Online Supplement for An integer programming approach for fault-tolerant connected dominating sets

Size: px
Start display at page:

Download "Online Supplement for An integer programming approach for fault-tolerant connected dominating sets"

Transcription

1 Submitted to INFORMS Journal on Computing manuscript (Please, provide the mansucript number!) Authors are encouraged to submit new papers to INFORMS journals by means of a style file template, which includes the journal title. However, use of a template does not certify that the paper has been accepted for publication in the named journal. INFORMS journal templates are for the exclusive purpose of submitting to an INFORMS journal and should not be used to distribute the papers in print or online or to submit the papers to another publication. Online Supplement for An integer programming approach for fault-tolerant connected dominating sets Austin Buchanan Industrial & Systems Engineering, Texas A&M University, College Station, TX , USA, buchanan@tamu.edu, Je Sang Sung Industrial & Systems Engineering, Texas A&M University, College Station, TX , USA, je.sung@tamu.edu, Sergiy Butenko Industrial & Systems Engineering, Texas A&M University, College Station, TX , USA, butenko@tamu.edu, Eduardo L. Pasiliao Air Force Research Laboratory, Munitions Directorate, Eglin, FL 32542, USA, eduardo.pasiliao@eglin.af.mil, In this online supplement, we provide detailed computational results for solving the minimum k-d-cds problem using a lazy-constraint approach. We also list all facets of the 1-1-CDS polytope of the Grötzsch graph. Key words : connected dominating set; k-connected m-dominating set; integer programming; fault-tolerant History : In this online supplement, we provide detailed computational results for solving the minimum k-d-cds problem using a lazy-constraint approach. We also list all facets of the 1-1-CDS polytope of the Grötzsch graph. For information not discussed here, please see Section 4.1 of the main paper. All of our computational experiments were conducted on a Dell Precision WorkStation T7500 R machine with two Intel Xeon R E GHz quad-core processors and 12 GB RAM. The solver used was Gurobi Optimizer version 5.5 with its lazy-constraint callback (Gurobi Optimization, Inc 2013). In Table 1, we compare the runtime of the lazy-constraint approach (referred to in the table as Lazy ) with other approaches for the MCDS problem. The first six approaches 1

2 2 Article submitted to INFORMS Journal on Computing; manuscript no. (Please, provide the mansucript number!) were proposed by Gendron et al. (2014), and include stand-alone (SA) and iterative-probing (IP) versions of Bender s decomposition (BE), branch-and-cut (BC), and a hybrid (HY) of BE and BC. The next three approaches are as follows: p-sabc is a branch-and-cut approach from Simonetti et al. (2011); DGR is a branch-and-cut approach from Lucena et al. (2010); and MTZ uses Miller-Tucker-Zemlin constraints to enforce connectivity (as proposed by Fan and Watson (2012)). We note that the experiments of Gendron et al. (2014) for the first six approaches and the MTZ approach were conducted on a 2.0 GHz Intel Xeon R E5405 machine with 8 GB RAM. More details regarding the experiments for 1-1-CDS can be found in Tables 2 and 3. Table 2 includes the initial LP relaxation, the number of lazy cuts added, and the number of branch-and-bound nodes. Table 3 compares the computational effort expended when using arbitrary vertex-cuts versus minimal vertex-cuts. In Table 4, we report experimental results for the minimum 2-1-CDS problem using the lazy approach. A minimal vertex-cut C can be an a-b separator for many choices of a and b leading to numerous possible lazy cuts. It was not clear to us which or how many of them should be used. This lead us to consider two possible approaches: (Single cut) add the a-b-separator inequality for which a and b are the lexicographically smallest, and (All cuts) add all possible a-b-separator inequalities. In Table 5, we provide runtimes and solution sizes for the same instances for both the minimum k-total dominating set (ktds) problem and the minimum k-k-cds problem for k = 1, 2, 3, 4. Recall that the minimum k-total dominating set problem can be stated as (minimum ktds problem) min x i x {0,1} n x j k, v V. i V j N(v) 1. CDS facets for the Grötzsch graph The convex hull of characteristic vectors of 1-1-CDSs of the Mycielski graph (Mycielski 1955) on eleven vertices (also known as the Grötzsch graph) is not fully described by the r-robust vertex-cut inequalities. Below are all facet-defining inequalities except for the trivial 0-1 facets as given by PORTA (Christof et al. 1997). The vertex numbering is the same as in the graph file provided by Michael Trick for the DIMACS coloring challenge (Trick 2013).

3 Article submitted to INFORMS Journal on Computing; manuscript no. (Please, provide the mansucript number!) 3 x1+ x2+ x3+ x4+ x5+ x6+ x7+ x8+ x9+ x10+ x11 >= 4 x1+ x2+ x3+ x4+ x5+ x6 + x8 +2x11 >= 3 x1+ x2+ x3+ x4+ x5+ x6 + x10+2x11 >= 3 x1+ x2+ x3+ x4+ x5 + x7 + x9 +2x11 >= 3 x1+ x2+ x3+ x4+ x5 + x7 + x10+2x11 >= 3 x1+ x2+ x3+ x4+ x5 + x8+ x9 +2x11 >= 3 2x1 + x3 + x5+2x6+ x7+ x8+ x9+ x10+ x11 >= 3 x1+ x2 +2x5+ x6+ x7+ x8+ x9+2x10+ x11 >= 3 x1 +2x3+ x4 + x6+ x7+2x8+ x9+ x10+ x11 >= 3 2x2 + x4+ x5+ x6+2x7+ x8+ x9+ x10+ x11 >= 3 x2+ x3+2x4 + x6+ x7+ x8+2x9+ x10+ x11 >= 3 x1+ x2+ x3+ x4+ x5 +3x11 >= 3 x1+ x2+ x3+ x4 + x8+ x9 + x11 >= 2 x1+ x2+ x3 + x5+ x6 + x10+ x11 >= 2 x1+ x2 + x4+ x5 + x7 + x10+ x11 >= 2 x1 + x3+ x4+ x5+ x6 + x8 + x11 >= 2 x2+ x3+ x4+ x5 + x7 + x9 + x11 >= 2 x1+ x2 + x5+ x6+ x7+ x8+ x9+2x10 >= 2 x1 + x3+ x4 + x6+ x7+2x8+ x9+ x10 >= 2 x1 + x3 + x5+2x6+ x7+ x8+ x9+ x10 >= 2 x2+ x3+ x4 + x6+ x7+ x8+2x9+ x10 >= 2 x2 + x4+ x5+ x6+2x7+ x8+ x9+ x10 >= 2 x1 + x3 + x11 >= 1 x1 + x5 + x11 >= 1 x2 + x4 + x11 >= 1 x2 + x5 + x11 >= 1 x3+ x4 + x11 >= 1 x1 + x3 + x6 + x8 >= 1 x1 + x5+ x6 + x10 >= 1 x2 + x4 + x7 + x9 >= 1 x2 + x5 + x7 + x10 >= 1 x3+ x4 + x8+ x9 >= 1 x6+ x7+ x8+ x9+ x10 >= 1 References Christof, T., A. Löbel, M. Stoer PORTA-polyhedron representation transformation algorithm. URL Fan, N., J.P. Watson Solving the connected dominating set problem and power dominating set problem by integer programming. G. Lin, ed., Combinatorial Optimization and Applications, Lecture Notes in Computer Science, vol Springer,

