4,311 research outputs found
Planning of vehicle routing with backup provisioning using wireless sensor technologies
Wireless sensor technologies can be used by intelligent transportation systems to provide innovative services that lead to improvements in road safety and congestion, increasing end-user satisfaction. In this article, we address vehicle routing with backup provisioning, where the possibility of reacting to overloading/overcrowding of vehicles at certain stops is considered. This is based on the availability of vehicle load information, which can be captured using wireless sensor technologies. After discussing the infrastructure and monitoring tool, the problem is mathematically formalized, and a heuristic algorithm using local search procedures is proposed. Results show that planning routes with backup provisioning can allow fast response to overcrowding while reducing costs. Therefore, sustainable urban mobility, with efficient use of resources, can be provided while increasing the quality of service perceived by users.FCT (Foundation for Science and Technology) from Portugal within CEOT (Center for Electronic, Optoelectronic and Telecommunications); [UID/MULTI/00631/2013
Generating Diophantine Sets by Virus Machines
Virus Machines are a computational paradigm inspired by
the manner in which viruses replicate and transmit from one host cell to
another. This paradigm provides non-deterministic sequential devices.
Non-restricted virus machines are unbounded virus machines, in the
sense that no restriction on the number of hosts, the number of instructions
and the number of viruses contained in any host along any computation
is placed on them. The computational completeness of these
machines has been obtained by simulating register machines. In this
paper, virus machines as set generating devices are considered. Then,
the universality of non-restricted virus machines is proved by showing
that they can compute all diophantine sets, which the MRDP theorem
proves that coincide with the recursively enumerable sets.Ministerio de Economía y Competitividad TIN2012- 3743
Scheduling Packets with Values and Deadlines in Size-bounded Buffers
Motivated by providing quality-of-service differentiated services in the
Internet, we consider buffer management algorithms for network switches. We
study a multi-buffer model. A network switch consists of multiple size-bounded
buffers such that at any time, the number of packets residing in each
individual buffer cannot exceed its capacity. Packets arrive at the network
switch over time; they have values, deadlines, and designated buffers. In each
time step, at most one pending packet is allowed to be sent and this packet can
be from any buffer. The objective is to maximize the total value of the packets
sent by their respective deadlines. A 9.82-competitive online algorithm has
been provided for this model (Azar and Levy. SWAT 2006), but no offline
algorithms have been known yet. In this paper, We study the offline setting of
the multi-buffer model. Our contributions include a few optimal offline
algorithms for some variants of the model. Each variant has its unique and
interesting algorithmic feature. These offline algorithms help us understand
the model better in designing online algorithms.Comment: 7 page
Finding flows in the one-way measurement model
The one-way measurement model is a framework for universal quantum
computation, in which algorithms are partially described by a graph G of
entanglement relations on a collection of qubits. A sufficient condition for an
algorithm to perform a unitary embedding between two Hilbert spaces is for the
graph G, together with input/output vertices I, O \subset V(G), to have a flow
in the sense introduced by Danos and Kashefi [quant-ph/0506062]. For the
special case of |I| = |O|, using a graph-theoretic characterization, I show
that such flows are unique when they exist. This leads to an efficient
algorithm for finding flows, by a reduction to solved problems in graph theory.Comment: 8 pages, 3 figures: somewhat condensed and updated version, to appear
in PR
An influence assessment method based on co-occurrence for topologically reduced big data sets
A Characterization of the Degree Sequences of 2-Trees
A graph G is a 2-tree if G=K_3, or G has a vertex v of degree 2, whose
neighbours are adjacent, and G\v{i}s a 2-tree. A characterization of the degree
sequences of 2-trees is given. This characterization yields a linear-time
algorithm for recognizing and realizing degree sequences of 2-trees.Comment: 17 pages, 5 figure
Algorithmic approach to adiabatic quantum optimization
It is believed that the presence of anticrossings with exponentially small
gaps between the lowest two energy levels of the system Hamiltonian, can render
adiabatic quantum optimization inefficient. Here, we present a simple adiabatic
quantum algorithm designed to eliminate exponentially small gaps caused by
anticrossings between eigenstates that correspond with the local and global
minima of the problem Hamiltonian. In each iteration of the algorithm,
information is gathered about the local minima that are reached after passing
the anticrossing non-adiabatically. This information is then used to penalize
pathways to the corresponding local minima, by adjusting the initial
Hamiltonian. This is repeated for multiple clusters of local minima as needed.
