% BibTeX Exporter written in LotusScript by Uwe Brahm, % Please send bug reports via email to . Thanks. % Exported: Wednesday, 29. March 2023, 00:20, Server: domino/MPII/DE @ARTICLE{2006CTW_Propp, AUTHOR = {Doerr, Benjamin and Friedrich, Tobias}, JOURNAL = {Electronic Notes in Discrete Mathematics}, TITLE = {Quasirandomness in Graphs}, ADDRESS = {Amsterdam, The Netherlands}, PUBLISHER = {Elsevier}, VOLUME = {25}, ISBN = {1571-0653}, YEAR = {2006}, PAGES = {61--64}, ABSTRACT = {Jim Propp’s rotor router model is a simple deterministic analogue of a random walk. Instead of distributing chips randomly, it serves the neighbors in a fixed order. We analyze the difference between Propp machine and random walk on the infinite two- dimensional grid. We show that, independent of the starting configuration, at each time, the number of chips on each vertex deviates from the expected number of chips in the random walk model by at most a constant c, which is 7.83 for clockwise rotor sequences and 7.28 otherwise. This is the first paper which demonstrates that the order in which the neighbors are served makes a difference.}, } @INPROCEEDINGS{2011STOC, AUTHOR = {Doerr, Benjamin and Fouz, Mahmoud and Friedrich, Tobias}, TITLE = {Social Networks Spread Rumors in Sublogarithmic Time}, BOOKTITLE = {STOC'11 : Proceedings of the 43rd ACM Symposium on Theory of Computing}, PADDRESS = {New York, NY}, ADDRESS = {San Jose, CA}, PUBLISHER = {ACM}, ISBN = {978-1-4503-0691-1}, DOI = {10.1145/1993636.1993640}, YEAR = {2011}, PAGES = {21--30}, } @ARTICLE{a15-kavitha, AUTHOR = {Kavitha, Telikepalli and Mehlhorn, Kurt and Michail, Dimitrios and Paluch, Katarzyna E.}, JOURNAL = {ACM Transactions on Algorithms}, TITLE = {Strongly stable matchings in time O(nm) and extension to the hospitals-residents problem}, ADDRESS = {New York, NY, USA}, NUMBER = {2}, PUBLISHER = {ACM}, VOLUME = {3}, ISBN = {1549-6325}, DOI = {10.1145/1240233.1240238}, YEAR = {2007}, PAGES = {15.1--15.18}, } @INPROCEEDINGS{Abed2012, AUTHOR = {Abed, Fidaa and Huang, Chien-Chung}, EDITOR = {Epstein, Leah and Ferragina, Paolo}, TITLE = {Preemptive Coordination Mechanisms for Unrelated Machines}, BOOKTITLE = {Algorithms - ESA 2012 : 20th Annual European Symposium}, PADDRESS = {Berlin}, ADDRESS = {Ljubljana, Slovenia}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {7501}, ISBN = {978-3-642-33089-6}, DOI = {10.1007/978-3-642-33090-2_3}, YEAR = {2012}, PAGES = {12--23}, } @ARTICLE{Abraham2007Popular, AUTHOR = {Abraham, David J. and Irving, Robert W. and Kavitha, Telikepalli and Mehlhorn, Kurt}, JOURNAL = {SIAM Journal on Computing}, TITLE = {Popular Matchings}, ADDRESS = {Philadelphia, PA, USA}, NUMBER = {4}, PUBLISHER = {SIAM}, VOLUME = {37}, ISBN = {0097-5397}, DOI = {10.1137/06067328X}, YEAR = {2007}, PAGES = {1030--1045}, } @INPROCEEDINGS{ACMM04, AUTHOR = {Abraham, David and Cechl{\'a}rov{\'a}, Katarina and Manlove, David F. and Mehlhorn, Kurt}, EDITOR = {Fleischer, Rudolf and Trippen, G.}, TITLE = {Pareto-optimality in house allocation problems}, BOOKTITLE = {Algorithms and Computation: 15th International Symposium, ISAAC 2004}, PADDRESS = {Berlin, Germany}, ADDRESS = {Hong Kong, China}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {3341}, ISBN = {3-540-24131-0}, DOI = {10.1007/b104582}, YEAR = {2004}, PAGES = {3--15}, } @INPROCEEDINGS{ACO-P2012, AUTHOR = {Panagiotou, Konstantinos and Coja-Oghlan, Amin}, TITLE = {Catching the k-{NAESAT} Threshold}, BOOKTITLE = {STOC’12 : Proceedings of the 2012 ACM Symposium on Theory of Computing}, PADDRESS = {New York, NY}, ADDRESS = {New York, NY}, PUBLISHER = {ACM}, ISBN = {978-1-4503-1245-5}, DOI = {10.1145/2213977.2214058}, YEAR = {2012}, PAGES = {899--907}, } @TECHREPORT{ACS-TR-121108-01, AUTHOR = {Eigenwillig, Arno and Kettner, Lutz and Wolpert, Nicola}, TITLE = {Snap Rounding of {B}{\'e}zier Curves}, INSTITUTION = {Max-Planck-Institut f{\"u}r Informatik}, TYPE = {Technical Report}, ADDRESS = {66123 Saarbr{\"u}cken, Germany}, NUMBER = {ACS-TR-121108-01}, MONTH = {March}, YEAR = {2007}, PAGES = {19}, } @TECHREPORT{ACS-TR-121202-01, AUTHOR = {Berberich, Eric and Hemmer, Michael}, EDITOR = {Kettner, Lutz}, TITLE = {Prototype implementation of the algebraic kernel}, INSTITUTION = {University of Groningen}, TYPE = {Technical Report}, ADDRESS = {Groningen, Netherlands}, NUMBER = {ACS-TR-121202-01}, MONTH = {April}, YEAR = {2006}, PAGES = {35}, ABSTRACT = {In this report we describe the current progress with respect to prototype implementations of algebraic kernels within the ACS project. More specifically, we report on: (1) the Cgal package Algebraic\_kernel\_for\_circles\_2\_2 aimed at providing the necessary algebraic functionality required for treating circular arcs; (2) an interface between Cgal and SYNAPS for accessing the algebraic functionality in the SYNAPS library; (3) the NumeriX library (part of the EXACUS project) which is a prototype implementation of a set of algebraic tools on univariate polynomials, needed to built an algebraic kernel and (4) a rough CGAL-like prototype implementation of a set of algebraic tools on univariate polynomials.}, } @TECHREPORT{ACS-TR-121202-01, AUTHOR = {Berberich, Eric and Hemmer, Michael and Karavelas, Menelaos and Pion, Sylvain and Teillaud, Monique and Tsigaridas, Elias}, TITLE = {Prototype implementation of the algebraic kernel}, INSTITUTION = {University of Groningen}, TYPE = {Technical Report}, ADDRESS = {9700 AB Groningen THE NETHERLANDS}, NUMBER = {ACS-TR-121202-01}, MONTH = {April}, YEAR = {2008}, PAGES = {35}, ABSTRACT = {In this report we describe the current progress with respect to prototype implementations of algebraic kernels within the ACS project. More specifically, we report on: (1) the Cgal package Algebraic_kernel_for_circles_2_2 aimed at providing the necessary algebraic functionality required for treating circular arcs; (2) an interface between Cgal and SYNAPS for accessing the algebraic functionality in the SYNAPS library; (3) the NumeriX library (part of the EXACUS project) which is a prototype implementation of a set of algebraic tools on univariate polynomials, needed to built an algebraic kernel and (4) a rough CGAL-like prototype implementation of a set of algebraic tools on univariate polynomials.}, } @TECHREPORT{ACS-TR-123101-01, AUTHOR = {Berberich, Eric and Hemmer, Michael and Karavelas, Menelaos and Pion, Sylvain and Teillaud, Monique and Tsigaridas, Elias}, EDITOR = {Kettner, Lutz}, TITLE = {Interface specification of algebraic kernel}, INSTITUTION = {University of Groningen}, TYPE = {Technical Report}, ADDRESS = {Groningen, The Netherlands}, NUMBER = {ACS-TR-123101-01}, MONTH = {April}, YEAR = {2006}, PAGES = {27}, } @TECHREPORT{ACS-TR-241402-01, AUTHOR = {Hemmer, Michael and Dupont, Laurent and Petitjean, Sylvain and Sch{\"o}mer, Elmar}, TITLE = {Complete, Exact and Efficient Implementation for Computing the Adjacency Graph of an Arrangment of Quadrics}, INSTITUTION = {University of Groningen}, TYPE = {Technical Report}, ADDRESS = {9700 AB Groningen THE NETHERLANDS}, NUMBER = {ACS-TR-241402-01}, MONTH = {April}, YEAR = {2008}, PAGES = {13}, ABSTRACT = {We present a complete, exact and efficient implementation to compute the adjacency graph of an arrangement of quadrics, surfaces of algebraic degree~2. This is a major step towards the computation of the full arrangement. We enhanced an implementation for an exact parameterization of the intersection curves of two quadrics, such that we can compute the exact parameter value for intersection points and from that the adjacency graph of the arrangement. Our implementation is complete in the sense that it can handle all kind of inputs including all degenerate ones where intersection curves have singularities or pairs of curves intersect with high multiplicity. It is exact in that it always computes the mathematical correct result. It is efficient measured in running times, we compare it with a previous implementation based on planar arrangements of the projected intersection curves.}, } @TECHREPORT{ACS-TR-241405-03, AUTHOR = {Hemmer, Michael and H{\"u}lse, Dominik}, TITLE = {Traits classes for polynomial gcd computation over algebraic extensions}, INSTITUTION = {University of Groningen}, TYPE = {Technical Report}, ADDRESS = {9700 AB Groningen THE NETHERLANDS}, NUMBER = {ACS-TR-241405-03}, YEAR = {2007}, PAGES = {28}, ABSTRACT = {Reported are experiences on templated implementations for polynomial gcd computation over algebraic extensions within EXACUS. In particular we report on preliminary benchmarks for gcd computation of univariate polynomials comparing the naive approach with a preliminary implementation based on modular arithmetic. The report includes specification of traits classes needed to deal with algebraic coefficients. The presented traits classes are supposed to serve as a design study in order to extend the current framework in the algebraic foundations package of CGAL.}, } @TECHREPORT{ACS-TR-243306-03, AUTHOR = {Hemmer, Michael and Limbach, Sebastian}, TITLE = {Benchmarks on a generic univariate algebraic kernel}, INSTITUTION = {University of Groningen}, TYPE = {Technical Report}, ADDRESS = {9700 AB Groningen THE NETHERLANDS}, NUMBER = {ACS-TR-243306-03}, MONTH = {April}, YEAR = {2007}, PAGES = {33}, ABSTRACT = {The CGAL algebraic kernel specification splits into an univariate and a bivariate algebraic kernel. For a univariate algebraic kernel the most important components are the root isolation method and the implementation of the number type representing the algebraic numbers. We followed the spirit of CGAL and implemented a generic univariate algebraic kernel, for which it is possible to exchange the coefficient type, the root isolation method and the representation of the algebraic real type. Reported are benchmarks obtained using the different instantiations of this kernel.}, } @TECHREPORT{ACS-TR-243400-04, AUTHOR = {Hemmer, Michael}, TITLE = {CGAL package: Algebraic Foundations}, INSTITUTION = {University of Groningen}, TYPE = {Technical Report}, ADDRESS = {9700 AB Groningen THE NETHERLANDS}, NUMBER = {ACS-TR-243400-04}, MONTH = {April}, YEAR = {2008}, PAGES = {103}, ABSTRACT = {CGAL is targeting towards exact computation with non-linear objects, in particular objects defined on algebraic curves and surfaces. As a consequence types representing polynomials, algebraic extensions and finite fields play a more important role in related implementations. This package has been introduced to stay abreast of these changes. Since in particular polynomials must be supported by the introduced framework the package avoids the term {\em number type}. Instead the package distinguishes between the {\em algebraic structure} of a type and whether a type is embeddable on the real axis, or {\em real embeddable} for short. Moreover, the package introduces the notion of {\em interoperable} types which allows an explicit handling of mixed operations.}, } @TECHREPORT{acs-tr-243404-03, AUTHOR = {Kerber, Michael}, TITLE = {On filter methods in CGAL's 2D curved kernel}, INSTITUTION = {University of Groningen}, TYPE = {Technical Report}, ADDRESS = {Groningen, The Netherlands}, NUMBER = {ACS-TR-243404-03}, MONTH = {May}, YEAR = {2008}, PAGES = {7}, ABSTRACT = {We report on several filter techniques on top of the recently completed {\sc CGAL} package {\tt Curved\_kernel\_via\_analysis\_2}, a model for {\sc CGAL}'s {\sf ArrangementTraits\_2} concept. Geometric predicates for two arcs are usually answered by analyzing the geometry of the underlying supporting curve pair. Such an analysis tends to be a time-consuming task, especially if arcs are defined by algebraic curves of arbitrary degree. Our refined model {\tt Filtered\_curved\_kernel\_via\_analysis\_2} tries to prevent the computation of such a curve pair analysis if possible by a filtered method to detect non-intersections. When instantiated with a proper model of the {\sf CurveKernel\_2} concept, we show experimentally that fewer curve pair analyses are necessary.}, } @TECHREPORT{ACS-TR-243406-01, AUTHOR = {Hemmer, Michael}, TITLE = {CGAL package for modular arithmetic operations}, INSTITUTION = {University of Groningen}, TYPE = {Technical Report}, ADDRESS = {9700 AB Groningen THE NETHERLANDS}, NUMBER = {ACS-TR-243406-01}, MONTH = {April}, YEAR = {2008}, PAGES = {17}, ABSTRACT = {Modular arithmetic is a fundamental tool in modern algebra systems. In conjunction with the Chinese remainder theorem it serves as the workhorse in several algorithms computing the gcd, resultant etc. Moreover, it can serve as a very efficient filter. This CGAL package introduces the type {\tt CGAL::Modular} representing a finite field over some prime. Moreover, the package introduces {\tt CGAL::Modular\_traits} providing a mapping from some algebraic structure {\tt T} into an algebraic structure that is based on the type {\tt CGAL::Modular}.}, } @TECHREPORT{ACS-TR-361502-02, AUTHOR = {Mehlhorn, Kurt and Osbild, Ralf and Sagraloff, Michael}, TITLE = {A General Approach to the Analysis of Controlled Perturbation Algorithms}, INSTITUTION = {University of Groningen}, TYPE = {Technical Report}, ADDRESS = {9700 AB Groningen THE NETHERLANDS}, NUMBER = {ACS-TR-361502-02}, YEAR = {2008}, PAGES = {24}, ABSTRACT = {Controlled Perturbation (CP, for short) is an approach to implement efcient and robust geometric algorithms using the computational speed of builtin nite precision arithmetic, while bypassing precision problems during the computation. Furthermore it avoids the time-consuming and error-prone discussion of degenerate cases. CP replaces the input objects by a set of randomly perturbed (moved, scaled, stretched, etc.) objects such that the algorithm is guaranteed to compute the exact combinatorial structure that these objects imply. This paper is meant as a guide how to decide if CP can be applied to a given algorithm, and if, how to correlate all CP parameters: the perturbation amount d , the arithmetic precision $L$, the maximum range of input values $[−m,m]$, the number of input objects $n$, the error bound $\mathcal{B}_f$ of the (chosen) predicate evaluations, and the probability $\mathcal{P}$ of a successful computation. For this purpose we present a general methodology to analyze predicate functions that leads to an inequality correlating these parameters and hence to bounds on the precision or perturbation amount. In particular we treat the case of the wide used class of polynomial predicates in detail. Advantages, drawbacks and implementation issues are discussed.}, } @TECHREPORT{ACS-TR-361502-03, AUTHOR = {Mehlhorn, Kurt and Sagraloff, Michael}, TITLE = {A deterministic Bitstream Descartes Algorithm}, INSTITUTION = {University of Groningen}, TYPE = {Technical Report}, ADDRESS = {9700 AB Groningen THE NETHERLANDS}, NUMBER = {ACS-TR-361502-03}, YEAR = {2008}, PAGES = {18}, NOTE = {accepted to ISSAC 2009}, ABSTRACT = {We describe a variant of the Descartes algorithm for root isolation of polynomials with real coefficients. It is assumed that the coefficients of the polynomial can be approximated with arbitrary precision; exact computation in the field of coefficients is not required. We refer to such coefficients as bitstream coefficients. The algorithm is deterministic and has same asymptotic complexity as the randomized bitstream Descartes algorithm of Eigenwillig et. al. [EKK+05]. Besides being deterministic, the algorithm is also somewhat simpler to analyse.}, } @TECHREPORT{ACS-TR-363501-01, AUTHOR = {Hemmer, Michael}, TITLE = {Evaluation of different approaches in 3D curved kernel for arrangements of quadrics}, INSTITUTION = {University of Groningen}, TYPE = {Technical Report}, ADDRESS = {9700 AB Groningen THE NETHERLANDS}, NUMBER = {ACS-TR-363501-01}, MONTH = {April}, YEAR = {2008}, PAGES = {19}, ABSTRACT = {Within the context of the ACS project we have investigated two approaches towards the arrangements of quadrics. The first approach,which is presented in ACS-TR-241402-01, computes the adjacency graph of the arrangement and is based on an exact parameterization of the appearing intersection curves. The second approach, which is presented in ACS-TR-241402-02, computes the arrangement on each quadric and is base on the computation of the planar arrangement of the projected intersection curves. This report provides a dedicated empirical comparison of both approaches towards the arrangement of quadrics.}, } @TECHREPORT{acs-tr-363602-01, AUTHOR = {Emeliyanenko, Pavel and Kerber, Michael}, TITLE = {An implementation of the 2D Algebraic Kernel}, INSTITUTION = {University of Groningen}, TYPE = {Technical Report}, ADDRESS = {Groningen, The Netherlands}, NUMBER = {ACS-TR-363602-01}, MONTH = {May}, YEAR = {2008}, PAGES = {14}, ABSTRACT = {We report on a model for {\sc CGAL}'s {\sf AlgebraicKernelWithAnalysis\_d\_2} concept which refines {\sf AlgebraicKernel\_d\_2}. Our implementation handles bivariate polynomials in full generality, i.e., with no restriction on their degree. Moreover, it allows both integers and nested square-root numbers as coefficient type. The Curve analysis and Curve pair analysis required by the concept are realized using recent work of Eigenwillig, Kerber and Wolpert ('Fast and exact geometric analysis\ldots', ISSAC 2007 and 'Exact and efficient 2D-Arrangements\ldots'. SODA 2008). The consequent use of certified numerical methods leads to significant speed-ups without spoiling exactness. We present benchmark results about the performance of several key methods.}, } @TECHREPORT{ACS-TR-363602-02, AUTHOR = {Emiris,Ioannis and Hemmer, Michael and Karavelas, Menelaos and Limbach, Sebastian and Mourrain, Bernard and Tsigaridas, Elias and Zafeirakopoulos,Zafeirakis}, TITLE = {Cross-benchmarks of univariate algebraic kernels}, INSTITUTION = {University of Groningen}, TYPE = {Technical Report}, ADDRESS = {9700 AB Groningen THE NETHERLANDS}, NUMBER = {ACS-TR-363602-02}, MONTH = {April}, YEAR = {2008}, PAGES = {35}, ABSTRACT = {We summarize the results of the cross-benchmarks for two univariate algebraic kernels (AK) developed in ACS. The kernels, developed at INRIA and MPI, were tested on 6 types of univariate polynomials of various degrees and bitsizes. The methods included were: Sturm, Sleeve, CF, NCF, NCF2 for the INRIA kernel, and Descartes and Bitstream-Descartes for the MPI kernel. NCF, NCF2, Descartes and Bitstream-Descartes are the most robust and never give wrong results. With respect to speed, the results are not decisive in most cases. Overall NCF and NCF2 seem faster, while for very large bitsizes Bitstream-Descartes seems more efficient, provided the degree is not very high. Special algorithms for polynomials of degree up to 4 give better results. We also compare against an external AK developed at LORIA-Nancy and based on the RS solver from INRIARocquencourt.}, } @TECHREPORT{ACS-TR-363603-01, AUTHOR = {Emiris, Ioannis and Hemmer, Michael and Tsigaridas, Elias and Tzoumas, Georg}, TITLE = {Voronoi diagram of ellipses: CGAL-based implementation}, INSTITUTION = {University of Groningen}, TYPE = {Technical Report}, ADDRESS = {9700 AB Groningen THE NETHERLANDS}, NUMBER = {ACS-TR-363603-01}, MONTH = {April}, YEAR = {2008}, PAGES = {18}, ABSTRACT = {We present a C++ open-source implementation of an incremental algorithm for the computation of the Voronoi diagram of ellipses in the Euclidean plane. This is the first complete implementation, under the exact computation paradigm; it also computes the approximate diagram with any given precision. It is based on the cgal package for the Apollonius diagram. The ellipses are given in parametric representation, which allows us to develop a GUI for input / output. The software concerns non-intersecting ellipses, but it can be generalized. We implement an interval Newton solver, bivariate polynomial interpolation, and trivariate system resultant computation, and demonstrate the factorization of certain resultants so as to arrive at an efficient implementation of InCircle . As a ballmark estimate, our code spends about 99sec to construct the Voronoi diagram of 128 ellipses, when few degeneracies occur. It is faster than the cgal Voronoi diagram of polygons, when ellipses are approximated by k-gons for k > 15, but expectedly slower on circles than the cgal Apollonius package. Our software is connected to the algebraic library Synaps and, through it, to libraries mpfr and ntl, hence illustrating the concept of algebraic support for geometric computing; it is targeted for inclusion in the cgal library. In this direction, we present some experiments using the new Algebraic Kernel from MPI.}, } @TECHREPORT{ACS-TR-363606-01, AUTHOR = {Hemmer, Michael and Limbach, Sebastian}, TITLE = {Arrangements of quadrics in 3D: continued work on experimental implementation}, INSTITUTION = {University of Groningen}, TYPE = {Technical Report}, ADDRESS = {9700 AB Groningen THE NETHERLANDS}, NUMBER = {ACS-TR-363606-01}, YEAR = {2008}, PAGES = {46}, ABSTRACT = {On the way towards a complete, exact and efficient algorithm for the computation of arrangements of quadric surfaces a major goal was recently reached: An algorithm computing the adjacency graph of the arrangement’s vertices using exact parameterizations of the occurring intersection curves and points. In this report the general design of the implementation of this algorithm as part of the QuadriX library of the Exacus project is presented. Further we introduce a new “Environment Map” concept capable of representing the environments of vertices in a quadric arrangement, i.e. information about the correlations of incident intersection curves and quadric surfaces at each vertex. We discuss some possible models of this “Environment Map” concept and give an outlook on further work.}, } @TECHREPORT{acs-tr-363608-02, AUTHOR = {Emeliyanenko, Pavel and Kerber, Michael}, TITLE = {Visualizing and Exploring Planar Algebraic Arrangements - a Web Application}, INSTITUTION = {University of Groningen}, TYPE = {Technical Report}, ADDRESS = {Groningen, The Netherlands}, NUMBER = {ACS-TR-363608-02}, MONTH = {May}, YEAR = {2008}, PAGES = {6}, ABSTRACT = {A web application is presented to compute, plot, and interactively explore planar arrangements induced by algebraic plane curves of arbitrary degree. It produces accurate curve plots and reflects the exact topology for any arrangement, including highly-degenerate cases. Various user interface features allow the interactive exploration of the arrangement structure. The tool useful for demonstrative and educational purposes, especially as it runs without initial installation process.}, } @TECHREPORT{acstr123109-01, AUTHOR = {Funke, Stefan and Klein, Christian and Mehlhorn, Kurt and Schmitt, Susanne}, TITLE = {Controlled Perturbation for Delaunay Triangulations}, INSTITUTION = {Algorithms for Complex Shapes with certified topology and numerics}, TYPE = {Technical Report}, ADDRESS = {Instituut voor Wiskunde en Informatica, Groningen, NETHERLANDS}, NUMBER = {ACS-TR-121103-03}, YEAR = {2006}, PAGES = {20}, } @TECHREPORT{acs:bcw-carc-07, AUTHOR = {Berberich, Eric and Caroli, Manuel and Wolpert, Nicola}, TITLE = {Exact Computation of Arrangements of Rotated Conics}, INSTITUTION = {University of Groningen}, TYPE = {Technical Report}, ADDRESS = {Groningen, The Netherlands}, NUMBER = {ACS-TR-123104-03}, MONTH = {April}, YEAR = {2007}, PAGES = {5}, } @TECHREPORT{acs:bek-dffbiaq-06, AUTHOR = {Berberich, Eric and Ebert, Franziska and Kettner, Lutz}, TITLE = {Definition of file format for benchmark instances for arrangements of Quadrics}, INSTITUTION = {University of Groningen}, ADDRESS = {Groningen, The Netherlands}, NUMBER = {ACS-TR-123109-01}, MONTH = {April}, YEAR = {2006}, PAGES = {17}, } @TECHREPORT{acs:bek-wbipca-06, AUTHOR = {Berberich, Eric and Ebert, Franziska and Fogel, Efi and Kettner, Lutz}, TITLE = {Web-site with benchmark instances for planar curve arrangements}, INSTITUTION = {University of Groningen}, TYPE = {Technical Report}, ADDRESS = {Groningen, The Netherlands}, NUMBER = {ACS-TR-123108-01}, MONTH = {April}, YEAR = {2006}, PAGES = {4}, } @TECHREPORT{acs:bfhmw-smtaoq-07, AUTHOR = {Berberich, Eric and Fogel, Efi and Halperin, Dan and Mehlhorn, Kurt and Wein, Ron}, TITLE = {Sweeping and Maintaining Two-Dimensional Arrangements on Quadrics}, INSTITUTION = {University of Groningen}, TYPE = {Technical Report}, ADDRESS = {Groningen, The Netherlands}, NUMBER = {ACS-TR-241402-02}, MONTH = {April}, YEAR = {2007}, PAGES = {10}, } @TECHREPORT{acs:bfm-uwibaqpac-07, AUTHOR = {Berberich, Eric and Fogel, Efi and Meyer, Andreas}, TITLE = {Updated Website to include Benchmark Instances for Arrangements of Quadrics and Planar Algebraic Curves}, INSTITUTION = {University of Groningen}, TYPE = {Technical Report}, ADDRESS = {Groningen, The Netherlands}, NUMBER = {ACS-TR-243305-01}, MONTH = {April}, YEAR = {2007}, PAGES = {5}, } @TECHREPORT{acs:bh-dtqkc-07, AUTHOR = {Berberich, Eric and Hemmer, Michael}, TITLE = {Definition of the 3D Quadrical Kernel Content}, INSTITUTION = {University of Groningen}, TYPE = {Technical Report}, ADDRESS = {Groningen, The Netherlands}, NUMBER = {ACS-TR-243302-02}, MONTH = {April}, YEAR = {2007}, PAGES = {25}, } @TECHREPORT{acs:bhkt-risak-06, AUTHOR = {Berberich, Eric and Hemmer, Michael and Karavelas, Menelaos I. and Teillaud, Monique}, TITLE = {Revision of interface specification of algebraic kernel}, INSTITUTION = {University of Groningen}, TYPE = {Technical Report}, ADDRESS = {Groningen, The Netherlands}, NUMBER = {ACS-TR-243301-01}, MONTH = {April}, YEAR = {2007}, PAGES = {100}, } @TECHREPORT{acs:bm-ceq-07, AUTHOR = {Berberich, Eric and Meyerovitch, Michal}, TITLE = {Computing Envelopes of Quadrics}, INSTITUTION = {University of Groningen}, TYPE = {Technical Report}, ADDRESS = {Groningen, The Netherlands}, NUMBER = {ACS-TR- 241402-03}, MONTH = {April}, YEAR = {2007}, PAGES = {5}, } @TECHREPORT{acs:tr123203-04-08, AUTHOR = {Berberich, Eric and Emeliyanenko, Pavel}, TITLE = {{CGAL's} Curved Kernel via Analysis}, INSTITUTION = {Algorithms for Complex Shapes}, TYPE = {Technical Report}, ADDRESS = {MPI f{\"u}r Informatik, Germany}, NUMBER = {ACS-TR-123203-04}, YEAR = {2008}, PAGES = {101}, } @ARTICLE{ACTAI::BeckerM1986, AUTHOR = {Becker, Michael and Mehlhorn, Kurt}, JOURNAL = {Acta Informatica}, TITLE = {Algorithms for Routing in Planar Graphs}, ADDRESS = {Berlin, Germany}, NUMBER = {2}, PUBLISHER = {Springer}, VOLUME = {23}, DOI = {10.1007/BF00289496}, YEAR = {1986}, PAGES = {163--176}, } @INPROCEEDINGS{AdamaszekWiese2013, AUTHOR = {Adamaszek, Anna and Wiese, Andreas}, TITLE = {Approximation Schemes for Maximum Weight Independent Set of Rectangles}, BOOKTITLE = {Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2013)}, PADDRESS = {Los Alamitos, USA}, ADDRESS = {Berkeley, USA}, PUBLISHER = {IEEE}, YEAR = {2013}, } @INPROCEEDINGS{addobj07, AUTHOR = {Brockhoff, Dimo and Friedrich, Tobias and Hebbinghaus, Nils and Klein, Christian and Neumann, Frank and Zitzler, Eckart}, EDITOR = {Dirk Thierens}, TITLE = {Do Additional Objectives Make a Problem Harder?}, BOOKTITLE = {Genetic and Evolutionary Computation Conference 2007}, PADDRESS = {New York, NY, USA}, ADDRESS = {London, UK}, PUBLISHER = {ACM}, MONTH = {July}, DOI = {10.1145/1276958.1277114}, YEAR = {2007}, PAGES = {765--772}, } @ARTICLE{ADHP2009, AUTHOR = {Angelopoulos, Spyros and Doerr, Benjamin and Huber, Anna and Panagiotou, Konstantinos}, JOURNAL = {The Electronic Journal of Combinatorics}, TITLE = {Tight bounds for quasirandom rumor spreading}, ADDRESS = {Philadelphia, PA}, NUMBER = {1}, PUBLISHER = {Department of Mathematics of the University of Pennsylvania}, VOLUME = {16}, ISBN = {1077-8926}, YEAR = {2009}, PAGES = {R102,1--R102,19}, ABSTRACT = {This paper addresses the following fundamental problem: Suppose that in a group of $n$ people, where each person knows all other group members, a single person holds a piece of information that must be disseminated to everybody within the group. How should the people propagate the information so that after short time everyone is informed? The classical approach, known as the {\em push model}, requires that in each round, every informed person selects some other person in the group at random, whom it then informs. In a different model, known as the \emph{quasirandom push model}, each person maintains a cyclic list, i.e., permutation, of all members in the group (for instance, a contact list of persons). Once a person is informed, it chooses a random member in its own list, and from that point onwards, it informs a new person per round, in the order dictated by the list. In this paper we show that with probability $1-o(1)$ the quasirandom protocol informs everybody in $(1 \pm o(1))\log_2 n+\ln n$ rounds; furthermore we also show that this bound is tight. This result, together with previous work on the randomized push model, demonstrates that irrespectively of the choice of lists, quasirandom broadcasting is as fast as broadcasting in the randomized push model, up to lower order terms. At the same time it reduces the number of random bits from $O(\log^2 n)$ to only $\lceil\log_2 n\rceil$ per person. }, } @ARTICLE{ADKMNT03:dominance, AUTHOR = {Althaus, Ernst and Duchier, Denys and Koller, Alexander and Mehlhorn, Kurt and Niehren, Joachim and Thiel, Sven}, JOURNAL = {Journal of Algorithms}, TITLE = {An Efficient Algorithm for the Configuration Problem of Dominance Graphs}, ADDRESS = {Amsterdam, The Netherlands}, PUBLISHER = {Elsevier}, MONTH = {August}, VOLUME = {48}, ISBN = {0196-6774}, DOI = {10.1016/S0196-6774(03)00050-6}, YEAR = {2003}, PAGES = {194--219}, ABSTRACT = {Dominance constraints are logical descriptions of trees that are widely used in computational linguistics. Their general satisfiability problem is known to be NP-complete. Here we identify normal dominance constraints and present an efficient graph algorithm for testing their satisfiablity in deterministic polynomial time. Previously, no polynomial time algorithm was known.}, } @INPROCEEDINGS{ADKMNT2001, AUTHOR = {Althaus, Ernst and Duchier, Denys and Koller, Alexander and Mehlhorn, Kurt and Niehren, Joachim and Thiel, Sven}, TITLE = {An Efficient Algorithm for the Configuration Problem of Dominance Graphs}, BOOKTITLE = {Proceedings of the 12th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-01)}, ORGANIZATION = {ACM-SIAM}, PADDRESS = {New York}, ADDRESS = {Washington DC, USA}, PUBLISHER = {ACM}, MONTH = {January}, ISBN = {0-89871-490-7}, YEAR = {2001}, PAGES = {815--824}, ABSTRACT = {Dominance constraints are logical tree descriptions originating from automata theory that have multiple applications in computational linguistics. The satisfiability problem of dominance constraints is NP-complete. In most applications, however, only \emph{normal} dominance constraints are used. The satisfiability problem of normal dominance constraints can be reduced in linear time to the configuration problem of dominance graphs, as shown recently. In this paper, we give a polynomial time algorithm testing configurability of dominance graphs (and thus satisfiability of normal dominance constraints). Previous to our work no polynomial time algorithms were known.}, } @INPROCEEDINGS{ADLO:08.listupdate, AUTHOR = {Angelopoulos, Spyros and Dorrigiv, Reza and Lopez-Ortiz, Alejandro}, TITLE = {List Update with Locality of Reference}, BOOKTITLE = {8th Latin American Symposium on Theoretical Informatics (LATIN 2008)}, PADDRESS = {New York}, ADDRESS = {Buzios, Brasil}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4957}, YEAR = {2008}, PAGES = {399--410}, } @INPROCEEDINGS{AEFM2004, AUTHOR = {Althaus, Ernst and Eisenbrand, Friedrich and Funke, Stefan and Mehlhorn, Kurt}, TITLE = {Point Containment in the Integer Hull of a Polyhedron}, BOOKTITLE = {Proceedings of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-04)}, ORGANIZATION = {Association of Computing Machinery (ACM)}, PADDRESS = {New York, USA}, ADDRESS = {New Orleans, USA}, PUBLISHER = {ACM}, ISBN = {0-89871-558-X}, YEAR = {2004}, PAGES = {929--933}, ABSTRACT = { We show that the point containment problem in the integer hull of a polyhedron, which is defined by $m$ inequalities, with coefficients of at most $\varphi$ bits can be solved in time $\bigO(m+\varphi)$ in the two-dimensional case and in expected time $\bigO(m+\varphi^2 \log m)$ in any fixed dimension. This improves on the algorithm which is based on the equivalence of separation and optimization and on a direct algorithm (SODA 97) for the two-dimensional case.}, } @MANUAL{af-hemmer-2007, AUTHOR = {Hemmer, Michael}, TITLE = {Algebraic Foundations, CGAL - Computational Geometry Algorithms Library, release 3.3}, ORGANIZATION = {CGAL}, ADDRESS = {Campus E1 4, 66123 Saarbr{\"u}cken, Germany}, MONTH = {May}, YEAR = {2007}, PAGES = {105}, } @ARTICLE{AF10, AUTHOR = {Ajwani, Deepak and Friedrich, Tobias}, JOURNAL = {Discrete Applied Mathematics}, TITLE = {Average-case Analysis of Incremental Topological Ordering}, ADDRESS = {Amsterdam}, NUMBER = {4}, PUBLISHER = {Elsevier}, MONTH = {February}, VOLUME = {158}, ISBN = {0166-218X}, DOI = {10.1016/j.dam.2009.07.006}, YEAR = {2010}, PAGES = {240--250}, } @ARTICLE{AFHKRS05, AUTHOR = {Althaus, Ernst and Funke, Stefan and Har-Peled, Sariel and K{\"o}nemann, Jochen and Ramos, Edgar A. and Skutella, Martin}, JOURNAL = {Operations Research Letters}, TITLE = {Approximating k-Hop Minimum-Spanning Trees}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {2}, PUBLISHER = {Elsevier}, MONTH = {March}, VOLUME = {33}, ISBN = {0167-6377}, YEAR = {2005}, PAGES = {115--120}, ABSTRACT = { In this paper we consider the problem of computing minimum-cost spanning trees with depth restrictions. Specifically, we are given an $n$-node complete graph $G$, a metric cost-function $c$ on its edges, and an integer $k\geq 1$. The goal in the minimum-cost $k$-hop spanning tree problem is to compute a spanning tree $T$ in $G$ of minimum total cost such that the longest root-leaf-path in the tree has at most $k$ edges. Our main result is an algorithm that computes a tree of depth at most $k$ and total expected cost $O(\log n)$ times that of a minimum-cost $k$-hop spanning-tree. The result is based upon earlier work on metric space approximation due to Fakcharoenphol et al.[FRT03] and Bartal [Bart96,Bart98]. In particular we show that the problem can be solved exactly in polynomial time when the cost metric $c$ is induced by a so-called hierarchically well-separated tree. }, } @INPROCEEDINGS{AFM06, AUTHOR = {Ajwani, Deepak and Friedrich, Tobias and Meyer, Ulrich}, EDITOR = {Arge, Lars and Freivalds, Rusins}, TITLE = {An ${O}(n^{2.75})$ algorithm for online topological ordering}, BOOKTITLE = {Algorithm theory - SWAT 2006 : 10th Scandinavian Workshop on Algorithm Theory}, PADDRESS = {Berlin, Germany}, ADDRESS = {Riga, Latvia}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4059}, ISBN = {978-3-540-35753-7}, YEAR = {2006}, PAGES = {53--64}, ABSTRACT = {We present a simple algorithm which maintains the topological order of a directed acyclic graph with $n$ nodes under an online edge insertion sequence in $\O(n^{2.75})$ time, independent of the number of edges $m$ inserted. For dense DAGs, this is an improvement over the previous best result of $\O(\min\{m^{\frac{3}{2}} \log{n}, m^{\frac{3}{2}} + n^2 \log{n}\})$ by Katriel and Bodlaender. We also provide an empirical comparison of our algorithm with other algorithms for online topological sorting.}, } @ARTICLE{AFM08, AUTHOR = {Ajwani, Deepak and Friedrich, Tobias and Meyer, Ulrich}, JOURNAL = {ACM Transactions on Algorithms}, TITLE = {An $O(n^2.75)$ algorithm for incremental topological ordering}, NUMBER = {4}, PUBLISHER = {ACM Press}, VOLUME = {4}, ISBN = {1549-6325}, DOI = {10.1145/1383369.1383370}, YEAR = {2008}, PAGES = {1--14}, } @INPROCEEDINGS{AFNPS02, AUTHOR = {Andreou, Maria and Fotakis, Dimitris and Nikoletseas, Sotiris and Papadopoulou, Vicky and Spirakis, Paul G.}, EDITOR = {Diks, Krzysztof and Rytter, Wojciech}, TITLE = {On Radiocoloring Hierarchically Specified Planar Graphs: PSPACE-Completeness and Approximations}, BOOKTITLE = {Mathematical Foundations of Computer Science 2002 : 27th International Symposium, MFCS 2002}, PADDRESS = {Berlin, Germany}, ADDRESS = {Warsaw, Poland}, PUBLISHER = {Springer}, MONTH = {August}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {2420}, ISBN = {3-540-44040-2}, YEAR = {2002}, PAGES = {81--92}, ABSTRACT = {Hierarchical specifications of graphs have been widely used in many important applications, such as VLSI design, parallel programming and software engineering. A well known hierarchical specification model, considered in this work, is that of Lengauer [9, 10] referred to as L-specifications. In this paper we discuss a restriction on the L-specifications resulting to graphs which we call Well-Separated (WS). This class is characterized by a polynomial time (to the size of the specification of the graph) testable combinatorial property. In this work we study the Radiocoloring Problem (RCP) on WS L-specified hierarchical planar graphs. The optimization version of RCP studied here, consists in assigning colors to the vertices of a graph, such that any two vertices of distance at most two get different colors. The objective here is to minimize the number of colors used. This problem is equivalent to the problem of vertex coloring the square of a graph $G$, $G^2$, where $G^2$ has the same vertex set as $G$ and there is an edge between any two vertices of $G^2$ if their distance in $G$ is at most 2. We first show that RCP is PSPACE-complete for WS L-specified hierarchical planar graphs. Second, we present a polynomial time 3-approximation algorithm as well as a more efficient 4-approximation algorithm for RCP on graphs of this class. We note that, the best currently known approximation ratio for the RCP on ordinary (non-hierarchical) planar graphs of general degree is 2 ([6, 1]). Note also that the only known results on any kind of coloring problems have been shown for another special kind of hierarchical graphs (unit disk graphs) achieving a 6-approximation solution [13]. }, } @INCOLLECTION{Afshani2013, AUTHOR = {Afshani, Peyman and Agrawal, Manindra and Doerr, Benjamin and Doerr, Carola and Larsen, Kasper Green and Mehlhorn, Kurt}, EDITOR = {Brodnik, Andrej and L{\'o}pez-Ortiz, Alejandro and Raman, Venkatesh and Viola, Alfredo}, TITLE = {The Query Complexity of Finding a Hidden Permutation}, BOOKTITLE = {Space-Efficient Data Structures, Streams, and Algorithms}, ADDRESS = {Heidelberg}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {8066}, ISBN = {978-3-642-40272-2}, YEAR = {2013}, PAGES = {1--11}, } @ARTICLE{AfshaniADGLMW12eccc, AUTHOR = {Afshani, Peyman and Agrawal, Manindra and Doerr, Benjamin and Green Larsen, Kasper and Mehlhorn, Kurt and Winzen, Carola}, JOURNAL = {Electronic Colloquium on Computational Complexity (ECCC): Report Series}, TITLE = {The Query Complexity of Finding a Hidden Permutation}, ADDRESS = {Potsdam}, PUBLISHER = {Hasso-Plattner-Institut f{\"u}r Softwaresystemtechnik GmbH}, VOLUME = {87 (Revision 1)}, ISBN = {1433-8092}, YEAR = {2012}, PAGES = {1--36}, } @INPROCEEDINGS{Agarwal03, AUTHOR = {Agarwal, Amit and Agarwal, Tarun and Chopra, Sumit and Feldmann, Anja and Kammenhuber, Nils and Krysta, Piotr and V{\"o}cking, Berthold}, EDITOR = {Kosch, Harald and B{\"o}sz{\"o}rm{\'e}nyi, L{\'a}szl{\'o} and Hellwagner, Hermann}, TITLE = {An experimental study of k-splittable scheduling for DNS-based traffic allocation}, BOOKTITLE = {Euro-Par 2003 parallel processing : 9th International Euro-Par Conference ; proceedings}, PADDRESS = {Berlin, Germany}, ADDRESS = {Klagenfurt, Austria}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {2790}, ISBN = {3-540-40788-X}, YEAR = {2003}, PAGES = {230--235}, } @INPROCEEDINGS{Agarwal99, AUTHOR = {Agarwal, Pankaj and Arge, Lars and Brodal, Gerth St{\o}lting and Vitter, Jeffrey Scott}, TITLE = {I/O-Efficient Dynamic Point Location in Monotone Subdivisions}, BOOKTITLE = {Proceedings of the 10th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-99)}, ORGANIZATION = {ACM-SIAM}, PADDRESS = {New York, USA}, ADDRESS = {Baltimore, USA}, PUBLISHER = {ACM}, MONTH = {January}, ISBN = {0-89871-434-6}, YEAR = {1999}, PAGES = {11--20}, ABSTRACT = {We present an efficient external-memory dynamic data structure for point location in monotone planar subdivisions. Our data structure uses $O(N/B)$ disk blocks to store a monotone subdivision of size $N$, where $B$ is the size of a disk block. It supports queries in $O(\log_{B}^{2} N)$ I/Os (worst-case) and updates in $O(\log_{B}^{2} N)$ I/Os (amortized). We also propose a new variant of $B$-trees, called {\em level-balanced $B$-trees}, which allow insert, delete, merge, and split operations in $O((1+\frac{b}{B}\log_{M/B} \frac{N}{B})\log_{b} N)$ I/Os (amortized), $2\leq b\leq B/2$, even if each node stores a pointer to its parent. Here $M$ is the size of main memory. Besides being essential to our point-location data structure, we believe that {\em level-balanced B-trees\/} are of significant independent interest. They can, for example, be used to dynamically maintain a planar st-graph using $O((1+\frac{b}{B}\log_{M/B} \frac{N}{B})\log_{b} N)=O(\log_{B}^{2} N)$ I/Os (amortized) per update, so that reachability queries can be answered in $O(\log_{B} N)$ I/Os (worst case).}, } @INPROCEEDINGS{AGHSTW98, AUTHOR = {Alefragis, Panayiotis and Goumopoulos, Christos and Sanders, Peter and Takkula, Tuomo and Wedelin, Dag}, EDITOR = {Pritchard, David and Reeve, Jeff}, TITLE = {Parallel Crew Scheduling in PAROS}, BOOKTITLE = {Proceedings of the 4th International Euro-Par Conference (Euro-Par-98)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Southhampton, UK}, PUBLISHER = {Springer}, MONTH = {September}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1470}, YEAR = {1998}, PAGES = {1104--1113}, } @INPROCEEDINGS{AGMN97, AUTHOR = {Alberts, David and Gutwenger, Carsten and Mutzel, Petra and N{\"a}her, Stefan}, EDITOR = {Italiano, Giuseppe and Orlando, S.}, TITLE = {AGD-Library: A Library of Algorithms for Graph Drawing}, BOOKTITLE = {Proceedings of the Workshop on Algorithm Engineering (WAE-97)}, PADDRESS = {Venice, Italy}, ADDRESS = {Venice, Italy}, PUBLISHER = {Universit{\`a} Ca' Foscari di Venezia}, YEAR = {1997}, PAGES = {112--123}, } @ARTICLE{Ahuja-Mehlhorn-Orlin-Tarjan/90, AUTHOR = {Ahuja, Ravindra K. and Mehlhorn, Kurt and Orlin, James B. and Tarjan, Robert E.}, JOURNAL = {Journal of the ACM}, TITLE = {Faster algorithms for the shortest path problem}, ADDRESS = {New York, USA}, NUMBER = {2}, PUBLISHER = {ACM}, VOLUME = {37}, YEAR = {1990}, PAGES = {213--223}, } @INPROCEEDINGS{AIJMR09, AUTHOR = {Amaldi, Edoardo and Iuliano, Claudio and Jurkiewicz, Tomasz and Mehlhorn, Kurt and Rizzi, Romeo}, EDITOR = {Fiat, Amos and Sanders, Peter}, TITLE = {Breaking the {$O(m^2n)$} Barrier for Minimum Cycle Bases}, BOOKTITLE = {Algorithms - ESA 2009, 17th Annual European Symposium, Copenhagen, Denmark, September 7-9, 2009. Proceedings}, PADDRESS = {Springer Berlin, Germany}, ADDRESS = {Copenhagen, Denmark}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5757}, ISBN = {978-3-642-04127-3}, DOI = {10.1007/978-3-642-04128-0_28}, YEAR = {2009}, PAGES = {301--312}, } @INPROCEEDINGS{AIKM05, AUTHOR = {Abraham, David and Irving, Robert W. and Mehlhorn, Kurt and Telikepalli, Kavitha}, TITLE = {Popular Matchings}, BOOKTITLE = {Proceedings of the sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-05)}, PADDRESS = {Philadelphia, USA}, ADDRESS = {Vancouver, Canada}, PUBLISHER = {SIAM}, ISBN = {0-89871-585-7}, YEAR = {2005}, PAGES = {424--432}, } @ARTICLE{Ailon2012, AUTHOR = {Ailon, Nir and Avigdor-Elgrabli, Noa and Liberty, Edo and van Zuylen, Anke}, JOURNAL = {SIAM Journal on Computing}, TITLE = {Improved Approximation Algorithms for Bipartite Correlation Clustering}, ADDRESS = {Philadelphia, PA}, NUMBER = {5}, PUBLISHER = {SIAM}, VOLUME = {41}, ISBN = {0097-5397}, DOI = {10.1137/110848712}, YEAR = {2012}, PAGES = {1110--1121}, } @INPROCEEDINGS{AilonESA2011, AUTHOR = {Ailon, Nir and Avigdor-Elgrabli, Noa and Liberty, Noa and van Zuylen, Anke}, EDITOR = {Demetrescu, Camil and Halld{\'o}rsson, Magn{\'u}s M.}, TITLE = {Improved Approximation Algorithms for Bipartite Correlation Clustering}, BOOKTITLE = {Algorithms - ESA 2011 : 19th Annual European Symposium}, ORGANIZATION = {European Association for Theoretical Computer Science (EATCS)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Saarbr{\"u}cken, Germany}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6942}, ISBN = {978-3-642-23718-8}, DOI = {10.1007/978-3-642-23719-5_3}, YEAR = {2011}, PAGES = {25--36}, } @MASTERSTHESIS{Ajwani05, AUTHOR = {Ajwani, Deepak}, TITLE = {Design, Implementation and Experimental Study of External Memory {BFS} Algorithms}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, YEAR = {2005}, } @INPROCEEDINGS{Ajwani06, AUTHOR = {Ajwani, Deepak and Dementiev, Roman and Meyer, Ulrich}, TITLE = {A computational study of external memory {BFS} algorithms}, BOOKTITLE = {Proceedings of the Seventeenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA'06}, PADDRESS = {New York, USA}, ADDRESS = {Miami, USA}, PUBLISHER = {ACM / SIAM}, ISBN = {0-89871-605-5}, YEAR = {2006}, PAGES = {601--610}, } @INPROCEEDINGS{Ajwani07, AUTHOR = {Ajwani, Deepak and Meyer, Ulrich and Osipov, Vitaly}, EDITOR = {Applegate, David and Brodal, Gerth}, TITLE = {Improved external memory {BFS} implementations}, BOOKTITLE = {9th Workshop on Algorithm Engineering and Experiments (ALENEX)}, PADDRESS = {Philadephia}, ADDRESS = {New Orleans, USA}, PUBLISHER = {SIAM}, YEAR = {2007}, PAGES = {3--12}, } @ARTICLE{Ajwani2012, AUTHOR = {Ajwani, Deepak and Elbassioni, Khaled and Govindarajan, Sathish and Ray, Saurabh}, JOURNAL = {Discrete \& Computational Geometry}, TITLE = {Conflict-free coloring for rectangle ranges using O(n .382) colors}, ADDRESS = {New York, NY}, NUMBER = {1}, PUBLISHER = {Springer}, VOLUME = {48}, ISBN = {0179-5376}, DOI = {10.1007/s00454-012-9425-5}, YEAR = {2012}, PAGES = {39--52}, } @INCOLLECTION{AjwaniMeyerOsipov2009, AUTHOR = {Ajwani, Deepak and Meyer, Ulrich and Osipov, Vitaly}, EDITOR = {Demetrescu, Camil and Goldberg, Andrew V. and Johnson, David S.}, TITLE = {Breadth first search on massive graphs}, BOOKTITLE = {The shortest path problem : ninth DIMACS implemenation challenge}, ADDRESS = {Providence, RI}, PUBLISHER = {AMS}, SERIES = {DIMACS Series on Disrecte Mathematics and Theoretical Computer Science}, VOLUME = {74}, ISBN = {978-0-8218-4383-3}, YEAR = {2009}, PAGES = {291--307}, } @INPROCEEDINGS{AkbariBS2012, AUTHOR = {Akbari, Hoda and Berenbrink, Petra and Sauerwald, Thomas}, EDITOR = {Kowalski, Darek and Panconesi, Alessandro}, TITLE = {A simple approach for adapting continuous load balancing processes to discrete settings}, BOOKTITLE = {PODC'12 : Proceedings of the 2012 ACM Symposium on Principles of Distributed Computing}, PADDRESS = {New York, NY}, ADDRESS = {Madeira, Portugal}, PUBLISHER = {ACM}, ISBN = {978-1-4503-1450-3}, DOI = {10.1145/2332432.2332486}, YEAR = {2012}, PAGES = {271--280}, } @INPROCEEDINGS{AKL+2000, AUTHOR = {Althaus, Ernst and Kohlbacher, Oliver and Lenhof, Hans-Peter and M{\"u}ller, Peter}, EDITOR = {Shamir, Ron and Miyano, Satoru and Istrail, Sorin and Pevzner, Pavel and Waterman, Michael}, TITLE = {A Combinatorial Approach to Protein Docking with Flexible Side-Chains}, BOOKTITLE = {Proceedings of the 4th Annual International Conference on Computational Molecular Biology (RECOMB-00)}, ORGANIZATION = {Association for Computing Machinery (ACM SIGACT)}, PADDRESS = {New York, USA}, ADDRESS = {Tokyo, Japan}, PUBLISHER = {ACM Press}, MONTH = {April}, ISBN = {1-58113-186-0}, YEAR = {2000}, PAGES = {15--24}, ABSTRACT = {\begin{abstract} Rigid body docking approaches are not sufficient to predict the structure of a protein complex from the unbound (native) structures of the two proteins. Accounting for side--chain flexibility is an important step towards fully flexible protein docking. This work describes an approach that allows conformational flexibility for the side--chains while keeping the protein backbone rigid. Starting from candidates created by a rigid docking algorithm, we demangle the side--chains of the docking site, thus creating reasonable approximations of the true complex structure. These structures are ranked with respect to the binding free energy. We present two new techniques for side--chain demangling. Both approaches are based on a discrete representation of the side--chain conformational space by the use of a rotamer library. This leads to a combinatorial optimization problem. For the solution of this problem we propose a fast heuristic approach and an exact, albeit slower method using branch--\&--cut techniques. As a test set we use the unbound structures of three proteases and the corresponding protein inhibitors. For each of the examples the highest--ranking conformation produced was a good approximation of the true complex structure. \end{abstract} }, } @INPROCEEDINGS{AKX08, AUTHOR = {Albrecht, Marc and Karrenbauer, Andreas and Xu, Chihao}, TITLE = {A clipper-free Algorithm for efficient HW-Implementation of local dimming LED-Backlight}, BOOKTITLE = {Proceedings of the 28th International Display Research Conference (IDRC)}, PADDRESS = {Campbell, USA}, ADDRESS = {Orlando, Florida, USA}, PUBLISHER = {SID Society for Information Display}, MONTH = {November}, YEAR = {2008}, PAGES = {286--289}, } @ARTICLE{Albers-et-al95, AUTHOR = {Albers, Susanne and von Stengel, Bernhard and Wechner, Ralph}, JOURNAL = {Information Processing Letters}, TITLE = {A combined BIT and TIMESTAMP algorithm for the list update problem}, NUMBER = {3}, PUBLISHER = {Elsevier}, VOLUME = {56}, ISBN = {0020-0190}, YEAR = {1995}, PAGES = {135--139}, } @INPROCEEDINGS{Albers-Koga95, AUTHOR = {Albers, Susanne and Koga, Hisashi}, EDITOR = {Akl, Selim G. and Dehne, Frank and Sack, J{\"o}rg-R{\"u}diger and Santoro, Nicola}, TITLE = {Page migration with limited local memory capacity}, BOOKTITLE = {Algorithms and Data Structures: 4th International Workshop (WADS95)}, PADDRESS = {Berlin}, ADDRESS = {Kingston, Canada}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {955}, YEAR = {1995}, PAGES = {412--158}, } @ARTICLE{Albers1998a, AUTHOR = {Albers, Susanne}, JOURNAL = {Theoretical Computer Science}, TITLE = {A competitive analysis of the list update problem with lookahead}, NUMBER = {1/2}, VOLUME = {197}, ISBN = {0304-3975}, YEAR = {1998}, PAGES = {95--109}, } @ARTICLE{Albers1998b, AUTHOR = {Albers, Susanne}, JOURNAL = {SIAM Journal on Computing}, TITLE = {Improved randomized on-line algorithms for the list update problem}, NUMBER = {3}, VOLUME = {27}, ISBN = {0097-5397}, YEAR = {1998}, PAGES = {682--693}, } @PHDTHESIS{Albers1999, AUTHOR = {Albers, Susanne}, TITLE = {{Online-Algorithmen}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Habilitation thesis}, YEAR = {1999}, } @ARTICLE{Albers2000, AUTHOR = {Albers, Susanne}, JOURNAL = {SIAM Journal on Computing}, TITLE = {Better bounds for online scheduling}, ADDRESS = {Philadelphia, USA}, NUMBER = {2}, PUBLISHER = {SIAM}, VOLUME = {29}, ISBN = {0097-5397}, YEAR = {1999}, PAGES = {459--473}, } @INPROCEEDINGS{Albers95, AUTHOR = {Albers, Susanne}, TITLE = {Improved randomized on-line algorithms for the list update problem}, BOOKTITLE = {6th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA95)}, PADDRESS = {New York}, ADDRESS = {San Francisco, California, USA}, PUBLISHER = {acm-Press}, YEAR = {1995}, PAGES = {412--419}, } @INPROCEEDINGS{Albers96, AUTHOR = {Albers, Susanne and Mitzenmacher, Michael}, EDITOR = {Meyer auf der Heide, Friedhelm and Monien, Burkhard}, TITLE = {Average Case Analysis of List Update Algorithms, with Applications to Data Compression}, BOOKTITLE = {Automata, Languages and Programming: 23rd International Colloquium (ICALP'96)}, PADDRESS = {Berlin}, ADDRESS = {Paderborn, Germany}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1099}, YEAR = {1996}, PAGES = {514--525}, } @INPROCEEDINGS{Albers97a, AUTHOR = {Albers, Susanne}, TITLE = {Better Bounds for Online Scheduling}, BOOKTITLE = {Proceedings of the 29th Annual ACM Symposium on Theory of Computing (STOC-97)}, ORGANIZATION = {Association of Computing Machinery (ACM)}, PADDRESS = {New York}, ADDRESS = {El Paso, Texas}, PUBLISHER = {ACM Press}, YEAR = {1997}, PAGES = {130--139}, } @ARTICLE{Albers97b, AUTHOR = {Albers, Susanne}, JOURNAL = {Algorithmica}, TITLE = {On the Influence of Lookahead in Competitive Paging Algorithms}, NUMBER = {3}, VOLUME = {18}, YEAR = {1997}, PAGES = {283--305}, } @INPROCEEDINGS{AlbersAroraKhanna1999, AUTHOR = {Albers, Susanne and Arora, Sanjeev and Khanna, Sanjeev}, TITLE = {Page replacement for general caching problems}, BOOKTITLE = {Proceedings of the 10th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-99)}, PADDRESS = {New York, USA}, ADDRESS = {Baltimore, USA}, PUBLISHER = {ACM}, ISBN = {0-89871-434-6}, YEAR = {1999}, PAGES = {31--40}, } @INPROCEEDINGS{AlbersCharikarMitzenmacher1998, AUTHOR = {Albers, Susanne and Charikar, Moses and Mitzenmacher, Michael}, TITLE = {On delayed information and action in on-line algorithms}, BOOKTITLE = {Proceedings of the 39th Annual IEEE Symposium on Foundations of Computer Science (FOCS-98)}, PADDRESS = {Los Alamitos, USA}, ADDRESS = {Palo Alto, USA}, PUBLISHER = {IEEE}, YEAR = {1998}, PAGES = {71--80}, } @INPROCEEDINGS{AlbersGargLeonardi1998, AUTHOR = {Albers, Susanne and Garg, Naveen and Leonardi, Stefano}, TITLE = {Minimizing stall time in single and parallel disk systems}, BOOKTITLE = {Proceedings of the 30th Annual ACM Symposium on Theory of Computing (STOC-98)}, PADDRESS = {New York, USA}, ADDRESS = {Dallas, USA}, PUBLISHER = {ACM Press}, YEAR = {1998}, PAGES = {454--462}, } @ARTICLE{AlbersGargLeonardi2000, AUTHOR = {Albers, Susanne and Garg, Naveen and Leonardi, Stefano}, JOURNAL = {Journal of the ACM}, TITLE = {Minimizing stall time in single and parallel disk systems}, ADDRESS = {New York, USA}, NUMBER = {6}, PUBLISHER = {ACM Press}, VOLUME = {47}, ISBN = {0004-5411}, YEAR = {2000}, PAGES = {969--986}, } @ARTICLE{AlbersHagerup97, AUTHOR = {Albers, Susanne and Hagerup, Torben}, JOURNAL = {Information and Computation}, TITLE = {Improved Parallel Integer Sorting without Concurrent Writing}, NUMBER = {1}, MONTH = {July}, VOLUME = {136}, YEAR = {1997}, PAGES = {25--51}, } @INPROCEEDINGS{AlbersHenzinger97, AUTHOR = {Albers, Susanne and Henzinger, Monika R.}, TITLE = {Exploring Unknown Environments}, BOOKTITLE = {Proceedings of the 29th Annual ACM Symposium on Theory of Computing (STOC-97)}, ORGANIZATION = {Association of Computing Machinery (ACM)}, PADDRESS = {New York}, ADDRESS = {El Paso, Texas}, PUBLISHER = {ACM Press}, YEAR = {1997}, PAGES = {416--425}, } @ARTICLE{AlbersKoga1998, AUTHOR = {Albers, Susanne and Koga, Hisashi}, JOURNAL = {Journal of Algorithms}, TITLE = {New on-line algorithms for the page replication problem}, VOLUME = {27}, ISBN = {0196-6774}, YEAR = {1998}, PAGES = {75--96}, } @INPROCEEDINGS{AlbersKursaweSchuierer1999, AUTHOR = {Albers, Susanne and Kursawe, Klaus}, TITLE = {Exploring unknown environments with obstacles}, BOOKTITLE = {Proceedings of the 10th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-99)}, PADDRESS = {New York, USA}, ADDRESS = {Baltimore, USA}, PUBLISHER = {ACM}, YEAR = {1999}, PAGES = {842--843}, } @ARTICLE{AlbersMitzenmacher1998a, AUTHOR = {Albers, Susanne and Mitzenmacher, Michael}, JOURNAL = {Algorithmica}, TITLE = {Average case analyses of list update algorithms, with applications to data compression}, NUMBER = {3}, VOLUME = {21}, ISBN = {0178-4617}, YEAR = {1998}, PAGES = {312--329}, } @INPROCEEDINGS{AlbersMitzenmacher1998b, AUTHOR = {Albers, Susanne and Mitzenmacher, Michael}, TITLE = {Average case analyses of First-Fit and Random-Fit bin packing}, BOOKTITLE = {Proceedings of the 9th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-98)}, PADDRESS = {New York, USA}, ADDRESS = {San Francisco, USA}, PUBLISHER = {ACM Press / SIAM}, YEAR = {1998}, PAGES = {290--299}, } @ARTICLE{AlbersMitzenmacher97, AUTHOR = {Albers, Susanne and Mitzenmacher, Michael}, JOURNAL = {Information Processing Letters}, TITLE = {Revisiting the COUNTER algorithms for list update}, NUMBER = {3}, VOLUME = {64}, YEAR = {1997}, PAGES = {155--160}, } @INCOLLECTION{AlbersWestbrook1998, AUTHOR = {Albers, Susanne and Westbrook, Jeffery}, EDITOR = {Fiat, Amos and Woeginger, Gerhard J.}, TITLE = {Self-organizing data structures}, BOOKTITLE = {Online Algorithms: The State of the Art}, ADDRESS = {Berlin, Germany}, PUBLISHER = {Springer}, MONTH = {January}, SERIES = {Springer Lecture Notes in Computer Science}, VOLUME = {1442}, YEAR = {1998}, PAGES = {13--51}, } @ARTICLE{Albers/Mitzenmacher/2000, AUTHOR = {Albers, Susanne and Mitzenmacher, Michael}, JOURNAL = {Random Structures \& Algorithms}, TITLE = {Average-Case Analyses of First Fit and Random Fit Bin Packing}, ADDRESS = {New York, USA}, NUMBER = {3}, PUBLISHER = {Wiley}, MONTH = {May}, VOLUME = {16}, YEAR = {2000}, PAGES = {240 -- 259}, } @INPROCEEDINGS{Alberts-et-al-98, AUTHOR = {Alberts, David and Cattaneo, G and Italiano, Giuseppe and Nanni, Umberto and Zaroliagis, Christos}, EDITOR = {Battiti, R and Bertosi, A}, TITLE = {A Software Library of Dynamic Graph Algorithms}, BOOKTITLE = {Proceedings of Workshop on Algorithms and Experiments (ALEX-98)}, PADDRESS = {Trento, Italy}, ADDRESS = {Trento, Italy}, PUBLISHER = {University of Trento}, YEAR = {1998}, PAGES = {129--136}, ABSTRACT = {We report on a software library of dynamic graph algorithms. It was written in \CC as an extension of LEDA, the library of efficient data types and algorithms. It contains implementations of simple data structures as well as of sophisticated data structures for dynamic connectivity, dynamic minimum spanning trees, dynamic single source shortest paths, and dynamic transitive closure. All data structures are implemented by classes derived from a common base class, thus they have a common interface. Additionally, the base class is in charge of keeping all dynamic data structures working on the same graph consistent. It is possible to change the structure of a graph by a procedure which is not aware of the dynamic data structures initialized for this graph. The library is easily extendible.}, } @PROCEEDINGS{Albrecht:1987:PAA, EDITOR = {Albrecht, Andreas and Jung, Hermann and Mehlhorn, Kurt}, TITLE = {Parallel algorithms and architectures (WPAA-87) : international workshop}, PADDRESS = {Berlin, Germany}, ADDRESS = {Suhl, FRG}, PUBLISHER = {Akademie-Verlag}, SERIES = {Mathematical research / Mathematische Forschung}, VOLUME = {38}, ISBN = {3-05-500397-7}, YEAR = {1987}, PAGES = {205}, } @PROCEEDINGS{Albrecht:1987:PAA, EDITOR = {Albrecht, Andreas and Jung, Hermann and Mehlhorn, Kurt}, TITLE = {Parallel algorithms and architectures : International Workshop}, PADDRESS = {Berlin, Germany}, ADDRESS = {Suhl, FRG}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {269}, ISBN = {3-540-18099-0}, YEAR = {1987}, PAGES = {205}, } @INPROCEEDINGS{Albrecht:1987:PAAa, AUTHOR = {Alt, Helmut and Hagerup,Torben and Mehlhorn, Kurt and Preparata, Franco P.}, EDITOR = {Albrecht, Andreas and Jung, Hermann and Mehlhorn, Kurt}, TITLE = {Deterministic Simulation of Idealized Parallel Computers on more Realistic Ones}, BOOKTITLE = {Parallel Algorithms and Architectures : International Workshop}, PADDRESS = {Berlin, Germany}, ADDRESS = {Suhl, FRG}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {269}, ISBN = {3-540-18099-0}, YEAR = {1987}, PAGES = {11--15}, } @ARTICLE{AlcarayFKKMPB2012, AUTHOR = {Alcaraz, Nicolas and Friedrich, Tobias and K{\"o}tzing, Timo and Krohmer, Anton and M{\"u}ller, Joachim and Pauling, Josch and Baumbach, Jan}, JOURNAL = {Integrative Biology}, TITLE = {Efficient key pathway mining: combining networks and {OMICS} data}, ADDRESS = {London}, NUMBER = {7}, PUBLISHER = {The Royal Society of Chemistry}, VOLUME = {4}, ISBN = {1757-9694}, DOI = {10.1039/C2IB00133K}, YEAR = {2012}, PAGES = {756--764}, } @ARTICLE{ALGOR::FleischerMRWY1992, AUTHOR = {Fleischer, Rudolf and Mehlhorn, Kurt and Rote, G{\"u}nter and Welzl, Emo and Yap, Chee-Keng}, JOURNAL = {Algorithmica}, TITLE = {Simultaneous Inner and Outer Approximation of Shapes}, ADDRESS = {Berlin, Germany}, NUMBER = {5/6}, PUBLISHER = {Springer}, VOLUME = {8}, YEAR = {1992}, PAGES = {365--389}, } @ARTICLE{ALGOR::MehlhornN1990, AUTHOR = {Mehlhorn, Kurt and N{\"a}her, Stefan}, JOURNAL = {Algorithmica}, TITLE = {Dynamic Fractional Cascading}, VOLUME = {5}, YEAR = {1990}, PAGES = {215--241}, } @ARTICLE{ALGOR::MehlhornPS1986, AUTHOR = {Mehlhorn, Kurt and Preparata, Franco P. and Sarrafzadeh, Maji}, JOURNAL = {Algorithmica}, TITLE = {Channel Routing in Knock-Knee Mode: Simplified Algorithms and Proofs}, ADDRESS = {Berlin, Germany}, NUMBER = {2}, PUBLISHER = {Springer}, VOLUME = {1}, YEAR = {1986}, PAGES = {213--221}, } @ARTICLE{ALKM2001, AUTHOR = {Althaus, Ernst and Kohlbacher, Oliver and Lenhof, Hans-Peter and M{\"u}ller, Peter}, JOURNAL = {Journal of Computational Biology}, TITLE = {A combinatorial approach to protein docking with flexible side chains}, ADDRESS = {New York, USA}, NUMBER = {4}, PUBLISHER = {Liebert}, MONTH = {August}, VOLUME = {9}, ISBN = {1066-5277}, YEAR = {2002}, PAGES = {597--612}, } @INPROCEEDINGS{ALNA2008, AUTHOR = {Althaus, Ernst and Naujoks, Rouven}, EDITOR = {McGeoch, Catherine C.}, TITLE = {Reconstructing Phylogenetic Networks with One Recombination}, BOOKTITLE = {Experimental Algorithms, 7th International Workshop, {WEA} 2008}, PADDRESS = {Berlin, Germany}, ADDRESS = {Massachusetts, USA}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5038}, ISBN = {978-3-540-68548-7}, YEAR = {2008}, PAGES = {275--288}, } @INPROCEEDINGS{ALOH:08.soft, AUTHOR = {Angelopoulos, Spyros and Lopez-Ortiz, Alejandro and Hamel,Angele}, TITLE = {Optimal Scheduling of Contract Algorithms with Soft Deadlines}, BOOKTITLE = {23rd National Conference on Artificial Intelligence (AAAI 2008)}, PADDRESS = {Menlo Park}, ADDRESS = {Chicago}, PUBLISHER = {AAAI press}, YEAR = {2008}, PAGES = {868--873}, } @INPROCEEDINGS{AlPoVa2003-lpimprove, AUTHOR = {Althaus, Ernst and Polzin, Tobias and Vahdati Daneshmand, Siavash}, EDITOR = {Jansen, Klaus and Margraf, Marian and Mastrolli, Monaldo and Rolim, Jos{\'e} D. P.}, TITLE = {Improving Linear Programming Approaches for the {Steiner} Tree Problem}, BOOKTITLE = {Experimental and efficient algorithms : Second International Workshop, WEA 2003}, PADDRESS = {Berlin, Germany}, ADDRESS = {Ascona, Switzerland}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {2647}, YEAR = {2003}, PAGES = {1--14}, NOTE = {Pages are not yet known}, ABSTRACT = {We present two theoretically interesting and empirically successful techniques for improving the linear programming approaches, namely graph transformation and local cuts, in the context of the Steiner problem. We show the impact of these techniques on the solution of the largest benchmark instances ever solved.}, } @TECHREPORT{Alt02/87, AUTHOR = {Alt, Helmut and Mehlhorn, Kurt and Wagener, Hubert and Welzl, Emo}, TITLE = {Congruence, similarity and symmetries of geometric objects}, INSTITUTION = {Universit{\"a}t des Saarlandes / Fachbereich Informatik}, TYPE = {Technischer Bericht}, ADDRESS = {Saarbr{\"u}cken}, NUMBER = {A 02/87}, YEAR = {1987}, PAGES = {17S.}, } @INPROCEEDINGS{AltCan2008, AUTHOR = {Althaus, Ernst and Canzar, Stefan}, TITLE = {LASA: A tool for non-heuristic alignment of multiple sequences}, BOOKTITLE = {Bioinformatics Research and Development (BIRD’08)}, PADDRESS = {Heidelberg}, ADDRESS = {Vienna, Austria}, PUBLISHER = {Springer}, YEAR = {2008}, PAGES = {489--498}, } @ARTICLE{AltCanJOC08, AUTHOR = {Althaus, Ernst and Canzar, Stefan}, JOURNAL = {Journal of Combinatorial Optimization}, TITLE = {A Lagrangian relaxation approach for the multiple sequence alignment problem}, VOLUME = {16}, YEAR = {2008}, PAGES = {127--154}, } @INPROCEEDINGS{AltCanKar08, AUTHOR = {Althaus, Ernst and Canzar, Stefan and Emmett, Mark and Karrenbauer, Andreas and Marshall, Alan and Meyer-B{\"a}se, Anke and Zhang, Huimin}, TITLE = {Computing H/D-exchange speeds of single residues from data of peptic fragments}, BOOKTITLE = {23rd Annual ACM Symposium on Applied Computing (SAC)}, PADDRESS = {New York}, ADDRESS = {Fortaleza, Brazil}, PUBLISHER = {ACM}, YEAR = {2008}, PAGES = {1273--1277}, } @ARTICLE{AltGuibasMehlhornKarp96, AUTHOR = {Alt, Helmut and Guibas, L. and Mehlhorn, Kurt and Karp, Richard M. and Wigderson, A.}, JOURNAL = {Algorithmica}, TITLE = {A Method for Obtaining Randomized Algorithms with Small Tail Probabilities}, ADDRESS = {New York, USA}, NUMBER = {4/5}, PUBLISHER = {Springer}, VOLUME = {16}, ISBN = {0178-4617}, DOI = {10.1007/BF01940879}, YEAR = {1996}, PAGES = {543--547}, ABSTRACT = {We study strategies for converting randomized algorithms of the Las Vegas type into randomized algorithms with small tail probabilities.}, } @INPROCEEDINGS{Althaus-et-al:experimental-curve, AUTHOR = {Althaus, Ernst and Mehlhorn, Kurt and N{\"a}her, Stefan and Schirra, Stefan}, TITLE = {Experiments on curve reconstruction}, BOOKTITLE = {Proceedings of 2nd Workshop on Algorithm Engineering and Experiments (ALENEX-00)}, PADDRESS = {Albuquerque, USA}, ADDRESS = {San Francisco, USA}, PUBLISHER = {University of New Mexico}, MONTH = {January}, YEAR = {2000}, PAGES = {103--114}, } @ARTICLE{althaus-mehlhorn98, AUTHOR = {Althaus, Ernst and Mehlhorn, Kurt}, JOURNAL = {Information Processing Letters}, TITLE = {Maximum Network Flow with Floating Point Arithmetic}, NUMBER = {3}, VOLUME = {66}, ISBN = {0020-0190}, YEAR = {1998}, PAGES = {109--113}, ABSTRACT = {We discuss the implementation of network flow algorithms in floating point arithmetic. We give an example to illustrate the difficulties that may arise when floating point arithmetic is used without care. We describe an iterative improvement scheme that can be put around any network flow algorithm for integer capacities. The scheme carefully scales the capacities such that all integers arising can be handled exactly using floating point arithmetic. Let n and m be the number of nodes and edges of the network, respectively. For m 109 and with double precision floating point arithmetic, the number of iterations is always bounded by three, and the relative error in the flow value is at most 2−19. For m 106 and with double precision arithmetic, the relative error after the first iteration is bounded by 10−3. }, } @MASTERSTHESIS{Althaus1998, AUTHOR = {Althaus, Ernst}, TITLE = {{Berechnung optimaler Steinerb{\"a}ume in der Ebene}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {December}, YEAR = {1998}, } @PHDTHESIS{Althaus2001d, AUTHOR = {Althaus, Ernst}, TITLE = {Curve Reconstruction and the Traveling Salesman Problem}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Doctoral dissertation}, MONTH = {April}, YEAR = {2001}, } @INPROCEEDINGS{Althaus2002, AUTHOR = {Althaus, Ernst and Bockmayr, Alexander and Elf, Matthias and Kasper, Thomas and J{\"u}nger, Michael and Mehlhorn, Kurt}, EDITOR = {M{\"o}hring, Rolf and Raman, Rajeev}, TITLE = {{SCIL} - Symbolic Constraints in Integer Linear Programming.}, BOOKTITLE = {Algorithms - ESA 2002 : 10th Annual European Symposium}, PADDRESS = {Berlin, Germany}, ADDRESS = {Rom, Italy}, PUBLISHER = {Springer}, MONTH = {September}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {2461}, ISBN = {3-540-44180-8}, YEAR = {2002}, PAGES = {75--87}, ABSTRACT = {We describe a new software system SCIL that introduces symbolic constraints into branch-and-cut-and-price algorithms for integer linear programs. Symbolic constraints are known from constraint programming and contribute significantly to the expressive power, ease of use, and efficiency of constraint programming systems.}, } @INPROCEEDINGS{Althaus2002a, AUTHOR = {Althaus, Ernst and Fink, Christian}, EDITOR = {Cook, William J. and Schulz, Andreas S.}, TITLE = {A Polyhedral Approach to Surface Reconstruction from Planar Contours.}, BOOKTITLE = {Proceedings of the 9th International Conference on Integer Programming and Combinatorial Optimization}, PADDRESS = {Berlin, Germany}, ADDRESS = {Cambridge, USA}, PUBLISHER = {Springer}, MONTH = {May}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {2337}, ISBN = {3-540-43676-6}, YEAR = {2002}, PAGES = {258--272}, ABSTRACT = {We investigate the problem of reconstruction a surface given its contours on parallel slices. We present a branch-and-cut algorithm which computes the surface with the minimal area. This surface is assumed to be the best reconstruction since a long time. Nevertheless there were no algorithms to compute this surface. Our experiments show that the running time of our algorithm is very reasonable and that the computed surfaces are highly similar to the original surfaces.}, } @INPROCEEDINGS{Althaus2002b, AUTHOR = {Althaus, Ernst and Caprara, Alberto and Lenhof, Hans-Peter and Reinert, Knut}, EDITOR = {Lengauer, Thomas}, TITLE = {Multiple sequence alignment with arbitrary gap costs: Computing an optimal solution using polyhedral combinatorics}, BOOKTITLE = {Proceedings of the European Conference on Computational Biology (ECCB 2002)}, PADDRESS = {Oxford, UK}, ADDRESS = {Saarbr{\"u}cken}, NUMBER = {Supplement 2}, PUBLISHER = {Oxford University Press}, MONTH = {October}, SERIES = {Bioinformatics}, VOLUME = {18}, YEAR = {2002}, PAGES = {S4--S16}, ABSTRACT = {Multiple sequence alignment is one of the dominant problems in computational molecular biology. Numerous scoring functions and methods have been proposed, most of which result in NP-hard problems. In this paper we propose for the first time a general formulation for multiple alignment with arbitrary gap-costs based on an integer linear program (ILP). In addition we describe a branch-and-cut algorithm to effectively solve the ILP to optimality. We evaluate the performances of our approach in terms of running time and quality of the alignments using the BAliBase database of reference alignments. The results show that our implementation ranks amongst the best programs developed so far.}, } @INPROCEEDINGS{Althaus2003, AUTHOR = {Althaus, Ernst and Calinescu, Gruia and Mandoiu, Ion and Prasad, Sushil and Tchervenski, Nickolay and Zelikovsly, Alexander}, TITLE = {Power Efficient Range Assignment in Ad-hoc Wireless}, BOOKTITLE = {Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC-03)}, PADDRESS = {New Orleans, USA}, ADDRESS = {New Orleans, USA}, PUBLISHER = {IEEE}, MONTH = {March}, YEAR = {2003}, PAGES = {1889--1894}, } @INPROCEEDINGS{Althaus2004, AUTHOR = {Althaus, Ernst and Karamanis, Nikiforos and Koller, Alexander}, TITLE = {Computing Locally Coherent Discourses.}, BOOKTITLE = {Proceedings of the conference and workshops, 42nd annual meeting of the Association for Computational Linguistics}, PADDRESS = {East Stroudsburg, USA}, ADDRESS = {Barcelona, Spain}, PUBLISHER = {ACL}, ISBN = {1-932432-34-5}, YEAR = {2004}, PAGES = {399--406}, ABSTRACT = {We present the first algorithm that computes optimal orderings of sentences into a locally coherent discourse. The algorithm runs very efficiently on a variety of coherence measures from the literature. We also show that the discourse ordering problem is NP-complete and cannot be approximated.}, } @ARTICLE{Althaus2006, AUTHOR = {Althaus, Ernst and Calinescu, Gruia and Mandoiu, Ion and Prasad, Sushil and Tchervenski, Nickolay and Zelikovsly, Alexander}, JOURNAL = {Wireless Networks}, TITLE = {Power efficient range assignment for symmetric connectivity in static ad-hoc wireless networks}, NUMBER = {3}, VOLUME = {12}, YEAR = {2006}, PAGES = {287--299}, } @ARTICLE{Althaus2006, AUTHOR = {Althaus, Ernst and Caprara, Alberto and Lenhof, Hans-Peter and Reinert, Knut}, JOURNAL = {Mathematical Programming}, TITLE = {Aligning multiple sequences by cutting planes}, VOLUME = {2006}, YEAR = {2006}, PAGES = {387--425}, } @ARTICLE{Althaus2006a, AUTHOR = {Althaus, Ernst and Calinescu, Gruia and Mandoiu, Ion and Prasad, Sushil and Tchervenski, Nickolay and Zelikovsly, Alexander}, JOURNAL = {Wireless Networks}, TITLE = {Power efficient range assignment for symmetric connectivity in static ad-hoc wireless networks}, NUMBER = {3}, VOLUME = {12}, YEAR = {2006}, PAGES = {287--299}, } @INPROCEEDINGS{Althaus2007, AUTHOR = {Althaus, Ernst and Canzar, Stefan}, EDITOR = {Dress, Andreas and Xu, Yinfeng and Zhu, Binhai}, TITLE = {A Lagrangian relaxation approach for the multiple sequence alignment problem}, BOOKTITLE = {Combinatorial Optimization and Applications : First International Conference, COCOA 2007}, PADDRESS = {New York, USA}, ADDRESS = {Xi'an, Shaanxi, China}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4616}, DOI = {10.1007/978-3-540-73556-4_29}, YEAR = {2007}, PAGES = {267--278}, } @INPROCEEDINGS{Althaus2007a, AUTHOR = {Althaus, Ernst and Baumann, Tobias and Sch{\"o}mer, Elmar and Werth, Kai}, TITLE = {Trunk Packing Revisited}, BOOKTITLE = {Experimental Algorithms, 6th International Workshop}, PADDRESS = {New York, USA}, ADDRESS = {Rome, Italy}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4525}, YEAR = {2007}, PAGES = {420--432}, } @INPROCEEDINGS{Althaus2011, AUTHOR = {Althaus, Ernst and Kupilas, Joschka and Naujoks, Rouven}, EDITOR = {Ogihara, Mitsunori and Tarui, Jun}, TITLE = {On the Low-Dimensional {Steiner} Minimum Tree Problem in {Hamming} Metric}, BOOKTITLE = {Theory and Applications of Models of Computation : 8th Annual Conference, TAMC 2011}, PADDRESS = {Heidelberg}, ADDRESS = {Tokyo, Japan}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6648}, ISBN = {978-3-642-20876-8}, DOI = {10.1007/978-3-642-20877-5_31}, YEAR = {2011}, PAGES = {308--319}, NOTE = {to appear}, } @INPROCEEDINGS{AlthausD09, AUTHOR = {Althaus, Ernst and Dumitriu, Daniel}, EDITOR = {Vahrenhold, Jan}, TITLE = {Fast and Accurate Bounds on Linear Programs}, BOOKTITLE = {Experimental Algorithms : 8th International Symposium on Experimental Algorithms (SEA 2009)}, PADDRESS = {Berlin}, ADDRESS = {Dortmund, Germany}, PUBLISHER = {Springer}, MONTH = {June}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5526}, ISBN = {978-3-642-02010-0}, DOI = {10.1007/978-3-642-02011-7_6}, YEAR = {2009}, PAGES = {40--50}, } @INPROCEEDINGS{AlthausMehlhorn1999, AUTHOR = {Althaus, Ernst and Mehlhorn, Kurt}, TITLE = {TSP-Based Curve Reconstruction in Polynomial Time}, BOOKTITLE = {Proceedings of the 11th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-00)}, ORGANIZATION = {ACM Special Interest Group on Algorithms and Computation Theory and SIAM Activity Group on Discrete Mathematics}, PADDRESS = {New York, USA}, ADDRESS = {San Francisco, USA}, PUBLISHER = {ACM}, ISBN = {0-89871-453-2}, YEAR = {2000}, PAGES = {686--695}, ABSTRACT = {An instance of the curve reconstruction problem is a finite sample set $V$ of an unknown curve $\gamma$. The task is to connect the points in $V$ in the order in which they lie on $\gamma$. Giesen~\cite{SCG99*207} showed recently that the Traveling Salesman tour of $V$ solves the reconstruction problem under fairly week assumptions on $\gamma$ and $V$. We extend his result along three dimensions. We weaken the assumptions, give an alternate proof, and show that in the context of curve reconstruction, the Traveling Salesman tour can be constructed in polynomial time.