4 4 Article submitted to INFORMS Journal on Computing; manuscript no. (Please, provide the mansucript number!) Gendron, B., A. Lucena, A.S. da Cunha, L. Simonetti Benders decomposition, branch-and-cut, and hybrid algorithms for the minimum connected dominating set problem. INFORMS Journal on Computing To Appear. Gurobi Optimization, Inc Gurobi Optimizer Reference Manual. URL Lucena, A., N. Maculan, L. Simonetti Reformulations and solution algorithms for the maximum leaf spanning tree problem. Computational Management Science Mycielski, J Sur le coloriage des graphes. Colloq. Math Simonetti, L., A.S. da Cunha, A. Lucena The minimum connected dominating set problem: formulation, valid inequalities and a branch-and-cut algorithm. Network Optimization Trick, M Graph coloring instances. URL

5 Article submitted to INFORMS Journal on Computing; manuscript no. (Please, provide the mansucript number!) 5 Table 1 A comparison of runtimes, in seconds, to solve the MCDS problem (i.e., minimum 1-1-CDS). Aside from the Lazy approach, all times are from Gendron et al. (2014). A dash indicates unsolved in time limit. Instance SABE IPBE SABC IPBC SAHY IPHY p-sabc DGR MTZ Lazy v30 d v30 d v30 d v30 d v30 d v50 d v50 d v50 d v50 d v50 d v50 d v70 d v70 d v70 d v70 d v70 d v70 d v100 d v100 d v100 d v100 d v100 d v100 d v120 d v120 d v120 d v120 d v120 d v120 d v150 d v150 d v150 d v150 d v150 d v150 d v200 d v200 d v200 d v200 d v200 d v200 d IEEE-14-Bus IEEE-30-Bus IEEE-57-Bus RTS IEEE-118-Bus IEEE-300-Bus # in 1 sec # in 10 sec # in 100 sec # in 1000 sec # solved # fastest

6 6 Article submitted to INFORMS Journal on Computing; manuscript no. (Please, provide the mansucript number!) Table 2 Extended computational results for solving the minimum 1-1-CDS problem using the lazy approach. Instance IP Opt Root LP # Lazy cuts # B&B nodes IP Time v30 d v30 d v30 d v30 d v30 d v50 d , v50 d v50 d v50 d v50 d v50 d v70 d , v70 d v70 d v70 d v70 d v70 d v100 d , v100 d v100 d v100 d , v100 d v100 d v120 d v120 d v120 d , v120 d , v120 d v120 d v150 d , v150 d , v150 d , v150 d , v150 d v150 d v200 d , v200 d ,182, v200 d , v200 d , v200 d , v200 d IEEE-14-Bus IEEE-30-Bus IEEE-57-Bus , RTS , IEEE-118-Bus IEEE-300-Bus , ,

7 Article submitted to INFORMS Journal on Computing; manuscript no. (Please, provide the mansucript number!) 7 Table 3 The effect of Algorithm 1 on reducing the computational effort for the minimum 1-1-CDS problem. Without Algorithm 1 With Algorithm 1 Instance # Lazy cuts # B&B nodes Time # Lazy cuts # B&B nodes Time v30 d10 54,750 81, v30 d v30 d v30 d v30 d v50 d5 >110,425 >125,657 > , v50 d v50 d v50 d v50 d v50 d v70 d5 >88,233 >97,749 > , v70 d v70 d v70 d v70 d v70 d v100 d5 10,266 14, , v100 d v100 d v100 d30 0 1, , v100 d v100 d v120 d , v120 d v120 d20 0 2, , v120 d30 0 2, , v120 d v120 d v150 d5 1,125 15, , v150 d , , v150 d , , v150 d30 1 5, , v150 d v150 d v200 d , , v200 d10 6 2,220, ,182, v200 d , , v200 d , , v200 d50 0 1, , v200 d IEEE-14-Bus IEEE-30-Bus IEEE-57-Bus >102,288 >116,896 > , RTS96 >78,608 >77,532 > , IEEE-118-Bus >67,771 >43,083 > IEEE-300-Bus >39,576 >86,494 > , ,

8 8 Article submitted to INFORMS Journal on Computing; manuscript no. (Please, provide the mansucript number!) Table 4 Comparing two approaches for solving minimum 2-1-CDS: adding a single lazy cut versus adding all lazy cuts. IP Opt Single cut All cuts # Lazy Cuts # B&B nodes Time # Lazy Cuts # B&B nodes Time v30 d v30 d v30 d v30 d v30 d v50 d v50 d v50 d v50 d v50 d v50 d v70 d v70 d v70 d v70 d v70 d v70 d v100 d v100 d v100 d , , v100 d , , v100 d v100 d v120 d v120 d v120 d , , v120 d , , v120 d v120 d v150 d , , v150 d , , v150 d , , v150 d , , v150 d v150 d v200 d , , v200 d , ,328, v200 d ,296, , v200 d , , v200 d v200 d IEEE IEEE IEEE RTS , IEEE IEEE