We generate 64-qubit random instances of the maximum independent set problem,
skewed to be extremely hard, with between 10^5 and 10^6 highly-degenerate local
minima. Using quantum Monte Carlo simulations, it is found that the algorithm
can trivially solve all the instances in ~10 iterations.Comment: 7 pages, 3 figure
Parallel Metric Tree Embedding based on an Algebraic View on Moore-Bellman-Ford
A \emph{metric tree embedding} of expected \emph{stretch~}
maps a weighted -node graph to a weighted tree with such that, for all ,
and
. Such embeddings are highly useful for designing
fast approximation algorithms, as many hard problems are easy to solve on tree
instances. However, to date the best parallel -depth algorithm that achieves an asymptotically optimal expected stretch of
requires
work and a metric as input.
In this paper, we show how to achieve the same guarantees using
depth and
work, where and is an arbitrarily small constant.
Moreover, one may further reduce the work to at the expense of increasing the expected stretch to
.
Our main tool in deriving these parallel algorithms is an algebraic
characterization of a generalization of the classic Moore-Bellman-Ford
algorithm. We consider this framework, which subsumes a variety of previous
"Moore-Bellman-Ford-like" algorithms, to be of independent interest and discuss
it in depth. In our tree embedding algorithm, we leverage it for providing
efficient query access to an approximate metric that allows sampling the tree
using depth and work.
We illustrate the generality and versatility of our techniques by various
examples and a number of additional results
Semi-autonomous Intersection Collision Avoidance through Job-shop Scheduling
In this paper, we design a supervisor to prevent vehicle collisions at
intersections. An intersection is modeled as an area containing multiple
conflict points where vehicle paths cross in the future. At every time step,
the supervisor determines whether there will be more than one vehicle in the
vicinity of a conflict point at the same time. If there is, then an impending
collision is detected, and the supervisor overrides the drivers to avoid
collision. A major challenge in the design of a supervisor as opposed to an
autonomous vehicle controller is to verify whether future collisions will occur
based on the current drivers choices. This verification problem is particularly
hard due to the large number of vehicles often involved in intersection
collision, to the multitude of conflict points, and to the vehicles dynamics.
In order to solve the verification problem, we translate the problem to a
job-shop scheduling problem that yields equivalent answers. The job-shop
scheduling problem can, in turn, be transformed into a mixed-integer linear
program when the vehicle dynamics are first-order dynamics, and can thus be
solved by using a commercial solver.Comment: Submitted to Hybrid Systems: Computation and Control (HSCC) 201
Monte Carlo Algorithm for Simulating Reversible Aggregation of Multisite Particles
We present an efficient and exact Monte Carlo algorithm to simulate
reversible aggregation of particles with dedicated binding sites. This method
introduces a novel data structure of dynamic bond tree to record clusters and
sequences of bond formations. The algorithm achieves a constant time cost for
processing cluster association and a cost between and
for processing bond dissociation in clusters with bonds.
The algorithm is statistically exact and can reproduce results obtained by the
standard method. We applied the method to simulate a trivalent ligand and a
bivalent receptor clustering system and obtained an average scaling of
for processing bond dissociation in acyclic
aggregation, compared to a linear scaling with the cluster size in standard
methods. The algorithm also demands substantially less memory than the
conventional method.Comment: 8 pages, 3 figure
- …