}, } @ARTICLE{AltMeh2001j, AUTHOR = {Althaus, Ernst and Mehlhorn, Kurt}, JOURNAL = {SIAM Journal on Computing}, TITLE = {Traveling Salesman-Based Curve Reconstruction in Polynomial Time}, ADDRESS = {Philadelphia, USA}, NUMBER = {1}, PUBLISHER = {SIAM}, VOLUME = {31}, ISBN = {0097-5397}, YEAR = {2001}, PAGES = {27--66}, ABSTRACT = {An instance of the curve reconstruction problem is a finite sample set $V$ of an unknown curve $\gamma$. The task is to connect the points in $V$ in the order in which they lie on $\gamma$. Giesen~\cite{Giesen:TSP} showed recently that the Traveling Salesman tour of $V$ solves the reconstruction problem under fairly week assumptions on $\gamma$ and $V$. We extend his result along three dimensions. We weaken the assumptions, give an alternate proof, and show that in the context of curve reconstruction, the Traveling Salesman tour can be constructed in polynomial time. }, } @INPROCEEDINGS{AlvarezBCS12, AUTHOR = {Alvarez, Victor and Bringmann, Karl and Curticapean, Radu and Ray, Saurabh}, EDITOR = {Dey, Tamal K. and Whitesides, Sue}, TITLE = {Counting Crossing Free Structures}, BOOKTITLE = {Proceedings of the Twenty-Eight Annual Symposium on Computational Geometry (SCG'12)}, ORGANIZATION = {ACM}, PADDRESS = {New York, NY}, ADDRESS = {Chapel Hill, NC, USA}, PUBLISHER = {ACM}, ISBN = {978-1-4503-1299-8}, DOI = {10.1145/2261250.2261259}, YEAR = {2012}, PAGES = {61--68}, ABSTRACT = {Let P be a set of n points in the plane. A crossing-free structure on P is a straight-edge planar graph with vertex set in P. Examples of crossing-free structures include triangulations of P, and spanning cycles of P, also known as polygonalizations of P, among others. There has been a large amount of research trying to bound the number of such structures. In particular, bounding the number of triangulations spanned by P has received considerable attention. It is currently known that every set of n points has at most O(30^n) and at least Ω(2.43^n) triangulations. However, much less is known about the algorithmic problem of counting crossing-free structures of a given set P. For example, no algorithm for counting triangulations is known that, on all instances, performs faster than enumerating all triangulations. In this paper we develop a general technique for computing the number of crossing-free structures of an input set P. We apply the technique to obtain algorithms for computing the number of triangulations and spanning cycles of P. The running time of our algorithms is upper bounded by n^O(k), where k is the number of onion layers of P. In particular, we show that our algorithm for counting triangulations is not slower than O(3.1414^n). Given that there are several well-studied configurations of points with at least Ω(3.464^n) triangulations, and some even with Ω(8^n) triangulations, our algorithm is the first to asymptotically outperform any enumeration algorithm for such instances. In fact, it is widely believed that any set of n points must have at least Ω(3.464^n) triangulations. If this is true, then our algorithm is strictly sub-linear in the number of triangulations counted. We also show that our techniques are general enough to solve the restricted triangulation counting problem, which we prove to be W[2]-hard in the parameter k. This implies a “no free lunch” result: In order to be fixed-parameter tractable, our general algorithm must rely on additional properties that are specific to the considered class of structures. }, } @INPROCEEDINGS{AlvarezBRS13, AUTHOR = {Alvarez, Victor and Bringmann, Karl and Ray, Saurabh and Seidel, Raimund}, TITLE = {Counting Triangulations Approximately}, BOOKTITLE = {25th Canadian Conference on Computational Geometry (CCCG-13)}, PADDRESS = {Waterloo, Ontario, Canada}, ADDRESS = {Waterloo, Ontario, Canada}, YEAR = {2013}, PAGES = {85--89}, } @INPROCEEDINGS{AmaldiIulianoetal009, AUTHOR = {Amaldi, Edoardo and Iuliano, Claudio and Jurkiewicz, Tomasz and Mehlhorn, Kurt and Rizzi, Romeo}, EDITOR = {Fiat, Amos and Sanders, Peter}, TITLE = {Breaking the {$O(m^2n)$} Barrier for Minimum Cycle Bases}, BOOKTITLE = {Algorithms - ESA 2009 : 17th Annual European Symposium}, PADDRESS = {Berlin, Germany}, ADDRESS = {Copenhagen, Denmark}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5757}, ISBN = {978-3-642-04127-3}, DOI = {10.1007/978-3-642-04128-0_28}, YEAR = {2009}, PAGES = {301--312}, } @INPROCEEDINGS{AmbalathBalasundaramHKoppulaMisraPhilipRamanujan2010, AUTHOR = {Ambalath, Abhimanyu M. and Balasundaram, Radheshyam and H., Chintan Rao and Koppula, Venkata and Misra, Neeldhara and Philip, Geevarghese and Ramanujan, M. S.}, EDITOR = {Raman, Venkatesh and Saurabh, Saket}, TITLE = {On the Kernelization Complexity of Colorful Motifs}, BOOKTITLE = {Parameterized and Exact Computation - 5th International Symposium, IPEC 2010, Chennai, India, December 13-15, 2010. Proceedings}, PADDRESS = {Berlin}, ADDRESS = {Chennai, India}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6478}, ISBN = {978-3-642-17492-6}, DOI = {10.1007/978-3-642-17493-3}, YEAR = {2010}, PAGES = {14--25}, ABSTRACT = {The {\sc Colorful Motif} problem asks if, given a vertex-colored graph $G$, there exists a subset $S$ of vertices of $G$ such that the graph induced by $G$ on $S$ is connected and contains every color in the graph exactly once. The problem is motivated by applications in computational biology and is also well-studied from the theoretical point of view. In particular, it is known to be NP-complete even on trees of maximum degree three~[Fellows et al, ICALP 2007]. In their pioneering paper that introduced the color-coding technique, Alon et al.~[STOC 1995] show, {\em inter alia}, that the problem is FPT on general graphs. More recently, Cygan et al.~[WG 2010] showed that {\sc Colorful Motif} is NP-complete on {\em comb graphs}, a special subclass of the set of trees of maximum degree three. They also showed that the problem is not likely to admit polynomial kernels on forests. We continue the study of the kernelization complexity of the {\sc Colorful Motif} problem restricted to simple graph classes. Surprisingly, the infeasibility of polynomial kernelization persists even when the input is restricted to comb graphs. We demonstrate this by showing a simple but novel composition algorithm. Further, we show that the problem restricted to comb graphs admits polynomially many polynomial kernels. To our knowledge, there are very few examples of problems with many polynomial kernels known in the literature. We also show hardness of polynomial kernelization for certain variants of the problem on trees; this rules out a general class of approaches for showing many polynomial kernels for the problem restricted to trees. Finally, we show that the problem is unlikely to admit polynomial kernels on another simple graph class, namely the set of all graphs of diameter two. As an application of our results, we settle the classical complexity of \cds{} on graphs of diameter two --- specifically, we show that it is \NPC.}, } @ARTICLE{AmGoRa01, AUTHOR = {Ramos, Edgar A. and Amato, Nancy M. and Goodrich, Michael T.}, JOURNAL = {Discrete and Computational Geometry}, TITLE = {A Randomized Algorithm for Triangulating a Simple Polygon in Linear Time}, ADDRESS = {New York, USA}, NUMBER = {2}, PUBLISHER = {Springer}, MONTH = {September}, VOLUME = {26}, ISBN = {0179-5376}, YEAR = {2001}, PAGES = {246--265}, } @ARTICLE{Amini2009a, AUTHOR = {Amini, Omid and P{\'e}rennes, St{\'e}phane and Sau, Ignasi}, JOURNAL = {Theoretical Computer Science}, TITLE = {Hardness and approximation of traffic grooming}, ADDRESS = {Amsterdam, The Netherland}, NUMBER = {38-40}, PUBLISHER = {Elsevier}, VOLUME = {410}, ISBN = {0304-3975}, DOI = {10.1016/j.tcs.2009.04.028}, YEAR = {2009}, PAGES = {3751--3760}, } @INPROCEEDINGS{Aminietal2009, AUTHOR = {Amini, Omid and Peleg, David and P{\'e}rennes, St{\'e}phane and Sau, Ignasi and Saurabh, Saket}, EDITOR = {Bampis, Evripidis and Skutella, Martin}, TITLE = {Degree-Constrained Subgraph Problems: Hardness and Approximation Results}, BOOKTITLE = {Approximation and Online Algorithms : 6th International Workshop, WAOA 2008}, PADDRESS = {Berlin, Germany}, ADDRESS = {Karlsruhe, Germany}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5426}, ISBN = {978-3-540-93979-5}, DOI = {10.1007/978-3-540-93980-1_3}, YEAR = {2009}, PAGES = {29--42}, } @INPROCEEDINGS{AMM2005, AUTHOR = {Arya, Sunil and Malamatos, Theocharis and Mount, David M.}, TITLE = {Space-Time Tradeoffs for Approximate Spherical Range Counting}, BOOKTITLE = {Proceedings of the sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-05)}, PADDRESS = {Philadelphia, USA}, ADDRESS = {Vancouver, Canada}, PUBLISHER = {SIAM}, ISBN = {0-89871-585-7}, YEAR = {2005}, PAGES = {535--544}, } @INPROCEEDINGS{AMM2006a, AUTHOR = {Arya, Sunil and Malamatos, Theocharis and Mount, David M.}, TITLE = {On the Importance of Idempotence}, BOOKTITLE = {Proceedings of the 38th Annual ACM Symposium on Theory of Computing, STOC'06}, PADDRESS = {New York, NY, USA}, ADDRESS = {Seattle, Washington, USA}, PUBLISHER = {ACM}, ISBN = {1-59593-134-1}, YEAR = {2006}, PAGES = {564--573}, ABSTRACT = {Range searching is among the most fundamental problems in computational geometry. An n-element point set in Rd is given along with an assignment of weights to these points from some commutative semigroup. Subject to a fixed space of possible range shapes, the problem is to preprocess the points so that the total semigroup sum of the points lying within a given query range η can be determined quickly. In the approximate version of the problem we assume that η is bounded, and we are given an approximation parameter $\varepsilon$ > 0. We are to determine the semigroup sum of all the points contained within η and may additionally include any of the points lying within distance $\varepsilon$ • diam(η) of η's boundar.In this paper we contrast the complexity of range searching based on semigroup properties. A semigroup (S,+) is idempotent if x + x = x for all x ∈ S, and it is integral if for all k ≥ 2, the k-fold sum x + ... + x is not equal to x. For example, (R, min) and (0,1, ∨) are both idempotent, and (N, +) is integral. To date, all upper and lower bounds hold irrespective of the semigroup. We show that semigroup properties do indeed make a difference for both exact and approximate range searching, and in the case of approximate range searching the differences are dramatic.First, we consider exact halfspace range searching. The assumption that the semigroup is integral allows us to improve the best lower bounds in the semigroup arithmetic model. For example, assuming O(n) storage in the plane and ignoring polylog factors, we provide an Ω*(n2/5) lower bound for integral semigroups, improving upon the best lower bound of Ω*(n1/3), thus closing the gap with the O(n1/2) upper bound.We also consider approximate range searching for Euclidean ball ranges. We present lower bounds and nearly matching upper bounds for idempotent semigroups. We also present lower bounds for range searching for integral semigroups, which nearly match existing upper bounds. These bounds show that the advantages afforded by idempotency can result in major improvements. In particular, assuming roughly linear space, the exponent in the $\varepsilon$-dependencies is smaller by a factor of nearly 1/2. All our results are presented in terms of space-time tradeoffs, and our lower and upper bounds match closely throughout the entire spectrum.To our knowledge, our results provide the first proof that semigroup properties affect the computational complexity of range searching in the semigroup arithmetic model. These are the first lower bound results for any approximate geometric retrieval problems. The existence of nearly matching upper bounds, throughout the range of space-time tradeoffs, suggests that we are close to resolving the computational complexity of both idempotent and integral approximate spherical range searching in the semigroup arithmetic model.}, } @INPROCEEDINGS{AMM2006b, AUTHOR = {Arya, Sunil and Malamatos, Theocharis and Mount, David M.}, EDITOR = {Amenta, Nina and Cheong, Otfried}, TITLE = {The Effect of Corners on the Complexity of Approximate Range Searching}, BOOKTITLE = {Proceedings of the 22nd Annual Symposium on Computational Geometry, SCG'06}, PADDRESS = {New York, USA}, ADDRESS = {Sedona, Arizona, USA}, PUBLISHER = {ACM}, ISBN = {1-58113-340-9 }, YEAR = {2006}, PAGES = {11--20}, } @ARTICLE{AMTZ03, AUTHOR = {Arge, Lars and Meyer, Ulrich and Toma, Laura and Zeh, Norbert}, JOURNAL = {Journal of Graph Algorithms and Applications}, TITLE = {On external-memory planar depth first search}, ADDRESS = {Helsinki, Finland}, NUMBER = {2}, PUBLISHER = {European Mathematical Society (EMS)}, VOLUME = {7}, ISBN = {1526-1719}, YEAR = {2003}, PAGES = {105--129}, } @INPROCEEDINGS{Anagnostopoulos2013, AUTHOR = {Anagnostopoulos, Aris and Grandoni, Fabrizio and Leonardi, Stefano and Wiese, Andreas}, TITLE = {Constant Integrality Gap LP formulations of Unsplittable Flow on a Path}, BOOKTITLE = {Proceedings of the 16th Conference on Integer Programming and Combinatorial Optimization (IPCO 2013)}, PADDRESS = {Heidelberg, Germany}, ADDRESS = {Valpara{\'i}so, Chile}, PUBLISHER = {Springer}, YEAR = {2013}, } @INPROCEEDINGS{AnandBFGK13, AUTHOR = {Anand, S and Bringmann, Karl and Friedrich, Tobias and Garg, Naveen and Kumar, Amit}, EDITOR = {Fomin, Fedor V. and Freivalds, Rūsiņ{\v{s}} and Kwiatkowska, Marta and Peleg, David}, TITLE = {Minimizing maximum (weighted) flow-time on related and unrelated machines}, BOOKTITLE = {Automata, Languages, and Programming - 40th International Colloquium (ICALP-13)}, ORGANIZATION = {European Association for Theoretical Computer Science (EATCS)}, PADDRESS = {Heidelberg}, ADDRESS = {Riga, Latvia}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {7965}, ISBN = {978-3-642-39205-4}, YEAR = {2013}, PAGES = {13--24}, } @ARTICLE{AnderssonHagerupetal2000, AUTHOR = {Andersson, Arne and Hagerup, Torben and Hastad, Johan and Petersson, Ola}, JOURNAL = {SIAM Journal on Computing}, TITLE = {Tight bounds for searching a sorted array of strings}, NUMBER = {5}, PUBLISHER = {SIAM}, VOLUME = {30}, ISBN = {0097-5397}, YEAR = {2000}, PAGES = {1552--1578}, } @INPROCEEDINGS{Angelopoulos2007SODA1, AUTHOR = {Angelopoulos, Spyros}, TITLE = {Improved bounds for the online steiner tree problem in graphs of bounded edge-asymmetry}, BOOKTITLE = {Proceedings of the Eighteenth Annual {ACM}-{SIAM} Symposium on Discrete Algorithms, {SODA} 2007}, ORGANIZATION = {Association for Computing Machinery (ACM) and Society for Industrial and Applied Mathematics (SIAM)}, PADDRESS = {Philadelphia, USA}, ADDRESS = {New Orleans, Louisiana, USA}, PUBLISHER = {SIAM}, MONTH = {January}, YEAR = {2007}, PAGES = {248--257}, ABSTRACT = {In this paper we consider the Online Steiner Tree problem in weighted directed graphs of bounded edge-asymmetry $\alpha$. The edge-asymmetry of a directed graph is defined as the maximum ratio of the cost (weight) of antiparallel edges in the graph. The problem has applications in multicast routing over a network with non-symmetric links. We improve the previously known upper and lower bounds on the competitive ratio of any deterministic algorithm due to Faloutsos et al. In particular, we show that a better analysis of a simple greedy algorithm yields a competitive ratio of O (min {k, $\alpha$ log k/log log $\alpha$}), where k denotes the number of terminals requested. On the negative side, we show a lower bound of Ω(min{k1-$\varepsilon$, $\alpha$ log k/log log k}) on the competitive ratio of every deterministic algorithm for the problem, for any arbitrarily small constant $\varepsilon$.}, } @INPROCEEDINGS{Angelopoulos2007SODA2, AUTHOR = {Angelopoulos, Spyros and Dorrigiv, Reza and L{\'o}pez-Ortiz, Alejandro}, TITLE = {On the separation and equivalence of paging strategies}, BOOKTITLE = {Proceedings of the Eighteenth Annual {ACM}-{SIAM} Symposium on Discrete Algorithms, {SODA} 2007}, ORGANIZATION = {Association for Computing Machinery (ACM), Society for Industrial and Applied Mathematics (SIAM)}, PADDRESS = {Philadelphia, USA}, ADDRESS = {New Orleans, Louisiana, USA}, PUBLISHER = {SIAM}, MONTH = {January}, YEAR = {2007}, PAGES = {229--237}, ABSTRACT = {It has been experimentally observed that LRU and variants thereof are the preferred strategies for on-line paging. However, under most proposed performance measures for on-line algorithms the performance of LRU is the same as that of many other strategies which are inferior in practice. In this paper we first show that any performance measure which does not include a partition or implied distribution of the input sequences of a given length is unlikely to distinguish between any two lazy paging algorithms as their performance is identical in a very strong sense. This provides a theoretical justification for the use of a more refined measure. Building upon the ideas of concave analysis by Albers et al. [AFG05], we prove strict separation between LRU and all other paging strategies. That is, we show that LRU is the unique optimum strategy for paging under a deterministic model. This provides full theoretical backing to the empirical observation that LRU is preferable in practice.}, } @ARTICLE{Angelopoulos.Borodin:randomized.2010, AUTHOR = {Angelopoulos, Spyros and Borodin, Allan}, JOURNAL = {Theoretical Computer Science}, TITLE = {Randomized Priority Algorithms}, ADDRESS = {Amsterdam}, NUMBER = {26-28}, PUBLISHER = {Elsevier}, VOLUME = {411}, ISBN = {0304-3975}, DOI = {10.1016/j.tcs.2010.03.014}, YEAR = {2010}, PAGES = {2542--2558}, } @INPROCEEDINGS{Angelopoulos:wads2009, AUTHOR = {Angelopoulos, Spyros}, EDITOR = {Dehne, Frank and Gavrilova, Marina and Sack, J{\"o}rg-R{\"u}diger and T{\'o}th, Csaba D.}, TITLE = {Online {Priority} {Steiner} Tree Problems}, BOOKTITLE = {Algorithms and Data Structures : 11th International Symposium, WADS 2009}, PADDRESS = {Berlin}, ADDRESS = {Banff, Canada}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5664}, ISBN = {978-3-642-03366-7}, DOI = {10.1007/978-3-642-03367-4_4}, YEAR = {2009}, PAGES = {37--48}, } @INPROCEEDINGS{Angelopoulos:waoa2009, AUTHOR = {Angelopoulos, Spyros}, EDITOR = {Bampis, Evripidis and Jansen, Klaus}, TITLE = {On the Competitiveness of the Online Asymmetric and {Euclidean} {Steiner} Tree Problems}, BOOKTITLE = {Approximation and Online Algorithms : 7th International Workshop, WAOA 2009}, PADDRESS = {Berlin}, ADDRESS = {Copenhagen, Denmark}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5893}, ISBN = {978-3-642-12449-5}, DOI = {10.1007/978-3-642-12450-1_1}, YEAR = {2010}, PAGES = {1--12}, } @INPROCEEDINGS{AngLop:ijcai09, AUTHOR = {Angelopoulos, Spyros and Lopez-Ortiz, Alejandro}, TITLE = {Intertruptible Algorithms for Multi Problem Solving}, BOOKTITLE = {Proceedings of the 21st International Joint Conference on Artificial Intelligence (IJCAI 09)}, PADDRESS = {Menlo Park, California}, ADDRESS = {Pasadena, California}, PUBLISHER = {AAAI Press}, ISBN = {978-1-57735-426-0}, YEAR = {2009}, PAGES = {380--386}, } @INPROCEEDINGS{AngSch:2009.bijective, AUTHOR = {Angelopoulos, Spyros and Schweitzer, Pascal}, EDITOR = {Mathieu, Claire}, TITLE = {Paging and List Update under Bijective Analysis}, BOOKTITLE = {Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2009)}, ORGANIZATION = {ACM-SIAM}, PADDRESS = {New York, NY}, ADDRESS = {New York, NY}, PUBLISHER = {ACM}, YEAR = {2009}, PAGES = {1136--1145}, } @INPROCEEDINGS{Ang:08.steiner, AUTHOR = {Angelopoulos, Spyros}, TITLE = {A Near-Tight Bound for the Online Steiner Tree Problem in Graphs of Bounded Asymmetry}, BOOKTITLE = {16th Annual European Symposium on Algorithms (ESA 2008)}, PADDRESS = {New York}, ADDRESS = {Karlsruhe}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5193}, YEAR = {2008}, PAGES = {76--87}, } @INPROCEEDINGS{AnshelevichBH2013, AUTHOR = {Anshelevich, Elliot and Bhardwaj, Onkar and Hoefer, Martin}, EDITOR = {Bodlaender, Hans and Italiano, Giuseppe}, TITLE = {Friendship and Stable Matching.}, BOOKTITLE = {21st European Symposium on Algorithms (ESA-13)}, PADDRESS = {New York, USA}, ADDRESS = {Sophia Antipolis, France}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {8125}, YEAR = {2013}, PAGES = {49--60}, } @INPROCEEDINGS{AntGECCO07, AUTHOR = {Doerr, Benjamin and Neumann, Frank and Sudholt, Dirk and Witt, Carsten}, EDITOR = {Thierens, Dirk}, TITLE = {On the Runtime Analysis of the {1-ANT} {ACO} algorithm}, BOOKTITLE = {Genetic and Evolutionary Computation Conference 2007}, PADDRESS = {New York, USA}, ADDRESS = {London, UK}, PUBLISHER = {ACM}, ISBN = {978-1-59593-697-4}, YEAR = {2007}, PAGES = {33--40}, NOTE = {Best paper award}, } @INPROCEEDINGS{approxMestre2010, AUTHOR = {Hajiaghayi, MohammadTaghi and Khandekar, Rohit and Kortsarz, Guy and Mestre, Julian}, EDITOR = {Serna, Maria and Shaltiel, Ronen and Jansen, Klaus and Rolim, Jos{\'e}}, TITLE = {The Checkpoint Problem}, BOOKTITLE = {Approximation, Randomization, and Combinatorial Optimization : Algorithms and Techniques ; 13th International Workshop, APPROX 2010 and 14th International Workshop, RANDOM 2010}, PADDRESS = {Berlin}, ADDRESS = {Barcelona, Spain}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6302}, ISBN = {978-3-642-15368-6}, DOI = {10.1007/978-3-642-15369-3_17}, YEAR = {2010}, PAGES = {219--231}, } @ARTICLE{Arikati-Chaudhuri-Zaroliagis-98, AUTHOR = {Arikati, Srinivasa Rao and Chaudhuri, Shiva and Zaroliagis, Christos}, JOURNAL = {Journal of Algorithms}, TITLE = {All-Pairs Min-Cut in Sparse Networks}, VOLUME = {29}, ISBN = {0196-6774}, YEAR = {1998}, PAGES = {82--110}, ABSTRACT = {Algorithms are presented for the all-pairs min-cut problem in bounded tree-width, planar and sparse networks. The approach used is to preprocess the input $n$-vertex network so that, afterwards, the value of a min-cut between any two vertices can be efficiently computed. A tradeoff is shown between the preprocessing time and the time taken to compute min-cuts subsequently. In particular, after an $O(n\log n)$ preprocessing of a bounded tree-width network, it is possible to find the value of a min-cut between any two vertices in constant time. This implies that for such networks the all-pairs min-cut problem can be solved in time $O(n^2)$. This algorithm is used in conjunction with a graph decomposition technique of Frederickson to obtain algorithms for sparse and planar networks. The running times depend upon a topological property, $\gamma$, of the input network. The parameter $\gamma$ varies between 1 and $\Theta(n)$; the algorithms perform well when $\gamma = o(n)$. The value of a min-cut can be found in time $O(n + \gamma^2 \log \gamma)$ and all-pairs min-cut can be solved in time $O(n^2 + \gamma^4 \log \gamma)$ for sparse networks. The corresponding running times for planar networks are $O(n+\gamma \log \gamma)$ and $O(n^2 + \gamma^3 \log \gamma)$, respectively. The latter bounds depend on a result of independent interest: outerplanar networks have small ``mimicking'' networks which are also outerplanar.}, } @INPROCEEDINGS{Arikati-et-al95, AUTHOR = {Arikati, Srinivasa Rao and Chaudhuri, Shiva and Zaroliagis, Christos}, EDITOR = {Thiagarajan, P. S.}, TITLE = {All-Pairs Min-Cut in Sparse Networks}, BOOKTITLE = {Foundations of software technology and theoretical computer science (FSTTCS-95) : 15th conference}, PADDRESS = {Berlin, Germany}, ADDRESS = {Bangalore, India}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1026}, YEAR = {1995}, PAGES = {363--376}, } @INPROCEEDINGS{Arikati-et-al96, AUTHOR = {Arikati, Srinivasa Rao and Dessmark, Anders and Lingas, Andrzej and Marathe, Madhav V.}, EDITOR = {Hirschberg, Dan and Myers, Gene}, TITLE = {Approximation algorithms for maximum two-dimensional pattern matching}, BOOKTITLE = {Combinatorial Pattern Matching: 7th Annual Symposium, CPM96}, PADDRESS = {Berlin}, ADDRESS = {Laguna Beach, California, USA}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1075}, YEAR = {1996}, PAGES = {348--360}, } @ARTICLE{Arikati-Maheshwari96, AUTHOR = {Arikati, Srinivasa Rao and Maheshwari, Anil}, JOURNAL = {SIAM Journal of Computing}, TITLE = {Realizing degree sequences in parallel}, NUMBER = {2}, PUBLISHER = {Society for Industrial and Applied Mathematics}, VOLUME = {9}, ISBN = {0097-5397}, YEAR = {1996}, PAGES = {317--338}, } @ARTICLE{Arikati-Mehlhorn, AUTHOR = {Arikati, Srinivasa Rao and Mehlhorn, Kurt}, JOURNAL = {Information Processing Letters}, TITLE = {A correctness certificate for the {Stoer-Wagner} min-cut algorithm}, NUMBER = {5}, PUBLISHER = {Elesevier}, VOLUME = {70}, DOI = {10.1016/S0020-0190(99)00071-X}, YEAR = {1999}, PAGES = {251--254}, ABSTRACT = {The Stoer–Wagner algorithm computes a minimum cut in a weighted undirected graph. The algorithm works in n−1 phases, where n is the number of nodes of G. Each phase takes time O(m+nlogn), where m is the number of edges of G, and computes a pair of vertices s and t and a minimum cut separating s and t. We show how to extend the algorithm such that each phase also computes a maximum flow from s to t. The flow is computed in O(m) additional time and certifies the cut computed in the phase.}, } @ARTICLE{ArikatiDessmarketal2001, AUTHOR = {Arikati, Srinivasa Rao and Dessmark, Anders and Lingas, Andrzej and Marathe, Madhav V.}, JOURNAL = {Theoretical Computer Science}, TITLE = {Approximation algorithms for maximum two-dimensional pattern matching}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {1/2}, PUBLISHER = {Elsevier}, MONTH = {March}, VOLUME = {255}, ISBN = {0304-3975}, YEAR = {2001}, PAGES = {51--62}, } @ARTICLE{ArikatiMaheshwariZaroliagis97, AUTHOR = {Arikati, Srinivasa Rao and Maheshwari, Anil and Zaroliagis, Christos}, JOURNAL = {Discrete Applied Mathematics}, TITLE = {Efficient Computation of implicit representations of sparse graphs}, NUMBER = {1-3}, VOLUME = {78}, YEAR = {1997}, PAGES = {1--16}, } @ARTICLE{AritProg2001, AUTHOR = {Doerr, Benjamin and Srivastav, Anand}, JOURNAL = {Electronic Notes in Discrete Mathematics}, TITLE = {Multi-Color Discrepancy of Arithmetic Progressions}, ADDRESS = {Amsterdam, The Netherlands}, PUBLISHER = {Elsevier}, VOLUME = {8}, ISBN = {1571-0653}, YEAR = {2001}, PAGES = {27--30}, } @INPROCEEDINGS{ArMeTo04, AUTHOR = {Arge, Lars and Meyer, Ulrich and Toma, Laura}, EDITOR = {Diaz, Josep and Karhum{\"a}ki, Juhani and Lepist{\"o}, Arto and Sannella, Donald}, TITLE = {External Memory Algorithms for Diameter and All-Pairs Shortest-Paths on Sparse Graphs}, BOOKTITLE = {Automata, languages and programming : 31st International Colloquium, ICALP 2004}, PADDRESS = {Berlin, Germany}, ADDRESS = {Turku, Finland}, PUBLISHER = {Springer}, MONTH = {July}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {3142}, ISBN = {0302-9743}, YEAR = {2004}, PAGES = {146--157}, } @INPROCEEDINGS{ArMeToZe2001, AUTHOR = {Arge, Lars and Meyer, Ulrich and Toma, Laura and Zeh, Norbert}, EDITOR = {Dehne, Frank and Sack, J{\"o}rg-R{\"u}diger and Tamassia, R.}, TITLE = {On External-Memory Planar Depth First Search}, BOOKTITLE = {Proceedings of the 7th International Workshop on Algorithms and Data Structures (WADS-01)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Providence, Rhode Island, USA}, PUBLISHER = {Springer}, MONTH = {August}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {2125}, ISBN = {3-540-42423-7}, YEAR = {2001}, PAGES = {471--482}, ABSTRACT = {Even though a large number of I/O-efficient graph algorithms have been developed, a number of fundamental problems still remain open. For example, no space- and I/O-efficient algorithms are known for depth-first search or breadth-first search in sparse graphs. In this paper we present two new results on I/O-efficient depth-first search in an important class of sparse graphs, namely undirected embedded planar graphs. We develop a new efficient depth-first search algorithm and show how planar depth-first search in general can be reduced to planar breadth-first search. As part of the first result we develop the first I/O-efficient algorithm for finding a simple cycle separator of a biconnected planar graph. Together with other recent reducibility results, the second result provides further evidence that external memory breadth-first search is among the hardest problems on planar graphs.}, } @INPROCEEDINGS{arumugamchandrasekarmisraphilipsaurabh2011, AUTHOR = {Arumugam, S. and Chandrasekar, K. Raja and Misra, Neeldhara and Philip, Geevarghese and Saurabh, Saket}, EDITOR = {Iliopoulos, Costas S. and Smyth, William F.}, TITLE = {Algorithmic Aspects of Dominator Colorings in Graphs}, BOOKTITLE = {Combinatorial Algorithms - 22nd International Workshop, IWOCA 2011, Victoria, BC, Canada, July 20-22, 2011, Revised Selected Papers}, TYPE = {Revised Selected Paper}, PADDRESS = {Berlin}, ADDRESS = {Victoria, Canada}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {7056}, ISBN = {978-3-642-25010-1}, DOI = {10.1007/978-3-642-25011-8}, YEAR = {2011}, PAGES = {19--30}, ABSTRACT = {In this paper we initiate a systematic study of a problem that has the flavor of two classical problems, namely {\sc Coloring} and {\sc Domination}, from the perspective of algorithms and complexity. A {\it dominator coloring} of a graph $G$ is an assignment of colors to the vertices of $G$ such that it is a proper coloring and every vertex dominates all the vertices of at least one color class. The minimum number of colors required for a dominator coloring of $G$ is called the {\it dominator chromatic number} of $G$ and is denoted by $\chi_d(G).$ In the {\sc Dominator Coloring (DC)} problem, a graph $G$ and a positive integer $k$ are given as input and the objective is to check whether $\chi_d(G)\leq k$. We first show that unless P=NP, DC cannot be solved in polynomial time on bipartite, planar, or split graphs. This resolves an open problem posed by Chellali and Maffray [{\it Dominator Colorings in Some Classes of Graphs, Graphs and Combinatorics, 2011}] about the polynomial time solvability of DC on chordal graphs. We then complement these hardness results by showing that the problem is fixed parameter tractable (FPT) on chordal graphs and in graphs which exclude a fixed apex graph as a minor.}, } @INPROCEEDINGS{Arya-Mount-Narayan95, AUTHOR = {Arya, Sunil and Mount, David M. and Narayan, Oruttom}, TITLE = {Accounting for boundary effects in nearest neighbor searching}, BOOKTITLE = {11th Annual ACM Symposium on Computational Geometry (SCG95)}, PADDRESS = {New York}, ADDRESS = {Vancouver, British Columbia, Canada}, PUBLISHER = {acm-Press}, YEAR = {1995}, PAGES = {336--344}, } @ARTICLE{Arya-Mount-Narayan96, AUTHOR = {Arya, Sunil and Mount, David M. and Narayan, Oruttom}, JOURNAL = {Discrete \& Computational Geometry}, TITLE = {Accounting for boundary effects in nearest neighbor searching}, NUMBER = {2}, PUBLISHER = {Springer}, VOLUME = {16}, ISBN = {0179-5376}, YEAR = {1996}, PAGES = {155--176}, } @INPROCEEDINGS{Arya-Mount95, AUTHOR = {Arya, Sunil and Mount, David M.}, TITLE = {Approximate range searching}, BOOKTITLE = {11th Annual ACM Symposium on Computational Geometry (SCG95)}, PADDRESS = {New York}, ADDRESS = {Vancouver, British Columbia, USA}, PUBLISHER = {acm-Press}, YEAR = {1995}, PAGES = {172--181}, } @INPROCEEDINGS{Arya-Smid95, AUTHOR = {Arya, Sunil and Das, Gautam and Mount, David M. and Salowe, Jeffrey S. and Smid, Michiel}, TITLE = {Euclidean spanners: short, thin, and lanky}, BOOKTITLE = {27th Annual ACM Symposium on Theory of Computing (STOC95)}, PADDRESS = {New York}, ADDRESS = {Las Vegas, Nevada, USA}, PUBLISHER = {acm-Press}, YEAR = {1995}, PAGES = {489--498}, } @ARTICLE{Arya-Smid96, AUTHOR = {Arya, Sunil and Smid, Michiel}, JOURNAL = {Algorithmica}, TITLE = {Efficient construction of a bounded degree spanner with low weight}, NUMBER = {1}, PUBLISHER = {Springer}, VOLUME = {17}, ISBN = {0178-4617}, YEAR = {1997}, PAGES = {33--54}, } @ARTICLE{AryaMount2000, AUTHOR = {Arya, Sunil and Mount, David M.}, JOURNAL = {Computational Geometry}, TITLE = {Approximate range searching}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {3/4}, PUBLISHER = {Elsevier}, VOLUME = {17}, ISBN = {0925-7721}, YEAR = {2000}, PAGES = {135--152}, ABSTRACT = {The range searching problem is a fundamental problem in computational geometry, with numerous important applications. Most research has focused on solving this problem exactly, but lower bounds show that if linear space is assumed, the problem cannot be solved in polylogarithmic time, except for the case of orthogonal ranges. In this paper we show that if one is willing to allow approximate ranges, then it is possible to do much better. In particular, given a bounded range Q of diameter w and >0, an approximate range query treats the range as a fuzzy object, meaning that points lying within distance w of the boundary of Q either may or may not be counted. We show that in any fixed dimension d, a set of n points in can be preprocessed in O(n+logn) time and O(n) space, such that approximate queries can be answered in O(logn(1/)d) time. The only assumption we make about ranges is that the intersection of a range and a d-dimensional cube can be answered in constant time (depending on dimension). For convex ranges, we tighten this to O(logn+(1/)d-1) time. We also present a lower bound for approximate range searching based on partition trees of (logn+(1/)d-1), which implies optimality for convex ranges (assuming fixed dimensions). Finally, we give empirical evidence showing that allowing small relative errors can significantly improve query execution times. }, } @MASTERSTHESIS{Ashoff2000, AUTHOR = {Ashoff, Oliver}, TITLE = {{Agorithmen der modularen Arithmetik}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {January}, YEAR = {2000}, } @ARTICLE{ASS12, AUTHOR = {Agrawal, Manindra and Saha, Chandan and Saxena, Nitin}, JOURNAL = {arXiv}, TITLE = {Quasi-polynomial Hitting-set for Set-depth-Delta Formulas}, ADDRESS = {Ithaca, NY}, PUBLISHER = {Cornell University Library}, VOLUME = {abs/1209.2333}, YEAR = {2012}, PAGES = {1--13}, ABSTRACT = {We call a depth-$4$ formula $C$ {\em set-depth-$4$} if there exists a (unknown) partition $X_1\sqcup\cdots\sqcup X_d$ of the variable indices $[n]$ that the top product layer respects, i.e.~$C(\term{x})=\sum_{i=1}^k \prod_{j=1}^{d}$ $f_{i,j}(\term{x}_{X_j})$, where $f_{i,j}$ is a {\em sparse} polynomial in $\F[\term{x}_{X_j}]$. Extending this definition to any depth - we call a depth-$\D$ formula $C$ (consisting of alternating layers of $\Sigma$ and $\Pi$ gates, with a $\Sigma$-gate on top) a \emph{set-depth-$\D$} formula if every $\Pi$-layer in $C$ respects a (unknown) partition on the variables; if $\D$ is even then the product gates of the bottom-most $\Pi$-layer are allowed to compute arbitrary monomials. In this work, we give a hitting-set generator for set-depth-$\D$ formulas (over \emph{any} field) with running time polynomial in $\exp((\D^2\log s)^{ \Delta - 1})$, where $s$ is the size bound on the input set-depth-$\D$ formula. In other words, we give a {\em quasi}-polynomial time \emph{blackbox} polynomial identity test for such constant-depth formulas. Previously, the very special case of $\D=3$ (also known as {\em set-multilinear} depth-$3$ circuits) had no known sub-exponential time hitting-set generator. This was declared as an open problem by Shpilka \& Yehudayoff (FnT-TCS 2010); the model being first studied by Nisan \& Wigderson (FOCS 1995) and recently by Forbes \& Shpilka (STOC 2012 \& ECCC TR12-115). Our work settles this question, not only for depth-$3$ but, up to depth $\epsilon\log s / \log \log s$, for a fixed constant $\epsilon < 1$. The technique is to investigate depth-$\D$ formulas via depth-$(\D-1)$ formulas over a {\em Hadamard algebra}, after applying a `shift' on the variables. We propose a new algebraic conjecture about the \emph{low-support rank-concentration} in the latter formulas, and manage to prove it in the case of set-depth-$\D$ formulas. }, } @INPROCEEDINGS{ASSS12, AUTHOR = {Agrawal, Manindra and Saha, Chandan and Saptharishi, Ramprasad and Saxena, Nitin}, TITLE = {Jacobian hits circuits: hitting-sets, lower bounds for {depth-D} occur-k formulas \& depth-3 transcendence degree-k circuits}, BOOKTITLE = {STOC'12 : Proceedings of the 2012 ACM Symposium on Theory of Computing}, PADDRESS = {New York, NY}, ADDRESS = {New York, NY}, PUBLISHER = {ACM}, ISBN = {978-1-4503-1245-5}, DOI = {10.1145/2213977.2214033}, YEAR = {2012}, PAGES = {599--614}, ABSTRACT = { We present a single common tool to strictly subsume \emph{all} known cases of polynomial time blackbox polynomial identity testing (PIT), that have been hitherto solved using diverse tools and techniques, over fields of zero or large characteristic. In particular, we show that polynomial time hitting-set generators for identity testing of the two seemingly different and well studied models - depth-$3$ circuits with bounded top fanin, and constant-depth constant-read multilinear formulas - can be constructed using one common algebraic-geometry theme: \emph{Jacobian} captures algebraic independence. By exploiting the Jacobian, we design the {\em first} efficient hitting-set generators for broad generalizations of the bove-mentioned models, namely: \begin{itemize} \item depth-$3$ ($\Sigma \Pi \Sigma$) circuits with constant \emph{transcendence degree} of the polynomials computed by the product gates (\emph{no} bounded top fanin restriction), and \item constant-depth constant-\emph{occur} formulas (\emph{no} multilinear restriction). \end{itemize} Constant-\emph{occur} of a variable, as we define it, is a much more general concept than constant-read. Also, earlier work on the latter model assumed that the formula is multilinear. Thus, our work goes further beyond the related results obtained by Saxena \& Seshadhri (STOC 2011), Saraf \& Volkovich (STOC 2011), Anderson et al.\ (CCC 2011), Beecken et al.\ (ICALP 2011) and Grenet et al.\ (FSTTCS 2011), and brings them under one unifying technique. In addition, using the same Jacobian based approach, we prove exponential lower bounds for the immanant (which includes permanent and determinant) on the \emph{same} depth-$3$ and depth-$4$ models for which we give efficient PIT algorithms. Our results reinforce the intimate connection between identity testing and lower bounds by exhibiting a concrete mathematical tool - the Jacobian - that is equally effective in solving both the problems on certain interesting and previously well-investigated (but not well understood) models of computation.}, } @BOOK{AugerD11, EDITOR = {Auger, Anne and Doerr, Benjamin}, TITLE = {Theory of Randomized Search Heuristics}, ADDRESS = {Singapore}, PUBLISHER = {World Scientific Publishing}, SERIES = {Series on Theoretical Computer Science}, VOLUME = {1}, ISBN = {978-981-4282-66-6}, YEAR = {2011}, PAGES = {382}, } @ARTICLE{AulettaDinitzNutuvDomenico1999, AUTHOR = {Auletta, Vincenzo and Dinitz, Yefim and Nutov, Zeev and Parente, Domenico}, JOURNAL = {Journal of Algorithms}, TITLE = {A 2-approximation algorithm for finding an optimum 3-vertex-connected spanning subgraph}, NUMBER = {1}, PUBLISHER = {Academic Press}, VOLUME = {32}, YEAR = {1999}, PAGES = {21--30}, } @UNPUBLISHED{avgFPTsubmitted, AUTHOR = {Fountoulakis, Nikolaos and Friedrich, Tobias and Hermelin, Danny}, TITLE = {Average Case Parameterized Complexity}, YEAR = {2011}, NOTE = {Submitted}, } @MASTERSTHESIS{BachBecker2012, AUTHOR = {Becker, Ruben}, TITLE = {The {Bolzano} Method to Isolate the Roots of a Bitstream Polynomial}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Bachelor thesis}, MONTH = {May}, YEAR = {2012}, } @MASTERSTHESIS{BachCaroli06, AUTHOR = {Caroli, Manuel}, TITLE = {{Exakte Arrangement-Berechnung gedrehter Quadratischer Kurven}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Bachelor thesis}, MONTH = {April}, YEAR = {2006}, } @MASTERSTHESIS{BachEbert05, AUTHOR = {Ebert, Franziska}, TITLE = {Benchmark Data Sets for Conic Arrangements}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Bachelor thesis}, MONTH = {November}, YEAR = {2005}, NOTE = {1.7}, } @MASTERSTHESIS{BachFouz06, AUTHOR = {Fouz, Mahmoud}, TITLE = {Hereditary Discrepancy in Different Numbers of Colors}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Bachelor thesis}, MONTH = {October}, YEAR = {2006}, } @ARTICLE{BachrachEl-YanivReinstaedtler2002, AUTHOR = {Bachrach, Ran and El-Yaniv, Ran and Reinst{\"a}dtler, Martin}, JOURNAL = {Algorithmica}, TITLE = {On the competitive theory and practice of online list accessing algorithms}, ADDRESS = {Berlin, Germany}, NUMBER = {2}, PUBLISHER = {Springer}, MONTH = {February}, VOLUME = {32}, ISBN = {0178-4617}, YEAR = {2002}, PAGES = {201--246}, } @MASTERSTHESIS{BachSchmitt06, AUTHOR = {Schmitt, Daniel}, TITLE = {{Implementierung einer {\"U}berlagerungvon konvexen Arrangements der Kugeloberfl{\"a}che}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Bachelor thesis}, MONTH = {August}, YEAR = {2006}, } @MASTERSTHESIS{BachSteurer06, AUTHOR = {Steurer, David}, TITLE = {Tight Bounds on the Min-Max Boundary Decomposition Cost of Weighted Graphs}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Bachelor thesis}, MONTH = {May}, YEAR = {2006}, } @INPROCEEDINGS{Bacik-Mahajan95, AUTHOR = {Bacik, Roman and Mahajan, Sanjeev}, EDITOR = {Du, Ding-Zhu and Li, Ming}, TITLE = {Semidefinite programming and its applications to NP problems}, BOOKTITLE = {Computing and Combinatorics: 1st Annual International Conference (COCOON95)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Xi'an, China}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {959}, YEAR = {1995}, PAGES = {566--575}, } @MASTERSTHESIS{Backes1998Diplom, AUTHOR = {Backes, Werner}, TITLE = {Berechnung k{\"u}rzester Gittervektoren}, SCHOOL = {Univesit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, YEAR = {1998}, } @INPROCEEDINGS{BaGiePa2007, AUTHOR = {Miklos, Balint and Giesen, Joachim and Pauly, Mark}, TITLE = {Medial Axis Approximation from Inner Voronoi Balls: A Demo of the Mesecina Tool}, BOOKTITLE = {Proceedings of the Twenty-Third Annual Symposium on Computational Geometry (SCG'07)}, ORGANIZATION = {Association for Computing Machinery (ACM)}, TYPE = {Video/Multimedia Submission}, PADDRESS = {New York, NY, USA}, ADDRESS = {Gyeongju, South Korea}, PUBLISHER = {ACM}, ISBN = {978-1-59593-705-6}, DOI = {10.1145/1247069.1247090}, YEAR = {2007}, PAGES = {123--124}, ABSTRACT = {We illustrate a simple algorithm for approximating the medial axis of a 2D shape with smooth boundary from a sample of this boundary. The algorithm is compared to a more general approximation method that builds on the same idea, namely, to approximate the shape by a union of balls. While not as general, our algorithm is simpler, faster and numerically more stable. Both algorithms are visualized using the Mesecina tool, which is also described.}, } @INPROCEEDINGS{Banderier-LNCS1853-2000, AUTHOR = {Banderier, Cyril}, TITLE = {Planar Maps and Airy Phenomena,}, BOOKTITLE = {Proceedings of ICALP'00}, PADDRESS = {Heidelberg}, ADDRESS = {Geneva}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1853}, YEAR = {2000}, PAGES = {388--402}, } @MISC{Banderier1999a, AUTHOR = {Banderier, Cyril}, TITLE = {An Introduction to Analytic Number Theory}, HOWPUBLISHED = {Lecture Notes Proceedings}, ISBN = {ISSN 0249-6399}, YEAR = {1999}, } @INPROCEEDINGS{Banderier1999b, AUTHOR = {Banderier, Cyril}, TITLE = {On Generating Functions of Generating Trees}, BOOKTITLE = {Proceedings of FPSAC'99}, PADDRESS = {Barcelona}, ADDRESS = {Barcelona}, PUBLISHER = {Universitat Polit{\`e}cnica de Catalunya}, YEAR = {1999}, PAGES = {40--52}, } @INPROCEEDINGS{Banderier2000, AUTHOR = {Banderier, Cyril}, TITLE = {A Generalized Cover Time for Random Walks on Graphs}, BOOKTITLE = {Proceedings of FPSAC'00}, PADDRESS = {Heidelberg}, ADDRESS = {Moscow}, PUBLISHER = {Springer}, ISBN = {3-540-67247-8}, YEAR = {2000}, PAGES = {113--124}, } @ARTICLE{Banderier2001_2, AUTHOR = {Banderier, Cyril}, JOURNAL = {Random Structures \& Algorithms}, TITLE = {Random Maps, Coalescing Saddles, Singularity Analysis, and Airy Phenomena}, ADDRESS = {New York, USA}, NUMBER = {3-4}, PUBLISHER = {Wiley}, VOLUME = {19}, ISBN = {1042-9832}, YEAR = {2001}, PAGES = {194--246}, } @ARTICLE{Banderier2001_3, AUTHOR = {Banderier, Cyril and Bousquet-M{\'e}lou, Mireille and Denise, Alain and Flajolet, Philippe and Gardy, Dani{\`e}le and Gouyou-Beauchamps, Dominique}, JOURNAL = {Discrete Mathematics}, TITLE = {Generating Functions for Generating Trees}, ADDRESS = {Amsterdam, The Netherlands}, PUBLISHER = {Elsevier}, VOLUME = {246}, ISBN = {0012-365X}, YEAR = {2002}, PAGES = {29--55}, } @PHDTHESIS{Banderier2001_T, AUTHOR = {Banderier, Cyril}, TITLE = {Combinatoire Analytique des chemins et des cartes}, SCHOOL = {Universit{\'e} de Paris 6}, TYPE = {Doctoral dissertation}, MONTH = {June}, YEAR = {2001}, } @ARTICLE{Banderier2002, AUTHOR = {Banderier, Cyril and Flajolet, Philippe}, JOURNAL = {Theoretical Computer Science}, TITLE = {Basic analytic combinatorics of directed lattice paths}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {1-2}, PUBLISHER = {Elsevier}, VOLUME = {281}, ISBN = {0304-3975}, YEAR = {2002}, PAGES = {37--80}, } @INPROCEEDINGS{Bansal2010, AUTHOR = {Bansal, Nikhil and Gupta, Anupam and Li, Jian and Mestre, Juli{\'a}n and Nagarajan, Viswanath and Rudra, Atri}, EDITOR = {de Berg, Mark and Meyer, Ulrich}, TITLE = {When {LP} Is the Cure for Your Matching Woes: Improved Bounds for Stochastic Matchings (Extended Abstract)}, BOOKTITLE = {Algorithms - ESA 2010 : 18th Annual European Symposium. - Pt. II}, PADDRESS = {Berlin}, ADDRESS = {Liverpool, UK}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6347}, ISBN = {978-3-642-15780-6}, DOI = {10.1007/978-3-642-15781-3_19}, YEAR = {2010}, PAGES = {218--229}, } @ARTICLE{Bar-YehudaHermelinRawitz2011, AUTHOR = {Bar-Yehuda, Reuven and Hermelin, Danny and Rawitz, Dror}, JOURNAL = {Computational Geometry}, TITLE = {Minimum vertex cover in rectangle graphs}, ADDRESS = {Amsterdam}, NUMBER = {6-7}, PUBLISHER = {Elsevier}, VOLUME = {44}, ISBN = {0925-772}, DOI = {10.1016/j.comgeo.2011.03.002}, YEAR = {2011}, PAGES = {356--364}, } @MASTERSTHESIS{BaraqueDipl02, AUTHOR = {Baraque, Raef}, TITLE = {{Effiziente Multiplikationsverfahren: ein numerischer Vergleich}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {November}, YEAR = {2002}, } @ARTICLE{BarnesEdmondsSIAMJCOMPUT1998, AUTHOR = {Barnes, Greg and Edmonds, Jeff A.}, JOURNAL = {SIAM Journal on Computing}, TITLE = {Time-Space Lower Bounds for Directed st-Connectivity on Graph Automata Models}, NUMBER = {4}, PUBLISHER = {SIAM}, MONTH = {August}, VOLUME = {27}, ISBN = {0097-5397}, YEAR = {1998}, PAGES = {1190--1202}, } @ARTICLE{Baruah:2010, AUTHOR = {Baruah, Sanjoy and Bonifaci, Vincenzo and Marchetti-Spaccamela, Alberto and Stiller, Sebastian}, JOURNAL = {Real-Time Systems}, TITLE = {Improved Multiprocessor Global Schedulability Analysis}, ADDRESS = {New York, NY}, NUMBER = {1}, PUBLISHER = {Springer}, MONTH = {September}, VOLUME = {46}, ISBN = {0922-6443}, DOI = {10.1007/s11241-010-9096-3}, YEAR = {2010}, PAGES = {3--24}, ABSTRACT = {A new technique was recently introduced by Bonifaci et al. for the analysis of real-time systems scheduled on multiprocessor platforms by the global Earliest Deadline First (EDF) scheduling algorithm. In this paper, this technique is generalized so that it is applicable to the schedulability analysis of real-time systems scheduled on multiprocessor platforms by any work-conserving algorithm. The resulting analysis technique is applied to obtain a new sufficient global Deadline Monotonic (DM) schedulability test. It is shown that this new test is quantitatively superior to pre-existing DM schedulability analysis tests; in addition, the degree of its deviation from any hypothetical optimal scheduler (that may be clairvoyant) is quantitatively bounded. A new global EDF schedulability test is also proposed here that builds on the results of Bonifaci et al. This new test is shown to be less pessimistic and more widely applicable than the earlier result was, while retaining the strong theoretical properties of the earlier result. }, } @ARTICLE{Basit2010, AUTHOR = {Basit, Abdul and Mustafa, Nabil H. and Ray, Saurabh and Raza, Sarfraz}, JOURNAL = {Computational Geometry}, TITLE = {Centerpoints and {Tverberg's} technique}, ADDRESS = {Amsterdam}, NUMBER = {6-7}, PUBLISHER = {Elsevier}, VOLUME = {43}, ISBN = {0925-7721}, DOI = {10.1016/j.comgeo.2010.03.002}, YEAR = {2010}, PAGES = {593--600}, } @ARTICLE{Bast-Hagerup95, AUTHOR = {Bast, Hannah and Hagerup, Torben}, JOURNAL = {Information and Computation}, TITLE = {Fast Parallel Space Allocation, Estimation, and Integer Sorting}, NUMBER = {1}, PUBLISHER = {Academic Press}, VOLUME = {123}, ISBN = {0890-5401}, YEAR = {1995}, PAGES = {72--110}, } @INPROCEEDINGS{bast04selfstar, AUTHOR = {Bast, Holger}, EDITOR = {Babaoglu, Ozalp and Jelasity, M{\'a}rk and Montresor, Alberto and van Steen, Maarten and van Moorsel, Aad and Fetzer, Christof and Leonardi, Stefano}, TITLE = {Dimension Reduction: A Powerful Principle for Automatically Finding Concepts in Unstructured Data}, BOOKTITLE = {International Workshop on Self-* Properties in Complex Information Systems (SELF-STAR 2004)}, PADDRESS = {Bologna, Italy}, ADDRESS = {Bertinoro, Italy}, PUBLISHER = {University of Bologna}, YEAR = {2004}, PAGES = {113--116}, ABSTRACT = {Dimension reduction techniques have been a successful avenue for automatically extracting the “concepts” underlying unstructured data, a task that naturally arises in fields as diverse as information retrieval, image processing, social science, etc. It is surprising how much can be achieved for this task using only the raw data itself, without resorting to any additional knowledge or intelligence. We will survey the most important schemes contributed from the various communities to date, by commenting on the following aspects: optimization techniques, the role of normalizations, setting the parameters, computing time, quality of results, and the integration of external knowledge.}, } @INPROCEEDINGS{bast04stacs, AUTHOR = {Bast, Holger and Mehlhorn, Kurt and Sch{\"a}fer, Guido and Tamaki, Hisao}, EDITOR = {Diekert, Volker and Habib, Michel}, TITLE = {Matching Algorithms Are Fast in Sparse Random Graphs}, BOOKTITLE = {21st Annual Symposium on Theoretical Aspects of Computer Science (STACS-04)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Montpellier, France}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {2996}, ISBN = {3-540-21236-1}, DOI = {10.1007/b96012}, YEAR = {2004}, PAGES = {81--92}, ABSTRACT = {We present an improved average case analysis of the maximum cardinality matching problem. We show that in a bipartite or general random graph on n vertices, with high probability every nonmaximum matching has an augmenting path of length O(log n). This implies that augmenting path algorithms like the Hopcroft Karp algorithm for bipartite graphs and the Micali Vazirani algorithm for general graphs, which have a worst case running time of O(mpn), run in time O(mlog n) with high probability, where m is the number of edges in the graph. Motwani proved these results for random graphs when the average degree is at least ln(n) [Average Case Analysis of Algorithms for Matchings and Related Problems, Journal of the ACM, 41(6), 1994]. Our results hold, if only the average degree is a large enough constant. At the same time we simplify the analysis of Motwani.}, } @ARTICLE{bast05hz, AUTHOR = {Bast, Holger}, JOURNAL = {Hom{\"o}opathie-Zeitschrift}, TITLE = {{Pr{\"a}zisionssuche im hom{\"o}opathischen Netz}}, ADDRESS = {Gauting, Germany}, PUBLISHER = {Hom{\"o}opathie-Forum e.V.}, VOLUME = {I/05}, ISBN = {0943-6839}, YEAR = {2005}, PAGES = {119--122}, } @INPROCEEDINGS{Bast1998, AUTHOR = {Bast, Hannah}, TITLE = {Dynamic Scheduling with Incomplete Information}, BOOKTITLE = {Proceedings of the 10th Annual ACM Symposium on Parallel Algorithms and Architectures (SPAA-98)}, ORGANIZATION = {Association for Computing Machinery (ACM)}, PADDRESS = {New York, USA}, ADDRESS = {Puerto Vallarta, Mexico}, PUBLISHER = {ACM Press}, MONTH = {June}, ISBN = {0-89791-989-0}, YEAR = {1998}, PAGES = {182--191}, ABSTRACT = {We consider the following scheduling problem: Our goal is to execute a given amount of arbitrarily decomposable work on a distributed machine as quickly as possible. The work is maintained by a central scheduler that can assign chunks of work of an arbitrary size to idle processors. The difficulty is that the processing time required for a chunk is not exactly predictable---usually the less, the larger the chunk---and that processors suffer a delay for each assignment. Our objective is to minimize the total wasted time of the schedule, that is, the sum of all delays plus the idle times of processors waiting for the last processor to finish. We introduce a new deterministic model for this setting, based on estimated ranges $[\alpha(w),\beta(w)]$ for processing times of chunks of size $w$. Depending on $\alpha$, $\beta$, and a measure for the overall deviation from these estimates, we can prove matching upper and lower bounds on the wasted time, the former being achieved by our new \emph{balancing} strategy. This is in sharp contrast with previous work that, even under the strong assumption of independent, approximately normally distributed chunk processing times, proposed only heuristic scheduling schemes supported merely by empirical evidence. Our model naturally subsumes this stochastic setting, and our generic analysis is valid for most of the existing schemes too, proving them to be non-optimal.}, } @ARTICLE{Bast2000b, AUTHOR = {Bast, Hannah}, JOURNAL = {Theory of Computing Systems}, TITLE = {On Scheduling Parallel Tasks at Twilight}, ADDRESS = {New York, USA}, NUMBER = {5}, PUBLISHER = {Springer}, MONTH = {November}, VOLUME = {33}, ISBN = {1432-4350}, YEAR = {2000}, PAGES = {489--563}, ABSTRACT = { We consider the problem of processing a given number of tasks on a given number of processors as quickly as possible when only vague information about the processing time of a task is available before it is completed. Whenever a processor is idle, it can be assigned, at the price of a certain overhead, a portion, called a chunk, of the unassigned tasks. The goal is to minimize the makespan, that is, the time that passes until all the tasks are completed. The difficulty then is to find the optimal tradeoff between the processors' load balance, which is favoured by having small, and therefore many, chunks, and the total scheduling overhead, which is lower when there are fewer chunks. This scheduling problem has been the subject of intensive research in the past, and a large variety of heuristics have been proposed. Its mathematical analysis, however, turned out to be difficult even for simplistic models of the vague-information issue, and little theoretical work has been presented to date. In this work we present a novel theoretical model that covers a multitude of natural vague-information scenarios, and for which we can prove general upper and lower bounds on the achievable makespan. From this we derive optimal bounds and algorithms for a whole variety of specific scenarios, including the modelling of task processing times as independent, identically distributed random variables, which guided the design of most of the previously existing heuristics. Unlike traditional approaches, our model neither ignores a priori knowledge of the input (the processing times) nor does it restrict the distribution of the input, but instead works with the concepts of an a priori estimate of the processing times, which is implicit in every algorithm, and a measure for the deviation of this estimate from the actual processing times, which is not known until all the tasks are completed.}, } @INPROCEEDINGS{Bast2002a, AUTHOR = {Bast, Hannah}, EDITOR = {Ferreira, Afonso and Alt, Helmut}, TITLE = {Scheduling at Twilight the Easy Way}, BOOKTITLE = {STACS 2002 : 19th Annual Symposium on Theoretical Aspects of Computer Science}, PADDRESS = {Berlin, Germany}, ADDRESS = {Antibes, Juan-Les-Pins, France}, PUBLISHER = {Springer}, MONTH = {March}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {2285}, ISBN = {3-540-43283-3}, YEAR = {2002}, PAGES = {166--178}, ABSTRACT = {We investigate particularly simple algorithms for optimizing the tradeoff between load imbalance and assignment overheads in dynamic multiprocessor scheduling scenarios, when the information that is available about the processing time of a task before it is completed is vague. We describe a simple and elegant generic algorithm that, in a very general model, always comes surprisingly close to the theoretical optimum, and the performance of which we can analyze exactly with respect to constant factors. In contrast, we prove that algorithms that assign tasks in equal-sized portions perform far from optimal in general. In fact, we give evidence that the performance of our generic scheme cannot be improved by any constant factor without sacrificing the simplicity of the algorithm. We also give lower bounds on the performance of the various decreasing-size heuristics that have typically been used so far in concrete applications.}, } @ARTICLE{Bast2006b, AUTHOR = {Bast, Holger}, JOURNAL = {MPG Jahrbuch}, TITLE = {{Intelligente Suche mit garantiert schnellen Antwortzeiten}}, YEAR = {2006}, } @INCOLLECTION{Bast2009, AUTHOR = {Bast, Hannah}, EDITOR = {Albers, Susanne and Alt, Helmut and N{\"a}her, Stefan}, TITLE = {Car or Public Transport -- Two Worlds}, BOOKTITLE = {Efficient Algorithms : Essays Dedicated to Kurt Mehlhorn on the Occasion of His 60th Birthday}, ADDRESS = {Berlin, Germany}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5760}, ISBN = {978-3-642-03455-8}, YEAR = {2009}, PAGES = {355--367}, } @MASTERSTHESIS{Bast94, AUTHOR = {Bast, Hannah}, TITLE = {Fast Parallel Space Allocation, Estimation and Integer Sorting}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, YEAR = {1994}, } @INPROCEEDINGS{bastcelikik2009sac, AUTHOR = {Celikik, Marjan and Bast, Holger}, EDITOR = {Shin, Dongwan}, TITLE = {Fast Error-Tolerant Search on Very Large Texts}, BOOKTITLE = {The 24th Annual ACM Symposium on Applied Computing}, PADDRESS = {New York, NY}, ADDRESS = {Honolulu, Hawaii, USA}, PUBLISHER = {ACM}, MONTH = {March}, ISBN = {978-1-60558-166-8}, DOI = {10.1145/1529282.1529669}, YEAR = {2009}, PAGES = {1724--1731}, ABSTRACT = { We consider the following spelling variants clustering problem: Given a list of distinct words, called lexicon, compute (possibly overlapping) clusters of words which are spelling variants of each other. This problem naturally arises in the context of error-tolerant full-text search of the following kind: For a given query, return not only documents matching the query words exactly but also those matching their spelling variants. This is the inverse of the well-known "Did you mean: ... ?" web search engine feature, where the error tolerance is on the side of the query, and not on the side of the documents. We combine various ideas from the large body of literature on approximate string searching and spelling correction techniques to a new algorithm for the spelling variants clustering problem that is both accurate and very efficient in time and space. Our largest lexicon, containing roughly 10 million words, can be processed in about 16 minutes on a standard PC using 10 MB of additional space. This beats the previously best scheme by a factor of two in running time and by a factor of more than ten in space usage. We have integrated our algorithms into the CompleteSearch engine in a way that achieves error-tolerant search without significant blowup in neither index size nor query processing time.}, } @UNPUBLISHED{bastcelikikmanolache2009-snippets, AUTHOR = {Celikik, Marjan and Bast, Holger and Manolache, Gabriel}, TITLE = {Efficient Index-Based Snippet Generation}, YEAR = {2011}, NOTE = {unpublished}, ABSTRACT = { Ranked result lists with query-dependent snippets have become state of the art in text search. They are typically implemented by searching, at query time, for occurrences of the query words in the top-ranked documents. This \emph{document-based} approach has three inherent problems: (i) when a document is indexed by terms which it does not contain literally (e.g., related words or spelling variants), localization of the corresponding snippets becomes problematic; (ii) each query operator (e.g., phrase or proximity search) has to be implemented twice, on the index side in order to compute the correct result set, and on the snippet generation side to generate the appropriate snippets; and (iii) in a worst case, the whole document needs to be scanned for occurrences of the query words, which is problematic for very long documents. We present a new \emph{index-based} method that localizes snippets by information solely computed from the index, and that overcomes all three problems. Unlike previous index-based methods, we show how to achieve this at essentially no extra cost in query processing time, by a technique we call \emph{query rotation}. We also show how our index-based method allows the caching of individual segments instead of complete documents, which enables a significantly larger cache hit ratio as compared to the document-based approach. We have fully integrated our implementation with the CompleteSearch engine.}, } @INPROCEEDINGS{BastDH92, AUTHOR = {Bast, Holger and Dietzfelbinger, Martin and Hagerup, Torben}, TITLE = {A Perfect Parallel Dictionary}, BOOKTITLE = {17th International Symposium on Mathematical Foundations of Computer Science (MFCS'92)}, PADDRESS = {New York, NY, USA}, ADDRESS = {Prague, Czechoslovakia}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {629}, YEAR = {1992}, PAGES = {133--141}, ABSTRACT = {We describe new randomized parallel algorithms for the problems of interval allocation, construction of static dictionaries, and maintenance of dynamic dictionaries. All of our algorithms run optimally in constant time with high probability. Our main result is the construction of what we call a \emph{perfect dictionary}, a scheme that allows $p$ processors implementing a set $M$ in space proportional to $|M|$ to process batches of $p$ \emph{insert}, \emph{delete}, and \emph{lookup} instructions on $M$ in constant time per batch. Our best results are obtained for a new variant of the CRCW PRAM model of computation called the OR PRAM. For other variants of the CRCW PRAM we show slightly weaker results, with some resource bounds increased by a factor of $\Theta(\log^k n)$, where $k\in\IN$ is fixed but arbitrarily large.}, } @INPROCEEDINGS{BastDMP06, AUTHOR = {Bast, Holger and Dupret, Georges and Majumdar, Debapriyo and Piwowarski, Benjamin}, EDITOR = {Ackermann, Markus and Berendt, Bettina and Grobelnik, Marko and Hotho, Andreas and Mladenic, Dunja and Semeraro, Giovanni and Spiliopoulou, Myra and Stumme, Gerd and Svatek, Vojtech and van Someren, Maarten W.}, TITLE = {Discovering a Term Taxonomy from Term Similarities Using Principal Component Analysis}, BOOKTITLE = {Semantics, web and mining : Joint International Workshops, EWMF 2005 and KDO 2005}, PADDRESS = {Berlin, Germany}, ADDRESS = {Porto, Portugal}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4289}, ISBN = {978-3-540-47697-9}, YEAR = {2006}, PAGES = {103--120}, ABSTRACT = {We show that eigenvector decomposition can be used to extract a term taxonomy from a given collection of text documents. So far, methods based on eigenvector decomposition, such as latent semantic indexing (LSI) or principal component analysis (PCA), were only known to be useful for extracting symmetric relations between terms. We give a precise mathematical criterion for distinguishing between four kinds of relations of a given pair of terms of a given collection: unrelated (car - fruit), symmetrically related (car - automobile), asymmetrically related with the first term being more specific than the second (banana - fruit), and asymmetrically related in the other direction (fruit - banana). We give theoretical evidence for the soundness of our criterion, by showing that in a simplified mathematical model the criterion does the apparently right thing. We applied our scheme to the reconstruction of a selected part of the open directory project (ODP) hierarchy, with promising results. }, } @INPROCEEDINGS{bastetal06spire, AUTHOR = {Bast, Holger and Mortensen, Christian Worm and Weber, Ingmar}, EDITOR = {Crestani, Fabio and Ferragina, Paolo and Sanderson, Mark}, TITLE = {Output-Sensitive Autocompletion Search}, BOOKTITLE = {String Processing and Information Retrieval : 13th International Conference, SPIRE 2006}, PADDRESS = {Berlin, Germany}, ADDRESS = {Glasgow, GB}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4209}, ISBN = {978-3-540-45774-9}, YEAR = {2006}, PAGES = {150--162}, ABSTRACT = {We consider the following autocompletion search scenario: imagine a user of a search engine typing a query; then with every keystroke display those completions of the last query word that would lead to the best hits, and also display the best such hits. The following problem is at the core of this feature: for a fixed document collection, given a set D of documents, and an alphabetical range W of words, compute the set of all word-in-document pairs (w ,d) from the collection such that w ∈W and d∈D. We present a new data structure with the help of which such autocompletion queries can be processed, on the average, in time linear in the input plus output size, independent of the size of the underlying document collection. At the same time, our data structure uses no more space than an inverted index. Actual query processing times on a large test collection correlate almost perfectly with our theoretical bound.}, } @INPROCEEDINGS{bastetal07sigir, AUTHOR = {Bast, Holger and Chitea, Alexandru and Suchanek, Fabian and Weber, Ingmar}, EDITOR = {Clarke, Charlie and Fuhr, Norbert and Kando, Noriko}, TITLE = {ESTER: Efficient Search in Text, Entities, and Relations}, BOOKTITLE = {30th International Conference on Research and Development in Information Retrieval (SIGIR'07)}, PADDRESS = {New York, USA}, ADDRESS = {Amsterdam, Netherlands}, PUBLISHER = {ACM}, YEAR = {2007}, PAGES = {671--678}, } @INPROCEEDINGS{BastFM06, AUTHOR = {Bast, Holger and Funke, Stefan and Matijevic, Domagoj}, EDITOR = {Demetrescu, Camil and Goldberg, Andrew and Johnson, David}, TITLE = {TRANSIT: Ultrafast Shortest-Path Queries with Linear-Time Preprocessing}, BOOKTITLE = {9th DIMACS Implementation Challenge --- Shortest Path}, PADDRESS = {Piscataway, New Jersey}, ADDRESS = {Piscataway, New Jersey}, PUBLISHER = {DIMACS}, YEAR = {2006}, } @INPROCEEDINGS{BastFMSS07, AUTHOR = {Bast, Holger and Funke, Stefan and Matijevic, Domagoj and Sanders, Peter and Schultes, Dominik}, EDITOR = {Applegate, David and Brodal, Gerth}, TITLE = {In Transit to Constant Time Shortest-Path Queries in Road Networks}, BOOKTITLE = {9th Workshop on Algorithm Enginneering and Experiments (ALENEX'07)}, PADDRESS = {Philadelphia, USA}, ADDRESS = {New Orleans, USA}, PUBLISHER = {SIAM}, YEAR = {2007}, PAGES = {46--59}, } @INCOLLECTION{BastFunkeMatjevic2009, AUTHOR = {Bast, Holger and Funke, Stefan and Matijevic, Domagoj}, EDITOR = {Demetrescu, Camil and Goldberg, Andrew V. and Johnson, David S.}, TITLE = {Ultrafast shortest-path queries via transit nodes}, BOOKTITLE = {The shortest path problem : ninth DIMACS implemenation challenge}, ADDRESS = {Providence, RI}, PUBLISHER = {AMS}, SERIES = {DIMACS Series on Disrecte Mathematics and Theoretical Computer Science}, VOLUME = {74}, ISBN = {978-0-8218-4383-3}, YEAR = {2009}, PAGES = {175--192}, } @INPROCEEDINGS{BastH91, AUTHOR = {Bast, Holger and Hagerup, Torben}, TITLE = {Fast and Reliable Parallel Hashing}, BOOKTITLE = {3rd Annual ACM Symposium on Parallel Algorithms and Architectures (SPAA'91)}, PADDRESS = {New York, NY, USA}, ADDRESS = {Hilton Head Island, South Carolina, USA}, PUBLISHER = {ACM}, YEAR = {1991}, PAGES = {50--61}, ABSTRACT = {A perfect hash function for a (multi)set $X$ of $n$ integers is an injective function $h:X\to\{1,\ldots,s\}$, where $s=O(n)$, that can be stored in $O(n)$ space and evaluated in constant time by a single processor. We show that a perfect hash function for a given multiset of $n$ integers can be constructed optimally in $O(\log^* n)$ time using $O(n/\log^* n)$ processors. Our algorithm is faster than all previously published methods. More significantly, it is highly reliable: Whereas analyses of previous fast parallel hashing schemes provided bounds on the expected resource requirements only, our algorithm is guaranteed to stay within the bounds given with overwhelming probability.}, } @INPROCEEDINGS{bastmajumdar05sigir, AUTHOR = {Bast, Holger and Majumdar, Debapriyo}, EDITOR = {Marchionini, Gary and Moffat, Alistair and Tait, John and Baeza-Yates, Ricardo and Ziviani, Nivio}, TITLE = {Why Spectral Retrieval Works}, BOOKTITLE = {28th Annual International Conference on Research and Development in Information Retrieval (SIGIR'05)}, PADDRESS = {New York, USA}, ADDRESS = {Salvador, Brazil}, PUBLISHER = {ACM}, MONTH = {August}, ISBN = {1-58113-881-4}, YEAR = {2005}, PAGES = {11--18}, ABSTRACT = { We introduce the \emph{synonymy graph} as a new angle of looking at spectral retrieval techniques, including latent semantic indexing (LSI) and its many successors. The synonymy graph is defined for each pair of terms in the collection, and our findings suggest that it is at the heart of what makes spectral retrieval work in practice. % We show that LSI and many of its variants can be equivalently viewed as a particular document expansion (not query expansion) process, where each term effects the insertion of some other term if and only if the synonymy graph for that term pair has a certain characteristic shape. We provide a simple, parameterless algorithm for detecting that shape. % We point out inherent problems of every algorithm that bases its expansion decisions merely on individual values of the synonymy graph, as done by almost all existing methods. Our new algorithm overcomes these limitations, and it consistently outperforms previous methods on a number of test collections. % Our synonymy graphs also shed light on the effectiveness of three fundamental types of variations of the basic LSI scheme.}, } @INPROCEEDINGS{BastMSTW2006a, AUTHOR = {Bast, Holger and Majumdar, Debapriyo and Schenkel, Ralf and Theobald, Martin and Weikum, Gerhard}, EDITOR = {Dayal, Umeshwar and Whang, Kyu-Young and Lomet, David B. and Alonso, Gustavo and Lohman, Guy M. and Kersten, Martin L. and Cha, Sang Kyun and Kim, Young-Kuk}, TITLE = {{IO-Top-k}: Index-Access Optimized Top-k Query Processing}, BOOKTITLE = {Proceedings of the 32nd International Conference on Very Large Data Bases, VLDB 2006}, PADDRESS = {New York, USA}, ADDRESS = {Seoul, Korea}, PUBLISHER = {ACM}, ISBN = {1-59593-385-9}, YEAR = {2006}, PAGES = {475--486}, ABSTRACT = {Top-$k$ query processing is an important building block for ranked retrieval, with applications ranging from text and data integration to distributed aggregation of network logs and sensor data. Top-$k$ queries operate on index lists for a query's elementary conditions and aggregate scores for result candidates. One of the best implementation methods in this setting is the family of threshold algorithms, which aim to terminate the index scans as early as possible based on lower and upper bounds for the final scores of result candidates. This procedure performs sequential disk accesses for sorted index scans, but also has the option of performing random accesses to resolve score uncertainty. This entails scheduling for the two kinds of accesses: 1) the prioritization of different index lists in the sequential accesses, and 2) the decision on when to perform random accesses and for which candidates. The prior literature has studied some of these scheduling issues, but only for each of the two access types in isolation. The current paper takes an integrated view of the scheduling issues and develops novel strategies that outperform prior proposals by a large margin. Our main contributions are new, principled, scheduling methods based on a Knapsack-related optimization for sequential accesses and a cost model for random accesses. The methods can be further boosted by harnessing probabilistic estimators for scores, selectivities, and index list correlations. In performance experiments with three different datasets (TREC Terabyte, HTTP server logs, and IMDB), our methods achieved significant performance gains compared to the best previously known methods.}, } @INPROCEEDINGS{BastMSTW2006trec, AUTHOR = {Bast, Holger and Majumdar, Debapriyo and Schenkel, Ralf and Theobald, Martin and Weikum, Gerhard}, EDITOR = {Voorhees, Ellen M. and Buckland, Lori Phillips}, TITLE = {IO-Top-k at TREC 2006: Terabyte Track}, BOOKTITLE = {The Fifteenth Text Retrieval Conference Proceedings, TREC 2006}, ORGANIZATION = {NIST}, PADDRESS = {Gaithersburg, Maryland, USA}, ADDRESS = {Gaithersburg, Maryland, USA}, PUBLISHER = {National Institute of Standards and Technology (NIST)}, MONTH = {November}, YEAR = {2006}, PAGES = {1--5}, } @INPROCEEDINGS{BastMW07, AUTHOR = {Bast, Holger and Majumdar, Debapriyo and Weber, Ingmar}, EDITOR = {M{\'a}rio J. Silva and Alberto H. F. Laender and Ricardo A. Baeza-Yates and Deborah L. McGuinness and Bj{\o}rn Olstad and {\O}ystein Haug Olsen and Andr{\'e} O. Falc{\~a}o}, TITLE = {Efficient interactive query expansion with CompleteSearch}, BOOKTITLE = {16th Conference on Information and Knowledge Management (CIKM'07)}, PADDRESS = {New York, USA}, ADDRESS = {Lisboa, Portugal}, PUBLISHER = {ACM}, DOI = {10.1145/1321440.1321560}, YEAR = {2007}, PAGES = {857--860}, ABSTRACT = {We present an efficient realization of the following interactive search engine feature: as the user is typing the query, words that are related to the last query word and that would lead to good hits are suggested, as well as selected such hits. The realization has three parts: (i) building clusters of related terms, (ii) adding this information as artificial words to the index such that (iii) the described feature reduces to an instance of prefix search and completion. An efficient solution for the latter is provided by the CompleteSearch engine, with which we have integrated the proposed feature. For building the clusters of related terms we propose a variant of latent semantic indexing that, unlike standard approaches, is completely transparent to the user. By experiments on two large test-collections, we demonstrate that the feature is provided at only a slight increase in query processing time and index size.}, } @PHDTHESIS{BastPhD2000, AUTHOR = {Bast, Hannah}, TITLE = {Provably Optimal Scheduling of Similar Tasks}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Doctoral dissertation}, MONTH = {February}, YEAR = {2000}, ABSTRACT = {We consider the problem of processing a given number of tasks on a given number of processors as quickly as possible when the processing times of the tasks are variable and not known in advance. The tasks are assigned to the processors in chunks consisting of several tasks at a time, and the difficulty lies in finding the optimal tradeoff between the processors' load balance, which is favoured by having small chunks, and the total scheduling overhead, which will be the lower the fewer chunks there are. Our studies are motivated by a practical problem from high-performance computing, namely parallel-loop scheduling, for which a large variety of heuristics have been proposed in the past, but hardly any rigorous analysis has been presented to date. Our work is based on a generic approach that covers the whole spectrum of processing time irregularity. This approach does not make any assumptions about task processing times, but instead works with estimated ranges for processing times, one for each chunk size, and a measure for the overall deviation of the actual processing times from these estimates. Our analysis provides a general upper bound applicable for every conceivable setting of these parameters, together with lower bounds showing that no algorithm can do significantly better than the ones we propose. Our general result implies optimal bounds for a whole variety of specific settings, including the modelling of task processing times as independent, identically distributed random variables, which underlies most of the previously existing heuristics. Our results confirm the practicability of certain well-established techniques for parallel-loop scheduling, while, on the other hand, revealing major flaws in other approaches.