9 Article submitted to INFORMS Journal on Computing; manuscript no. (Please, provide the mansucript number!) 9 Table 5 A comparison of running times for minimum k-total dominating set and minimum k-k-cds. Blank entries denote that the instance is infeasible. 1TDS 1-1-CDS 2TDS 2-2-CDS 3TDS 3-3-CDS 4TDS 4-4-CDS Graph Opt Time Opt Time Opt Time Opt Time Opt Time Opt Time Opt Time Opt Time v30 d v30 d v30 d v30 d v30 d v50 d v50 d v50 d v50 d v50 d v50 d v70 d v70 d v70 d v70 d v70 d v70 d v100 d v100 d v100 d v100 d v100 d v100 d v120 d v120 d v120 d v120 d v120 d v120 d v150 d v150 d v150 d v150 d v150 d v150 d v200 d v200 d , , , , , , v200 d , , , , v200 d , , , , v200 d , , v200 d

Chapter 12. Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks

Chapter 12. Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks Chapter 12 Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks 1 Outline CR network (CRN) properties Mathematical models at multiple layers Case study 2 Traditional Radio vs CR Traditional

More information

The Wireless Network Jamming Problem Subject to Protocol Interference

The Wireless Network Jamming Problem Subject to Protocol Interference The Wireless Network Jamming Problem Subject to Protocol Interference Author information blinded December 22, 2014 Abstract We study the following problem in wireless network security: Which jamming device

More information

A Memory-Efficient Method for Fast Computation of Short 15-Puzzle Solutions

A Memory-Efficient Method for Fast Computation of Short 15-Puzzle Solutions A Memory-Efficient Method for Fast Computation of Short 15-Puzzle Solutions Ian Parberry Technical Report LARC-2014-02 Laboratory for Recreational Computing Department of Computer Science & Engineering

More information

A new mixed integer linear programming formulation for one problem of exploration of online social networks

A new mixed integer linear programming formulation for one problem of exploration of online social networks manuscript No. (will be inserted by the editor) A new mixed integer linear programming formulation for one problem of exploration of online social networks Aleksandra Petrović Received: date / Accepted:

More information

Decoding Turbo Codes and LDPC Codes via Linear Programming

Decoding Turbo Codes and LDPC Codes via Linear Programming Decoding Turbo Codes and LDPC Codes via Linear Programming Jon Feldman David Karger jonfeld@theorylcsmitedu karger@theorylcsmitedu MIT LCS Martin Wainwright martinw@eecsberkeleyedu UC Berkeley MIT LCS

More information

Two-stage column generation and applications in container terminal management

Two-stage column generation and applications in container terminal management Two-stage column generation and applications in container terminal management Ilaria Vacca Matteo Salani Michel Bierlaire Transport and Mobility Laboratory EPFL 8th Swiss Transport Research Conference

More information

A GRASP HEURISTIC FOR THE COOPERATIVE COMMUNICATION PROBLEM IN AD HOC NETWORKS

A GRASP HEURISTIC FOR THE COOPERATIVE COMMUNICATION PROBLEM IN AD HOC NETWORKS A GRASP HEURISTIC FOR THE COOPERATIVE COMMUNICATION PROBLEM IN AD HOC NETWORKS C. COMMANDER, C.A.S. OLIVEIRA, P.M. PARDALOS, AND M.G.C. RESENDE ABSTRACT. Ad hoc networks are composed of a set of wireless

More information

Branch-and-cut for a real-life highly constrained soccer tournament scheduling problem

Branch-and-cut for a real-life highly constrained soccer tournament scheduling problem Branch-and-cut for a real-life highly constrained soccer tournament scheduling problem Guillermo Durán 1, Thiago F. Noronha 2, Celso C. Ribeiro 3, Sebastián Souyris 1, and Andrés Weintraub 1 1 Department

More information

Column Generation. A short Introduction. Martin Riedler. AC Retreat

Column Generation. A short Introduction. Martin Riedler. AC Retreat Column Generation A short Introduction Martin Riedler AC Retreat Contents 1 Introduction 2 Motivation 3 Further Notes MR Column Generation June 29 July 1 2 / 13 Basic Idea We already heard about Cutting

More information

MULTI-STAGE TRANSMISSION EXPANSION PLANNING CONSIDERING MULTIPLE DISPATCHES AND CONTINGENCY CRITERION

MULTI-STAGE TRANSMISSION EXPANSION PLANNING CONSIDERING MULTIPLE DISPATCHES AND CONTINGENCY CRITERION MULTI-STAGE TRANSMISSION EXPANSION PLANNING CONSIDERING MULTIPLE DISPATCHES AND CONTINGENCY CRITERION GERSON C. OLIVEIRA, SILVIO BINATO, MARIO V. PEREIRA, LUIZ M. THOMÉ PSR CONSULTORIA LTDA R. VOLUNTARIOS

More information

From Shared Memory to Message Passing

From Shared Memory to Message Passing From Shared Memory to Message Passing Stefan Schmid T-Labs / TU Berlin Some parts of the lecture, parts of the Skript and exercises will be based on the lectures of Prof. Roger Wattenhofer at ETH Zurich

More information

Computational aspects of two-player zero-sum games Course notes for Computational Game Theory Section 3 Fall 2010

Computational aspects of two-player zero-sum games Course notes for Computational Game Theory Section 3 Fall 2010 Computational aspects of two-player zero-sum games Course notes for Computational Game Theory Section 3 Fall 21 Peter Bro Miltersen November 1, 21 Version 1.3 3 Extensive form games (Game Trees, Kuhn Trees)

More information

A GRASP heuristic for the Cooperative Communication Problem in Ad Hoc Networks

A GRASP heuristic for the Cooperative Communication Problem in Ad Hoc Networks MIC2005: The Sixth Metaheuristics International Conference??-1 A GRASP heuristic for the Cooperative Communication Problem in Ad Hoc Networks Clayton Commander Carlos A.S. Oliveira Panos M. Pardalos Mauricio

More information

Finding First and Most-Beautiful Queens by Integer Programming

Finding First and Most-Beautiful Queens by Integer Programming Finding First and Most-Beautiful Queens by Integer Programming Matteo Fischetti a,, Domenico Salvagnin a a DEI, University of Padova, Italy Abstract The n-queens puzzle is a well-known combinatorial problem

More information

Analysis of Power Assignment in Radio Networks with Two Power Levels

Analysis of Power Assignment in Radio Networks with Two Power Levels Analysis of Power Assignment in Radio Networks with Two Power Levels Miguel Fiandor Gutierrez & Manuel Macías Córdoba Abstract. In this paper we analyze the Power Assignment in Radio Networks with Two

More information

An efficient and robust approach to generate high quality solutions for the Traveling Tournament Problem

An efficient and robust approach to generate high quality solutions for the Traveling Tournament Problem An efficient and robust approach to generate high quality solutions for the Traveling Tournament Problem Douglas Moody, Graham Kendall and Amotz Bar-Noy City University of New York Graduate Center and

More information

An applied optimization based method for line planning to minimize travel time

An applied optimization based method for line planning to minimize travel time Downloaded from orbit.dtu.dk on: Dec 15, 2017 An applied optimization based method for line planning to minimize travel time Bull, Simon Henry; Rezanova, Natalia Jurjevna; Lusby, Richard Martin ; Larsen,

More information

Common Mistakes. Quick sort. Only choosing one pivot per iteration. At each iteration, one pivot per sublist should be chosen.

