Wireless Sensor Networks: NP-Completeness and Approximation Algorithms National.
Clustering in Mobile Ad hoc Networks. Why Clustering? –Cluster-based control structures provides more efficient use of resources for large dynamic networks.
Why is bin packing interesting?
Approximation schemes Bin packing problem. Bin Packing problem Given n items with sizes a 1,…,a n  (0,1]. Find a packing in unit-sized bins that minimizes.
+ Mayukha Bairy Disk Intersection graphs and CDS as a backbone in wireless ad hoc networks.
Design Techniques for Approximation Algorithms and Approximation Classes.
Presented by Dajiang Zhu 09/20/2011.  Motivation  Introduction & Conclusion  Pre – Definition Approximation Algorithms  Two problems as examples SUBSET-SUM.
June 21, 2007 Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks Anand Prabhu Subramanian, Himanshu Gupta.
De-Nian Young Ming-Syan Chen IEEE Transactions on Mobile Computing Slide content thanks in part to Yu-Hsun Chen, University of Taiwan.
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
© 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Case Studies: Bin Packing.
Télécom 2A – Algo Complexity (1) Time Complexity and the divide and conquer strategy Or : how to measure algorithm run-time And : design efficient algorithms.
TECH Computer Science NP-Complete Problems Problems  Abstract Problems  Decision Problem, Optimal value, Optimal solution  Encodings  //Data Structure.
Princeton University COS 423 Theory of Algorithms Spring 2001 Kevin Wayne Approximation Algorithms These lecture slides are adapted from CLRS.
1 Some Results in Interval Routing Francis C.M. Lau HKU and ITCS Tsinghua December 2, 2007.
On Non-Disjoint Dominating Sets for the Lifetime of Wireless Sensor Networks Akshaye Dhawan.
CSE 589 Part VI. Reading Skiena, Sections 5.5 and 6.8 CLR, chapter 37.
© Yamacraw, Fall 2002 Power Efficient Range Assignment in Ad-hoc Wireless Networks E. Althous (MPI) G. Calinescu (IL-IT) I.I. Mandoiu (UCSD) S. Prasad.
Computability NP complete problems. Space complexity. Homework: [Post proposal]. Find PSPACE- Complete problems. Work on presentations.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
© The McGraw-Hill Companies, Inc., Chapter 1 Introduction.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
Onlinedeeneislam.blogspot.com1 Design and Analysis of Algorithms Slide # 1 Download From
Example Apply hierarchical clustering with d min to below data where c=3. Nearest neighbor clustering d min d max will form elongated clusters!
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
E. AlthausMax-Plank-Institut fur Informatik G. CalinescuIllinois Institute of Technology I.I. MandoiuUC San Diego S. Prasad Georgia State University N.
Errol Lloyd Design and Analysis of Algorithms Approximation Algorithms for NP-complete Problems Bin Packing Networks.
Power-Aware Topology Control for Wireless Ad-Hoc Networks Wonseok Baek and C.-C. Jay Kuo Department of Electrical Engineering University of Southern California.
TU/e Algorithms (2IL15) – Lecture 11 1 Approximation Algorithms.
CSC317 Selection problem q p r Randomized‐Select(A,p,r,i)
8.3.2 Constant Distance Approximations
Does Topology Control Reduce Interference?
Approximation Algorithms for NP-complete Problems
Robustness of wireless ad hoc network topologies
Robustness of wireless ad hoc network topologies
Coverage Approximation Algorithms
Power Efficient Range Assignment in Ad-hoc Wireless Networks
Dhruv Gupta EEC 273 class project Prof. Chen-Nee Chuah
Bin Packing Michael T. Goodrich Some slides adapted from slides from
Presentation transcript:

Errol Lloyd Design and Analysis of Algorithms Approximation Algorithms for NP-complete Problems Bin Packing Computer Networks

2 What is bin packing? unlimited supply of bins (capacity 1) Items of sizes s 1, s 2, … s n 0 < s i < 1 Given Objective Pack the items into a minimum number of bins Restated Assign each item to a bin such that: Number of nonempty bins is minimized Number of nonempty bins is minimized For each bin B, the sum of the sizes of the items in B does For each bin B, the sum of the sizes of the items in B does not exceed 1 not exceed

3 Approximation Methods One difficulty: Bin packing is NP-complete Cannot guarantee optimal packings in polynomial time (unless P = NP) Settle for: Packings that are close to optimal What is close? No more than a constant factor larger than optimal. Example: Packings using twice as many bins as optimal.