}, } @INPROCEEDINGS{bastweber05wea, AUTHOR = {Bast, Holger and Weber, Ingmar}, EDITOR = {Nikoletseas, Sotiris}, TITLE = {Don't Compare Averages}, BOOKTITLE = {4th International Workshop on Efficient and Experimental Algorithms (WEA'05)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Santorini Island, Greece}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {3503}, YEAR = {2005}, PAGES = {67--76}, } @INPROCEEDINGS{bastweber05wiri, AUTHOR = {Bast, Holger and Weber, Ingmar}, EDITOR = {Adachi, Jun and Shan, Wang and Vakali, Athena}, TITLE = {Insights from Viewing Ranked Retrieval as Rank Aggregation}, BOOKTITLE = {Workshop on Challenges in Web Information Retrieval and Integration (WIRI'05)}, PADDRESS = {Washington, USA}, ADDRESS = {Tokyo, Japan}, PUBLISHER = {IEEE}, MONTH = {April}, YEAR = {2005}, PAGES = {243--248}, } @INPROCEEDINGS{bastweber06faceted, AUTHOR = {Bast, Holger and Weber, Ingmar}, EDITOR = {Broder, Andrei and Maarek, Yoelle}, TITLE = {When You're Lost For Words: Faceted Search With Autocompletion}, BOOKTITLE = {SIGIR'06 Workshop on Faceted Search}, PADDRESS = {New York, USA}, ADDRESS = {Seattle, USA}, PUBLISHER = {ACM}, MONTH = {August}, YEAR = {2006}, PAGES = {31--35}, } @INPROCEEDINGS{bastweber06sigir, AUTHOR = {Bast, Holger and Weber, Ingmar}, EDITOR = {Efthimiadis, Efthimis N. and Dumais, Susan and Hawking, David and J{\"a}rvellin, Kalervo}, TITLE = {Type Less, Find More: Fast Autocompletion Search with a Succinct Index}, BOOKTITLE = {SIGIR 2006: Proceedings of the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval}, ORGANIZATION = {Association for Computing Machinery (ACM)}, PADDRESS = {New York, USA}, ADDRESS = {Seattle, USA}, PUBLISHER = {ACM}, ISBN = {1-59593-369-7}, YEAR = {2006}, PAGES = {364--371}, ABSTRACT = {We consider the following full-text search autocompletion feature. Imagine a user of a search engine typing a query. Then with every letter being typed, we would like an instant display of completions of the last query word which would lead to good hits. At the same time, the best hits for any of these completions should be displayed. Known indexing data structures that apply to this problem either incur large processing times for a substantial class of queries, or they use a lot of space. We present a new indexing data structure that uses no more space than a state-of-the-art compressed inverted index, but with 10 times faster query processing times. Even on the large TREC Terabyte collection, which comprises over 25 million documents, we achieve, on a single machine and with the index on disk, average response times of one tenth of a second. We have built a full-fledged, interactive search engine that realizes the proposed autocompletion feature combined with support for proximity search, semi-structured (XML) text, subword and phrase completion, and semantic tags.}, } @INPROCEEDINGS{bastweber07cidr, AUTHOR = {Bast, Holger and Weber, Ingmar}, EDITOR = {Weikum, Gerhard}, TITLE = {The CompleteSearch Engine: Interactive, Efficient, and Towards IR \& DB integration}, BOOKTITLE = {CIDR 2007 : 3rd Biennial Conference on Innovative Data Systems Research}, PADDRESS = {WWW}, ADDRESS = {Asilomar, CA, USA}, PUBLISHER = {VLDB Endowment}, YEAR = {2007}, PAGES = {88--95}, ABSTRACT = {We describe CompleteSearch, an interactive search engine that offers the user a variety of complex features, which at first glance have little in common, yet are all provided via one and the same highly optimized core mechanism. This mechanism answers queries for what we call context-sensitive prefix search and completion: given a set of documents and a word range, compute all words from that range which are contained in one of the given documents, as well as those of the given documents which contain a word from the given range. Among the supported features are: (i) automatic query completion, for example, find all completions of the prefix “seman” that occur in the context of the word “ontology”, as well as the best hits for any such completion; (ii) semi-structured (XML) retrieval, for example, find all emailmessages with “dbworld” in the subject line; (iii) semantic search, for example, find all politicians which had a private audience with the pope; (iv) DB-style joins and grouping, for example, find the most prolific authors with at least one paper in both “SIGMOD” and “SIGIR”; and (v) arbitrary combinations of these. The prefix search and completion mechanism of Complete- Search is realized via a novel kind of index data structure, which enables subsecond query processing times for collections up to a terabyte of data, on a single PC. We report on a number of lessons learned in the process of building the system and on our experience with a number of publicly used deployments.}, } @INPROCEEDINGS{bastweber07gwem, AUTHOR = {Bast, Holger and Weber, Ingmar}, EDITOR = {Gronau, Norbert}, TITLE = {Managing Helpdesk Tasks with CompleteSearch: A Case Study}, BOOKTITLE = {4th Conference on Professional Knowledge Management (WM'07)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Potsdam, Germany}, PUBLISHER = {GITO}, VOLUME = {2}, ISBN = {978-3-936771-98-5}, YEAR = {2007}, PAGES = {101--108}, ABSTRACT = {CompleteSearch is a highly interactive search engine, which, instantly after every single keystroke, offers to the user various kinds of feedback, like promising query completions or refinements by category. We combined CompleteSearch with our institute's helpdesk system and carried out a small user study with some of the staff operating the helpdesk. Participants were asked to process ten typical helpdesk requests, alternatingly using CompleteSearch and the off-the-shelf Google Desktop Search. All participants preferred CompleteSearch over Google Desktop, mainly because of its speed, the feeling of being in power, and the enhanced search facilities. }, } @INCOLLECTION{Baswana2004b, AUTHOR = {Baswana, Surender and Sen, Sandeep}, EDITOR = {Sahni, Sartaj and Mehta, Dinesh}, TITLE = {Randomized graph data-structures for approximate shortest path problem}, BOOKTITLE = {Handbook of Data Structures and Applications}, CHAPTER = {38}, ADDRESS = {Boca Raton, USA}, PUBLISHER = {Chapman \& Hall/CRC}, EDITION = {1}, MONTH = {October}, SERIES = {Chapman \& Hall/CRC Computer \& Information Science Series}, VOLUME = {4}, ISBN = {1584884355}, YEAR = {2004}, PAGES = {38.1--38.19}, } @INPROCEEDINGS{BaswanaEtal2005, AUTHOR = {Baswana, Surender and Telikepalli, Kavitha and Mehlhorn, Kurt and Pettie, Seth}, TITLE = {New Constructions of (alpha, beta)-Spanners and Purely Additive Spanners}, BOOKTITLE = {Proceedings of the sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-05)}, ORGANIZATION = {ACM-SIAM}, PADDRESS = {Philadelphia, USA}, ADDRESS = {Vancouver, Canada}, PUBLISHER = {SIAM}, ISBN = {0-89871-585-7}, YEAR = {2005}, PAGES = {672--681}, } @ARTICLE{BaswanaSen2007, AUTHOR = {Baswana, Surender and Sen, Sandeep}, JOURNAL = {Random Structures \& Algorithms}, TITLE = {A simple and linear time randomized algorithm for computing sparse spanners in weighted graphs}, ADDRESS = {New York, NY, USA}, NUMBER = {4}, PUBLISHER = {Wiley}, MONTH = {July}, VOLUME = {30}, ISBN = {1042-9832}, DOI = {10.1002/rsa.20130}, YEAR = {2007}, PAGES = {532--563}, ABSTRACT = {Let G = (V,E) be an undirected weighted graph on |V | = n vertices and |E| = m edges. A t-spanner of the graph G, for any t 1, is a subgraph (V,ES), ES E, such that the distance between any pair of vertices in the subgraph is at most t times the distance between them in the graph G. Computing a t-spanner of minimum size (number of edges) has been a widely studied and well-motivated problem in computer science. In this paper we present the first linear time randomized algorithm that computes a t-spanner of a given weighted graph. Moreover, the size of the t-spanner computed essentially matches the worst case lower bound implied by a 43-year old girth lower bound conjecture made independently by Erds, Bollob{\'a}s, and Bondy \& Simonovits.Our algorithm uses a novel clustering approach that avoids any distance computation altogether. This feature is somewhat surprising since all the previously existing algorithms employ computation of some sort of local or global distance information, which involves growing either breadth first search trees up to (t)-levels or full shortest path trees on a large fraction of vertices. The truly local approach of our algorithm also leads to equally simple and efficient algorithms for computing spanners in other important computational environments like distributed, parallel, and external memory. © 2006 Wiley Periodicals, Inc. Random Struct. Alg., 2007 }, } @ARTICLE{BatraSharma2010, AUTHOR = {Batra, Prashant and Sharma, Vikram}, JOURNAL = {Journal of Symbolic Computation}, TITLE = {Bounds on absolute positiveness of multivariate polynomials}, ADDRESS = {Amsterdam}, NUMBER = {6}, PUBLISHER = {Elsevier}, VOLUME = {45}, ISBN = {0747-7171}, DOI = {10.1016/j.jsc.2010.01.012}, YEAR = {2010}, PAGES = {617--628}, } @INPROCEEDINGS{Baumann2004, AUTHOR = {Baumann, Nadine and K{\"o}hler, Ekkehard}, EDITOR = {Fiala, Jiri and Koubek, Vaclav and Kratochvil, Jan}, TITLE = {Approximating Earliest Arrival Flows with Flow-Dependent Transit Times}, BOOKTITLE = {Mathematical foundations of computer science 2004 : 29th International Symposium, MFCS 2004}, ORGANIZATION = {Mathematical Foundations of Computer Science (MFCS)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Prague, Czech Republic}, PUBLISHER = {Springer}, MONTH = {August}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {3153}, ISBN = {3-540-22823-3}, YEAR = {2004}, PAGES = {599--610}, ABSTRACT = {For the earliest arrival flow problem one is given a network $G=(V, A)$ with capacities $u(a)$ and transit times $\tau(a)$ on its arcs $a \in A$, together with a source and a sink vertex $s, t \in V$. The objective is to send flow from $s$ to $t$ that moves through the network over time, such that for each point in time $\theta \in [0,T)$ the maximum possible amount of flow reaches $t$. If, for each $\theta \in [0,T)$ this flow is a maximum flow for time horizon $\theta$, then it is called \emph{earliest arrival flow}. In practical applications a higher congestion of an arc in the network often implies a considerable increase in transit time. Therefore, in this paper we study the earliest arrival problem for the case that the transit time of each arc in the network at each time $\theta$ depends on the flow on this particular arc at that time $\theta$. For constant transit times it has been shown by Gale that earliest arrival flows exist for any network. We give examples, showing that this is no longer true for flow-dependent transit times. For that reason we define an optimization version of this problem where the objective is to find flows that are almost earliest arrival flows. In particular, we are interested in flows that, for each $\theta \in [0,T)$, need only $\alpha$-times longer to send the maximum flow to the sink. We give both constant lower and upper bounds on $\alpha$; furthermore, we present a constant factor approximation algorithm for this problem. Finally, we give some computational results to show the practicability of the designed approximation algorithm.}, } @INPROCEEDINGS{BaumbachFKKMP2011, AUTHOR = {Baumbach, Jan and Friedrich, Tobias and K{\"o}tzing, Timo and Krohmer, Anton and M{\"u}ller, Joachim and Pauling, Josch}, TITLE = {Efficient algorithms for extracting biological key pathways with global constraints}, BOOKTITLE = {GECCO'12 : Proceedings of the Fourteenth International Conference on Genetic and Evolutionary Computation}, PADDRESS = {New York, NY}, ADDRESS = {Philadelphia, PA, USA}, PUBLISHER = {ACM}, ISBN = {978-1-4503-1177-9}, DOI = {10.1145/2330163.2330188}, YEAR = {2012}, PAGES = {169--176}, } @MASTERSTHESIS{BausDipl05, AUTHOR = {Baus, Andreas}, TITLE = {Symbolic Constraints in Linear Integer Programming}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {March}, YEAR = {2005}, } @MASTERSTHESIS{Baus/Diplom04, AUTHOR = {Baus, Andreas}, TITLE = {Symbolic Constraints in Linear Integer Programming}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {November}, YEAR = {2004}, } @INPROCEEDINGS{BBDFKN09, AUTHOR = {Baswana, Surender and Biswas, Somenath and Doerr, Benjamin and Friedrich, Tobias and Kurur, Piyush P. and Neumann, Frank}, EDITOR = {Jansen, Thomas and Garibay, Ivan and Wiegand, R.Paul and Wu, Annie S.}, TITLE = {Computing Single Source Shortest Paths using Single-Objective Fitness Functions}, BOOKTITLE = {FOGA'09 : revised selected papers from ACM SIGEVO Foundations of Genetic Algorithms X}, PADDRESS = {New York, NY}, ADDRESS = {Orlando, USA}, PUBLISHER = {ACM}, ISBN = {978-1-60558-414-0}, DOI = {10.1145/1527125.1527134}, YEAR = {2009}, PAGES = {59--66}, } @INPROCEEDINGS{BBP:SCG98, AUTHOR = {Br{\"o}nnimann, Herv{\'e} and Burnikel, Christoph and Pion, Sylvain}, TITLE = {Interval analysis yields efficient dynamic filters for computational geometry}, BOOKTITLE = {Proceedings of the 14th International Annual ACM Symposium on Computational Geometry (SCG-98)}, ORGANIZATION = {Association Computing Machinery (ACM)}, PADDRESS = {New York, USA}, ADDRESS = {Minneapolis, Minnesota}, NUMBER = {14}, PUBLISHER = {ACM Press}, MONTH = {June}, ISBN = {0-89791-973-4}, YEAR = {1998}, PAGES = {165--174}, ABSTRACT = {We discuss interval techniques for speeding up the exact evaluation of geometric predicates and describe an efficient implementation of interval arithmetic that is strongly influenced by the rounding modes of the widely used IEEE 754 standard. Using this approach we engineer an efficient floating point filter for the computation of the sign of a determinant that works for arbitrary dimensions. Furthermore we show how to use our interval techniques for exact linear optimization problems of low dimension as they arise in geometric computing. We validate our approach experimentally, comparing it with other static, dynamic and semi-static filters.}, } @INPROCEEDINGS{BCMP1999, AUTHOR = {Brengel, Klaus and Crauser, Andreas and Meyer, Ulrich and Ferragina, Paolo}, EDITOR = {Vitter, Jeffrey S. and Zaroliagis, Christos D.}, TITLE = {An Experimental Study of Priority Queues in External Memory}, BOOKTITLE = {Algorithm engineering (WAE-99) : 3rd International Workshop, WAE'99}, PADDRESS = {Berlin}, ADDRESS = {London, UK}, PUBLISHER = {Springer}, MONTH = {July}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1668}, ISBN = {3-540-66427-0}, YEAR = {1999}, PAGES = {345--359}, } @INPROCEEDINGS{BCT03:SweepSynchro, AUTHOR = {Beldiceanu, Nicolas and Carlsson, Mats and Thiel, Sven}, TITLE = {Sweep Synchronization as a Global Propagation Mechanism}, BOOKTITLE = {Fifth International Workshop on Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems}, PADDRESS = {Montreal, Canada}, ADDRESS = {Montreal, Canada}, PUBLISHER = {Centre for Research on Transportation}, MONTH = {May}, YEAR = {2003}, PAGES = {139--152}, } @TECHREPORT{BCT2002:SumOfWeights, AUTHOR = {Beldiceanu, Nicolas and Carlsson, Mats and Thiel, Sven}, TITLE = {Cost-Filtering Algorithms for the two Sides of the Sum of Weights of Distinct Values Constraint}, INSTITUTION = {Swedish Institute of Computer Science}, TYPE = {Technical Report}, ADDRESS = {Uppsala, Sweden}, NUMBER = {SICS-T-2002:14-SE}, MONTH = {October}, ISBN = {1100-3154}, YEAR = {2002}, PAGES = {46}, ABSTRACT = {This article introduces the sum of weights of distinct values constraint, which can be seen as a generalization of the number of distinct values as well as of the alldifferent, and the relaxed alldifferent constraints. This constraint holds if a cost variable is equal to the sum of the weights associated to the distinct values taken by a given set of variables. For the first aspect, which is related to domination, we present four filtering algorithms. Two of them lead to perfect pruning when each domain variable consists of one set of consecutive values, while the two others take advantage of holes in the domains. For the second aspect, which is connected to maximum matching in a bipartite graph, we provide a complete filtering algorithm for the general case. Finally we introduce several generic deduction rules, which link both aspects of the constraint. These rules can be applied to other optimization constraints such as the minimum weight alldifferent constraint or the global cardinality constraint with costs. They also allow taking into account external constraints for getting enhanced bounds for the cost variable. In practice, the sum of weights of distinct values constraint occurs in assignment problems where using a resource once or several times costs the same. It also captures domination problems where one has to select a set of vertices in order to control every vertex of a graph.}, } @INPROCEEDINGS{BCW-ECARC2007, AUTHOR = {Berberich, Eric and Caroli, Manuel and Wolpert, Nicola}, TITLE = {Exact Computation of Arrangements of Rotated Conics}, BOOKTITLE = {Proceedings of 23rd European Workshop on Computational Geometry}, PADDRESS = {Graz, Austria}, ADDRESS = {Graz, Austria}, PUBLISHER = {Technische Universitaet Graz}, MONTH = {March}, ISBN = {978-3-902465-62-7}, YEAR = {2007}, PAGES = {231--234}, ABSTRACT = {Transformations of geometric objects, like translation and rotation, are fundamental operations in CAD-systems. Rotations trigger the need to deal with trigonometric functions, which is hard to achieve when aiming for exact and robust implementation. We show how we efficiently compute the planar arrangement of conics rotated by angles that can be constructed with straightedge and compass. Well-known examples are multiples of $45{^{\circ}}$, $30{^{\circ}}$, and $15{^{\circ}}$. The main problem one has to solve is root-isolation of univariate polynomials $p(x)\in \mathbb{Q}(\sqrt{c_1})\ldots(\sqrt{c_d})[x]$, for which we use a modified version of the Descartes method. For $d=1$, %In the case $p(x)\in \mathbb{Q}(\sqrt{c})[x]$ we additionally present a new method that isolates the real roots of $p$ by using root isolation for polynomials $q(x)\in\mathbb{Q}[x]$ only. We show results of our benchmark experiences comparing both methods.}, } @INPROCEEDINGS{BDN2010, AUTHOR = {B{\"o}ttcher, S{\"u}ntje and Doerr, Benjamin and Neumann, Frank}, EDITOR = {Schaefer, Robert and Cotta, Carlos and Kolodziej, Joanna and Rudolph, G{\"u}nter}, TITLE = {Optimal fixed and adaptive mutation rates for the {LeadingOnes} problem}, BOOKTITLE = {Parallel Problem Solving from Nature - PPSN XI. - Pt. 1}, PADDRESS = {Berlin}, ADDRESS = {Krakow, Poland}, PUBLISHER = {Springer}, MONTH = {September}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6238}, ISBN = {978-3-642-15843-8}, DOI = {10.1007/978-3-642-15844-5_1}, YEAR = {2010}, PAGES = {1--10}, } @INPROCEEDINGS{Becchetti2003, AUTHOR = {Becchetti, Luca and Leonardi, Stefano and Marchetti-Spaccamela, Alberto and Sch{\"a}fer, Guido}, TITLE = {Scheduling to minimize flow time metrics}, BOOKTITLE = {International Parallel and Distributed Processing Symposium (IPDPS-03)}, ORGANIZATION = {IEEE}, PADDRESS = {Los Alamitos, USA}, ADDRESS = {Nice, France}, PUBLISHER = {IEEE}, ISBN = {0-7695-1926-1}, YEAR = {2003}, PAGES = {223b--CDROM}, } @INPROCEEDINGS{Becker2011, AUTHOR = {Christodoulou, George and Mehlhorn, Kurt and Pyrga, Evangelia}, EDITOR = {Demetrescu, Camil and Halld{\'o}rsson, Magn{\'u}s M.}, TITLE = {Improving the Price of Anarchy for Selfish Routing via Coordination Mechanisms}, BOOKTITLE = {Algorithms - ESA 2011 : 19th Annual European Symposium}, PADDRESS = {Berlin}, ADDRESS = {Saarbr{\"u}cken, Germany}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6942}, ISBN = {978-3-642-23718-8}, DOI = {10.1007/978-3-642-23719-5_11}, YEAR = {2011}, PAGES = {119--130}, } @MASTERSTHESIS{Becker96, AUTHOR = {Becker, J{\"o}rg}, TITLE = {{Allgemeine approximative Kongruenz zweier Punktmengen im R³}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, YEAR = {1996}, } @TECHREPORT{beef-ecscaca-04, AUTHOR = {Berberich, Eric and Eigenwillig, Arno and Emiris, Ioannis and Fogel, Efraim and Hemmer, Michael and Halperin, Dan and Kakargias, Athanasios and Kettner, Lutz and Mehlhorn, Kurt and Pion, Sylvain and Sch{\"o}mer, Elmar and Teillaud, Monique and Wein, Ron and Wolpert, Nicola}, TITLE = {An Empirical Comparison of Software for Constructing Arrangements of Curved Arcs}, INSTITUTION = {Effective Computational Geometry for Curves and Surfaces}, TYPE = {Report}, ADDRESS = {Sophia Antipolis, France}, NUMBER = {ECG-TR-361200-01}, YEAR = {2004}, PAGES = {11}, } @INPROCEEDINGS{behhms-cbcabocp-2002, AUTHOR = {Berberich, Eric and Eigenwillig, Arno and Hemmer, Michael and Hert, Susan and Mehlhorn, Kurt and Sch{\"o}mer, Elmar}, EDITOR = {M{\"o}hring, Rolf and Raman, Rajeev}, TITLE = {A Computational Basis for Conic Arcs and Boolean Operations on Conic Polygons}, BOOKTITLE = {Algorithms - ESA 2002 : 10th Annual European Symposium}, PADDRESS = {Berlin, Germany}, ADDRESS = {Rome, Italy}, PUBLISHER = {Springer}, MONTH = {September}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {2461}, ISBN = {3-540-44180-8}, YEAR = {2002}, PAGES = {174--186}, ABSTRACT = {We give an exact geometry kernel for conic arcs, algorithms for exact computation with low-degree algebraic numbers, and an algorithm for computing the arrangement of conic arcs that immediately leads to a realization of regularized boolean operations on conic polygons. A conic polygon, or polygon for short, is anything that can be obtained from linear or conic halfspaces (= the set of points where a linear or quadratic function is non-negative) by regularized boolean operations. The algorithm and its implementation are complete (they can handle all cases), exact (they give the mathematically correct result), and efficient (they can handle inputs with several hundred primitives).}, } @INPROCEEDINGS{Behle2007, AUTHOR = {Behle, Markus}, EDITOR = {Dress, Andreas and Xu, Yinfeng and Zhu, Binhai}, TITLE = {On threshold BDDs and the optimal variable ordering problem}, BOOKTITLE = {Combinatorial Optimization and Applications : First International Conference, COCOA 2007}, PADDRESS = {Berlin, Germany}, ADDRESS = {Xi’an, China}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4616}, ISBN = {3-540-73555-7}, DOI = {10.1007/978-3-540-73556-4_15}, YEAR = {2007}, PAGES = {124--135}, } @INPROCEEDINGS{Behle2007A, AUTHOR = {Behle, Markus and J{\"u}nger, Michael and Liers, Frauke}, EDITOR = {Demetrescu, Camil}, TITLE = {A Primal Branch-and-Cut Algorithm for the Degree-Constrained Minimum Spanning Tree Problem}, BOOKTITLE = {Experimental Algorithms : 6th International Workshop, WEA 2007}, PADDRESS = {Berlin, Germany}, ADDRESS = {Rome, Italy}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4525}, ISBN = {3-540-72844-3}, DOI = {10.1007/978-3-540-72845-0_29}, YEAR = {2007}, PAGES = {379--392}, } @MASTERSTHESIS{Behrens2000, AUTHOR = {Behrens, Christian}, TITLE = {{Solid Modeling durch Boolesche Operationen}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {January}, YEAR = {2000}, } @INPROCEEDINGS{Bei2015, AUTHOR = {Bei, Xiaohui}, EDITOR = {Halld{\'o}rsson, Magn{\'u}s M. and Iwama, Kazuo and Kobayashi, Naoki and Speckmann, Bettina}, TITLE = {Solving Linear Programming with Constraints Unknown}, BOOKTITLE = {Automata, Languages, and Programming - 42nd International Colloquium, ICALP 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part I.}, ORGANIZATION = {European Association for Theoretical Computer Science (EATCS)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Kyoto, Japan}, PUBLISHER = {Springer}, MONTH = {July}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1}, ISBN = {978-3-662-47671-0}, DOI = {10.1007/978-3-662-47672-7_11}, YEAR = {2015}, PAGES = {129--142}, } @MASTERSTHESIS{Beier2000, AUTHOR = {Beier, Rene}, TITLE = {{Eine Heuristik f{\"u}r das Gossiping-Problem}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {August}, YEAR = {2000}, } @INPROCEEDINGS{Beier2003, AUTHOR = {Beier, Rene and V{\"o}cking, Berthold}, TITLE = {Random Knapsack in Expected Polynomial Time}, BOOKTITLE = {Proceedings of the 35th Annual ACM Symposium on Theory of Computing (STOC-03)}, ORGANIZATION = {Association of Computing Machinery (ACM)}, PADDRESS = {New York, USA}, ADDRESS = {San Diego, USA}, PUBLISHER = {ACM}, ISBN = {1-58113-674-9}, YEAR = {2003}, PAGES = {232--241}, ABSTRACT = {In this paper, we present the first average-case analysis proving an expected polynomial running time for an exact algorithm for the 0/1 knapsack problem. In particular, we prove, for various input distributions, that the number of {\em dominating solutions\/} (i.e., Pareto-optimal knapsack fillings) to this problem is polynomially bounded in the number of available items. An algorithm by Nemhauser and Ullmann can enumerate these solutions very efficiently so that a polynomial upper bound on the number of dominating solutions implies an algorithm with expected polynomial running time. The random input model underlying our analysis is very general and not restricted to a particular input distribution. We assume adversarial weights and randomly drawn profits (or vice versa). Our analysis covers general probability distributions with finite mean, and, in its most general form, can even handle different probability distributions for the profits of different items. This feature enables us to study the effects of correlations between profits and weights. Our analysis confirms and explains practical studies showing that so-called {\em strongly correlated\/} instances are harder to solve than {\em weakly correlated\/} ones.}, } @INPROCEEDINGS{Beier2003a, AUTHOR = {Banderier, Cyril and Beier, Rene and Mehlhorn, Kurt}, EDITOR = {Rovan, Branislav and Vojtas, Peter}, TITLE = {Smoothed Analysis of Three Combinatorial Problems}, BOOKTITLE = {Mathematical foundations of computer science 2003 : 28th International Symposium, MFCS 2003}, ORGANIZATION = {European Association for Theoretical Computer Science}, PADDRESS = {Berlin, Germany}, ADDRESS = {Bratislava, Slovak Republic}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {2747}, ISBN = {3-540-40671-9}, DOI = {10.1007/b11836}, YEAR = {2003}, PAGES = {198--207}, ABSTRACT = { Smoothed analysis combines elements over worst-case and average case analysis. For an instance $x$, the smoothed complexity is the average complexity of an instance obtained from $x$ by a perturbation. The smoothed complexity of a problem is the worst smoothed complexity of any instance. Spielman and Teng introduced this notion for continuous problems. We apply the concept to combinatorial problems and study the smoothed complexity of three classical discrete problems: quicksort, left-to-right maxima counting, and shortest paths.}, } @INPROCEEDINGS{Beier2004a, AUTHOR = {Beier, Rene and V{\"o}cking, Berthold}, TITLE = {Probabilistic Analysis of {Knapsack} Core Algorithms}, BOOKTITLE = {Proceedings of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-04)}, ORGANIZATION = {Association of Computing Machinery (ACM) and SIAM}, PADDRESS = {New York, USA}, ADDRESS = {New Orleans, USA}, PUBLISHER = {ACM}, ISBN = {0-89871-558-X}, YEAR = {2004}, PAGES = {461--470}, ABSTRACT = {We study the average-case performance of algorithms for the binary knapsack problem. Our focus lies on the analysis of so-called {\em core algorithms}, the predominant algorithmic concept used in practice. These algorithms start with the computation of an optimal fractional solution that has only one fractional item and then they exchange items until an optimal integral solution is found. The idea is that in many cases the optimal integral solution should be close to the fractional one such that only a few items need to be exchanged. Despite the well known hardness of the knapsack problem on worst-case instances, practical studies show that knapsack core algorithms can solve large scale instances very efficiently. For example, they exhibit almost linear running time on purely random inputs. In this paper, we present the first theoretical result on the running time of core algorithms that comes close to the results observed in practical experiments. We prove an upper bound of $O(n \, \polylog(n))$ on the expected running time of a core algorithm on instances with $n$ items whose profits and weights are drawn independently, uniformly at random. A previous analysis on the average-case complexity of the knapsack problem proves a running time of $O(n^4)$, but for a different kind of algorithms. The previously best known upper bound on the running time of core algorithms is polynomial as well. The degree of this polynomial, however, is at least a large three digit number. In addition to uniformly random instances, we investigate harder instances in which profits and weights are pairwise correlated. For this kind of instances, we can prove a tradeoff describing how the degree of correlation influences the running time.}, } @INPROCEEDINGS{Beier2004b, AUTHOR = {Beier, Rene and Krysta, Piotr and Czumaj, Artur and V{\"o}cking, Berthold}, TITLE = {Computing Equilibria for Congestion Games with (Im)perfect Information}, BOOKTITLE = {Proceedings of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-04)}, ORGANIZATION = {Association of Computing Machinery (ACM)}, PADDRESS = {New York, USA}, ADDRESS = {New Orleans, USA}, PUBLISHER = {ACM}, ISBN = {0-89871-558-X}, YEAR = {2004}, PAGES = {739--748}, ABSTRACT = {We study algorithmic questions concerning a basic microeconomic congestion game in which there is a single provider that offers a service to a set of potential customers. Each customer has a particular demand of service and the behavior of the customers is determined by utility functions that are non-increasing in the congestion. Customers decide whether to join or leave the service based on the experienced congestion and the offered prices. Following standard game theory, we assume each customer behaves in the most rational way. If the prices of service are fixed, then such a customer behavior leads to a pure, not necessarily unique Nash equilibrium among the customers. In order to evaluate marketing strategies, the service provider is interested in estimating its revenue under the best and worst customer equilibria. We study the complexity of this problem under different models of information available to the provider. % \begin{itemize} \item We first consider the classical model in which the provider has perfect knowledge of the behavior of all customers. We present a complete characterization of the \emph{complexity of computing optimal pricing strategies} and of \emph{computing best and worst equilibria}. Basically, we show that most of these problems are inapproximable in the worst case but admit an ``average-case FPAS.'' Our average case analysis covers general distributions for customer demands and utility thresholds. We generalize our analysis to robust equilibria in which players change their strategies only when this promises a significant utility improvement. % \item We extend our analysis to a more realistic model in which the provider has \emph{incomplete information}. Following the game theoretic framework of Bayesian games introduced by Harsanyi, we assume that the provider is aware of probability distributions describing the behavior of the customers and aims at estimating its expected revenue under best and worst equilibria. Somewhat counterintuitive, we obtain an FPRAS for the equilibria problem in the model with imperfect information although the problem with perfect information is inapproximable under the worst case measures. In particular, the worst case complexity of the considered stochastic equilibria problems increases with the precision of the available knowledge. \end{itemize}}, } @INPROCEEDINGS{Beier2004c, AUTHOR = {Beier, Rene and V{\"o}cking, Berthold}, TITLE = {Typical Properties of Winners and Losers in Discrete Optimization}, BOOKTITLE = {Proceedings of the 36th Annual ACM Symposium on Theory of Computing (STOC-04)}, ORGANIZATION = {Association of Computing Machinery (ACM)}, PADDRESS = {New York, USA}, ADDRESS = {Chicago, USA}, PUBLISHER = {ACM}, MONTH = {June}, ISBN = {1-58113-852-0}, YEAR = {2004}, PAGES = {343--352}, ABSTRACT = {We present a probabilistic analysis for a large class of combinatorial optimization problems containing, e.g., all {\em binary optimization problems} defined by linear constraints and a linear objective function over $\{0,1\}^n$. By parameterizing which constraints are of stochastic and which are of adversarial nature, we obtain a semi-random input model that enables us to do a general average-case analysis for a large class of optimization problems while at the same time taking care for the combinatorial structure of individual problems. Our analysis covers various probability distributions for the choice of the stochastic numbers and includes {\em smoothed analysis} with Gaussian and other kinds of perturbation models as a special case. In fact, we can exactly characterize the smoothed complexity of optimization problems in terms of their random worst-case complexity. \begin{center} \begin{minipage}{0.42\textwidth} A binary optimization problem has a {\em polynomial smoothed complexity} if and only if it has a pseudopolynomial complexity. \end{minipage} \end{center} Our analysis is centered around structural properties of binary optimization problems, called {\em winner}, {\em loser}, and {\em feasibility gaps}. We show, when the coefficients of the objective function and/or some of the constraints are stochastic, then there usually exist a polynomial $n^{-\Omega(1)}$ gap between the best and the second best solution as well as a polynomial slack to the boundary of the constraints. Similar to the condition number for linear programming, these gaps describe the sensitivity of the optimal solution to slight perturbations of the input and can be used to bound the necessary accuracy as well as the complexity for solving an instance. We exploit the gaps in form of an adaptive rounding scheme increasing the accuracy of calculation until the optimal solution is found. The strength of our techniques is illustrated by applications to various \npc-hard optimization problems from mathematical programming, network design, and scheduling for which we obtain the the first algorithms with polynomial average-case/smoothed complexity.}, } @ARTICLE{Beier2004e, AUTHOR = {Beier, Ren{\'e} and V{\"o}cking, Berthold}, JOURNAL = {Journal of Computer and System Sciences}, TITLE = {Random knapsack in expected polynomial time}, NUMBER = {3}, PUBLISHER = {Elsevier}, MONTH = {June}, VOLUME = {69}, YEAR = {2004}, PAGES = {306--329}, ABSTRACT = {We present the first average-case analysis proving a polynomial upper bound on the expected running time of an exact algorithm for the 0/1 knapsack problem. In particular, we prove for various input distributions, that the number of Pareto-optimal knapsack fillings is polynomially bounded in the number of availa ble items. An algorithm by Nemhauser and Ullmann can enumerate these solutions very efficiently so that a polynomial upper bound on the number of Pareto-optimal sol utions implies an algorithm with expected polynomial running time. The random input model underlying our analysis is quite general and not restricted to a particular input distribution. We assume adversarial weights and randomly drawn profits (or vice versa). Our analysis covers general probability distributions with finite mean and, in its most general form, can even handle different probability distributions for the profits of different items. This feature enables us to study the effects of correlations between profits and weights. Our analysis confirms and explains practical studies showing that so-called {\em strongly correlated\/} instances are harder to solve than {\em weakly correlated\/} ones.}, } @ARTICLE{Beier2006, AUTHOR = {Beier, Ren{\'e} and V{\"o}cking, Berthold}, JOURNAL = {SIAM Journal on Computing}, TITLE = {Typical Properties of Winners and Losers in Discrete Optimization}, ADDRESS = {Philadelphia, PA, USA}, NUMBER = {4}, PUBLISHER = {SIAM}, MONTH = {February}, VOLUME = {35}, YEAR = {2006}, PAGES = {855--881}, ABSTRACT = {We present a probabilistic analysis of a large class of combinatorial optimization problems containing all {\em binary optimization problems} defined by linear constraints and a linear objective function over $\{0,1\}^n$. Our analysis is based on a semirandom input model that preserves the combinatorial structure of the underlying optimization problem by parameterizing which input numbers are of a stochastic and which are of an adversarial nature. This input model covers various probability distributions for the choice of the stochastic numbers and includes {\em smoothed analysis} with Gaussian and other kinds of perturbation models as a special case. In fact, we can exactly characterize the smoothed complexity of binary optimization problems in terms of their worst-case complexity: A binary optimization problem has polynomial smoothed complexity if and only if it admits a (possibly randomized) algorithm with pseudo-polynomial worst-case complexity. Our analysis is centered around structural properties of binary optimization problems, called {\em winner}, {\em loser}, and {\em feasibility gap}. We show that if the coefficients of the objective function are stochastic, then the gap between the best and second best solution is likely to be of order $\Omega(1/n)$. Furthermore, we show that if the coefficients of the constraints are stochastic, then the slack of the optimal solution with respect to this constraint is typically of order $\Omega(1/n^2)$. We exploit these properties in an adaptive rounding scheme that increases the accuracy of calculation until the optimal solution is found. The strength of our techniques is illustrated by applications to various \npc-hard optimization problems from mathematical programming, network design, and scheduling for which we obtain the first algorithms with polynomial smoothed/average-case complexity.}, } @ARTICLE{Beier2006b, AUTHOR = {Beier, Ren{\'e} and V{\"o}cking, Berthold}, JOURNAL = {Algorithmica}, TITLE = {An Experimental Study of Random Knapsack Problems}, ADDRESS = {New York, USA}, NUMBER = {1}, PUBLISHER = {Springer}, MONTH = {February}, VOLUME = {45}, ISBN = {0178-4617}, YEAR = {2006}, PAGES = {121--136}, ABSTRACT = {The size of the Pareto curve for the bicriteria version of the knapsack problem is polynomial on average. This has been shown for various random input distributions. We experimentally investigate the number of Pareto points for knapsack instances over $n$ elements whose profits and weights are chosen at random according to various classes of input distributions. The numbers observed in our experiments are significantly smaller than the known upper bounds. For example, the upper bound for so-called uniform instances is $O(n^3)$. Based on our experiments, we conjecture that the number of Pareto points for these instances is only $\Theta(n^2)$. We also study other structural properties for random knapsack instances that have been used in theoretical studies to bound the average-case complexity of the knapsack problem. Furthermore, we study advanced algorithmic techniques for the knapsack problem. In particular, we review several ideas that originate from theory as well as from practice. Most of the concepts that we use are simple and have been known since at least 20 years, but apparently have not been used in this combination. Surprisingly, the result of our study is a very competitive code that outperforms the best previous implementation \emph{Combo} by orders of magnitude for various classes of random instances, including harder random knapsack instances in which profits and weights are chosen in a correlated fashion.}, } @ARTICLE{Beier2006c, AUTHOR = {Beier, Ren{\'e} and Czumaj, Artur and Krysta, Piotr and V{\"o}cking, Berthold}, JOURNAL = {ACM Transactions on Algorithms}, TITLE = {Computing Equilibria for a Service Provider Game with (Im)perfect Information}, ADDRESS = {New York, USA}, NUMBER = {4}, PUBLISHER = {ACM}, MONTH = {October}, VOLUME = {2}, ISBN = {1549-6325}, YEAR = {2006}, PAGES = {679--706}, ABSTRACT = { We study fundamental algorithmic questions concerning the complexity of market equilibria under perfect and imperfect information by means of a basic microeconomic game. Suppose a provider offers a service to a set of potential customers. Each customer has a particular demand of service and her behavior is determined by a utility function that is nonincreasing in the sum of demands that are served by the provider. Classical game theory assumes complete information: the provider has full knowledge of the behavior of all customers. We present a complete characterization of the complexity of computing optimal pricing strategies and of computing best/worst equilibria in this model. Basically, we show that most of these problems are inapproximable in theworst case but admit an FPASin the average case. Our average case analysis covers large classes of distributions for customer utilities. We generalize our analysis to robust equilibria in which players change their strategies only when this promises a significant utility improvement.}, } @INPROCEEDINGS{Beier2007, AUTHOR = {Beier, Ren{\'e} and R{\"o}glin, Heiko and V{\"o}cking, Berthold}, EDITOR = {Fischettim, Matteo and Williamson, David P.}, TITLE = {The Smoothed Number of {Pareto} Optimal Solutions in Bicriteria Integer Optimization}, BOOKTITLE = {Integer Programming and Combinatorial Optimization : 12th International IPCO Conference}, PADDRESS = {Berlin, Germany}, ADDRESS = {Ithaca, USA}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4513}, ISBN = {3-540-72791-0}, DOI = {10.1007/978-3-540-72792-7_5}, YEAR = {2007}, PAGES = {53--67}, NOTE = {To Appear}, } @ARTICLE{Beier2011, AUTHOR = {Beier, Rene and Funke, Stefan and Matijevic, Domagoj and Sanders, Peter}, JOURNAL = {Algorithmica}, TITLE = {Energy-Efficient Paths in Radio Networks}, ADDRESS = {Berlin}, NUMBER = {2}, PUBLISHER = {Springer}, VOLUME = {61}, ISBN = {0178-4617}, DOI = {10.1007/s00453-010-9414-0}, YEAR = {2011}, PAGES = {298--319}, } @PHDTHESIS{BeierDiss04, AUTHOR = {Beier, Rene}, TITLE = {Probabilistic Analysis of Discrete Optimization Problems}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Doctoral dissertation}, MONTH = {September}, YEAR = {2004}, } @INPROCEEDINGS{BeierSibeyn00, AUTHOR = {Beier, Rene and Sibeyn, Jop F.}, EDITOR = {Flammini, Michele and Nardelli, Enrico and Proietti, Guido and Spirakis, Paul}, TITLE = {A powerful heuristic for telephone gossiping}, BOOKTITLE = {Proceedings of the 7th International Colloquium on Structural Information and Communication Complexity (SIROCCO-00)}, PADDRESS = {Waterloo, Canada}, ADDRESS = {L'Aquila, Italy}, PUBLISHER = {Carleton Scientific}, MONTH = {August}, SERIES = {Proceedings in Informatics}, VOLUME = {7}, ISBN = {1-894145-06-2}, YEAR = {2000}, PAGES = {17--36}, } @ARTICLE{BeinFleischerLarmore2000, AUTHOR = {Bein, Wolfgang W. and Fleischer, Rudolf and Larmore, Lawrence L.}, JOURNAL = {Information Processing Letters}, TITLE = {Limited bookmark randomized online algorithms for the paging problem}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {4-6}, PUBLISHER = {Elsevier}, VOLUME = {76}, YEAR = {2000}, PAGES = {155--162}, } @ARTICLE{BEKS:GEOTOP:2011, AUTHOR = {Berberich, Eric and Emeliyanenko, Pavel and Kobel, Alexander and Sagraloff, Michael}, JOURNAL = {arXiv}, TITLE = {Exact Symbolic-Numeric Computation of Planar Algebraic Curves}, ADDRESS = {Ithaca, NY}, PUBLISHER = {Cornell University Library}, MONTH = {January}, VOLUME = {abs/1201.1548v1}, YEAR = {2012}, PAGES = {1--46}, NOTE = {Submitted to Theoretical Computer Science, corresponding conference versions have been published in the proceedings of ALENEX 2011 and SNC 2011}, } @INPROCEEDINGS{beks:snc:2011, AUTHOR = {Berberich, Eric and Emeliyanenko, Pavel and Kobel, Alexander and Sagraloff, Michael}, EDITOR = {Moreno Maza, Marc}, TITLE = {Arrangement Computation for Planar Algebraic Curves}, BOOKTITLE = {Proceedings of the 4th Internal Workshop on Symbolic-Numeric Computation}, ORGANIZATION = {ACM}, PADDRESS = {New York, NY, USA}, ADDRESS = {San Jose, USA}, PUBLISHER = {ACM}, MONTH = {June}, ISBN = {978-1-4503-0515-0}, DOI = {10.1145/2331684.2331698}, YEAR = {2011}, PAGES = {88--98}, NOTE = {An extended version has been submitted to Theoretical Computer Science}, } @ARTICLE{beks:snc:2011a, AUTHOR = {Berberich, Eric and Emeliyanenko, Pavel and Kobel, Alexander and Sagraloff, Michael}, JOURNAL = {arXiv}, TITLE = {Arrangement Computation for Planar Algebraic Curves}, ADDRESS = {Ithaca, NY}, PUBLISHER = {Cornell University Library}, VOLUME = {abs/1103.4697}, YEAR = {2011}, } @TECHREPORT{BeldiceanuKatrielThiel2004, AUTHOR = {Beldiceanu, Nicolas and Katriel, Irit and Thiel, Sven}, TITLE = {Filtering algorithms for the {S}ame and {U}sed{B}y constraints}, INSTITUTION = {Max-Planck-Institut f{\"u}r Informatik}, TYPE = {Research Report}, ADDRESS = {Stuhlsatzenhausweg 85, 66123 Saarbr{\"u}cken, Germany}, NUMBER = {MPI-I-2004-1-001}, PUBLISHER = {AG 1 - Mehlhorn}, MONTH = {February}, ISBN = {0946-011X}, YEAR = {2004}, PAGES = {36}, ABSTRACT = {We define the \Same\ and \UsedBy\ constraints. \UsedBy\ takes two sets of variables $X$ and $Z$ such that $|X|\ge |Z|$ and assigns values to them such that the multiset of values assigned to the variables in $Z$ is contained in the multiset of values assigned to the variables in $X$. \Same\ is the special case of \UsedBy\ in which $|X|=|Z|$. We show algorithms that achieve arc consistency and bound consistency for these constraints.}, } @ARTICLE{Ben-Asher-Schuster-Sibeyn95, AUTHOR = {Ben-Asher, Y. and Schuster, Assaf and Sibeyn, Jop F.}, JOURNAL = {International Journal on High-Speed Computing}, TITLE = {Load balancing: A programmer's approach or the impact of task-length parameter on the load balancing performance of parallel programs}, NUMBER = {2}, VOLUME = {7}, YEAR = {1995}, PAGES = {303--326}, } @ARTICLE{BenZwiHermelinLokshtanovNewman2011, AUTHOR = {Ben-Zwi, Oren and Hermelin, Danny and Lokshtanov, Daniel and Newman, Ilan}, JOURNAL = {Discrete Optimization}, TITLE = {Treewidth governs the complexity of target set selection}, ADDRESS = {Amsterdam}, NUMBER = {1}, PUBLISHER = {Elsevier}, VOLUME = {8}, ISBN = {1572-5286}, DOI = {10.1016/j.disopt.2010.09.007}, YEAR = {2011}, PAGES = {87--96}, } @INPROCEEDINGS{Berberich05, AUTHOR = {Berberich, Eric and Eigenwillig, Arno and Hemmer, Michael and Hert, Susan and Kettner, Lutz and Mehlhorn, Kurt and Reichel, Joachim and Schmitt, Susanne and Sch{\"o}mer, Elmar and Wolpert, Nicola}, EDITOR = {Brodal, Gerth S. and Leonardi, Stefano}, TITLE = {EXACUS: Efficient and exact algorithms for curves and surfaces}, BOOKTITLE = {13th Annual European Symposium on Algorithms (ESA 2005)}, ORGANIZATION = {European Association for Theoretical Computer Science (EATCS)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Palma de Mallorca, Spain}, PUBLISHER = {Springer}, MONTH = {October}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {3669}, ISBN = {3-540-29118-0}, DOI = {10.1007/11561071_16}, YEAR = {2005}, PAGES = {155--166}, ABSTRACT = {We present the first open-source release of the C\texttt{++} libraries of the \textsc{Exacus} project of the Max-Planck-Institut f{\"u}r Informatik. Our software computes arrangements of curves and curve segments, and boolean operations on polygons bounded by curve segments. We pursued the goals efficiency, correctness, and completeness for all input cases, implying robustness. We present the structure of the libraries and their generic design. With our work we contribute one milestone on the way towards a systematic support of non-linear geometry in software libraries.}, } @PHDTHESIS{Berberich2008, AUTHOR = {Berberich, Eric}, TITLE = {Robust and Efficient Software for Problems in 2.5-Dimensional Non-Linear Geometry - Algorithms and Implementations}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Doctoral dissertation}, MONTH = {December}, YEAR = {2008}, } @ARTICLE{Berberich20131, AUTHOR = {Berberich, Eric and Emeliyanenko, Pavel and Kobel, Alexander and Sagraloff, Michael}, JOURNAL = {Theoretical Computer Science}, TITLE = {Exact symbolic–numeric computation of planar algebraic curves}, ADDRESS = {Amsterdam}, PUBLISHER = {Elsevier}, MONTH = {June}, VOLUME = {491}, ISBN = {0304-3975}, DOI = {10.1016/j.tcs.2013.04.014}, YEAR = {2013}, PAGES = {1--32}, ABSTRACT = {We present a certified and complete algorithm to compute arrangements of real planar algebraic curves. It computes the decomposition of the plane induced by a finite number of algebraic curves in terms of a cylindrical algebraic decomposition. From a high-level perspective, the overall method splits into two main subroutines, namely an algorithm denoted BiSolve to isolate the real solutions of a zero-dimensional bivariate system, and an algorithm denoted GeoTop to compute the topology of a single algebraic curve. Compared to existing approaches based on elimination techniques, we considerably improve the corresponding lifting steps in both subroutines. As a result, generic position of the input system is never assumed, and thus our algorithm never demands for any change of coordinates. In addition, we significantly limit the types of symbolic operations involved, that is, we only use resultant and gcd computations as purely symbolic operations. The latter results are achieved by combining techniques from different fields such as (modular) symbolic computation, numerical analysis and algebraic geometry. We have implemented our algorithms as prototypical contributions to the C++-project CGAL. We exploit graphics hardware to expedite the remaining symbolic computations. We have also compared our implementation with the current reference implementations, that is, LGP and Maple’s Isolate for polynomial system solving, and CGAL’s bivariate algebraic kernel for analyses and arrangement computations of algebraic curves. For various series of challenging instances, our exhaustive experiments show that the new implementations outperform the existing ones.}, } @INPROCEEDINGS{Berenbrink2011, AUTHOR = {Berenbrink, Petra and Hoefer, Martin and Sauerwald, Thomas}, EDITOR = {Randall, Dana}, TITLE = {Distributed Selfish Load Balancing on Networks}, BOOKTITLE = {22nd ACM-SIAM Symposium on Discrete Algorithms (SODA-11)}, PADDRESS = {Philadelphia, USA}, ADDRESS = {San Francisco, CA}, PUBLISHER = {SIAM}, YEAR = {2011}, PAGES = {1487--1497}, } @INPROCEEDINGS{Berenbrink2011b, AUTHOR = {Berenbrink, Petra and Cooper, Colin and Friedetzky, Tom and Friedrich, Tobias and Sauerwald, Thomas}, EDITOR = {Randall, Dana}, TITLE = {Randomized Diffusion for Indivisible Loads}, BOOKTITLE = {22nd ACM-SIAM Symposium on Discrete Algorithms (SODA-11)}, PADDRESS = {Philadelphia, USA}, ADDRESS = {San Francisco, CA}, PUBLISHER = {SIAM}, YEAR = {2011}, PAGES = {429--439}, } @INPROCEEDINGS{BerenbrinkEFNS11, AUTHOR = {Berenbrink, Petra and Friedetzky, Tom and Elsaesser, Robert and Nagel, Lars and Sauerwald, Thomas}, EDITOR = {Murlak, Filip and Sankowski, Piotr}, TITLE = {Faster Coupon Collecting via Replication with Applications in Gossiping}, BOOKTITLE = {36th International Symposium on Mathematical Foundations of Computer Science (MFCS-11)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Warsaw, Poland}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6907}, YEAR = {2011}, PAGES = {72--83}, } @INPROCEEDINGS{Berman2003+, AUTHOR = {Berman, Piotr and Krysta, Piotr}, TITLE = {Optimizing Misdirection}, BOOKTITLE = {Proceedings of the 14th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-03)}, PADDRESS = {New York, USA}, ADDRESS = {Baltimore, USA}, PUBLISHER = {ACM}, YEAR = {2003}, PAGES = {192--201}, } @ARTICLE{BernasconiPanagiotouSteger2009, AUTHOR = {Panagiotou, Konstantinos}, JOURNAL = {Combinatorics, Probability and Computing}, TITLE = {The Degree Sequence of Random Graphs from Subcritical Classes}, NUMBER = {5}, VOLUME = {18}, YEAR = {2009}, PAGES = {647--681}, } @INPROCEEDINGS{bes-bisolve-2011, AUTHOR = {Berberich, Eric and Emeliyanenko, Pavel and Sagraloff, Michael}, EDITOR = {M{\"u}ller-Hannemann, Matthias and Werneck, Renato}, TITLE = {An Elimination Method for Solving Bivariate Polynomial Systems: Eliminating the Usual Drawbacks}, BOOKTITLE = {2011 Proceedings of the Thirteenth Workshop on Algorithm Engineering and Experiments (ALENEX)}, ORGANIZATION = {Society for Industrial and Applied Mathematics (SIAM)}, TYPE = {Extended Abstract}, PADDRESS = {Philadelphia, PA}, ADDRESS = {San Francisco, CA}, PUBLISHER = {SIAM}, MONTH = {January}, YEAR = {2011}, PAGES = {35--47}, } @ARTICLE{bes-bisolve-arxiv-2010, AUTHOR = {Berberich, Eric and Emeliyanenko, Pavel and Sagraloff, Michael}, JOURNAL = {CoRR}, TITLE = {An Elimination Method for Solving Bivariate Polynomial Systems: Eliminating the Usual Drawbacks}, ADDRESS = {Ithaca, NY}, PUBLISHER = {Cornell University Library}, MONTH = {October}, VOLUME = {abs/1010.1386}, DOI = {arXiv:1010.1386v1}, YEAR = {2010}, PAGES = {1--16}, } @INPROCEEDINGS{BF08, AUTHOR = {Bringmann, Karl and Friedrich, Tobias}, EDITOR = {Hong, Seok-Hee and Nagamochi, Hiroshi and Fukunaga, Takuro}, TITLE = {Approximating the volume of unions and intersections of high-dimensional geometric objects.}, BOOKTITLE = {Proceedings of the 19th International Symposium on Algorithms and Computation (ISAAC 2008)}, PADDRESS = {New York, USA}, ADDRESS = {Gold Coast, Australia}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5369}, ISBN = {978-3-540-92181-3}, YEAR = {2008}, PAGES = {436--447}, } @INPROCEEDINGS{BF09a, AUTHOR = {Bringmann, Karl and Friedrich, Tobias}, EDITOR = {Jansen, Thomas and Garibay, Ivan and Paul, Wiegand R. and Wu, Annie S.}, TITLE = {Don't be greedy when calculating hypervolume contributions}, BOOKTITLE = {FOGA'09 : revised selected papers from ACM SIGEVO Foundations of Genetic Algorithms {X}}, PADDRESS = {New York, NY}, ADDRESS = {Orlando, USA}, PUBLISHER = {ACM}, ISBN = {978-1-60558-414-0}, DOI = {10.1145/1527125.1527139}, YEAR = {2009}, PAGES = {103--112}, } @INPROCEEDINGS{BF09b, AUTHOR = {Bringmann, Karl and Friedrich, Tobias}, EDITOR = {Ehrgott, Matthias and Fonseca, Carlos M. and Gandibleux, Xavier and Hao, Kin-Kao and Sevaux, Marc}, TITLE = {Approximating the least hypervolume contributor: {NP}-hard in general, but fast in practice}, BOOKTITLE = {Evolutionary Multi-Criterion Optimization : 5th International Conference, EMO 2009}, PADDRESS = {Berlin}, ADDRESS = {Nantes, France}, PUBLISHER = {Springer}, VOLUME = {5467}, ISBN = {978-3-642-01019-4}, DOI = {10.1007/978-3-642-01020-0_6}, YEAR = {2009}, PAGES = {6--20}, } @INPROCEEDINGS{BF2010GECCO, AUTHOR = {Bringmann, Karl and Friedrich, Tobias}, TITLE = {The Maximum Hypervolume Set Yields Near-optimal Approximation}, BOOKTITLE = {12th annual conference on Genetic and evolutionary computation (GECCO 2010)}, PADDRESS = {New York, USA}, ADDRESS = {Portland, USA}, PUBLISHER = {ACM}, DOI = {10.1145/1830483.1830576}, YEAR = {2010}, PAGES = {511--518}, } @INPROCEEDINGS{BF2010PPSN, AUTHOR = {Bringmann, Karl and Friedrich, Tobias}, EDITOR = {Schaefer, Robert and Cotta, Carlos and Kolodziej, Joanna and Rudolph, G{\"u}nter}, TITLE = {Tight Bounds for the Approximation Ratio of the Hypervolume Indicator}, BOOKTITLE = {Parallel Problem Solving from Nature - PPSN XI. - Pt. 1}, PADDRESS = {Berlin}, ADDRESS = {Krakow, Poland}, PUBLISHER = {Springer}, MONTH = {September}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6238}, ISBN = {978-3-642-15843-8}, DOI = {10.1007/978-3-642-15844-5_61}, YEAR = {2010}, PAGES = {607--616}, } @TECHREPORT{BFFMSS04, AUTHOR = {Funke, Stefan and Mehlhorn, Kurt and Schmitt, Susanne and Burnikel, Christoph and Fleischer, Rudolf and Schirra, Stefan}, TITLE = {The LEDA class real number -- extended version}, INSTITUTION = {Effective Computational Geometry for Curves and Surfaces}, TYPE = {Report}, ADDRESS = {Sophia Antipolis, FRANCE}, NUMBER = {ECG-TR-363110-01}, YEAR = {2004}, PAGES = {2}, } @ARTICLE{bfhks-aos2-2010, AUTHOR = {Berberich, Eric and Fogel, Efi and Halperin, Dan and Kerber, Michael and Setter, Ophir}, JOURNAL = {Mathematics in Computer Science}, TITLE = {Arrangements on Parametric Surfaces {II}: {Concretizations} and Applications}, ADDRESS = {Heidelberg, Germany}, NUMBER = {1}, PUBLISHER = {Springer}, VOLUME = {4}, ISBN = {1661-8270}, DOI = {10.1007/s11786-010-0043-4}, YEAR = {2010}, PAGES = {67--91}, } @ARTICLE{bfhmw-aos1-2010, AUTHOR = {Berberich, Eric and Fogel, Efi and Halperin, Dan and Mehlhorn, Kurt and Wein, Ron}, JOURNAL = {Mathematics in Computer Science}, TITLE = {Arrangements on Parametric Surfaces {I}: {General} Framework and Infrastructure}, ADDRESS = {Berlin}, NUMBER = {1}, PUBLISHER = {Springer}, VOLUME = {4}, ISBN = {1661-8270}, DOI = {10.1007/s11786-010-0042-5}, YEAR = {2010}, PAGES = {45--66}, } @INPROCEEDINGS{bfhmw-samtdaosafs-07, AUTHOR = {Berberich, Eric and Fogel, Efi and Halperin, Dan and Mehlhorn, Kurt and Wein, Ron}, EDITOR = {Arge, Lars and Hoffmann, Michael and Welzl, Emo}, TITLE = {Sweeping and Maintaining Two-Dimensional Arrangements on Surfaces: A First Step}, BOOKTITLE = {Algorithms - ESA 2007, 15th Annual European Symposium}, TYPE = {Extended Abstract}, PADDRESS = {Berlin / Heidelberg, Germany}, ADDRESS = {Eilat, Israel}, PUBLISHER = {Springer}, MONTH = {October}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4698}, ISBN = {978-3-540-75519-7}, DOI = {10.1007/978-3-540-75520-3_57}, YEAR = {2007}, PAGES = {645--656}, } @INPROCEEDINGS{BFHW-SMTDAS2007, AUTHOR = {Berberich, Eric and Fogel, Efi and Halperin, Dan and Wein, Ron}, TITLE = {Sweeping and Maintaining Two-Dimensional Arrangements on Surfaces}, BOOKTITLE = {Proceedings of 23rd European Workshop on Computational Geometry}, PADDRESS = {Graz, Austria}, ADDRESS = {Graz, Austria}, PUBLISHER = {Technische Universitaet Graz}, MONTH = {March}, ISBN = {978-3-902465-62-7}, YEAR = {2007}, PAGES = {223--226}, ABSTRACT = {We introduce a general framework for processing a set of curves defined on a continuous two-dimensional parametric surface, while sweeping the parameter space. A major goal of our work is to maximize code reuse in implementing algorithms that employ the prevalent sweep-line paradigm, and consequently to minimize the effort needed to extend the implementation of the paradigm to various surfaces and families of curves embedded on them. We show how the sweep-line paradigm is used to construct an arrangement of curves embedded on an orientable parametric surface, and explain how the arrangement package of {\sc cgal}, which previously handled only arrangements of bounded planar curves, is extended to handle curves embedded on a general surface. To the best of our knowledge, this is the first software implementation of generic algorithms that can handle arrangements on general parametric surfaces.}, } @INPROCEEDINGS{BFMS1999, AUTHOR = {Burnikel, Christoph and Fleischer, Rudolf and Mehlhorn, Kurt and Schirra, Stefan}, TITLE = {Efficient exact geometric computation made easy}, BOOKTITLE = {Proceedings of the 15th Annual Symposium on Computational Geometry (SCG-99)}, ORGANIZATION = {ACM}, PADDRESS = {New York, USA}, ADDRESS = {Miami Beach, USA}, PUBLISHER = {ACM}, MONTH = {June}, ISBN = {1581130686}, DOI = {http://doi.acm.org/10.1145/304893.304988}, YEAR = {1999}, PAGES = {341--350}, ABSTRACT = {We show that the combination of the CGAL framework for geometric computation and the number type leda-real yields easy-to-write, correct and efficient geometric programs.}, } @ARTICLE{BFMS2000, AUTHOR = {Burnikel, Christoph and Fleischer, Rudolf and Mehlhorn, Kurt and Schirra, Stefan}, JOURNAL = {Algorithmica}, TITLE = {A strong and easily computable separation bound for arithmetic expressions involving radicals}, ADDRESS = {New York, USA}, NUMBER = {1}, PUBLISHER = {Springer}, VOLUME = {27}, ISBN = {0178-4617}, YEAR = {2000}, PAGES = {87--99}, ABSTRACT = {We consider arithmetic expressions over operators + , - , * , / , and $\sqrt[k]$ , with integer operands. For an expression E having value $\xi$ , a separation bound sep (E) is a positive real number with the property that $\xi\neq$ 0 implies $|\xi | \geq$ sep (E) . We propose a new separation bound that is easy to compute and stronger than previous bounds.}, } @INPROCEEDINGS{BFMSS2001, AUTHOR = {Burnikel, Christoph and Funke, Stefan and Mehlhorn, Kurt and Schirra, Stefan and Schmitt, Susanne}, EDITOR = {Meyer auf der Heide, Friedhelm}, TITLE = {A Separation Bound for Real Algebraic Expressions}, BOOKTITLE = {Proceedings of the 9th Annual European Symposium on Algorithms (ESA-01)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Aarhus, Denmark}, PUBLISHER = {Springer}, MONTH = {August}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {2161}, ISBN = {3-540-42493-8}, YEAR = {2001}, PAGES = {254--265}, } @INPROCEEDINGS{BFMZ04, AUTHOR = {Brodal, Gerth St{\o}lting and Fagerberg, Rolf and Meyer, Ulrich and Zeh, Norbert}, EDITOR = {Hagerup, Torben and Katajainen, Jyrki}, TITLE = {Cache-oblivious data structures and algorithms for undirected breadth-first search and shortest paths}, BOOKTITLE = {Algorithm theory, SWAT 2004 : 9th Scandinavian Workshop on Algorithm Theory ; Humleb{\ae}k, Denmark, July 8-10, 2004 ; proceedings}, PADDRESS = {Berlin, Germany}, ADDRESS = {Humlebaek, Denmark}, PUBLISHER = {Springer}, MONTH = {July}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {3111}, ISBN = {3-540-22339-8}, YEAR = {2004}, PAGES = {480--492}, } @INPROCEEDINGS{BFN2010, AUTHOR = {Berghammer, Rudolf and Friedrich, Tobias and Neumann, Frank}, EDITOR = {Pelikan, Martin and Branke, J{\"u}rgen}, TITLE = {Set-based Multi-Objective Optimization, Indicators, and Deteriorative Cycles}, BOOKTITLE = {Proceedings of 12th Annual Conference on Genetic and Evolutionary Computation (GECCO-2010)}, PADDRESS = {New York, NY}, ADDRESS = {Portland, USA}, PUBLISHER = {ACM}, ISBN = {978-1-4503-0072-5}, DOI = {10.1145/1830483.1830574}, YEAR = {2010}, PAGES = {495--502}, } @ARTICLE{BFSS07, AUTHOR = {Bast, Holger and Funke, Stefan and Sanders, Peter and Schultes, Dominik}, JOURNAL = {Science}, TITLE = {Fast Routing in Road Networks using Transit Nodes}, ADDRESS = {Washington, USA}, NUMBER = {5824}, PUBLISHER = {Science/AAAS}, MONTH = {April}, VOLUME = {316}, ISBN = {0036-8075}, DOI = {10.1126/science.1137521}, YEAR = {2007}, PAGES = {566}, } @INPROCEEDINGS{BGS2005, AUTHOR = {Baswana, Surender and Goyal, Vishrut and Sen, Sandeep}, EDITOR = {Diekert, Volker and Durand, Bruno}, TITLE = {All-pairs nearly 2-approximate shortest paths in $O(n^2 \mathrm{ polylog } n)$ time}, BOOKTITLE = {STACS 2005 : 22nd Annual Symposium on Theoretical Aspects of Computer Science}, PADDRESS = {Berlin, Germany}, ADDRESS = {Stuttgart, Germany}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {3404}, ISBN = {3-540-24998-2}, YEAR = {2005}, PAGES = {666--679}, ABSTRACT = {Let $G=(V,E)$ be an unweighted undirected graph on $n$ vertices. Let $\delta(u,v)$ denote the distance between vertices $u,v\inV$. An algorithm is said to compute all-pairs $t$-approximate shortest -paths/distances, for some $t\ge 1$, if for each pair of vertices $u,v\in V$, the path/distance reported by the algorithm is not longer/greater than $t\delta(u,v)$.\\ This paper presents two randomized algorithms for computing all-pairs nearly 2-approximate shortest distances. The first algorithm takes expected $O(m^{2/3}n\log n + n^2)$ time, and for any $u,v\in V$ reports distance no greater than $2\delta(u,v)+1$. Our second algorithm requires expected $O(n^2\log^{3/2} n)$ time, and for any $u,v\in V$, reports distance bounded by $2\delta(u,v) + 3$.\\ This paper also presents the first expected $O(n^2)$ time algorithm to compute all-pairs 3-approximate distances. }, } @INPROCEEDINGS{BGT01:non-overlap, AUTHOR = {Beldiceanu, Nicolas and Guo, Qi and Thiel, Sven}, EDITOR = {Walsh, Toby}, TITLE = {Non-overlapping Constraints between Convex Polytopes}, BOOKTITLE = {Proceedings of the 7th International Symposium on Principles and Practice of Constraint Programming (CP-01)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Paphos, Cyprus}, PUBLISHER = {Springer}, MONTH = {November}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {2239}, ISBN = {3-540-42863-1}, YEAR = {2001}, PAGES = {392--407}, } @INPROCEEDINGS{bh-app-00, AUTHOR = {Bast, Hannah and Hert, Susan}, EDITOR = {Bremner, David}, TITLE = {The Area Partitioning Problem}, BOOKTITLE = {Proceedings of the 12th Annual Canadian Conference on Computational Geometry (CCCG-00)}, PADDRESS = {Fredericton, Canada}, ADDRESS = {Fredericton, New Brunswick, Canada}, PUBLISHER = {University of New Brunswick}, MONTH = {August}, YEAR = {2000}, PAGES = {163--171}, ABSTRACT = {Given an arbitrary polygon with $n$ vertices, we wish to partition it into $p$ connected pieces of given areas. The problem is motivated by a robotics application in which the polygon is a workspace that is to be divided among $p$ robots performing a terrain-covering task. We show that finding an area partitioning with minimal cut length is NP-hard in the number of pieces and that it is even hard to approximate to within any factor that is independent of the shape of the polygon. We then present a simple $O(pn)$-time algorithm that produces non-optimal, but often quite reasonable, area partitionings for arbitrary polygons.}, } @INCOLLECTION{bhhm-giae-exp-2010, AUTHOR = {Berberich, Eric and Hagen, Matthias and Hiller, Benjamin and Moser, Hannes}, EDITOR = {M{\"u}ller-Hannemann, Matthias and Schirra, Stefan}, TITLE = {Experiments}, BOOKTITLE = {Algorithm Engineering : Bridging the Gap between Algorithm Theory and Practice}, CHAPTER = {8}, ADDRESS = {Berlin}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5971}, ISBN = {978-3-642-14865-1}, DOI = {10.1007/978-3-642-14866-8_8}, YEAR = {2010}, PAGES = {325--388}, } @INPROCEEDINGS{bhk-ak2-2011, AUTHOR = {Berberich, Eric and Hemmer, Michael and Kerber, Michael}, EDITOR = {Hurtado, Ferran and van Krefeld, Marc}, TITLE = {A Generic Algebraic Kernel for Non-linear Geometric Applications}, BOOKTITLE = {Proceedings of the 27th Annual Symposium on Computational Geometry (SCG'11)}, PADDRESS = {New York, NY}, ADDRESS = {Paris, France}, PUBLISHER = {ACM}, MONTH = {June}, ISBN = {978-1-4503-0682-9}, DOI = {10.1145/1998196.1998224}, YEAR = {2011}, PAGES = {179--186}, } @TECHREPORT{bhk-ak2-inria-2010, AUTHOR = {Berberich, Eric and Hemmer, Michael and Kerber, Michael}, TITLE = {A Generic Algebraic Kernel for Non-linear Geometric Applications}, INSTITUTION = {INRIA}, TYPE = {Rapport de recherche}, ADDRESS = {Sophia Antipolis, France}, NUMBER = {7274}, MONTH = {May}, YEAR = {2010}, PAGES = {20}, } @ARTICLE{bhkp-deconstruct-journal-2012, AUTHOR = {Berberich, Eric and Halperin, Dan and Kerber, Michael and Pogalnikova, Roza}, JOURNAL = {Discrete \& Computational Geometry}, TITLE = {Deconstructing Approximate Offsets}, ADDRESS = {New York, NY}, NUMBER = {4}, PUBLISHER = {Springer}, MONTH = {December}, VOLUME = {48}, ISBN = {0179-5376}, DOI = {10.1007/s00454-012-9441-5}, YEAR = {2012}, PAGES = {964--989}, } @INPROCEEDINGS{bhkp-minkowksideconstruction-2011, AUTHOR = {Berberich, Eric and Halperin, Dan and Kerber, Michael and Pogalnikova, Roza}, EDITOR = {Hurtado, Ferran and van Krefeld, Marc}, TITLE = {Deconstructing Approximate Offsets}, BOOKTITLE = {Proceedings of the 27th Annual Symposium on Computational Geometry (SCG'11)}, PADDRESS = {New York, NY}, ADDRESS = {Paris, France}, PUBLISHER = {ACM}, MONTH = {June}, ISBN = {978-1-4503-0682-9}, DOI = {10.1145/1998196.1998225}, YEAR = {2011}, PAGES = {187--196}, } @ARTICLE{bhkp-minkowksideconstructiondcg-2011a, AUTHOR = {Berberich, Eric and Halperin, Dan and Kerber, Michael and Pogalnikova, Roza}, JOURNAL = {arXiv}, TITLE = {Deconstructing Approximate Offsets}, ADDRESS = {Ithaca, NY}, PUBLISHER = {Cornell University Library}, MONTH = {September}, VOLUME = {abs/1109.2158}, YEAR = {2011}, } @INPROCEEDINGS{bhkp-reconstruction-eurocg-2010, AUTHOR = {Berberich, Eric and Halperin, Dan and Kerber, Michael and Pogalnikova, Roza}, EDITOR = {Vahrenhold, Jan}, TITLE = {Polygonal Reconstruction from Approximate Offsets}, BOOKTITLE = {26th European Workshop on Computational Geometry : Workshop Proceedings}, PADDRESS = {Dortmund}, ADDRESS = {Dortmund, Germany}, PUBLISHER = {TU Dortmund}, MONTH = {March}, YEAR = {2010}, PAGES = {65--68}, } @INPROCEEDINGS{bhksw-eceicpmqic-05, AUTHOR = {Berberich, Eric and Hemmer, Michael and Kettner, Lutz and Sch{\"o}mer, Elmar and Wolpert, Nicola}, EDITOR = {Mitchell, Joe and Rote, G{\"u}nter and Kettner, Lutz}, TITLE = {An Exact, Complete and Efficient Implementation for Computing Planar Maps of Quadric Intersection Curves}, BOOKTITLE = {21st Annual Symposium on Computational Geometry (SCG'05)}, ORGANIZATION = {Association for Computing Machinery (ACM)}, PADDRESS = {New York, USA}, ADDRESS = {Pisa, Italy}, PUBLISHER = {ACM}, MONTH = {June}, ISBN = {1-58113-991-8}, YEAR = {2005}, PAGES = {99--106}, ABSTRACT = {We present the first exact, complete and efficient implementation that computes for a given set $P=\{p_1,\dots,p_n\}$ of quadric surfaces the planar map induced by all intersection curves $p_1\cap p_i$, $2\leq i\leq n$, running on the surface of $p_1$. The vertices in this graph are the singular and $x$-extreme points of the curves as well as all intersection points of pairs of curves. Two vertices are connected by an edge if the underlying points are connected by a branch of one of the curves. Our work is based on and extends ideas developed in~[20] and~[9]. Our implementation is {\em complete} in the sense that it can handle all kind of inputs including all degenerate ones where intersection curves have singularities or pairs of curves intersect with high multiplicity. It is {\em exact} in that it always computes the mathematical correct result. It is {\em efficient} measured in running times.}, } @INPROCEEDINGS{BHTWahlstroem2009, AUTHOR = {B{\"o}cker, Sebastian and H{\"u}ffner, Falk and Truss, Anke and Wahlstr{\"o}m, Magnus}, EDITOR = {Chen, Jianer and Fomin, Fedor V.}, TITLE = {A Faster Fixed-Parameter Approach to Drawing Binary Tanglegrams}, BOOKTITLE = {Parameterized and Exact Computation : 4th International Workshop, IWPEC 2009}, PADDRESS = {Berlin}, ADDRESS = {Copenhagen, Denmark}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5917}, ISBN = {978-3-642-11268-3}, DOI = {10.1007/978-3-642-11269-0_3}, YEAR = {2009}, PAGES = {38--49}, } @INPROCEEDINGS{BiedlKaufmannMutzel1998, AUTHOR = {Biedl, Therese and Kaufmann, Michael and Mutzel, Petra}, EDITOR = {Hromkovic, J. and Sykora, O.}, TITLE = {Drawing Planar Partitions II: HH-Drawings}, BOOKTITLE = {Proceedings of the 24th Workshop on Graph-Theoretic Concepts in Computer Science (WG-98)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Smolenice}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1517}, YEAR = {1998}, PAGES = {124--136}, } @INCOLLECTION{BILLING97, AUTHOR = {Lenhof, Hans-Peter}, EDITOR = {Plesser, Theo and Wittenberg, Peter}, TITLE = {Parallel Protein Puzzle: A New Suite of Protein Docking Tools}, BOOKTITLE = {Forschung und wissenschaftliches Rechnen: Beitr{\"a}ge zum Heinz-Billing-Preis 1996}, INSTITUTION = {Gesellschaft f{\"u}r wissenschaftliche Datenverarbeitung mbH G{\"o}ttingen}, TYPE = {GWDG-Bericht}, ADDRESS = {G{\"o}ttingen, Germany}, NUMBER = {44}, PUBLISHER = {Gesellschaft f{\"u}r wissenschaftliche Datenverarbeitung mbH}, ISBN = {0176-2516}, YEAR = {1997}, PAGES = {31--48}, } @MASTERSTHESIS{Birk97, AUTHOR = {Birk, R{\"u}diger}, TITLE = {{L{\"o}sung von Varianten des Post-Office-Problems mit Hilfe von Skip List Range Trees}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, YEAR = {1997}, } @ARTICLE{BJM97, AUTHOR = {Brandenburg, Franz J. and J{\"u}nger, Michael and Mutzel, Petra}, JOURNAL = {Informatik Spektrum}, TITLE = {{Algorithmen zum automatischen Zeichnen von Graphen}}, NUMBER = {4}, VOLUME = {20}, YEAR = {1997}, PAGES = {199--207}, NOTE = {Short version in: Jarke, M., Pasedach, K. und Pohl, K. (eds.), Informatik '97, 27. Jahrestagung der Gesellschaft f{\"u}r Informatik, Aachen, Informatik aktuell, Springer-Verlag, 1997, 58-67}, } @INPROCEEDINGS{bk-aosogo-08, AUTHOR = {Berberich, Eric and Kerber, Michael}, EDITOR = {Petitjean, Sylvain}, TITLE = {Arrangements on Surfaces of Genus One: Tori and Dupin Cyclides}, BOOKTITLE = {24th European Workshop on Computational Geometry - Collection of Abstracts}, PADDRESS = {No publisher}, ADDRESS = {Nancy, France}, MONTH = {March}, ISBN = {2-905267-57-7}, YEAR = {2008}, PAGES = {209--212}, NOTE = {An extended version of this article has appeared under the name "Exact Arrangements on Tori and Dupin Cyclides" in the Proceedings of the 2008 ACM Symposium on Solid and Physical Modeling, pp 59-66}, ABSTRACT = {An algorithm is presented to compute the exact arrangement induced by arbitrary algebraic surfaces on a parametrized ring Dupin cyclide, including the special case of the torus. The intersection of an algebraic surface of degree $n$ with a reference cyclide is represented as a real algebraic curve of bi-degree $(2n,2n)$ in the cyclide's two-dimensional parameter space. We use Eigenwillig and Kerber~\cite{ek-exact} to compute a planar arrangement of such curves and extend their approach to obtain more asymptotic information about curves approaching the boundary of the cyclide's parameter space. With that, we can base our implementation on a general software framework by Berberich~et.~al.~\cite{bfhmw-samtdaosafs-07} to construct the arrangement on the cyclide. Our contribution provides the demanded techniques to model the special topology of the reference surface of genus one. Our experiments show no combinatorial overhead of the framework, i.e., the overall performance is strongly coupled to the efficiency of the implementation for arrangements of algebraic plane curves.}, } @INPROCEEDINGS{bk-eatdc-08, AUTHOR = {Berberich, Eric and Kerber, Michael}, EDITOR = {Haines, Eric and McGuire, Morgan}, TITLE = {Exact Arrangements on Tori and Dupin Cyclides}, BOOKTITLE = {Proceedings of the 2008 ACM Symposium on Solid and Physical Modeling}, ORGANIZATION = {Association for Computing Machinery (ACM)}, PADDRESS = {New York, USA}, ADDRESS = {Stony Brook, USA}, PUBLISHER = {ACM}, MONTH = {June}, ISBN = {978-1-60558-106-4}, DOI = {10.1145/1364901.1364912}, YEAR = {2008}, PAGES = {59--66}, ABSTRACT = {An algorithm and implementation is presented to compute the exact arrangement induced by arbitrary algebraic surfaces on a parametrized ring Dupin cyclide. The family of Dupin cyclides contains as a special case the torus. The intersection of an algebraic surface of degree $n$ with a reference cyclide is represented as a real algebraic curve of bi-degree $(2n,2n)$ in the two-dimensional parameter space of the cyclide. We use Eigenwillig and Kerber: ``Exact and Efficient 2D-Arrangements of Arbitrary Algebraic Curves'', SODA~2008, to compute a planar arrangement of such curves and extend their approach to obtain more asymptotic information about curves approaching the boundary of the cyclide's parameter space. With that, we can base our implementation on the general software framework by Berberich~et.