Common Mistakes. Quick sort. Only choosing one pivot per iteration. At each iteration, one pivot per sublist should be chosen. Common Mistakes Examples of typical mistakes Correct version Quick sort Only choosing one pivot per iteration. At each iteration, one pivot per sublist should be chosen. e.g. Use a quick sort to sort the

More information

Complete and Incomplete Algorithms for the Queen Graph Coloring Problem

Complete and Incomplete Algorithms for the Queen Graph Coloring Problem Complete and Incomplete Algorithms for the Queen Graph Coloring Problem Michel Vasquez and Djamal Habet 1 Abstract. The queen graph coloring problem consists in covering a n n chessboard with n queens,

More information

Computing Explanations for the Unary Resource Constraint

Computing Explanations for the Unary Resource Constraint Computing Explanations for the Unary Resource Constraint Petr Vilím Charles University Faculty of Mathematics and Physics Malostranské náměstí 2/25, Praha 1, Czech Republic vilim@kti.mff.cuni.cz Abstract.

More information

Optimization of On-line Appointment Scheduling

Optimization of On-line Appointment Scheduling Optimization of On-line Appointment Scheduling Brian Denton Edward P. Fitts Department of Industrial and Systems Engineering North Carolina State University Tsinghua University, Beijing, China May, 2012

More information

An improved strategy for solving Sudoku by sparse optimization methods

An improved strategy for solving Sudoku by sparse optimization methods An improved strategy for solving Sudoku by sparse optimization methods Yuchao Tang, Zhenggang Wu 2, Chuanxi Zhu. Department of Mathematics, Nanchang University, Nanchang 33003, P.R. China 2. School of

More information

Localization (Position Estimation) Problem in WSN

Localization (Position Estimation) Problem in WSN Localization (Position Estimation) Problem in WSN [1] Convex Position Estimation in Wireless Sensor Networks by L. Doherty, K.S.J. Pister, and L.E. Ghaoui [2] Semidefinite Programming for Ad Hoc Wireless

More information

Design of Parallel Algorithms. Communication Algorithms

Design of Parallel Algorithms. Communication Algorithms + Design of Parallel Algorithms Communication Algorithms + Topic Overview n One-to-All Broadcast and All-to-One Reduction n All-to-All Broadcast and Reduction n All-Reduce and Prefix-Sum Operations n Scatter

More information

Using hybrid optimization algorithms for very-large graph problems and for small real-time problems

Using hybrid optimization algorithms for very-large graph problems and for small real-time problems Using hybrid optimization algorithms for very-large graph problems and for small real-time problems Karla Hoffman George Mason University Joint work with: Brian Smith, Tony Coudert, Rudy Sultana and James

More information

ADC Bit Optimization for Spectrum- and Energy-Efficient Millimeter Wave Communications

ADC Bit Optimization for Spectrum- and Energy-Efficient Millimeter Wave Communications ADC Bit Optimization for Spectrum- and Energy-Efficient Millimeter Wave Communications Jinseok Choi, Junmo Sung, Brian Evans, and Alan Gatherer* Electrical and Computer Engineering, The University of Texas

More information

A TREE-SEARCH BASED HEURISTIC FOR A COMPLEX STACKING PROBLEM WITH CONTINUOUS PRODUCTION AND RETRIEVAL

A TREE-SEARCH BASED HEURISTIC FOR A COMPLEX STACKING PROBLEM WITH CONTINUOUS PRODUCTION AND RETRIEVAL A TREE-SEARCH BASED HEURISTIC FOR A COMPLEX STACKING PROBLEM WITH CONTINUOUS PRODUCTION AND RETRIEVAL Sebastian Raggl (a), Beham Andreas (b), Fabien Tricoire (c), Michael Affenzeller (d) (a,b,d) Heuristic

More information

Transportation Timetabling

Transportation Timetabling Outline DM87 SCHEDULING, TIMETABLING AND ROUTING 1. Sports Timetabling Lecture 16 Transportation Timetabling Marco Chiarandini 2. Transportation Timetabling Tanker Scheduling Air Transport Train Timetabling

More information

Automated Antenna Positioning for Wireless Networks

Automated Antenna Positioning for Wireless Networks Automated Antenna Positioning for Wireless Networks Amit Dvir, Yehuda Ben-Shimol, Yoav Ben-Yehezkel, Michael Segal Department of Communication Systems Engineering, Ben Gurion University, Israel Boaz Ben-Moshe

More information

Gateways Placement in Backbone Wireless Mesh Networks

Gateways Placement in Backbone Wireless Mesh Networks I. J. Communications, Network and System Sciences, 2009, 1, 1-89 Published Online February 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Gateways Placement in Backbone Wireless Mesh Networks Abstract

More information

An Illustrated Guide To Linear Programming By Dr. Saul I. Gass

An Illustrated Guide To Linear Programming By Dr. Saul I. Gass An Illustrated Guide To Linear Programming By Dr. Saul I. Gass An Illustrated Guide to Linear Programming has 25 ratings and 4 reviews. James said: An Illustrated Guide to Linear Programming is a bare-bones

More information

Edge-disjoint tree representation of three tree degree sequences

Edge-disjoint tree representation of three tree degree sequences Edge-disjoint tree representation of three tree degree sequences Ian Min Gyu Seong Carleton College seongi@carleton.edu October 2, 208 Ian Min Gyu Seong (Carleton College) Trees October 2, 208 / 65 Trees