4 Any Fit Packing Open one bin for each item S i if there is an open bin where S i will fit thenplace S i into that bin else open a new bin place S i into that new bin Recall: Optimal used 4 bins

5 How bad can Any Fit be? How many bins might Any Fit use compared with optimal? Items:18 items of size 1/2 18 items of size 1/18 Any Fit packing is 1.8 times optimal Examples exist with Any Fit up to 2 times optimal

6 Can Any Fit do worse than 2*optimal? optimal packing uses at least b/2 bins Any Fit never uses more than twice optimal bins Competitive Ratio of Any Fit: 2 Running time of Any Fit: O(n log n)

7 First Fit Open one bin for each item S i if there is an open bin where S i will fit thenplace S i into the leftmost such bin else open a new bin place S i into that new bin Competitive Ratio of First Fit: 1.7 Running Time: O(n log n)

8 First Fit Decreasing A really good bin packing algorithm Sort the items in decreasing order by size Do a First Fit Packing using that sorted list Competitive Ratio: 11/9 (i.e …) Running Time: O(n log n) [Johnson, Demers, Ullman, Garey, Graham, 1974] Loooooooooong proof (originally 100+ pages).3

9 Changing the Rules – Fully Dynamic Bin Packing NOT given the items all at once Instead: given items one at a time – INSERTs (DELETES) Upon an INSERT/DELETE, update the packing NO apriori limitations on this update – the contents of the bins may be changed at will Maintain a good packing at all times O(log n) time per INSERT/DELETE (to update) So, n INSERTs in O(n log n) time

10 Mostly Myopic Packing (MMP) MMP Competitive Ratio: 5/4 = 1.25 Looong proof MMP running time: O(log n) per INSERT or DELETE O(n log n) for sequence of n INSERT/DELETEs A fully dynamic bin packing algorithm

11 Some bin packing papers Z. Ivkovich and E.L. Lloyd, "Fully dynamic algorithms for bin packing: Being mostly myopic helps," SIAM Journal on Computing, 28(1998), Z. Ivkovich and E.L. Lloyd, "Partially dynamic bin packing can be solved within 1+  in (amortized) polylogarithmic time", Information Processing Letters 63(1997), Z. Ivkovich and E.L. Lloyd, "A fundamental restriction on fully dynamic maintenance of bin packing," Information Processing Letters, 59(1996),

12 Topology Control for Ad-hoc Networks What is an ad hoc network? A collection of nodes that communicate with one another over a wireless medium

13 Applications Military environments Search and rescue Sensor networks

14 High Transmission Power High channel contention High power consumption Low throughput Low Transmission Power Partition Topology What is the topology of an ad hoc network? IETF MANET Group Definition: The topology of the network is described by a graph G = (V, E), where V is the set of nodes and E is the set of links in the network.

15 Why topology control? Desirable topology & minimize energy consumption Topology property guarantee implies: Improving network survivability, performance, etc Lower transmission power implies: Conserving battery power Increasing spatial frequency reuse

16 A formal definition Input: Nodes, power thresholds and a graph property Power threshold for x and y: Min power for a signal from x to reach y Output: A power assignment f(u) for each node u, s.t. the induced graph satisfies the specified graph property, and that minimizes: Max u (f(u)) (Max Power) OR Sum u (f(u)) (Total Power)

17 Minimizing Max Power Gave a general framework to compute an optimal solution in polynomial time for where P is monotone and efficiently testable Monotone property: Property unaffected by edge additions Monotone: 1-connectivity Non-monotone: Tree in O(n 2 logn) in O(n 3 logn)

18 Two related problems What if a property is non-monotone? Property: “ Tree ” Complexity: NP-complete: even with only three power thresholds even if the minimization objective is dropped! Can number of nodes using max power be minimized? NP-complete even for the “ 1- Connected ” property Approximation algorithm with: Competitive Ratio: 5/3 Running time: O(n e  (n))

19 Minimizing Total Power Problems are NP-complete, even Developed a general approximation framework for monotone and efficiently testable properties Competitive ratio: 2(2-2/n)(2+1/n)

20 Experimental results Implemented and compared: the approximation algorithm for the exact algorithm for

21 TRANSIMS networks TRANSIMS project of LANL and IBM Traffic in the Portland, OR metropolitan area 1716 nodes in a 3x3 km 2 area Uniform transmission range of 75 meters Area 1: 1 km x 1km, 284 nodes Area 2: 0.6 km x 1.65 km, 271 nodes Area 1 Area 2

22 TRANSIMS networks Area 1 Area 2 Area 1 Max Range Avg. Range Max Degree Avg. Degree MaxP158m67.75m TotalP193m55.07m52.72 Area 2 Max Range Avg. Range Max Degree Avg. Degree MaxP153m73.59m TotalP222m51.95m72.73

23 Some topology control papers "Algorithmic aspects of topology control problems for ad hoc networks," MobiHoc 2002, (E. Lloyd, M. Marathe, R. Ramanathan, S.S. Ravi, and R. Liu). To appear in the ACM journal MONET. "Topology control problems under symmetric and asymmetric power thresholds," ADHOCNOW'03 (S. Krumke, R. Liu, E. Lloyd, M. Marathe, R. Ramanathan, S.S. Ravi). "CLTC: A cluster-based topology control framework for ad-hoc networks," IEEE Transactions on Mobile Computing, (C.-C. Shen, C. Srisathatpornphat, R. Liu, E. Lloyd, Z. Huang, C. Jaikaeo).

24 Additional Information