~al.: ``Sweeping and Maintaining Two-Dimensional Arrangements on Surfaces: A First Step'', ESA~2007. Our contribution provides the demanded techniques to model the special geometry of surfaces intersecting a cyclide and the special topology of the reference surface of genus one. The contained implementation is complete and does not assume generic position. Our experiments show that the combinatorial overhead of the framework does not harm the efficiency of the method. Our experiments show that the overall performance is strongly coupled to the efficiency of the implementation for arrangements of algebraic plane curves.}, } @TECHREPORT{bk-reorder-07, AUTHOR = {Berberich, Eric and Kettner, Lutz}, TITLE = {Linear-Time Reordering in a Sweep-line Algorithm for Algebraic Curves Intersecting in a Common Point}, INSTITUTION = {Max-Planck-Institut f{\"u}r Informatik}, TYPE = {Research Report}, ADDRESS = {Saarbr{\"u}cken, Germany}, NUMBER = {MPI-I-2007-1-001}, MONTH = {July}, ISBN = {0946-011X}, YEAR = {2007}, PAGES = {20}, } @ARTICLE{bks-cgta-2009, AUTHOR = {Berberich, Eric and Kerber, Michael and Sagraloff, Michael}, JOURNAL = {Computational Geometry: Theory and Applications (CGTA)}, TITLE = {An efficient algorithm for the stratification and triangulation of an algebraic surface}, ADDRESS = {Amsterdam, Netherlands}, NUMBER = {3}, PUBLISHER = {Elsevier}, MONTH = {April}, VOLUME = {43}, ISBN = {0925-7721}, DOI = {10.1016/j.comgeo.2009.01.009}, YEAR = {2010}, PAGES = {257--278}, ABSTRACT = {We present a method to compute the exact topology of a real algebraic surface $S$, implicitly given by a polynomial $f\in\mathbb{Q}[x,y,z]$ of arbitrary total degree~$N$. Additionally, our analysis provides geometric information as it supports the computation of arbitrary precise samples of $S$ including critical points. We compute a stratification $\Omega_S$ of $S$ into $O(N^5)$ nonsingular cells, including the complete adjacency information between these cells. This is done by a projection approach. We construct a special planar arrangement $\mathcal{A}_S$ with fewer cells than a cad in the projection plane. Furthermore, our approach applies numerical and combinatorial methods to minimize costly symbolic computations. The algorithm handles all sorts of degeneracies without transforming the surface into a generic position. Based on $\Omega_S$ we also compute a simplicial complex which is isotopic to~$S$. A complete C++-implementation of the stratification algorithm is presented. It shows good performance for many well-known examples from algebraic geometry.}, } @INPROCEEDINGS{bks-egtaas-08, AUTHOR = {Berberich, Eric and Kerber, Michael and Sagraloff, Michael}, EDITOR = {Teillaud, Monique and Welzl, Emo}, TITLE = {Exact Geometric-Topological Analysis of Algebraic Surfaces}, BOOKTITLE = {Proceedings of the 24th ACM Symposium on Computational Geometry}, ORGANIZATION = {Association for Computing Machinery (ACM)}, PADDRESS = {New York, USA}, ADDRESS = {College Park Maryland, USA}, PUBLISHER = {ACM}, MONTH = {June}, ISBN = {978-1-60558-071-5}, DOI = {10.1145/1377676.1377703}, YEAR = {2008}, PAGES = {164--173}, ABSTRACT = {We present a method to compute the exact topology of a real algebraic surface $S$, implicitly given by a polynomial $f \in \mathbb{Q}[x,y,z]$ of arbitrary degree $N$. Additionally, our analysis provides geometric information as it supports the computation of arbitrary precise samples of $S$ including critical points. We use a projection approach, similar to Collins' cylindrical algebraic decomposition (cad). In comparison we reduce the number of output cells to $O(N^5)$ by constructing a special planar arrangement instead of a full cad in the projection plane. Furthermore, our approach applies numerical and combinatorial methods to minimize costly symbolic computations. The algorithm handles all sorts of degeneracies without transforming the surface into a generic position. We provide a complete implementation of the algorithm, written in C++. It shows good performance for many well known examples from algebraic geometry.}, } @INPROCEEDINGS{bks-gaoasbopa-08, AUTHOR = {Berberich, Eric and Kerber, Michael and Sagraloff, Michael}, EDITOR = {Petitjean, Sylvain}, TITLE = {Geometric Analysis of Algebraic Surfaces Based on Planar Arrangements}, BOOKTITLE = {24th European Workshop on Computational Geometry - Collection of Abstracts}, PADDRESS = {No publisher}, ADDRESS = {Nancy, France}, MONTH = {March}, ISBN = {2-905267-57-7}, YEAR = {2008}, PAGES = {29--32}, NOTE = {An extended version of this article has appeared under the name "Exact Geometric-Topological Analysis of Algebraic Surfaces" in the Proceedings of the 24th ACM Symposium on Computational Geometry, 2008, pp 164-173}, ABSTRACT = {We present a method to compute the exact topology of a real algebraic surface $S$, implicitly given by a polynomial $f \in \mathbb{Q}[x,y,z]$ of arbitrary degree $N$. Additionally, our analysis provides geometric information as it supports the computation of arbitrary precise samples of $S$ including critical points. We use a projection approach, similar to Collins' cylindrical algebraic decomposition (cad). In comparison we reduce the number of output cells to $O(N^5)$ by constructing a special planar arrangement instead of a full cad in the projection plane. Furthermore, our approach applies numerical and combinatorial methods to minimize costly symbolic computations. The algorithm handles all sorts of degeneracies without transforming the surface into a generic position. We provide a complete \Cpp-implementation of the algorithm that shows good performance for many well-known examples from algebraic geometry.}, } @INPROCEEDINGS{bks07, AUTHOR = {Doerr, Benjamin and Klein, Christian and Storch, Tobias}, TITLE = {Faster Evolutionary Algorithms by Superior Graph Representation}, BOOKTITLE = {First IEEE Symposium on Foundations of Computational Intelligence (FOCI-2007)}, PADDRESS = {Washington, D.C.}, ADDRESS = {Honolulu, USA}, PUBLISHER = {IEEE}, ISBN = {1-424-40698-6}, DOI = {10.1109/FOCI.2007.372176}, YEAR = {2007}, PAGES = {245--250}, ABSTRACT = {We present a new representation for individuals in problems that have cyclic permutations as solutions. To demonstrate its usefulness, we analyze a simple randomized local search and a (1+1) evolutionary algorithm for the Eulerian cycle problem utilizing this representation. Both have an expected run-time of $\Theta(m^2 \log(m))$, where $m$ denotes the number of edges of the input graph. This clearly beats previous solutions, which all have an expected optimization time of $\Theta(m^3)$ or worse (PPSN~'06, CEC~'04). We are optimistic that our representation also allows superior solutions for other cyclic permutation problems. For NP-complete ones like the TSP, however, other means than theoretical run-time analyses are necessary.}, } @MASTERSTHESIS{Blanchebarbe96, AUTHOR = {Blanchebarbe, Markus}, TITLE = {{Untersuchung zur Implementierung eines parallelen Algorithmus mit guter asymptotischer Laufzeit auf einem Rechner mit verteiltem Speicher und Message-Passing}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, YEAR = {1996}, } @INPROCEEDINGS{BM-CEQ2007, AUTHOR = {Berberich, Eric and Meyerovitch, Michal}, TITLE = {Computing Envelopes of Quadrics}, BOOKTITLE = {Proceedings of 23rd European Workshop on Computational Geometry}, PADDRESS = {Graz, Austria}, ADDRESS = {Graz, Austria}, PUBLISHER = {Technische Universitaet Graz}, MONTH = {March}, ISBN = {978-3-902465-62-7}, YEAR = {2007}, PAGES = {235--238}, ABSTRACT = {We present the computation of envelopes of a set of quadratic surfaces defined in ${\rm I\!\hspace{-0.025em} R}^3$. Our solution is based on the new {\sc Cgal} {\tt Envelope\_3} package that provides a generic and robust implementation of a divide-and-conquer algorithm. This work concentrates on the theory of algebraic and combinatorial tasks that occur for quadratic surfaces and their implementation. The implementation is exact and efficient.}, } @ARTICLE{BMST03, AUTHOR = {Bast, Holger and Mehlhorn, Kurt and Sch{\"a}fer, Guido and Tamaki, Hisao}, JOURNAL = {Algorithmica}, TITLE = {A Heuristic for {Dijkstra's} Algorithm With Many Targets and its Use in Weighted Matching Algorithms}, ADDRESS = {Berlin, Germany}, NUMBER = {1}, PUBLISHER = {Springer}, VOLUME = {36}, DOI = {10.1007/s00453-002-1008-z}, YEAR = {2003}, PAGES = {75--88}, ABSTRACT = {We consider the single-source many-targets shortest-path (SSMTSP) problem in directed graphs with non-negative edge weights. A source node $s$ and a target set $T$ is specified and the goal is to compute a shortest path from $s$ to a node in $T$. Our interest in the shortest path problem with many targets stems from its use in weighted bipartite matching algorithms. A weighted bipartite matching in a graph with $n$ nodes on each side reduces to $n$ SSMTSP problems, where the number of targets varies between $n$ and $1$. The SSMTSP problem can be solved by Dijkstra's algorithm. We describe a heuristic that leads to a significant improvement in running time for the weighted matching problem; in our experiments a speed-up by up to a factor of 12 was achieved. We also present a partial analysis that gives some theoretical support for our experimental findings. }, } @ARTICLE{BMST05, AUTHOR = {Bast, Holger and Mehlhorn, Kurt and Sch{\"a}fer, Guido and Tamaki, Hisao}, JOURNAL = {Theory of Computing Systems}, TITLE = {Matching Algorithms are Fast in Sparse Random Graphs}, ADDRESS = {New York, USA}, NUMBER = {1}, PUBLISHER = {Springer}, MONTH = {February}, VOLUME = {39}, ISBN = {1432-4350}, DOI = {10.1007/s00224-005-1254-y}, YEAR = {2006}, PAGES = {3--14}, ABSTRACT = {We present an improved average case analysis of the maximum cardinality matching problem. We show that in a bipartite or general random graph on $n$ vertices, with high probability every non-maximum matching has an augmenting path of length $O(\log n)$. This implies that augmenting path algorithms like the Hopcroft--Karp algorithm for bipartite graphs and the Micali--Vazirani algorithm for general graphs, which have a worst case running time of $O(m\sqrt{n})$, run in time $O(m \log n)$ with high probability, where $m$ is the number of edges in the graph. Motwani proved these results for random graphs when the average degree is at least $\ln (n)$ [\emph{Average Case Analysis of Algorithms for Matchings and Related Problems}, Journal of the ACM, \textbf{41}(6), 1994]. Our results hold, if only the average degree is a large enough constant. At the same time we simplify the analysis of Motwani.}, } @ARTICLE{BodirskyGroeplJohannsenKang2007a, AUTHOR = {Bodirsky, Manuel and Gr{\"o}pl, Clemens and Johannsen, Daniel and Kang, Mihyun}, JOURNAL = {S{\'e}minaire Lotharingien de Combinatoire}, TITLE = {A Direct Decomposition of 3-connected Planar Graphs}, VOLUME = {B54Ak}, YEAR = {2007}, PAGES = {15}, ABSTRACT = {We present a decomposition strategy for c-nets, i.\,e., rooted 3-connected planar maps. The decomposition yields an algebraic equation for the number of c-nets with a given number of vertices and a given size of the outer face. The decomposition also leads to a deterministic and polynomial time algorithm to sample c-nets \emph{uniformly at random}. Using rejection sampling, we can also sample isomorphism types of convex polyhedra, i.e., 3-connected planar graphs, uniformly at random.}, } @ARTICLE{BodirskyKutz2007, AUTHOR = {Bodirsky, Manuel and Kutz, Martin}, JOURNAL = {Artificial Intelligence}, TITLE = {Determining the consistency of partial tree descriptions}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {2/3}, PUBLISHER = {Elsevier}, MONTH = {February}, VOLUME = {171}, ISBN = {0004-3702}, DOI = {10.1016/j.artint.2006.12.004}, YEAR = {2007}, PAGES = {185--196}, ABSTRACT = {We present an efficient algorithm that decides the consistency of partial descriptions of ordered trees. The constraint language of these descriptions was introduced by Cornell in computational linguistics; the constraints specify for pairs of nodes sets of admissible relative positions in an ordered tree. Cornell asked for an algorithm to find a tree structure satisfying these constraints. This computational problem generalizes the common-supertree problem studied in phylogenetic analysis, and also generalizes the network consistency problem of the so-called left-linear point algebra. We present the first polynomial time algorithm for Cornell's problem, which runs in time O(mn) , where m is the number of constraints and n the number of variables in the constraint. }, } @INPROCEEDINGS{Bodlaender-Hagerup95, AUTHOR = {Bodlaender, Hans L. and Hagerup, Torben}, EDITOR = {F{\"u}l{\"o}p, Zolt{\'a}n and Gecseg, Ferenc}, TITLE = {Parallel Algorithms with Optimal Speedup for Bounded Treewidth}, BOOKTITLE = {Automata, Languages, and Programming: 22nd International Colloquium (ICALP95)}, PADDRESS = {Berlin}, ADDRESS = {Szeged, Hungary}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {944}, YEAR = {1995}, PAGES = {268--279}, } @ARTICLE{BodlaenderDeogunJansenKloksKratschMuellerTuza98, AUTHOR = {Bodlaender, Hans L. and Deogun, Jitender S. and Jansen, Klaus and Kloks, Ton and Kratsch, Dieter and M{\"u}ller, Haiko and Tuza, Zsolt}, JOURNAL = {SIAM Journal on Discrete Mathematics}, TITLE = {Ranking of Graphs}, NUMBER = {1}, MONTH = {February}, VOLUME = {11}, YEAR = {1998}, PAGES = {168--181}, } @ARTICLE{BodlaenderHagerup98, AUTHOR = {Bodlaender, Hans L. and Hagerup, Torben}, JOURNAL = {SIAM Journal on Computing}, TITLE = {Parallel Algorithms with Optimal Speedup for Bounded Treewidth}, NUMBER = {6}, VOLUME = {27}, ISBN = {0097-5397}, YEAR = {1998}, PAGES = {1725--1746}, } @INPROCEEDINGS{BogdanSSS2012, AUTHOR = {Bogdan, Paul and Sauerwald, Thomas and Stauffer, Alexandre and Sun, He}, EDITOR = {Sanjeev Khanna}, TITLE = {Balls into Bins via Local Search}, BOOKTITLE = {24th ACM-SIAM Symposium on Discrete Algorithms (SODA-13)}, PADDRESS = {Philadelphia, PA}, ADDRESS = {New Orleans, USA}, PUBLISHER = {SIAM}, MONTH = {July}, YEAR = {2013}, PAGES = {16--34}, } @INPROCEEDINGS{BoghossianKohlbacherLenhof1999, AUTHOR = {Boghossian, Nicolas Pascal and Kohlbacher, Oliver and Lenhof, Hans-Peter}, EDITOR = {Vitter, Jeffrey S. and Zaroliagis, Christos D.}, TITLE = {BALL: Biochemical Algorithms Library}, BOOKTITLE = {Algorithm engineering (WAE-99) : 3rd International Workshop, WAE'99}, PADDRESS = {Berlin}, ADDRESS = {London, UK}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1668}, YEAR = {1999}, PAGES = {330--344}, ABSTRACT = {In the next century, virtual laboratories will play a key role in biotechnology. Computer experiments will not only replace time-consuming and expensive real-world experiments, but they will also provide insights that cannot be obtained using ``wet'' experiments. The field that deals with the modeling of atoms, molecules, and their reactions is called Molecular Modeling. The advent of Life Sciences gave rise to numerous new developments in this area. However, the implementation of new simulation tools is extremely time-consuming. This is mainly due to the large amount of supporting code (e.g. for data import/export, visualization, and so on) that is required in addition to the code necessary to implement the new idea. The only way to reduce the development time is to reuse reliable code, preferably using object-oriented approaches. We have designed and implemented BALL, the first object-oriented application framework for rapid prototyping in Molecular Modeling. By the use of the composite design pattern and polymorphism we were able to model the multitude of complex biochemical concepts in a well-structured and comprehensible class hierarchy, the BALL kernel classes. The isomorphism between the biochemical structures and the kernel classes leads to an intuitive interface. Since BALL was designed for rapid software prototyping, ease of use and flexibility were our principal design goals. Besides the kernel classes, BALL provides fundamental components for import/export of data in various file formats, Molecular Mechanics simulations, three-dimensional visualization, and more complex ones like a numerical solver for the Poisson-Boltzmann equation. The usefulness of BALL was shown by the implementation of an algorithm that checks proteins for similarity. Instead of the five months that an earlier implementation took, we were able to implement it within a day using BALL. }, } @ARTICLE{Bonifaci2011:b, AUTHOR = {Bonifaci, Vincenzo and Marchetti-Spaccamela, Alberto}, JOURNAL = {Algorithmica}, TITLE = {Feasibility Analysis of Sporadic Real-Time Multiprocessor Task Systems}, ADDRESS = {New York, NY}, NUMBER = {4}, PUBLISHER = {Springer}, VOLUME = {63}, ISBN = {0178-4617}, DOI = {10.1007/s00453-011-9505-6}, YEAR = {2012}, PAGES = {763--780}, ABSTRACT = {We give the first algorithm for testing the feasibility of a system of sporadic real-time tasks on a set of identical processors, solving an open problem in the area of multiprocessor real-time scheduling (Baruah and Pruhs in Journal of Scheduling 13(6):577–582, 2009). We also investigate the related notion of schedulability and a notion that we call online feasibility. Finally, we show that discrete-time schedules are as powerful as continuous-time schedules, which answers another open question in the above mentioned survey. }, } @INPROCEEDINGS{Bonifaci2012a, AUTHOR = {Bonifaci, Vincenzo and Mehlhorn, Kurt and Varma, Girish}, EDITOR = {Ravani, Yuval}, TITLE = {Physarum Can Compute Shortest Paths}, BOOKTITLE = {Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-12)}, ORGANIZATION = {Society for Industrial and Applied Mathematics (SIAM)}, PADDRESS = {Philadelphia, PA}, ADDRESS = {Kyoto, Japan}, PUBLISHER = {SIAM}, ISBN = {978-1-611972-11-5}, YEAR = {2012}, PAGES = {233--240}, ABSTRACT = {Physarum Polycephalum is a slime mold that is apparently able to solve shortest path problems. A mathematical model has been proposed by biologists to describe the feedback mechanism used by the slime mold to adapt its tubular channels while foraging two food sources $s_0$ and $s_1$. We prove that, under this model, the mass of the mold will eventually converge to the shortest $s_0$-$s_1$ path of the network that the mold lies on, independently of the structure of the network or of the initial mass distribution. This matches the experimental observations by the biologists and can be seen as an example of a "natural algorithm", that is, an algorithm developed by evolution over millions of years. }, } @ARTICLE{Bonifaci2012b, AUTHOR = {Bonifaci, Vincenzo and Marchetti-Spaccamela, Alberto and Stiller, Sebastian}, JOURNAL = {Algorithmica}, TITLE = {A Constant-Approximate Feasibility Test for Multiprocessor Real-Time Scheduling}, ADDRESS = {New York, NY}, NUMBER = {3-4}, PUBLISHER = {Springer}, MONTH = {April}, VOLUME = {62}, ISBN = {0178-4617}, DOI = {10.1007/s00453-011-9497-2}, YEAR = {2012}, PAGES = {1034--1049}, ABSTRACT = {We devise an approximate feasibility test for multiprocessor real-time scheduling in the sporadic task model. We give an algorithm that, given a task system and $\epsilon>0$, correctly decides either that the task system can be scheduled using the Earliest Deadline First algorithm on m speed-$(2−1/ m+\epsilon)$ machines, or that the system is not schedulable by any algorithm on m unit speed machines. This speedup bound is known to be the best possible for EDF. The running time of the algorithm is polynomial in the size of the task system and $1/\epsilon$. We also provide a generalized tight bound that trades off speed with additional machines. }, } @ARTICLE{Bonifaci2012c, AUTHOR = {Bonifaci, Vincenzo and Mehlhorn, Kurt and Varma, Girish}, JOURNAL = {Journal of Theoretical Biology}, TITLE = {Physarum Can Compute Shortest Paths}, ADDRESS = {Amsterdam}, PUBLISHER = {Elsevier}, VOLUME = {309}, ISBN = {0022-5193}, DOI = {10.1016/j.jtbi.2012.06.017}, YEAR = {2012}, PAGES = {121--133}, ABSTRACT = {Physarum polycephalum is a slime mold that is apparently able to solve shortest path problems. A mathematical model has been proposed by Tero, Kobayashi and Nakagaki [Journal of Theoretical Biology, 244, 2007, pp. 553--564] to describe the feedback mechanism used by the slime mold to adapt its tubular channels while foraging two food sources s0 and s1. We prove that, under this model, the mass of the mold will eventually converge to the shortest s0-s1 path of the network that the mold lies on, independently of the structure of the network or of the initial mass distribution. This matches the experimental observations by Tero et al. and can be seen as an example of a ``natural algorithm'', that is, an algorithm developed by evolution over millions of years. }, } @INPROCEEDINGS{Bonifaci2013, AUTHOR = {Bonifaci, Vincenzo and Marchetti-Spaccamela, Alberto and Stiller, Sebastian and Wiese, Andreas}, TITLE = {Feasibility Analysis in the Sporadic DAG Task Model}, BOOKTITLE = {Proceedings of the 25th Euromicro Conference on Real-Time Systems (ECRTS 2013)}, PADDRESS = {Los Alamitos, USA}, ADDRESS = {Paris, France}, PUBLISHER = {IEEE}, YEAR = {2013}, } @INPROCEEDINGS{Bonifaci2013b, AUTHOR = {Bonifaci, Vincenzo and Marchetti-Spaccamela, Alberto and Megow, Nicole and Wiese, Andreas}, TITLE = {Polynomial-Time Exact Schedulability Tests for Harmonic Real-Time Tasks}, BOOKTITLE = {Proceedings of the 34th IEEE Real-Time Systems Symposium (RTSS 2013)}, PADDRESS = {Los Alamitos, USA}, ADDRESS = {Vancouver, Canada}, PUBLISHER = {IEEE}, YEAR = {2013}, } @ARTICLE{BonifaciCMM2012, AUTHOR = {Bonifaci, Vincenzo and Chan, Ho-Leung and Marchetti-Spaccamela, Alberto and Megow, Nicole}, JOURNAL = {ACM Transactions on Algorithms}, TITLE = {Algorithms and Complexity for Periodic Real-Time Scheduling}, VOLUME = {9}, YEAR = {2012}, PAGES = {601--619}, } @ARTICLE{Bonifaci:2009:a, AUTHOR = {Bonifaci, Vincenzo and Harks, Tobias and Sch{\"a}fer, Guido}, JOURNAL = {Mathematics of Operations Research}, TITLE = {Stackelberg Routing in Arbitrary Networks}, ADDRESS = {Hanover, USA}, NUMBER = {2}, PUBLISHER = {INFORMS}, MONTH = {May}, VOLUME = {35}, ISBN = {0364-765X}, DOI = {10.1287/moor.1100.0442v1}, YEAR = {2010}, PAGES = {330 -- 346}, ABSTRACT = {We investigate the impact of \emph{Stackelberg routing} to reduce the price of anarchy in network routing games. In this setting, an $\alpha$ fraction of the entire demand is first routed centrally according to a predefined \emph{Stackelberg strategy} and the remaining demand is then routed selfishly by (nonatomic) players. Although several advances have been made recently in proving that Stackelberg routing can in fact significantly reduce the price of anarchy for certain network topologies, the central question of whether this holds true in general is still open. We answer this question negatively by constructing a family of single-commodity instances such that every Stackelberg strategy induces a price of anarchy that grows linearly with the size of the network. Moreover, we prove upper bounds on the price of anarchy of the Largest-Latency-First (LLF) strategy that only depend on the size of the network. Besides other implications, this rules out the possibility to construct constant-size networks to prove an unbounded price of anarchy. In light of this negative result, we consider bicriteria bounds. We develop an efficiently computable Stackelberg strategy that induces a flow whose cost is at most the cost of an optimal flow with respect to demands scaled by a factor of $1 + \sqrt{1-\alpha}$. Finally, we analyze the effectiveness of an easy-to-implement Stackelberg strategy, called SCALE. We prove bounds for a general class of latency functions that includes polynomial latency functions as a special case. Our analysis is based on an approach which is simple, yet powerful enough to obtain (almost) tight bounds for SCALE in general networks.}, } @INPROCEEDINGS{Bonifaci:2010:b, AUTHOR = {Bonifaci, Vincenzo and Chan, Ho-Leung and Marchetti-Spaccamela, Alberto and Megow, Nicole}, EDITOR = {Charikar, Moses}, TITLE = {Algorithms and Complexity for Periodic Real-Time Scheduling}, BOOKTITLE = {21st Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2010)}, PADDRESS = {Philadelphia, Pa.}, ADDRESS = {Austin (TX), USA}, PUBLISHER = {SIAM}, ISBN = {978-0-898716-98-6}, YEAR = {2010}, PAGES = {1350--1359}, ABSTRACT = {We investigate the preemptive scheduling of periodic tasks with hard deadlines. We show that, even in the uniprocessor case, no polynomial time algorithm can test the feasibility of a task system within a constant speedup bound, unless $\ccp=\ccnp$. This result contrasts with recent results for sporadic task systems. For two special cases, synchronous task systems and systems with a constant number of different task types, we provide the first polynomial time constant-speedup feasibility tests for multiprocessor platforms. Furthermore, we show that the problem of testing feasibility is coNP-hard for synchronous multiprocessor tasks systems. The complexity of some of these problems has been open for a long time. We also propose a profit maximization variant of the feasibility problem, where every task has a non-negative profit, and the goal is to find a subset of tasks that can be scheduled feasibly with maximum profit. We give the first constant-speed, constant-approximation algorithm for the case of synchronous task systems, together with related hardness results.}, } @INPROCEEDINGS{Bonifaci:2010:c, AUTHOR = {Baruah, Sanjoy and Bonifaci, Vincenzo and D'Angelo, Gianlorenzo and Li, Haohan and Marchetti-Spaccamela, Alberto and Megow, Nicole and Stougie, Leen}, EDITOR = {Hlinen{\'y}, Petr and Kucera, Anton\'{\i}n}, TITLE = {Scheduling Real-Time Mixed-Criticality Jobs}, BOOKTITLE = {Mathematical Foundations of Computer Science 2010 : 35th International Symposium, MFCS 2010}, ORGANIZATION = {European Research Consortium for Informatics and Mathematics (ERCIM)}, PADDRESS = {Berlin}, ADDRESS = {Brno, Czech Republic}, PUBLISHER = {Springer}, MONTH = {October}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6281}, ISBN = {3-642-15154-X}, DOI = {10.1007/978-3-642-15155-2}, YEAR = {2010}, PAGES = {90--101}, ABSTRACT = {Many safety-critical embedded systems are subject to certification requirements; some systems may be required to meet multiple sets of certification requirements, from different certification authorities. Certification requirements in such ``mixed-criticality'' systems give rise to interesting scheduling problems, that cannot be satisfactorily addressed using techniques from conventional scheduling theory. In this paper, we study a formal model for representing such mixed-criticality workloads. We demonstrate first the intractability of determining whether a system specified in this model can be scheduled to meet all its certification requirements, even for systems subject to two sets of certification requirements. Then we quantify, via the metric of processor speedup factor, the effectiveness of two techniques, reservation-based scheduling and priority-based scheduling, that are widely used in scheduling such mixed-criticality systems, showing that the latter of the two is superior to the former. We also show that the speedup factors are tight for these two techniques.}, } @INPROCEEDINGS{Bonifaci:2010:d, AUTHOR = {Bonifaci, Vincenzo and Marchetti-Spaccamela, Alberto}, EDITOR = {de Berg, Mark and Meyer, Ulrich}, TITLE = {Feasibility Analysis of Sporadic Real-Time Multiprocessor Task Systems}, BOOKTITLE = {Algorithms - ESA 2010 : 18th Annual European Symposium. - Pt. II}, PADDRESS = {Berlin}, ADDRESS = {Liverpool, United Kingdom}, PUBLISHER = {Springer}, MONTH = {November}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6347}, ISBN = {978-3-642-15780-6}, DOI = {10.1007/978-3-642-15781-3_20}, YEAR = {2010}, PAGES = {230--241}, ABSTRACT = {We give the first algorithm for testing the feasibility of a system of sporadic real-time tasks on a set of identical processors, solving an open problem in the area of multiprocessor real-time scheduling~[S.~Baruah and K.~Pruhs, Journal of Scheduling, 2009]. We also investigate the related notion of schedulability and a notion that we call online feasibility. Finally, we show that discrete-time schedules are as powerful as continuous-time schedules, which answers another open question in the above mentioned survey. }, } @ARTICLE{Bonifaci:2011:a, AUTHOR = {Bonifaci, Vincenzo and Korteweg, Peter and Marchetti-Spaccamela, Alberto and Stougie, Leen}, JOURNAL = {Theoretical Computer Science}, TITLE = {The Distributed Wireless Gathering Problem}, ADDRESS = {Amsterdam}, NUMBER = {8-10}, PUBLISHER = {Elsevier}, MONTH = {March}, VOLUME = {412}, ISBN = {0304-3975}, DOI = {10.1016/j.tcs.2010.10.018}, YEAR = {2011}, PAGES = {633--641}, ABSTRACT = {We address the problem of data gathering in a wireless network using multi-hop communication; our main goal is the analysis of simple algorithms suitable for implementation in realistic scenarios. We study the performance of distributed algorithms, which do not use any form of local coordination, and we focus on the objective of minimizing average flow times of data packets. We prove a lower bound of $\Omega(n)$ on the expected competitive ratio of any acknowledgment-based distributed algorithm minimizing the maximum flow time, where $n$ is the number of nodes of the network. Next, we consider a distributed algorithm which sends packets over shortest paths, and we use resource augmentation to analyze its performance when the objective is to minimize the average flow time. If interferences are modeled as in Bar-Yehuda et al. [R. Bar-Yehuda, O. Goldreich, A. Itai, On the time complexity of broadcast in multi-hop radio networks: an exponential gap between determinism and randomization, Journal of Computer and Systems Sciences 45 (1) (1992) 104– 126] we prove that the algorithm is $(1+\epsilon)$-competitive, when the algorithm sends packets a factor $O(\log(\delta/\epsilon) \log \Delta)$ faster than the optimal off-line solution; here $\delta$ is the radius of the network and $\Delta$ the maximum degree. We finally extend this result to a more complex interference model.}, } @ARTICLE{Bonifaci:2011:b, AUTHOR = {Bonifaci, Vincenzo and Korteweg, Peter and Marchetti-Spaccamela, Alberto and Stougie, Leen}, JOURNAL = {ACM Transactions on Algorithms}, TITLE = {Minimizing Flow Time in the Wireless Gathering Problem}, ADDRESS = {New York, NY}, NUMBER = {3}, PUBLISHER = {ACM}, VOLUME = {7}, ISBN = {1549-6325}, DOI = {10.1145/1978782.1978788}, YEAR = {2011}, PAGES = {33:1--33:20}, ABSTRACT = {We address the problem of efficient data gathering in a wireless network through multihop communication. We focus on two objectives related to flow times, that is, the times spent by data packets in the system: minimization of the maximum flow time and minimization of the average flow time of the packets. For both problems we prove that, unless P=NP, no polynomial-time algorithm can approximate the optimal solution within a factor less than $\Omega(m^{1-\epsilon})$ for any $0<\epsilon<1$, where $m$ is the number of packets. We then assess the performance of two natural algorithms by proving that their cost remains within the optimal cost of the respective problem if we allow the algorithms to transmit data at a speed 5 times higher than that of the optimal solutions to which we compare them.}, } @INPROCEEDINGS{Bonifaci:2011:c, AUTHOR = {Baruah, Sanjoy and Bonifaci, Vincenzo and D'Angelo, Gianlorenzo and Marchetti-Spaccamela, Alberto and van der Ster, Suzanne and Stougie, Leen}, EDITOR = {Demetrescu, Camil and Halld{\'o}rsson, Magn{\'u}s M.}, TITLE = {Mixed-criticality scheduling of sporadic task systems}, BOOKTITLE = {Algorithms - ESA 2011 : 19th Annual European Symposium}, PADDRESS = {Berlin}, ADDRESS = {Saarbr{\"u}cken, Germany}, PUBLISHER = {Springer}, MONTH = {October}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6942}, ISBN = {0302-9743}, DOI = {10.1007/978-3-642-23719-5_47}, YEAR = {2011}, PAGES = {555--566}, ABSTRACT = {We consider the scheduling of mixed-criticality task systems, that is, systems where each task to be scheduled has multiple levels of worst-case execution time estimates. We design a scheduling algorithm, EDF-VD, whose effectiveness we analyze using the processor speedup metric: we show that any 2-level task system that is schedulable on a unit-speed processor is correctly scheduled by EDF-VD using speed $\phi$; here $\phi < 1.619$ is the golden ratio. We also show how to generalize the algorithm to $K > 2$ criticality levels. We finally consider 2-level instances on $m$ identical machines. We prove speedup bounds for scheduling an independent collection of jobs and for the partitioned scheduling of a 2-level task system. }, } @BOOK{BookNeumannWitt, AUTHOR = {Neumann, Frank and Witt, Carsten}, TITLE = {Bioinspired Computation in Combinatorial Optimization : Algorithms and Their Computational Complexity}, ADDRESS = {New York, NY}, PUBLISHER = {Springer}, SERIES = {Natural Computing Series}, ISBN = {978-3-642-16543-6}, YEAR = {2010}, PAGES = {216}, } @BOOK{books/wi/LoeckxMW89, AUTHOR = {Loeckx, Jacques and Mehlhorn, Kurt and Wilhelm, Reinhard}, TITLE = {Foundations of Programming Languages}, ADDRESS = {New York, USA}, PUBLISHER = {Wiley}, ISBN = {0-471-92139-4}, YEAR = {1989}, PAGES = {426}, } @ARTICLE{BorosElabassioniMakino2010, AUTHOR = {Boros, Endre and Elbassioni, Khaled and Makino, Kazuhisa}, JOURNAL = {SIAM Journal on Computing}, TITLE = {Left-to-right multiplication for monotone {Boolean} dualization}, ADDRESS = {Philadelphia, Pa.}, NUMBER = {7}, PUBLISHER = {SIAM}, VOLUME = {39}, ISBN = {0097-5397}, DOI = {10.1137/080734881}, YEAR = {2010}, PAGES = {3424--3439}, } @ARTICLE{BorosElbassioniGurvich2010, AUTHOR = {Boros, Endre and Elbassioni, Khaled and Gurvich, Vladimir and Makino, Kazuhisa}, JOURNAL = {Games and Economic Behavior}, TITLE = {On effectivity functions of game forms}, ADDRESS = {Amsterdam}, NUMBER = {2}, PUBLISHER = {Elsevier}, VOLUME = {68}, ISBN = {0899-8256}, DOI = {10.1016/j.geb.2009.09.002}, YEAR = {2010}, PAGES = {512--531}, } @MASTERSTHESIS{Boullay96, AUTHOR = {Boullay, Johannes}, TITLE = {{Eine parallelisierbare Heuristik f{\"u}r das Min-Cost-Flow Problem}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, YEAR = {1996}, } @ARTICLE{Bradford-Capoyleas97, AUTHOR = {Bradford, Phillip Gnassi and Capoyleas, Vasilis}, JOURNAL = {Discrete \& Computational Geometry}, TITLE = {Weak epsilon-Nets for Points on a Hypersphere}, NUMBER = {1}, VOLUME = {18}, YEAR = {1997}, PAGES = {83--91}, } @INPROCEEDINGS{Bradford-et-al95, AUTHOR = {Bradford, Phillip Gnassi and Choppela, Venkatesh and Rawlins, Gregory J.E.}, EDITOR = {Baeza-Yates, Ricardo and Goles, Eric and Poblete, Patricio V.}, TITLE = {Lower Bounds for the Matrix Chain Ordering Problem}, BOOKTITLE = {LATIN'95: Theoretical Informatics, 2nd Latin American Symposium}, PADDRESS = {Berlin}, ADDRESS = {Valparaiso, Chile}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {911}, YEAR = {1995}, PAGES = {112--130}, } @ARTICLE{Bradford-et-al.98, AUTHOR = {Bradford, Phillip Gnassi and Rawlins, Gregory J.E. and Shannon, Greogory E.}, JOURNAL = {SIAM Journal on Computing}, TITLE = {Efficient Matrix Chain Ordering in Polylog Time}, NUMBER = {2}, VOLUME = {27}, ISBN = {0097-5397}, YEAR = {1998}, PAGES = {466--490}, } @ARTICLE{Bradford-Fleischer-96, AUTHOR = {Alon, Noga and Bradford, Phillip Gnassi and Fleischer, Rudolf}, JOURNAL = {Information Processing Letters}, TITLE = {Matching nuts and bolts faster}, NUMBER = {3}, PUBLISHER = {Elsevier}, VOLUME = {59}, ISBN = {0020-0190}, YEAR = {1996}, PAGES = {123--127}, } @INPROCEEDINGS{Bradford-Fleischer95, AUTHOR = {Bradford, Phillip Gnassi and Fleischer, Rudolf}, EDITOR = {Staples, John and Eades, Peter and Katoh, Naoki and Moffat, Alistair}, TITLE = {Matching nuts and bolts faster}, BOOKTITLE = {Algorithms and Computation: 6th International Symposium (ISAAC'95)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Cairns, Australia}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1004}, YEAR = {1995}, PAGES = {402--408}, } @INPROCEEDINGS{Bradford-Reinert-96, AUTHOR = {Bradford, Phillip Gnassi and Reinert, Knut}, EDITOR = {Meyer auf der Heide, Friedhelm and Monien, Burkhard}, TITLE = {Lower Bounds for Row Minima Searching}, BOOKTITLE = {Automata Languages and Programming: 23rd International Colloquium (ICALP'96)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Paderborn}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1099}, YEAR = {1996}, PAGES = {454--465}, } @ARTICLE{BradfordGolinLarmore2002, AUTHOR = {Bradford, Phillip Gnassi and Golin, Mordecai J. and Larmore, Lawrence L.}, JOURNAL = {Journal of Algorithms}, TITLE = {Optimal prefix-free codes for unequal letter costs: Dynamic programming with the {Monge} property}, ADDRESS = {New York, USA}, NUMBER = {2}, PUBLISHER = {Academic Press}, MONTH = {February}, VOLUME = {42}, ISBN = {0196-6774}, YEAR = {2002}, PAGES = {277--303}, } @INPROCEEDINGS{BradfordGolinLarmoreRytter1998, AUTHOR = {Bradford, Phillip Gnassi and Golin, Mordecai J. and Larmore, Lawrence L. and Rytter, Wojciech}, EDITOR = {Bilardi, Gianfranco and Italiano, Giuseppe F. and Pietracaprina, Andrea and Pucci, Geppino}, TITLE = {Optimal Prefix-Free Codes for Unequal Letter Costs: Dynamic Programming with the Monge Property}, BOOKTITLE = {Proceedings of the 6th Annual European Symposium on Algorithms (ESA-98)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Venice, Italy}, PUBLISHER = {Springer}, MONTH = {August}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1461}, ISBN = {0302-9743}, YEAR = {1998}, PAGES = {43--54}, } @MASTERSTHESIS{BramerDipl03, AUTHOR = {Bramer, Andreas}, TITLE = {{Zwei Algorithmen zur Bestimmung kostenminimaler Fl{\"u}sse in Netzwerken}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {November}, YEAR = {2003}, } @INPROCEEDINGS{BrandenburgJuengerMutzelLengauer97, AUTHOR = {Brandenburg, Franz J. and J{\"u}nger, Michael and Mutzel, Petra and Lengauer, Thomas}, EDITOR = {Jarke, Matthias and Pasedach, Klaus and Pohl, Klaus}, TITLE = {{SPP 731 : Algorithmen zum automatischen Zeichnen von Graphen im Rahmen des DFG-Schwerpunkts "Effiziente Algorithmen f{\"u}r diskrete Probleme und ihre Anwendungen"}}, BOOKTITLE = {Informatik '97 : Informatik als Innovationsmotor : 27. Jahrestagung der Gesellschaft f{\"u}r Informatik}, PADDRESS = {Berlin}, ADDRESS = {Aachen}, PUBLISHER = {Springer}, YEAR = {1997}, PAGES = {58--67}, } @MASTERSTHESIS{Braun2000, AUTHOR = {Braun, Sebastian}, TITLE = {{Entwicklung und Test von f{\"u}r statische Graphen optimierte Datentypen}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {January}, YEAR = {2000}, } @INPROCEEDINGS{brederecknichterleinniedermeierphilip2011a, AUTHOR = {Bredereck, Robert and Nichterlein, Andr{\'e} and Niedermeier, Rolf and Philip, Geevarghese}, EDITOR = {Murlak, Filip and Sankowski, Piotr}, TITLE = {Pattern-Guided Data Anonymization and Clustering}, BOOKTITLE = {Mathematical Foundations of Computer Science 2011 - 36th International Symposium, MFCS 2011, Warsaw, Poland, August 22-26, 2011. Proceedings}, PADDRESS = {Berlin}, ADDRESS = {Warsaw, Poland}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6907}, ISBN = {978-3-642-22992-3}, DOI = {10.1007/978-3-642-22993-0}, YEAR = {2011}, PAGES = {182--193}, ABSTRACT = {A matrix~$M$ over a fixed alphabet is $k$-anonymous if every row in~$M$ has at least~$k-1$ identical copies in~$M$. Making a matrix $k$-anonymous by replacing a minimum number of entries with an additional $\star$-symbol (called ``suppressing entries'') is known to be NP-hard. This task arises in the context of privacy-preserving publishing. We propose and analyze the computational complexity of an enhanced anonymization model where the user of the $k$-anonymized data may additionally ``guide'' the selection of the candidate matrix entries to be suppressed. The basic idea is to express this by means of ``pattern vectors'' which are part of the input. This can also be interpreted as a sort of clustering process. It is motivated by the observation that the ``value'' of matrix entries may significantly differ, and losing one (by suppression) may be more harmful than losing the other, which again may very much depend on the intended use of the anonymized data. We show that already very basic special cases of our new model lead to NP-hard problems while others allow for (fixed-parameter) tractability results.}, } @INPROCEEDINGS{BredereckNichterleinNiedermeierPhilip2011b, AUTHOR = {Bredereck, Robert and Nichterlein, Andr{\'e} and Niedermeier, Rolf and Philip, Geevarghese}, EDITOR = {Owe, Olaf and Steffen, Martin and Telle, Jan Arne}, TITLE = {The Effect of Homogeneity on the Complexity of $k$-Anonymity}, BOOKTITLE = {Fundamentals of Computation Theory - 18th International Symposium, FCT 2011, Oslo, Norway, August 22-25, 2011. Proceedings}, PADDRESS = {Berlin}, ADDRESS = {Oslo, Norway}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6914}, DOI = {978-3-642-22952-7}, YEAR = {2011}, PAGES = {53--64}, ABSTRACT = {The NP-hard \textsc{$k$-Anonymity} problem asks, given an~$n \times m$-matrix~$M$ over a fixed alphabet and an integer~$s>0$, whether~$M$ can be made $k$-anonymous by suppressing (blanking out) at most~$s$ entries. A matrix~$M$ is said to be $k$-anonymous if for each row~$r$ in~$M$ there are at least~$k-1$ other rows in~$M$ which are identical to~$r$. Complementing previous work, we introduce two new ``data-driven'' parameterizations for \textsc{$k$-Anonymity}---the number~$\tin$ of different input rows and the number~$\tout$ of different output rows---both modeling aspects of data homogeneity. We show that \textsc{$k$-Anonymity} is fixed-parameter tractable for the parameter~$\tin$, and it is NP-hard even for~$\tout = 2$ and alphabet size four. Notably, our fixed-parameter tractability result implies that \textsc{$k$-Anonymity} can be solved in \emph{linear time} when~$\tin$ is a constant. Our results also extend to some interesting generalizations of \textsc{$k$-Anonymity}.}, } @ARTICLE{BrelauerJiangJiang97, AUTHOR = {Breslauer, Dany and Jiang, Tao and Jiang, Zhigen}, JOURNAL = {Journal of Algorithms}, TITLE = {Rotations of periodic strings and short superstrings}, NUMBER = {1}, VOLUME = {24}, YEAR = {1997}, PAGES = {340--353}, } @MASTERSTHESIS{Bremer95, AUTHOR = {Bremer, Dirk}, TITLE = {{Analyse und Simulation eines Maximum-Flow Algorithmus f{\"u}r das Gitter}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, YEAR = {1995}, } @MASTERSTHESIS{Brengel2000, AUTHOR = {Brengel, Klaus}, TITLE = {{Externe Priorit{\"a}tswarteschlangen}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {January}, YEAR = {2000}, } @ARTICLE{BreslauerRamesh96, AUTHOR = {Breslauer, Dany and Ramesh, Hariharan}, JOURNAL = {Parallel Processing Letters}, TITLE = {Optimal Parallel Construction of Minimal Suffix and Factor Automata}, NUMBER = {1}, VOLUME = {6}, YEAR = {1996}, PAGES = {35--44}, } @ARTICLE{BrFlSm97, AUTHOR = {Bradford, Phillip Gnassi and Fleischer, Rudolf and Smid, Michiel}, JOURNAL = {Journal of Algorithms}, TITLE = {More efficient parallel totally monotone matrix searching}, VOLUME = {23}, YEAR = {1997}, PAGES = {386--400}, } @ARTICLE{Brightwell2012, AUTHOR = {Brightwell, Graham and Panagiotou, Konstantinos and Steger, Angelika}, JOURNAL = {Random Structures \& Algorithms}, TITLE = {Extremal subgraphs of random graphs}, ADDRESS = {Chichester}, NUMBER = {2}, PUBLISHER = {Wiley}, VOLUME = {41}, ISBN = {1042-9832}, DOI = {10.1002/rsa.20413}, YEAR = {2012}, PAGES = {147--178}, } @INPROCEEDINGS{Bringmann13, AUTHOR = {Bringmann, Karl}, EDITOR = {Chatterjee, Krishnendu and Sgall, Jir{\'i}}, TITLE = {Bringing Order to Special Cases of Klee’s Measure Problem}, BOOKTITLE = {38th International Symposium on Mathematical Foundations of Computer Science (MFCS-13)}, ORGANIZATION = {European Association for Theoretical Computer Science (EATCS)}, PADDRESS = {Heidelberg}, ADDRESS = {Klosterneuburg, Austria}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {8087}, YEAR = {2013}, PAGES = {207--218}, } @ARTICLE{Bringmann2012d, AUTHOR = {Bringmann, Karl and Friedrich, Tobias}, JOURNAL = {Theoretical Computer Science}, TITLE = {Approximating the least hypervolume contributor: {NP-hard} in general, but fast in practice}, ADDRESS = {Amsterdam}, PUBLISHER = {Elsevier}, VOLUME = {425}, DOI = {10.1016/j.tcs.2010.09.026}, YEAR = {2012}, PAGES = {104--116}, } @ARTICLE{BringmannCGTA12, AUTHOR = {Bringmann, Karl}, JOURNAL = {Computational Geometry: Theory and Applications}, TITLE = {An improved algorithm for {Klee's} measure problem on fat boxes}, ADDRESS = {Amsterdam}, NUMBER = {5-6}, PUBLISHER = {Elsevier}, MONTH = {July}, VOLUME = {45}, ISBN = {0925-7721}, DOI = {10.1016/j.comgeo.2011.12.001}, YEAR = {2012}, PAGES = {225--233}, ABSTRACT = {The measure problem of Klee asks for the volume of the union of n axis-parallel boxes in a fixed dimension d. We give an O(n^((d+2)/3)) time algorithm for the special case of all boxes being cubes or, more generally, fat boxes. Previously, the fastest run-time was n^(d/2) 2^O(log⁎n) , achieved by the general case algorithm of Chan [SoCG 2008]. For the general problem our run-time would imply a breakthrough for the k-clique problem.}, } @INPROCEEDINGS{BringmannDoerrNeumannSliacan2013, AUTHOR = {Bringmann, Karl and Doerr, Benjamin and Neumann, Adrian and Sliacan, Jakub}, EDITOR = {Fomin, Fedor V. and Freivalds, Rūsiņ{\v{s}} and Kwiatkowska, Marta and Peleg, David}, TITLE = {Online Checkpointing with Improved Worst-Case Guarantees}, BOOKTITLE = {Automata, Languages, and Programming - 40th International Colloquium (ICALP 2013)}, ORGANIZATION = {European Association for Theoretical Computer Science (EATCS)}, PADDRESS = {Heidelberg}, ADDRESS = {Riga, Latvia}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {7965}, ISBN = {978-3-642-39205-4}, DOI = {10.1007/978-3-642-39206-1}, YEAR = {2013}, PAGES = {255--266}, ABSTRACT = { In the online checkpointing problem, the task is to continuously maintain a set of $k$ checkpoints that allow to rewind an ongoing computation faster than by a full restart. The only operation allowed is to replace an old checkpoint by the current state. Our aim are checkpoint placement strategies that minimize rewinding cost, i.e., such that at all times $T$ when requested to rewind to some time $t \le T$ the number of computation steps that need to be redone to get to $t$ from a checkpoint before $t$ is as small as possible. In particular, we want that the closest checkpoint earlier than $t$ is not further away from $t$ than $q_k$ times the ideal distance $T / (k+1)$, where $q_k$ is a small constant. Improving over earlier work showing $1 + 1/k \le q_k \le 2$, we show that $q_k$ can be chosen asymptotically less than $2$. We present algorithms with asymptotic discrepancy $q_k \le 1.59 + o(1)$ valid for all $k$ and $q_k \le \ln(4) + o(1) \le 1.39 + o(1)$ valid for $k$ being a power of two. Experiments indicate the uniform bound $p_k \le 1.7$ for all $k$. For small $k$, we show how to use a linear programming approach to compute good checkpointing algorithms. This gives discrepancies of less than $1.55$ for all $k < 60$. We prove the first lower bound that is asymptotically more than one, namely $q_k \ge 1.30 - o(1)$. We also show that optimal algorithms (yielding the infimum discrepancy) exist for all~$k$. }, } @INPROCEEDINGS{BringmannEMR13, AUTHOR = {Bringmann, Karl and Engels, Christian and Manthey, Bodo and Raghavendra Rao, B. V.}, EDITOR = {Chatterjee, Krishnendu and Sgall, Jir{\'i}}, TITLE = {Random Shortest Paths: Non-Euclidean Instances for Metric Optimization Problems}, BOOKTITLE = {38th International Symposium on Mathematical Foundations of Computer Science (MFCS-13)}, ORGANIZATION = {European Association for Theoretical Computer Science (EATCS)}, PADDRESS = {Heidelberg}, ADDRESS = {Klosterneuburg, Austria}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {8087}, YEAR = {2013}, PAGES = {219--230}, } @INPROCEEDINGS{BringmannF12, AUTHOR = {Bringmann, Karl and Friedrich, Tobias}, TITLE = {Convergence of Hypervolume-Based Archiving Algorithms {II}: Competitiveness}, BOOKTITLE = {GECCO'12 : Proceedings of the Fourteenth International Conference on Genetic and Evolutionary Computation}, ORGANIZATION = {Association for Computing Machinery (ACM)}, PADDRESS = {New York, NY}, ADDRESS = {Philadelphia, USA}, PUBLISHER = {ACM}, ISBN = {978-1-4503-1177-9}, DOI = {10.1145/2330163.2330229}, YEAR = {2012}, PAGES = {457--464}, ABSTRACT = {We study the convergence behavior of (μ+λ)-archiving algorithms. A (μ+λ)- archiving algorithm defines how to choose in each generation μ children from μ parents and λ offspring together. Archiving algorithms have to choose individuals online without knowing future offspring. Previous studies assumed the offspring generation to be best-case. We assume the initial population and the offspring generation to be worst-case and use the competitive ratio to measure how much smaller hypervolumes an archiving algorithm finds due to not knowing the future in advance. We prove that all archiving algorithms which increase the hypervolume in each step (if they can) are only μ-competitive. We also present a new archiving algorithm which is (4 + 2/μ)-competitive. This algorithm not only achieves a constant competitive ratio, but is also efficiently computable. Both properties provably do not hold for the commonly used greedy archiving algorithms, for example those used in SIBEA, SMS-EMOA, or the generational MO-CMA-ES. }, } @INPROCEEDINGS{BringmannF13, AUTHOR = {Bringmann, Karl and Friedrich, Tobias}, TITLE = {Parameterized Average-Case Complexity of the Hypervolume Indicator}, BOOKTITLE = {15th Annual Conference on Genetic and Evolutionary Computation (GECCO-13)}, ORGANIZATION = {Association for Computing Machinery (ACM)}, PADDRESS = {New York, NY}, ADDRESS = {Amsterdam, The Netherlands}, PUBLISHER = {ACM}, YEAR = {2013}, PAGES = {575--582}, } @INPROCEEDINGS{BringmannF13-2, AUTHOR = {Bringmann, Karl and Friedrich, Tobias}, EDITOR = {Fomin, Fedor V. and Freivalds, Rūsiņ{\v{s}} and Kwiatkowska, Marta and Peleg, David}, TITLE = {Exact and Efficient Generation of Geometric Random Variates and Random Graphs}, BOOKTITLE = {Automata, Languages, and Programming - 40th International Colloquium (ICALP-13)}, ORGANIZATION = {European Association for Theoretical Computer Science (EATCS)}, PADDRESS = {Heidelberg}, ADDRESS = {Riga, Latvia}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {7965}, ISBN = {978-3-642-39205-4}, YEAR = {2013}, PAGES = {267--278}, } @INPROCEEDINGS{BringmannF2011, AUTHOR = {Bringmann, Karl and Friedrich, Tobias}, EDITOR = {Krasnogor, Natalio and Lanzim, Pier Luca}, TITLE = {Convergence of Hypervolume-Based Archiving Algorithms {I}: {Effectiveness}}, BOOKTITLE = {GECCO 2011 : Genetic and Evolutionary Computation Conference}, ORGANIZATION = { SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation}, PADDRESS = {New York, NY}, ADDRESS = {Dublin, Ireland}, PUBLISHER = {ACM}, ISBN = {978-1-4503-0557-0}, DOI = {10.1145/2001576.2001678}, YEAR = {2011}, PAGES = {745--752}, ABSTRACT = {The core of hypervolume-based multi-objective evolutionary algorithms is an archiving algorithm which performs the environmental selection. A (μ+λ)- archiving algorithm defines how to choose μ children from μ parents and λ offspring together. We study theoretically (μ+λ)-archiving algorithms which never decrease the hypervolume from one generation to the next. Zitzler, Thiele, and Bader (IEEE Trans. Evolutionary Computation, 14:58-79, 2010) proved that all (μ+1)-archiving algorithms are ineffective, which means there is an initial population such that independent of the used reproduction rule, a set with maximum hypervolume cannot be reached. We extend this and prove that for λ<μ all archiving algorithms are ineffective. On the other hand, locally optimal algorithms, which maximize the hypervolume in each step, are effective for λ=μ and can always find a population with hypervolume at least half the optimum for λ<μ. We also prove that there is no hypervolume-based archiving algorithm which can always find a population with hypervolume greater than 1/(1+0.1338(1/λ-1/μ)) times the optimum. }, } @ARTICLE{BringmannFIV13, AUTHOR = {Bringmann, Karl and Friedrich, Tobias and Igel, Christian and Vo{\ss}, Thomas}, JOURNAL = {Artificial Intelligence}, TITLE = {Speeding Up Many-Objective Optimization by Monte Carlo Approximations}, PUBLISHER = {Elsevier}, MONTH = {November}, VOLUME = {204}, YEAR = {2013}, PAGES = {22–29}, } @ARTICLE{BringmannFjournal13, AUTHOR = {Bringmann, Karl and Friedrich, Tobias}, JOURNAL = {Artificial Intelligence}, TITLE = {Approximation Quality of the Hypervolume Indicator}, PUBLISHER = {Elsevier}, MONTH = {February}, VOLUME = {195}, YEAR = {2013}, PAGES = {265–290}, } @INPROCEEDINGS{BringmannFNW2011, AUTHOR = {Bringmann, Karl and Friedrich, Tobias and Neumann, Frank and Wagner, Markus}, EDITOR = {Walsh, Toby}, TITLE = {Approximation-guided evolutionary multi-objective optimization}, BOOKTITLE = {Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence (IJCAI 2011)}, ORGANIZATION = {International Joint Conferences on Artificial Intelligence (IJCAI)}, PADDRESS = {Menlo Park, CA}, ADDRESS = {Barcelona, Spain}, PUBLISHER = {AAAI Press}, ISBN = {978-1-57735-516-8}, DOI = {10.5591/978-1-57735-516-8/IJCAI11-204}, YEAR = {2011}, PAGES = {1198--1203}, ABSTRACT = {Multi-objective optimization problems arise frequently in applications but can often only be solved approximately by heuristic approaches. Evolutionary algorithms have been widely used to tackle multi-objective problems. These algorithms use different measures to ensure diversity in the objective space but are not guided by a formal notion of approximation. We present a new framework of an evolutionary algorithm for multi-objective optimization that allows to work with a formal notion of approximation. Our experimental results show that our approach outperforms state-of-the-art evolutionary algorithms in terms of the quality of the approximation that is obtained in particular for problems with many objectives. }, } @INPROCEEDINGS{BringmannGL, AUTHOR = {Bringmann, Karl and Green Larsen, Kasper}, TITLE = {Succinct Sampling from Discrete Distributions}, BOOKTITLE = {45th ACM Symposium on Theory of Computing (STOC-13)}, PADDRESS = {New York, USA}, ADDRESS = {Palo Alto, USA}, PUBLISHER = {ACM}, YEAR = {2013}, PAGES = {775--782}, } @INPROCEEDINGS{BringmannP12, AUTHOR = {Bringmann, Karl and Panagiotou, Konstantinos}, EDITOR = {Czumaj, Artur and Mehlhorn, Kurt and Pitts, Andrew M. and Wattenhofer, Roger}, TITLE = {Efficient Sampling Methods for Discrete Distributions}, BOOKTITLE = {Automata, Languages, and Programming : 39th International Colloquium, ICALP 2012}, PADDRESS = {Berlin}, ADDRESS = {Warwick, UK}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {7391}, ISBN = {978-3-642-31593-0}, DOI = {10.1007/978-3-642-31594-7_12}, YEAR = {2012}, PAGES = {133--144}, ABSTRACT = {We study the fundamental problem of the exact and efficient generation of random values from a finite and discrete probability distribution. Suppose that we are given n distinct events with associated probabilities p_1,...,p_n. We consider the problem of sampling a subset, which includes the i-th event independently with probability p_i, and the problem of sampling from the distribution, where the i-th event has a probability proportional to p_i. For both problems we present on two different classes of inputs – sorted and general probabilities – efficient preprocessing algorithms that allow for asymptotically optimal querying, and prove almost matching lower bounds for their complexity. }, } @INPROCEEDINGS{BringmannSSS14, AUTHOR = {Bringmann, Karl and Sauerwald, Thomas and Stauffer, Alexandre and Sun, He}, TITLE = {Balls into bins via local search: cover time and maximum load}, BOOKTITLE = {31st Symposium on Theoretical Aspects of Computer Science (STACS-14)}, PADDRESS = {Heidelberg}, ADDRESS = {Lyon, France}, PUBLISHER = {Springer}, YEAR = {2014}, } @MASTERSTHESIS{Brockenauer97, AUTHOR = {Brockenauer, Ralf}, TITLE = {{Separierung von Kuratowski-Ungleichungen f{\"u}r das gr{\"o}{\ss}te planare Untergraphenproblem}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, YEAR = {1997}, } @ARTICLE{Brodal-Chaudhuri-Radhakrishnan, AUTHOR = {Brodal, Gerth St{\o}lting and Chaudhuri, Shiva and Radhakrishnan, R.}, JOURNAL = {Nordic Journal of Computing}, TITLE = {The randomized complexity of maintaining the minimum}, NUMBER = {4}, PUBLISHER = {Publishing Association Nordic Journal of Computing}, VOLUME = {3}, ISBN = {1236-6064}, YEAR = {1996}, PAGES = {337--351}, } @INPROCEEDINGS{Brodal-Traeff-Zaro97, AUTHOR = {Brodal, Gerth St{\o}lting and Tr{\"a}ff, Jesper Larsson and Zaroliagis, Christos}, EDITOR = {Feitelson, Dror G. and Rudolph, Larry}, TITLE = {A parallel priority data structure with applications}, BOOKTITLE = {11th Internatinal Parallel Processing Symposium (IPPS-97)}, PADDRESS = {Los Alamitos, USA}, ADDRESS = {Geneva, Switzerland}, PUBLISHER = {IEEE}, YEAR = {1997}, PAGES = {689--693}, ABSTRACT = {We present a parallel priority data structure that improves the running time of certain algorithms for problems that lack a fast and work-efficient parallel solution. As a main application, we give a parallel implementation of Dijkstra's algorithm which runs in $O(n)$ time while performing $O(m\log n)$ work on a CREW PRAM\@. This is a logarithmic factor improvement for the running time compared with previous approaches. The main feature of our data structure is that the operations needed in each iteration of Dijkstra's algorithm can be supported in $O(1)$ time.}, } @INPROCEEDINGS{Brodal1998b, AUTHOR = {Brodal, Gerth St{\o}lting and Katajainen, Jyrki}, EDITOR = {Arnborg, Stefan and Ivansson, Lars}, TITLE = {Worst-Case Efficient External-Memory Priority Queues}, BOOKTITLE = {Proceedings of the 6th Scandinavian Workshop on Algorithm Theory (SWAT-98)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Stockholm, Sweden}, PUBLISHER = {Springer}, MONTH = {July}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1432}, ISBN = {3-540-64682-5}, YEAR = {1998}, PAGES = {107--118}, ABSTRACT = {A priority queue $Q$ is a data structure that maintains a collection of elements, each element having an associated priority drawn from a totally ordered universe, under the operations {\sc Insert}, which inserts an element into $Q$, and {\sc DeleteMin}, which deletes an element with the minimum priority from $Q$. In this paper a priority-queue implementation is given which is efficient with respect to the number of block transfers or I/Os performed between the internal and external memories of a computer. Let $B$ and $M$ denote the respective capacity of a block and the internal memory measured in elements. The developed data structure handles any intermixed sequence of {\sc Insert} and {\sc DeleteMin} operations such that in every disjoint interval of $B$ consecutive priority-queue operations at most $c \log_{M/B} \frac{N}{M}$ I/Os are performed, for some positive constant $c$. These I/Os are divided evenly among the operations: if $B \geq c \log_{M/B} \frac{N}{M}$, one I/O is necessary for every $B/(c\log_{M/B} \frac{N}{M})$th operation and if $B < c \log_{M/B} \frac{N}{M}$, $\frac{c}{B}\log_{M/B} \frac{N}{M}$ I/Os are performed per every operation. Moreover, every operation requires $O(\log_2 N)$ comparisons in the worst case. The best earlier solutions can only handle a sequence of $S$ operations with $O(\sum_{i=1}^{S}\frac{1}{B}\log_{M/B}\frac{N_{i}}{M})$ I/Os, where $N_{i}$ denotes the number of elements stored in the data structure prior to the $i$th operation, without giving any guarantee for the performance of the individual operations.}, } @INPROCEEDINGS{Brodal1998c, AUTHOR = {Brodal, Gerth St{\o}lting and Pinotti, M. Cristina}, EDITOR = {Arnborg, Stefan and Ivansson, Lars}, TITLE = {Comparator Networks for Binary Heap Construction}, BOOKTITLE = {Proceedings of the 6th Scandinavian Workshop on Algorithm Theory (SWAT-98)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Stockholm, Sweden}, PUBLISHER = {Springer}, MONTH = {July}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1432}, ISBN = {3-540-64682-5}, YEAR = {1998}, PAGES = {158--168}, ABSTRACT = {Comparator networks for constructing binary heaps of size $n$ are presented which have size $O(n\log\log n)$ and depth $O(\log n)$. A lower bound of $n\log\log n-O(n)$ for the size of any heap construction network is also proven, implying that the networks presented are within a constant factor of optimal. We give a tight relation between the leading constants in the size of selection networks and in the size of heap construction networks.}, } @ARTICLE{Brodal1998d, AUTHOR = {Brodal, Gerth St{\o}lting and Tr{\"a}ff, Jesper Larsson and Zaroliagis, Christos}, JOURNAL = {Journal of Parallel and Distributed Computing, Special Issue on Parallel Data Structures}, TITLE = {A Parallel Priority Queue with Constant Time Operations}, NUMBER = {1}, PUBLISHER = {Academic Press}, VOLUME = {49}, ISBN = {0743-7315}, YEAR = {1998}, PAGES = {4--21}, ABSTRACT = {We present a parallel priority queue that supports the following operations in constant time: {\em parallel insertion\/} of a sequence of elements ordered according to key, {\em parallel decrease key\/} for a sequence of elements ordered according to key, {\em deletion of the minimum key element}, as well as {\em deletion of an arbitrary element}. Our data structure is the first to support multi insertion and multi decrease key in constant time. The priority queue can be implemented on the EREW PRAM, and can perform any sequence of $n$ operations in $O(n)$ time and $O(m\log n)$ work, $m$ being the total number of keys inserted and/or updated. A main application is a parallel implementation of Dijkstra's algorithm for the single-source shortest path problem, which runs in $O(n)$ time and $O(m\log n)$ work on a CREW PRAM on graphs with $n$ vertices and $m$ edges. This is a logarithmic factor improvement in the running time compared with previous approaches.}, } @INPROCEEDINGS{Brodal96, AUTHOR = {Brodal, Gerth St{\o}lting}, TITLE = {Priority queues on parallel machines}, BOOKTITLE = {5th Scandinavian Workshop on Algorithm Theory (SWAT96)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Reykjavik, Iceland}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1097}, YEAR = {1996}, PAGES = {416--427}, } @INPROCEEDINGS{Brodal97a, AUTHOR = {Brodal, Gerth St{\o}lting}, EDITOR = {Reischuk, Rudiger and Morvan, Michel}, TITLE = {Predecessor Queries in Dynamic Integer Sets}, BOOKTITLE = {Proceedings of the 14th Annual Symposium on Theoretical Aspects of Computer Science (STACS-97)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Lubeck, Germany}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1200}, ISBN = {3-540-62616-6}, YEAR = {1997}, PAGES = {21--32}, ABSTRACT = {We consider the problem of maintaining a set of $n$ integers in the range $0..2^{w}-1$ under the operations of insertion, deletion, predecessor queries, minimum queries and maximum queries on a unit cost RAM with word size $w$ bits. Let $f(n)$ be an arbitrary nondecreasing smooth function satisfying $\log\log n\leq f(n)\leq \sqrt{\log n}$. A data structure is presented supporting insertions and deletions in worst case $O(f(n))$ time, predecessor queries in worst case $O((\log n)/f(n))$ time and minimum and maximum queries in worst case constant time. The required space is $O(n2^{\epsilon w})$ for an arbitrary constant $\epsilon>0$. The RAM operations used are addition, arbitrary left and right bit shifts and bit-wise boolean operations. The data structure is the first supporting predecessor queries in worst case $O(\log n/\log\log n)$ time while having worst case $O(\log\log n)$ update time.}, } @INPROCEEDINGS{Brodal98a, AUTHOR = {Brodal, Gerth St{\o}lting}, TITLE = {Finger Search Trees with Constant Update Time}, BOOKTITLE = {Proceedings of the 9th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-98)}, ORGANIZATION = {Association of Computing Machinery/Society for Industrial and Applied Mathematics}, PADDRESS = {New York, USA}, ADDRESS = {San Francisko, USA}, PUBLISHER = {ACM Press / SIAM}, ISBN = {0-89871-410-9}, YEAR = {1998}, PAGES = {540--549}, ABSTRACT = {We consider the problem of implementing finger search trees on the pointer machine, {\it i.e.}, how to maintain a sorted list such that searching for an element $x$, starting the search at any arbitrary element $f$ in the list, only requires logarithmic time in the distance between $x$ and $f$ in the list. We present the first pointer-based implementation of finger search trees allowing new elements to be inserted at any arbitrary position in the list in worst case constant time. Previously, the best known insertion time on the pointer machine was $O(\log^{*} n)$, where $n$ is the total length of the list. On a unit-cost RAM, a constant insertion time has been achieved by Dietz and Raman by using standard techniques of packing small problem sizes into a constant number of machine words. Deletion of a list element is supported in $O(\log^{*} n)$ time, which matches the previous best bounds. Our data structure requires linear space.}, } @INPROCEEDINGS{BrodalChaudhuriRadhakrishnan96-CPM-7, AUTHOR = {Brodal, Gerth St{\o}lting and Chaudhuri, Shiva and Radhakrishnan, Jaikumar}, EDITOR = {Karlsson, Rolf and Lingas, Andrzej}, TITLE = {The randomized complexity of maintaining the minimum}, BOOKTITLE = {Algorithm Theory - SWAT'96: 5th Scandinavian Workshop on Algorithm Theory}, PADDRESS = {Berlin}, ADDRESS = {Reykjavik, Iceland}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1097}, YEAR = {1996}, PAGES = {4--15}, } @ARTICLE{BroetalTEC2009, AUTHOR = {Brockhoff, Dimo and Friedrich, Tobias and Hebbinghaus, Nils and Klein, Christian and Neumann, Frank and Zitzler, Eckart}, JOURNAL = {IEEE Transactions on Evolutionary Computation}, TITLE = {On the Effects of Adding Objectives to Plateau Functions}, ADDRESS = {New York, NY}, NUMBER = {3}, PUBLISHER = {IEEE}, VOLUME = {13}, ISBN = {1089-778X}, DOI = {10.1109/TEVC.2008.2009064}, YEAR = {2009}, PAGES = {591--603}, } @INPROCEEDINGS{BroFriNeuPPSN2008, AUTHOR = {Brockhoff, Dimo and Friedrich, Tobias and Neumann, Frank}, EDITOR = {Rudolph, G{\"u}nter and Jansen, Thomas and Lucas, Simon M. and Poloni, Carlo and Beume, Nicola}, TITLE = {Analyzing Hypervolume Indicator Based Algorithms}, BOOKTITLE = {Parallel Problem Solving from Nature (PPSN X)}, PADDRESS = {Berlin}, ADDRESS = {Dortmund, Germany}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5199}, ISBN = {978-3-540-87699-1}, DOI = {10.1007/978-3-540-87700-4_65}, YEAR = {2008}, PAGES = {651--660}, } @ARTICLE{BroennimannBurnikelPion2001, AUTHOR = {Br{\"o}nnimann, Herv{\'e} and Burnikel, Christoph and Pion, Sylvain}, JOURNAL = {Discrete Applied Mathematics}, TITLE = {Interval arithmetic yields efficient dynamic filters for computational geometry}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {1/2}, PUBLISHER = {Elsevier}, MONTH = {April}, VOLUME = {109}, YEAR = {2001}, PAGES = {25--47}, } @UNPUBLISHED{BrownRizkallah2011, AUTHOR = {Rizkallah, Christine}, TITLE = {Glivenko and Kuroda for Simple Type Theory}, MONTH = {December}, YEAR = {2011}, PAGES = {14}, NOTE = {Submitted}, ABSTRACT = {Glivenko’s theorem states that an arbitrary proposi- tional formula is classically provable if and only if its double nega- tion is intuitionistically provable. The result does not extend to full first-order predicate logic, but does extend to first-order pred- icate logic without the universal quantifier. A recent paper by Zdanowski shows that Glivenko’s theorem also holds for second- order propositional logic without the universal quantifier. We prove that Glivenko’s theorem extends to some versions of simple type theory without the universal quantifier. Moreover we prove that Kuroda’s negative translation, which is known to embed clas- sical first-order logic into intuitionistic first-order logic, extends to the same versions of simple type theory. We also prove that the Glivenko property fails for simple type theory once a weak form of functional extensionality is included.}, } @INPROCEEDINGS{bs-agffgtaas-08, AUTHOR = {Berberich, Eric and Sagraloff, Michael}, EDITOR = {Haines, Eric and McGuire, Morgan}, TITLE = {A Generic and Flexible Framework for the Geometrical and Topological Analysis of (Algebraic) Surfaces}, BOOKTITLE = {Proceedings of the 2008 ACM Symposium on Solid and Physical Modeling}, PADDRESS = {New York, USA}, ADDRESS = {Stony Brook, USA}, PUBLISHER = {ACM}, MONTH = {June}, DOI = {10.1145/1364901.1364925}, YEAR = {2008}, PAGES = {171--182}, ABSTRACT = {We present a generic framework on a set of surfaces $\calS$ in $\R^3$ that provides their geometric and topological analysis in order to support various algorithms and applications in computational geometry. Our implementation follows the generic programming paradigm, i.e., to support a certain family of surfaces, we require a small set of types and some basic operations on them, all collected in a model of the newly presented {\sc SurfaceTraits\_3} concept. The framework obtains geometric and topological information on a non-empty set of surfaces in two steps. First, important $0$- and $1$-dimensional features are projected onto the $xy$-plane, obtaining an arrangement $\calA_\calS$ with certain properties. Second, for each of its components, a sample point is lifted back to $\R^3$ while detecting intersections with the given surfaces. This idea is similar to Collins' cylindrical algebraic decomposition (cad). In contrast, we reduce the number of liftings using \cgal's Arrangement\_2 package as a basic tool. Properly instantiated, the framework provides main functionality required to support the computation of a Piano Mover's instance. On the other hand, the complexity of the output is high, and thus, we particularly regard the framework as key ingredient for querying information on and constructing geometric objects from a small set of surfaces. Examples are meshing of single surfaces, the computation of space-curves defined by two surfaces, to compute lower envelopes of surfaces, or as a basic step to compute an efficient representation of a three-dimensional arrangement. We also inspirit the framework in two steps. First, we show that the well-known family of algebraic surfaces fulfils the framework's requirements. As robust implementations on these surfaces are lacking these days, we consider the framework to be an important step to fill this gap. Second, we instantiate the framework by a fully-fledged model for special algebraic surfaces, namely quadrics. This instantiation already supports main tasks demanded from rotational robot motion planning~\cite{Latom1993}. How to provide a model for algebraic surfaces of arbitrary degree, is partly discussed in~\cite{bks-exact-08}.}, } @ARTICLE{bs-agffgtaas-cagd-09, AUTHOR = {Berberich, Eric and Sagraloff, Michael}, JOURNAL = {Computer Aided Geometric Design (CAGD)}, TITLE = {A Generic and Flexible Framework for the Geometrical and Topological Analysis of (Algebraic) Surfaces}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {6}, PUBLISHER = {Elsevier}, MONTH = {August}, VOLUME = {26}, ISBN = {0167-8396}, DOI = {10.1016/j.cagd.2009.03.006}, YEAR = {2009}, PAGES = {627--647}, ABSTRACT = {We present a generic framework on a set of surfaces S in R^3 that provides their geometric and topological analysis in order to support various algorithms and applications in computational geometry. Our implementation follows the generic programming paradigm, that is, to support a certain family of surfaces, we require a small set of types and some basic operations on them, all collected in a model of the newly presented SurfaceTraits_3 concept. The framework obtains geometric and topological information on a non-empty set of surfaces in two steps. First, important 0- and 1-dimensional features are projected onto the xy-plane, obtaining an arrangement A"S with certain properties. Second, for each of its components, a sample point is lifted back to R^3 while detecting intersections with the given surfaces. For the projection we rely on Cgal's Arrangement_2 package as basic tool. Anyhow, the complexity of the output is high, and thus, we particularly regard the framework as key ingredient for querying information on and constructing geometric objects from a small set of surfaces. Examples are meshing of single surfaces, the computation of space-curves defined by two surfaces, to compute lower envelopes of surfaces, or as a basic step to compute an efficient representation of a three-dimensional arrangement. We show that the well-known family of (semi-)algebraic surfaces fulfills the framework's requirements. As robust implementations on these surfaces are lacking these days, we consider the framework to be an important step to fill this gap. In particular, we instantiate the framework by a fully-fledged model for special algebraic surfaces, namely quadrics. This instantiation already supports main tasks demanded from rotational robot motion planning, for example, as expected to compute a Piano Mover's instance.}, } @INPROCEEDINGS{BS2004, AUTHOR = {Baswana, Surender and Sen, Sandeep}, TITLE = {Approximate distance oracle for unweighted graphs in Expected O(n²) time}, BOOKTITLE = {Proceedings of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-04)}, PADDRESS = {New York, USA}, ADDRESS = {New Orleans, USA}, PUBLISHER = {ACM}, ISBN = {0-89871-XXX-X}, YEAR = {2004}, PAGES = {271--280}, ABSTRACT = {Let $G=(V,E)$ be an undirected graph on $n$ vertices, and let $\delta(u,v)$ denote the distance in $G$ between two vertices $u$ and $v$. Thorup and Zwick showed that for any +ve integer $t$, the graph $G$ can be preprocessed to build a data-structure that can efficiently report $t$-approximate distance between any pair of vertices. That is, for any $u,v\in V$, the distance reported $\hat{\delta}(u,v)$ satisfies \[ \delta(u,v) \le \hat{\delta}(u,v) \le t \delta(u,v) \] The remarkable feature of this data-structure is that, for $t>2$, it occupies sub-quadratic space, i.e., it does not store all-pairs distances information explicitly, and still can answer any $t$-approximate distance query in constant time. They named the data-structure "oracle" because of this feature. Furthermore, the tradeoff between stretch $t$ and the size of the data-structure is essentially optimal. In this paper we show that we can actually construct approximate distance oracles in expected $O(n^2)$ time if the graph is unweighted. One of the new ideas used in the improved algorithm also leads to the first expected linear time algorithm for computing an optimal size $(2,1)$-spanner of an unweighted graph. A $(2,1)$-spanner of a graph $G=(V,E)$ is a subgraph $G=(V,E_S), E_S\subset E$, such that for any two vertices $u$ and $v$ in the graph, their distance in the subgraph is at most $2\delta(u,v)+1$.