More information

arxiv: v1 [cs.dm] 2 Jul 2018

arxiv: v1 [cs.dm] 2 Jul 2018 A SAT Encoding for the n-fractions Problem Michael Codish Department of Computer Science, Ben-Gurion University of the Negev, Israel arxiv:1807.00507v1 [cs.dm] 2 Jul 2018 Abstract. This note describes

More information

COMP Online Algorithms. Paging and k-server Problem. Shahin Kamali. Lecture 11 - Oct. 11, 2018 University of Manitoba

COMP Online Algorithms. Paging and k-server Problem. Shahin Kamali. Lecture 11 - Oct. 11, 2018 University of Manitoba COMP 7720 - Online Algorithms Paging and k-server Problem Shahin Kamali Lecture 11 - Oct. 11, 2018 University of Manitoba COMP 7720 - Online Algorithms Paging and k-server Problem 1 / 19 Review & Plan

More information

Stanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011

Stanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011 Stanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011 Lecture 9 In which we introduce the maximum flow problem. 1 Flows in Networks Today we start talking about the Maximum Flow

More information

Aircraft routing for on-demand air transportation with service upgrade and maintenance events: compact model and case study

Aircraft routing for on-demand air transportation with service upgrade and maintenance events: compact model and case study Aircraft routing for on-demand air transportation with service upgrade and maintenance events: compact model and case study Pedro Munari, Aldair Alvarez Production Engineering Department, Federal University

More information

Adverserial Search Chapter 5 minmax algorithm alpha-beta pruning TDDC17. Problems. Why Board Games?

Adverserial Search Chapter 5 minmax algorithm alpha-beta pruning TDDC17. Problems. Why Board Games? TDDC17 Seminar 4 Adversarial Search Constraint Satisfaction Problems Adverserial Search Chapter 5 minmax algorithm alpha-beta pruning 1 Why Board Games? 2 Problems Board games are one of the oldest branches

More information

A Message Scheduling Scheme for All-to-all Personalized Communication on Ethernet Switched Clusters

A Message Scheduling Scheme for All-to-all Personalized Communication on Ethernet Switched Clusters A Message Scheduling Scheme for All-to-all Personalized Communication on Ethernet Switched Clusters Ahmad Faraj Xin Yuan Pitch Patarasuk Department of Computer Science, Florida State University Tallahassee,

More information

A Static Pattern-Independent Technique for Power Grid Voltage Integrity Verification

A Static Pattern-Independent Technique for Power Grid Voltage Integrity Verification A Static Pattern-Independent Technique for Power Grid Voltage Integrity Verification 8.2 Dionysios Kouroussis Department of ECE University of Toronto Toronto, Ontario, Canada diony@eecg.utoronto.ca Farid

More information

06M1 Lecture Frequency Assignment for GSM Mobile Phone Systems

06M1 Lecture Frequency Assignment for GSM Mobile Phone Systems 06M1 Lecture Frequency Assignment for GSM Mobile Phone Systems Martin Grötschel Block Course at TU Berlin "Combinatorial Optimization at Work October 4 15, 2005 Martin Grötschel groetschel@zib.de Institut

More information

Parallel Partition and Extension:

Parallel Partition and Extension: Parallel Partition and Extension: Better Permutation Arrays for Hamming Distances Sergey Bereg, Luis Gerardo Mojica, Linda Morales and Hal Sudborough Department of Computer Science, University of Texas

More information

Yield-driven Robust Iterative Circuit Optimization

Yield-driven Robust Iterative Circuit Optimization Yield-driven Robust Iterative Circuit Optimization Yan Li, Vladimir Stojanovic July 29, 2009 Integrated System Group Massachusetts Institute of Technology Systems-on-chip is difficult to design Integrated

More information

CSE 473 Midterm Exam Feb 8, 2018

CSE 473 Midterm Exam Feb 8, 2018 CSE 473 Midterm Exam Feb 8, 2018 Name: This exam is take home and is due on Wed Feb 14 at 1:30 pm. You can submit it online (see the message board for instructions) or hand it in at the beginning of class.

More information

Optimal Multicast Routing in Ad Hoc Networks

Optimal Multicast Routing in Ad Hoc Networks Mat-2.108 Independent esearch Projects in Applied Mathematics Optimal Multicast outing in Ad Hoc Networks Juha Leino 47032J Juha.Leino@hut.fi 1st December 2002 Contents 1 Introduction 2 2 Optimal Multicasting

More information

THE WIRELESS NETWORK JAMMING PROBLEM

THE WIRELESS NETWORK JAMMING PROBLEM THE WIRELESS NETWORK JAMMING PROBLEM CLAYTON W. COMMANDER, PANOS M. PARDALOS, VALERIY RYABCHENKO, STAN URYASEV, AND GRIGORIY ZRAZHEVSKY ABSTRACT. In adversarial environments, disabling the communication

More information

Annual Conference of the IEEE Industrial Electronics Society - IECON(39.,2013, Vienna, Áustria

Annual Conference of the IEEE Industrial Electronics Society - IECON(39.,2013, Vienna, Áustria Universidade de São Paulo Biblioteca Digital da Produção Intelectual - BDPI Departamento de Engenharia Elétrica - EESC/SEL Comunicações em Eventos - EESC/SEL 2013-11 Combining subpopulation tables, nondominated

More information

VEHICLE LICENSE PLATE DETECTION ALGORITHM BASED ON STATISTICAL CHARACTERISTICS IN HSI COLOR MODEL

VEHICLE LICENSE PLATE DETECTION ALGORITHM BASED ON STATISTICAL CHARACTERISTICS IN HSI COLOR MODEL VEHICLE LICENSE PLATE DETECTION ALGORITHM BASED ON STATISTICAL CHARACTERISTICS IN HSI COLOR MODEL Instructor : Dr. K. R. Rao Presented by: Prasanna Venkatesh Palani (1000660520) prasannaven.palani@mavs.uta.edu

More information

SOLITAIRE CLOBBER AS AN OPTIMIZATION PROBLEM ON WORDS

SOLITAIRE CLOBBER AS AN OPTIMIZATION PROBLEM ON WORDS INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 8 (2008), #G04 SOLITAIRE CLOBBER AS AN OPTIMIZATION PROBLEM ON WORDS Vincent D. Blondel Department of Mathematical Engineering, Université catholique

More information

and 6.855J. Network Simplex Animations

and 6.855J. Network Simplex Animations .8 and 6.8J Network Simplex Animations Calculating A Spanning Tree Flow -6 7 6 - A tree with supplies and demands. (Assume that all other arcs have a flow of ) What is the flow in arc (,)? Calculating

More information

Network Flow Based Datapath Bit Slicing

Network Flow Based Datapath Bit Slicing Network Flow Based Bit licing Hua Xiang Minsik Cho Haoxing Ren Matthew Ziegler Ruchir Puri 03/27/2013 Introduction s are composed of bit slices What are bit slices? For ideal datapath, each bit should

More information

CS 171, Intro to A.I. Midterm Exam Fall Quarter, 2016

CS 171, Intro to A.I. Midterm Exam Fall Quarter, 2016 CS 171, Intro to A.I. Midterm Exam all Quarter, 2016 YOUR NAME: YOUR ID: ROW: SEAT: The exam will begin on the next page. Please, do not turn the page until told. When you are told to begin the exam, please

More information

Physical Synthesis of Bus Matrix for High Bandwidth Low Power On-chip Communications

Physical Synthesis of Bus Matrix for High Bandwidth Low Power On-chip Communications Physical Synthesis of Bus Matrix for High Bandwidth Low Power On-chip Communications Renshen Wang 1, Evangeline Young 2, Ronald Graham 1 and Chung-Kuan Cheng 1 1 University of California San Diego 2 The

More information

Towards Real-Time Volunteer Distributed Computing

Towards Real-Time Volunteer Distributed Computing Towards Real-Time Volunteer Distributed Computing Sangho Yi 1, Emmanuel Jeannot 2, Derrick Kondo 1, David P. Anderson 3 1 INRIA MESCAL, 2 RUNTIME, France 3 UC Berkeley, USA Motivation Push towards large-scale,

More information

Diffusion of Networking Technologies

Diffusion of Networking Technologies Diffusion of Networking Technologies ISP Bellairs Workshop on Algorithmic Game Theory Barbados April 2012 Sharon Goldberg Boston University Princeton University Zhenming Liu Harvard University Diffusion

More information

Lectures: Feb 27 + Mar 1 + Mar 3, 2017

Lectures: Feb 27 + Mar 1 + Mar 3, 2017 CS420+500: Advanced Algorithm Design and Analysis Lectures: Feb 27 + Mar 1 + Mar 3, 2017 Prof. Will Evans Scribe: Adrian She In this lecture we: Summarized how linear programs can be used to model zero-sum

More information

Solution of the Airline ToD Problem using Severely Limited Subsequence

Solution of the Airline ToD Problem using Severely Limited Subsequence Solution of the Airline ToD Problem using Severely Limited Subsequence James Priestley Department of Engineering Science University of Auckland New Zealand j.priestley@aucland.ac.nz Abstract The minimum-cost

More information

CSC384 Introduction to Artificial Intelligence : Heuristic Search

CSC384 Introduction to Artificial Intelligence : Heuristic Search CSC384 Introduction to Artificial Intelligence : Heuristic Search September 18, 2014 September 18, 2014 1 / 12 Heuristic Search (A ) Primary concerns in heuristic search: Completeness Optimality Time complexity

More information

Dimension Recognition and Geometry Reconstruction in Vectorization of Engineering Drawings

Dimension Recognition and Geometry Reconstruction in Vectorization of Engineering Drawings Dimension Recognition and Geometry Reconstruction in Vectorization of Engineering Drawings Feng Su 1, Jiqiang Song 1, Chiew-Lan Tai 2, and Shijie Cai 1 1 State Key Laboratory for Novel Software Technology,

More information

Connected Identifying Codes

Connected Identifying Codes Connected Identifying Codes Niloofar Fazlollahi, David Starobinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering Boston University, Boston, MA 02215 Email: {nfazl,staro,trachten}@bu.edu

More information

FOUR TOTAL TRANSFER CAPABILITY. 4.1 Total transfer capability CHAPTER

FOUR TOTAL TRANSFER CAPABILITY. 4.1 Total transfer capability CHAPTER CHAPTER FOUR TOTAL TRANSFER CAPABILITY R structuring of power system aims at involving the private power producers in the system to supply power. The restructured electric power industry is characterized

More information

Using Nested Column Generation & Generic Programming to solve Staff Scheduling Problems:

Using Nested Column Generation & Generic Programming to solve Staff Scheduling Problems: Using Nested Column Generation & Generic Programming to solve Staff Scheduling Problems: Using Compile-time Customisation to create a Flexible C++ Engine for Staff Rostering Andrew Mason & Ed Bulog Department

More information

Comparing BFS, Genetic Algorithms, and the Arc-Constancy 3 Algorithm to solve N Queens and Cross Math

Comparing BFS, Genetic Algorithms, and the Arc-Constancy 3 Algorithm to solve N Queens and Cross Math Comparing BFS, Genetic Algorithms, and the Arc-Constancy 3 Algorithm to solve N Queens and Cross Math Peter Irvine College of Science And Engineering University of Minnesota Minneapolis, Minnesota 55455

More information

CCO Commun. Comb. Optim.

CCO Commun. Comb. Optim. Communications in Combinatorics and Optimization Vol. 2 No. 2, 2017 pp.149-159 DOI: 10.22049/CCO.2017.25918.1055 CCO Commun. Comb. Optim. Graceful labelings of the generalized Petersen graphs Zehui Shao

More information

Eric J. Nava Department of Civil Engineering and Engineering Mechanics, University of Arizona,

Eric J. Nava Department of Civil Engineering and Engineering Mechanics, University of Arizona, A Temporal Domain Decomposition Algorithmic Scheme for Efficient Mega-Scale Dynamic Traffic Assignment An Experience with Southern California Associations of Government (SCAG) DTA Model Yi-Chang Chiu 1

More information

10/5/2015. Constraint Satisfaction Problems. Example: Cryptarithmetic. Example: Map-coloring. Example: Map-coloring. Constraint Satisfaction Problems

10/5/2015. Constraint Satisfaction Problems. Example: Cryptarithmetic. Example: Map-coloring. Example: Map-coloring. Constraint Satisfaction Problems 0/5/05 Constraint Satisfaction Problems Constraint Satisfaction Problems AIMA: Chapter 6 A CSP consists of: Finite set of X, X,, X n Nonempty domain of possible values for each variable D, D, D n where