}, } @MASTERSTHESIS{Buchheit1999, AUTHOR = {Buchheit, Thomas}, TITLE = {{Oberfl{\"a}chenrekonstruktion mithilfe von Voronoi-Diagrammen}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {December}, YEAR = {1999}, } @INPROCEEDINGS{Burkhardt1999/1, AUTHOR = {Burkhardt, Stefan and Crauser, Andreas and Ferragina, Paolo and Lenhof, Hans-Peter and Rivals, Eric and Vingron, Martin}, EDITOR = {Istrail, Sorin and Pevzner, Pavel and Waterman, Michael}, TITLE = {q-gram Based Database Searching Using a Suffix Array (QUASAR)}, BOOKTITLE = {Proceedings of the 3rd Annual International Conference on Computational Molecular Biology (RECOMB-99)}, ORGANIZATION = {Association of Computing Machinery (ACM)}, PADDRESS = {New York, USA}, ADDRESS = {Lyon, France}, PUBLISHER = {ACM}, MONTH = {April}, ISBN = {1-58113-069-4}, YEAR = {1999}, PAGES = {77--83}, ABSTRACT = { With the increasing amount of DNA sequence information deposited in our databases searching for similarity to a query sequence has become a basic operation in molecular biology. But even todays fast algorithms reach their limits when applied to all-versus-all comparisons of large databases. Here we present a new data base searching algorithm dubbed QUASAR (Q-gram Alignment based on Suffix ARrays) which was designed to quickly detect sequences with strong similarity to the query in a context where many searches are conducted on one database. Our algorithm applies a modification of $q$-tuple filtering implemented on top of a suffix array. Two versions were developed, one for a RAM resident suffix array and one for access to the suffix array on disk. We compared our implementation with BLAST and found that our approach is an order of magnitude faster. It is, however, restricted to the search for strongly similar DNA sequences as is typically required, e.g., in the context of clustering expressed sequence tags (ESTs).}, } @INPROCEEDINGS{Burkhardt2001, AUTHOR = {Burkhardt, Stefan and K{\"a}rkk{\"a}inen, Juha}, EDITOR = {Amir, Amihood and Landau, Gadi}, TITLE = {Better Filtering with Gapped q-Grams}, BOOKTITLE = {Proceedings of the 12th Annual Symposium on Combinatorial Pattern Matching}, PADDRESS = {Berlin, Germany}, ADDRESS = {Jerusalem, Israel}, PUBLISHER = {Springer}, MONTH = {July}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {2089}, ISBN = {3-540-42271-4}, YEAR = {2001}, PAGES = {73--85}, ABSTRACT = {The q-gram filter is a popular filtering method for approximate string matching. It compares substrings of length q (the q-grams) in the pattern and the text to identify the text areas that might contain a match. A generalization of the method is to use gapped q-grams, subsets of q characters in some fixed non-contiguous shape, instead of contiguous substrings. Although mentioned a few times in the literature, this generalization has never been studied in any depth. In ths paper, we report the first results from a study on gapped q-grams. We show that gapped q-grams can provide orders of magnitude faster and/or more efficient filtering than contiguous q-grams. The performance, however, depends on the shape of the q-grams. The best shaoes are rare and often posess no apparen regularity. We show how to recognize good shapes and demonstrate with experiments their advantage over both contiguous and average shapes. We concentrate here on the k mismatches problem, but also outline an approach for extending the results to the more common k differences problem.}, } @INPROCEEDINGS{Burkhardt2002, AUTHOR = {Burkhardt, Stefan and K{\"a}rkk{\"a}inen, Juha}, EDITOR = {Apostolico, Alberto and Takeda, Masayuki}, TITLE = {One-Gapped q-Gram Filters for {L}evenshtein Distance}, BOOKTITLE = {Combinatorial Pattern Matching : 13th Annual Symposium, CPM 2002}, PADDRESS = {Berlin, Germany}, ADDRESS = {Fukuoka, Japan}, PUBLISHER = {Springer}, MONTH = {July}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {2373}, ISBN = {3-540-43862-9}, YEAR = {2002}, PAGES = {225--234}, ABSTRACT = {We have recently shown that $q$-gram filters based on gapped $q$-grams instead of the usual contiguous $q$-grams can provide orders of magnitude faster and/or more efficient filtering for the Hamming distance. In this paper, we extend the results for the Levenshtein distance, which is more problematic for gapped $q$-grams because an insertion or deletion in a gap affects a $q$-gram while a replacement does not. To keep this effect under control, we concentrate on gapped $q$-grams with just one gap. We demostrate with experiments that the resulting filters provide a significant improvement over the contiguous $q$-gram filters. We also develop new techniques for dealing with complex $q$-gram filters.}, } @INPROCEEDINGS{Burkhardt2003, AUTHOR = {Burkhardt, Stefan and K{\"a}rkk{\"a}inen, Juha}, EDITOR = {Baeza-Yates, R. and Ch{\'a}vez, E. and Crochemore, M.}, TITLE = {Fast Lightweight Suffix Array Construction and Checking}, BOOKTITLE = {Combinatorial Pattern Matching: 14th Annual Symposium, CPM 2003}, PADDRESS = {Heidelberg, Germany}, ADDRESS = {Morelia, Michoac{\'a}n, Mexico}, PUBLISHER = {Springer}, MONTH = {June}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {2676}, ISBN = {0302-9743}, YEAR = {2003}, PAGES = {55--69}, ABSTRACT = {We describe an algorithm that, for any $v\in[2,n]$, constructs the suffix array of a string of length $n$ in $\Oh{vn + n \log n}$ time using $\Oh{v+n/\sqrt{v}}$ space in addition to the input (the string) and the output (the suffix array). By setting $v=\log n$, we obtain an $\Oh{n \log n}$ time algorithm using $\Oh{n/\sqrt{\log n}}$ extra space. This solves the open problem stated by Manzini and Ferragina [ESA\;'02] of whether there exists a lightweight (sublinear extra space) $\Oh{n \log n}$ time algorithm. The key idea of the algorithm is to first sort a sample of suffixes chosen using mathematical constructs called difference covers. The algorithm is not only lightweight but also fast in practice as demonstrated by experiments. Additionally, we describe fast and lightweight suffix array checkers, i.e., algorithms that check the correctness of a suffix array.}, } @PHDTHESIS{BurkhardtDiss02, AUTHOR = {Burkhardt, Stefan}, TITLE = {Filter Algorithms for Approximate String Matching}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Doctoral dissertation}, MONTH = {December}, YEAR = {2002}, } @ARTICLE{BurkhardtKarkkainen2003, AUTHOR = {Burkhardt, Stefan and K{\"a}rkk{\"a}inen, Juha}, JOURNAL = {Fundamenta Informaticae}, TITLE = {Better Filtering with Gapped q-Grams}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {1-2}, PUBLISHER = {IOS}, VOLUME = {56}, ISBN = {0169-2968}, YEAR = {2003}, PAGES = {51--70}, ABSTRACT = {A popular and well-studied class of filters for approximate string matching compares substrings of length $q$, \emph{the $q$-grams}, in the pattern and the text to identify text areas that contain potential matches. A generalization of the method that uses {\em gapped} $q$-grams instead of contiguous substrings is mentioned a few times in literature but has never been analyzed in any depth. In this paper, we report the first results of a study on gapped $q$-grams. We show that gapped $q$-grams can provide orders of magnitude faster and/or more efficient filtering than contiguous $q$-grams. To achieve these results the arrangement of the gaps in the $q$-gram and a filter parameter called \emph{threshold} have to be optimized. Both of these tasks are nontrivial combinatorial optimization problems for which we present efficient solutions. We concentrate on the $k$~mismatches problem, i.e, approximate string matching with the Hamming distance.}, } @PHDTHESIS{Burnikel-Diss96, AUTHOR = {Burnikel, Christoph}, TITLE = {Exact Computation of Voronoi Diagrams and Line Segment Intersections}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Doctoral dissertation}, YEAR = {1996}, } @INPROCEEDINGS{Burnikel-et-al95, AUTHOR = {Burnikel, Christoph and K{\"o}nemann, Jochen and Mehlhorn, Kurt and N{\"a}her, Stefan and Schirra, Stefan and Uhrig, Christian}, TITLE = {Exact Geometric Computation in LEDA}, BOOKTITLE = {11th ACM Symposium on Computational Geometry (SCG95)}, PADDRESS = {New York, USA}, ADDRESS = {Vancouver, British Columbia, Canada}, PUBLISHER = {ACM}, ISBN = {0-89791-724-3}, DOI = {10.1145/220279.220330}, YEAR = {1995}, PAGES = {C18--C19}, } @INPROCEEDINGS{Burnikel-et-al97, AUTHOR = {Mehlhorn, Kurt and Burnikel, Christoph and Fleischer, Rudolf and Schirra, Stefan}, TITLE = {A Strong and Easily Computable Separation Bound for Arithmetic Expressions Involving Square Roots}, BOOKTITLE = {Proceedings of the 8th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-97)}, PADDRESS = {New York, USA}, ADDRESS = {New Orleans, USA}, PUBLISHER = {ACM / SIAM}, YEAR = {1997}, PAGES = {702--709}, } @ARTICLE{Burnikel2009, AUTHOR = {Burnikel, Christoph and Funke, Stefan and Mehlhorn, Kurt and Schirra, Stefan and Schmitt, Susanne}, JOURNAL = {Algorithmica}, TITLE = {A Separation Bound for Real Algebraic Expressions}, ADDRESS = {New York, NY}, NUMBER = {1}, PUBLISHER = {Springer}, VOLUME = {55}, ISBN = {0178-4617}, DOI = {10.1007/s00453-007-9132-4}, YEAR = {2009}, PAGES = {14--28}, } @ARTICLE{BurnikelFunkeSeel2001, AUTHOR = {Burnikel, Christoph and Funke, Stefan and Seel, Michael}, JOURNAL = {International Journal of Computational Geometry \& Applications}, TITLE = {Exact geometric computation using Cascading}, ADDRESS = {Singapore}, NUMBER = {3}, PUBLISHER = {World Scientific}, VOLUME = {11}, ISBN = {0218-1959}, YEAR = {2001}, PAGES = {245--266}, } @MASTERSTHESIS{BuschBach2011, AUTHOR = {Busch, Philip Johannes}, TITLE = {Analysis of the KIT email graph, with an application of randomized rumour spreading protocols}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Bachelor thesis}, ADDRESS = {Saarbr{\"u}cken}, PUBLISHER = {Universit{\"a}t des Saarlandes}, MONTH = {November}, YEAR = {2011}, PAGES = {57}, } @MASTERSTHESIS{Butz98, AUTHOR = {Butz, Bernd}, TITLE = {{Robuste Implementierung eines Algorithmus zur Berechnung eines Voronoi-Diagramms f{\"u}r Polygone}}, SCHOOL = {Universitaet des Saarlandes}, TYPE = {Master's thesis}, MONTH = {December}, YEAR = {1997}, } @ARTICLE{CameronJohannsenPrellbergSchweitzer2008, AUTHOR = {Cameron, Peter and Johannsen, Daniel and Prellberg, Thomas and Schweitzer, Pascal}, JOURNAL = {Electronic Journal of Combinatorics}, TITLE = {Counting Defective Parking Functions}, NUMBER = {1}, MONTH = {July}, VOLUME = {15}, YEAR = {2008}, PAGES = {R92}, ABSTRACT = {Suppose that $m$ drivers each choose a preferred parking space in a linear car park with $n$ spaces. Each driver goes to the chosen space and parks there if it is free, and otherwise takes the first available space with a larger number (if any). If all drivers park successfully, the sequence of choices is called a parking function. In general, if $k$ drivers fail to park, we have a \emph{defective parking function} of \emph{defect} $k$. Let $\cp(n,m,k)$ be the number of such functions. In this paper, we establish a recurrence relation for the numbers $\cp(n,m,k)$, and express this as an equation for a three-variable generating function. We solve this equation using the kernel method, and extract the coefficients explicitly: it turns out that the cumulative totals are partial sums in Abel's binomial identity. Finally, we compute the asymptotics of $\cp(n,m,k)$. In particular, for the case $m=n$, if choices are made independently at random, the limiting distribution of the defect (the number of drivers who fail to park), scaled by the square root of $n$, is the Rayleigh distribution. On the other hand, in the case $m=\omega(n)$, the probability that all spaces are occupied tends asymptotically to one.}, } @INPROCEEDINGS{Canzar2006, AUTHOR = {Canzar, Stefan and Remy, Jan}, TITLE = {{Shape Distributions and Protein Similarity}}, BOOKTITLE = {GCB}, PADDRESS = {Bonn, Germany}, ADDRESS = {T{\"u}bingen, Germany}, PUBLISHER = {GI}, YEAR = {2006}, PAGES = {1--10}, } @INPROCEEDINGS{CaragiannisFishkin2007, AUTHOR = {Caragiannis, Ioannis and Fishkin, Aleksei V. and Kaklamanis, Christos and Papaioannou, Evi}, EDITOR = {Kratochv{\'i}l, Jan and D{\'i}az, Josep and Fiala , Ji{\v{r}}{\'i}}, TITLE = {Randomized on-line algorithms and lower bounds for computing large independent sets in disk graphs}, BOOKTITLE = {29th Symposium on Mathematical Foundations of Computer Science MFCS 2004}, PADDRESS = {Amsterdam, The Netherlands}, ADDRESS = {Prague, Czech Republic}, NUMBER = {2}, PUBLISHER = {Elsevier}, MONTH = {January}, SERIES = {Discrete Applied Mathematics}, VOLUME = {155}, DOI = {10.1016/j.dam.2006.04.036}, YEAR = {2007}, PAGES = {119--136}, ABSTRACT = {We study the on-line version of the maximum independent set problem, for the case of disk graphs which are graphs resulting from intersections of disks on the plane. In particular, we investigate whether randomization can be used to break known lower bounds for deterministic on-line independent set algorithms and present new upper and lower bounds. }, } @ARTICLE{Caragioannis2007, AUTHOR = {Caragiannis, Ioannis and Fishkin, Aleksei V. and Kaklamanis, Christos and Papaioannou, Evi}, JOURNAL = {Theoretical Computer Science}, TITLE = {A tight bound for online colouring of disk graphs}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {2/3}, PUBLISHER = {Elsevier}, MONTH = {October}, VOLUME = {384}, ISBN = {0304-3975}, DOI = {10.1016/j.tcs.2007.04.025}, YEAR = {2007}, PAGES = {152--160}, ABSTRACT = {We present an improved upper bound on the competitiveness of the online colouring algorithm First-Fit in disk graphs, which are graphs representing overlaps of disks on the plane. We also show that this bound is best possible for deterministic online colouring algorithms that do not use the disk representation of the input graph. We also present a related new lower bound for unit disk graphs }, } @MASTERSTHESIS{Caroli07Evaluation, AUTHOR = {Caroli, Manuel}, TITLE = {Evaluation of a Generic Method for Analyzing Controlled-Perturbation Algorithms}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {March}, YEAR = {2007}, } @INPROCEEDINGS{Cas-Koe:c:11:StacsEpit, AUTHOR = {Case, John and K{\"o}tzing, Timo}, EDITOR = {Schwentick, Thomas and D{\"u}rr, Christoph}, TITLE = {Measuring Learning Complexity with Criteria Epitomizers}, BOOKTITLE = {28th International Symposium on Theoretical Aspects of Computer Science (STACS 2011)}, PADDRESS = {Dagstuhl}, ADDRESS = {Dortmund, Germany}, PUBLISHER = {Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik}, SERIES = {Leibniz International Proceedings in Informatics (LIPIcs)}, VOLUME = {9}, ISBN = {978-3-939897-25-5}, DOI = {10.4230/LIPIcs.STACS.2011.320}, YEAR = {2011}, PAGES = {320--331}, ABSTRACT = {In prior papers, beginning with the seminal work by Freivalds et al. 1995, the notion of intrinsic complexity is used to analyze the learning complexity of sets of functions in a Gold-style learning setting. Herein are pointed out some weaknesses of this notion. Offered is an alternative based on epitomizing sets of functions -- sets, which are learnable under a given learning criterion, but not under other criteria which are not at least as powerful. To capture the idea of epitomizing sets, new reducibility notions are given based on robust learning (closure of learning under certain classes of operators). Various degrees of epitomizing sets are characterized as the sets complete with respect to corresponding reducibility notions! These characterizations also provide an easy method for showing sets to be epitomizers, and they are, then, employed to prove several sets to be epitomizing. Furthermore, a scheme is provided to generate easily very strong epitomizers for a multitude of learning criteria. These strong epitomizers are so-called self-learning sets, previously applied by Case \& Koetzing, 2010. These strong epitomizers can be generated and employed in a myriad of settings to witness the strict separation in learning power between the criteria so epitomized and other not as powerful criteria!}, } @ARTICLE{CaseKoetzing2012:DynMod, AUTHOR = {Case, John and K{\"o}tzing, Timo}, JOURNAL = {Information and Computation}, TITLE = {Learning secrets interactively. {D}ynamic modeling in inductive inference}, ADDRESS = {Amsterdam}, PUBLISHER = {Elsevier}, VOLUME = {220-221}, DOI = {10.1016/j.ic.2012.10.002}, YEAR = {2012}, PAGES = {60--73}, } @ARTICLE{CaseKoetzing2012:MemLim, AUTHOR = {Case, John and K{\"o}tzing, Timo}, JOURNAL = {Theoretical Computer Science}, TITLE = {Memory-limited {non-U-shaped} learning with solved open problems}, ADDRESS = {Amsterdam}, PUBLISHER = {Elsevier}, MONTH = {February}, VOLUME = {473}, ISBN = {0304-3975}, DOI = {10.1016/j.tcs.2012.10.010}, YEAR = {2013}, PAGES = {100--123}, } @ARTICLE{CaseKoetzing2012:PhilTrans, AUTHOR = {Case, John and K{\"o}tzing, Timo}, JOURNAL = {Philosophical Transaction of the Royal Society A}, TITLE = {Computability-theoretic learning complexity}, ADDRESS = {London}, NUMBER = {1971}, PUBLISHER = {Royal Society}, VOLUME = {370}, DOI = {10.1098/rsta.2011.0320}, YEAR = {2012}, PAGES = {3570--3596}, } @UNPUBLISHED{category_based_routing_2012, AUTHOR = {Bringmann, Karl and Mehlhorn, Kurt and Neumann, Adrian}, TITLE = {Remarks on Category-Based Routing in Social Networks}, MONTH = {August}, YEAR = {2012}, PAGES = {21}, } @INPROCEEDINGS{CCLPS2009, AUTHOR = {Christodoulou, George and Chung, Christine and Ligett, Katrina and Pyrga, Evangelia and van Stee, Rob}, EDITOR = {Bampis, Evripidis and Jansen, Klaus}, TITLE = {On the price of stability for undirected network design}, BOOKTITLE = {Approximation and Online Algorithms : 7th International Workshop, WAOA 2009}, PADDRESS = {Berlin}, ADDRESS = {Copenhagen, Denmark}, PUBLISHER = {Springer}, MONTH = {June}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5893}, ISBN = {9-783642-12449-5}, DOI = {10.1007/978-3-642-12450-1_8}, YEAR = {2010}, PAGES = {86--97}, ABSTRACT = {We continue the study of the effects of selfish behavior in the network design problem. We provide new bounds for the price of stability for network design with fair cost allocation for undirected graphs. We consider the most general case, for which the best known upper bound is the Harmonic number $H_n$, where $n$ is the number of agents, and the best previously known lower bound is $12/7\approx1.778$. We present a nontrivial lower bound of $42/23\approx1.8261$. Furthermore, we show that for two players, the price of stability is exactly $4/3$, while for three players it is at least $74/48\approx 1.542$ and at most $1.65$. These are the first improvements on the bound of $H_n$ for general networks. In particular, this demonstrates a separation between the price of stability on undirected graphs and that on directed graphs, Previously, such a gap was only known for the cases where all players have a shared source, and for weighted players.}, } @ARTICLE{CDGKS2009, AUTHOR = {Chan, T-H. Hubert and Dhamdhere, Kedar and Gupta, Anupam and Kleinberg, Jon and Slivkins, Aleksandrs}, JOURNAL = {SIAM Journal on Computing}, TITLE = {Metric Embeddings with Relaxed Guarantees}, ADDRESS = {Philadelphia, PA}, NUMBER = {6}, PUBLISHER = {SIAM}, MONTH = {March}, VOLUME = {38}, ISBN = {0097-5397}, DOI = {10.1137/060670511}, YEAR = {2009}, PAGES = {2303--2329}, } @INPROCEEDINGS{CDHMSW12, AUTHOR = {Chen, Xujin and Doerr, Benjamin and Hu, Xiaodong and Ma, Weidong and van Stee, Rob and Winzen, Carola}, EDITOR = {Goldberg, Paul W.}, TITLE = {The Price of Anarchy for Selfish Ring Routing is Two}, BOOKTITLE = {Internet and Network Economics : 8th International Workshop, WINE 2012}, PADDRESS = {Berlin}, ADDRESS = {Liverpool, UK}, PUBLISHER = {Springer}, MONTH = {December}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {7695}, ISBN = {978-3-642-35310-9}, DOI = {10.1007/978-3-642-35311-6_31}, YEAR = {2012}, PAGES = {420--433}, ABSTRACT = {We analyze the network congestion game with atomic players, asymmetric strategies, and the maximum latency among all players as social cost. This important social cost function is much less understood than the average latency. We show that the price of anarchy is at most two, when the network is a ring and the link latencies are linear. Our bound is tight. This is the first sharp bound for the maximum latency objective.}, } @MISC{CDoerrSP2006, AUTHOR = {Cooper, Joshua and Doerr, Benjamin and Spencer, Joel and Tardos, Gabor}, JOURNAL = {???}, TITLE = {Deterministic Random Walks on the Integers}, HOWPUBLISHED = {Internet}, YEAR = {2006}, PAGES = {1--27}, ABSTRACT = {Jim Propp's P-machine, also known as the "rotor router model" is a simple deterministic process that simulates a random walk on a graph. Instead of distributing chips to randomly chosen neighbors, it serves the neighbors in a fixed order. We investigate how well this process simulates a random walk. For the graph being the infinite path, we show that, independent of the starting configuration, at each time and on each vertex, the number of chips on this vertex deviates from the expected number of chips in the random walk model by at most a constant c_1, which is approximately 2.29. For intervals of length L, this improves to a difference of O(log L), for the L_2 average of a contiguous set of intervals even to O(sqrt{log L}). All these bounds are tight. }, } @ARTICLE{CDoerrST2007, AUTHOR = {Cooper, Joshua and Doerr, Benjamin and Spencer, Joel and Tardos, G{\'a}bor}, JOURNAL = {European Journal of Combinatorics}, TITLE = {Deterministic random walks on the integers}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {8}, PUBLISHER = {Elsevier}, VOLUME = {28}, ISBN = {0195-6698}, DOI = {10.1016/j.ejc.2007.04.018}, YEAR = {2007}, PAGES = {2072--2090}, ABSTRACT = {Jim Propp’s P-machine, also known as the ‘rotor router model’, is a simple deterministic process that simulates a random walk on a graph. Instead of distributing chips to randomly chosen neighbors, it serves the neighbors in a fixed order. We investigate how well this process simulates a random walk. For the graph being the infinite path, we show that, independent of the starting configuration, at each time and on each vertex, the number of chips on this vertex deviates from the expected number of chips in the random walk model by at most a constant c1, which is approximately 2.29. For intervals of length L, this improves to a difference of O(logL), for the L2 average of a contiguous set of intervals even to . All these bounds are tight. }, } @INPROCEEDINGS{celikikbast2009spire, AUTHOR = {Celikik, Marjan and Bast, Hannah}, EDITOR = {Karlgren, Jussi and Tarhio, Jorma and Hyyr{\"o}, Heikki}, TITLE = {Fast Single-Pass Construction of a Half-Inverted Index}, BOOKTITLE = {String processing and information retrieval : 16th International Symposium, SPIRE 2009}, ORGANIZATION = {Springer}, PADDRESS = {Berlin, Germany}, ADDRESS = {Saariselk{\"a}, Finland}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5721}, ISBN = {978-3-642-03783-2}, DOI = {10.1007/978-3-642-03784-9_19}, YEAR = {2009}, PAGES = {194--205}, } @UNPUBLISHED{Certifying3EdgeConnectivity2012, AUTHOR = {Mehlhorn, Kurt and Neumann, Adrian and Schmidt, Jens M.}, TITLE = {Certifying 3-Edge-Connectivity}, MONTH = {November}, YEAR = {2012}, NOTE = {Manuscript}, } @UNPUBLISHED{CertifyingAlgs, AUTHOR = {Mehlhorn, Kurt and Eigenwillig, Arno and Kaligosi, Kanela and Kratsch, Dieter and McConnell, Ross and Meyer, Ulrich and Spinrad, Jeremy P.}, TITLE = {Certifying Algorithms (draft)}, YEAR = {2005}, NOTE = {draft}, } @INPROCEEDINGS{CFGKPR2003, AUTHOR = {Cheng, Siu-Wing and Funke, Stefan and Golin, Mordecai J. and Kumar, Piyush and Poon, Sheung-Hung and Ramos, Edgar A.}, TITLE = {Curve Reconstruction from Noisy Samples}, BOOKTITLE = {Proceedings of the 19th Annual Symposium on Computational Geometry (SCG-03)}, ORGANIZATION = {Association of Computing Machinery (ACM)}, PADDRESS = {New York, USA}, ADDRESS = {San Diego, USA}, PUBLISHER = {ACM}, YEAR = {2003}, PAGES = {420--429}, } @INPROCEEDINGS{CFMMR1999, AUTHOR = {Crauser, Andreas and Ferragina, Paolo and Mehlhorn, Kurt and Meyer, Ulrich and Ramos, Edgar A.}, EDITOR = {Abello, James M. and Vitter, Jeffrey Scott}, TITLE = {I/O-optimal computation of segment intersections}, BOOKTITLE = {Proceedings of the DIMACS Workshop on External Algorithms and Visualization}, ORGANIZATION = {DIMACS}, PADDRESS = {Providence, USA}, ADDRESS = {New Brunswick, New Jersey}, PUBLISHER = {AMS}, MONTH = {October}, SERIES = {DIMACS Series in Discrete Mathematics and Theoretical Computer Science}, VOLUME = {50}, ISBN = {0-8218-1184-3}, YEAR = {1999}, PAGES = {131--138}, } @ARTICLE{CFMMR2001, AUTHOR = {Crauser, Andreas and Ferragina, Paolo and Mehlhorn, Kurt and Meyer, Ulrich and Ramos, Edgar A.}, JOURNAL = {International Journal of Computational Geometry \& Applications}, TITLE = {Randomized External-Memory Algorithms for Line Segment Intersection and Other Geometric Problems}, ADDRESS = {Singapore}, NUMBER = {3}, PUBLISHER = {World Scientific}, MONTH = {June}, VOLUME = {11}, ISBN = {0218-1959}, YEAR = {2001}, PAGES = {305--337}, NOTE = {Special issue edited by J Hershberger: Selected Papers from the Fourteenth ACM Symposium on Computational Geometry, Minneapolis, MN, June, 1998}, } @INPROCEEDINGS{CFMMR98, AUTHOR = {Crauser, Andreas and Ferragina, Paolo and Mehlhorn, Kurt and Meyer, Ulrich and Ramos, Edgar A.}, TITLE = {Randomized External-Memory Algorithms for some Geometric Problems}, BOOKTITLE = {Proceedings of the 14th International Annual ACM Symposium on Computational Geometry (SCG-98)}, ORGANIZATION = {ACM}, PADDRESS = {New York, USA}, ADDRESS = {Minneapolis, Minnesota}, PUBLISHER = {ACM}, ISBN = {0-89791-973-4}, YEAR = {1998}, PAGES = {259--268}, } @UNKNOWN{cgal-manual-2001, AUTHOR = {B{\"a}sken, Matthias and Br{\"o}nnimann, Herv{\'e} and Frank, Da and Devillers, Olivier and Ester, Ezra and Fabri, Andreas and Flato, Eyal and G{\"a}rtner, Bernd and Giezeman, Geert-Jan and Halperin, Dan and Hanniel, Iddo and Har-Peled, Sariel and Herrmann, Thomas and Hert, Susan and Hirsch, Shai and Hoffmann, Michael and Kettner, Lutz and Nechushtan, Oren and Neyer, Gabriele and Pasechnik, Dmitrii and Pion, Sylvain and Schirra, Stefan and Sch{\"o}nherr, Sven and Seel, Michael and Teillaud, Monique and Veltkamp, Remco and Wein, Ron and Wesselink, Wieger and Yvinec, Mariette}, TITLE = {CGAL Reference and User Manuals}, ADDRESS = {-}, PUBLISHER = {CGAL Consortium}, EDITION = {2.3}, MONTH = {August}, YEAR = {2001}, } @INPROCEEDINGS{CGP2007, AUTHOR = {Christodoulou, George and Gourves, Laurent and Pascual, Fanny}, EDITOR = {Lin, Guohui}, TITLE = {Scheduling Selfish Tasks: {About} the Performance of Truthful Algorithms}, BOOKTITLE = {Computing and Combinatorics : 13th Annual International Conference, COCOON 2007}, PADDRESS = {Berlin, Germany}, ADDRESS = {Banff, Canada}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4598}, ISBN = {3-540-73544-1}, DOI = {0.1007/978-3-540-73545-8_20}, YEAR = {2007}, PAGES = {187--197}, } @INPROCEEDINGS{Chan2008, AUTHOR = {Bansal, Nikhil and Chan, Ho-Leung}, EDITOR = {Mathieu, Claire}, TITLE = {Weighted flow time does not admit O(1)-competitive algorithms}, BOOKTITLE = {Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2009)}, ORGANIZATION = {ACM-SIAM}, PADDRESS = {New York, NY}, ADDRESS = {New York, USA}, PUBLISHER = {ACM}, YEAR = {2009}, PAGES = {1238--1244}, ABSTRACT = {We consider the classic online scheduling problem of minimizing the total weighted flow time on a single machine with preemptions. Here, each job $j$ has an arbitrary arrival time $r_j$, weight $w_j$ and size $p_j$, and given a schedule its flow time is defined as the duration of time since its arrival until it completes its service requirement. The first non-trivial algorithms with poly-logarithmic competitive ratio for this problem were obtained relatively recently, and it was widely believed that the problem admits a constant factor competitive algorithm. In this paper, we show an $\omega(1)$ lower bound on the competitive ratio of any deterministic online algorithm. Our result is based on a gap amplification technique for online algorithms. Starting with a trivial lower bound of 1, we give a procedure to improve the lower bound sequentially, while ensuring at each step that the size of the instance increases relatively modestly. }, } @INPROCEEDINGS{Chan2008b, AUTHOR = {Bansal, Nikhil and Chan, Ho-Leung and Pruhs, Kirk}, EDITOR = {Mathieu, Claire}, TITLE = {Speed Scaling with an Arbitrary Power Function}, BOOKTITLE = {Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2009)}, ORGANIZATION = {ACM-SIAM}, PADDRESS = {New York, NY}, ADDRESS = {New York, USA}, PUBLISHER = {ACM}, YEAR = {2009}, PAGES = {693--701}, ABSTRACT = {All of the theoretical speed scaling research to date has assumed that the power function, which expresses the power consumption $P$ as a function of the processor speed $s$, is of the form $P=s^\alpha$, where $\alpha > 1$ is some constant. Motivated in part by technological advances, we initiate a study of speed scaling with arbitrary power functions. We consider the problem of minimizing the total flow plus energy. Our main result is a $(3+\epsilon)$-competitive algorithm for this problem, that holds for essentially any power function. We also give a $(2+\epsilon)$-competitive algorithm for the objective of fractional weighted flow plus energy. Even for power functions of the form $s^\alpha$, it was not previously known how to obtain competitiveness independent of $\alpha$ for these problems. We also introduce a model of allowable speeds that generalizes all known models in the literature.}, } @INPROCEEDINGS{Chan2008c, AUTHOR = {Chan, Ho-Leung and Edmonds, Jeff and Lam, Tak-Wah and Lee, Lap-Kei and Marchetti-Spaccamela, Alberto and Pruhs, Kirk}, EDITOR = {Albers, Susanne and Marion, Jean-Yves}, TITLE = {Nonclairvoyant Speed Scaling for Flow and Energy}, BOOKTITLE = {Proceedings of the 26th International Symposium on Theoretical Aspects of Computer Science (STACS)}, PADDRESS = {Dagstuhl, Germany}, ADDRESS = {Freiburg, Germany}, PUBLISHER = {LZI}, SERIES = {Leibniz International Proceedings in Informatics}, VOLUME = {3}, ISBN = {978-3-939897-09-5}, DOI = {10.4230/LIPIcs.STACS.2009.1815}, YEAR = {2009}, PAGES = {255--264}, ABSTRACT = {We study online nonclairvoyant speed scaling to minimize total flow time plus energy. We first consider the traditional model where the power function is $P(s)=s^\alpha$. We give a nonclairvoyant algorithm that is shown to be $O( \alpha^3 )$-competitive. We then show an $\Omega( \alpha^{1/3-\epsilon} )$ lower bound on the competitive ratio of any nonclairvoyant algorithm. We also show that there are power functions for which no nonclairvoyant algorithm can be $O(1)$-competitive.}, } @ARTICLE{Chan2011, AUTHOR = {Bansal, Nikhil and Chan, Ho-Leung and Pruhs, KIrk}, JOURNAL = {Algorithmica}, TITLE = {Competitive Algorithms for Due Date Schedulin}, ADDRESS = {Berlin}, NUMBER = {4}, PUBLISHER = {Springer}, VOLUME = {59}, ISBN = {0178-4617}, DOI = {10.1007/s00453-009-9321-4}, YEAR = {2011}, PAGES = {569--582}, } @TECHREPORT{ChandranSivadasan2004, AUTHOR = {Chandran, L. Sunil and Sivadasan, Naveen}, TITLE = {On the Hadwiger's Conjecture for Graph Products}, INSTITUTION = {Max-Planck-Institut f{\"u}r Informatik}, TYPE = {Research Report}, ADDRESS = {Stuhlsatzenhausweg 85, 66123 Saarbr{\"u}cken, Germany}, NUMBER = {MPI-I-2004-1-006}, PUBLISHER = {AG 1 - Mehlhorn}, ISBN = {0946-011X}, YEAR = {2004}, PAGES = {12}, ABSTRACT = {The Hadwiger number m(G) of a graph G is the largest integer h such that the complete graph on h nodes is a minor of G. Equivalently, it is the largest integer such that any graph on at most m(G) nodes is a minor of G. The Hadwiger's conjecture states that for any graph G, m(G) >= chi(G), where chi(G) is the chromatic number of G. It is well-known that for any connected undirected graph G, there exists a unique prime factorization with respect to Cartesian graph products. If the unique prime factorization of G is given as G1 X G2 X ... X Gk, where each Gi is prime, then we say that the product dimension of G is k. Such a factorization can be computed efficiently. In this paper, we study the Hadwiger's conjecture for graphs in terms of their prime factorization. We show that the Hadwiger's conjecture is true for a graph G if the product dimension of G is at least 2log(chi(G)) + 3. In fact, it is enough for G to have a connected graph M as a minor whose product dimension is at least 2log(chi(G)) + 3, for G to satisfy the Hadwiger's conjecture. We show also that if a graph G is isomorphic to F^d for some F, then mr(G) >= chi(G)^{\lfloor \frac{d-1}{2} \rfloor}, and thus G satisfies the Hadwiger's conjecture when d >= 3. For sufficiently large d, our lower bound is exponentially higher than what is implied by the Hadwiger's conjecture. Our approach also yields (almost) sharp lower bounds for the Hadwiger number of well-known graph products like d--dimensional hypercubes, Hamming graphs and the d--dimensional grids. In particular, we show that for a d--dimensional hypercube Hd, $2^{\lfloor\frac{d-1}{2}\rfloor} <= m(Hd) <= 2^{\frac{d}{2}}\sqrt{d} +1$. We also derive similar bounds for G^d for almost all G with n nodes and at least nlog(n) edges.}, } @INPROCEEDINGS{Chang2006, AUTHOR = {Chang, Kevin L. and Kannan, Ravi}, TITLE = {The Space Complexity of Pass-Efficient Algorithms for Clustering}, BOOKTITLE = {Proceedings of the Seventeenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA'06}, PADDRESS = {New York, USA}, ADDRESS = {Miami, USA}, PUBLISHER = {ACM / Siam}, MONTH = {January}, ISBN = {0-89871-605-5}, YEAR = {2006}, PAGES = {1157--1166}, NOTE = {This is the conference version. Full version under submission to journal.}, ABSTRACT = {We present multiple pass streaming algorithms for a basic clustering problem for massive data sets. If our algorithm is allotted 2l passes, it will produce an approximation with error at most $\varepsilon$ using Õ(k3/$\varepsilon$2/l) bits of memory, the most critical resource for streaming computation. We demonstrate that this tradeoff between passes and memory allotted is intrinsic to the problem and model of computation by proving lower bounds on the memory requirements of any l pass randomized algorithm that are nearly matched by our upper bounds. To the best of our knowledge, this is the first time nearly matching bounds have been proved for such an exponential tradeoff for randomized computation.In this problem, we are given a set of n points drawn randomly according to a mixture of k uniform distributions and wish to approximate the density function of the mixture. The points are placed in a datastream (possibly in adversarial order), which may only be read sequentially by the algorithm. We argue that this models, among others, the datastream produced by a national census of the incomes of all citizens.}, } @INPROCEEDINGS{Chang2007, AUTHOR = {Chang, Kevin}, TITLE = {Multiple pass streaming algorithms for learning mixtures of distributions in $R^d$}, BOOKTITLE = {Algorithmic Learning Theory, 18th International Conference, Proceedings}, TYPE = {Extended Abstract}, PADDRESS = {Berlin}, ADDRESS = {Sendai, Japan}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Artifical intelligence}, VOLUME = {4754}, YEAR = {2007}, PAGES = {16}, NOTE = {This is an extended abstract. Full version has been submitted to a journal. }, ABSTRACT = {We present a multiple pass streaming algorithm for learning the density function of a mixture of $k$ uniform distributions over rectangles (cells) in $\reals^d$, for any $d>0$. Our learning model is: samples drawn according to the mixture are placed in {\it arbitrary order} in a data stream that may only be accessed sequentially by an algorithm with a very limited random access memory space. Our algorithm makes $2\ell+1$ passes, for any $\ell>0$, and requires memory at most $\tilde O(\epsilon^{-2/\ell}k^2d^4+(2k)^d)$. This exhibits a strong memory-space tradeoff: a few more passes significantly lowers its memory requirements, thus trading one of the two most important resources in streaming computation for the other. Chang and Kannan \cite{chang06} first considered this problem for $d=1, 2$. Our learning algorithm is especially appropriate for situations where massive data sets of samples are available, but practical computation with such large inputs requires very restricted models of computation.}, } @INPROCEEDINGS{Chang2008a, AUTHOR = {Chang, Kevin and Johnson, Aaron}, TITLE = {Online and offline selling in limit order markets}, BOOKTITLE = {4th International Workshop on Internet and Network Economics (WINE 2008)}, PADDRESS = {Berlin}, ADDRESS = {Shanghai, China}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5385}, YEAR = {2008}, PAGES = {41--52}, ABSTRACT = {Completely automated electronic securities exchanges and algorithms for trading in these exchanges have become very important for modern finance. In \cite{kkmo04}, Kakade \etal introduced the limit order market model, which is a prevalent paradigm in electronic markets. In this paper, we consider both online and offline algorithms for selling securities in limit order markets in order to maximize the total revenue realized from the sale. We first prove that the standard reservation price algorithm has an optimal competitive ratio for this problem. Since this is not constant, we turn to offline optimization in order to compute improved solutions. We show that the offline optimization problem is \textbf{NP}-hard, even for very restricted instances, by reducing from \knapsack. We complement the hardness result by presenting an approximation scheme that runs in polynomial time for a wide class of instances.}, } @ARTICLE{ChanGupta2009, AUTHOR = {Chan, T.-H. Hubert and Gupta, Anupam}, JOURNAL = {Discrete and Computational Geometry}, TITLE = {Small Hop-diameter Sparse Spanners for Doubling Metrics}, ADDRESS = {New York, NY}, NUMBER = {1}, PUBLISHER = {Springer}, MONTH = {January}, VOLUME = {41}, ISBN = {0179-5376}, DOI = {10.1007/s00454-008-9115-5}, YEAR = {2009}, PAGES = {28--44}, ABSTRACT = { Given a metric $M = (V,d)$, a graph $G = (V,E)$ is a $t$-spanner for $M$ if every pair of nodes in $V$ has a ``short'' path (i.e., of length at most $t$ times their actual distance) between them in the spanner. Furthermore, this spanner has a \emph{hop diameter} bounded by $D$ if every pair of nodes has such a short path that also uses at most $D$ edges. We consider the problem of constructing sparse $(1+\eps)$-spanners with small hop diameter for metrics of low doubling dimension. In this paper, we show that given any metric with constant doubling dimension $k$, and any $0 < \eps < 1$, one can find $(1 + \eps)$-spanner for the metric with nearly linear number of edges (i.e., only $O(n \log^* n + n\eps^{-O(k)})$ edges) and \emph{constant} hop diameter; we can also obtain a $(1 + \eps)$-spanner with linear number of edges (i.e., only $n\eps^{-O(k)}$ edges) that achieves a hop diameter that grows like the functional inverse of Ackermann's function. Moreover, we prove that such tradeoffs between the number of edges and the hop diameter are asymptotically optimal.}, } @INPROCEEDINGS{ChanSPAA2009, AUTHOR = {Chan, Ho-Leung and Edmonds, Jeff and Pruhs, Kirk}, TITLE = {Speed Scaling of Processes with Arbitrary Speedup Curves on a Multiprocessor}, BOOKTITLE = {SPAA'09 : proceedings of the Twenty-First Annual Symposium on Parallelism in Algorithms and Architectures}, PADDRESS = {New York, NY}, ADDRESS = {Calgary, Canada}, PUBLISHER = {ACM}, ISBN = {978-1-60558-606-9}, DOI = {10.1145/1583991.1583994}, YEAR = {2009}, PAGES = {1--10}, } @ARTICLE{Chaudhuri-Radhakrishnan97, AUTHOR = {Chaudhuri, Shiva and Radhakrishnan, Jaikumar}, JOURNAL = {Information and Computation}, TITLE = {The Complexity of Parallel Prefix Problems on Small Domains}, NUMBER = {1}, VOLUME = {138}, YEAR = {1997}, PAGES = {1--22}, } @ARTICLE{Chaudhuri-Zaroliagis-2-97, AUTHOR = {Chaudhuri, Shiva and Zaroliagis, Christos}, JOURNAL = {Theoretical Computer Science}, TITLE = {Shortest paths in digraphs of small treewidth. Part II: Optimal parallel algorithms}, NUMBER = {2}, VOLUME = {203}, ISBN = {0304-3975}, YEAR = {1998}, PAGES = {205--223}, NOTE = {Special issue on ESA'95}, ABSTRACT = {We consider the problem of preprocessing an $n$-vertex digraph with real edge weights so that subsequent queries for the shortest path or distance between any two vertices can be efficiently answered. We give parallel algorithms for the EREW PRAM model of computation that depend on the {\em treewidth} of the input graph. When the treewidth is a constant, our algorithms can answer distance queries in $O(\alpha(n))$ time using a single processor, after a preprocessing of $O(\log^2n)$ time and $O(n)$ work, where $\alpha(n)$ is the inverse of Ackermann's function. The class of constant treewidth graphs contains outerplanar graphs and series-parallel graphs, among others. To the best of our knowledge, these are the first parallel algorithms which achieve these bounds for any class of graphs except trees. We also give a dynamic algorithm which, after a change in an edge weight, updates our data structures in $O(\log n)$ time using $O(n^\beta)$ work, for any constant $0 < \beta < 1$. Moreover, we give an algorithm of independent interest: computing a shortest path tree, or finding a negative cycle in $O(\log^2 n)$ time using $O(n)$ work.}, } @ARTICLE{Chaudhuri-Zaroliagis-96, AUTHOR = {Chaudhuri, Shiva and Dimopoulos, Yannis and Zaroliagis, Christos}, JOURNAL = {Parallel Processing Letters}, TITLE = {On the Parallel Complexity of Acyclic Logic Programs}, NUMBER = {2}, VOLUME = {6}, YEAR = {1996}, PAGES = {223--230}, } @ARTICLE{Chaudhuri96, AUTHOR = {Chaudhuri, Shiva}, JOURNAL = {Information and Computation}, TITLE = {Sensitive functions and approximate problems}, PUBLISHER = {Academic Press}, VOLUME = {126}, ISBN = {0890-5401}, YEAR = {1996}, PAGES = {161--168}, } @ARTICLE{ChaudhuriDubhashi97, AUTHOR = {Chaudhuri, Shiva and Dubhashi, Devdatt}, JOURNAL = {Theoretical Computer Science}, TITLE = {Probabilistic recurrence relations revisited}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {1}, PUBLISHER = {Elsevier}, VOLUME = {181}, YEAR = {1997}, PAGES = {45--56}, } @ARTICLE{ChaudhuriGargRavi, AUTHOR = {Chaudhuri, Shiva and Garg, Naveen and Ravi, R.}, JOURNAL = {Information Processing Letters}, TITLE = {The $p$-neighbor $k$-center problem}, PUBLISHER = {Elsevier}, VOLUME = {65}, ISBN = {0020-0190}, YEAR = {1998}, PAGES = {131--134}, } @INPROCEEDINGS{ChaudhuriRadhakrishnan96, AUTHOR = {Chaudhuri, Shiva and Radhakrishnan, Jaikumar}, TITLE = {Deterministic restrictions in circuit complexity}, BOOKTITLE = {Theory of Computing : 28th Annual ACM Symposium (STOC-28)}, PADDRESS = {New York}, ADDRESS = {Philadelphia, PA, USA}, PUBLISHER = {ACM Press}, ISBN = {0-89791-785-5}, YEAR = {1996}, PAGES = {30--36}, } @ARTICLE{ChaudhuriSubrahmanyamWagnerZaroliagis2000, AUTHOR = {Chaudhuri, Shiva and Subrahmanyam, K. V. and Wagner, Frank and Zaroliagis, Christos}, JOURNAL = {Algorithmica}, TITLE = {Computing mimicking networks}, ADDRESS = {New York, USA}, NUMBER = {1}, PUBLISHER = {Springer}, VOLUME = {26}, ISBN = {0178-4617}, YEAR = {2000}, PAGES = {31--49}, ABSTRACT = {A mimicking network for a k -terminal network, N , is one whose realizable external flows are the same as those of N . Let S(k) denote the minimum size of a mimicking network for a k-terminal network. In this paper we give new constructions of mimicking networks and prove the following results (the values in brackets are the previously best known results): S(4)=5 [216] , S(5)=6 [232] . For bounded treewidth networks we show S(k)= O(k) [2^ 2k ] , and for outerplanar networks we show S(k) $\leq$ 10k-6 [k22k+2] .}, } @ARTICLE{ChaudhuriZaroliagis2000, AUTHOR = {Chaudhuri, Shiva and Zaroliagis, Christos}, JOURNAL = {Algorithmica}, TITLE = {Shortest paths in digraphs of small treewidth. {Part} I, {Sequential} algorithms}, ADDRESS = {New York, USA}, NUMBER = {3/4}, PUBLISHER = {Springer}, VOLUME = {27}, ISBN = {0178-4617}, YEAR = {2000}, PAGES = {212--226}, ABSTRACT = {We consider the problem of preprocessing an n -vertex digraph with real edge weights so that subsequent queries for the shortest path or distance between any two vertices can be efficiently answered. We give algorithms that depend on the treewidth of the input graph. When the treewidth is a constant, our algorithms can answer distance queries in O(\α(n)) time after O(n) preprocessing. This improves upon previously known results for the same problem. We also give a dynamic algorithm which, after a change in an edge weight, updates the data structure in time O(n\β) , for any constant 0 < \β < 1 . Furthermore, an algorithm of independent interest is given: computing a shortest path tree, or finding a negative cycle in linear time. }, } @INPROCEEDINGS{Chauduri-Subrahmanyam-Wagner-Zaroliagis-98, AUTHOR = {Chaudhuri, Shiva and Subrahmanyam, K. V. and Wagner, Frank and Zaroliagis, Christos}, EDITOR = {Larsen, Kim G. and Skyum, Sven and Winskel, Glynn}, TITLE = {Computing Mimicking Networks}, BOOKTITLE = {Proceedings of the 25th International Colloquium on Automata, Languages and Programming (ICALP-98)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Aalborg, Denmark}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1443}, YEAR = {1998}, PAGES = {556--567}, ABSTRACT = {A {\em mimicking network} for a $k$-terminal network, $N$, is one whose realizable external flows are the same as those of $N$. Let $S(k)$ denote the minimum size of a mimicking network for a $k$-terminal network. In this paper we give new constructions of mimicking networks and prove the following results (the values in brackets are the previously best known results): $S(4)=5~[2^{16}]$, $S(5)=6~[2^{32}]$. For bounded treewidth networks we show $S(k)= O(k)~[2^{2^{k}}]$, and for outerplanar networks we show $S(k) \leq 10k-6~[k^22^{k+2}]$.}, } @INPROCEEDINGS{Chen-Das-Smid96, AUTHOR = {Chen, Danny Z. and Das, Gautam and Smid, Michiel}, TITLE = {Lower bounds for computing geometric spanners and approximate shortest paths}, BOOKTITLE = {8th Canadian Conference on Computing}, PADDRESS = {-}, ADDRESS = {Ottawa, Canada}, PUBLISHER = {Carleton}, YEAR = {1996}, PAGES = {155--160}, } @ARTICLE{ChEpKS13, AUTHOR = {Chen, Xujin and Epstein, Leah and Kleiman, Elena and van Stee, Rob}, JOURNAL = {Theoretical Computer Science}, TITLE = {Maximizing the minimum load: The cost of selfishness}, PUBLISHER = {Elsevier}, MONTH = {April}, VOLUME = {482}, ISBN = {0304-3975}, YEAR = {2013}, PAGES = {9--19}, ABSTRACT = {We consider a scheduling problem where each job is controlled by a selfish agent, who is only interested in minimizing its own cost, defined as the total load of the machine that its job is assigned to. We consider the objective of maximizing the minimum load (the value of the cover) over the machines. Unlike the regular makespan minimization problem, which was extensively studied in a game theoretic context, this problem has not been considered in this setting before. We study the price of anarchy (\poa) and the price of stability (\pos). These measures are unbounded already for two uniformly related machines \cite{EpKS10}, and therefore we focus on identical machines. We show that the $\pos$ is 1, and derive tight bounds on the pure $\poa$ for $m\leq 7$ and on the overall pure $\poa$, showing that its value is exactly 1.7. To achieve the upper bound of 1.7, we make an unusual use of weighting functions. Finally, we show that the mixed $\poa$ grows exponentially with $m$ for this problem. In addition, we consider a similar setting of selfish jobs with a different objective of minimizing the maximum ratio between the loads of any pair of machines in the schedule. We show that under this objective the $\pos$ is 1 and the pure $\poa$ is 2, for any $m\geq 2$.}, } @ARTICLE{Cheriyan-Hagerup-Mehlhorn96, AUTHOR = {Cheriyan, Joseph and Hagerup, Torben and Mehlhorn, Kurt}, JOURNAL = {SIAM Journal on Computing}, TITLE = {An o(n³)-Time Maximum-Flow-Algorithm: Can a Maximum Flow be Computed in o(nm) Time?}, NUMBER = {6}, PUBLISHER = {SIAM}, VOLUME = {25}, ISBN = {0097-5397}, YEAR = {1996}, PAGES = {1144--1170}, } @ARTICLE{Cheriyan-Hagerup95, AUTHOR = {Cheriyan, Joseph and Hagerup, Torben}, JOURNAL = {SIAM Journal on Computing}, TITLE = {A Randomized Maximum-Flow Algorithm}, NUMBER = {2}, PUBLISHER = {Society for Industrial and Applied Mathematics}, VOLUME = {24}, ISBN = {0097-5397}, YEAR = {1995}, PAGES = {203--226}, } @ARTICLE{Cheriyan-Mehlhorn96, AUTHOR = {Cheriyan, Joseph and Mehlhorn, Kurt}, JOURNAL = {Algorithmica}, TITLE = {{Algorithms for Dense Graphs and Networks on the Random Access Computer}}, NUMBER = {5}, PUBLISHER = {Springer}, VOLUME = {15}, ISBN = {0178-4617}, YEAR = {1996}, PAGES = {521--549}, } @ARTICLE{Cheriyan-Mehlhorn99, AUTHOR = {Cheriyan, Joseph and Mehlhorn, Kurt}, JOURNAL = {Information Processing Letters}, TITLE = {An analysis of the highest-level selection rule in the preflow-push max-flow algorithm}, NUMBER = {5}, PUBLISHER = {Elsevier}, VOLUME = {69}, DOI = {10.1016/S0020-0190(99)00019-8}, YEAR = {1999}, PAGES = {239--242}, ABSTRACT = {Consider the problem of finding a maximum flow in a network. Goldberg and Tarjan introduced the preflow-push method for solving this problem. When this method is implemented with the highest-level selection rule, then both the running time and the number of pushes are known to be , where n is the number of nodes and m is the number of edges. We give a new proof based on a potential function argument. Potential function arguments may be preferable for analyzing preflow-push algorithms, since they are simple and generic.}, } @ARTICLE{Ching:1990:DDD, AUTHOR = {Ching, Yu-Tai and Mehlhorn, Kurt and Smid, Michiel H. M.}, JOURNAL = {Information Processing Letters}, TITLE = {Dynamic deferred data structuring}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {1}, PUBLISHER = {Elsevier}, VOLUME = {35}, ISBN = {0020-0190}, YEAR = {1990}, PAGES = {37--40}, } @INPROCEEDINGS{ChKoSt10, AUTHOR = {Christodoulou, George and Kovacs, Annamaria and van Stee, Rob}, EDITOR = {Saberi, Amin}, TITLE = {A truthful constant approximation for maximizing the minimum load on related machines}, BOOKTITLE = {Internet and Network Economics : 6th International Workshop, WINE 2010}, PADDRESS = {Berlin}, ADDRESS = {Stanford, USA}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6484}, ISBN = {978-3-642-17571-8}, DOI = {10.1007/978-3-642-17572-5_15}, YEAR = {2010}, PAGES = {182--193}, ABSTRACT = {Designing truthful mechanisms for scheduling on related machines is a very important problem in single-parameter mechanism design. We consider the covering objective, that is we are interested in maximizing the minimum completion time of a machine. This problem falls into the class of problems where the optimal allocation can be truthfully implemented. A major open issue for this class is whether truthfulness affects the polynomial-time implementation. We provide the first constant factor approxi\-mation for deterministic truthful mechanisms. In particular we come up with a $2+\eps$ approximation guarantee, significantly improving on the previous upper bound of $\min(m,(2+\eps)s_m/s_1)$.}, } @ARTICLE{ChKoSt2013, AUTHOR = {Christodoulou, George and Kovacs, Annamaria and van Stee, Rob}, JOURNAL = {Theoretical Computer Science}, TITLE = {A truthful constant approximation for maximizing the minimum load on related machines}, PUBLISHER = {Elsevier}, MONTH = {June}, VOLUME = {489-490}, ISBN = {0304-3975}, YEAR = {2013}, PAGES = {88--98}, ABSTRACT = {Designing truthful mechanisms for scheduling on related machines is a very important problem in single-parameter mechanism design. We consider the covering objective, that is we are interested in maximizing the minimum completion time of a machine. This problem falls into the class of problems where the optimal allocation can be truthfully implemented. A major open issue for this class is whether truthfulness affects the polynomial-time implementation. We provide the first constant factor approxi\-mation for deterministic truthful mechanisms. In particular we come up with a approximation guarantee of $2+\eps$, significantly improving on the previous upper bound of $\min(m,(2+\eps)s_m/s_1)$.}, } @INPROCEEDINGS{ChlebusCzumajSibeyn97, AUTHOR = {Chlebus, Bogdan S. and Czumaj, Artur and Sibeyn, Jop F.}, EDITOR = {Lengauer, Christian and Griebl, Martin and Gorlatch, Sergei}, TITLE = {Routing on the PADAM: Degrees of Optimality}, BOOKTITLE = {Proceedings of the 3rd International Euro-Par Conference on Parallel Processing (Euro-Par-97)}, PADDRESS = {Berlin}, ADDRESS = {Passau, Germany}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1300}, YEAR = {1997}, PAGES = {272--279}, ABSTRACT = { Routing problems are studied for the Parallel Alternating-Direction Access Machine. The goal is to investigate what level of optimality can be achieved depending on loads of packets per memory unit. In the case of typical moderate loads, our algorithms are optimal to within a small multiplicative constant; a deterministic and a randomized algorithm are developed, both faster than the best previously known routing algorithm. Moreover, for sufficiently large loads, an algorithm which misses optimality by only an additive lower-order term is designed. We consider also off-line routing problems, and multidimensional extension of the model.}, } @ARTICLE{ChMeSS12, AUTHOR = {Chan, Ho-Leung and Megow, Nicole and Sitters, Ren{\'e} and van Stee, Rob}, JOURNAL = {Theoretical Computer Science}, TITLE = {A note on sorting buffers offline}, ADDRESS = {Amsterdam}, PUBLISHER = {Elsevier}, MONTH = {March}, VOLUME = {423}, ISBN = {0304-3975}, DOI = {10.1016/j.tcs.2011.12.077}, YEAR = {2012}, PAGES = {11--18}, ABSTRACT = { We consider the offline sorting buffer problem. The input is a sequence of items of different types. All items must be processed one by one by a server. The server is equipped with a random-access buffer of limited capacity which can be used to rearrange items. The problem is to design a scheduling strategy that decides upon the order in which items from the buffer are sent to the server. Each type change incurs unit cost, and thus, the objective is to minimize the total number of type changes for serving the entire sequence. This problem is motivated by various applications in manufacturing processes and computer science, and it has attracted significant attention in the last few years. The main focus has been on online competitive algorithms. Surprisingly little is known on the basic offline problem. In this paper, we show that the sorting buffer problem with uniform cost is NP-hard and, thus, close one of the most fundamental questions for the offline problem. On the positive side, we give an~$O(1)$-approximation algorithm when the scheduler is given a buffer only slightly larger than double the original size. We also give a dynamic programming algorithm for the special case of buffer size two that solves the problem exactly in linear time, improving on the standard DP which runs in cubic time.}, } @INPROCEEDINGS{Chong-1-96, AUTHOR = {Chong, Ka Wong}, TITLE = {Finding minimum spanning trees on the EREW PRAM}, BOOKTITLE = {International Computer Symposium}, PADDRESS = {-}, ADDRESS = {Taiwan}, PUBLISHER = {-}, YEAR = {1996}, PAGES = {7--14}, } @INPROCEEDINGS{Chong-Lam96, AUTHOR = {Chong, Ka Wong and Lam, Tak Wah}, TITLE = {Towards more precise parallel biconnectivity approximation}, BOOKTITLE = {7th Annual International Symposium on Algorithms and Computation}, PADDRESS = {-}, ADDRESS = {Osaka}, PUBLISHER = {-}, YEAR = {1996}, PAGES = {223--232}, } @INPROCEEDINGS{Chong-Ramos1998, AUTHOR = {Chong, Ka Wong and Ramos, Edgar A.}, EDITOR = {Bilardi, Gianfranco and Italiano, Giuseppe F. and Pietracaprina, Andrea and Pucci, Geppino}, TITLE = {Improved deterministic parallel padded sorting}, BOOKTITLE = {Proceedings of the 6th Annual European Symposium on Algorithms (ESA-98)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Venice, Italy}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1461}, ISBN = {3-540-64848-8}, YEAR = {1998}, PAGES = {405--416}, ABSTRACT = {Given an input array of $n$ real numbers, sorting with padding $\lambda$ consists in writing those numbers in order in an array of size $(1+\lambda)n$, thus leaving $\lambda n$ entries {\em empty}. Only comparisons are allowed between the numbers to be sorted. We describe an algorithm that, with $nk$ processors in the CRCW PRAM model, sorts the input array with padding $o(1)$ using time $ O(\log_k n \log^*(\log_k n)+\loglog k) $. This improves a previous algorithm %by Hagerup and Raman %\cite{HaRa93} with time bound %(after an improvement in \cite{GoZw95}) $ O(\log_k n $ $(\loglog k)^3\cdot 2^{C(\log^* n-\log^*k)}) $. The best known lower bound is $\Omega(\log_k n)$.}, } @ARTICLE{Chong1998, AUTHOR = {Chong, Ka Wong and Lam, Tak Wah}, JOURNAL = {Algorithmica}, TITLE = {Approximating Biconnectivity in Parallel}, PUBLISHER = {Springer}, VOLUME = {21}, ISBN = {0178-4617}, YEAR = {1998}, PAGES = {395--410}, } @INCOLLECTION{Christodoulou2008, AUTHOR = {Christodoulou, George}, EDITOR = {Kao, Ming-Yang}, TITLE = {Price of Anarchy}, BOOKTITLE = {Encyclopedia of Algorithms}, ADDRESS = {New York}, PUBLISHER = {Springer US}, MONTH = {June}, YEAR = {2008}, PAGES = {1--99}, } @INPROCEEDINGS{ChristodoulouKavacs2010, AUTHOR = {Christodoulou, George and Kov{\'a}cs, Annam{\'a}ria}, EDITOR = {Charikar, Moses}, TITLE = {A deterministic truthful {PTAS} for scheduling related machines}, BOOKTITLE = {21st Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2010)}, PADDRESS = {Philadelphia, Pa.}, ADDRESS = {Austin, Tx., USA}, PUBLISHER = {SIAM}, ISBN = {978-0-898716-98-6}, YEAR = {2010}, PAGES = {1005--1016}, } @INPROCEEDINGS{ChristodoulouKS2008, AUTHOR = {Christodoulou, George and Kov{\'a}cs, Annam{\'a}ria and Schapira, Michael}, EDITOR = {Aceto, Luca and Damg{\aa}rd, Ivan and Goldberg, Leslie Ann and Halld{\'o}rsson, Magn{\'u}s M. and Ing{\'o}lfsd{\'o}ttir, Anna and Walukiewicz, Igor}, TITLE = {Bayesian Combinatorial Auctions}, BOOKTITLE = {Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part I}, PADDRESS = {Berlin}, ADDRESS = {Reykjavik, Iceland}, PUBLISHER = {Springer}, MONTH = {July}, YEAR = {2008}, PAGES = {820--832}, } @INPROCEEDINGS{ChristodoulouKV2008, AUTHOR = {Christodoulou, George and Koutsoupias, Elias and Vidali, Angelina}, EDITOR = {Halperin, Dan and Mehlhorn, Kurt}, TITLE = {A Characterization of 2-Player Mechanisms for Scheduling}, BOOKTITLE = {Algorithms - ESA 2008, 16th Annual European Symposium, Karlsruhe, Germany, September 15-17, 2008. Proceedings.}, PADDRESS = {Berlin}, ADDRESS = {Karlsruhe, Germany}, PUBLISHER = {Springer}, MONTH = {September}, YEAR = {2008}, PAGES = {297--307}, } @ARTICLE{Chrobak2007, AUTHOR = {Chrobak, Marek and Gasieniec, Leszek and Kowalski, Dariusz R.}, JOURNAL = {SIAM Journal on Computing}, TITLE = {The wake-up problem in multihop radio networks}, ADDRESS = {Philadelphie, PA, USA}, NUMBER = {5}, PUBLISHER = {SIAM}, MONTH = {January}, VOLUME = {36}, ISBN = {0097-5397}, DOI = {10.1137/S0097539704442726}, YEAR = {2007}, PAGES = {1453--1471}, ABSTRACT = {We study the problem of waking up a collection of $n$ processors connected by a multihop ad hoc ratio network with unknown topology, no access to a global clock, and no collision detection mechanism available. Each node in the network either wakes up spontaneously or gets activated by receiving a wake-up signal from another node. All active nodes transmit the wake-up signals according to a given protocol $\calW$. The running time of $\calW$ is the number of steps counted from the first spontaneous wake-up until all nodes become activated. We provide two protocols for this problem. The first one is a deterministic protocol with running time $O(n^{5/3}\log n)$. Our protocol is based on a novel concept of a shift-tolerant selector to which we refer as a (radio) synchronizer. The second protocol is randomized, and its expected running time is $O(D \log^2 n)$, where $D$ is the diameter of the network. Subsequently we show how to employ our wake-up protocols to solve two other communication primitives: leader election and clock synchronization. }, } @ARTICLE{Cilleruelo2009, AUTHOR = {Cilleruelo, Javier and Hebbinghaus, Nils}, JOURNAL = {European Journal of Combinatorics}, TITLE = {Discrepancy in generalized arithmetic progressions}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {7}, PUBLISHER = {Elsevier}, VOLUME = {30}, ISBN = {0195-6698}, DOI = {10.1016/j.ejc.2009.03.006}, YEAR = {2009}, PAGES = {1607--1611}, } @ARTICLE{CJKMR97, AUTHOR = {Christof, Thomas and J{\"u}nger, Michael and Kececioglu, John and Mutzel, Petra and Reinelt, Gerhard}, JOURNAL = {Journal of Computational Biology}, TITLE = {A Branch-And-Cut Approach to Physical Mapping of Chromosomes by Unique End-Probes}, NUMBER = {4}, VOLUME = {4}, YEAR = {1997}, PAGES = {433--447}, } @INPROCEEDINGS{CK-PODC, AUTHOR = {Chlebus, Bogdan S. and Kowalski, Dariusz}, EDITOR = {Chaudhuri, Soma and Kutten, Shay}, TITLE = {A better wake-up in radio networks}, BOOKTITLE = {Proceedings of the 23rd Annual ACM Symposium on Principles of Distributed Computing, PODC 2004}, ORGANIZATION = {Association for Computing Machinery (ACM)}, PADDRESS = {New York, USA}, ADDRESS = {St. John's, Newfoundland, Canada}, PUBLISHER = {ACM}, ISBN = {1-58113-802-4}, YEAR = {2004}, PAGES = {266--274}, } @INPROCEEDINGS{CK-STOC, AUTHOR = {Chlebus, Bogdan S. and Kowalski, Dariusz}, EDITOR = {Gabow, Harold N. and Fagin, Ronald}, TITLE = {Cooperative asynchronous update of shared memory}, BOOKTITLE = {Proceedings of the 37th Annual ACM Symposium on Theory of Computing (STOC 2005)}, ORGANIZATION = {Association for Computing Machinery (ACM)}, PADDRESS = {New York, USA}, ADDRESS = {Baltimore, USA}, PUBLISHER = {ACM}, ISBN = {1-58113-960-8}, YEAR = {2005}, PAGES = {733--739}, } @ARTICLE{CK2009, AUTHOR = {Christodoulou, George and Koutsoupias, Elias}, JOURNAL = {Bulletin of European Association for Theoretical Computer Science}, TITLE = {Mechanism Design for Scheduling}, ADDRESS = {Leiden}, PUBLISHER = {EATCS}, VOLUME = {97}, ISBN = {0252-9742}, YEAR = {2009}, PAGES = {40--59}, } @INPROCEEDINGS{CKK07, AUTHOR = {Christodoulou, George and Koutsoupias, Elias and Kov{\'a}cs, Annam{\'a}ria}, EDITOR = {Arge, Lars and Cachin, Christian and Jurdzi´nski, Tomasz and Tarlecki, Andrzej}, TITLE = {Mechanism design for fractional scheduling on unrelated machines}, BOOKTITLE = {Automata, Languages and Programming : 34th International Colloquium, ICALP 2007}, PADDRESS = {Berlin, Germany}, ADDRESS = {Wrocław, Poland}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4596}, ISBN = {3-540-73419-2}, DOI = {10.1007/978-3-540-73420-8_6}, YEAR = {2007}, PAGES = {40--52}, NOTE = {To appear at ICALP 07.}, } @ARTICLE{CKK2009, AUTHOR = {Christodoulou, George and Koutsoupias, Elias and Kov{\'a}cs, Annam{\'a}ria}, JOURNAL = {ACM Transactions on Algorithms}, TITLE = {Mechanism Design for Fractional Scheduling on Unrelated Machines}, ADDRESS = {New York, NY}, NUMBER = {2}, PUBLISHER = {ACM}, MONTH = {March}, VOLUME = {6}, ISBN = {1549-6325}, DOI = {10.1145/1721837.1721854}, YEAR = {2010}, PAGES = {38:1--38:18}, } @UNPUBLISHED{CKMP-manus, AUTHOR = {Czyzowicz, Jurek and Kowalski, Dariusz and Markou, Euripides and Pelc, Andrzej}, TITLE = {Complexity of searching for a black hole}, YEAR = {2006}, NOTE = {Submitted}, } @INPROCEEDINGS{CKMP-OPODIS, AUTHOR = {Czyzowicz, Jurek and Kowalski, Dariusz and Markou, Euripides and Pelc, Andrzej}, EDITOR = {Higashino, Teruo}, TITLE = {Searching for a black hole in tree networks}, BOOKTITLE = {Principles of distributed systems : 8th International Conference, OPODIS 2004}, PADDRESS = {Berlin, Germany}, ADDRESS = {Grenoble, France}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {3544}, ISBN = {3-540-27324-7}, YEAR = {2005}, PAGES = {67--80}, } @INPROCEEDINGS{CKV07, AUTHOR = {Christodoulou, George and Koutsoupias, Elias and Vidali, Angelina}, TITLE = {A lower bound for scheduling mechanisms}, BOOKTITLE = {ACM-SIAM Symposium on Discrete Algorithms (SODA)}, PADDRESS = {New Orleans}, ADDRESS = {Philadelphia}, PUBLISHER = {SIAM}, YEAR = {2007}, PAGES = {1163--1170}, } @ARTICLE{CKV2009, AUTHOR = {Christodoulou, George and Koutsoupias, Elias and Nanavati, Akash}, JOURNAL = {Theoretical Computer Science}, TITLE = {Coordination Mechanisms}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {36}, PUBLISHER = {Elsevier}, VOLUME = {410}, ISBN = {0304-3975}, DOI = {10.1016/j.tcs.2009.01.005}, YEAR = {2009}, PAGES = {3327--3336}, } @ARTICLE{CKValgorithmica2008, AUTHOR = {Christodoulou, George and Koutsoupias, Elias and Vidali, Angelina}, JOURNAL = {Algorithmica}, TITLE = {A lower bound for scheduling mechanisms}, ADDRESS = {New York, NY}, NUMBER = {4}, PUBLISHER = {Springer}, VOLUME = {85}, ISBN = {0178-4617}, DOI = {10.1007/s00453-008-9165-3}, YEAR = {2009}, PAGES = {729--740}, } @MASTERSTHESIS{Clanget1999, AUTHOR = {Clanget, Ulrich}, TITLE = {{Plattformunabh{\"a}ngiges Toolkit f{\"u}r Grafische Benutzerschnittstellen (GUI)}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {May}, YEAR = {1999}, } @INPROCEEDINGS{CMMS1998a, AUTHOR = {Crauser, Andreas and Mehlhorn, Kurt and Meyer, Ulrich and Sanders, Peter}, EDITOR = {Brim, Lubos and Gruska, Jozef and Zlatuska, Jiri}, TITLE = {A Parallelization of Dijkstra's Shortest Path Algorithm}, BOOKTITLE = {Proceedings of the 23rd International Symposium on the Mathematical Foundations of Computer Science (MFCS-98)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Brno, Czech Republic}, PUBLISHER = {Springer}, MONTH = {August}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1450}, ISBN = {3-540-64827-5}, DOI = {10.1007/BFb0055823}, YEAR = {1998}, PAGES = {722--731}, ABSTRACT = {The single source shortest path (SSSP) problem lacks parallel solutions which are fast and simultaneously work-efficient. We propose simple criteria which divide Dijkstra's sequential SSSP algorithm into a number of phases, such that the operations within a phase can be done in parallel. We give a PRAM algorithm based on these criteria and analyze its performance on random digraphs with random edge weights uniformly distributed in $[0,1]$. We use the ${\cal G}(n,d/n)$ model: the graph consists of $n$~nodes and each edge is chosen with probability $d/n$. Our PRAM algorithm needs ${\cal O}(n^{1/3} \log n)$ time and ${\cal O}(n \log n+dn)$ work with high probability (whp). We also give extensions to external memory computation. Simulations show the applicability of our approach even on non-random graphs.}, } @INPROCEEDINGS{COCOA07, AUTHOR = {Mehlhorn, Kurt}, EDITOR = {Dress, Andreas and Xu, Yinfeng and Zhu, Binhai}, TITLE = {Matchings in Graphs Variations of the Problem}, BOOKTITLE = {Combinatorial Optimization and Applications : First International Conference, COCOA 2007}, PADDRESS = {Berlin, Germany}, ADDRESS = {Xi’an, China}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4616}, ISBN = {3-540-73555-7}, DOI = {10.1007/978-3-540-73556-4_1}, YEAR = {2007}, PAGES = {1--2}, } @INPROCEEDINGS{Cole-Hariharan96, AUTHOR = {Cole, Richard and Hariharan, Ramesh}, TITLE = {An O(n log n) algorithm for the maximum agreement subtree problem for binary trees}, BOOKTITLE = {7th ACM-SIAM Symposium on Discrete Algorithms (SODA96)}, PADDRESS = {New York}, ADDRESS = {Georgia, USA}, PUBLISHER = {acm}, YEAR = {1996}, PAGES = {323--332}, } @ARTICLE{ColeFarachetal2000, AUTHOR = {Cole, Richard and Farach-Colton, Martin and Hariharan, Ramesh and Przytycka, Teresa and Thorup, Mikkel}, JOURNAL = {SIAM Journal on Computing}, TITLE = {An {O}(n log n) algorithm for the maximum agreement subtree problem for binary trees}, ADDRESS = {Philadelphia, USA}, NUMBER = {5}, PUBLISHER = {SIAM}, VOLUME = {30}, ISBN = {0097-5397}, YEAR = {2000}, PAGES = {1385--1404}, } @INPROCEEDINGS{conf/compgeom/GaoJKMR89, AUTHOR = {Gao, Shaodi and Jerrum, Mark and Kaufmann, Michael and Mehlhorn, Kurt and R{\"u}lling, Wolfgang}, TITLE = {On Continuous Homotopic One Layer Routing}, BOOKTITLE = {Computational geometry (SCG-88) : 4th symposium}, PADDRESS = {New York, USA}, ADDRESS = {Urbana-Champaign, IL, USA}, PUBLISHER = {ACM}, ISBN = {0-89791-270-5}, YEAR = {1988}, PAGES = {392--402}, } @INPROCEEDINGS{conf/esa/Bar-YehudaFMR2007, AUTHOR = {Bar-Yehuda, Reuven and Flysher, Guy and Mestre, Juli{\'a}n and Rawitz, Dror}, EDITOR = {Arge, Lars and Hoffmann, Michael and Welzl, Emo}, TITLE = {Approximation of Partial Capacitated Vertex Cover}, BOOKTITLE = {15th Annual European Symposium on Algorithms}, PADDRESS = {Berlin / Heidelberg}, ADDRESS = {Eilat, Israel}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4698}, ISBN = {978-3-540-75519-7}, DOI = {10.1007/978-3-540-75520-3_31}, YEAR = {2007}, PAGES = {335--346}, ABSTRACT = {We study the \emph{partial capacitated vertex cover problem} (PCVC) in which the input consists of a graph $G$ and a covering requirement $L$. Each edge $e$ in $G$ is associated with a \emph{demand} (or \emph{load}) $\ell(e)$, and each vertex $v$ is associated with a (soft) \emph{capacity} $c(v)$ and a \emph{weight} $w(v)$. A feasible solution is an assignment of edges to vertices such that the total demand of assigned edges is at least $L$. The weight of a solution is $\sum_v \alpha(v) w(v)$, where $\alpha(v)$ is the number of copies of $v$ required to cover the demand of the edges that are assigned to $v$. The goal is to find a solution of minimum weight. We consider three variants of PCVC. In PCVC with \emph{separable demands} the only requirement is that total demand of edges assigned to $v$ is at most $\alpha(v) c(v)$. In \pcvc\ with \emph{inseparable demands} there is an additional requirement that if an edge is assigned to $v$ then it must be assigned to one of its copies. The third variant is the unit demands version. We present $3$-approximation algorithms for both PCVC with separable demands and PCVC with inseparable demands. We also present a $2$-approximation algorithm for PCVC with unit demands. We show that similar results can be obtained for PCVC in hypergraphs and for the \emph{prize collecting} version of capacitated vertex cover. Our algorithms are based on a unified approach for designing and analyzing approximation algorithms for capacitated covering problems. This approach yields simple algorithms whose analyses rely on the local ratio technique and sophisticated charging schemes.}, } @INPROCEEDINGS{conf/esa/KhullerM2008, AUTHOR = {Khuller, Samir and Mestre, Juli{\'a}n}, TITLE = {An Optimal Incremental Algorithm for Minimizing Lateness with Rejection}, BOOKTITLE = {16th Annual European Symposium on Algorithms (ESA)}, PADDRESS = {Heidelberg, Germany}, ADDRESS = {Karlsruhe, Germany}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5193}, DOI = {10.1007/978-3-540-87744-8_50}, YEAR = {2008}, PAGES = {601--610}, } @INPROCEEDINGS{conf/esa/KhullerMM2007, AUTHOR = {Khuller, Samir and Malekian, Azarakhsh and Mestre, Juli{\'a}n}, EDITOR = {Arge, Lars and Hoffmann, Michael and Welzl, Emo}, TITLE = {To Fill or Not to Fill: The Gas Station Problem}, BOOKTITLE = {15th Annual European Symposium on Algorithms}, PADDRESS = {Berlin / Heidelberg}, ADDRESS = {Eilat, Israel}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4698}, ISBN = {978-3-540-75519-7}, DOI = {10.1007/978-3-540-75520-3_48}, YEAR = {2007}, PAGES = {534--545}, ABSTRACT = {In this paper we study several routing problems that generalize shortest paths and the Traveling Salesman Problem. We consider a more general model that incorporates the actual cost in terms of gas prices. We have a vehicle with a given tank capacity. We assume that at each vertex gas may be purchased at a certain price. The objective is to find the cheapest route to go from s to t, or the cheapest tour visiting a given set of locations. Surprisingly, the problem of find the cheapest way to go from s to t can be solved in polynomial time and is not NP-complete. For most other versions however, the problem is NP-complete and we develop polynomial time approximation algorithms for these versions.}, } @INPROCEEDINGS{conf/gi/MehlhornZ88, AUTHOR = {Mehlhorn, Kurt}, EDITOR = {Valk, R{\"u}diger}, TITLE = {{SFB 124: VLSI-Entwurfsmethoden und Parallelit{\"a}t}}, BOOKTITLE = {GI - 18. Jahrestagung II, Vernetzte and komplexe Informatik-Systems}, PADDRESS = {Berlin, Germany}, ADDRESS = {Hamburg, Germany}, PUBLISHER = {Springer}, SERIES = {Informatik-Fachberichte}, VOLUME = {188}, ISBN = {3-540-50360-9}, YEAR = {1988}, PAGES = {3--29}, } @INPROCEEDINGS{conf/soda/Mestre2008, AUTHOR = {Mestre, Juli{\'a}n}, TITLE = {Adaptive Local Ratio}, BOOKTITLE = {19th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA)}, PADDRESS = {Philadelphia, USA}, ADDRESS = {San Francisco, USA}, PUBLISHER = {Society for Industrial and Applied Mathematics}, MONTH = {January}, YEAR = {2008}, PAGES = {152--160}, ABSTRACT = {Local Ratio is a well-known paradigm for designing approximation algorithms for combinatorial optimization problems. At a very high level, a local ratio algorithm first decomposes the input weight function $w$ into a positive linear combination of simpler weight functions or \emph{models}. Guided by this process a solution $S$ is constructed such that $S$ is $\alpha$-approximate with respect to each model used in the decomposition. As a result, $S$ is $\alpha$-approximate under $w$ as well. These models usually have a very simple structure that remains ``unchanged'' throughout the execution of the algorithm. In this work we show that adaptively choosing a model from a richer spectrum of functions can lead to a better local ratio. Indeed, by turning the search for a good model into an optimization problem of its own, we get improved approximations for a data migration problem.}, } @INPROCEEDINGS{conf/stacs/ElbassioniKMMS2009, AUTHOR = {Elbassioni, Khaled and Krohn, Erik and Matijevic, Domagoj and Mestre, Juli{\'a}n and Severdija, Domagoj}, EDITOR = {Albers, Susanne and Marion, Jean-Yves}, TITLE = {Improved Approximation Algorithms for {1.5D} Terrain Guarding}, BOOKTITLE = {Proceedings of the 26th International Symposium on Theoretical Aspects of Computer Science (STACS)}, PADDRESS = {Dagstuhl, Germany}, ADDRESS = {Freiburg - Germany}, PUBLISHER = {LZI}, SERIES = {Leibniz International Proceedings in Informatics}, VOLUME = {3}, ISBN = {978-3-939897-09-5}, DOI = {10.4230/LIPIcs.STACS.2009.1841}, YEAR = {2009}, PAGES = {361--371}, } @INPROCEEDINGS{conf/stacs/MehlhornP86, AUTHOR = {Mehlhorn, Kurt and Preparata, Franco P.