More information

Harold Benson American Economic Institutions Professor of Information Systems and Operations Management

Harold Benson American Economic Institutions Professor of Information Systems and Operations Management Harold Benson American Economic Institutions Professor of Information Systems and Operations Management Biography Interests: Global optimization, Multiple criteria decision making, Management science,

More information

Algorithm Performance For Chessboard Separation Problems

Algorithm Performance For Chessboard Separation Problems Algorithm Performance For Chessboard Separation Problems R. Douglas Chatham Maureen Doyle John J. Miller Amber M. Rogers R. Duane Skaggs Jeffrey A. Ward April 23, 2008 Abstract Chessboard separation problems

More information

Locally Informed Global Search for Sums of Combinatorial Games

Locally Informed Global Search for Sums of Combinatorial Games Locally Informed Global Search for Sums of Combinatorial Games Martin Müller and Zhichao Li Department of Computing Science, University of Alberta Edmonton, Canada T6G 2E8 mmueller@cs.ualberta.ca, zhichao@ualberta.ca

More information

Free Cell Solver. Copyright 2001 Kevin Atkinson Shari Holstege December 11, 2001

Free Cell Solver. Copyright 2001 Kevin Atkinson Shari Holstege December 11, 2001 Free Cell Solver Copyright 2001 Kevin Atkinson Shari Holstege December 11, 2001 Abstract We created an agent that plays the Free Cell version of Solitaire by searching through the space of possible sequences

More information

Survey of VLSI Adders

Survey of VLSI Adders Survey of VLSI Adders Swathy.S 1, Vivin.S 2, Sofia Jenifer.S 3, Sinduja.K 3 1UG Scholar, Dept. of Electronics and Communication Engineering, SNS College of Technology, Coimbatore- 641035, Tamil Nadu, India

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 4, APRIL

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 4, APRIL IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 4, APRIL 2011 1911 Fading Multiple Access Relay Channels: Achievable Rates Opportunistic Scheduling Lalitha Sankar, Member, IEEE, Yingbin Liang, Member,

More information

Towards Ultra Rapid Restarts

Towards Ultra Rapid Restarts Towards Ultra Rapid Restarts Shai Haim 1 and Marijn Heule 2 1 University of New South Wales and NICTA, Sydney, Australia 2 Delft University of Technology, Delft, The Netherlands Abstract. We observe a

More information

Control of the Contract of a Public Transport Service

Control of the Contract of a Public Transport Service Control of the Contract of a Public Transport Service Andrea Lodi, Enrico Malaguti, Nicolás E. Stier-Moses Tommaso Bonino DEIS, University of Bologna Graduate School of Business, Columbia University SRM

More information

Permutation Tableaux and the Dashed Permutation Pattern 32 1

Permutation Tableaux and the Dashed Permutation Pattern 32 1 Permutation Tableaux and the Dashed Permutation Pattern William Y.C. Chen, Lewis H. Liu, Center for Combinatorics, LPMC-TJKLC Nankai University, Tianjin 7, P.R. China chen@nankai.edu.cn, lewis@cfc.nankai.edu.cn

More information

Alexandre Fréchette, Neil Newman, Kevin Leyton-Brown

Alexandre Fréchette, Neil Newman, Kevin Leyton-Brown Solving the Station Repacking Problem Alexandre Fréchette, Neil Newman, Kevin Leyton-Brown Agenda Background Problem Novel Approach Experimental Results Background A Brief History Spectrum rights have

More information

Generalized Game Trees

Generalized Game Trees Generalized Game Trees Richard E. Korf Computer Science Department University of California, Los Angeles Los Angeles, Ca. 90024 Abstract We consider two generalizations of the standard two-player game

More information

CITS2211 Discrete Structures Turing Machines

CITS2211 Discrete Structures Turing Machines CITS2211 Discrete Structures Turing Machines October 23, 2017 Highlights We have seen that FSMs and PDAs are surprisingly powerful But there are some languages they can not recognise We will study a new

More information

On the Combination of Constraint Programming and Stochastic Search: The Sudoku Case

On the Combination of Constraint Programming and Stochastic Search: The Sudoku Case On the Combination of Constraint Programming and Stochastic Search: The Sudoku Case Rhydian Lewis Cardiff Business School Pryfysgol Caerdydd/ Cardiff University lewisr@cf.ac.uk Talk Plan Introduction:

More information

Traffic Grooming for WDM Rings with Dynamic Traffic

Traffic Grooming for WDM Rings with Dynamic Traffic 1 Traffic Grooming for WDM Rings with Dynamic Traffic Chenming Zhao J.Q. Hu Department of Manufacturing Engineering Boston University 15 St. Mary s Street Brookline, MA 02446 Abstract We study the problem

More information

Cross-layer Wireless Networking:

Cross-layer Wireless Networking: Cross-layer Wireless Networking: Complexity, Approximation, and Opportunities for SP Research Nikos Sidiropoulos Dept. ECE, TU Crete IEEE SPAWC, 23/6/21 Nikos Sidiropoulos (Dept. ECE, TU Crete) Cross-layer

More information

Algorithms for Data Structures: Search for Games. Phillip Smith 27/11/13

Algorithms for Data Structures: Search for Games. Phillip Smith 27/11/13 Algorithms for Data Structures: Search for Games Phillip Smith 27/11/13 Search for Games Following this lecture you should be able to: Understand the search process in games How an AI decides on the best

More information

CS510 \ Lecture Ariel Stolerman

CS510 \ Lecture Ariel Stolerman CS510 \ Lecture04 2012-10-15 1 Ariel Stolerman Administration Assignment 2: just a programming assignment. Midterm: posted by next week (5), will cover: o Lectures o Readings A midterm review sheet will

More information

Multicast beamforming and admission control for UMTS-LTE and e

Multicast beamforming and admission control for UMTS-LTE and e Multicast beamforming and admission control for UMTS-LTE and 802.16e N. D. Sidiropoulos Dept. ECE & TSI TU Crete - Greece 1 Parts of the talk Part I: QoS + max-min fair multicast beamforming Part II: Joint

More information

Sudoku Solvers. A Different Approach. DD143X Degree Project in Computer Science, First Level CSC KTH. Supervisor: Michael Minock