}, EDITOR = {Monien, Burkhard and Vidal-Naquet, Guy}, TITLE = {Area-time Optimal Division for {T}=Omega(log n)$^1+epsilon$"}, BOOKTITLE = {STACS 86, 3rd Annual Symposium on Theoretical Aspects of Computer Science}, PADDRESS = {Berlin, Germany}, ADDRESS = {Orsay, France}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {210}, ISBN = {3-540-16078-7}, YEAR = {1986}, PAGES = {341--352}, } @INPROCEEDINGS{conf/stacs/Mestre2008, AUTHOR = {Mestre, Juli{\'a}n}, TITLE = {Lagrangian Relaxation and Partial Cover (Extended Abstract)}, BOOKTITLE = {25th International Symposium on Theoretical Aspects of Computer Science (STACS)}, PADDRESS = {Dagstuhl, Germany}, ADDRESS = {Bordeaux, France}, PUBLISHER = {Internationales Begegnungs- und Forschungszentrum f{"u}r Informatik (IBFI), Schloss Dagstuhl, Germany}, MONTH = {February}, YEAR = {2008}, PAGES = {539--550}, } @INPROCEEDINGS{conf/swat/AlthausCEKM2008, AUTHOR = {Althaus, Ernst and Canzar, Stefan and Elbassioni, Khaled and Karrenbauer, Andreas and Mestre, Juli{\'a}n}, TITLE = {Approximating the Interval Constrained Coloring Problem}, BOOKTITLE = {11th Scandinavian Workshop on Algorithm Theory (SWAT)}, PADDRESS = {Heidelberg, Germany}, ADDRESS = {Gothenburg, Sweden}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5124}, YEAR = {2008}, PAGES = {210--221}, } @ARTICLE{ContRound2006, AUTHOR = {Doerr, Benjamin and Klein, Christian}, JOURNAL = {Electronic Notes in Discrete Mathematics}, TITLE = {Controlled Randomized Rounding}, ADDRESS = {Amsterdam, The Netherlands}, PUBLISHER = {Elsevier}, VOLUME = {25}, ISBN = {1571-0653}, YEAR = {2006}, PAGES = {39--40}, } @ARTICLE{CooperFriezeMehlhornPriebe00, AUTHOR = {Cooper, Colin and Frieze, Alan M. and Mehlhorn, Kurt and Priebe, Volker}, JOURNAL = {Random Structures \& Algorithms}, TITLE = {Average-Case Complexity of Shortest-Paths Problems in the Vertex-Potential Model}, ADDRESS = {New York, USA}, NUMBER = {1}, PUBLISHER = {Wiley}, VOLUME = {16}, ISBN = {1042-9832}, YEAR = {2000}, PAGES = {33--46}, ABSTRACT = {We study the average-case complexity of shortest-paths problems in the vertex-potential model. The vertex-potential model is a family of probability distributions on complete directed graphs with arbitrary real edge lengths but without negative cycles. We show that on a graph with $n$ vertices and with respect to this model, the single-source shortest-paths problem can be solved in $O(n^2)$ expected time, and the all-pairs shortest-paths problem can be solved in $O(n^2 \log n)$ expected time.}, } @INPROCEEDINGS{CooperFriezeMehlhornPriebe97, AUTHOR = {Cooper, Colin and Frieze, Alan M. and Mehlhorn, Kurt and Priebe, Volker}, EDITOR = {Rolim, Jos{\'e}}, TITLE = {Average-case complexity of shortest-paths problems in the vertex-potential model}, BOOKTITLE = {International Workshop on Randomization and Approximation Techniques in Computer Science (RANDOM-97)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Bologna, Italy}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1269}, ISBN = {3-540-63248-4}, YEAR = {1997}, PAGES = {15--26}, ABSTRACT = {We study the average-case complexity of shortest-paths problems in the vertex-potential model. The vertex-potential model is a family of probability distributions on complete directed graphs with \emph{arbitrary} real edge lengths but without negative cycles. We show that on a graph with $n$ vertices and with respect to this model, the single-source shortest-paths problem can be solved in $O(n^2)$ expected time, and the all-pairs shortest-paths problem can be solved in $O(n^2 \log n)$ expected time.}, } @INPROCEEDINGS{CorreaMRS2009, AUTHOR = {Correa, Jose R. and Megow, Nicole and Raman, Rajiv and Suchan, Karol}, EDITOR = {Cafieri, Sonia and Mucherino, Antonio and Nannicini, Giacomo and Tarissan, Fabien and Liberti, Leo}, TITLE = {Cardinality Constrained Graph Partitioning into Cliques with Submodular Costs}, BOOKTITLE = {8th Cologne-Twente Workshop on Graphs and Combinatorial Optimization (CTW 2009)}, PADDRESS = {Paris, France}, ADDRESS = {Paris, France}, PUBLISHER = {École Polytechnique}, YEAR = {2009}, PAGES = {347--350}, } @INPROCEEDINGS{CPL2010, AUTHOR = {Christodoulou, Giorgos and Ligett, Katrina and Pyrga, Evangelia}, EDITOR = {Abramsky, Samson and Gavoille, Cyril and Kirchner, Claude and Meyer auf der Heide, Friedhelm and Spirakis, Paul}, TITLE = {Contention Resolution under Selfishness}, BOOKTITLE = {Automata, Languages and Programming : 37th International Colloquium, ICALP 2010. - Pt. II}, PADDRESS = {Berlin}, ADDRESS = {Bordeaux, France}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6199}, ISBN = {978-3-642-14161-4}, DOI = {10.1007/978-3-642-14162-1_36}, YEAR = {2010}, PAGES = {430--441}, ABSTRACT = {In many communications settings, such as wired and wireless local-area networks, when multiple users attempt to access a communication channel at the same time, a conflict results and none of the communications are successful. Contention resolution is the study of distributed transmission and retransmission protocols designed to maximize notions of utility such as channel utilization in the face of blocking communications. An additional issue to be considered in the design of such protocols is that selfish users may have incentive to deviate from the prescribed behavior, if another transmission strategy increases their utility. The work of Fiat et al.~\cite{Fiat07} addresses this issue by constructing an asymptotically optimal incentive-compatible protocol. However, their protocol assumes the cost of any single transmission is zero, and the protocol completely collapses under non-zero transmission costs. In this paper, we treat the case of non-zero transmission cost $c$. We present asymptotically optimal contention resolution protocols that are robust to selfish users, in two different channel feedback models. Our main result is in the Collision Multiplicity Feedback model, where after each time slot, the number of attempted transmissions is returned as feedback to the users. In this setting, we give a protocol that has expected cost $2n+c\log n$ and is in $o(1)$-equilibrium, where $n$ is the number of users.}, } @INPROCEEDINGS{CraMehMey97, AUTHOR = {Crauser, Andreas and Mehlhorn, Kurt and Meyer, Ulrich}, EDITOR = {Spaniol, Otto}, TITLE = {{K{\"u}rzeste-Wege-Berechnung bei sehr gro{\ss}en Datenmengen}}, BOOKTITLE = {Promotion tut not: Innovationsmotor "Graduiertenkolleg"}, PADDRESS = {Aachen, Germany}, ADDRESS = {Aachen, Germany}, PUBLISHER = {Augustinus}, MONTH = {September}, SERIES = {Aachener Beitr{\"a}ge zur Informatik}, VOLUME = {21}, ISBN = {3-86073-477-6}, YEAR = {1997}, PAGES = {113--132}, ABSTRACT = {In diesem Report untersuchen wir die Ein/Ausgabe-Komplexit{\"a}t (I/O Komplexit{\"a}t) des K{\"u}rzesten-Wege-Problems mit einem Startknoten (single source shortest path) auf Graphen mit nicht-negativen Kantengewichten. Wir pr{\"a}sentieren einen Algorithmus, der f{\"u}r eine gro{\ss}e Klasse zuf{\"a}lliger Graphen eine I/O Komplexit{\"a}t von ${\cal O}(\frac{n}{D}+\frac{m}{DB}\log_{S/B}\frac{m}{B})$ erreicht. Dabei bezeichnen $n,m$ die Anzahl der Knoten bzw. Kanten im Graphen, $S$ ist die Gr{\"o}{\ss}e des verf{\"u}gbaren Internspeichers, $B$ bezeichnet die Gr{\"o}{\ss}e eines Blocktransfers und $D$ ist die Anzahl der unabh{\"a}ngigen parallelen Harddisks; $D$ ist beschr{\"a}nkt auf ${\cal O}(\sqrt{n/d})$. Weiterhin pr{\"a}sentieren wir ein effizientes Phasen-Verfahren f{\"u}r Probleminstanzen, die so gro{\ss} sind, da{\ss} selbst ein boolsches Feld f{\"u}r die Knotenmenge nicht mehr im Hauptspeicher gehalten werden kann.}, } @ARTICLE{Crauser-Ferragina2001, AUTHOR = {Crauser, Andreas and Ferragina, Paolo}, JOURNAL = {Algorithmica}, TITLE = {A theoretical and experimental study on the construction of suffix arrays in external memory}, ADDRESS = {New York, USA}, NUMBER = {1}, PUBLISHER = {Springer}, MONTH = {January}, VOLUME = {32}, ISBN = {0178-4617}, YEAR = {2002}, PAGES = {1--35}, ABSTRACT = { The construction of full-text indexes on very large text collections is nowadays a hot problem. The suffix array [Manber-Myers,~1993] is one of the most attractive full-text indexing data structures due to its simplicity, space efficiency and powerful/fast search operations supported. In this paper we analyze, both theoretically and experimentally, the I/O-complexity and the working space of six algorithms for constructing large suffix arrays. Three of them are the state-of-the-art, the other three algorithms are our new proposals. We perform a set of experiments based on three different data sets (English texts, Amino-acid sequences and random texts) and give a precise hierarchy of these algorithms according to their working-space vs. construction-time tradeoff. Given the current trends in model design~\cite{Farach-et-al,Vitter} and disk technology~\cite{quantum,Ruemmler-Wilkes}, we will pose particular attention to differentiate between ``random'' and ``contiguous'' disk accesses, in order to reasonably explain some practical I/O-phenomena which are related to the experimental behavior of these algorithms and that would be otherwise meaningless in the light of other simpler external-memory models. At the best of our knowledge, this is the first study which provides a wide spectrum of possible approaches to the construction of suffix arrays in external memory, and thus it should be helpful to anyone who is interested in building full-text indexes on very large text collections. Finally, we conclude our paper by addressing two other issues. The former concerns with the problem of building word-indexes; we show that our results can be successfully applied to this case too, without any loss in efficiency and without compromising the simplicity of programming so to achieve a uniform, simple and efficient approach to both the two indexing models. The latter issue is related to the intriguing and apparently counterintuitive ``contradiction'' between the effective practical performance of the well-known BaezaYates-Gonnet-Snider's algorithm~\cite{book-info}, verified in our experiments, and its unappealing (i.e., cubic) worst-case behavior. We devise a new external-memory algorithm that follows the basic philosophy underlying that algorithm but in a significantly different manner, thus resulting in a novel approach which combines good worst-case bounds with efficient practical performance. }, } @INPROCEEDINGS{Crauser1999, AUTHOR = {Crauser, Andreas and Ferragina, Paolo}, EDITOR = {Nesetril, Jaroslav}, TITLE = {On Constructing Suffix Arrays in External Memory}, BOOKTITLE = {Proceedings of the 7th Annual European Symposium on Algorithms (ESA-99)}, PADDRESS = {Berlin}, ADDRESS = {Prague, Czech Republic}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1643}, YEAR = {1999}, PAGES = {224--235}, ABSTRACT = { The construction of full-text indexes on very large text collections is nowadays a hot problem. The suffix array~\cite{Manber-Myers} is one of the most attractive full-text indexing data structures due to its simplicity, space efficiency and powerful/fast search operations supported. In this paper we analyze theoretically and experimentally, the I/O-complexity and the working space of six algorithms for constructing large suffix arrays. Additionally, we design a new external-memory algorithm that follows the basic philosophy underlying the algorithm in~\cite{book-info} but in a significantly different manner, thus combining its good practical qualities with efficient worst-case performances. At the best of our knowledge, this is the first study which provides a wide spectrum of possible approaches to the construction of suffix arrays in external memory, and thus it should be helpful to anyone who is interested in building full-text indexes on very large text collections. }, } @INPROCEEDINGS{Crauser1999a, AUTHOR = {Crauser, Andreas and Mehlhorn, Kurt}, EDITOR = {Vitter, Jeffrey S. and Zaroliagis, Christos D.}, TITLE = {LEDA-SM : Extending LEDA to Secondary Memory}, BOOKTITLE = {Algorithm engineering (WAE-99) : 3rd International Workshop, WAE'99}, PADDRESS = {Berlin, Germany}, ADDRESS = {London, UK}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1668}, ISBN = {3-540-66427-0}, YEAR = {1999}, PAGES = {228--242}, ABSTRACT = {During the last years, many software libraries for \emph{in-core} computation have been developed. Most internal memory algorithms perform very badly when used in an \emph{external memory} setting. We introduce LEDA-SM that extends the LEDA-library~\cite{LEDAbook} towards secondary memory computation. LEDA-SM uses I/O-efficient algorithms and data structures that do not suffer from the so called {\em I/O bottleneck}. LEDA is used for in-core computation. We explain the design of LEDA-SM and report on performance results. }, } @UNPUBLISHED{Crauser2000, AUTHOR = {Crauser, Andreas and Meyer, Ulrich and Brengel, Klaus}, JOURNAL = {Journal of Experimental Algorithmics}, TITLE = {An experimental study of priority queues in external memory}, ADDRESS = {New York, USA}, PUBLISHER = {ACM}, VOLUME = {5}, ISBN = {1084-6654}, YEAR = {2001}, PAGES = {24}, ABSTRACT = { In this paper we compare the performance of eight different priority queue implementations: four of them are explicitly designed to work in an external-memory setting, the others are standard internal-memory queues available in the LEDA library~\cite{leda}. Two of the external-memory priority queues are obtained by engineering known internal-memory priority queues with the aim of achieving effective performance on external storage devices (i.e., Radix heaps~\cite{Ahuja-et-al} and array heaps~\cite{Thorup}). Our experimental framework includes some simple tests, like random sequences of insert or delete-minimum operations, as well as more advanced tests consisting of intermixed sequences of update operations and ``application driven'' update sequences originated by simulations of Dijkstra's algorithm on large graph instances. Our variegate spectrum of experimental results gives a good picture of the features of these priority queues, thus being helpful to anyone interested in the use of such data structures on very large data sets. }, } @PHDTHESIS{Crauser2001, AUTHOR = {Crauser, Andreas}, TITLE = {LEDA-SM:External Memory Algorithms and Data Structures in Theory and Practice}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Doctoral dissertation}, MONTH = {March}, YEAR = {2001}, } @ARTICLE{Crochemore-et-al.97, AUTHOR = {Crochemore, Maxime and Galil, Zvi and Gasieniec, Leszek and Park, Kunsoo and Rytter, Wojciech}, JOURNAL = {SIAM Journal on Computing}, TITLE = {Constant-time Randomized Parallel String Matching}, NUMBER = {4}, VOLUME = {26}, YEAR = {1997}, PAGES = {950--960}, } @INPROCEEDINGS{Crochemore-Gasieniec-Rytter97, AUTHOR = {Crochemore, Maxime and Gasieniec, Leszek and Rytter, Wojciech}, EDITOR = {Carpentieri, B. and De Santis, A. and Vaccaro, U. and Storer, J. A.}, TITLE = {Constant-space string-matching in sublinear average time}, BOOKTITLE = {Compression and Complexity of SEQUENCES 1997}, PADDRESS = {-}, ADDRESS = {Positano,Italy}, PUBLISHER = {-}, YEAR = {1998}, PAGES = {230--239}, } @INPROCEEDINGS{croi13, AUTHOR = {Croitoru, Cosmina}, TITLE = {Abstract Debates}, BOOKTITLE = {IEEE International Conference on Tools with Artificial Intelligence (ICTAI) - 2013}, PADDRESS = {Washington, USA}, ADDRESS = {Washington, USA}, PUBLISHER = {IEEE Computer Society}, MONTH = {November}, YEAR = {2013}, } @INPROCEEDINGS{croikotzi12, AUTHOR = {Croitoru, Cosmina and K{\"o}tzing, Timo}, EDITOR = {Kersting, Kristian and Toussaint, Marc}, TITLE = {Deliberative Acceptability of Arguments}, BOOKTITLE = {STAIRS 2012 - Proceedings of the Sixth Starting AI Researchers' Symposium}, PADDRESS = {Amsterdam}, ADDRESS = {Montpellier, France}, PUBLISHER = {IOS Press}, MONTH = {August}, SERIES = {Frontiers in Artificial Intelligence and Applications}, VOLUME = {241}, ISBN = {978-1-61499-095-6}, DOI = {10.3233/978-1-61499-096-3-71}, YEAR = {2012}, PAGES = {71--82}, } @INPROCEEDINGS{croikotzi13, AUTHOR = {Croitoru, Cosmina and K{\"o}tzing, Timo}, TITLE = {A Normal Form for Argumentation Frameworks}, BOOKTITLE = {Theory and Applications of Formal Argumentation (TAFA'13)}, PADDRESS = {New York, USA}, ADDRESS = {Beijing, China}, PUBLISHER = {SPRINGER}, MONTH = {February}, SERIES = {Lecture Notes in Artificial Intelligence}, VOLUME = {8306}, ISBN = {978-3-642-54372-2}, YEAR = {2014}, PAGES = {32--45}, } @MASTERSTHESIS{CroitoruMaster2012, AUTHOR = {Croitoru, Cosima}, TITLE = {Algorithmic aspects of abstract argumentation frameworks}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {September}, YEAR = {2012}, PAGES = {X,75p.}, } @ARTICLE{CromemoreGasienicHariharanMuthukrishnanRytterSIAMJCOMPUT1998, AUTHOR = {Crochemore, Maxime and Gasieniec, Leszek and Hariharan, Ramesh and Muthukrishnan, S. and Rytter, Wojciech}, JOURNAL = {SIAM Journal on Computing}, TITLE = {A Constant Time Optimal Parallel Algorithm for Two-Dimensional Pattern Matching}, NUMBER = {3}, PUBLISHER = {SIAM}, MONTH = {June}, VOLUME = {27}, ISBN = {0097-5397}, YEAR = {1998}, PAGES = {668--681}, } @ARTICLE{crs98a, AUTHOR = {Sridharan, K and Subramanian, C. R. and Sudha, N}, JOURNAL = {Applied Mathematics Letters}, TITLE = {Some Properties of Touching Distances for Polygons and Polyhedra}, NUMBER = {5}, PUBLISHER = {Elsevier}, MONTH = {August}, VOLUME = {11}, ISBN = {0893-9659}, YEAR = {1998}, PAGES = {1--7}, } @ARTICLE{CRS98b, AUTHOR = {Subramanian, C. R. and F{\"u}rer, Martin and Veni Madhavan, C. E.}, JOURNAL = {Random Structures \& Algorithms}, TITLE = {Algorithms for Coloring Semi-random Graphs}, NUMBER = {2}, PUBLISHER = {Wiley}, MONTH = {September}, VOLUME = {13}, ISBN = {1042-9832}, YEAR = {1998}, PAGES = {125--158}, ABSTRACT = {Polynomial average time algorithms for $k$-coloring semi-random $k$-colorable graphs are presented and analyzed. Semi-random graphs are a generalization of random graphs and in terms of randomness, this model lies between random graphs and worst-case model. }, } @INPROCEEDINGS{crs98c, AUTHOR = {Schnorr, C. P. and Subramanian, C. R.}, EDITOR = {Luby, Michael and Rolim, Jos{\'e} and Serna, Maria}, TITLE = {Almost optimal (on the average) algorithms for boolean matrix product witnesses, computing the diameter}, BOOKTITLE = {Proceedings of the 2nd International Workshop on Randomization and Approximation Techniques in Computer Science (RANDOM-98)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Barcelona, Spain}, PUBLISHER = {Springer}, MONTH = {October}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1518}, ISBN = {3-540-65142-X}, YEAR = {1998}, PAGES = {218--231}, } @ARTICLE{crscpc, AUTHOR = {Subramanian, C. R.}, JOURNAL = {Combinatorics, Probability and Computing}, TITLE = {Algorithms for Colouring Random k-colourable Graphs}, ADDRESS = {Cambridge}, NUMBER = {1}, PUBLISHER = {Cambridge University Press}, VOLUME = {9}, ISBN = {0963-5483}, YEAR = {2000}, PAGES = {45--77}, NOTE = {The results of this paper have recently been improved to wider range of distributions. }, ABSTRACT = {Almost surely succeeding and polynomial average time algorithms for coloring random k-colorable graphs are presented. }, } @ARTICLE{crsjalg, AUTHOR = {Subramanian, C. R.}, JOURNAL = {Journal of Algorithms}, TITLE = {Minimum Coloring k-Colorable Graphs in Polynomial Average Time}, PUBLISHER = {Academic Press}, MONTH = {October}, VOLUME = {33}, YEAR = {1999}, PAGES = {112--123}, ABSTRACT = {We present algorithms for minimum coloring k-colorable graphs drawn from random and semi-random models. In the first model, each allowed edge is included with indpendent probability p. In the second model, an adversary is given the power to vary the edge probability as the random instance is built. Semi-random models were introduced as a way of striking a balance between random graphs and worst-case adversaries. Our algorithms run in polynomial time on the average. Minimum coloring is harder than k-coloring because even a ''short certificate'' is not presently known for the optimality of a coloring. }, } @INPROCEEDINGS{crsoda99, AUTHOR = {Subramanian, C. R.}, TITLE = {A Generalization of {Janson} inequalities and its application to finding shortest paths}, BOOKTITLE = {Proceedings of the 10th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-99)}, ORGANIZATION = {Association for Computing Machinery and Society for Industrial and Applied Mathematics}, PADDRESS = {New York, USA}, ADDRESS = {Baltimore, USA}, PUBLISHER = {ACM}, MONTH = {January}, YEAR = {1999}, PAGES = {795--804}, } @ARTICLE{Csaba06, AUTHOR = {Csaba, Bela and Lodha, S.}, JOURNAL = {Random Structures and Algorithms}, TITLE = {A randomized on-line algorithm for the k-server problem on the line}, NUMBER = {1}, MONTH = {August}, VOLUME = {29}, YEAR = {2006}, PAGES = {82--104}, } @ARTICLE{Csaba07, AUTHOR = {Csaba, Bela}, JOURNAL = {Combinatorics, Probability and Computing}, TITLE = {On the Bollobas-Eidrigde conjecture for bipartite graphs}, NUMBER = {1}, PUBLISHER = {Cambridge University Press}, MONTH = {January}, VOLUME = {16}, YEAR = {2007}, PAGES = {1--31}, } @TECHREPORT{Csaba2001, AUTHOR = {Csaba, Bela and Lodha, Sachin}, TITLE = {A randomized on-line algorithm for the k-server problem on a line}, INSTITUTION = {DIMACS-Center for Discrete Mathematics \& Theoretical Computer Science}, TYPE = {Technical Report}, ADDRESS = {Piscataway, NJ}, NUMBER = {DIMACS TechReport 2001-34}, MONTH = {October}, YEAR = {2001}, PAGES = {15}, ABSTRACT = {We give a $O(n^{2 \over 3}\log{n})$-competitive randomized $k$--server algorithm when the underlying metric space is given by $n$ equally spaced points on a line. For $n = k + o(k^{3 \over 2}/\log{k})$, this algorithm is $o(k)$--competitive.}, } @ARTICLE{Csaba2003a, AUTHOR = {Csaba, Bela}, JOURNAL = {Combinatorica}, TITLE = {Proof of a conjecture of {Bollobas} and {Eldridge} for graphs of maximum degree three}, ADDRESS = {Berlin, Germany}, NUMBER = {1}, PUBLISHER = {Springer}, VOLUME = {23}, ISBN = {0209-9683}, YEAR = {2003}, PAGES = {35--72}, ABSTRACT = {Let $G_1$ and $G_2$ be simple graphs on $n$ vertices. If there are edge-disjoint copies of $G_1$ and $G_2$ in $K_n$, then we say there is a packing of $G_1$ and $G_2$. A conjecture of Bollob\'as and Eldridge ~\cite{be78} asserts that if $(\Delta(G_1)+1)(\Delta(G_2)+1)\le n+1$ then there is a packing of $G_1$ and $G_2$. We prove this conjecture when $\Delta(G_1)=3$, for sufficiently large $n$.}, } @INPROCEEDINGS{CurticapeanK2013, AUTHOR = {Curticapean, Radu and K{\"u}nnemann, Marvin}, EDITOR = {Bodlaender, Hans L. and Italiano, Giuseppe F.}, TITLE = {A Quantization Framework for Smoothed Analysis of Euclidean Optimization Problems}, BOOKTITLE = {21st Annual European Symposium on Algorithms (ESA 2013)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Sophia Antipolis, France}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {8125}, ISBN = {978-3-642-40449-8}, DOI = {10.1007/978-3-642-40450-4_30}, YEAR = {2013}, PAGES = {349--360}, } @ARTICLE{CycleBasisSimplified, AUTHOR = {Mehlhorn, K. and Michail, D.}, JOURNAL = {ACM Transactions on Algorithms}, TITLE = {Minimum Cycle Bases: Faster and Simpler}, ADDRESS = {New York, NY}, NUMBER = {1}, PUBLISHER = {ACM}, VOLUME = {6}, ISBN = {1549-6325}, DOI = {10.1145/1644015.1644023}, YEAR = {2009}, PAGES = {8:1--8:13}, } @INPROCEEDINGS{CyganKratschPilipczukPilipczukWahlstroem2012, AUTHOR = {Cygan, Marek and Kratsch, Stefan and Pilipczuk, Marcin and Pilipczuk, Michał and Wahlstr{\"o}m, Magnus}, EDITOR = {Czumaj, Artur and Mehlhorn, Kurt and Pitts, Andrew M. and Wattenhofer, Roger}, TITLE = {Clique Cover and Graph Separation: {New} Incompressibility Results}, BOOKTITLE = {Automata, Languages, and Programming : 39th International Colloquium, ICALP 2012}, PADDRESS = {Berlin}, ADDRESS = {Warwick, UK}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {7391}, ISBN = {978-3-642-31593-0}, DOI = {10.1007/978-3-642-31594-7_22}, YEAR = {2012}, PAGES = {254--265}, } @ARTICLE{CyganPhilipPilipczukPilipczukWojtaszczyk2011, AUTHOR = {Cygan, Marek and Philip, Geevarghese and Pilipczuk, Marcin and Pilipczuk, Micha\l{} and Wojtaszczyk, Jakub Onufry}, JOURNAL = {Theoretical Computer Science}, TITLE = {Dominating set is fixed parameter tractable in claw-free graphs}, NUMBER = {50}, PUBLISHER = {Elsevier}, MONTH = {November}, VOLUME = {412}, ISBN = {0304-3975}, DOI = {10.1016/j.tcs.2011.09.010}, YEAR = {2011}, PAGES = {6982--7000}, ABSTRACT = {We show that the Dominating Set problem parameterized by solution size is fixed-parameter tractable (FPT) in graphs that do not contain the claw (\(K_{1,3}\), the complete bipartite graph on four vertices where the two parts have one and three vertices, respectively) as an \emph{induced} subgraph. We present an algorithm that uses $2^{O(k^2)} n^{O(1)}$ time and polynomial space to decide whether a claw-free graph on \(n\) vertices has a dominating set of size at most \(k\). Note that this parameterization of Dominating Set is W[2]-hard on the set of all graphs, and thus is unlikely to have an FPT algorithm for graphs in general. The most general class of graphs for which an FPT algorithm was previously known for this parameterization of Dominating Set is the class of \(K_{i,j}\)-free graphs, which exclude, for some fixed \(i,j\in\mathbb{N}\), the complete bipartite graph \(K_{i,j}\) as a \emph{subgraph}. For \(i,j\ge 2\), the class of claw-free graphs and any class of \(K_{i,j}\)-free graphs are not comparable with respect to set inclusion. We thus \emph{extend} the range of graphs over which this parameterization of Dominating Set is known to be fixed-parameter tractable. We also show that, in some sense, it is the presence of the claw that makes this parameterization of the Dominating Set problem hard. More precisely, we show that for any \(t\ge 4\), the Dominating Set problem parameterized by the solution size is W[2]-hard in graphs that exclude the \(t\)-claw \(K_{1,t}\) as an induced subgraph. Our arguments also imply that the related Connected Dominating Set and Dominating Clique problems are W[2]-hard in these graph classes. Finally, we show that for any \(t\in\mathbb{N}\), the Clique problem parameterized by solution size, which is W[1]-hard on general graphs, is FPT in \(t\)-claw-free graphs. Our results add to the small and growing collection of FPT results for graph classes defined by excluded \emph{subgraphs}, rather than by excluded \emph{minors}.}, } @INPROCEEDINGS{CzumajBV02+, AUTHOR = {Czumaj, Artur and V{\"o}cking, Berthold}, TITLE = {Tight bounds for worst-case equilibria}, BOOKTITLE = {Proceedings of the Thirteenth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-02)}, ORGANIZATION = {ACM/ SIAM}, PADDRESS = {New York, USA}, ADDRESS = {San Francisco, USA}, PUBLISHER = {ACM}, ISBN = {0-89871-513-X}, YEAR = {2002}, PAGES = {413--420}, } @INPROCEEDINGS{DamsHK2013, AUTHOR = {Dams, Johannes and Hoefer, Martin and Kesselheim, Thomas}, EDITOR = {Afek, Yehuda}, TITLE = {Sleeping Experts in Wireless Networks}, BOOKTITLE = {27th International Symposium on Distributed Computing (DISC-13)}, PADDRESS = {New York, USA}, ADDRESS = {Jerusalem, Israel}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {8205}, YEAR = {2013}, PAGES = {344--357}, } @INPROCEEDINGS{Das-et-al97, AUTHOR = {Das, Gautam and Fleischer, Rudolf and Gasieniec, Leszek and Gunopulos, Dimitrios and K{\"a}rkk{\"a}inen, Juha}, EDITOR = {Apostolico, Alberto and Hein, Jotun}, TITLE = {Episode matching}, BOOKTITLE = {Combinatorial pattern matching : 8th annual symposium (CPM-97)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Aarhus, Denmark}, PUBLISHER = {Springer}, MONTH = {June}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1264}, ISBN = {0302-9743}, YEAR = {1997}, PAGES = {12--27}, } @INPROCEEDINGS{Das-Kapoor-Smid96, AUTHOR = {Das, Gautam and Kapoor, Sanjiv and Smid, Michiel}, EDITOR = {Chandru, V. and Vinay, V.}, TITLE = {On the complexity of approximating Euclidean traveling salesman tours and minimum spanning trees}, BOOKTITLE = {Foundations of software technology and theoretical computer science (FSTTCS-96) : 16th conference}, PADDRESS = {Berlin, Germany}, ADDRESS = {Hyderabad, India}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1180}, YEAR = {1996}, PAGES = {64--75}, } @ARTICLE{Das-Kapoor-Smid97, AUTHOR = {Das, Gautam and Kapoor, Sanjiv and Smid, Michiel}, EDITOR = {Chandru, V. and Vinay, V.}, JOURNAL = {Algorithmica}, TITLE = {On the complexity of approximating Euclidean traveling salesman tours and minimum spanning trees}, BOOKTITLE = {16th Conference on Foundations of Software Technology and Theoretical Computer Science}, ADDRESS = {Berlin, Germany}, PUBLISHER = {Springer}, VOLUME = {19}, ISBN = {0178-4617}, YEAR = {1997}, PAGES = {447--460}, } @INPROCEEDINGS{DBLP:conf/gi/NaherM90, AUTHOR = {N{\"a}her, Stefan and Mehlhorn, Kurt}, EDITOR = {Reuter, Andreas}, TITLE = {LEDA - A Library of Efficient Data Types and Algorithms}, BOOKTITLE = {GI - 20. Jahrestagung I, Informatik auf dem Weg zum Anwender}, PADDRESS = {Berlin, Germany}, ADDRESS = {Stuttgart, Germany}, PUBLISHER = {Springer}, SERIES = {Informatik-Fachberichte}, VOLUME = {257}, ISBN = {3-540-53212-9}, YEAR = {1990}, PAGES = {35--39}, } @INPROCEEDINGS{DBLP:conf/stacs/Meyer08, AUTHOR = {Meyer, Ulrich}, EDITOR = {Albers, Susanne and Weil, Pascal and Rochange, Christine}, TITLE = {On Dynamic Breadth-First Search in External-Memory}, BOOKTITLE = {Proc. 25th Annual Symposium on Theoretical Aspects (STACS)}, PADDRESS = {Dagstuhl}, ADDRESS = {Bordeaux, France}, PUBLISHER = {IBFI}, MONTH = {February}, SERIES = {Dagstuhl Seminar Proceedings}, VOLUME = {08001}, ISBN = {978-3-939897-06-4}, YEAR = {2008}, PAGES = {551--560}, } @ARTICLE{DBLP:journals/corr/abs-1304-8069, AUTHOR = {Kobel, Alexander and Sagraloff, Michael}, JOURNAL = {arXiv}, TITLE = {Fast Approximate Polynomial Multipoint Evaluation and Applications}, ADDRESS = {Ithaca, NY}, PUBLISHER = {Cornell University Library}, MONTH = {April}, VOLUME = {abs/1304.8069}, YEAR = {2013}, PAGES = {17}, ABSTRACT = {It is well known that, using fast algorithms for polynomial multiplication and division, evaluation of a polynomial $F\in\mathbb{C}[x]$ of degree $n$ at $n$ complex-valued points can be done with $\tilde{O}(n)$ exact field operations in $\mathbb{C},$ where $\tilde{O}(\cdot)$ means that we omit polylogarithmic factors. We complement this result by an analysis of \emph{approximate multipoint evaluation} of $F$ to a precision of $L$ bits after the binary point and prove a bit complexity of $\tilde{O} (n(L + \tau + n\Gamma)),$ where $2^\tau$ and $2^\Gamma,$ with $\tau, \Gamma \in \mathbb{N}_{\ge 1},$ are bounds on the magnitude of the coefficients of $F$ and the evaluation points, respectively. In particular, in the important case where the precision demand dominates the other input parameters, the complexity is soft-linear in $n$ and $L.$ Our result on approximate multipoint evaluation has some interesting consequences on the bit complexity of three further approximation algorithms which all use polynomial evaluation as a key subroutine. This comprises an algorithm to approximate the real roots of a polynomial, an algorithm for polynomial interpolation, and a method for computing a Taylor shift of a polynomial. For all of the latter algorithms, we derive near optimal running times.}, } @ARTICLE{DCFS2010, AUTHOR = {Cooper, Joshua and Doerr, Benjamin and Friedrich, Tobias and Spencer, Joel}, JOURNAL = {Random Structures and Algorithms}, TITLE = {Deterministic Random Walks on Regular Trees}, ADDRESS = {Chichester}, NUMBER = {3}, PUBLISHER = {Wiley}, MONTH = {October}, VOLUME = {37}, ISBN = {1042-9832}, DOI = {10.1002/rsa.20314}, YEAR = {2010}, PAGES = {353--366}, } @ARTICLE{DDJMRR96, AUTHOR = {De Simone, Caterina and Diehl, Martin and J{\"u}nger, Michael and Mutzel, Petra and Reinelt, Gerhard and Rinaldi, Giovanni}, JOURNAL = {Journal of Statistical Physics}, TITLE = {Exact Ground States of Two-Dimensional +-J Ising Spin Glasses}, NUMBER = {5/6}, VOLUME = {84}, YEAR = {1996}, PAGES = {1363--1371}, } @ARTICLE{deBerg-vanKreveld-Schirra1998, AUTHOR = {de Berg, Marc and van Kreveld, Marc and Schirra, Stefan}, JOURNAL = {Cartography and Geographic Information Systems}, TITLE = {Topologically correct subdivision simplification using the bandwidth criterion}, NUMBER = {4}, PUBLISHER = {American Congress on Surveying and Mapping}, MONTH = {October}, VOLUME = {25}, YEAR = {1998}, PAGES = {243--257}, ABSTRACT = {The line simplification problem is an old and well studied problem in cartography. Although there are several algorithms to compute a simplification there seems to be no algorithms that perform line simplification in the context of other geographical objects. This paper presents a nearly quadratic time algorithm for the following line simplification problem: Given a polygonal line, a set of extra points, and a real $\epsilon > 0$, compute a simplification that guarantees (i) a maximum error $\epsilon$; (ii) that the extra points remain on the same side of the simplified chain as on the original chain; and (iii) that the simplified chain has no self-intersections. The algorithm is applied as the main subroutine for subdivision simplification and guarantees that the resulting subdivision is topologically correct.}, } @INPROCEEDINGS{deBerg-vanKreveld-Schirra95, AUTHOR = {Berg, Marc de and Kreveld, Marc van and Schirra, Stefan}, TITLE = {A new approach to subdivision simplification}, BOOKTITLE = {ACSM/ASPRS Annual Convention \& Exposition Technical Papers}, PADDRESS = {Bethesda, USA}, ADDRESS = {Charlotte, North Carolina, USA}, PUBLISHER = {ACSM}, YEAR = {1995}, PAGES = {79--88}, } @PROCEEDINGS{deBergSchirra2002, EDITOR = {de Berg, Marc and Schirra, Stefan}, TITLE = {Selected papers from the 16th Annual Symposium on Computational Geometry (SoCG-00)}, PADDRESS = {Singapore}, ADDRESS = {Hong Kong University of Science and Technology, China}, NUMBER = {1/2}, PUBLISHER = {World Scientific}, SERIES = {International Journal of Computational Geometry \& Applications}, VOLUME = {12}, ISBN = {0218-1959}, YEAR = {2002}, PAGES = {172}, } @INPROCEEDINGS{deBergSchirraSoCG2002, AUTHOR = {de Berg, Marc and Schirra, Stefan}, EDITOR = {de Berg, Marc and Schirra, Stefan}, TITLE = {Guest Editors' Foreword}, BOOKTITLE = {Selected papers from the 16th Annual Symposium on Computational Geometry (SoCG-00)}, PADDRESS = {Singapore}, ADDRESS = {Hong Kong University of Science and Technology, China}, NUMBER = {1/2}, PUBLISHER = {World Scientific}, SERIES = {International Journal of Computational Geometry \& Applications}, VOLUME = {12}, ISBN = {0218-1959}, YEAR = {2002}, PAGES = {1--2}, } @INPROCEEDINGS{Dedo-Gergov-Hagerup95, AUTHOR = {Dedorath, J{\"u}rgen and Gergov, Jordan and Hagerup, Torben}, EDITOR = {Staples, John and Eades, Peter and Katoh, Naoki and Moffat, Alistair}, TITLE = {More Efficient Parallel Flow Algorithms}, BOOKTITLE = {Algorithms and Computation: 6th International Symposium (ISAAC95)}, PADDRESS = {Berlin}, ADDRESS = {Cairns, Australia}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1004}, YEAR = {1995}, PAGES = {234--243}, } @INPROCEEDINGS{Dementiev2004SearchTree, AUTHOR = {Dementiev, Roman and Kettner, Lutz and Mehnert, Jens and Sanders, Peter}, EDITOR = {Arge, Lars and Italiano, Giuseppe F. and Sedgewick, Robert}, TITLE = {Engineering a Sorted List Data Structure for 32 Bit Key}, BOOKTITLE = {Proceedings of the Sixth Workshop on Algorithm Engineering and Experiments and the First Workshop on Analytic Algorithmics and Combinatorics (ALENEX-04)}, PADDRESS = {Philadelphia, USA}, ADDRESS = {New Orleans, LA, USA}, PUBLISHER = {SIAM}, MONTH = {January}, ISBN = {0-89871-564-4}, YEAR = {2004}, PAGES = {142--151}, ABSTRACT = {Search tree data structures like van Emde Boas trees are a theoretically attractive alternative to comparison based search trees because they have better asymptotic performance for small integer keys and large inputs. This paper studies their practicability using 32 bit keys as an example. While direct implementations of van Emde Boas trees cannot compete with good implementations of comparison based data structures, our tuned data structure significantly outperforms comparison based implementations for searching and shows at least comparable performance for insertion and deletion.}, } @INPROCEEDINGS{DeMeRa1999, AUTHOR = {Dey, Tamal K. and Mehlhorn, Kurt and Ramos, Edgar A.}, TITLE = {Curve reconstruction: Connecting dots with good reason}, BOOKTITLE = {Proceedings of the 15th Annual Symposium on Computational Geometry (SCG-99)}, PADDRESS = {New York, USA}, ADDRESS = {Miami Beach, Florida}, PUBLISHER = {ACM}, YEAR = {1999}, PAGES = {197--206}, ABSTRACT = {Curve reconstruction algorithms are supposed to reconstruct curves from point samples. Recent papers present algorithms that come with a guarantee: Given a sufficiently dense sample of a closed smooth curve, the algorithms construct the correct polygonal reconstruction. Nothing is claimed about the output of the algorithms, if the input is not a dense sample of a closed smooth curve, e.g., a sample of a curve with endpoints. We present an algorithm that comes with a guarantee for any set $P$ of input points. The algorithm constructs a polygonal reconstruction $G$ and a smooth curve $\Gamma$ that justifies $G$ as the reconstruction from $P$.}, } @INPROCEEDINGS{DemSan03, AUTHOR = {Dementiev, Roman and Sanders, Peter}, TITLE = {Asynchronous Parallel Disk Sorting}, BOOKTITLE = {Proceedings of the 15th ACM Symposium on Parallel Algorithms and Architectures (SPAA-03)}, ORGANIZATION = {ACM}, PADDRESS = {New York, USA}, ADDRESS = {San Diego, USA}, PUBLISHER = {ACM}, ISBN = {1581136617}, YEAR = {2003}, PAGES = {138--148}, } @ARTICLE{Deng-Mahajan97, AUTHOR = {Deng, Xiaotie and Mahajan, Sanjeev}, JOURNAL = {SIAM Journal on Computing}, TITLE = {The Cost of Derandomization: Computability or Competitiveness}, NUMBER = {3}, VOLUME = {26}, YEAR = {1997}, PAGES = {786--802}, } @INPROCEEDINGS{Denny03, AUTHOR = {Denny, Markus}, EDITOR = {Brunet, Pere and Fellner, Dieter W.}, TITLE = {Solving geometric optimization problems using graphics hardware}, BOOKTITLE = {EUROGRAPHICS 2003 : the European Association for Computer Graphics 24th Annual Conference}, ORGANIZATION = {European Association for Computer Graphics}, PADDRESS = {Oxford, UK}, ADDRESS = {Granada, Spain}, PUBLISHER = {Blackwell}, SERIES = {Computer Graphics Forum}, VOLUME = {22}, YEAR = {2003}, PAGES = {441--451}, } @MASTERSTHESIS{Denny94, AUTHOR = {Denny, Markus}, TITLE = {{Monotones H{\"a}ufen und Token Distribution auf dem Hypercube}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, YEAR = {1994}, } @UNPUBLISHED{DeSterckDescent, AUTHOR = {De Sterck, Hans}, TITLE = {Steepest Descent Preconditioning for Nonlinear GMRES Optimization}, YEAR = {2012}, NOTE = {accepted for "Numerical Linear Algebra with Applications"}, } @ARTICLE{DeSterckNGMRES, AUTHOR = {De Sterck, Hans}, JOURNAL = {SIAM Journal on Scientific Computing}, TITLE = {A Nonlinear {GMRES} Optimization Algorithm for Canonical Tensor Decomposition}, ADDRESS = {Philadelphia, PA}, PUBLISHER = {SIAM}, VOLUME = {34}, ISBN = {1064-8275}, DOI = {10.1137/110835530}, YEAR = {2012}, PAGES = {A1351--A1379}, } @ARTICLE{DeSterckSVD, AUTHOR = {De Sterck, Hans}, JOURNAL = {SIAM Journal on Scientific Computing}, TITLE = {A Self-learning Algebraic Multigrid Method for Extremal Singular Triplets and Eigenpairs}, ADDRESS = {Philadelphia, PA}, NUMBER = {4}, PUBLISHER = {SIAM}, VOLUME = {34}, ISBN = {1064-8275}, DOI = {10.1137/110823316}, YEAR = {2012}, PAGES = {A2092--A2117}, } @INPROCEEDINGS{DF2006, AUTHOR = {Doerr, Benjamin and Friedrich, Tobias}, EDITOR = {Asano, Tetsuo}, TITLE = {Deterministic Random Walks on the Two-Dimensional Grid}, BOOKTITLE = {Algorithms and Computation : 17th International Symposium, ISAAC 2006}, PADDRESS = {Berlin, Germany}, ADDRESS = {Kolkata, India}, PUBLISHER = {Springer}, MONTH = {December}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4288}, ISBN = {3-540-49694-6}, YEAR = {2006}, PAGES = {474--483}, ABSTRACT = {Deterministic and randomized balancing schemes are used to distribute workload evenly in networks. In this paper, we compare two very general ones: The random walk and the (deterministic) Propp machine. Roughly speaking, we show that on the two-dimensional grid, the Propp machine always has the same number of tokens on a node as does the random walk in expectation, apart from an additive error of less than eight. This constant is independent of the total number of tokens and the runtime of the two processes. However, we also show that it makes a difference whether the Propp machine serves the neighbors in a circular or non-circular order.}, } @ARTICLE{DF2009, AUTHOR = {Doerr, Benjamin and Friedrich, Tobias}, JOURNAL = {Combinatorics, Probability and Computing}, TITLE = {Deterministic Random Walks on the Two-Dimensional Grid}, ADDRESS = {Cambridge}, NUMBER = {1-2}, PUBLISHER = {Cambridge University Press}, VOLUME = {18}, ISBN = {0963-5483}, DOI = {10.1017/S0963548308009589}, YEAR = {2009}, PAGES = {123--144}, } @ARTICLE{DF2010b, AUTHOR = {Doerr, Benjamin and Fouz, Mahmoud}, JOURNAL = {Information Processing Letters}, TITLE = {Quasi-random rumor spreading: {Reducing} randomness can be costly}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {5}, PUBLISHER = {Elsevier}, MONTH = {February}, VOLUME = {111}, ISBN = {0020-0190}, DOI = {10.1016/j.ipl.2010.11.006}, YEAR = {2011}, PAGES = {227--230}, } @INPROCEEDINGS{DFF11, AUTHOR = {Doerr, Benjamin and Fouz, Mahmoud and Friedrich, Tobias}, EDITOR = {Ne{\v{s}}et{\v{r}}il, Jarik and Gy{\H{o}}ri, Ervin and Sali, Attila}, JOURNAL = {Electronic Notes in Discrete Mathematics}, TITLE = {Social Networks Spread Rumors in Sublogarithmic Time}, BOOKTITLE = {The Sixth European Conference on Combinatorics, Graph Theory and Applications, EuroComb 2011}, PADDRESS = {Amsterdam}, ADDRESS = {Budapaest}, PUBLISHER = {Elsevier}, SERIES = {Electronic Notes in Discrete Mathematics}, VOLUME = {38}, DOI = {10.1016/j.endm.2011.09.050}, YEAR = {2011}, PAGES = {303--308}, } @INPROCEEDINGS{DFKM08, AUTHOR = {Dumitriu, Daniel and Funke, Stefan and Kutz, Martin and Milosavljevic, Nikola}, TITLE = {How much {G}eometry it takes to {R}econstruct a 2-{M}anifold in $R^3$}, BOOKTITLE = {10th Workshop on Algorithm Engineering and Experiments (ALENEX-2008)}, ORGANIZATION = {ACM-SIAM}, PADDRESS = {Philadelphia, USA}, ADDRESS = {San Francisco, USA}, PUBLISHER = {SIAM}, YEAR = {2008}, PAGES = {65--74}, ABSTRACT = {Known algorithms for reconstructing a 2-manifold from a point sample in R3 are naturally based on deci- sions/predicates that take the geometry of the point sample into account. Facing the always present problem of round-off errors that easily compromise the exactness of those predi- cate decisions, an exact and robust implementation of these algorithms is far from being trivial and typically requires the employment of advanced datatypes for exact arithmetic as provided by libraries like CORE, LEDA or GMP. In this paper we present a new reconstruction algorithm, one of whose main novelties is to throw away geometry informa- tion early on in the reconstruction process and to mainly operate combinatorially on a graph structure. As such it is less susceptible to robustness problems due to round-off errors and also benefits from not requiring expensive exact arithmetic by faster running times. A more theoretical view on our algorithm including correctness proofs under suitable sampling conditions can be found in a companion paper [3].}, } @INPROCEEDINGS{DFKM2008b, AUTHOR = {Dumitriu, Daniel and Funke, Stefan and Kutz, Martin and Milosavljevic, Nikola}, EDITOR = {Gudmundsson, Joachim}, TITLE = {On the Locality of Extracting a 2-Manifold in $R^3$}, BOOKTITLE = {11th Scandinavian Workshop on Algorithm Theory (SWAT-2008)}, PADDRESS = {Heidelberg, Germany}, ADDRESS = {G{\"o}teborg, Sweden}, PUBLISHER = {Springer}, MONTH = {July}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5124}, ISBN = {978-3-540-69900-2}, YEAR = {2008}, PAGES = {270--281}, ABSTRACT = {Algorithms for reconstructing a 2-manifold from a point sample in R^3 based on Voronoi-filtering like CRUST or CoCone still require -- after identifying a set of candidate triangles -- a so-called manifold extraction step which identifies a subset of the candidate triangles to form the final reconstruction surface. Non-locality of the latter step is caused by so-called slivers -- configurations of four almost cocircular points having an empty circumsphere with center close to the manifold surface. We prove that under a certain mild condition -- local uniformity -- which typically holds in practice but can also be enforced theoretically, one can compute a reconstruction using an algorithm whose decisions about the adjacencies of a point only depend on nearby points. While the theoretical proof requires an extremely high sampling density, our prototype implementation, described in a companion paper, performs well on typical sample sets. Due to its local mode of computation, it might be particularly suited for parallel computing or external memory scenarios.}, } @ARTICLE{DFKM2009, AUTHOR = {Dumitriu, Daniel and Funke, Stefan and Kutz, Martin and Milosavljevic, Nikola}, JOURNAL = {ACM Journal of Experimental Algorithms}, TITLE = {How Much Geometry It Takes to Reconstruct a 2-Manifold in {R} 3}, ADDRESS = {New York, NY}, PUBLISHER = {ACM}, MONTH = {May}, VOLUME = {14}, ISBN = {1084-6654}, DOI = {10.1145/1498698.1537597}, YEAR = {2009}, PAGES = {2.2:1--2.2:17}, ABSTRACT = {Known algorithms for reconstructing a 2-manifold from a point sample in R3 are naturally based on decisions/predicates that take the geometry of the point sample into account. Facing the always present problem of round-off errors that easily compromise the exactness of those predicate decisions, an exact and robust implementation of these algorithms is far from being trivial and typically requires employment of advanced datatypes for exact arithmetic, as provided by libraries like CORE, LEDA, or GMP. In this article, we present a new reconstruction algorithm, one whose main novelties is to throw away geometry information early on in the reconstruction process and to mainly operate combinatorially on a graph structure. More precisely, our algorithm only requires distances between the sample points and not the actual embedding in R3. As such, it is less susceptible to robustness problems due to round-off errors and also benefits from not requiring expensive exact arithmetic by faster running times. A more theoretical view on our algorithm including correctness proofs under suitable sampling conditions can be found in a companion article.}, } @INPROCEEDINGS{dfkmsssw2003, AUTHOR = {Dhiflaoui, Marcel and Funke, Stefan and Kwappik, Carsten and Mehlhorn, Kurt and Seel, Michael and Sch{\"o}mer, Elmar and Schulte, Ralph and Weber, Dennis}, TITLE = {Certifying and Repairing Solutions to Large LPs - How Good are LP-Solvers?}, BOOKTITLE = {Proceedings of the 14th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-03)}, ORGANIZATION = {Association of Computing Machinery (ACM); Society for Industrial and Applied Mathematics (SIAM)}, PADDRESS = {New York, USA}, ADDRESS = {Baltimore, USA}, PUBLISHER = {ACM}, MONTH = {January}, YEAR = {2003}, PAGES = {255--256}, } @INPROCEEDINGS{DFKO05, AUTHOR = {Doerr, Benjamin and Friedrich, Tobias and Klein, Christian and Osbild, Ralf}, EDITOR = {Erlebach, Thomas and Persiano, Pino}, TITLE = {Rounding of Sequences and Matrices, with Applications}, BOOKTITLE = {Third Workshop on Approximation and Online Algorithms (WAOA 2005)}, PADDRESS = {Heidelberg, Germany}, ADDRESS = {Palma de Mallorca, Spain}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {3879}, ISBN = {3-540-32207-8}, YEAR = {2005}, PAGES = {96--109}, ABSTRACT = {We show that any real matrix can be rounded to an integer matrix in such a way that the rounding errors of all row sums are less than one, and the rounding errors of all column sums as well as all sums of consecutive row entries are less than two. Such roundings can be computed in linear time. This extends and improves previous results on rounding sequences and matrices in several directions. It has particular applications in just-in-time scheduling, where balanced schedules on machines with negligible switch over costs are sought after. Here we extend existing results to multiple machines and non-constant production rates.}, } @INPROCEEDINGS{DFKO06, AUTHOR = {Doerr, Benjamin and Friedrich, Tobias and Klein, Christian and Osbild, Ralf}, EDITOR = {Arge, Lars and Freivalds, Rusins}, TITLE = {Unbiased Matrix Rounding}, BOOKTITLE = {Algorithm theory - SWAT 2006 : 10th Scandinavian Workshop on Algorithm Theory}, PADDRESS = {Berlin, Germany}, ADDRESS = {Riga, Latvia}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4059}, ISBN = {978-3-540-35753-7}, YEAR = {2006}, PAGES = {102--112}, ABSTRACT = {We show several ways to round a real matrix to an integer one in such a way that the rounding errors in all rows and columns as well as the whole matrix are less than one. This is a classical problem with applications in many fields, in particular, statistics. We improve earlier solutions of different authors in two ways. For rounding $m \times n$ matrices, we reduce the runtime from $O( (m n)^2 ) $ to $O(m n \log(m n))$. Second, our roundings also have a rounding error of less than one in all initial intervals of rows and columns. Consequently, arbitrary intervals have an error of at most two. This is particularly useful in the statistics application of controlled rounding. The same result can be obtained via (dependent) randomized rounding. This has the additional advantage that the rounding is unbiased, that is, for all entries $y_{ij}$ of our rounding, we have $E(y_{ij}) = x_{ij}$, where $x_{ij}$ is the corresponding entry of the input matrix.}, } @UNPUBLISHED{DFKP, AUTHOR = {Dessmark, Anders and Fraigniaud, Pierre and Kowalski, Dariusz and Pelc, Andrzej}, TITLE = {Deterministic rendezvous in graphs}, YEAR = {2006}, NOTE = {Invited to Algorithmica. Part of this work was published in ISAAC 2004.}, } @ARTICLE{DFKP2006, AUTHOR = {Dessmark, Anders and Fraigniaud, Pierre and Kowalski, Dariusz and Pelc, Andrzej}, JOURNAL = {Algorithmica}, TITLE = {Deterministic Rendezvous in Graphs}, NUMBER = {1}, VOLUME = {46}, ISBN = {0178-4617}, YEAR = {2006}, PAGES = {69--96}, NOTE = {Part of this work was published in ISAAC 2004.}, ABSTRACT = {Two mobile agents having distinct identifiers and located in nodes of an unknown anonymous connected graph, have to meet at some node of the graph. We seek fast deterministic algorithms for this rendezvous problem, under two scenarios: simultaneous startup, when both agents start executing the algorithm at the same time, and arbitrary startup, when starting times of the agents are arbitrarily decided by an adversary. The measure of performance of a rendezvous algorithm is its cost: for a given initial location of agents in a graph, this is the number of steps since the startup of the later agent until rendezvous is achieved. We first show that rendezvous can be completed at cost O(n + log l) on any n-node tree, where l is the smaller of the two identifiers, even with arbitrary startup. This complexity of the cost cannot be improved for some trees, even with simultaneous startup. Efficient rendezvous in trees relies on fast network exploration and cannot be used when the graph contains cycles. We further study the simplest such network, i.e., the ring. We prove that, with simultaneous startup, optimal cost of rendezvous on any ring is Θ(D log l), where D is the initial distance between agents. We also establish bounds on rendezvous cost in rings with arbitrary startup. For arbitrary connected graphs, our main contribution is a deterministic rendezvous algorithm with cost polynomial in n, τ and log l, where τ is the difference between startup times of the agents. We also show a lower bound Ω (n2) on the cost of rendezvous in some family of graphs. If simultaneous startup is assumed, we construct a generic rendezvous algorithm, working for all connected graphs, which is optimal for the class of graphs of bounded degree, if the initial distance between agents is bounded.}, } @INPROCEEDINGS{DFKS09, AUTHOR = {Doerr, Benjamin and Friedrich, Tobias and K{\"u}nnemann, Marvin and Sauerwald, Thomas}, EDITOR = {Finocchi, Irene and Hershberger, John}, TITLE = {Quasirandom Rumor Spreading: An Experimental Analysis}, BOOKTITLE = {2009 Proceedings of the Eleventh Workshop on Algorithm Engineering and Experiments (ALENEX)}, PADDRESS = {Philadelphia, Pa.}, ADDRESS = {New York, USA}, PUBLISHER = {SIAM}, ISBN = {978-0-898719-30-7}, YEAR = {2009}, PAGES = {145--153}, } @INPROCEEDINGS{DFR2001, AUTHOR = {Dey, Tamal K. and Funke, Stefan and Ramos, Edgar A.}, TITLE = {Surface Reconstruction in almost Linear Time under Locally Uniform Sampling}, BOOKTITLE = {Proceedings of the 17th European Workshop on Computational Geometry (EWCG-01)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Berlin, Germany}, PUBLISHER = {Freie Universit{\"a}t Berlin}, MONTH = {March}, YEAR = {2001}, PAGES = {129--132}, } @INPROCEEDINGS{DG2010a, AUTHOR = {Doerr, Benjamin and Goldberg, Leslie Ann}, EDITOR = {Schaefer, Robert and Cotta, Carlos and Kolodziej, Joanna and Rudolph, G{\"u}nter}, TITLE = {Drift Analysis with Tail Bounds}, BOOKTITLE = {Parallel Problem Solving from Nature – PPSN XI. - Pt. 1}, PADDRESS = {Berlin}, ADDRESS = {Krakow, Poland}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6238}, ISBN = {978-3-642-15843-8}, DOI = {10.1007/978-3-642-15844-5_18}, YEAR = {2010}, PAGES = {174--183}, } @INPROCEEDINGS{DG2010b, AUTHOR = {Doerr, Benjamin and Goldberg, Leslie Ann}, EDITOR = {Schaefer, Robert and Cotta, Carlos and Kolodziej, Joanna and Rudolph, G{\"u}nter}, TITLE = {Adaptive Drift Analysis}, BOOKTITLE = {Parallel Problem Solving from Nature -- PPSN XI. -- Pt. 1}, PADDRESS = {Berlin}, ADDRESS = {Krakow, Poland}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6238}, ISBN = {978-3-642-15843-8}, DOI = {10.1007/978-3-642-15844-5_4}, YEAR = {2010}, PAGES = {32--41}, } @ARTICLE{DGW10, AUTHOR = {Doerr, Benjamin and Gnewuch, Michael and Wahlstr{\"o}m, Magnus}, JOURNAL = {Journal of Complexity}, TITLE = {Algorithmic construction of low-discrepancy point sets via dependent randomized rounding}, ADDRESS = {Amsterdam}, NUMBER = {5}, PUBLISHER = {Elsevier}, VOLUME = {26}, ISBN = {0885-064X}, DOI = {10.1016/j.jco.2010.03.004}, YEAR = {2010}, PAGES = {490--507}, } @INPROCEEDINGS{DHL2009, AUTHOR = {Doerr, Benjamin and Huber, Anna and Levavi, Ariel}, EDITOR = {Dong, Yingfei and Du, Ding-Zhu and Ibarra, Oscar}, TITLE = {Strong robustness of randomized rumor spreading protocols}, BOOKTITLE = {Algorithms and Computation : 20th International Symposium, ISAAC 2009}, PADDRESS = {Berlin}, ADDRESS = {Hawaii, USA}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5878}, ISBN = {978-3-642-10630-9}, DOI = {10.1007/978-3-642-10631-6_82}, YEAR = {2009}, PAGES = {812--821}, NOTE = {Full version available from arXiv:1001.3056}, ABSTRACT = {Randomized rumor spreading is a classical protocol to disseminate information across a network. At SODA 2008, a quasirandom version of this protocol was proposed and competitive bounds for its run-time were proven. This prompts the question: to what extent does the quasirandom protocol inherit the second principal advantage of randomized rumor spreading, namely robustness against transmission failures? In this paper, we present a result precise up to $(1 \pm o(1))$ factors. We limit ourselves to the network in which every two vertices are connected by a direct link. Run-times accurate to their leading constants are unknown for all other non-trivial networks. We show that if each transmission reaches its destination with a probability of $p \in (0,1]$, after $(1+\e)\left(\frac{1}{\log_2(1+p)}\log_2n+\frac{1}{p}\ln n\right)$ rounds the quasirandom protocol has informed all $n$ nodes in the network with probability at least $1-n^{-p\e/40}$. Note that this is faster than the intuitively natural $1/p$ factor increase over the run-time of approximately $\log_2 n + \ln n $ for the non-corrupted case. We also provide a corresponding lower bound for the classical model. This demonstrates that the quasirandom model is at least as robust as the fully random model despite the greatly reduced degree of independent randomness.}, } @UNPUBLISHED{DHS2011, AUTHOR = {De Sterck, Hans and Henson, Van Emden and Sanders, Geoff}, TITLE = {Multilevel Aggregation Methods for Small-World Graphs with Application to Random-Walk Ranking}, YEAR = {2011}, NOTE = {to appear in Computing and Informatics}, } @MASTERSTHESIS{Dickert2000, AUTHOR = {Dickert, Peter}, TITLE = {{Berechnung von Einfach-und Zweifachzusammenhangskomponenten auf einer PRAM}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {February}, YEAR = {2000}, } @ARTICLE{DiedrichHarrenJansenThoeleThomas2008, AUTHOR = {Diedrich, Florian and Harren, Rolf and Jansen, Klaus and Th{\"o}le, Ralf and Thomas, Henning}, JOURNAL = {Journal of Science and Technology}, TITLE = {Approximation Algorithms for 3D Orthogonal Knapsack}, ADDRESS = {Berlin / Heidelberg}, NUMBER = {5}, PUBLISHER = {Springer}, MONTH = {November}, VOLUME = {23}, ISBN = {1860-4749}, DOI = {10.1007/s11390-008-9170-7}, YEAR = {2008}, PAGES = {749--762}, ABSTRACT = {We study non-overlapping axis-parallel packings of 3D boxes with profits into a dedicated bigger box where rotation is either forbidden or permitted; we wish to maximize the total profit. Since this optimization problem is NP-hard, we focus on approximation algorithms. We obtain fast and simple algorithms for the non-rotational scenario with approximation ratios $9+\epsilon$ and $8+\epsilon$ as well as an algorithm with approximation ratio $7+\epsilon$ that uses more sophisticated techniques; these are the smallest approximation ratios known for this problem. Furthermore, we show how the used techniques can be adapted to the case where rotation by $90^{\circ}$ either around the $z$-axis or around all axes is permitted, where we obtain algorithms with approximation ratios $6+\epsilon$ and $5+\epsilon$, respectively. Finally our methods yield a 3D generalization of a packability criterion and a strip packing algorithm with absolute approximation ratio $\textfrac{29}{4}$, improving the previously best known result of $\textfrac{45}{4}$.}, } @INPROCEEDINGS{DieKehNeu2008, AUTHOR = {Diedrich, Florian and Kehden, Britta and Neumann, Frank}, EDITOR = {Berghammer, Rudolf and M{\"o}ller, Bernhard and Struth, Georg}, TITLE = {Multi-objective Problems in Terms of Relational Algebra}, BOOKTITLE = {Relations and Kleene Algebra in Computer Science 2008}, PADDRESS = {Berlin}, ADDRESS = {Frauenw{\"o}rth, Germany}, PUBLISHER = {Springer}, MONTH = {April}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4988}, YEAR = {2008}, PAGES = {84--98}, } @INPROCEEDINGS{DieNeuCEC2008, AUTHOR = {Diedrich, Florian and Neumann, Frank}, TITLE = {Using Fast Matrix Multiplication in Bio-Inspired Computation for Complex Optimization Problems}, BOOKTITLE = {IEEE Congress on Evolutionary Computation 2008}, PADDRESS = {Vancouver, CA}, ADDRESS = {Hong Kong}, PUBLISHER = {IEEE}, YEAR = {2008}, PAGES = {3828--3833}, } @MASTERSTHESIS{Diete95, AUTHOR = {Diete, Iris}, TITLE = {{Berechnung der Kontaktoberfl{\"a}che eines Molek{\"u}ls}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, YEAR = {1995}, } @ARTICLE{DigHalf2003, AUTHOR = {Doerr, Benjamin}, JOURNAL = {Eurocomb '03}, TITLE = {Non-independent Randomized Rounding, Linear Discrepancy and an Application to Digital Halftoning}, VOLUME = {3}, YEAR = {2006}, PAGES = {95--99}, } @INPROCEEDINGS{Diks-Hagerup96, AUTHOR = {Diks, Krzysztof and Hagerup, Torben}, TITLE = {More general parallel tree contraction: Register allocation and broadcasting in a tree}, BOOKTITLE = {Graph-theoretic concepts in computer science (WG-96) : 22nd international workshop, Cadenabbia, Italy,Graph-theoretic concepts in computer science (WG-96) : 22nd international workshop}, PADDRESS = {Berlin, Germany}, ADDRESS = {Cadenabbia, Italy}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1197}, YEAR = {1996}, PAGES = {126--140}, } @ARTICLE{DiksHagerup1998, AUTHOR = {Diks, Krzysztof and Hagerup, Torben}, JOURNAL = {Theoretical Computer Science}, TITLE = {More general parallel tree contraction: Register allocation and broadcasting in a tree}, NUMBER = {1}, PUBLISHER = {Elsevier}, VOLUME = {203}, ISBN = {0304-3975}, YEAR = {1998}, PAGES = {3--29}, } @ARTICLE{Dimitrios2007, AUTHOR = {Michail, Dimitrios}, JOURNAL = {Theoretical Computer Science}, TITLE = {Reducing rank-maximal to maximum weight matching}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {1-2}, PUBLISHER = {Elsevier}, MONTH = {December}, VOLUME = {389}, ISBN = {0304-3975}, DOI = {10.1016/j.tcs.2007.08.004}, YEAR = {2007}, PAGES = {125--132}, ABSTRACT = {Given a bipartite graph G(V,E), where |V|=n,|E|=m and a partition of the edge set into r≤m disjoint subsets , which are called ranks, the rank-maximal matching problem is to find a matching M of G such that |M∩E1| is maximized and given that |M∩E1| is maximized, |M∩E2| is also maximized, and so on. Such a problem arises as an optimization criteria over a possible assignment of a set of applicants to a set of posts. The matching represents the assignment and the ranks on the edges correspond to a ranking of the posts submitted by the applicants. The rank-maximal matching problem and several other optimization variants, e.g. fair matching and maximum cardinality rank-maximal matching, can be solved by a reduction to the weight matching problem in time . Recently, Irving et al. developed a combinatorial approach which improves the running time for the rank-maximal matching problem to . They raised the open questions on (a) whether such a running time can be achieved by the weight matching reduction and (b) whether such a running time can be achieved for the other variants of the problem. In this work we show how the reduction to the weight matching problem can also be used to achieve the same running time. Our algorithm is simpler and more intuitive. }, } @ARTICLE{DinitzGargGoemans1999, AUTHOR = {Dinitz, Yefim and Garg, Naveen and Goemans, Michel X.}, JOURNAL = {Combinatorica}, TITLE = {On the single-source unsplittable flow problem}, NUMBER = {1}, PUBLISHER = {Springer}, VOLUME = {19}, ISBN = {0209-9683}, YEAR = {1999}, PAGES = {17--41}, } @ARTICLE{DinitzZeev1999, AUTHOR = {Dinitz, Yefim and Nutov, Zeev}, JOURNAL = {Journal of Algorithms}, TITLE = {A 3-approximation algorithm for finding optimum 4,5-vertex-connected spanning subgraphs}, NUMBER = {1}, PUBLISHER = {Academic Press}, VOLUME = {32}, YEAR = {1999}, PAGES = {21--30}, } @MASTERSTHESIS{Dipl03/Ding, AUTHOR = {Ding, Wei}, TITLE = {Geometric Rounding without changing the Topology}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {December}, YEAR = {2003}, } @MASTERSTHESIS{Dipl03/Eigenwillig, AUTHOR = {Eigenwillig, Arno}, TITLE = {Exact Arrangement Computation for Cubic Curves}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {October}, YEAR = {2003}, } @MASTERSTHESIS{Dipl03/Fontaine, AUTHOR = {Fontaine, Marc}, TITLE = {Computing the Filtration Efficiency of Shape-Index-Filters for Approximate String Matching}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {November}, YEAR = {2003}, } @MASTERSTHESIS{Dipl04/Berberich, AUTHOR = {Berberich, Eric}, TITLE = {Exact Arrangements of Quadric Intersection Curves}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {March}, YEAR = {2004}, } @MASTERSTHESIS{DiplPohl06, AUTHOR = {Pohl, Sebastian}, TITLE = {Exact Integer Linear Programming with Bounded Variables in a Branch- and Cut Algorithm}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {March}, YEAR = {2006}, } @MASTERSTHESIS{DiplWeber06, AUTHOR = {Weber, Dennis}, TITLE = {Solving large Sparse Linear Systems exactly}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {August}, YEAR = {2006}, } @PHDTHESIS{Diss06Dementiev, AUTHOR = {Dementiev, Roman}, TITLE = {Algorithm Engineering for Large Data Sets}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Doctoral dissertation}, MONTH = {December}, YEAR = {2006}, NOTE = {http://frweb.cs.uni-sb.de/dissdaten/Dissertation_3650_Deme_Roma_2006.pdf}, } @PHDTHESIS{Diss06Hach, AUTHOR = {Hachenberger, Peter}, TITLE = {Boolean Operations on 3D Selective Nef Complexes: Data Structure, Algorithms Optimized Implementation, Experiments and Applications}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Doctoral dissertation}, MONTH = {December}, YEAR = {2006}, } @PHDTHESIS{DissReichel06, AUTHOR = {Reichel, Joachim}, TITLE = {Combinatorial Approaches for the Trunk Packing Problem}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Doctoral dissertation}, MONTH = {July}, YEAR = {2006}, } @INPROCEEDINGS{Djidjev-Pantziou-Zaro-1-95, AUTHOR = {Djidjev, Hristo N. and Pantziou, Grammati E. and Zaroliagis, Christos}, EDITOR = {Mayr, Ernst W. and Puech, Claude}, TITLE = {On-line and Dynamic Algorithms for Shortest Path Problems}, BOOKTITLE = {STACS95: 12th Annual Symposium on Theoretical Aspects of Computer Science}, PADDRESS = {Berlin}, ADDRESS = {Munich, Germany}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {900}, YEAR = {1995}, PAGES = {193--204}, } @INPROCEEDINGS{Djidjev-Pantziou-Zaro-2-95, AUTHOR = {Djidjev, Hristo N. and Pantziou, Grammati E. and Zaroliagis, Christos}, EDITOR = {Reichel, Horst}, TITLE = {Fast Algorithms for Maintaining Shortest Paths}, BOOKTITLE = {Fundamentals of Computation Theory: 10th International Conference (FCT95)}, PADDRESS = {Berlin}, ADDRESS = {Dresden, Germany}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {965}, YEAR = {1995}, PAGES = {191--200}, } @ARTICLE{DjidjevPantziouZaroliagis2000, AUTHOR = {Djidjev, Hristo N. and Pantziou, G. E. and Zaroliagis, Christos}, JOURNAL = {Algorithmica}, TITLE = {Improved algorithms for dynamic shortest paths}, ADDRESS = {New York, USA}, NUMBER = {4}, PUBLISHER = {Springer}, VOLUME = {28}, YEAR = {2000}, PAGES = {367--389}, } @ARTICLE{DK2012, AUTHOR = {Duan, Ran and Mehlhorn, Kurt}, JOURNAL = {arXiv}, TITLE = {A Combinatorial Polynomial Algorithm for the Linear {A}rrow-{D}ebreu Market}, ADDRESS = {Ithaca, NY}, PUBLISHER = {Cornell University Library}, MONTH = {December}, VOLUME = {abs/1212.0979v1}, YEAR = {2012}, PAGES = {1--8}, } @INPROCEEDINGS{DKMS05, AUTHOR = {Dementiev, Roman and K{\"a}rkk{\"a}inen, Juha and Mehnert, Jens and Sanders, Peter}, EDITOR = {Demetrescu, Camil and Sedgewick, Robert and Tamassia, Roberto}, TITLE = {Better External Memory Suffix Array Construction}, BOOKTITLE = {Proceedings of the Seventh Workshop on Algorithm Engineering and Experiments and the Second Workshop on Analytic Algorithmics and Combinatorics (ALENEX/ANALCO 2005)}, ORGANIZATION = {Society for Industrial and Applied Mathematics (SIAM), ACM Special Interest Group on Algorithms and Computation Theory (SIGACT)}, PADDRESS = {Philadelphia, USA}, ADDRESS = {Vancouver, British Columbia, Canada}, PUBLISHER = {SIAM}, MONTH = {January}, ISBN = {0-89871-596-2}, YEAR = {2005}, PAGES = {86--97}, ABSTRACT = {Suffix arrays are a simple and powerful data structure for text processing that can be used for full text indexes, data compression, and many other applications in particular in bioinformatics. However, so far it looked prohibitive to build suffix arrays for huge inputs that do not fit into main memory. This paper presents design, analysis, implementation, and experimental evaluation of several new and improved algorithms for suffix array construction. The algorithms are asymptotically optimal in the worst case or on the average. Our implementation can construct suffix arrays for inputs of up to 4GByte in hours on a low cost machine where all previous implementations we are aware of would fail or take days. We also present a simple and efficient external algorithm for checking whether an array of indexes is a suffix array. As a tool of possible independent interest we present a systematic way to design, analyze, and implement \emph{pipelined} algorithms.}, } @INPROCEEDINGS{DKW2011, AUTHOR = {Doerr, Benjamin and K{\"u}nnemann, Marvin and Wahlstr{\"o}m, Magnus}, EDITOR = {M{\"u}ller-Hannemann, Matthias and Werneck, Renato}, TITLE = {Dependent Randomized Rounding: {The} Bipartite Case}, BOOKTITLE = {2011 Proceedings of the Thirteenth Workshop on Algorithm Engineering and Experiments (ALENEX)}, PADDRESS = {Philadelphia, PA}, ADDRESS = {San Francisco, California, USA}, PUBLISHER = {SIAM}, ISBN = {978-0-898719-31-4}, YEAR = {2011}, PAGES = {96--106}, } @INPROCEEDINGS{DLMNOPSW2012, AUTHOR = {Cygan, Marek and Dell, Holger and Lokshtanov, Daniel and Marx, Daniel and Nederlof, Jesper and Okamoto, Yoshio and Paturi, Ramamohan and Saurabh, Saket and Wahlstr{\"o}m, Magnus}, TITLE = {On Problems as Hard as {CNF-SAT}}, BOOKTITLE = {2012 IEEE 27th Conference on Computational Complexity (CCC 2012)}, PADDRESS = {Piscataway, NJ}, ADDRESS = {Porto, Portugal}, PUBLISHER = {IEEE}, ISBN = {978-1-4673-1663-7}, DOI = {10.1109/CCC.2012.36}, YEAR = {2012}, PAGES = {74--84}, } @ARTICLE{DMSW2010, AUTHOR = {De Sterck, Hans and Miller, Killian and Sanders, Geoff and Winlaw, Manda}, JOURNAL = {SIAM Journal on Scientific Computing}, TITLE = {Recursively accelerated multilevel aggregation for {Markov} chains}, ADDRESS = {Philadelphia, Pa.}, NUMBER = {3}, PUBLISHER = {SIAM}, VOLUME = {32}, DOI = {10.1137/090770114}, YEAR = {2011}, PAGES = {1652--1671}, } @INPROCEEDINGS{Dobkin-Gunopulos96, AUTHOR = {Dobkin, David P. and Gunopulos, Dimitrios}, EDITOR = {Lin, Ming C. and Manocha, Dinesh}, TITLE = {Geometric problems in machine learning}, BOOKTITLE = {Applied Computational Geometry: Towards Geometric Engineering (FCRC96 Workshop, WACG96)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Philadelphia, USA}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1148}, YEAR = {1996}, PAGES = {121--132}, } @INPROCEEDINGS{Doe-Joh-Koe-Neu-The:c:10:APSPCrossover, AUTHOR = {Doerr, Benjamin and Johannsen, Daniel and K{\"o}tzing, Timo and Neumann, Frank and Theile, Madeleine}, EDITOR = {Schaefer, Robert and Cotta, Carlos and Kolodziej, Joanna and Rudolph, G{\"u}nter}, TITLE = {More Effective Crossover Operators for the All-Pairs Shortest Path Problem}, BOOKTITLE = {Parallel Problem Solving from Nature - PPSN XI. - Pt. 1}, PADDRESS = {Berlin}, ADDRESS = {Krakow, Poland}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6238}, ISBN = {978-3-642-15843-8}, DOI = {10.1007/978-3-642-15844-5_19}, YEAR = {2010}, PAGES = {184--193}, ABSTRACT = {The All-Pairs Shortest Path problem is the first non-artificial problem for which it was shown that adding crossover can significantly speed up a mutation-only evolutionary algorithm. Recently, the analysis of this algorithm was refined and it was shown to have an expected optimization time of $\Theta(n^{3.25}(\log n)^{0.25})$. In this work, we study two variants of the algorithm. These are based on two central concepts in recombination, \emph{repair mechanisms} and \emph{parent selection}. We show that repairing infeasible offspring leads to an improved expected optimization time of $\mathord{O}(n^{3.2}(\log n)^{0.2})$. Furthermore, we prove that choosing parents that guarantee feasible offspring results in an optimization time of $\mathord{O}(n^{3}\log n)$.}, } @INPROCEEDINGS{Doerr11, AUTHOR = {Doerr, Benjamin}, EDITOR = {Krasnogor, Natalio and Lanzi, Pier Luca}, TITLE = {Drift analysis}, BOOKTITLE = {GECCO 2011 : Genetic and Evolutionary Computation Conference}, PADDRESS = {New York, NY}, ADDRESS = {Dublin, Ireland}, PUBLISHER = {ACM}, ISBN = {978-1-4503-0690-4}, DOI = {10.1145/2001858.2002138}, YEAR = {2011}, PAGES = {1311--1320}, } @INPROCEEDINGS{Doerr12GECCO, AUTHOR = {Doerr, Benjamin}, EDITOR = {Soule, Terence and Moore, Jason H.}, TITLE = {Black-box complexity: from complexity theory to playing mastermind}, BOOKTITLE = {GECCO'12 : Proceedings of the Fourteenth International Conference on Genetic and Evolutionary Computation}, PADDRESS = {New York, NY}, ADDRESS = {Philadelphia, PA}, PUBLISHER = {ACM}, ISBN = {978-1-4503-1177-9}, DOI = {10.1145/2330784.2330931}, YEAR = {2012}, PAGES = {1079--1092}, } @INPROCEEDINGS{Doerr2005, AUTHOR = {Doerr, Benjamin}, TITLE = {Matrix Rounding with Low Error in Small Submatrices}, BOOKTITLE = {Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2005)}, PADDRESS = {New York, USA}, ADDRESS = {Vancouver, Canada}, PUBLISHER = {ACM}, ISBN = {0898715857}, YEAR = {2005}, PAGES = {1067--1068}, } @INPROCEEDINGS{Doerr2005EurocombPropp, AUTHOR = {Cooper, Joshua and Doerr, Benjamin and Spencer, Joel and Tardos, Gabor}, EDITOR = {Felsner, Stefan}, JOURNAL = {Discrete Mathematics \& Theoretical Computer Science}, TITLE = {Deterministic Random Walks on the Integers}, BOOKTITLE = {2005 European Conference on Combinatorics, Graph Theory and Applications (EuroComb '05)}, PADDRESS = {Nancy, France}, ADDRESS = {Berlin, Germany}, PUBLISHER = {DMTCS}, MONTH = {September}, SERIES = {DMTCS Proceedings}, VOLUME = {AE}, YEAR = {2005}, PAGES = {73--76}, } @ARTICLE{Doerr2005gitter, AUTHOR = {Doerr, Benjamin and Gnewuch, Michael and Srivastav, Anand}, JOURNAL = {Journal of Complexity}, TITLE = {Bounds and Constructions for the Star-Discrepancy via Delta-Covers}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {5}, PUBLISHER = {Elsevier}, MONTH = {October}, VOLUME = {21}, ISBN = {0885-064X}, YEAR = {2005}, PAGES = {691--709}, ABSTRACT = {For numerical integration in higher dimensions, bounds for the star-dis\-cre\-pan\-cy with polynomial dependence on the dimension $d$ are desirable. Furthermore, it is still a great challenge to give construction methods for low-discrepancy point sets. In this paper we give upper bounds for the star-discrepancy and its inverse for subsets of the $d$-di\-men\-sio\-nal unit cube. They improve known results. In particular, we determine the usually only implicitly given constants. The bounds are based on the construction of nearly optimal $\delta$-covers of anchored boxes in the $d$-dimensional unit cube. We give an explicit construction of low-discrepancy points with a derandomized algorithm. The running time of the algorithm, which is exponentially in $d$, is discussed in detail and comparisons with other methods are given.}, } @PHDTHESIS{Doerr2005Habil, AUTHOR = {Doerr, Benjamin}, TITLE = {Integral Approximation}, SCHOOL = {Christian-Albrechts-Universit{\"a}t zu Kiel}, TYPE = {Habilitation thesis}, YEAR = {2005}, } @INPROCEEDINGS{Doerr2005minload, AUTHOR = {Ahuja, Nitin and Baltz, Andreas and Doerr, Benjamin and Privetivy, Ales and Srivastav, Anand}, EDITOR = {Erlebach, Thomas and Persiano, Pino}, TITLE = {On the Minimum Load Coloring Problem}, BOOKTITLE = {Third Workshop on Approximation and Online Algorithms (WAOA 2005)}, PADDRESS = {Heidelberg}, ADDRESS = {Palma de Mallorca, Spain}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {3879}, ISBN = {3-540-32207-8}, YEAR = {2005}, PAGES = {15--26}, } @ARTICLE{Doerr2006gametrees, AUTHOR = {Doerr, Benjamin and Lorenz, Ulf}, JOURNAL = {Mathematical Methods of Operations Research}, TITLE = {Error Propagation in Game Trees}, ADDRESS = {Berlin, Germany}, NUMBER = {1}, PUBLISHER = {Springer}, VOLUME = {64}, ISBN = {1432-2994}, YEAR = {2006}, PAGES = {79--93}, ABSTRACT = {Game tree search is the core of most attempts to teach computers play games. We present a fairly general theoretical analysis on how evaluation error influence the value estimation of a game position. We extend the work of Lorenz and Monien [7] in two directions. Firstly, we allow arbitrary game values. By a different approach, we show that also in this setting the number of leaf-disjoint strategies proving a particular property is a key notion. This number precisely describes the order of growth of the heuristic game value in the terms of the quality of the leaf evaluation heuristics. Secondly, in allow random nodes (rolls of a die). Surprisingly, this changes the situation: Still the number of leaf-disjoint strategies ensures robustness against leaf evaulation errors, but the converse is not true. An average node may produce additional robustness like further leaf-disjoint strategies.