Sudoku Solvers. A Different Approach. DD143X Degree Project in Computer Science, First Level CSC KTH. Supervisor: Michael Minock Sudoku Solvers A Different Approach DD143X Degree Project in Computer Science, First Level CSC KTH Supervisor: Michael Minock Christoffer Nilsson Professorsslingan 10 114 17 Stockholm Tel: 073-097 87 24

More information

Neighborhood based heuristics for a Two-level Hierarchical Location Problem with modular node capacities

Neighborhood based heuristics for a Two-level Hierarchical Location Problem with modular node capacities Neighborhood based heuristics for a Two-level Hierarchical Location Problem with modular node capacities Bernardetta Addis, Giuliana Carello Alberto Ceselli Dipartimento di Elettronica e Informazione,

More information

Decision Mathematics D1 Advanced/Advanced Subsidiary. Friday 17 May 2013 Morning Time: 1 hour 30 minutes

Decision Mathematics D1 Advanced/Advanced Subsidiary. Friday 17 May 2013 Morning Time: 1 hour 30 minutes Paper Reference(s) 6689/01R Edexcel GCE Decision Mathematics D1 Advanced/Advanced Subsidiary Friday 17 May 2013 Morning Time: 1 hour 30 minutes Materials required for examination Nil Items included with

More information

The Path Restoration Version of the Spare Capacity Allocation Problem with Modularity Restrictions: Models, Algorithms, and an Empirical Analysis

The Path Restoration Version of the Spare Capacity Allocation Problem with Modularity Restrictions: Models, Algorithms, and an Empirical Analysis The Path Restoration Version of the Spare Capacity Allocation Problem with Modularity Restrictions: Models, Algorithms, and an Empirical Analysis Jeffery L. Kennington Mark W. Lewis Department of Computer

More information

Section Marks Agents / 8. Search / 10. Games / 13. Logic / 15. Total / 46

Section Marks Agents / 8. Search / 10. Games / 13. Logic / 15. Total / 46 Name: CS 331 Midterm Spring 2017 You have 50 minutes to complete this midterm. You are only allowed to use your textbook, your notes, your assignments and solutions to those assignments during this midterm.

More information

Game Theory and Randomized Algorithms

Game Theory and Randomized Algorithms Game Theory and Randomized Algorithms Guy Aridor Game theory is a set of tools that allow us to understand how decisionmakers interact with each other. It has practical applications in economics, international

More information

Energy Efficient Scheduling Techniques For Real-Time Embedded Systems

Energy Efficient Scheduling Techniques For Real-Time Embedded Systems Energy Efficient Scheduling Techniques For Real-Time Embedded Systems Rabi Mahapatra & Wei Zhao This work was done by Rajesh Prathipati as part of his MS Thesis here. The work has been update by Subrata

More information

Minimization of Dynamic and Static Power Through Joint Assignment of Threshold Voltages and Sizing Optimization

Minimization of Dynamic and Static Power Through Joint Assignment of Threshold Voltages and Sizing Optimization Minimization of Dynamic and Static Power Through Joint Assignment of Threshold Voltages and Sizing Optimization David Nguyen, Abhijit Davare, Michael Orshansky, David Chinnery, Brandon Thompson, and Kurt

More information

Dummy Fill as a Reduction to Chip-Firing

Dummy Fill as a Reduction to Chip-Firing Dummy Fill as a Reduction to Chip-Firing Robert Ellis CSE 291: Heuristics and VLSI Design (Andrew Kahng) Preliminary Project Report November 27, 2001 1 Introduction 1.1 Chip-firing games Chip-firing games

More information

On Range of Skill. Thomas Dueholm Hansen and Peter Bro Miltersen and Troels Bjerre Sørensen Department of Computer Science University of Aarhus

On Range of Skill. Thomas Dueholm Hansen and Peter Bro Miltersen and Troels Bjerre Sørensen Department of Computer Science University of Aarhus On Range of Skill Thomas Dueholm Hansen and Peter Bro Miltersen and Troels Bjerre Sørensen Department of Computer Science University of Aarhus Abstract At AAAI 07, Zinkevich, Bowling and Burch introduced

More information

22c:145 Artificial Intelligence

22c:145 Artificial Intelligence 22c:145 Artificial Intelligence Fall 2005 Informed Search and Exploration II Cesare Tinelli The University of Iowa Copyright 2001-05 Cesare Tinelli and Hantao Zhang. a a These notes are copyrighted material

More information

Inverse Shortest Path Algorithms in Protected UMTS Access Networks

Inverse Shortest Path Algorithms in Protected UMTS Access Networks Inverse Shortest Path lgorithms in Protected UMTS ccess Networks István Gódor, Jás Harmatos and lpár Jüttner Ericsson esearch, Traffic nalysis and Network Performance Laboratory, PO 07, H-300 udapest,

More information

Signal Recovery from Random Measurements

Signal Recovery from Random Measurements Signal Recovery from Random Measurements Joel A. Tropp Anna C. Gilbert {jtropp annacg}@umich.edu Department of Mathematics The University of Michigan 1 The Signal Recovery Problem Let s be an m-sparse

More information

Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks

Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks 1 Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks Anand Prabhu Subramanian, Himanshu Gupta, and Samir R. Das {anandps, hgupta, samir}@cs.sunysb.edu Stony Brook University,

More information

Coordinated Scheduling and Power Control in Cloud-Radio Access Networks

Coordinated Scheduling and Power Control in Cloud-Radio Access Networks Coordinated Scheduling and Power Control in Cloud-Radio Access Networks Item Type Article Authors Douik, Ahmed; Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim Citation Coordinated Scheduling

More information

W-CDMA network design. Joakim Kalvenes. Jeffery Kennington and Eli V. Olinick

W-CDMA network design. Joakim Kalvenes. Jeffery Kennington and Eli V. Olinick Int. J. Mobile Network Design and Innovation, Vol. X, No. Y, XXXX 1 W-CDMA network design Qibin Cai* Verizon Business, Network Engineering Systems, Richardson, TX, USA E-mail: kevin.cai@verizonbusiness.com

More information

Optimal Coded Information Network Design and Management via Improved Characterizations of the Binary Entropy Function

Optimal Coded Information Network Design and Management via Improved Characterizations of the Binary Entropy Function Optimal Coded Information Network Design and Management via Improved Characterizations of the Binary Entropy Function John MacLaren Walsh & Steven Weber Department of Electrical and Computer Engineering

More information