}, } @INPROCEEDINGS{Doerr2007-CECa, AUTHOR = {Doerr, Benjamin and Happ, Edda and Klein, Christian}, TITLE = {A Tight Bound for the (1+1)-EA on the Single Source Shortest Path Problem}, BOOKTITLE = {IEEE Congress on Evolutionary Computation 2007}, PADDRESS = {Vancouver, CA}, ADDRESS = {Singapore}, PUBLISHER = {IEEE}, ISBN = {1-4244-1339-7}, YEAR = {2007}, PAGES = {1890--1895}, } @INPROCEEDINGS{Doerr2007-CECb, AUTHOR = {Doerr, Benjamin and Gnewuch, Michael and Hebbinghaus, Nils and Neumann, Frank}, TITLE = {A Rigorous View On Neutrality}, BOOKTITLE = {IEEE Congress on Evolutionary Computation 2007}, PADDRESS = {Vancouver, CA}, ADDRESS = {Singapore}, PUBLISHER = {IEEE}, ISBN = {1-4244-1339-7}, YEAR = {2007}, PAGES = {2591--2597}, } @ARTICLE{Doerr2007-ENDMa, AUTHOR = {Cooper, Joshua and Doerr, Benjamin and Friedrich, Tobias and Spencer, Joel}, JOURNAL = {Electronic Notes in Discrete Mathematics}, TITLE = {Deterministic Random Walks on Regular Trees}, VOLUME = {29}, ISBN = {1571-0653}, DOI = {10.1016/j.endm.2007.07.082}, YEAR = {2007}, PAGES = {509--513}, } @ARTICLE{Doerr2007-ENDMb, AUTHOR = {Doerr, Benjamin and Friedrich, Tobias and Klein, Christian and Osbild, Ralf}, JOURNAL = {Electronic Notes in Discrete Mathematics}, TITLE = {Unbiased Matrix Rounding}, VOLUME = {28}, ISBN = {1571-0653}, DOI = {10.1016/j.endm.2007.01.007}, YEAR = {2007}, PAGES = {41--46}, } @PROCEEDINGS{Doerr2007GeccoProc, EDITOR = {Thierens, Dirk and Beyer, Hans-Georg and Bongard, Joshua and Branke, Juergen and Clark, John and Cliff, Dave and Congdon, Clare and Deb, Kalyanmoy and Doerr, Benjamin and Kovacs, Tim and Kumar, Sanjeev and Miller, Julian and Moore, Jason and Neumann, Frank and Pelikan, Martin and Poli, Ricardo and Sastry, Kumara and Stanley, Ken and St{\"u}tzle, Thomas and Watson, Richard and Wegener, Ingo}, TITLE = {GECCO 2007: Proceedings of the 9th Annual Conference on Genetic and Evolutionary Computation}, PADDRESS = {New York}, ADDRESS = {London, UK}, PUBLISHER = {ACM}, ISBN = {978-1-59593-697-4}, YEAR = {2007}, PAGES = {1--2269}, } @ARTICLE{Doerr2007nitin, AUTHOR = {Ahuja, Nitin and Baltz, Andreas and Doerr, Benjamin and Privetivy, Ales and Srivastav, Anand}, JOURNAL = {Journal of Discrete Algorithms}, TITLE = {On the Minimum Load Coloring Problem}, VOLUME = {5}, ISBN = {1570-8667}, YEAR = {2007}, PAGES = {533--545}, } @ARTICLE{Doerr2007partial, AUTHOR = {Doerr, Benjamin}, JOURNAL = {Electronic Notes in Discrete Mathematics}, TITLE = {Partial Colorings of Unimodular Hypergraphs}, VOLUME = {29}, ISBN = {1571-0653}, YEAR = {2007}, PAGES = {359--363}, } @INPROCEEDINGS{Doerr2008-SODA, AUTHOR = {Doerr, Benjamin and Friedrich, Tobias and Sauerwald, Thomas}, TITLE = {Quasirandom Rumor Spreading}, BOOKTITLE = {Proceedings of the 19th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2008}, PADDRESS = {San Francisco, USA}, ADDRESS = {San Francisco, USA}, PUBLISHER = {ACM}, ISBN = {in_press}, YEAR = {2008}, PAGES = {773--781}, } @INPROCEEDINGS{Doerr2008-SODAb, AUTHOR = {Cooper, Joshua and Doerr, Benjamin and Friedrich, Tobias and Spencer, Joel}, TITLE = {Deterministic Random Walks on Regular Trees}, BOOKTITLE = {Proceedings of the 19th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2008}, PADDRESS = {San Francisco, USA}, ADDRESS = {San Francisco, USA}, PUBLISHER = {ACM}, MONTH = {January}, ISBN = {in_press}, YEAR = {2008}, PAGES = {766--772}, } @PROCEEDINGS{Doerr2008GeccoProc, EDITOR = {Keizer, Marten and Antoniol, Giulio and Congdon, Clare and Deb, Kalyanmoy and Doerr, Benjamin and Hansen, Nikolaus and Holmes, John and Hornby, Gergory and Howard, Daniel and Kennedy, John and Kumar, Sanjeev and Lobo, Ferdinando and Miller, Julian and Moore, Jason and Neumann, Frank and Pelikan, Martin and Pollack, Jordan and Sastry, Kumara and Stanley, Ken and Stoica, Adrian and Talbi, El Ghazli and Wegener, Ingo}, TITLE = {GECCO 2008: Proceedings of the 10th Annual Conference on Genetic and Evolutionary Computation}, PADDRESS = {New York}, ADDRESS = {Atlanta, GA, USA}, PUBLISHER = {ACM}, ISBN = {978-1-60558-130-9}, YEAR = {2008}, PAGES = {1--1768}, } @INCOLLECTION{Doerr2009, AUTHOR = {Doerr, Benjamin}, EDITOR = {Albers, Susanne and Alt, Helmut and N{\"a}her, Stefan}, JOURNAL = {Lecture Notes in Computer Science}, TITLE = {Introducing Quasirandomness to Computer Science}, BOOKTITLE = {Efficient Algorithms : Essays Dedicated to Kurt Mehlhorn on the Occasion of His 60th Birthday}, ADDRESS = {Berlin, Germany}, PUBLISHER = {Springer}, MONTH = {September}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5760}, ISBN = {978-3-642-03455-8}, DOI = {10.1007/978-3-642-03456-5_6}, YEAR = {2009}, PAGES = {99--111}, } @INPROCEEDINGS{Doerr2011, AUTHOR = {Doerr, Benjamin and Johannsen, Daniel and K{\"o}tzing, Timo and Lehre, Per Christian and Wagner, Markus and Winzen, Carola}, EDITOR = {Beyer, Hans- Georg and Langdon, William}, TITLE = {Faster black-box algorithms through higher arity operators}, BOOKTITLE = {Proceedings of the 2011 ACM/SIGEVO Foundations of Genetic Algorithms XI (FOGA 2011)}, PADDRESS = {New York, NY}, ADDRESS = {Schwarzenberg, Austria}, PUBLISHER = {ACM}, ISBN = {978-1-4503-0633-1}, DOI = {10.1145/1967654.1967669}, YEAR = {2011}, PAGES = {163--172}, } @ARTICLE{Doerr2012x, AUTHOR = {Doerr, Benjamin and Doerr, Carola and Sp{\"o}hel, Reto and Thomas, Henning}, JOURNAL = {arXiv}, TITLE = {Playing {Mastermind} with Many Colors}, ADDRESS = {Ithaca, NY}, PUBLISHER = {Cornell University Library}, VOLUME = {abs/1207.0773}, YEAR = {2013}, PAGES = {1--22}, } @ARTICLE{Doerr2013AppAlg, AUTHOR = {Doerr, Benjamin}, JOURNAL = {Information Processing Letters}, TITLE = {Improved approximation algorithms for the Min-Max Selecting Items problem}, ADDRESS = {Amsterdam}, PUBLISHER = {Eslevier}, VOLUME = {113}, ISBN = {0020-0190}, YEAR = {2013}, PAGES = {747--749}, } @INPROCEEDINGS{Doerr2013CECemo, AUTHOR = {Doerr, Benjamin and Kodric, Bojana and Voigt, Marco}, TITLE = {Lower bounds for the runtime of a global multi-objective evolutionary algorithm}, BOOKTITLE = {IEEE Congress on Evolutionary Computation}, PADDRESS = {New York}, ADDRESS = {Cancun, Mexico}, PUBLISHER = {IEEE}, ISBN = {9781479904532}, YEAR = {2013}, PAGES = {432--439}, } @INPROCEEDINGS{Doerr2013z, AUTHOR = {Doerr, C. and Schmidt, Jens M. and Ramakrishna, G.}, TITLE = {Computing Minimum Cycle Bases in Weighted Partial 2-Trees in Linear Time}, BOOKTITLE = {39th International Workshop on Graph-Theoretic Concepts in Computer Science (WG'13)}, PADDRESS = {Heidelberg}, ADDRESS = {L{\"u}beck}, PUBLISHER = {Springer}, DOI = {10.1007/978-3-642-45043-3_20}, YEAR = {2013}, PAGES = {225--236}, } @INPROCEEDINGS{DoerrA11CCCG, AUTHOR = {Asano, Tetsuo and Doerr, Benjamin}, TITLE = {Memory-constrained algorithms for shortest path problem}, BOOKTITLE = {23rd Annual Canadian Conference on Computational Geometry (CCCG 2011)}, PADDRESS = {-}, ADDRESS = {Toronto, Canada}, YEAR = {2011}, PAGES = {315--319}, } @INPROCEEDINGS{DoerrANALCO06, AUTHOR = {Cooper, Joshua and Doerr, Benjamin and Spencer, Joel and Tardos, G{\'a}bor}, EDITOR = {Raman, Rajeev and Sedgewick, Robert and Stallmann, Matthias F.}, TITLE = {Deterministic Random Walks}, BOOKTITLE = {Proceedings of the Eighth Workshop on Algorithm Engineering and Experiments and the Third Workshop on Analytic Algorithmics and Combinatorics (ALENEX'06 / ANALCO'06)}, PADDRESS = {Philadelphia, PA, USA}, ADDRESS = {Miami, FL, USA}, PUBLISHER = {SIAM}, ISBN = {0898716101}, YEAR = {2006}, PAGES = {185--197}, ABSTRACT = {Jim Propp’s P-machine, also known as ‘rotor router model’ is a simple deterministic process that simulates random walk on a graph. Instead of distributing chips to randomly chosen neighbors, it serves the neighbors in a fixed order. We investigate how well this process simulates a random walk. For the graph being the infinite path, we show that, independent of the starting configuration, at each time and on each vertex, the number of chips on this vertex deviates from the expected number of chips in the random walk model by at most a constant c1, which is approximately 2.29. For intervals of length L, this improves to a difference of O(log L) (instead of 2.29L), for the L2 average of a contiguous set of intervals even to O(√log L). It seems plausible that similar results hold for higher-dimensional grids Zd instead of the path Z.}, } @INPROCEEDINGS{DoerrDE13, AUTHOR = {Doerr, Benjamin and Doerr, Carola and Ebel, Franziska}, TITLE = {Lessons From the Black-Box: Fast Crossover-Based Genetic Algorithms}, BOOKTITLE = {Proc. of Genetic and Evolutionary Computation Conference (GECCO 2013)}, PADDRESS = {New York, USA}, ADDRESS = {Amsterdam, Netherlands}, PUBLISHER = {ACM}, YEAR = {2013}, PAGES = {781--788}, } @INPROCEEDINGS{DoerrDR2013, AUTHOR = {Doerr, Carola and De Rainville, Fran{\c{c}}ois-Michel}, TITLE = {Constructing Low Star Discrepancy Point Sets with Genetic Algorithms}, BOOKTITLE = {Proc. of Genetic and Evolutionary Computation Conference (GECCO 2013)}, PADDRESS = {New York, USA}, ADDRESS = {Amsterdam, Netherlands}, PUBLISHER = {ACM}, YEAR = {2013}, PAGES = {789--796}, ABSTRACT = {The recently active research area of black-box complexity revealed that for many optimization problems the best possible black-box optimization algorithm is significantly faster than all known evolutionary approaches. While it is not to be expected that a general-purpose heuristic competes with a problem-tailored algorithm, it still makes sense to look for the reasons for this discrepancy. In this work, we exhibit one possible reason---most optimal black-box algorithms profit also from solutions that are inferior to the previous-best one, whereas evolutionary approaches guided by the ``survival of the fittest'' paradigm often ignore such solutions. Trying to overcome this shortcoming, we design a simple genetic algorithm that first creates $\lambda$ offspring from a single parent by mutation with a mutation probability that is $k$ times larger than the usual one. From the best of these offspring (which often is worse than the parent) and the parent itself, we generate further offspring via a uniform crossover operator that takes bits from the winner offspring with probability $1/k$ only. A rigorous runtime analysis proves that our new algorithm for suitable parameter choices on the \onemax test function class is asymptotically faster (in terms of the number of fitness evaluations) than what has been shown for $(\mu \stackrel{+}{,} \lambda)$ EAs. This is the first time that crossover is shown to give an advantage for the $\onemax$ class that is larger than a constant factor. Using a fitness-dependent choice of $k$ and~$\lambda$, the optimization time can be reduced further to linear in~$n$. Our experimental analysis on several test function classes shows advantages already for small problem sizes and broad parameter ranges. Also, a simple self-adaptive choice of these parameters gives surprisingly good results.}, } @ARTICLE{DoerrENTT11, AUTHOR = {Doerr, Benjamin and Eremeev, Anton and Neumann, Frank and Theile, Madeleine and Thyssen, Christian}, JOURNAL = {Theoretical Computer Science}, TITLE = {Evolutionary algorithms and dynamic programming}, ADDRESS = {Amsterdam}, PUBLISHER = {Elsevier}, VOLUME = {412}, ISBN = {0304-3975}, DOI = {10.1016/j.tcs.2011.07.024}, YEAR = {2011}, PAGES = {6020--6035}, } @INPROCEEDINGS{Doerretal2010b, AUTHOR = {Doerr, Benjamin and Goldberg, Leslie Ann and Minder, Lorenz and Sauerwald, Thomas and Scheideler, Christian}, EDITOR = {Lynch, Nancy A. and Shvartsman, Alexander A.}, TITLE = {Brief Announcement: Stabilizing Consensus with the Power of Two Choices}, BOOKTITLE = {Distributed Computing : 24th International Symposium, DISC 2010}, PADDRESS = {Berlin}, ADDRESS = {Cambridge, MA USA}, PUBLISHER = {Springer}, MONTH = {September}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6343}, ISBN = {978-3-642-15762-2}, DOI = {10.1007/978-3-642-15763-9_50}, YEAR = {2010}, PAGES = {528--530}, } @INPROCEEDINGS{DoerretalGECCO2009, AUTHOR = {Doerr, Benjamin and Eremeev, Anton and Horoba, Christian and Neumann, Frank and Theile, Madeleine}, EDITOR = {Raidl, G{\"u}nther and Rothlauf, Frank}, TITLE = {Evolutionary Algorithms and Dynamic Programming}, BOOKTITLE = {Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation (GECCO 2009)}, PADDRESS = {New York, USA}, ADDRESS = {Montreal, Canada}, PUBLISHER = {ACM}, ISBN = {978-1-60558-325-9}, DOI = {10.1145/1569901.1570008}, YEAR = {2009}, PAGES = {771--777}, } @ARTICLE{DoerrF12, AUTHOR = {Doerr, Benjamin and Fouz, Mahmoud}, JOURNAL = {Electronic Notes in Discrete Mathematics}, TITLE = {Asymptotically optimal randomized rumor spreading}, ADDRESS = {Amsterdam}, PUBLISHER = {Elsevier}, VOLUME = {38}, ISBN = {1571-0653}, DOI = {10.1016/j.endm.2011.09.049}, YEAR = {2011}, PAGES = {297--302}, } @ARTICLE{DoerrFF12CACM, AUTHOR = {Doerr, Benjamin and Fouz, Mahmoud and Friedrich, Tobias}, JOURNAL = {Communications of the ACM}, TITLE = {Why Rumors Spread Fast in Social Networks}, ADDRESS = {New York, NY}, PUBLISHER = {ACM}, VOLUME = {55}, ISBN = {0001-0782}, DOI = {10.1145/2184319.2184338}, YEAR = {2012}, PAGES = {70--75}, } @INPROCEEDINGS{DoerrFF12MedAlg, AUTHOR = {Doerr, Benjamin and Fouz, Mahmoud and Friedrich, Tobias}, EDITOR = {Even, Guy and Rawitz, Dror}, TITLE = {Experimental analysis of rumor spreading in social networks}, BOOKTITLE = {Design and Analysis of Algorithms First Mediterranean Conference on Algorithms, MedAlg 2012}, PADDRESS = {Berlin}, ADDRESS = {Ein Gedi, Israel}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {7659}, ISBN = {978-3-642-34861-7}, DOI = {10.1007/978-3-642-34862-4_12}, YEAR = {2012}, PAGES = {159--173}, NOTE = {To appear}, } @INPROCEEDINGS{DoerrFF12SWAT, AUTHOR = {Doerr, Benjamin and Fouz, Mahmoud and Friedrich, Tobias}, EDITOR = {Fomin, Fedor V. and Kaski, Petteri}, TITLE = {Asynchronous rumor spreading in preferential attachment graphs}, BOOKTITLE = {Algorithm Theory - SWAT 2012 : 13th Scandinavian Symposium and Workshops}, PADDRESS = {Berlin}, ADDRESS = {Helsinki, Finland}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {7357}, ISBN = {978-3-642-31154-3}, DOI = {10.1007/978-3-642-31155-0_27}, YEAR = {2012}, PAGES = {307--315}, } @ARTICLE{DoerrFKS12, AUTHOR = {Doerr, Benjamin and Friedrich, Tobias and K{\"u}nnemann, Marvin and Sauerwald, Thomas}, JOURNAL = {ACM Journal of Experimental Algorithmics}, TITLE = {Quasirandom Rumor Spreading: An Experimental Analysis}, ADDRESS = {New York, NY}, PUBLISHER = {ACM}, VOLUME = {16}, DOI = {10.1145/1963190.2025379}, YEAR = {2011}, PAGES = {Article No. 3.3}, } @MISC{DoerrFouz2006, AUTHOR = {Doerr, Benjamin and Fouz, Mahmoud}, JOURNAL = {???}, TITLE = {Hereditary Discrepancies in Different Numbers of Colors II}, HOWPUBLISHED = {Internet}, MONTH = {November}, YEAR = {2006}, PAGES = {1--19}, ABSTRACT = {We bound the hereditary discrepancy of a hypergraph H in two colors in terms of its hereditary discrepancy in c colors. We show that \herdisc(H,2) \le K c \herdisc(H,c), where K is some absolute constant. This bound is sharp. }, } @ARTICLE{doerrfouz2009, AUTHOR = {Doerr, Benjamin and Fouz, Mahmoud}, JOURNAL = {Electronic Notes in Discrete Mathematics}, TITLE = {A Time-Randomness Tradeoff for Quasi-Random Rumour Spreading}, ADDRESS = {Amsterdam}, PUBLISHER = {Elsevier}, VOLUME = {34}, ISBN = {1571-0653}, DOI = {10.1016/j.endm.2009.07.055}, YEAR = {2009}, PAGES = {335 -- 339}, } @ARTICLE{DoerrFouz2010, AUTHOR = {Doerr, Benjamin and Fouz, Mahmoud}, JOURNAL = {SIAM Journal on Discrete Mathematics}, TITLE = {Hereditary Discrepancies in Different Numbers of Colors {II}}, ADDRESS = {Philadelphia, Pa.}, NUMBER = {3}, PUBLISHER = {SIAM}, VOLUME = {24}, ISBN = {0895-4801}, DOI = {10.1137/090669620}, YEAR = {2010}, PAGES = {1205--1213}, } @INPROCEEDINGS{DoerrFouzSchmidtWahlstroem2009, AUTHOR = {Doerr, Benjamin and Fouz, Mahmoud and Schmidt, Martin and Wahlstr{\"o}m, Magnus}, EDITOR = {Rothlauf, Franz}, TITLE = {{BBOB}: Nelder-Mead with resize and halfruns}, BOOKTITLE = {Proceedings of the 11th Annual Conference Companion on Genetic and Evolutionary Computation Conference (GECCO 2009)}, PADDRESS = {New York, NY}, ADDRESS = {Montreal, Qu{\'e}bec, Canada}, PUBLISHER = {ACM}, ISBN = {978-1-60558-505-5}, DOI = {10.1145/1570256.1570312}, YEAR = {2009}, PAGES = {2239--2246}, } @INPROCEEDINGS{DoerrFriedrichSauerwald09, AUTHOR = {Doerr, Benjamin and Friedrich, Tobias and Sauerwald, Thomas}, EDITOR = {Albers, Susanne and Marchetti-Spaccamela, Alberto and Matias, Yossi and Nikoletseas, Sotiris and Thomas, Wolfgang}, TITLE = {Quasirandom Rumor Spreading: {Expanders,} Push vs. Pull, and Robustness}, BOOKTITLE = {Automata, Languages and Programming : 36th International Colloquium, ICALP 2009}, PADDRESS = {Berlin, Germany}, ADDRESS = {Rhodes, Greece}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5555}, ISBN = {978-3642029264}, DOI = {10.1007/978-3-642-02927-1_31}, YEAR = {2009}, PAGES = {366--377}, } @ARTICLE{doerrfriedrichsauerwald2009, AUTHOR = {Doerr, Benjamin and Friedrich, Tobias and Sauerwald, Thomas}, JOURNAL = {Electronic Notes in Discrete Mathematics}, TITLE = {Quasirandom Rumor Spreading on Expanders}, ADDRESS = {Amsterdam, The Netherlands}, PUBLISHER = {Elsevier}, VOLUME = {34}, ISBN = {1571-0653}, DOI = {10.1016/j.endm.2009.07.040}, YEAR = {2009}, PAGES = {243 -- 247}, } @INPROCEEDINGS{DoerrFW11, AUTHOR = {Doerr, Benjamin and Fouz, Mahmoud and Witt, Carsten}, EDITOR = {Krasnogor, Natalio and Lanzi, Pier Luca}, TITLE = {Sharp bounds by probability-generating functions and variable drift}, BOOKTITLE = {GECCO 2011 : Genetic and Evolutionary Computation Conference}, PADDRESS = {New York, NY}, ADDRESS = {Dublin, Ireland}, PUBLISHER = {ACM}, ISBN = {978-1-4503-0557-0}, DOI = {10.1145/2001576.2001856}, YEAR = {2011}, PAGES = {2083--2090}, } @INPROCEEDINGS{DoerrFW2010, AUTHOR = {Doerr, Benjamin and Fouz, Mahmoud and Witt, Carsten}, EDITOR = {Pelikan, Martin and Branke, J{\"u}rgen}, TITLE = {Quasirandom Evolutionary Algorithms}, BOOKTITLE = {Proceedings of 12th Annual Conference on Genetic and Evolutionary Computation (GECCO-2010)}, PADDRESS = {New York, NY USA}, ADDRESS = {Portland, USA}, PUBLISHER = {ACM}, MONTH = {July}, ISBN = {978-1-4503-0072-5}, DOI = {10.1145/1830483.1830749}, YEAR = {2010}, PAGES = {1457--1464}, } @ARTICLE{DoerrG13algo, AUTHOR = {Doerr, Benjamin and Goldberg, Leslie Ann}, JOURNAL = {Algorithmica}, TITLE = {Adaptive Drift Analysis}, ADDRESS = {New York, NY}, PUBLISHER = {Springer}, VOLUME = {65}, ISBN = {0178-4617}, DOI = {10.1007/s00453-011-9585-3}, YEAR = {2013}, PAGES = {224--250}, } @ARTICLE{DoerrGKP08, AUTHOR = {Doerr, Benjamin and Gnewuch, Michael and Kritzer, Peter and Pillichshammer, Peter}, JOURNAL = {Monte Carlo Methods Applications}, TITLE = { Component-by-component construction of low-discrepancy point sets of small size}, NUMBER = {2}, VOLUME = {14}, YEAR = {2008}, PAGES = {129--150}, } @INPROCEEDINGS{DoerrGMSS11, AUTHOR = {Doerr, Benjamin and Goldberg, Leslie Ann and Minder, Lorenz and Sauerwald, Thomas and Scheideler, Christian}, TITLE = {Stabilizing consensus with the power of two choices}, BOOKTITLE = {23rd ACM Symposium on Parallelism in Algorithms and Architectures (SPAA-11)}, PADDRESS = {New York, NY}, ADDRESS = {San Jose, USA}, PUBLISHER = {ACM}, ISBN = {978-1-4503-0743-7}, DOI = {10.1145/1989493.1989516}, YEAR = {2011}, PAGES = {149--158}, } @INPROCEEDINGS{DoerrGnewuch2008, AUTHOR = {Doerr, Benjamin and Gnewuch, Michael}, EDITOR = {Keller, Alexander and Heinrich, Stefan and Niederreiter, Harald}, TITLE = {Construction of Low-Discrepancy Point Sets of Small Size by Bracketing Covers and Dependent Randomized Rounding}, BOOKTITLE = {Monte Carlo and Quasi-Monte Carlo Methods 2006}, PADDRESS = {New York, USA}, ADDRESS = {Ulm, Germany}, PUBLISHER = {Springer}, ISBN = {978-3-540-74495-5}, YEAR = {2008}, PAGES = {299--312}, } @ARTICLE{DoerrGnewuchKritzerPillichshammer2008, AUTHOR = {Doerr, Benjamin and Gnewuch, Michael and Kritzer, Peter and Pillichshammer, Friedrich}, JOURNAL = {Monte Carlo Methods and Applications}, TITLE = {Component-by-component construction of low-discrepancy point sets of small size}, VOLUME = {14}, ISBN = {0929-9629}, YEAR = {2008}, PAGES = {129--149}, } @INPROCEEDINGS{DoerrGW2009, AUTHOR = {Doerr, Benjamin and Gnewuch, Michael and Wahlstr{\"o}m, Magnus}, EDITOR = {L'Ecuyer, P. and Owen, A. B.}, TITLE = {Implementation of a component-by-component algorithm to generate small low-discrepancy samples}, BOOKTITLE = {Monte Carlo and Quasi-Monte Carlo Methods 2008}, PADDRESS = {Berlin}, ADDRESS = {Montreal, Canada}, PUBLISHER = {Springer}, MONTH = {July}, ISBN = {978-3-642-04106-8}, YEAR = {2009}, PAGES = {323--338}, } @INPROCEEDINGS{DoerrHapp2008, AUTHOR = {Doerr, Benjamin and Happ, Edda}, TITLE = {Directed trees: A Powerful Representation for Sorting and Ordering Problems}, BOOKTITLE = {Proceedings of CEC 2008}, ORGANIZATION = {Institute of Electrical and Electronics Engineers}, PADDRESS = {New York, USA}, ADDRESS = {Hong Kong}, PUBLISHER = {IEEE}, ISBN = {978-1-4244-1823-7}, DOI = {10.1109/CEC.2008.4631286}, YEAR = {2008}, PAGES = {3606--3613}, } @ARTICLE{DoerrHK11, AUTHOR = {Doerr, Benjamin and Happ, Edda and Klein, Christian}, JOURNAL = {Evolutionary Computation}, TITLE = {Tight Analysis of the (1+1)-{EA} for the Single Source Shortest Path Problem}, ADDRESS = {Cambridge, MA}, NUMBER = {4}, PUBLISHER = {MIT Press}, VOLUME = {19}, ISBN = {1063-6560}, DOI = {10.1162/EVCO_a_00047}, YEAR = {2011}, PAGES = {673--691}, } @INPROCEEDINGS{DoerrHK2012GECCO, AUTHOR = {Doerr, Benjamin and Hota, Ashish and K{\"o}tzing, Timo}, EDITOR = {Soule, Terence and Moore, Jason H.}, TITLE = {Ants easily solve stochastic shortest path problems}, BOOKTITLE = {GECCO'12 : Proceedings of the Fourteenth International Conference on Genetic and Evolutionary Computation}, PADDRESS = {New York, NY}, ADDRESS = {Philadelphia, PA}, PUBLISHER = {ACM}, ISBN = {978-1-4503-1177-9}, DOI = {10.1145/2330163.2330167}, YEAR = {2012}, PAGES = {17--24}, } @ARTICLE{DoerrHK2012TCS, AUTHOR = {Doerr, Benjamin and Happ, Edda and Klein, Christian}, JOURNAL = {Theoretical Computer Science}, TITLE = {Crossover can provably be useful in evolutionary computation}, ADDRESS = {Amsterdam, The Netherlands}, PUBLISHER = {Elsevier}, VOLUME = {425}, ISBN = {0304-3975}, DOI = {10.1016/j.tcs.2010.10.035}, YEAR = {2012}, PAGES = {17--33}, } @ARTICLE{DoerrHL13, AUTHOR = {Doerr, Benjamin and Huber, Anna and Levavi, Ariel}, JOURNAL = {Discrete Applied Mathematics}, TITLE = {Strong robustness of randomized rumor spreading protocols}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {6}, PUBLISHER = {Discrete Applied Mathematics}, VOLUME = {161}, ISBN = {0166-218X}, DOI = {10.1016/j.dam.2012.10.014}, YEAR = {2013}, PAGES = {778--793}, } @ARTICLE{DoerrJ11, AUTHOR = {Doerr, Benjamin and Jansen, Thomas}, JOURNAL = {Algorithmica}, TITLE = {Theory of Evolutionary Computation}, ADDRESS = {New York, NY}, NUMBER = {3}, PUBLISHER = {Springer}, VOLUME = {59}, ISBN = {0178-4617}, DOI = {10.1007/s00453-010-9472-3}, YEAR = {2011}, PAGES = {299--300}, } @INPROCEEDINGS{DoerrJ2010, AUTHOR = {Doerr, Benjamin and Johannsen, Daniel}, EDITOR = {Pelikan, Martin and Branke, J{\"u}rgen}, TITLE = {Edge-based representation beats vertex-based representation in shortest path problems}, BOOKTITLE = {Proceedings of 12th Annual Conference on Genetic and Evolutionary Computation (GECCO-2010)}, PADDRESS = {New York, NY USA}, ADDRESS = {Portland, USA}, PUBLISHER = {ACM}, MONTH = {July}, ISBN = {978-1-4503-0072-5}, DOI = {10.1145/1830483.1830618}, YEAR = {2010}, PAGES = {759--766}, } @INPROCEEDINGS{DoerrJansenKlein2008, AUTHOR = {Doerr, Benjamin and Jansen, Thomas and Klein, Christian}, EDITOR = {Ryan, Conor and Keijzer, Maarten}, TITLE = {Comparing local and global mutations on bit-strings.}, BOOKTITLE = {Genetic and Evolutionary Computation Conference 2008}, ORGANIZATION = {Association for Computing Machinery (ACM)}, PADDRESS = {New York, USA}, ADDRESS = {Atlanta, USA}, PUBLISHER = {ACM}, SERIES = {Proceedings of the 10th annual conference on Genetic and evolutionary computation}, ISBN = {978-1-60558-130-9}, YEAR = {2008}, PAGES = {929--936}, } @ARTICLE{DoerrJKNT13, AUTHOR = {Doerr, Benjamin and Johannsen, Daniel and K{\"o}tzing, Timo and Neumann, Frank and Theile, Madeleine}, JOURNAL = {Theoretical Computer Science}, TITLE = {More effective crossover operators for the all-pairs shortest path problem}, ADDRESS = {Amsterdam, The Netherlands}, PUBLISHER = {Elsevier}, VOLUME = {471}, ISBN = {0304-3975}, DOI = {10.1016/j.tcs.2012.10.059}, YEAR = {2013}, PAGES = {12--26}, } @INPROCEEDINGS{DoerrJohannsen07a, AUTHOR = {Doerr, Benjamin and Johannsen, Daniel}, EDITOR = {Thierens, Dirk}, TITLE = {Adjacency List Matchings --- An Ideal Genotype for Cycle Covers}, BOOKTITLE = {Genetic and Evolutionary Computation Conference (GECCO-2007)}, PADDRESS = {New York, USA}, ADDRESS = {London, UK}, PUBLISHER = {ACM}, ISBN = {978-1-59593-697-4}, YEAR = {2007}, PAGES = {1203--1210}, ABSTRACT = {We propose and analyze a novel genotype representation for walk and cycle covers in graphs. Together with a natural mutation operator, it yields superior algorithms based on randomized local search and (1+1) evolutionary algorithms. In particular, we derive an evolutionary algorithm that computes an Euler tour in a graph with $m$ edges in expected run-time $O(m \log m)$. This is comparable to the best direct algorithm for this problem running in linear time. Also, a simple coupon collector argument indicates that our run-time is asymptotically optimal for any randomized search heuristic.}, } @INPROCEEDINGS{DoerrJohannsen2007b, AUTHOR = {Doerr, Benjamin and Johannsen, Daniel}, TITLE = {Refined Runtime Analysis of a Basic Ant Colony Optimization Algorithm}, BOOKTITLE = {IEEE Congress on Evolutionary Computation 2007}, PADDRESS = {Vancouver, CA}, ADDRESS = {Singapore}, PUBLISHER = {IEEE}, ISBN = {1-4244-1339-7}, YEAR = {2007}, PAGES = {501--507}, ABSTRACT = {Neumann and Witt (2006) analyzed the runtime of the basic ant colony optimization (ACO) algorithm {\sc 1-Ant} on pseudo-boolean optimization problems. For the problem {\sc OneMax} they showed how the runtime depends on the evaporation factor. In particular, they proved a phase transition from exponential to polynomial runtime. In this work, we simplify the view on this problem by an appropriate translation of the pheromone model. This results in a profound simplification of the pheromone update rule and, by that, a refinement of the results of Neumann and Witt. In particular, we show how the exponential runtime bound gradually changes to a polynomial bound inside the phase of transition.}, } @INPROCEEDINGS{DoerrJohannsenTang2008a, AUTHOR = {Doerr, Benjamin and Johannsen, Daniel and Tang, Ching Hoo}, EDITOR = {G{\"u}nter Rudolph and Thomas Jansen and Simon M. Lucas and Carlo Poloni and Nicola Beume}, TITLE = {How Single Ant ACO Systems Optimize Pseudo-Boolean Functions}, BOOKTITLE = {Parallel Problem Solving from Nature – PPSN X}, PADDRESS = {Berlin / Heidelberg}, ADDRESS = {Dortmund, Germany}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5199}, ISBN = {978-3-540-87699-1}, DOI = {10.1007/978-3-540-87700-4_38}, YEAR = {2008}, PAGES = {378--388}, ABSTRACT = {We undertake a rigorous experimental analysis of the optimization behavior of the two most studied single ant ACO systems on several pseudo-boolean functions. By tracking the behavior of the underlying random processes rather than just regarding the resulting optimization time, we gain additional insight into these systems. A main finding is that in those cases where the single ant ACO system performs well, it basically simulates the much simpler (1+1) evolutionary algorithm.}, } @INPROCEEDINGS{DoerrJSWZ10, AUTHOR = {Doerr, Benjamin and Jansen, Thomas and Sudholt, Dirk and Winzen, Carola and Zarges, Christine}, EDITOR = {Schaefer, Robert and Cotta, Carlos and Kolodziej, Joanna and Rudolph, G{\"u}nter}, TITLE = {Optimizing Monotone Functions Can Be Difficult}, BOOKTITLE = {Parallel Problem Solving from Nature - PPSN XI. - Pt. 1}, PADDRESS = {Berlin}, ADDRESS = {Krakow, Poland}, PUBLISHER = {Springer}, MONTH = {September}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6238}, ISBN = {978-3-642-15843-8}, DOI = {10.1007/978-3-642-15844-5_5}, YEAR = {2010}, PAGES = {42--51}, ABSTRACT = {Extending previous analyses on function classes like linear functions, we analyze how the simple (1+1) evolutionary algorithm optimizes pseudo-Boolean functions that are strictly monotone. Contrary to what one would expect, not all of these functions are easy to optimize. The choice of the constant $c$ in the mutation probability $p(n) = c/n$ can make a decisive difference. We show that if $c < 1$, then the \EA finds the optimum of every such function in $\Theta(n \log n)$ iterations. For $c=1$, we can still prove an upper bound of $O(n^{3/2})$. However, for $c > 33$, we present a strictly monotone function such that the \EA with overwhelming probability does not find the optimum within $2^{\Omega(n)}$ iterations. This is the first time that we observe that a constant factor change of the mutation probability changes the run-time by more than constant factors.}, } @ARTICLE{DoerrJSWZ13EvCo, AUTHOR = {Doerr, Benjamin and Jansen, Thomas and Sudholt, Dirk and Winzen, Carola and Zarges, Christine}, JOURNAL = {Evolutionary Computation}, TITLE = {Mutation rate matters even when optimizing monotonic functions}, ADDRESS = {Cambridge, MA}, NUMBER = {1}, PUBLISHER = {http://www.mitpressjournals.org/}, VOLUME = {21}, ISBN = {1063-6560}, DOI = {10.1162/EVCO_a_00055}, YEAR = {2013}, PAGES = {1--27}, } @INPROCEEDINGS{DoerrJW10a, AUTHOR = {Doerr, Benjamin and Johannsen, Daniel and Winzen, Carola}, EDITOR = {Pelikan, Martin and Branke, J{\"u}rgen}, TITLE = {Multiplicative Drift Analysis}, BOOKTITLE = {Proceedings of 12th Annual Conference on Genetic and Evolutionary Computation (GECCO-2010)}, ORGANIZATION = {Association for Computing Machinery (ACM)}, PADDRESS = {New York, NY}, ADDRESS = {Portland, USA}, PUBLISHER = {ACM}, ISBN = {978-1-4503-0072-5}, DOI = {10.1145/1830483.1830748}, YEAR = {2010}, PAGES = {1449--1456}, NOTE = {Best Paper Award}, ABSTRACT = {Drift analysis is one of the strongest tools in the analysis of evolutionary algorithms. Its main weakness is that it is often very hard to find a good drift function. In this paper, we make progress in this direction. We prove a multiplicative version of the classical drift theorem. This allows easier analyses in those settings, where the optimization progress is roughly proportional to the current objective value. Our drift theorem immediately gives natural proofs for the best known run-time bounds for the (1+1) Evolutionary Algorithm computing minimum spanning trees and shortest paths, since here we may simply take the objective function as drift function. As a more challenging example, we give a relatively simple proof for the fact that any linear function is optimized in time $O(n \log n)$. In the multiplicative setting, a simple linear function can be used as drift function (without taking any logarithms). However, we also show that, both in the classical and the multiplicative setting, drift functions yielding good results for all linear functions exist only if the mutation probability is at most $c/n$ for a small constant $c$.}, } @INPROCEEDINGS{DoerrJW10b, AUTHOR = {Doerr, Benjamin and Johannsen, Daniel and Winzen, Carola}, TITLE = {Drift Analysis and Linear Functions Revisited}, BOOKTITLE = {Proceedings of the IEEE Congress on Evolutionary Computation (CEC 2010). - Pt. 3}, ORGANIZATION = {IEEE}, PADDRESS = {Piscataway, NJ}, ADDRESS = {Barcelona, Spain}, PUBLISHER = {IEEE}, ISBN = {978-1-4244-6909-3}, DOI = {10.1109/CEC.2010.5586097}, YEAR = {2010}, PAGES = {1967--1974}, ABSTRACT = {We regard the classical problem how the (1+1)~Evolutionary Algorithm optimizes an arbitrary linear pseudo-Boolean function. We show that any such function is optimized in time ${(1+o(1)) 1.39 e n\ln (n)}$, where ${n}$ is the length of the bit string. We also prove a lower bound of ${(1-o(1))e n\ln(n)}$, which in fact holds for all functions with a unique global optimum. This shows that for linear functions, even though the optimization behavior might differ, the resulting runtimes are very similar. Our experimental results suggest that the true optimization times are even closer than what the theoretical guarantees promise. }, } @ARTICLE{DoerrJW12, AUTHOR = {Doerr, Benjamin and Johannsen, Daniel and Winzen, Carola}, JOURNAL = {Theoretical Computer Science}, TITLE = {Non-existence of linear universal drift functions}, ADDRESS = {Amsterdam}, PUBLISHER = {Elsevier}, MONTH = {June}, VOLUME = {436}, ISBN = {0304-3975}, DOI = {10.1016/j.tcs.2012.01.048}, YEAR = {2012}, PAGES = {71--86}, } @ARTICLE{DoerrJW12Multi, AUTHOR = {Doerr, Benjamin and Johannsen, Daniel and Winzen, Carola}, JOURNAL = {Algorithmica}, TITLE = {Multiplicative Drift Analysis}, ADDRESS = {New York, NY}, NUMBER = {4}, PUBLISHER = {Springer}, MONTH = {December}, VOLUME = {64}, ISBN = {0178-4617}, DOI = {10.1007/s00453-012-9622-x}, YEAR = {2012}, PAGES = {673--697}, ABSTRACT = {We introduce multiplicative drift analysis as a suitable way to analyze the runtime of randomized search heuristics such as evolutionary algorithms. Our multiplicative version of the classical drift theorem allows easier analyses in the often encountered situation that the optimization progress is roughly proportional to the current distance to the optimum. To display the strength of this tool, we regard the classical problem of how the (1+1) Evolutionary Algorithm optimizes an arbitrary linear pseudo-Boolean function. Here, we first give a relatively simple proof for the fact that any linear function is optimized in expected time $O(n \log n)$, where $n$ is the length of the bit string. Afterwards, we show that in fact any such function is optimized in expected time at most $(1+o(1))1.39 e n\ln n$, again using multiplicative drift analysis. We also prove a corresponding lower bound of $(1−o(1)) e n \ln n$ which actually holds for all functions with a unique global optimum. We further demonstrate how our drift theorem immediately gives natural proofs (with better constants) for the best known runtime bounds for the (1+1) Evolutionary Algorithm on combinatorial problems like finding minimum spanning trees, shortest paths, or Euler tours in graphs.}, } @INPROCEEDINGS{DoerrK2013a, AUTHOR = {Doerr, Benjamin and K{\"u}nnemann, Marvin}, TITLE = {Royal Road Functions and the (1 + λ) Evolutionary Algorithm: Almost no Speed-up from Larger Offspring Populations}, BOOKTITLE = {2013 IEEE Congress on Evolutionary Computation (CEC 2013)}, ORGANIZATION = {Institute of Electrical and Electronics Engineers (IEEE)}, PADDRESS = {Piscataway, USA}, ADDRESS = {Cancun, Mexico}, PUBLISHER = {IEEE}, MONTH = {June}, ISBN = {978-1-4799-0453-2}, DOI = {10.1109/CEC.2013.6557600}, YEAR = {2013}, PAGES = {424--431}, ABSTRACT = {We analyze the runtime of the $(1 + \lambda)$ evolutionary algorithm (EA) on the classic royal road test function class. For a royal road function defined on bit-strings of length $n$ having block size $d\ge\log n+(c+1+\varepsilon)\log d$, we prove that the $(1 + \lambda)$ EA with $\lambda = \Theta(n^c)$ finds the optimum in an expected number of $O(\frac{2^d}{d^c}\cdot\frac{n}{d} \log \frac{n}{d})$ generations. Together with our lower bound of $\Omega(\frac{2^d}{d^c})$, this shows that for royal road functions even very large offspring populations do not reduce the runtime significantly.}, } @INPROCEEDINGS{DoerrK2013b, AUTHOR = {Doerr, Benjamin and K{\"u}nnemann, Marvin}, EDITOR = {Blum, Christian}, TITLE = {How the (1+λ) Evolutionary Algorithm Optimizes Linear Functions}, BOOKTITLE = {15th Annual Conference on Genetic and Evolutionary Computation Conference (GECCO '13)}, ORGANIZATION = {Association for Computing Machinery (ACM)}, PADDRESS = {New York, USA}, ADDRESS = {Amsterdam, The Netherlands}, PUBLISHER = {ACM}, ISBN = {978-1-4503-1963-8}, DOI = {10.1145/2463372.2463569}, YEAR = {2013}, PAGES = {1589--1596}, } @ARTICLE{DoerrKLW13, AUTHOR = {Doerr, Benjamin and K{\"o}tzing, Timo and Lengler, Johannes and Winzen, Carola}, JOURNAL = {Theoretical Computer Science}, TITLE = {Black-Box Complexities of Combinatorial Problems}, PUBLISHER = {Elsevier}, VOLUME = {471}, ISBN = {0304-3975}, DOI = {10.1016/j.tcs.2012.10.039}, YEAR = {2013}, PAGES = {84--106}, ABSTRACT = {Black-box complexity, counting the number of queries needed to find the optimum of a problem without having access to an explicit problem description, was introduced by Droste, Jansen, and Wegener (Theory of Computing Systems 39 (2006) 525--544) to measure the difficulty of solving an optimization problem via generic search heuristics such as evolutionary algorithms, simulated annealing or ant colony optimization. Since then, a number of similar complexity notions were introduced. However, so far these new notions were only analyzed for artificial test problems. In this paper, we move a step forward and analyze the different black-box complexity notions for two classic combinatorial problems, namely the minimum spanning tree and the single-source shortest path problem. Besides proving bounds for their black-box complexities, our work reveals that the choice of how to model the optimization problem has a significant influence on its black-box complexity. In addition, when regarding the unbiased (symmetry-invariant) black-box complexity of combinatorial problems, it is important to choose a meaningful definition of unbiasedness.}, } @INPROCEEDINGS{DoerrKuennemann2010, AUTHOR = {Doerr, Benjamin and K{\"u}nnemann, Marvin and Wahlstr{\"o}m, Magnus}, EDITOR = {Festa, Paola}, TITLE = {Randomized Rounding for Routing and Covering Problems: Experiments and Improvements}, BOOKTITLE = {Experimental Algorithms : 9th International Symposium, SEA 2010}, PADDRESS = {Berlin}, ADDRESS = {Naples, Italy}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6049}, ISBN = {978-3-642-13192-9}, DOI = {10.1007/978-3-642-13193-6_17}, YEAR = {2010}, PAGES = {190--201}, } @INPROCEEDINGS{DoerrKW11, AUTHOR = {Doerr, Benjamin and K{\"o}tzing, Timo and Winzen, Carola}, EDITOR = {Krasnogor, Natalio and Lanzi, Pier Luca}, TITLE = {Too fast unbiased black-box algorithms}, BOOKTITLE = {GECCO 2011 : Genetic and Evolutionary Computation Conference}, PADDRESS = {New York, NY}, ADDRESS = {Dublin, Ireland}, PUBLISHER = {ACM}, ISBN = {978-1-4503-0557-0}, DOI = {10.1145/2001576.2001851}, YEAR = {2011}, PAGES = {2043--2050}, } @INPROCEEDINGS{DoerrLKW11, AUTHOR = {Doerr, Benjamin and Lengler, Johannes and K{\"o}tzing, Timo and Winzen, Carola}, EDITOR = {Krasnogor, Natalio and Lanzi, Pier Luca}, TITLE = {Black-box complexities of combinatorial problems}, BOOKTITLE = {GECCO 2011 : Genetic and Evolutionary Computation Conference}, PADDRESS = {New York, NY}, ADDRESS = {Dublin, Ireland}, PUBLISHER = {ACM}, ISBN = {978-1-4503-0557-0}, DOI = {10.1145/2001576.2001710}, YEAR = {2011}, PAGES = {981--988}, } @INPROCEEDINGS{DoerrM11, AUTHOR = {Doerr, Benjamin and Fouz, Mahmoud}, EDITOR = {Aceto, Luca and Henzinger, Monika and Sgall, Jiri}, TITLE = {Asymptotically Optimal Randomized Rumor Spreading}, BOOKTITLE = {Automata, Languages and Programming : 38th International Colloquium, ICALP 2011}, PADDRESS = {Berlin}, ADDRESS = {Z{\"u}rich, Switzerland}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6756}, ISBN = {978-3-642-22011-1}, DOI = {10.1007/978-3-642-22012-8_40}, YEAR = {2011}, PAGES = {502--513}, } @INPROCEEDINGS{DoerrMJ11, AUTHOR = {Doerr, Benjamin and Johannsen, Daniel and Schmidt, Martin}, EDITOR = {Beyer, Hans- Georg and Langdon, William}, TITLE = {Runtime analysis of the (1+1) evolutionary algorithm on strings over finite alphabets}, BOOKTITLE = {FOGA'11 : Proceedings of the 2011 ACM/SIGEVO Foundations of Genetic Algorithms XI}, PADDRESS = {New York, NY}, ADDRESS = {Schwarzenberg, Austria}, PUBLISHER = {ACM}, ISBN = {978-1-4503-0633-1}, DOI = {10.1145/1967654.1967665}, YEAR = {2011}, PAGES = {119--126}, } @ARTICLE{DoerrMMW2012arxiv, AUTHOR = {Doerr, Benjamin and Moran, Shay and Moran, Shlomo and Winzen, Carola}, JOURNAL = {arXiv}, TITLE = {Simple and Optimal Fault-Tolerant Rumor Spreading}, ADDRESS = {Ithaca, NY}, PUBLISHER = {Cornell University Library}, VOLUME = {abs/1209.6158}, YEAR = {2012}, PAGES = {1--18}, } @ARTICLE{DoerrNeumann, AUTHOR = {Doerr, Benjamin and Neumann, Frank}, JOURNAL = {Algorithmica}, TITLE = {In Memoriam: Ingo Wegener}, ADDRESS = {New York, NY}, NUMBER = {3}, PUBLISHER = {Springer}, VOLUME = {58}, ISBN = {0178-4617}, DOI = {10.1007/s00453-009-9372-6}, YEAR = {2010}, PAGES = {541--542}, } @ARTICLE{DoerrNeumannWegener2010, AUTHOR = {Doerr, Benjamin and Neumann, Frank and Wegener, Ingo}, JOURNAL = {Algorithmica}, TITLE = {Editorial}, ADDRESS = {New York, NY}, NUMBER = {1}, PUBLISHER = {Springer}, VOLUME = {57}, ISBN = {0178-4617}, DOI = {10.1007/s00453-009-9373-5}, YEAR = {2010}, PAGES = {119--120}, } @ARTICLE{DoerrNSW11, AUTHOR = {Doerr, Benjamin and Neumann, Frank and Sudholt, Dirk and Witt, Carsten}, JOURNAL = {Theoretical Computer Science}, TITLE = {Runtime analysis of the 1-{ANT} ant colony optimizer}, ADDRESS = {Amsterdam}, NUMBER = {17}, PUBLISHER = {Elsevier}, VOLUME = {412}, ISBN = {0304-3975}, DOI = {10.1016/j.tcs.2010.12.030}, YEAR = {2011}, PAGES = {1629--1644}, } @INPROCEEDINGS{DoerrP12GECCO, AUTHOR = {Doerr, Benjamin and Pohl, Sebastian}, EDITOR = {Soule, Terence and Moore, Jason H.}, TITLE = {Run-time analysis of the (1+1) evolutionary algorithm optimizing linear functions over a finite alphabet}, BOOKTITLE = {GECCO'12 : Proceedings of the Fourteenth International Conference on Genetic and Evolutionary Computation}, PADDRESS = {New York, NY}, ADDRESS = {Philadelphia, PA}, PUBLISHER = {ACM}, ISBN = {978-1-4503-1177-9}, DOI = {10.1145/2330163.2330346}, YEAR = {2012}, PAGES = {1317--1324}, } @INPROCEEDINGS{DoerrSTACS2005, AUTHOR = {Doerr, Benjamin}, EDITOR = {Diekert, Volker and Durand, Bruno}, TITLE = {Roundings Respecting Hard Constraints}, BOOKTITLE = {STACS 2005 : 22nd Annual Symposium on Theoretical Aspects of Computer Science (STACS'05)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Stuttgart, Germany}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {3404}, ISBN = {3-540-24998-2}, YEAR = {2005}, PAGES = {617--628}, } @INPROCEEDINGS{DoerrStacs2006, AUTHOR = {Doerr, Benjamin}, EDITOR = {Durand, Bruno and Thomas, Wolfgang}, TITLE = {Generating Randomized Roundings with Cardinality Constraints and Derandomizations}, BOOKTITLE = {STACS 2006, 23rd Annual Symposium on Theoretical Aspects of Computer Science}, PADDRESS = {Berlin, Germany}, ADDRESS = {Marseille, France}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {3884}, ISBN = {3-540-32301-5}, YEAR = {2006}, PAGES = {571--583}, ABSTRACT = {We provide a general method to generate randomized roundings that satisfy cardinality constraints. Our approach is different from the one taken by Srinivasan (FOCS 2001) and Gandhi et al. (FOCS 2002) for one global constraint and the bipartite edge weight rounding problem. Also for these special cases, our approach is the first that can be derandomized. For the bipartite edge weight rounding problem, in addition, we gain an factor run-time improvement for generating the randomized solution. We also improve the current best result on the general problem of derandomizing randomized roundings. Here we obtain a simple O(mnlog n) time algorithm that works in the RAM model for arbitrary matrices with entries in . This improves over the O(mn2 log(mn)) time solution of Srivastav and Stangier.}, } @INPROCEEDINGS{DoerrSTW12, AUTHOR = {Doerr, Benjamin and Sp{\"o}hel, Reto and Thomas, Henning and Winzen, Carola}, TITLE = {Playing Mastermind with Many Colors}, BOOKTITLE = {Proc. of the 11th Cologne-Twente Workshop on Graphs and Combinatorial Optimization (CTW 2012)}, PADDRESS = {0}, ADDRESS = {Munich. Germany}, PUBLISHER = {0}, YEAR = {2012}, } @INPROCEEDINGS{DoerrSTW13, AUTHOR = {Doerr, Benjamin and Sp{\"o}hel, Reto and Thomas, Henning and Winzen, Carola}, TITLE = {Playing Mastermind with many colors}, BOOKTITLE = {Proceedings of the Twenty-Fourth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2013)}, ORGANIZATION = {ACM-SIAM}, PADDRESS = {Philadelphia, USA}, ADDRESS = {New Orleans, USA}, PUBLISHER = {SIAM}, ISBN = {9781627484855}, YEAR = {2013}, PAGES = {695--704}, ABSTRACT = {We analyze the general version of the classic guessing game Mastermind with $n$~positions and $k$~colors. Since the case $k \le n^{1-\eps}$, $\eps>0$ constant, is well understood, we concentrate on larger numbers of colors. For the most prominent case $k = n$, our results imply that Codebreaker can find the secret code with $O(n \log \log n)$ guesses. This bound is valid also when only black answer-pegs are used. It improves the $O(n \log n)$ bound first proven by Chv\'atal (Combinatorica 3 (1983), 325--329). We also show that if both black and white answer-pegs are used, then the $O(n \log\log n)$ bound holds for up to $n^2 \log\log n$ colors. These bounds are almost tight as the known lower bound of $\Omega(n)$ shows. Unlike for $k \le n^{1-\eps}$, simply guessing at random until the secret code is determined is not sufficient. In fact, we show that any non-adaptive strategy needs an expected number of $\Omega(n \log n)$ guesses.}, } @INPROCEEDINGS{DoerrSW2013FOGA, AUTHOR = {Doerr, Benjamin and Sudholt, Dirk and Witt, Carsten}, TITLE = {When Do Evolutionary Algorithms Optimize Separable Functions in Parallel?}, BOOKTITLE = {ACM/SIGEVO Foundations of Genetic Algorithms (FOGA 2013)}, PADDRESS = {New York, NY}, ADDRESS = {Adelaide, Australia}, PUBLISHER = {ACM}, ISBN = {978-145-031-990-4}, YEAR = {2013}, PAGES = {51--63}, } @ARTICLE{DoerrTCS2007, AUTHOR = {Doerr, Benjamin}, JOURNAL = {Theory of Computing Systems}, TITLE = {Roundings respecting hard constraints}, ADDRESS = {Berlin, Germany}, NUMBER = {4}, PUBLISHER = {Springer}, VOLUME = {40}, ISBN = {1432-4350}, DOI = {10.1007/s00224-006-1318-7}, YEAR = {2007}, PAGES = {467--483}, ABSTRACT = { A problem arising in integer linear programming is transforming a solution of a linear system to an integer one that is "close." The customary model for investigating such problems is, given a matrix A and a [0,1]-valued vector x, finding a binary vector y such that ||A(x - y)||∞, the maximum violation of the constraints, is small. Randomized rounding and the algorithm of Beck and Fiala are ways to compute such solutions y, whereas linear discrepancy is a lower bound measure. In many applications one is looking for roundings that, in addition to being close to the original solution, satisfy some constraints without violation. The objective of this paper is to investigate such problems in a unified way. To this aim, we extend the notion of linear discrepancy to include such hard cardinality constraints. We extend the algorithm of Beck and Fiala to cope with this setting. If the constraints contain disjoint sets of variables, the rounding error increases by only a factor of two. We also show how to generate and derandomize randomized roundings respecting disjoint cardinality constraints. However, we also provide some examples showing that additional hard constraints may seriously increase the linear discrepancy. In particular, we show that the c-color linear discrepancy of a totally unimodular matrix can be as high as Ω(log c). }, } @INPROCEEDINGS{DoerrTheileGECCO2009, AUTHOR = {Doerr, Benjamin and Theile, Madeleine}, EDITOR = {Raidl, G{\"u}nther and Rothlauf, Frank}, TITLE = {Improved Analysis Methods for Crossover-Based Algorithms}, BOOKTITLE = {Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation (GECCO 2009)}, PADDRESS = {New York, NY}, ADDRESS = {Montreal, Canada}, PUBLISHER = {ACM}, ISBN = {978-1-60558-325-9}, DOI = {10.1145/1569901.1569937}, YEAR = {2009}, PAGES = {247--254}, } @ARTICLE{DoerrTusnady, AUTHOR = {Doerr, Benjamin}, JOURNAL = {European Journal of Combinatorics}, TITLE = {Matrix approximation and {Tusn{\'a}dy's} problem}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {3}, PUBLISHER = {Elsevier}, VOLUME = {28}, ISBN = {0195-6698}, YEAR = {2007}, PAGES = {990--995}, ABSTRACT = {We consider the problem of approximating a given matrix by an integer one such that in all geometric submatrices the sum of the entries does not change by much. We show that for all integers m,n≥2 and real matrices there is an integer matrix such that holds for all intervals I[m], J[n]. Such a matrix can be computed in time O(mnlog(min{m,n})). The result remains true if we add the requirement |aij−bij| <2 for all i[m],j[n]. This is surprising.}, } @INPROCEEDINGS{DoerrW10, AUTHOR = {Doerr, Benjamin and Winzen, Carola}, EDITOR = {Kulikov, Alexande and Vereshchagin, Nikolay}, TITLE = {Towards a Complexity Theory of Randomized Search Heuristics: Ranking-Based Black-Box Complexity}, BOOKTITLE = {Computer Science - Theory and Applications : 6th International Computer Science Symposium in Russia (CSR 2011)}, PADDRESS = {Berlin}, ADDRESS = {St. Petersburg, Russia}, PUBLISHER = {Springer}, MONTH = {June}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6651}, ISBN = {978-3-642-20711-2}, DOI = {10.1007/978-3-642-20712-9_2}, YEAR = {2011}, PAGES = {15--28}, ABSTRACT = {Randomized search heuristics are a broadly used class of general-purpose algorithms. Analyzing them via classical methods of theoretical computer science is a growing field. A big step forward would be a useful complexity theory for such algorithms. We enrich the two existing black-box complexity notions due to Wegener and other authors by the restrictions that not actual objective values, but only the relative quality of the previously evaluated solutions may be taken into account by the algorithm. Many randomized search heuristics belong to this class of algorithms. We show that the new ranking-based model gives more realistic complexity estimates for some problems, while for others the low complexities of the previous models still hold.}, } @ARTICLE{DoerrW11ECCC, AUTHOR = {Doerr, Benjamin and Winzen, Carola}, JOURNAL = {Electronic Colloquium on Computational Complexity}, TITLE = {Memory-Restricted Black-Box Complexity}, VOLUME = {18}, YEAR = {2011}, PAGES = {7}, } @ARTICLE{DoerrW12, AUTHOR = {Doerr, Benjamin and Winzen, Carola}, JOURNAL = {Information Processing Letters}, TITLE = {Memory-restricted black-box complexity of {OneMax}}, ADDRESS = {Amsterdam}, PUBLISHER = {Elsevier}, VOLUME = {112}, ISBN = {0020-0190}, DOI = {10.1016/j.ipl.2011.10.004}, YEAR = {2012}, PAGES = {32--34}, } @INPROCEEDINGS{DoerrW12EA, AUTHOR = {Doerr, Benjamin and Winzen, Carola}, EDITOR = {Hao, Jin-Kao and Legrand, Pierrick and Collet, Pierre and Monmarch{\'e}, Nicolas and Lutton, Evelyne and Schoenauer, Marc}, TITLE = {Black-box complexity: {Breaking} the {O}(n logn) barrier of {LeadingOnes}}, BOOKTITLE = {Artificial Evolution 10th International Conference Evolution Artificielle, EA 2011}, PADDRESS = {Berlin}, ADDRESS = {Angers, France}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {7401}, ISBN = {978-3-642-35532-5}, DOI = {10.1007/978-3-642-35533-2_18}, YEAR = {2012}, PAGES = {205--216}, } @INPROCEEDINGS{DoerrW12GECCO, AUTHOR = {Doerr, Benjamin and Winzen, Carola}, EDITOR = {Soule, Terence and Moore, Jason H.}, TITLE = {Reducing the arity in unbiased black-box complexity}, BOOKTITLE = {GECCO'12 : Proceedings of the Fourteenth International Conference on Genetic and Evolutionary Computation}, ORGANIZATION = {Association for Computing Machinery (ACM)}, PADDRESS = {New York, NY}, ADDRESS = {Philadelphia, PA}, PUBLISHER = {ACM}, ISBN = {978-1-4503-1177-9}, DOI = {10.1145/2330163.2330345}, YEAR = {2012}, PAGES = {1309--1316}, ABSTRACT = {We show that for all $1 0$. This improves upon the previously known bound of $O(\sqrt{n\log\log n/\log n}$).}, } @UNPUBLISHED{Elbassioni2007b, AUTHOR = {Elbassioni, Khaled M. and Sitters, Rene and Zhang, Yan}, TITLE = {A Quasi-PTAS for Envy-free Pricing on Line Graphs}, MONTH = {January}, YEAR = {2007}, ABSTRACT = {We consider the problem of pricing items so as to maximize the profit made from selling these items. An instance is given by a set $E$ of $n$ items and a set of $m$ clients, where each client is specified by one subset of $E$ (the bundle of items he wants to buy), and a budget, which is the maximum price he wants to pay for the subset. We restrict to the model where the subsets can be arranged such that they form intervals of a line graph. We give a quasi-polynomial time approximation scheme for the capacitated and uncapacitated problem. In the latter problem, also known as the highway problem, there is an infinite supply of any item. Hence, we assume that any client that can afford its bundle will buy it. In the capacitated problem there is only a limited supply of any item. Hence, we have to set prices as well to find a subset of the clients such that the supply constraints are satisfied. This problem is closely related to the unsplittable flow problem on line graphs for which a quasi-PTAS was developed only recently.}, } @UNPUBLISHED{Elbassioni2007c, AUTHOR = {Boros, Endre and Elbassioni, Khaled M. and Gurvich, Vladimir and Makino, Kazuhisa}, TITLE = {Generating Vertices of Polyhedra and Related Monotone Generation Problems}, MONTH = {February}, YEAR = {2007}, ABSTRACT = {The well-known vertex enumeration problem calls for generating all the vertices of a polyhedron, given by its description as a system of linear inequalities. Recently, a number of combinatorial techniques have been developed and applied successfully to a large number of enumeration problems in different areas. We consider four such techniques and give several examples where they are applicable to the vertex enumeration problem, and also discuss some of their limitations.}, } @INPROCEEDINGS{Elbassioni2007d, AUTHOR = {Elbassioni, Khaled and Sitters, Rene and Zhang, Yan}, EDITOR = {Arge, Lars and Hoffmann, Michael and Welzl, Emo}, TITLE = {A Quasi-PTAS for Profit-Maximizing Pricing on Line Graphs}, BOOKTITLE = {Algorithms - ESA 2007, 15th Annual European Symposium, Eilat, Israel, October 8-10, 2007, Proceedings}, PADDRESS = {Berlin}, ADDRESS = {Eilat, Israel}, PUBLISHER = {Springer}, MONTH = {October}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4698}, YEAR = {2007}, PAGES = {451--462}, ABSTRACT = {We consider the problem of pricing items so as to maximize the profit made from selling these items. An instance is given by a set $E$ of $n$ items and a set of $m$ clients, where each client is specified by one subset of $E$ (the bundle of items he/she wants to buy), and a budget (valuation), which is the maximum price he is willing to pay for that subset. We restrict our attention to the model where the subsets can be arranged such that they form intervals of a line graph. Assuming an unlimited supply of any item, this problem is known as \emph{the highway problem} and so far only an $O(\log n)$-approximation algorithm is known. We show that a PTAS is likely to exist by presenting a quasi-polynomial time approximation scheme. We also combine our ideas with a recently developed quasi-PTAS for the unsplittable flow problem on line graphs to extend this approximation scheme to the limited supply version of the pricing problem.}, } @INPROCEEDINGS{Elbassioni2007e, AUTHOR = {Boros, Endre and Borys, Konrad and Elbassioni, Khaled and Gurvich, Vladimir and Makino, Kazuhisa and Rudolf, Gabor}, EDITOR = {Lin, Guohui}, TITLE = {Generating Minimal k-Vertex Connected Spanning Subgraphs}, BOOKTITLE = {Computing and Combinatorics, 13th Annual International Conference, COCOON 2007, Proceedings}, PADDRESS = {Berlin}, ADDRESS = {Banff, Canada}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4598}, YEAR = {2007}, PAGES = {222--231}, } @INPROCEEDINGS{Elbassioni2007f, AUTHOR = {Ajwani, Deepak and Elbassioni, Khaled and Govindarajan, Sathish and Ray, Saurabh}, EDITOR = {Gibbons, Phillip B. and Scheideler, Christian}, TITLE = {Conflict-free coloring for rectangle ranges using $n^{.382}$ colors}, BOOKTITLE = {SPAA 2007: Proceedings of the 19th Annual ACM Symposium on Parallel Algorithms and Architectures}, PADDRESS = {New York, USA}, ADDRESS = {San Diego, California}, PUBLISHER = {ACM}, YEAR = {2007}, PAGES = {181--187}, } @ARTICLE{Elbassioni2007g, AUTHOR = {Khachiyan, Leonid and Boros, Endre and Elbassioni, Khaled and Gurvich, Vladimir and Makino, Kazuhisa}, JOURNAL = {Discrete Applied Mathematics}, TITLE = {Enumerating disjunctions and conjunctions of paths and cuts in reliability theory}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {2}, PUBLISHER = {Elsevier}, VOLUME = {155}, ISBN = {0166-218X}, DOI = {10.1016/j.dam.2006.04.032}, YEAR = {2007}, PAGES = {137--149}, } @ARTICLE{Elbassioni2007h, AUTHOR = {Khachiyan, Leonid and Boros, Endre and Elbassioni, Khaled and Gurvich, Vladimir}, JOURNAL = {Information Processing Letters}, TITLE = {A global parallel algorithm for the hypergraph transversal problem}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {4}, PUBLISHER = {Elsevier}, VOLUME = {101}, ISBN = {0020-0190}, DOI = {10.1016/j.ipl.2006.09.006}, YEAR = {2007}, PAGES = {148--155}, } @ARTICLE{Elbassioni2007i, AUTHOR = {Khachiyan, Leonid and Boros, Endre and Elbassioni, Khaled and Gurvich, Vladimir and Makino, Kazuhisa}, JOURNAL = {Theoretical Computer Science}, TITLE = {Dual-bounded generating problems: Efficient and inefficient points for discrete probability distributions and sparse boxes for multidimensional data}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {3}, PUBLISHER = {Elsevier}, VOLUME = {379}, ISBN = {0304-3975}, DOI = {10.1016/j.tcs.2007.02.044}, YEAR = {2007}, PAGES = {361--376}, } @ARTICLE{Elbassioni2007j, AUTHOR = {Khachiyan, Leonid and Boros, Endre and Elbassioni, Khaled and Gurvich, Vladimir}, JOURNAL = {Theoretical Computer Science}, TITLE = {On the dualization of hypergraphs with bounded edge-intersections and other related classes of hypergraphs}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {2}, PUBLISHER = {Elsevier}, VOLUME = {382}, ISBN = {0304-3975}, DOI = {10.1016/j.tcs.2007.03.005}, YEAR = {2007}, PAGES = {139--150}, } @ARTICLE{Elbassioni2008, AUTHOR = {Boros, Endre and Elbassioni, Khaled and Gurvich, Vladimir and Tiwary, Hans Raj}, JOURNAL = {CoRR}, TITLE = {Characterization of the vertices and extreme directions of the negative cycle polyhedron and hardness of generating vertices of 0/1-polyhedra}, VOLUME = {abs/0801.3790}, YEAR = {2008}, } @INPROCEEDINGS{Elbassioni2008a, AUTHOR = {Tiwary, Hans Raj and Elbassioni, Khaled}, TITLE = {On the complexity of checking self-duality of polytopes and its relations to vertex enumeration and graph isomorphism}, BOOKTITLE = {Symposium on Computational Geometry 2008}, PADDRESS = {New York, NY, USA}, ADDRESS = {College Park, MD, USA,}, PUBLISHER = {ACM}, YEAR = {2008}, PAGES = {192--198}, } @INPROCEEDINGS{Elbassioni2008b, AUTHOR = {Elbassioni, Khaled and Hagen, Matthias and Rauf, Imran}, TITLE = {Some Fixed-Parameter Tractable Classes of Hypergraph Duality and Related Problems}, BOOKTITLE = {Parameterized and Exact Computation, Third International Workshop, IWPEC 2008}, PADDRESS = {Berlin}, ADDRESS = {Victoria, Canada}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5018}, YEAR = {2008}, PAGES = {91--102}, } @INPROCEEDINGS{Elbassioni2008c, AUTHOR = {Boros, Endre and Elbassioni, Khaled and Makino, Kazuhisa}, TITLE = {On Berge Multiplication for Monotone Boolean Dualization}, BOOKTITLE = {Automata, Languages and Programming, 35th International Colloquium, ICALP 2008}, PADDRESS = {Berlin}, ADDRESS = {Reykjavik, Iceland}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5125}, YEAR = {2008}, PAGES = {48--59}, } @INPROCEEDINGS{Elbassioni2008d, AUTHOR = {Boros, Endre and Elbassioni, Khaled and Gurvich, Vladimir and Makino, Kazuhisa and Oudalov, Vladimir}, TITLE = {A Complete Characterization of Nash-Solvability of Bimatrix Games in Terms of the Exclusion of Certain 2x2 subgames}, BOOKTITLE = {Computer Science - Theory and Applications, Third International Computer Science Symposium in Russia, CSR 2008}, PADDRESS = {Berlin}, ADDRESS = {Moscow, Russia}, PUBLISHER = {Springer}, VOLUME = {5010}, YEAR = {2008}, PAGES = {99--109}, } @INPROCEEDINGS{Elbassioni2008e, AUTHOR = {Elbassioni, Khaled and Tiwary, Hans Raj}, TITLE = {On a Cone Covering Problem}, BOOKTITLE = {Proceedings of the 20th Annual Canadian Conference on Computational Geometry}, PADDRESS = {Canada}, ADDRESS = {Montreal, Canada}, PUBLISHER = {CCCG}, YEAR = {2008}, PAGES = {171--174}, } @ARTICLE{Elbassioni2008f, AUTHOR = {Khachiyan, Leonid and Boros, Endre and Borys, Konrad and Elbassioni, Khaled and Gurvich, Vladimir and Rudolf, Gabor and Zhao, Jihui}, JOURNAL = {Theory Comput. Syst.}, TITLE = {On Short Paths Interdiction Problems: Total and Node-Wise Limited Interdiction}, NUMBER = {2}, VOLUME = {43}, YEAR = {2008}, PAGES = {204--233}, } @ARTICLE{Elbassioni2008g, AUTHOR = {Kutz, Martin and Elbassioni, Khaled and Katriel, Irit and Mahajan, Meena}, JOURNAL = {J. Comput. Syst. Sci.}, TITLE = {Simultaneous matchings: Hardness and approximation}, NUMBER = {5}, VOLUME = {74}, YEAR = {2008}, PAGES = {884--897}, } @ARTICLE{Elbassioni2008h, AUTHOR = {Elbassioni, Khaled}, JOURNAL = {Fuzzy Sets and Systems}, TITLE = {A note on systems with max-min and max-product constraints}, NUMBER = {17}, VOLUME = {159}, YEAR = {2008}, PAGES = {2272--2277}, } @ARTICLE{Elbassioni2008i, AUTHOR = {Elbassioni, Khaled}, JOURNAL = {Discrete Applied Mathematics}, TITLE = {On the complexity of monotone dualization and generating minimal hypergraph transversals}, NUMBER = {11}, VOLUME = {156}, YEAR = {2008}, PAGES = {2109--2123}, } @ARTICLE{Elbassioni2008j, AUTHOR = {Khachiyan, Leonid and Boros, Endre and Elbassioni, Khaled and Gurvich, Vladimir}, JOURNAL = {Discrete Applied Mathematics}, TITLE = {Generating all minimal integral solutions to AND-OR systems of monotone inequalities: Conjunctions are simpler than disjunctions}, NUMBER = {11}, VOLUME = {156}, YEAR = {2008}, PAGES = {2020--2034}, } @ARTICLE{Elbassioni2008k, AUTHOR = {Khachiyan, Leonid and Boros, Endre and Borys, Konrad and Elbassioni, Khaled and Gurvich, Vladimir}, JOURNAL = {Discrete \& Computational Geometry}, TITLE = {Generating All Vertices of a Polyhedron Is Hard}, NUMBER = {1-3}, VOLUME = {39}, YEAR = {2008}, PAGES = {174--190}, } @ARTICLE{Elbassioni2008l, AUTHOR = {Elbassioni, Khaled and Tiwary, Hans Raj}, JOURNAL = {CoRR}, TITLE = {On Computing the Vertex Centroid of a Polyhedron}, VOLUME = {abs/0806.3456}, YEAR = {2008}, } @ARTICLE{Elbassioni2008m, AUTHOR = {Khachiyan, Leonid and Boros, Endre and Borys, Konrad and Elbassioni, Khaled and Gurvich, Vladimir and Makino, Kazuhisa}, JOURNAL = {Algorithmica}, TITLE = {Generating Cut Conjunctions in Graphs and Related Problems}, NUMBER = {3}, VOLUME = {51}, YEAR = {2008}, PAGES = {239--263}, } @ARTICLE{Elbassioni2008n, AUTHOR = {Khachiyan, Leonid and Boros, Endre and Elbassioni, Khaled and Gurvich, Vladimir}, JOURNAL = {Algorithmica}, TITLE = {On Enumerating Minimal Dicuts and Strongly Connected Subgraphs}, NUMBER = {1}, VOLUME = {50}, YEAR = {2008}, PAGES = {159--172}, } @INCOLLECTION{Elbassioni2008o, AUTHOR = {Elbassioni, Khaled and Elmasry, Amr and Kamel, Ibrahim}, TITLE = {Indexing Schemes for Multi-dimensional Moving Objects}, BOOKTITLE = {Encyclopedia of GIS}, ADDRESS = {Berlin}, PUBLISHER = {Springer}, YEAR = {2008}, PAGES = {523--529}, } @ARTICLE{Elbassioni2008p, AUTHOR = {Elbassioni, Khaled}, JOURNAL = {SIAM Journal on Discrete Mathematics}, TITLE = {Algorithms for Dualization over Products of Partially Ordered Sets}, ADDRESS = {Philadelphia, Pa.}, NUMBER = {1}, PUBLISHER = {SIAM}, VOLUME = {23}, DOI = {10.1137/050622250}, YEAR = {2009}, PAGES = {487--510}, } @INPROCEEDINGS{Elbassioni2009a, AUTHOR = {Elbassioni, Khaled and Raman, Rajiv and Ray, Saurabh and Sitters, Rene}, EDITOR = {Matthieu, Claire}, TITLE = {On the approximability of the maximum feasible subsystem problem with 0/1-coefficients}, BOOKTITLE = {Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2009)}, PADDRESS = {New York, NY}, ADDRESS = {New York, NY, USA}, PUBLISHER = {ACM}, YEAR = {2009}, PAGES = {1210--1219}, } @INPROCEEDINGS{Elbassioni2009d, AUTHOR = {Boros, Endre and Elbassioni, Khaled and Gurvich, Vladimir and Makino, Kazuhisa}, EDITOR = {Eisenbrand, Friedrich and Shepherd, F. Bruce}, TITLE = {A Pumping Algorithm for Ergodic Stochastic Mean Payoff Games with Perfect Information}, BOOKTITLE = {Integer Programming and Combinatorial Optimization : 14th International Conference, IPCO 2010}, PADDRESS = {Berlin}, ADDRESS = {Lausanne, Switzerland}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6080}, ISBN = {978-3-642-13035-9}, DOI = {10.1007/978-3-642-13036-6_26}, YEAR = {2010}, PAGES = {341--354}, } @INPROCEEDINGS{Elbassioni2009ISAAC, AUTHOR = {Elbassioni, Khaled and Tiwary, Hans Raj}, TITLE = {Complexity of Approximating the Vertex Centroid of a Polyhedron}, BOOKTITLE = {Algorithms and Computation, 20th International Symposium (ISAAC)}, PADDRESS = {Berlin, NY}, ADDRESS = {Honolulu, Hawaii, USA}, PUBLISHER = {Springer}, YEAR = {2009}, PAGES = {413--422}, } @ARTICLE{Elbassioni2009x, AUTHOR = {Elbassioni, Khaled and Fishkin, Aleksei V. and Sitters, Ren{\'e}}, JOURNAL = {International Journal of Computational Geometry \& Applications}, TITLE = {Approximation algorithms for the {Euclidean} traveling salesman problem with discrete and continuous neighborhoods}, ADDRESS = {Singapore}, NUMBER = {2}, PUBLISHER = {World Scientific Publ.}, VOLUME = {19}, ISBN = {0218-1959}, DOI = {10.1142/S0218195909002897}, YEAR = {2009}, PAGES = {173--193}, } @INPROCEEDINGS{Elbassioni2010, AUTHOR = {Canzar, Stefan and Elbassioni, Khaled and Elmasry, Amr and Raman, Rajiv}, EDITOR = {Cheong, Otfried and Chwa, Kyung-Yong and Park, Kunsoo}, TITLE = {On the Approximability of the Maximum Interval Constrained Coloring Problem}, BOOKTITLE = {Algorithms and Computation : 21st International Symposium, ISAAC 2010. - Pt. II}, PADDRESS = {Berlin}, ADDRESS = {Jeju Island, Korea}, PUBLISHER = {Springer}, MONTH = {December}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6507}, ISBN = {978-3-642-17513-8}, DOI = {10.1007/978-3-642-17514-5_15}, YEAR = {2010}, PAGES = {168--179}, } @INPROCEEDINGS{Elbassioni2010a, AUTHOR = {Elbassioni, Khaled and Chan, Hubert}, EDITOR = {Charikar, Moses}, TITLE = {A {QPTAS} for {TSP} with Fat Weakly Disjoint Neighborhoods in Doubling Metrics}, BOOKTITLE = {Proceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2010)}, PADDRESS = {Philadelphia, PA}, ADDRESS = {Austin, USA}, PUBLISHER = {SIAM}, MONTH = {January}, ISBN = {978-0-898716-98-6}, YEAR = {2010}, PAGES = {256--267}, } @INPROCEEDINGS{Elbassioni2010b, AUTHOR = {Elbassioni, Khaled and Matijevic, Domagoj and Severdija, Domagoj}, EDITOR = {Vahrenhold, Jan}, TITLE = {Guarding 1.5-Dimensional with Demands}, BOOKTITLE = {26th European Workshop on Computational Geometry (EuroCG 2010)}, PADDRESS = {Dortmund}, ADDRESS = {Dortmund, Germany}, PUBLISHER = {Technische Universit{\"a}t Dortmund}, YEAR = {2010}, PAGES = {133--136}, } @INPROCEEDINGS{Elbassioni2010g, AUTHOR = {Elbassioni, Khaled and Fouz, Mahmoud and Swamy, Chaitanya}, EDITOR = {Saberi, Amin}, TITLE = {Approximation Algorithms for Non-single-minded Profit-Maximization Problems with Limited Supply}, BOOKTITLE = {Internet and Network Economics : 6th International Workshop, WINE 2010}, PADDRESS = {Berlin}, ADDRESS = {Stanford, CA, USA}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6484}, ISBN = {978-3-642-17571-8}, DOI = {10.1007/978-3-642-17572-5_39}, YEAR = {2010}, PAGES = {462--472}, } @UNPUBLISHED{Elbassioni2010h, AUTHOR = {Boros, Endre and Elbassioni, Khaled and Gurvich, Vladimir and Makino, Kazuhisa}, TITLE = {On Nash Equilibria and Improvement Cycles in Pure Positional Strategies for Chess-like and Backgammon-like $n$-person Games}, YEAR = {2010}, } @INPROCEEDINGS{Elbassioni2010i, AUTHOR = {Christodoulou, George and Elbassioni, Khaled and Fouz, Mahmoud}, EDITOR = {Saberi, Amin}, TITLE = {Truthful Mechanisms for Exhibitions}, BOOKTITLE = {Internet and Network Economics : 6th International Workshop, WINE 2010}, PADDRESS = {Berlin}, ADDRESS = {Stanford, CA, USA}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6484}, ISBN = {978-3-642-17571-8}, DOI = {10.1007/978-3-642-17572-5_14}, YEAR = {2010}, PAGES = {170--181}, } @ARTICLE{Elbassioni2011a, AUTHOR = {Elbassioni, Khaled and Tiwary, Hans Raj}, JOURNAL = {Computational Geometry}, TITLE = {On a cone covering problem}, ADDRESS = {Amsterdam}, NUMBER = {3}, PUBLISHER = {Elsevier}, VOLUME = {44}, DOI = {10.1016/j.comgeo.2010.07.004}, YEAR = {2011}, PAGES = {129--134}, } @UNPUBLISHED{Elbassioni2011d, AUTHOR = {Boros, Endre and Elbassioni, Khaled and Gurvich, Vladimir and Makino, Kazuhisa}, TITLE = {A lower bound for discounting algorithms solving two-person zero-sum limit average payoff stochastic games}, YEAR = {2011}, NOTE = {unpublished}, } @INPROCEEDINGS{Elbassioni2011e, AUTHOR = {Boros, Endre and Elbassioni, Khaled and Fouz, Mahmoud and Gurvich, Vladimir and Makino, Kazuhisa and Manthey, Bodo}, EDITOR = {Aceto, Luca and Henzinger, Monika and Sgall, Jiri}, TITLE = {Stochastic Mean Payoff Games: Smoothed Analysis and Approximation Schemes}, BOOKTITLE = {Automata, Languages and Programming : 38th International Colloquium, ICALP 2011}, PADDRESS = {Berlin}, ADDRESS = {Zurich, Switzerland}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6755}, ISBN = {978-3-642-22005-0}, DOI = {10.1007/978-3-642-22006-7_13}, YEAR = {2011}, PAGES = {147--158}, } @INPROCEEDINGS{Elbassioni2011f, AUTHOR = {Canzar,Stefan and Elbassioni, Khaled and Klau, Gunnar W. and Mestre, Julian}, EDITOR = {Aceto, Luca and Henzinger, Monika and Sgall, Jiri}, TITLE = {On Tree-Constrained Matchings and Generalizations}, BOOKTITLE = {Automata, Languages and Programming : 38th International Colloquium, ICALP 2011}, PADDRESS = {Berlin}, ADDRESS = {Zurich, Switzerland}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6755}, ISBN = {978-3-642-22005-0}, DOI = {10.1007/978-3-642-22006-7_9}, YEAR = {2011}, PAGES = {98--109}, } @INPROCEEDINGS{Elbassioni2011g, AUTHOR = {Elbassioni, Khaled and Rauf, Imran and Ray, Saurabh}, EDITOR = {Collette, Sebastien}, TITLE = {Enumerating Minimal Transversals of Geometric Hypergraphs}, BOOKTITLE = {23rd Canadian Conference on Computational Geometry (CCCG 2011)}, PADDRESS = {Toronto}, ADDRESS = {Toronto, Canada}, PUBLISHER = {CCCG}, YEAR = {2011}, PAGES = {437--442}, } @UNPUBLISHED{Elbassioni2011h, AUTHOR = {Boros, Endre and Elbassioni, Khaled and Gurvich, Vladimir and Makino, Kazuhisa}, TITLE = {Every Stochastic Game with Perfect Information Admits a Canonical Form}, BOOKTITLE = {2nd International ICST Conference on Game Theory for Networks (GameNets 2011)}, ADDRESS = {Berlin}, NUMBER = {10}, PUBLISHER = {Springer}, SERIES = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST)}, YEAR = {2012}, } @ARTICLE{Elbassioni2011i, AUTHOR = {Elbassioni, Khaled and Elmasry, Amr and Makino, Kazuhisa}, JOURNAL = {International Journal of Computational Geometry \& Applications}, TITLE = {Finding Simplices containing the Origin in Two and Three Dimensions}, ADDRESS = {Singapore}, NUMBER = {5}, PUBLISHER = {World Scientific}, VOLUME = {21}, ISBN = {0218-1959}, DOI = {10.1142/S0218195911003779}, YEAR = {2011}, PAGES = {495--506}, } @ARTICLE{Elbassioni2011j, AUTHOR = {Chan, T.-H. Hubert and Elbassioni, Khaled}, JOURNAL = {Discrete \& Computational Geometry}, TITLE = {A {QPTAS} for {TSP} with Fat Weakly Disjoint Neighborhoods in Doubling Metrics}, ADDRESS = {New York, NY}, NUMBER = {4}, PUBLISHER = {Springer}, VOLUME = {46}, DOI = {10.1007/s00454-011-9337-9}, YEAR = {2011}, PAGES = {704--723}, } @ARTICLE{Elbassioni2011k, AUTHOR = {Boros, Endre and Elbassioni, Khaled and Gurvich, Vladimir and Tiwary, Hans Raj}, JOURNAL = {Annals of Operations Research}, TITLE = {The negative cycles polyhedron and hardness of checking some polyhedral properties}, ADDRESS = {New York, NY}, NUMBER = {1}, PUBLISHER = {Springer}, VOLUME = {188}, DOI = {10.1007/s10479-010-0690-5}, YEAR = {2011}, PAGES = {63--76}, } @ARTICLE{Elbassioni2011l, AUTHOR = {Althaus, Ernst and Canzar, Stefan and Elbassioni, Khaled and Karrenbauer, Andreas and Mestre, Julian}, JOURNAL = {Algorithmica}, TITLE = {Approximation Algorithms for the Interval Constrained Coloring Problem}, ADDRESS = {New York, NY}, NUMBER = {2}, PUBLISHER = {Springer}, VOLUME = {61}, ISBN = {0178-4617}, DOI = {10.1007/s00453-010-9406-0}, YEAR = {2011}, PAGES = {342--361}, } @ARTICLE{Elbassioni2011m, AUTHOR = {Elbassioni, Khaled and Krohn, Erik and Matijevic, Domagoj and Mestre, Julian and Severdija, Domagoj}, JOURNAL = {Algorithmica}, TITLE = {Improved Approximations for Guarding 1.5-Dimensional Terrains}, ADDRESS = {New York NY}, NUMBER = {2}, PUBLISHER = {Springer}, VOLUME = {60}, DOI = {10.1007/s00453-009-9358-4}, YEAR = {2011}, PAGES = {451--463}, } @ARTICLE{Elbassioni2011n, AUTHOR = {Boros, Endre and Elbassioni, Khaled and Gurvich, Vladimir and Makino, Kazuhisa}, JOURNAL = {Discrete Mathematics}, TITLE = {On {Nash} equilibria and improvement cycles in pure positional strategies for {Chess}-like and {Backgammon}-like n-person games}, ADDRESS = {Amsterdam}, NUMBER = {4}, PUBLISHER = {Elsevier}, VOLUME = {312}, ISBN = {0012-365X}, DOI = {10.1016/j.disc.2011.11.011}, YEAR = {2012}, PAGES = {772--788}, } @INPROCEEDINGS{Elbassioni2012a, AUTHOR = {Elbassioni, Khaled and Paluch, Katarzyna and van Zuylen, Anke}, EDITOR = {D{\"u}rr, Christoph and Wilke, Thomas}, TITLE = {Simpler Approximation of the Maximum Asymmetric Traveling Salesman Problem}, BOOKTITLE = {29th International Symposium on Theoretical Aspects of Computer Science : STACS'12}, PADDRESS = {Dagstuhl}, ADDRESS = {Paris, France}, PUBLISHER = {Schloss Dagstuhl/ Leibniz-Zentrum f{\"u}r Informatik}, SERIES = {LIPIcs}, VOLUME = {14}, ISBN = {978-3-939897-35-4}, DOI = {10.4230/LIPIcs.STACS.2012.501}, YEAR = {2012}, PAGES = {501--506}, } @ARTICLE{Elbassioni2012b, AUTHOR = {Elbassioni, Khaled and Tiwary, Hans Raj}, JOURNAL = {Theoretical Computer Science}, TITLE = {Complexity of Approximating the Vertex Centroid of a Polyhedron}, ADDRESS = {Amsterdam}, PUBLISHER = {Elsevier}, VOLUME = {421}, DOI = {10.1016/j.tcs.2011.11.017}, YEAR = {2012}, PAGES = {56--61}, } @INPROCEEDINGS{Elbassioni2012c, AUTHOR = {Canzar, Stefan and El-Kebir, Mohammed and Pool, Rene and Elbassioni, Khaled and Malde, Alpeshkumar K. and Mark, Alan E. and Geerke, Daan P. and Stougie, Leen and Klau, Gunnar W.}, EDITOR = {Chor, Benny}, TITLE = {Charge Group Partitioning in Biomolecular Simulation}, BOOKTITLE = {Research in Computational Molecular Biology : 16th Annual International Conference, RECOMB 2012}, PADDRESS = {Berlin}, ADDRESS = {Barcelona, Spain}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Bioinformatics}, VOLUME = {7262}, ISBN = {978-3-642-29626-0}, DOI = {10.1007/978-3-642-29627-7_3}, YEAR = {2012}, PAGES = {29--43}, } @UNPUBLISHED{Elbassioni2012d, AUTHOR = {Elbassioni, Khaled and Rauf, Imran and Ray, Saurabh}, TITLE = {On Enumerating Minimal Transversals of Geometric Hypergraphs}, YEAR = {??}, } @INPROCEEDINGS{Elbassioni2012e, AUTHOR = {Elbassioni, Khaled}, EDITOR = {Czumaj, Artur and Mehlhorn, Kurt and Pitts, Andrew M. and Wattenhofer, Roger}, TITLE = {A {QPTAS} for $\varepsilon$-Envy-Free Profit-Maximizing Pricing on Line Graphs}, BOOKTITLE = {Automata, Languages, and Programming : 39th International Colloquium, ICALP 2012}, PADDRESS = {Berlin}, ADDRESS = {Warwick, UK}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {7392}, ISBN = {978-3-642-31584-8}, DOI = {10.1007/978-3-642-31585-5_46}, YEAR = {2012}, PAGES = {513--524}, } @INPROCEEDINGS{Elbassioni2012f, AUTHOR = {Elbassioni, Khaled and Fouad, Mohamed and Bertino, Elisa}, TITLE = {Modeling the Risk \& Utility of Information Sharing in Social Networks}, BOOKTITLE = {2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust and 2012 ASE/IEEE International Conference on Social Computing : SocialCom/PASSAT 2012}, PADDRESS = {Piscataway, NJ}, ADDRESS = {Amsterdam, the Netherlands}, PUBLISHER = {IEEE}, ISBN = {978-0-7695-4848-7}, DOI = {10.1109/SocialCom-PASSAT.2012.131}, YEAR = {2012}, PAGES = {441--450}, } @INPROCEEDINGS{Elbassioni2012g, AUTHOR = {Elbassioni, Khaled and Garg, Naveen and Gupta, Divya and Kumar, Amit and Narula, Vishal and Pal, Arindam}, EDITOR = {D'Souza, Deepak and Kavitha, Telikepalli and Radhakrishnan, Jaikumar}, TITLE = {Approximation Algorithms for the Unsplittable Flow Problem on Paths and Trees}, BOOKTITLE = {32nd International Conference on Foundations of Software Technology and Theoretical Computer Science : FSTTCS 2012}, PADDRESS = {Dagstuhl}, ADDRESS = {Hyderabad, India}, PUBLISHER = {Schlo{\ss} Dagstuhl/Leibniz Zentrum f{\"u}r Informatik}, SERIES = {LIPIcs}, VOLUME = {18}, ISBN = {978-3-939897-47-7}, DOI = {10.4230/LIPIcs.FSTTCS.2012.267}, YEAR = {2012}, PAGES = {267--275}, } @ARTICLE{Elbassioni2012h, AUTHOR = {Elbassioni, Khaled and Raman, Rajiv and Ray, Saurabh and Sitters, Ren{\'e}}, JOURNAL = {Theoretical Computer Science}, TITLE = {On the complexity of the highway problem}, ADDRESS = {Amsterdam}, PUBLISHER = {Elsevier}, VOLUME = {460}, DOI = {10.1016/j.tcs.2012.07.028}, YEAR = {2012}, PAGES = {70--77}, } @ARTICLE{Elbassioni2012i, AUTHOR = {Elbassioni, Khaled and Jeli´c, Slobodan and Matijevi`c, Domagoj}, JOURNAL = {Theoretical Computer Science}, TITLE = {The relation of Connected Set Cover and Group {Steiner} Tree}, ADDRESS = {Amsterdam}, PUBLISHER = {Elsevier}, VOLUME = {438}, DOI = {10.1016/j.tcs.2012.02.035}, YEAR = {2012}, PAGES = {96--101}, } @UNPUBLISHED{Elbassioni2012j, AUTHOR = {Canzar, Stefan and Elbassioni, Khaled and Klau, Gunnar W. and Mestre, Julian}, TITLE = {On Tree-Constrained Matchings and Generalizations}, YEAR = {2011}, } @ARTICLE{Elbassioni2012z, AUTHOR = {Elbassioni, Khaled and Matijevic, Domagoj and Severdija, Domagoj}, JOURNAL = {International Journal of Computer Mathematics}, TITLE = {Guarding 1.5{D} terrains with demands}, ADDRESS = {London}, NUMBER = {16}, PUBLISHER = {Taylor and Francis}, VOLUME = {89}, DOI = {10.1080/00207160.2012.707800}, YEAR = {2012}, PAGES = {2143--2151}, } @UNPUBLISHED{Elbassioni2013a, AUTHOR = {Elbassioni, Khaled and Chalermsook, Parinya and Nanongkai, Danupon and Sun, He}, TITLE = {Multi-Attribute Profit-Maximizing Pricing}, YEAR = {2013}, } @INPROCEEDINGS{ElbassioniKatriel2004, AUTHOR = {Elbassioni, Khaled M. and Katriel, Irit}, EDITOR = {Bart{\'a}k, Roman and Milano, Michela}, TITLE = {Multiconsistency and Robustness with Global Constraints}, BOOKTITLE = {Integration of AI and OR techniques in constraint programming for combinatorial optimization problems : Second International Conference, CPAIOR 2005}, PADDRESS = {Berlin, Germany}, ADDRESS = {Prague, Czech Republic}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {3524}, ISBN = {3-540-26152-4}, YEAR = {2005}, PAGES = {168--182}, ABSTRACT = {We propose a natural generalization of arc-consistency, which we call multiconsistency: A value $v$ in the domain of a variable $x$ is $k$-multiconsistent with respect to a constraint $C$ if there are at least $k$ solutions to $C$ in which $x$ is assigned the value $v$. We present algorithms that determine which edges are $k$-multiconsistent with respect to several well known global constraints. In addition, we show that finding super solutions is strictly harder than finding arbitrary solutions and suggest multiconsistency as an alternative way to search for robust solutions.}, } @ARTICLE{ElbassioniKatriel2006, AUTHOR = {Elbassioni, Khaled M.}, JOURNAL = {Constraints}, TITLE = {Multiconsistency and Robustness with Global Constraints}, NUMBER = {4}, VOLUME = {11}, YEAR = {2006}, PAGES = {335--352}, ABSTRACT = {We propose a natural generalization of arc-consistency, which we call multiconsistency: a value v in the domain of a variable x is k-multiconsistent with respect to a constraint C if there are at least k solutions to C in which x is assigned the value v. We present algorithms that determine which variable-value pairs are k-multiconsistent with respect to several well known global constraints. In addition, we show that finding super solutions is sometimes strictly harder than finding arbitrary solutions for these constraints and suggest multiconsistency as an alternative way to search for robust solutions.}, } @ARTICLE{ElbassioniMestre2009a, AUTHOR = {Elbassioni, Khaled M. and Krohn, Erik and Matijevic, Domagoj and Mestre, Juli{\'a}n and Severdija, Domagoj}, JOURNAL = {Algorithmica}, TITLE = {Improved Approximations for Guarding 1.5-Dimensional Terrains}, ADDRESS = {New York, NY}, PUBLISHER = {Springer}, MONTH = {September}, VOLUME = {Online First}, ISBN = {1432-0541}, DOI = {10.1007/s00453-009-9358-4}, YEAR = {2009}, PAGES = {1--13}, } @ARTICLE{ElbassioniRauf2010, AUTHOR = {Elbassioni, Khaled and Rauf, Imran}, JOURNAL = {Discrete Mathematics}, TITLE = {Polynomial-time dualization of r-exact hypergraphs with applications in geometry}, ADDRESS = {Amsterdam}, NUMBER = {17-18}, PUBLISHER = {Elsevier}, VOLUME = {310}, ISBN = {0012-365X}, DOI = {10.1016/j.disc.2010.05.017}, YEAR = {2010}, PAGES = {2356--2363}, } @UNPUBLISHED{ElbRau09a, AUTHOR = {Elbassioni, Khaled and Rauf, Imran}, TITLE = {Polynomial-time Dualization of $r$-Exact Hypergraphs with Applications in Geometry}, MONTH = {March}, YEAR = {2010}, PAGES = {12}, NOTE = {(submitted to a journal)}, ABSTRACT = {Let $\cH\subseteq 2^V$ be a hypergraph on vertex set $V$. For a positive integer $r$, we call $\cH$ $r$-exact, if any minimal transversal of $\cH$ intersects any hyperedge of $\cH$ in at most $r$ vertices. This class includes several interesting examples from geometry, e.g., circular-arc hypergraphs ($r=2$), hypergraphs defined by sets of axis-parallel lines stabbing a given set of $\alpha$-fat objects ($r=4\alpha$), and hypergraphs defined by sets of points contained in translates of a given cone in the plane ($r=2$). For constant $r$, we give a polynomial-time algorithm for the duality testing problem of a pair of $r$-exact hypergraphs. This result implies that minimal hitting sets for the above geometric hypergraphs can be generated in output-sensitive polynomial time. }, } @ARTICLE{ElKahoui1996, AUTHOR = {El Kahoui, M'hammed}, JOURNAL = {Journal of Complexity}, TITLE = {An Improved Upper Complexity Bound for the Topology Computation of a Real Algebraic Plane Curve}, NUMBER = {4}, PUBLISHER = {Elsevier}, VOLUME = {12}, ISBN = {0885-064X}, YEAR = {1996}, PAGES = {527--544}, ABSTRACT = {The computation of the topological shape of a real algebraic plane curve is usually driven by the study of the behavior of the curve around its critical points (which includes also the singular points). In this paper we present a new algorithm computing the topological shape of a real algebraic plane curve whose complexity is better than the best algorithms known. This is due to the avoiding, through a sufficiently good change of coordinates, of real root computations on polynomials with coefficients in a simple real algebraic extension of $\mathbb{Q}$ to deal with the critical points of the considered curve. In fact, one of the main features of this algorithm is that its complexity is dominated by the characterization of the real roots of the discriminant of the polynomial defining the considered curve.}, } @ARTICLE{ElKahoui2000, AUTHOR = {El Kahoui, M'hammed}, JOURNAL = {Journal of Symbolic Computation}, TITLE = {Deciding {H}opf bifurcations by quantifier elimination in a software-component architecture}, NUMBER = {2}, PUBLISHER = {Elsevier}, VOLUME = {30}, ISBN = {0747-7171}, YEAR = {2000}, PAGES = {161--179}, ABSTRACT = {In this paper we give a semi-algebraic description of Hopf bifurcation fixed points for a given parameterized polynomial vector field. The description is carried out by use of the Hurwitz determinants, and produces a first-order formula which is transformed into a quantifier free formula by use of usual quantifier elimination algorithms. We apply techniques from the theory of sub-resultant sequences and of Gr¨obner bases to come up with efficient reductions, which lead to quantifier elimination questions that can often be handled by existing quantifier elimination packages. We could implement the algorithms for the conditions on Hopf bifurcations by combining the computer algebra system Maple with packages for quantifier elimination using a Java based component architecture recently developed by the second author. In addition to some textbook examples we applied our software system to an example discussed in a recent research paper.}, } @ARTICLE{ElKahoui2001, AUTHOR = {El Kahoui, M'hammed}, JOURNAL = {Mathematics and Computers in Simulation}, TITLE = {Improved algorithms for linear complementarity problems arising from collision response}, NUMBER = {1}, PUBLISHER = {Elsevier}, MONTH = {March}, VOLUME = {56}, ISBN = {0378-4754}, YEAR = {2001}, PAGES = {69--93}, ABSTRACT = {In this paper we give algorithms for solving linear complementarity problems for $\mathcal{P}$-matrices and symmetric positive semidefinite matrices. Our approach of the problem turns out to be an improvement and a more precise formulation of Baraff’s method for problems arising from collision response. The theorems that prove the correctness of our algorithm can also be used to prove the correctness of Baraff’s algorithm. An important feature of the method we present lies in its validity for arbitrary real closed fields, thus it is well suited to handle, at least locally, parametric linear complementarity problems. This article presents the theoretical principles of the algorithms and gives detailed pseudo-code descriptions of them. }, } @ARTICLE{ElKahoui2002a, AUTHOR = {Bouziane, Driss and El Kahoui, M'hammed}, JOURNAL = {Journal of Symbolic Computation}, TITLE = {Computation of the dual of a plane projective curve}, NUMBER = {2}, PUBLISHER = {Elsevier}, MONTH = {September}, VOLUME = {34}, ISBN = {0747-7171}, YEAR = {2002}, PAGES = {105--117}, ABSTRACT = {In this paper we describe an algorithm for computing the dual of a projective plane curve. The algorithm requires no extension of the field of coefficients of the curve and runs in polynomial time.}, } @ARTICLE{ElKahoui2002b, AUTHOR = {El Kahoui, M'hammed}, JOURNAL = {Electronic Journal of Differential Equations}, TITLE = {On plane polynomial vector fields and the {P}oincar\'e problem}, NUMBER = {37}, VOLUME = {2002}, ISBN = {1072-6691}, YEAR = {2002}, PAGES = {1--23}, ABSTRACT = {In this paper we address the Poincar\'e problem, on plane polynomial vector fields, under some conditions on the nature of the singularities of invariant curves. Our main idea consists in transforming a given vector field of degree $m$ into another one of degree at most $m+1$ having its invariant curves in projective quasi-generic position. This allows us to give bounds on degree for some well known classes of curves such as the nonsingular ones and curves with ordinary nodes. We also give a bound on degree for any invariant curve in terms of the maximum Tjurina number of its singularities and the degree of the vector field.}, } @ARTICLE{ElKahoui2003, AUTHOR = {El Kahoui, M'hammed}, JOURNAL = {Journal of Symbolic Computation}, TITLE = {An elementary approach to subresultants theory}, NUMBER = {3}, PUBLISHER = {Elsevier}, MONTH = {January}, VOLUME = {35}, ISBN = {0747-7171}, YEAR = {2003}, PAGES = {281--292}, ABSTRACT = {In this paper we give an elementary approach to univariate polynomial subresultants theory. Most of the known results of subresultants are recovered, some with more precision, without using Euclidean divisions or existence of roots for univariate polynomials. The main contributions of this paper are not new results on subresultants, but rather extensions of the main results over integral rings to arbitrary commutative rings.}, } @ARTICLE{ElKahoui2004a, AUTHOR = {El Kahoui, M'hammed}, JOURNAL = {Proceedings of the Amercian Mathematical Society}, TITLE = {Contants of derivations in polynomial rings over unique factorization domains}, NUMBER = {9}, PUBLISHER = {AMS}, VOLUME = {132}, ISBN = {0002-9939}, YEAR = {2004}, PAGES = {2537--2541}, } @ARTICLE{ElKahoui2004b, AUTHOR = {El Kahoui, M'hammed}, JOURNAL = {Linear Algebra and its Applications}, TITLE = {Subresultants and locally nilpotent derivations}, ADDRESS = {Amsterdam, The Netherlands}, PUBLISHER = {Elsevier}, VOLUME = {380}, ISBN = {0024-3795}, YEAR = {2004}, PAGES = {253--261}, ABSTRACT = {In this paper we establish a connection between subresultants and locally nilpotent derivations over commutative rings containing the rationals. As consequence of this connection, we prove that for any commutative ring with unit and any polynomials P and Q in $\mathcal{A}[y]$, the ith subresultant of P and Q is the determinant of a matrix, depending only on the degrees of P and Q, whose entries are taken from the list built with P, Q and their successive Hasse derivatives.}, } @INPROCEEDINGS{ElKahoui2004c, AUTHOR = {El Kahoui, M'hammed}, EDITOR = {Gutierrez, Jaime}, TITLE = {Algorithms for recognizing coordinates in two variables over UFD's}, BOOKTITLE = {Proceedings of the 2004 International Symposium Symbolic and Algebraic Computation (ISSAC-04)}, ORGANIZATION = {Association for Computing Machinery (ACM)}, PADDRESS = {New York, USA}, ADDRESS = {Santander, Spain}, PUBLISHER = {ACM}, ISBN = {1-58113-827-X}, YEAR = {2004}, PAGES = {135--140}, } @ARTICLE{ElKahoui2005a, AUTHOR = {El Kahoui, M'hammed}, JOURNAL = {Journal of Symbolic Computation}, TITLE = {Birational properties of the gap subresultant varieties}, NUMBER = {1}, PUBLISHER = {Elsevier}, VOLUME = {39}, ISBN = {0747-7171}, YEAR = {2005}, PAGES = {61--71}, ABSTRACT = {In this paper we address the problem of understanding the gaps that may occur in the subresultant sequence of two polynomials.We define the gap subresultant varieties and prove that they are rational and have the expected dimension. We also give explicitly their corresponding prime ideals.}, } @ARTICLE{ElKahoui2005b, AUTHOR = {El Kahoui, M'hammed}, JOURNAL = {Proceedings of the Amercian Mathematical Society}, TITLE = {$D$-resultant and subresultants}, PUBLISHER = {AMS}, VOLUME = {133}, YEAR = {2005}, PAGES = {2193--2199}, NOTE = {To appear in Proceedings of the American Mathematical Society}, } @ARTICLE{ElKahoui2005c, AUTHOR = {El Kahoui, M'hammed}, JOURNAL = {Journal of Algebra}, TITLE = {UFDs with commuting linearly independent locally nilpotent derivations}, NUMBER = {1}, PUBLISHER = {Elsevier}, VOLUME = {289}, YEAR = {2005}, PAGES = {446--452}, ABSTRACT = {In this paper we study affine -UFDs of transcendence degree n without nonconstant units, having n−1 commuting linearly independent locally nilpotent -derivations. We prove in case n=2, and algebraically closed of characteristic zero, that such rings are polynomial rings in two variables over . We then show that the commuting derivations Conjecture is equivalent to a weak version of the Abhyankar–Sathaye Conjecture.}, } @ARTICLE{ElKahoui2005d, AUTHOR = {Brown, Christopher and El Kahoui, M'hammed and Novotni, Dominik and Weber, Andreas}, JOURNAL = {Journal of Symbolic Computation}, TITLE = {Algorithmic methods for investigating equilibria in epidemic modeling}, NUMBER = {11}, VOLUME = {41}, DOI = {10.1016/j.jsc.2005.09.011}, YEAR = {2006}, PAGES = {1157--1173}, ABSTRACT = {The calculation of threshold conditions for models of infectious diseases is of central importance for developing vaccination policies. These models are often coupled systems of ordinary differential equations, in which case the computation of threshold conditions can be reduced to the question of stability of the disease-free equilibrium. This paper shows how computing threshold conditions for such models can be done fully algorithmically using quantifier elimination for real closed fields and related simplification methods for quantifier-free formulas. Using efficient quantifier elimination techniques for special cases that have been developed by Weispfenning and others, we can also compute whether there are ranges of parameters for which sub-threshold endemic equilibria exist.}, } @MISC{ElKahoui2005e, AUTHOR = {El Kahoui, M'hammed}, TITLE = {Computing with algebraic curves in generic position}, HOWPUBLISHED = {Submitted to Journal of Computation and Mathematics}, YEAR = {2008}, PAGES = {19}, NOTE = {Submitted to Journal of Computation and Mathematics}, } @MISC{ElKahoui2005f, AUTHOR = {El Kahoui, M'hammed}, TITLE = {Polynomial parametrization of nonsingular algebraic curves}, HOWPUBLISHED = {Submitted to Computer Aided Geometric Design}, YEAR = {2008}, NOTE = {Submitted to Computer Aided Geometric Design}, } @ARTICLE{ElKahoui2005g, AUTHOR = {El Kahoui, M'hammed and Rakrak, Said}, JOURNAL = {Mathematics of Computation}, TITLE = {Structure of {Groebner} bases with respect to block orders}, NUMBER = {260}, PUBLISHER = {American Mathematical Society}, VOLUME = {76}, ISBN = {0025-5718}, DOI = {10.1090/S0025-5718-07-01972-2}, YEAR = {2007}, PAGES = {2181--2187}, ABSTRACT = {In this paper we study the structure of Gr{\"o}bner bases with respect to block orders. We extend Lazard's theorem and the Gianni-Kalkbrenner theorem to the case of a zero-dimensional ideal whose trace in the ring generated by the first block of variables is radical. We then show that they do not hold for general zero-dimensional ideals. }, } @ARTICLE{Elmasry2008a, AUTHOR = {Elmasry, Amr and Hammad, Abdelrahman}, JOURNAL = {ACM Journal of Experimental Algorithmics}, TITLE = {Inversion-Sensitive Sorting Algorithms in Practice}, ADDRESS = {New York, USA}, NUMBER = {1}, PUBLISHER = {Association for Computing Machinery}, MONTH = {December}, VOLUME = {13}, ISBN = {1084-6654}, DOI = {10.1145/1412228.1455267}, YEAR = {2008}, PAGES = {1--18}, ABSTRACT = {We study the performance of the most practical inversion-sensitive internal sorting algorithms. Experimental results illustrate that adaptive AVL sort consumes the fewest number of comparisons unless the number of inversions is less than $1\%$; in such case Splaysort consumes the fewest number of comparisons. On the other hand, the running time of Quicksort is superior unless the number of inversions is less than $1.5\%$; in such case Splaysort has the shortest running time. Another interesting result is that although the number of cache misses for the cache-optimal Greedysort algorithm was the least, compared to other adaptive sorting algorithms under investigation, it was outperformed by Quicksort.}, } @ARTICLE{Elmasry2008b, AUTHOR = {Elmasry, Amr and Jensen, Claus and Katajainen, Jyrki}, JOURNAL = {ACM Transactions on Algorithms}, TITLE = {Multipartite Priority Queues}, ADDRESS = {New York, USA}, NUMBER = {1}, PUBLISHER = {Association for Computing Machinery (ACM)}, MONTH = {November}, VOLUME = {5}, ISBN = {1549-6325}, DOI = {10.1145/1435375.1435389}, YEAR = {2008}, PAGES = {1--19}, ABSTRACT = {We introduce a framework for reducing the number of element comparisons performed in priority-queue operations. In particular, we give a priority queue which guarantees the worst-case cost of $O(1)$ per minimum finding and insertion, and the worst-case cost of $O(\log n)$ with at most $\log n + O(1)$ element comparisons per minimum deletion and deletion, improving the bound of $2\log n + O(1)$ known for binomial queues. Here, $n$ denotes the number of elements stored in the data structure prior to the operation in question, and $\log n$ equals $\log_2(\max\set{2, n})$. As an immediate application of the priority queue developed, we obtain a sorting algorithm that is optimally adaptive with respect to the inversion measure of disorder, and that sorts a sequence having $n$ elements and $I$ inversions with at most $n \log (I/n) + O(n)$ element comparisons.}, } @ARTICLE{Elmasry2008c, AUTHOR = {Elmasry, Amr and Jensen, Claus and Katajainen, Jyrki}, JOURNAL = {Computing}, TITLE = {Two New Methods for Constructing Double-Ended Priority Queues from Priority Queues}, ADDRESS = {Berlin, Germany}, NUMBER = {4}, PUBLISHER = {Springer Wein}, MONTH = {November}, VOLUME = {83}, ISBN = {1436-5057}, DOI = {10.1007/s00607-008-0019-2}, YEAR = {2008}, PAGES = {193--204}, ABSTRACT = {We introduce two data-structural transformations to construct double-ended priority queues from priority queues. To apply our transformations the priority queues exploited must support the extraction of an unspecified element, in addition to the standard priority-queue operations. With the first transformation we obtain a double-ended priority queue which guarantees the worst-case cost of $O(1)$ for \Findmin{}, \Findmax{}, \Insert{}, \Extract{}; and the worst-case cost of $O(\lg n)$ with at most $\lg n + O(1)$ element comparisons for \Delete{}. With the second transformation we get a meldable double-ended priority queue which guarantees the worst-case cost of $O(1)$ for \Findmin{}, \Findmax{}, \Insert{}, \Extract{}; the worst-case cost of $O(\lg n)$ with at most $\lg n + O(\lg \lg n)$ element comparisons for \Delete{}; and the worst-case cost of $O(\min\set{\lg m, \lg n})$ for \Meld{}. Here, $m$ and $n$ denote the number of elements stored in the data structures prior to the operation in question.}, } @TECHREPORT{Elmasry2008d, AUTHOR = {Elmasry, Amr}, EDITOR = {Elmasry, Amr}, TITLE = {Violation Heaps: A Better Substitute for Fibonacci Heaps}, INSTITUTION = {CoRR}, TYPE = {Research Report}, ADDRESS = {http://arxiv.org/abs/0812.2851}, NUMBER = {CoRR abs/0812.2851}, YEAR = {2008}, PAGES = {10}, ABSTRACT = {We give a priority queue that achieves the same amortized bounds as Fibonacci heaps. Namely, find-min requires $O(1)$ worst-case time, insert, meld and decrease-key require $O(1)$ amortized time, and delete-min requires $O(\log n)$ amortized time. Our structure is simple and promises a more efficient practical behavior compared to any other known Fibonacci-like heap. }, } @INPROCEEDINGS{Elmasry2009, AUTHOR = {Elmasry, Amr}, EDITOR = {Matthieu, Claire}, TITLE = {Pairing Heaps with {O(log} log n) decrease Cost}, BOOKTITLE = {Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2009)}, ORGANIZATION = {Association for Computing Machinery (ACM) and Society for Industrial and Applied Mathematics (SIAM)}, PADDRESS = {New York, NY}, ADDRESS = {New York, USA}, PUBLISHER = {ACM}, MONTH = {January}, YEAR = {2009}, PAGES = {471--476}, ABSTRACT = {We give a variation of the pairing heaps for which the time bounds for all the operations match the lower bound proved by Fredman for a family of similar self-adjusting heaps. Namely, our heap structure requires $O(1)$ for insert and find-min, $O(\log{n})$ for delete-min, and $O(\log\log{n})$ for decrease-key and meld (all the bounds are in the amortized sense except for find-min).}, } @ARTICLE{Elmasry2009x, AUTHOR = {Elmasry, Amr}, JOURNAL = {Information Processing Letters}, TITLE = {Computing the subset partial order for dense families of sets}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {18}, PUBLISHER = {Elsevier}, VOLUME = {109}, ISBN = {0020-0190}, DOI = {10.1016/j.ipl.2009.07.001}, YEAR = {2009}, PAGES = {1082--1086}, } @ARTICLE{Elmasry2010, AUTHOR = {Elmasry, Amr}, JOURNAL = {International Journal of Computer Mathematics}, TITLE = {Pairing heaps, scrambled pairing and square-root trees}, ADDRESS = {London}, NUMBER = {14}, PUBLISHER = {Taylor \& Francis}, VOLUME = {87}, ISBN = {0020-7160}, DOI = {10.1080/00207160903029810}, YEAR = {2010}, PAGES = {3096--3110}, } @ARTICLE{Elmasry2010a, AUTHOR = {Elmasry, Amr}, JOURNAL = {Information Processing Letters}, TITLE = {The longest almost-increasing subsequence}, ADDRESS = {Amsterdam}, NUMBER = {16}, PUBLISHER = {Elsevier}, VOLUME = {110}, ISBN = {0020-0190}, DOI = {10.1016/j.ipl.2010.05.022}, YEAR = {2010}, PAGES = {655--658}, } @INPROCEEDINGS{Elmasry2010b, AUTHOR = {Elmasry, Amr and Jensen, Claus and Katajainen, Jyrki}, EDITOR = {Kaplan, Haim}, TITLE = {Strictly-regular number system and data structures}, BOOKTITLE = {Algorithm Theory - SWAT 2010 : 12th Scandinavian Symposium and Workshops on Algorithm Theory}, PADDRESS = {Berlin}, ADDRESS = {Bergen, Norway}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6139}, ISBN = {978-3-642-13730-3}, DOI = {10.1007/978-3-642-13731-0_4}, YEAR = {2010}, PAGES = {26--37}, } @INPROCEEDINGS{Elmasry2010c, AUTHOR = {Elmasry, Amr and Jensen, Claus and Katajainen, Jyrki}, EDITOR = {Boldi, Paolo and Gargano, Luisa}, TITLE = {The Magic of a Number System}, BOOKTITLE = {Fun with Algorithms : 5th International Conference, FUN 2010}, PADDRESS = {Berlin}, ADDRESS = {Ischia}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6099}, ISBN = {978-3-642-13121-9}, DOI = {10.1007/978-3-642-13122-6_17}, YEAR = {2010}, PAGES = {156--165}, } @ARTICLE{Elmasry2012, AUTHOR = {Elmasry, Amr and Mehlhorn, Kurt and Schmidt, Jens M.}, JOURNAL = {Algorithmica}, TITLE = {An {O}(n+m) Certifying Triconnnectivity Algorithm for {Hamiltonian} Graphs}, ADDRESS = {New York, NY}, NUMBER = {3}, PUBLISHER = {Springer}, VOLUME = {62}, ISBN = {0178-4617}, DOI = {10.1007/s00453-010-9481-2}, YEAR = {2012}, PAGES = {754--766}, } @ARTICLE{Elmasry2013, AUTHOR = {Elmasry, Amr and Mehlhorn, Kurt and Schmidt, Jens M.}, JOURNAL = {Journal of Graph Theory}, TITLE = {Every {DFS} tree of a 3-connected graph contains a contractible edge}, NUMBER = {1}, VOLUME = {72}, DOI = {10.1002/jgt.21635}, YEAR = {2013}, PAGES = {112--121}, } @ARTICLE{ElmasryMehlhornSchmidt2010, AUTHOR = {Elmasry, Amr and Mehlhorn, Kurt and Schmidt, Jens M.}, JOURNAL = {Algorithmica}, TITLE = {{An $O(m+n)$ Certifying Triconnectivity Algorithm for Hamiltonian Graphs}}, ADDRESS = {New York, NY}, PUBLISHER = {Springer}, VOLUME = {Online First}, ISBN = {0178-4617}, DOI = {10.1007/s00453-010-9481-2}, YEAR = {2010}, PAGES = {1--13}, } @ARTICLE{ElsaesserS2011, AUTHOR = {Elsaesser, Robert and Sauerwald, Thomas}, JOURNAL = {Theoretical Computer Science}, TITLE = {Tight bounds for the cover time of multiple random walks}, ADDRESS = {Amsterdam}, NUMBER = {24}, PUBLISHER = {Elsevier}, VOLUME = {412}, YEAR = {2011}, PAGES = {2623--2641}, } @INPROCEEDINGS{emel-gcd-11, AUTHOR = {Emeliyanenko, Pavel}, EDITOR = {Smari, Waleed W. and McIntire, John P.}, TITLE = {High-performance polynomial {GCD} computations on graphics processors}, BOOKTITLE = {Proceedings of the 2011 International Conference on High Performance Computing \& Simulation (HPCS 2011)}, PADDRESS = {Piscataway, NJ}, ADDRESS = {Istanbul, Turkey}, PUBLISHER = {IEEE}, MONTH = {July}, ISBN = {978-1-61284-381-0}, DOI = {10.1109/HPCSim.2011.5999827}, YEAR = {2011}, PAGES = {215--224}, } @INPROCEEDINGS{Emel-gtc-10, AUTHOR = {Emeliyanenko, Pavel}, TITLE = {Accelerating Symbolic Computations on NVIDIA Fermi}, BOOKTITLE = {Poster presentation at GTC'10 (NVIDIA research summit)}, ADDRESS = {San Jose, California}, PUBLISHER = {NVIDIA}, YEAR = {2010}, ABSTRACT = {We present the first implementation of a complete modular resultant algorithm on the graphics hardware. Our recent developments taking advantage of new NVidia Fermi GPU architecture and instruction set allowed us to achieve about 150x speed-up over a modular resultant algorithm from Maple 13.}, } @ARTICLE{emel-res-2012, AUTHOR = {Emeliyanenko, Pavel}, JOURNAL = {Journal of Parallel and Distributed Computing}, TITLE = {Computing resultants on Graphics Processing Units: {Towards} {GPU}-accelerated computer algebra}, ADDRESS = {Amsterdam}, PUBLISHER = {Elsevier}, MONTH = {August}, VOLUME = {In press}, DOI = {10.1016/j.jpdc.2012.07.015}, YEAR = {2012}, PAGES = {1--14}, } @MASTERSTHESIS{Emel2007, AUTHOR = {Emeliyanenko, Pavel}, TITLE = {Visualization of Points and Segments of Real Algebraic Plane Curves}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {February}, YEAR = {2007}, ABSTRACT = {This thesis presents an exact and complete approach for visualization of segments and points of real plane algebraic curves given in implicit form $f(x,y) = 0$. A curve segment is a distinct curve branch consisting of regular points only. Visualization of algebraic curves having self-intersection and isolated points constitutes the main challenge. Visualization of curve segments involves even more difficulties since here we are faced with a problem of discriminating different curve branches, which can pass arbitrary close to each other. Our approach is robust and efficient (as shown by our benchmarks), it combines the advantages both of curve tracking and space subdivision methods and is able to correctly rasterize segments of arbitrary-degree algebraic curves using double, multi-precision or exact rational arithmetic. }, } @INPROCEEDINGS{emel_gpgpu_09, AUTHOR = {Emeliyanenko, Pavel}, EDITOR = {Dou, Yong and Gruber, Ralf and Joller, Josef}, TITLE = {Efficient Multiplication of Polynomials on Graphics Hardware}, BOOKTITLE = {Advanced Parallel Processing Technologies : 8th International Symposium, APPT 2009}, PADDRESS = {Berlin, Germany}, ADDRESS = {Rapperswil, Switzerland}, PUBLISHER = {Springer}, MONTH = {August}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5737}, ISBN = {978-3-642-03643-9}, DOI = {10.1007/978-3-642-03644-6_11}, YEAR = {2009}, PAGES = {134--149}, ABSTRACT = {We present the algorithm to multiply univariate polynomials with integer coefficients efficiently using the Number Theoretic transform (NTT) on Graphics Processing Units (GPU). The same approach can be used to multiply large integers encoded as polynomials. Our algorithm exploits fused multiply-add capabilities of the graphics hardware. NTT multiplications are executed in parallel for a set of distinct primes followed by reconstruction using the Chinese Remainder theorem (CRT) on the GPU. Our benchmarking experiences show the NTT multiplication performance up to 77 GMul/s. We compared our approach with CPU-based implementations of polynomial and large integer multiplication provided by NTL and GMP libraries.}, } @INPROCEEDINGS{emel_gpures_2010, AUTHOR = {Emeliyanenko, Pavel}, EDITOR = {Hsu, Ching-Hsien and Yang, Laurence T. and Park, Jong Hyuk and Yeo, Sang-Soo}, TITLE = {Modular Resultant Algorithm for Graphics Processors}, BOOKTITLE = {Algorithms and Architectures for Parallel Processing : 10th International Conference, ICA3PP 2010. - Pt. 1}, PADDRESS = {Berlin, Germany}, ADDRESS = {Busan, Korea}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6081}, ISBN = {978-3-642-13118-9}, DOI = {10.1007/978-3-642-13119-6_37}, YEAR = {2010}, PAGES = {427--440}, NOTE = {BEST PAPER AWARD}, } @MASTERSTHESIS{Emminghaus95, AUTHOR = {Emminghaus, Frank}, TITLE = {{Effiziente Sortieralgorithmen f{\"u}r den d-dimensionalen Hypercube}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, YEAR = {1995}, } @INPROCEEDINGS{EMR09, AUTHOR = {Elbassioni, Khaled and Makino, Kazuhisa and Rauf, Imran}, EDITOR = {Ngo, Hung Q.}, TITLE = {On the Readability of Monotone {Boolean} Formulae}, BOOKTITLE = {Computing and Combinatorics :15th Annual International Conference, COCOON 2009}, PADDRESS = {Berlin, Germany}, ADDRESS = {Niagara Falls, New York, USA}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5609}, ISBN = {978-3-642-02881-6}, DOI = {10.1007/978-3-642-02882-3_49}, YEAR = {2009}, PAGES = {496--505}, } @INPROCEEDINGS{EpJeSS12, AUTHOR = {Epstein, Leah and Jez, Lukasz and Sgall, Jiri and van Stee, Rob}, EDITOR = {Gupta, Anupam and Jansen, Klaus and Rolim, Jos{\'e} and Servedio, Rocco}, TITLE = {Online Scheduling of Jobs with Fixed Start Times on Related Machines}, BOOKTITLE = {Approximation, Randomization, and Combinatorial Optimization : Algorithms and Techniques ; 15th International Workshop, APPROX 2012 and 16th International Workshop, RANDOM 2012}, PADDRESS = {Berlin}, ADDRESS = {Boston, USA}, PUBLISHER = {Springer}, MONTH = {August}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {7408}, ISBN = {978-3-642-32511-3}, DOI = {10.1007/978-3-642-32512-0_12}, YEAR = {2012}, PAGES = {134--145}, ABSTRACT = {We consider online preemptive throughput scheduling of jobs with fixed starting times on $m$ uniformly related machines, with the goal of maximizing the profit of the completed jobs. In this problem, jobs are released over time. Every job has a size and a weight associated with it. A newly released job must be either assigned to start running immediately on a machine or otherwise it is dropped. It is also possible to drop an already scheduled job, but only completed jobs contribute their weights to the profit of the algorithm. In the most general setting, no algorithm has bounded competitive ratio, and we consider a number of standard variants. We give a full classification of the variants into cases which admit constant competitive ratio (weighted and unweighted unit jobs, and C-benevolent instances, which is a wide class of instances containing proportional-weight jobs), and cases which admit only a linear competitive ratio (unweighted jobs and D-benevolent instances). In particular, we give a lower bound of $m$ on the competitive ratio for scheduling unit weight jobs with varying sizes, which is tight. For unit size and weight we show that a natural greedy algorithm is $4/3$-competitive and optimal on $m=2$ machines, while for a large $m$, its competitive ratio is between $1.56$ and $2$. Furthermore, no algorithm is better than $1.5$-competitive.}, } @INPROCEEDINGS{EpKlSt2009, AUTHOR = {Epstein, Leah and Kleiman, Elena and van Stee, Rob}, EDITOR = {Leonardi, Stefano}, TITLE = {Maximizing the Minimum Load: {The} Cost of Selfishness}, BOOKTITLE = {Internet and Network Economics : 5th International Workshop, WINE 2009}, PADDRESS = {Berlin, Germany}, ADDRESS = {Rome, Italy}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5929}, ISBN = {978-3-642-10840-2}, DOI = {10.1007/978-3-642-10841-9_22}, YEAR = {2009}, PAGES = {232--243}, } @INPROCEEDINGS{EpLeSt10, AUTHOR = {Epstein, Leah and Levin, Asaf and van Stee, Rob}, EDITOR = {Abramsky, Samson and Gavoille, Cyril and Kirchner, Claude and Meyer auf der Heide, Friedhelm and Spirakis, Paul G.}, TITLE = {Max-min online allocations with a reordering buffer}, BOOKTITLE = {Automata, Languages and Programming : 37th International Colloquium, ICALP 2010}, ORGANIZATION = {European Association for Theoretical Computer Science (EATCS)}, PADDRESS = {Berlin}, ADDRESS = {Bordeaux, France}, PUBLISHER = {Springer}, MONTH = {July}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6198}, ISBN = {9-783642-14164-5}, DOI = {10.1007/978-3-642-14165-2_29}, YEAR = {2010}, PAGES = {336--347}, ABSTRACT = {We consider a scheduling problem where each job is controlled by a selfish agent, who is only interested in minimizing its own cost, which is defined as the total load on the machine that its job is assigned to. We consider the objective of maximizing the minimum load (cover) over the machines. Unlike the regular makespan minimization problem, which was extensively studied in a game theoretic context, this problem has not been considered in this setting before. We study the price of anarchy (\poa) and the price of stability (\pos). Since these measures are unbounded already for two uniformly related machines, we focus on identical machines. We show that the $\pos$ is 1, and we derive tight bounds on the $\poa$ for $m\leq6$ and nearly tight bounds for general $m$. In particular, we show that the $\poa$ is at least 1.691 for larger $m$ and at most 1.7. Hence, surprisingly, the $\poa$ is less than the $\poa$ for the makespan problem, which is 2. To achieve the upper bound of 1.7, we make an unusual use of weighting functions. Finally, in contrast we show that the mixed $\poa$ grows exponentially with $m$ for this problem, although it is only $\Theta(\log m/\log \log m)$ for the makespan. In addition we consider a similar setting with a different objective which is minimizing the maximum ratio between the loads of any pair of machines in the schedule. We show that under this objective for general $m$ the $\pos$ is 1, and the $\poa$ is 2.}, } @ARTICLE{EpLeSt11a, AUTHOR = {Epstein, Leah and Levin, Asaf and van Stee, Rob}, JOURNAL = {SIAM Journal on Discrete Mathematics}, TITLE = {Max-min online allocations with a reordering buffer}, ADDRESS = {Philadelphia, PA}, NUMBER = {3}, PUBLISHER = {SIAM}, VOLUME = {25}, ISBN = {0895-4801}, DOI = {10.1137/100794006}, YEAR = {2011}, PAGES = {1230--1250}, ABSTRACT = {We consider online scheduling so as to maximize the minimum load, using a reordering buffer which can store some of the jobs before they are assigned irrevocably to machines. For $m$ identical machines, we show an upper bound of $H_{m-1}+1$ for a buffer of size $m-1$. A competitive ratio below $H_m$ is not possible with any fixed buffer size, and it requires a buffer of size $\Omega(m/\log m)$ to get a ratio of $O(\log m)$. For uniformly related machines, we show that a buffer of size $m+1$ is sufficient to get a competitive ratio of $m$, which is best possible for any fixed sized buffer. We show similar results (but with different constructions) for the restricted assignment model. We give tight bounds for two machines in all the three models. These results sharply contrast to the (previously known) results which can be achieved without the usage of a reordering buffer, where it is not possible to get a ratio below a competitive ratio of $m$ already for identical machines, and it is impossible to obtain an algorithm of finite competitive ratio in the other two models, even for $m=2$. Our results strengthen the previous conclusion that a reordering buffer is a powerful tool and it allows a significant decrease in the competitive ratio of online algorithms for scheduling problems. Another interesting aspect of our results is that our algorithm for identical machines imitates the behavior of a greedy algorithm on (a specific set of) related machines, whereas our algorithm for related machines completely ignores the speeds until all jobs have arrived, and then only uses the relative order of the speeds.}, } @ARTICLE{EpLeSt12, AUTHOR = {Epstein, Leah and Levin, Asaf and van Stee, Rob}, JOURNAL = {Algorithmica}, TITLE = {Approximation Schemes for Packing Splittable Items with Cardinality Constraints}, ADDRESS = {New York}, NUMBER = {1-2}, PUBLISHER = {Springer}, MONTH = {February}, VOLUME = {62}, ISBN = {0178-4617}, DOI = {10.1007/s00453-010-9445-6}, YEAR = {2012}, PAGES = {102--129}, ABSTRACT = {We continue the study of bin packing with splittable items and cardinality constraints. In this problem, a set of $n$ items must be packed into as few bins as possible. Items may be split, but each bin may contain at most $k$ (parts of) items, where $k$ is some given parameter. Complicating the problem further is the fact that items may be larger than 1, which is the size of a bin. The problem is known to be strongly NP-hard for any fixed value of $k$. We essentially close this problem by providing an efficient polynomial-time approximation scheme (EPTAS) for most of its versions. Namely, we present an efficient polynomial time approximation scheme for %values of $k$ such that $k=o(n)$. A PTAS for $k=\Theta (n)$ does not exist unless P $=$ NP. Additionally, we present \emph{dual} approximation schemes for $k=2$ and for constant values of $k$. Thus we show that for any $\eps>0$, it is possible to pack the items into the optimal number of bins in polynomial time, if the algorithm may use bins of size $1+\eps$.}, } @INPROCEEDINGS{EpLeSt13, AUTHOR = {Epstein, Leah and Levin, Asaf and van Stee, Rob}, EDITOR = {Sanjeev Khanna}, TITLE = {A unified approach to truthful scheduling on related machines}, BOOKTITLE = {Proceedings of the Twenty-Fourth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2013}, PADDRESS = {Philadelphia, USA}, ADDRESS = {New Orleans, USA}, PUBLISHER = {SIAM}, MONTH = {January}, YEAR = {2013}, PAGES = {1243--1252}, ABSTRACT = {We present a unified framework for designing deterministic monotone polynomial time approximation schemes (PTAS's) for a wide class of scheduling problems on uniformly related machines. This class includes (among others) minimizing the makespan, maximizing the minimum load, and minimizing the $\ell_p$ norm of the machine loads vector. Previously, this kind of result was only known for the makespan objective. Monotone algorithms have the property that an increase in the speed of a machine cannot decrease the amount of work assigned to it. The key idea of our novel method is to show that for goal functions that are sufficiently well-behaved functions of the machine loads, it is possible to compute in polynomial time a highly structured nearly optimal schedule. An interesting aspect of our approach is that, in contrast to all known approximation schemes, we avoid rounding any job sizes or speeds throughout. We can therefore find the \emph{exact} best structured schedule using dynamic programming. The state space encodes a sufficient amount of information such that no postprocessing is needed, allowing an elegant and relatively simple analysis without any special cases. The monotonicity is a consequence of the fact that we find the {\it best} schedule in a specific collection of schedules. Monotone approximation schemes have an important role in the emerging area of algorithmic mechanism design. In the game-theoretical setting of these scheduling problems there is a social goal, which is one of the objective functions that we study. Each machine is controlled by a selfish single-parameter agent, where its private information is its cost of processing a unit sized job, which is also the inverse of the speed of its machine. Each agent wishes to maximize its own profit, defined as the payment it receives from the mechanism minus its cost for processing all jobs assigned to it, and places a bid which corresponds to its private information. For each one of the problems, we show that we can calculate payments that guarantee truthfulness in an efficient manner. Thus, there exists a dominant strategy where agents report their true speeds, and we show the existence of a truthful mechanism which can be implemented in polynomial time, where the social goal is approximated within a factor of $1+\eps$ for every $\eps>0$.}, } @ARTICLE{EpsSte11, AUTHOR = {Epstein, Leah and van Stee, Rob}, JOURNAL = {Theory of Computing Systems}, TITLE = {Improved results for a memory allocation problem}, ADDRESS = {New York, NY}, NUMBER = {1}, PUBLISHER = {Springer}, MONTH = {January}, VOLUME = {48}, ISBN = {1432-4350}, DOI = {10.1007/s00224-009-9226-2}, YEAR = {2011}, PAGES = {79--92}, ABSTRACT = {We consider a memory allocation problem. This problem can be modeled as a version of bin packing where items may be split, but each bin may contain at most two (parts of) items. This problem was recently introduced by Chung et al.~\cite{ChGrVM06}. We give a simple $\frac 32$-approximation algorithm for this problem which is in fact an online algorithm. This algorithm also has good performance for the more general case where each bin may contain at most $k$ parts of items. We show that this general case is strongly NP-hard for any $k \geq 3$. Additionally, we design an efficient approximation algorithm, for which the approximation ratio can be made arbitrarily close to $\frac 75$.}, } @ARTICLE{EpsSte12, AUTHOR = {Epstein, Leah and van Stee, Rob}, JOURNAL = {Information and Computation}, TITLE = {The price of anarchy on uniformly related machines revisited}, ADDRESS = {Amsterdam}, PUBLISHER = {Elsevier}, MONTH = {March}, VOLUME = {212}, ISBN = {0890-5401}, DOI = {10.1016/j.ic.2012.01.005}, YEAR = {2012}, PAGES = {37--54}, ABSTRACT = {Recent interest in Nash equilibria led to a study of the {\it price of anarchy} (poa) and the {\it strong price of anarchy} (spoa) for scheduling problems. The two measures express the worst case ratio between the cost of an equilibrium (a pure Nash equilibrium, and a strong equilibrium, respectively) to the cost of a social optimum. The atomic players are the jobs, and the delay of a job is the completion time of the machine running it, also called the load of this machine. The social goal is to minimize the maximum delay of any job, while the selfish goal of each job is to minimize its own delay, that is, the delay of the machine running it. We consider scheduling on uniformly related machines. While previous studies either consider identical speed machines or an arbitrary number of speeds, focusing on the number of machines as a parameter, we consider the situation in which the number of different speeds is small. We reveal a linear dependence between the number of speeds and the poa. For a set of machines of at most $p$ speeds, the poa turns out to be exactly $p+1$. The growth of the poa for large numbers of related machines is therefore a direct result of the large number of potential speeds. We further consider a well known structure of processors, where all machines are of the same speed except for one possibly faster machine. We investigate the poa as a function of both the speed ratio between the fastest machine and the number of slow machines.}, } @ARTICLE{EpsSte2009, AUTHOR = {Epstein, Leah and van Stee, Rob}, JOURNAL = {Theoretical Computer Science}, TITLE = {Maximizing the minimum load for selfish agents}, ADDRESS = {Amsterdam}, NUMBER = {1}, PUBLISHER = {Elsevier}, VOLUME = {411}, ISBN = {0304-3975}, DOI = {10.1016/j.tcs.2009.08.032}, YEAR = {2010}, PAGES = {44--57}, } @ARTICLE{Epstein2006, AUTHOR = {Epstein, Leah and Kesselman, Alexander}, JOURNAL = {Theoretical Computer Science}, TITLE = {On the remote server problem or more about TCP acknowledgments}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {1-3}, PUBLISHER = {Elsevier}, MONTH = {December}, VOLUME = {369}, ISBN = {0304-3975}, DOI = {10.1016/j.tcs.2006.09.003}, YEAR = {2006}, PAGES = {285}, ABSTRACT = {We study an on-line problem that is motivated by service calls management in a remote support center. When a customer calls the remote support center of a software company, a technician opens a service request and assigns it a severity rating. This request is then transferred to the appropriate support engineer (SE) who establishes a connection to the customer's site and uses remote diagnostic capabilities to resolve the problem. We assume that the SE can service at most one customer at time and a request service time is negligible. There is a constant setup cost of creating a new connection to a customer's site and a specific cost per request for delaying its service that depends on the severity of the request. The problem is to decide which customers to serve first so as to minimize the incurred cost. This problem with just two customers is a natural generalization of the TCP acknowledgment problem. For the on-line version of the Remote Server Problem (RSP), we present algorithms for the general case and for a special casef of two customers that achieve competitive ratios of exactly 4 and 3, respectively. We also show that no deterministic on-line algorithm can have competitive ratio better than 3. Then we study generalized versions of our model, these are the case of an asymmetric setup cost function and the case of multiple SEs. For the off-line version of the RSP, we derive an optimal algorithm with a polynomial running time for a constant number of customers. }, } @INPROCEEDINGS{EpsteinAMMMSS2010, AUTHOR = {Epstein, Leah and Levin, Asaf and Marchetti-Spaccamela, Alberto and Megow, Nicole and Mestre, Julian and Skutella, Martin and Stougie, Leen}, EDITOR = {Eisenbrand, Friedrich and Shepherd, F. Bruce}, TITLE = {Universal sequencing on a single machine}, BOOKTITLE = {Integer Programming and Combinatorial Optimization : 14th International Conference, IPCO 2010}, PADDRESS = {Berlin}, ADDRESS = {Lausanne, Switzerland}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6080}, ISBN = {978-3-642-13035-9}, DOI = {10.1007/978-3-642-13036-6_18}, YEAR = {2010}, PAGES = {230--243}, } @ARTICLE{EpStTa2009, AUTHOR = {Epstein, Leah and van Stee, Rob and Tamir, Tami}, JOURNAL = {Theory of Computing Systems}, TITLE = {Paging with request sets}, ADDRESS = {New York}, NUMBER = {1}, PUBLISHER = {Springer}, VOLUME = {44}, ISBN = {1432-4350}, DOI = {10.1007/s00224-007-9029-2}, YEAR = {2009}, PAGES = {67--81}, } @INPROCEEDINGS{ES-complexity-12, AUTHOR = {Emeliyanenko, Pavel and Sagraloff, Michael}, EDITOR = {van der Hoeven, Joris and van Hoeij, Mark}, TITLE = {On the Complexity of Solving a Bivariate Polynomial System}, BOOKTITLE = {ISSAC 2012 : Proceedings of the 37th International Symposium on Symbolic and Algebraic Computation}, PADDRESS = {New York, NY}, ADDRESS = {Grenoble, France}, PUBLISHER = {ACM}, MONTH = {July}, ISBN = {978-1-4503-1269-1}, DOI = {10.1145/2442829.2442854}, YEAR = {2012}, PAGES = {154--161}, } @INPROCEEDINGS{ESA:EMR09, AUTHOR = {Elbassioni, Khaled and Makino, Kazuhisa and Rauf, Imran}, EDITOR = {Fiat, Amos and Sanders, Peter}, TITLE = {Output-Sensitive Algorithms for Enumerating Minimal Transversals for Some Geometric Hypergraphs}, BOOKTITLE = {Algorithms - ESA 2009 : 17th Annual European Symposium}, PADDRESS = {Berlin, Germany}, ADDRESS = {Copenhagen, Denmark}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5757}, ISBN = {978-3-642-04127-3}, DOI = {10.1007/978-3-642-04128-0_13}, YEAR = {2009}, PAGES = {143--154}, } @TECHREPORT{esw-sacsee-02, AUTHOR = {Eigenwillig, Arno and Sch{\"o}mer, Elmar and Wolpert, Nicola}, TITLE = {Sweeping Arrangements of Cubic Segments Exactly and Efficiently}, INSTITUTION = {Effective Computational Geometry for Curves and Surfaces}, TYPE = {Report}, ADDRESS = {Sophia Antipolis}, NUMBER = {ECG-TR-182202-01}, YEAR = {2002}, PAGES = {10}, ABSTRACT = {A method is presented to compute the planar arrangement induced by segments of algebraic curves of degree three (or less), using an improved Bentley-Ottmann sweep-line algorithm. Our method is exact (it provides the mathematically correct result), complete (it handles all possible geometric degeneracies), and efficient (the implementation can handle hundreds of segments). The range of possible input segments comprises conic arcs and cubic splines as special cases of particular practical importance. }, } @ARTICLE{EulerECJ07, AUTHOR = {Doerr, Benjamin and Hebbinghaus, Nils and Neumann, Frank}, JOURNAL = {Evolutionary Computation}, TITLE = {Speeding up Evolutionary Algorithms Through Asymmetric Mutation Operators}, NUMBER = {4}, PUBLISHER = {MIT Press}, VOLUME = {15}, DOI = {10.1162/evco.2007.15.4.401}, YEAR = {2007}, PAGES = {401--410}, ABSTRACT = {Successful applications of evolutionary algorithms show that certain variation operators can lead to good solutions much faster than other ones. We examine this behavior observed in practice from a theoretical point of view and investigate the effect of an asymmetric mutation operator in evolutionary algorithms with respect to the runtime behavior. Considering the Eulerian cycle problem we present runtime bounds for evolutionary algorithms using an asymmetric operator which are much smaller than the best upper bounds for a more general one. In our analysis it turns out that a plateau which both algorithms have to cope with changes its structure in a way that allows the algorithm to obtain an improvement much faster. In addition, we present a lower bound for the general case which shows that the asymmetric operator speeds up computation by at least a linear factor. }, } @ARTICLE{FanghaenelGHV2013, AUTHOR = {Fangh{\"a}nel, Alexander and Geulen, Sascha and Hoefer, Martin and V{\"o}cking, Berthold}, JOURNAL = {Journal of Scheduling}, TITLE = {Online Capacity Maximization in Wireless Networks}, NUMBER = {1}, VOLUME = {16}, YEAR = {2013}, PAGES = {81--91}, } @INPROCEEDINGS{Farzan2010, AUTHOR = {Farzan, Arash and Gagie, Travis and Navarro, Gonzalo}, EDITOR = {Cheong, Otfried and Chwa, Kyung-Yong and Park, Kunsoo}, TITLE = {Entropy-Bounded Representation of Point Grids}, BOOKTITLE = {Algorithms and Computation : 21st International Symposium, ISAAC 2010. - Pt. II}, PADDRESS = {Berlin}, ADDRESS = {Jeju Island, Korea}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6507}, ISBN = {978-3-642-17513-8}, DOI = {10.1007/978-3-642-17514-5_28}, YEAR = {2010}, PAGES = {327--338}, ABSTRACT = {We give the first fully compressed representation of a set of $m$ points on an $n \times n$ grid, taking $H+o(H)$ bits of space, where $H=\lg {n^2 \choose m}$ is the entropy of the set. This representation supports range counting, range reporting, and point selection queries, with a performance that is comparable to that of uncompressed structures and that improves upon the only previous compressed structure. Operating within entropy-bounded space opens a new line of research on an otherwise well-studied area, and is becoming extremely important for handling large datasets.}, } @INPROCEEDINGS{Farzan2010a, AUTHOR = {Blelloch, Guy E. and Farzan, Arash}, EDITOR = {Amir, Amihood and Parida, Laxmi}, TITLE = {Succinct Representations of Separable Graphs}, BOOKTITLE = {Combinatorial Pattern Matching : 21st Annual Symposium, CPM 2010}, PADDRESS = {Berlin}, ADDRESS = {New York, NY}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6129}, ISBN = {978-3-642-13508-8}, DOI = {10.1007/978-3-642-13509-5_13}, YEAR = {2010}, PAGES = {138--150}, ABSTRACT = {We consider the problem of highly space-efficient representation of separable graphs while supporting queries in constant time in the RAM with logarithmic word size. In particular, we show constant-time support for adjacency, degree and neighborhood queries. For any monotone class of separable graphs, the storage requirement of the representation is optimal to within lower order terms. Separable graphs are those that admit a $O(n^c)$-separator theorem where $c < 1$. Many graphs that arise in practice are indeed separable. For instance, graphs with a bounded genus are separable. In particular, planar graphs (genus $0$) are separable and our scheme gives the first succinct representation of planar graphs with a storage requirement that matches the information-theory minimum to within lower order terms with constant time support for the queries. We, furthers, show that we can also modify the scheme to succinctly represent the combinatorial planar embedding of planar graphs (and hence encode planar maps).}, } @ARTICLE{FarzanDynamic2011, AUTHOR = {Farzan, Arash and Munro, J. Ian}, JOURNAL = {Theoretical Computer Science}, TITLE = {Succinct representation of dynamic trees}, ADDRESS = {Amsterdam}, NUMBER = {24}, PUBLISHER = {Elsevier}, VOLUME = {412}, ISBN = {0304-3975}, DOI = {10.1016/j.tcs.2010.10.030}, YEAR = {2011}, PAGES = {2668--2678}, NOTE = {accepted for Theoretical Computer Science}, } @ARTICLE{Fatourou2000, AUTHOR = {Fatourou, Panagiota and Spirakis, Paul G.}, JOURNAL = {Theory of Computing Systems}, TITLE = {Efficient Scheduling of Strict Multithreaded Computations}, ADDRESS = {New York, USA}, NUMBER = {3}, PUBLISHER = {Springer}, MONTH = {May}, VOLUME = {33}, ISBN = {1432-4350}, YEAR = {2000}, PAGES = {173--232}, ABSTRACT = {In this paper we study the problem of efficiently scheduling a wide class of multithreaded computations, called {\em strict}; that is, computations in which all dependencies from a thread go to the thread's ancestors in the computation tree. Strict multithreaded computations allow the limited use of synchronization primitives. We present the {\em first} fully distributed scheduling algorithm which applies to {\em any} strict multithreaded computation. The algorithm is asynchronous, on-line and follows the {\em work-stealing} paradigm. We prove that our algorithm is efficient not only in terms of its memory requirements and its execution time, but also in terms of its communication complexity. Our analysis applies to both shared and distributed memory machines. More specifically, the expected execution time of our algorithm is $O(T_1/P + hT_{\infty})$, where $T_1$ is the minimum serial execution time, $T_{\infty}$ is the minimum execution time with an infinite number of processors, $P$ is the number of processors and $h$ is the maximum ``distance'' in the {\em computation tree} between any two threads that need to communicate. Furthermore, the total space required during the execution is $O(S_1 P)$, where $S_1$ is the space required by a serial computer to execute the computation, while the expected communication cost incurred by our algorithm is $O(PhT_{\infty} (1+n_d) S_{max})$, where $n_d$ is the maximum number of dependencies entering any thread and $S_{max}$ is the largest amount of storage needed for the execution of any specific thread of the computation. Our communication complexity bound is {\em the first} nontrivial bound ever proved for the model of strict parallel programming. }, } @INPROCEEDINGS{FBVI2011, AUTHOR = {Friedrich, Tobias and Bringmann, Karl and Voss, Thomas and Igel, Christian}, EDITOR = {Beyer, Hans- Georg and Langdon, William}, TITLE = {The Logarithmic Hypervolume Indicator}, BOOKTITLE = {FOGA'11 : Proceedings of the 2011 ACM/SIGEVO Foundations of Genetic Algorithms XI}, PADDRESS = {New York, NY}, ADDRESS = {Schwarzenberg, Austria}, PUBLISHER = {ACM}, ISBN = {978-1-4503-0633-1}, DOI = {10.1145/1967654.1967662}, YEAR = {2011}, PAGES = {81--92}, } @MASTERSTHESIS{Feld98, AUTHOR = {Feld, Thomas}, TITLE = {{Analyse und Implementierung von Algorithmen zum Minimum Cost Circulation Problem}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {November}, YEAR = {1998}, } @MASTERSTHESIS{FeldmannBachelor2012, AUTHOR = {Feldmann, Matthias}, TITLE = {Stochastic optimization with fitness proportional ant systems }, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Bachelor thesis}, YEAR = {2012}, } @ARTICLE{Fellows2012, AUTHOR = {Fellows, Michael R. and Hermelin, Danny and Rosamond, Fraces A.}, JOURNAL = {Algorithmica}, TITLE = {Well Quasi Orders in Subclasses of Bounded Treewidth Graphs and Their Algorithmic Applications}, ADDRESS = {New York, NY}, NUMBER = {1}, PUBLISHER = {Springer}, VOLUME = {64}, ISBN = {0178-4617}, DOI = {10.1007/s00453-011-9545-y}, YEAR = {2012}, PAGES = {3--18}, } @ARTICLE{FellowsFertinHermelinVialette2011, AUTHOR = {Fellows, Michael R. and Fertin, Guillaume and Hermelin, Danny and Vialette, Stephane}, JOURNAL = {Journal of Computer and System Sciences}, TITLE = {Upper and lower bounds for finding connected motifs in vertex-colored graphs}, ADDRESS = {Amsterdam}, NUMBER = {4}, PUBLISHER = {Elsevier}, VOLUME = {77}, ISBN = {0022-0000}, DOI = {10.1016/j.jcss.2010.07.003}, YEAR = {2011}, PAGES = {799--811}, } @INPROCEEDINGS{FellowsFriedrichHermelinEtAL2011, AUTHOR = {Fellows, Michael R. and Friedrich, Tobias and Hermelin, Danny and Narodytska, Nina and Rosamond, Frances A.}, EDITOR = {Walsh, Toby}, TITLE = {Constraint Satisfaction Problems: {Convexity} Makes All Different Constraints Tractable}, BOOKTITLE = {Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence (IJCAI 2011)}, PADDRESS = {Menlo Park, CA}, ADDRESS = {Barcelona, Spain}, PUBLISHER = {AAAI Press}, ISBN = {978-1-57735-512-0}, DOI = {10.5591/978-1-57735-516-8/IJCAI11-095}, YEAR = {2011}, PAGES = {522--527}, } @ARTICLE{FellowsHatrmanHermelinEtAl2011, AUTHOR = {Fellows, Michael R. and Hartman, Tzvika and Hermelin, Danny and Landau, Gad M. and Rosamond, Frances A. and Rozenberg, Liat}, JOURNAL = {IEEE/ACM Transactions on Computational Biology and Bioinformatics}, TITLE = {Haplotype Inference Constrained by Plausible Haplotype Data}, ADDRESS = {Piscataway, NJ}, NUMBER = {6}, PUBLISHER = {IEEE}, VOLUME = {8}, ISBN = {1545-5963}, DOI = {10.1109/TCBB.2010.72}, YEAR = {2011}, PAGES = {1692--1699}, } @INPROCEEDINGS{FernauFominLokshtanovMnichPhilipSaurabh2010, AUTHOR = {Fernau, Henning and Fomin, Fedor V. and Lokshtanov, Daniel and Mnich, Matthias and Philip, Geevarghese and Saurabh, Saket}, EDITOR = {Iliopoulos, Costas S. and F. Smyth, William}, TITLE = {Ranking and Drawing in Subexponential Time}, BOOKTITLE = {Combinatorial Algorithms - 21st International Workshop, IWOCA 2010, London, UK, July 26-28, 2010, Revised Selected Papers}, TYPE = {Revised Selected Papers}, PADDRESS = {Berlin}, ADDRESS = {London, United Kingdom}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6460}, ISBN = {978-3-642-19221-0}, DOI = {10.1007/978-3-642-19222-7_34}, YEAR = {2011}, ABSTRACT = {In this paper we obtain parameterized subexponential-time algorithms for \kaggLG{} (\kagg{}) --- a problem in social choice theory --- and for \oscmLG{} (\oscm{}) -- a problem in graph drawing (see the introduction for definitions). These algorithms run in time $\Oh^{*}(2^{\Oh(\sqrt{k}\log k)})$, where $k$ is the parameter, and significantly improve the previous best algorithms with running times $\Oh^{*}(1.403^k)$ and $\Oh^{*}(1.4656^k)$, respectively. We also study natural ``above-guarantee'' versions of these problems and show them to be fixed parameter tractable. In fact, we show that the above-guarantee versions of these problems are equivalent to a weighted variant of {\sc $p$-Directed Feedback Arc Set}. Our results for the above-guarantee version of \kagg{} reveal an interesting contrast. We show that when the number of ``votes'' in the input to \kagg{} is {\em odd} the above guarantee version can still be solved in time $O^{*}(2^{\Oh(\sqrt{k}\log k)})$, while if it is {\em even} then the problem cannot have a subexponential time algorithm unless the exponential time hypothesis fails (equivalently, unless FPT$=$M[$1$]). }, } @INPROCEEDINGS{FernauFominPhilipSaurabh2010, AUTHOR = {Fernau, Henning and Fomin, Fedor V. and Philip, Geevarghese and Saurabh, Saket}, EDITOR = {Thai, My T. and Sahni, Sartaj}, TITLE = {The Curse of Connectivity: $t$-Total Vertex (Edge) Cover}, BOOKTITLE = {Computing and Combinatorics, 16th Annual International Conference, COCOON 2010, Nha Trang, Vietnam, July 19-21, 2010. Proceedings}, PADDRESS = {Berlin}, ADDRESS = {Nha Trang, Vietnam}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6196}, ISBN = {978-3-642-14030-3}, DOI = {10.1007/978-3-642-14031-0}, YEAR = {2010}, PAGES = {34--43}, ABSTRACT = {We investigate the effect of certain natural connectivity constraints on the parameterized complexity of two fundamental graph covering problems, namely Vertex Cover and Edge Cover. Specifically, we impose the additional requirement that each connected component of a solution have at least $t$ vertices (resp. edges from the solution), and call the problem $t$-Total Vertex Cover (resp. $t$-Total Edge Cover). We show that \begin{itemize} \item both problems remain fixed-parameter tractable with these restrictions, with running times of the form $\Oh^{*}\left(c^{k}\right)$ for some constant $c>0$ in each case; \item for every $t\ge2$,$t$-Total Vertex Cover has no polynomial kernel unless the Polynomial Hierarchy collapses to the third level; \item for every $t\ge2$, $t$-Total Edge Cover has a linear vertex kernel of size $\frac{t+1}{t}k$. \end{itemize}}, } @ARTICLE{FerraginaGrossSIAMJCOMPUT1998, AUTHOR = {Ferragina, Paolo and Gross, Roberto}, JOURNAL = {SIAM Journal on Computing}, TITLE = {Optimal On-Line Search and Sublinear Time Update in String Matching}, NUMBER = {3}, PUBLISHER = {SIAM}, MONTH = {June}, VOLUME = {27}, ISBN = {0097-5397}, YEAR = {1998}, PAGES = {713--736}, } @INPROCEEDINGS{fffmo-eropmoffsi-14, AUTHOR = {Fekete, S{\'a}ndor P. and Fiethe, Bj{\"o}rn and Friedrichs, Stephan and Michalik, Harald and Orlis, Christos}, TITLE = {Efficient reconfiguration of processing modules on FPGAs for space instruments}, BOOKTITLE = {Adaptive Hardware and Systems (AHS), 2014 NASA/ESA Conference on}, PADDRESS = {New York, USA}, ADDRESS = {Leicester, UK}, PUBLISHER = {IEEE}, MONTH = {July}, SERIES = {Adaptive Hardware and Systems}, DOI = {10.1109/AHS.2014.6880153}, YEAR = {2014}, PAGES = {15--22}, ABSTRACT = {We consider optimization techniques for a problem that requires a valid scheduling and allocation of tasks on Field Programmable Gate Arrays (FPGAs). A concrete application on a scientific space instrument arises in the context of ESA's Solar Orbiter mission; making use of dynamic reconfiguration allows a good and flexible use of resources, but the resulting packing and scheduling problems in the presence of inhomogeneous allocation resources are quite challenging. In our scenario, modules are described by three parameters: their resource demands for different types of resources, their priority, and their clock frequency. These are to be allocated on an FPGA that provides a number of different resources that are available at specific locations. We first present an Integer Program that partitions the tasks in such a way that all constraints can be met and the reconfiguration overhead is minimized, and then give methods for allocating the processing modules of the partitioned tasks on the FPGA. We evaluate our methods on a real application of the Solar Orbiter PHI instrument. The results obtained indicate computational efficiency and a remarkable solution quality.}, } @INPROCEEDINGS{ffks-ffagp-13, AUTHOR = {Fekete, S{\'a}ndor P. and Friedrichs, Stephan and Kr{\"o}ller, Alexander and Schmidt, Christiane}, EDITOR = {Du, Ding-Zhu and Zhang, Guochuan}, TITLE = {Facets for Art Gallery Problems}, BOOKTITLE = {Computing and Combinatorics}, PADDRESS = {Berlin}, ADDRESS = {Hangzhou, China}, PUBLISHER = {Springer}, MONTH = {June}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {7936}, ISBN = {978-3-642-38767-8}, DOI = {10.1007/978-3-642-38768-5_20}, YEAR = {2013}, PAGES = {208--220}, ABSTRACT = {We demonstrate how polyhedral methods of mathematical programming can be developed for and applied to computing optimal solutions for large instances of a classical geometric optimization problem with an uncountable number of constraints and variables. The Art Gallery Problem (AGP) asks for placing a minimum number of stationary guards in a polygonal region $P$, such that all points in $P$ are guarded. The AGP is NP-hard, even to approximate. Due to the infinite number of points to be guarded as well as possible guard positions, applying mathematical programming methods for computing provably optimal solutions is far from straightforward. In this paper, we use an iterative primal-dual relaxation approach for solving AGP instances to optimality. At each stage, a pair of LP relaxations for a finite candidate subset of primal covering and dual packing constraints and variables is considered; these correspond to possible guard positions and points that are to be guarded. Of particular interest are additional cutting planes for eliminating fractional solutions. We identify two classes of facets, based on Edge Cover and Set Cover (SC) inequalities. Solving the separation problem for the latter is NP-complete, but exploiting the underlying geometric structure of the AGP, we show that large subclasses of fractional SC solutions cannot occur for the AGP. This allows us to separate the relevant subset of facets in polynomial time. Finally, we characterize all facets for finite AGP relaxations with coefficients in ${0, 1, 2}$. We demonstrate the practical usefulness of our approach with improved solution quality and speed for a wide array of large benchmark instances.}, } @INPROCEEDINGS{FH08, AUTHOR = {Friedrich, Tobias and Hebbinghaus, Nils}, EDITOR = {Hong, Seok-Hee and Nagamochi, Hiroshi and Fukunaga, Takuro}, TITLE = {Average Update Times for Fully-Dynamic All-Pairs Shortest Paths.}, BOOKTITLE = {Proceedings of the 19th International Symposium on Algorithms and Computation (ISAAC 2008)}, PADDRESS = {New York, USA}, ADDRESS = {Gold Coast, Australia}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5369}, ISBN = {978-3-540-92181-3}, YEAR = {2008}, PAGES = {693--704}, } @ARTICLE{FHHNW10, AUTHOR = {Friedrich, Tobias and He, Jun and Hebbinghaus, Nils and Neumann, Frank and Witt, Carsten}, JOURNAL = {Evolutionary Computation}, TITLE = {Approximating Covering Problems by Randomized Search Heuristics using Multi-Objective Models}, ADDRESS = {Cambridge, Mass.}, NUMBER = {4}, PUBLISHER = {MIT Press}, MONTH = {November}, VOLUME = {18}, ISBN = {1063-6560}, DOI = {10.1162/EVCO_a_00003}, YEAR = {2010}, PAGES = {617 -- 633}, } @ARTICLE{FHN10, AUTHOR = {Friedrich, Tobias and Hebbinhaus, Nils and Neumann, Frank}, JOURNAL = {Theoretical Computer Science}, TITLE = {Plateaus Can Be Harder in Multi-Objective Optimization}, ADDRESS = {Amsterdam}, NUMBER = {6}, PUBLISHER = {Elsevier}, MONTH = {February}, VOLUME = {411}, ISBN = {0304-3975}, DOI = {10.1016/j.tcs.2009.06.020}, YEAR = {2010}, PAGES = {854--864}, } @INPROCEEDINGS{FHP2009, AUTHOR = {Fountoulakis, Nikolaos and Huber, Anna and Panagiotou, Konstantinos}, EDITOR = {Keidar, Idit}, TITLE = {Brief Announcement: {The} Speed of Broadcasting in Random Networks - Density Does Not Matter}, BOOKTITLE = {Distributed Computing : 23rd International Symposium, DISC 2009}, PADDRESS = {Berlin, Germany}, ADDRESS = {Elche/Elx, Spain}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5805}, ISBN = {978-3-642-04354-3}, DOI = {10.1007/978-3-642-04355-0_53}, YEAR = {2009}, PAGES = {529--530}, NOTE = {Full version available from arXiv:0904.4851}, ABSTRACT = {Broadcasting algorithms are of fundamental importance for distributed systems engineering. In this paper we revisit the classical and well-studied \emph{push} protocol for message broadcasting. Assuming that initially only one node has some piece of information, at each stage every one of the informed nodes chooses randomly and independently one of its neighbors and passes the message to it. The performance of the push protocol on a fully connected network, where each node is joined by a link to every other node, is very well understood. In particular, Frieze and Grimmett proved that with probability $1-o(1)$ the push protocol completes the broadcasting of the message within $(1\pm \eps) (\log_2 n + \ln n)$ stages, where $n$ is the number of nodes of the network. However, there are no tight bounds for the broadcast time on networks that are significantly sparser than the complete graph. In this work we consider random networks on $n$ nodes, where every edge is present with probability $p$, independently of every other edge. We show that if $p\geq {\alpha (n) \ln n \over n}$, where $\alpha(n)$ is any function that tends to infinity as $n$ grows, then the push protocol broadcasts the message within $(1\pm \eps) (\log_2 n + \ln n)$ stages with probability $1-o(1)$. In other words, in almost every network of density $d$ such that $d \ge \alpha(n) \ln n$, the push protocol broadcasts a message as fast as in a fully connected network. This is quite surprising in the sense that the time needed remains essentially \emph{unaffected} by the fact that most of the links are missing. }, } @INPROCEEDINGS{FHPInfocom10, AUTHOR = {Fountoulakis, Nikolaos and Huber, Anna and Panagiotou, Konstantinos}, TITLE = {Reliable broadcasting in random networks and the effect of density}, BOOKTITLE = {2010 Proceedings IEEE INFOCOM}, PADDRESS = {San Diego, USA}, ADDRESS = {San Diego, USA}, PUBLISHER = {IEEE}, ISBN = {978-1-4244-5838-7}, DOI = {10.1109/INFCOM.2010.5462084}, YEAR = {2010}, PAGES = {2552--2560}, } @MASTERSTHESIS{Fialko97, AUTHOR = {Fialko, Sergej}, TITLE = {{Das planare Augmentierungsproblem}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, YEAR = {1997}, } @MASTERSTHESIS{FinkDipl01, AUTHOR = {Fink, Christian}, TITLE = {{Oberfl{\"a}chenrekonstruktion von planaren Konturen}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {October}, YEAR = {2001}, } @PHDTHESIS{Finkler-Diss97, AUTHOR = {Finkler, Ulrich}, TITLE = {Design of Efficient and Correct Algorithms: Theoretical Results and Runtime Prediction of Implementations in Practice}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Doctoral dissertation}, YEAR = {1997}, } @INPROCEEDINGS{Finkler-et-al96, AUTHOR = {Calinescu, Gruia and Fernandes, Cristina G. and Finkler, Ulrich and Karloff, Howard}, TITLE = {A better approximation algorithm for finding planar subgraphs}, BOOKTITLE = {7th ACM-SIAM Symposium on Discrete Algorithms (SODA96)}, PADDRESS = {New York}, ADDRESS = {Georgia, USA}, PUBLISHER = {acm}, YEAR = {1996}, PAGES = {16--25}, } @ARTICLE{Finkler-et-al97, AUTHOR = {Calinescu, Gruia and Fernandes, Cristina G. and Finkler, Ulrich and Karloff, Howard}, JOURNAL = {Journal of Algorithms}, TITLE = {A Better Approximation Algorithm for Finding Planar Subgraphs}, NUMBER = {2}, VOLUME = {27}, ISBN = {0196-6774}, YEAR = {1998}, PAGES = {269--302}, } @INPROCEEDINGS{Finkler-Mehlhorn97, AUTHOR = {Finkler, Ulrich and Mehlhorn, Kurt}, TITLE = {Runtime Prediction of Real Programs on Real Machines}, BOOKTITLE = {Proceedings of the 8th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-97)}, PADDRESS = {New York, USA}, ADDRESS = {New Orleans, USA}, PUBLISHER = {ACM / SIAM}, YEAR = {1997}, PAGES = {380--389}, } @INPROCEEDINGS{FK2006, AUTHOR = {Funke, Stefan and Klein, Christian}, EDITOR = {Amenta, Nina and Cheong, Otfried}, TITLE = {Hole Detection or: "How Much Geometry Hides in Connectivity?"}, BOOKTITLE = {Proceedings of the 22nd Annual Symposium on Computational Geometry, SCG'06}, PADDRESS = {New York, USA}, ADDRESS = {Sedona, Arizona, USA}, PUBLISHER = {ACM}, ISBN = {1-59593-340-9}, YEAR = {2006}, PAGES = {377--385}, ABSTRACT = {Wireless sensor networks typically consist of small, very simple network nodes without any positioning device like GPS. After an initialization phase, the nodes know with whom they can talk directly, but have no idea about their relative geographic locations. We examine how much geometry information is nevertheless hidden in the communication graph of the network: Assuming that the connectivity is determined by the well-known unit-disk graph model, we prove that using an extremely simple linear-time algorithm one can identify nodes on the boundaries of holes of the network. That is, there is enough geometry information hidden in the connectivity structure to identify topological features -- in our example the holes in the network. While the theoretical analysis turns out to be quite conservative, an actual implementation shows that the algorithm works well under less stringent conditions.}, } @ARTICLE{FKesselmanMeyerS2006, AUTHOR = {Funke, Stefan and Kesselman, Alexander and Meyer, Ulrich and Segal, Michael}, JOURNAL = {ACM Transactions on Sensor Networks}, TITLE = {A Simple Improved Distributed Algorithm for Minimum {CDS} in Unit Disk Graphs}, ADDRESS = {New York, USA}, NUMBER = {3}, PUBLISHER = {ACM}, VOLUME = {2}, YEAR = {2006}, PAGES = {444--453}, ABSTRACT = {Several routing schemes in ad hoc networks first establish a virtual backbone and then route messages via backbone nodes. One common way of constructing such a backbone is based on the construction of a connected dominating set (CDS). In this article we present a very simple distributed algorithm for computing a small CDS. Our algorithm has an approximation factor of at most 6.91, improving upon the previous best-known approximation factor of 8 due to Wan et al. [2002]. The improvement relies on a refined analysis of the relationship between the size of a maximal independent set and a minimum CDS in a unit disk graph. This subresult also implies improved approximation factors for many existing algorithm. }, } @ARTICLE{FKKLS07, AUTHOR = {Funke, Stefan and Kesselman, Alexander and Kuhn, Fabian and Lotker, Zvi and Segal, Michael}, JOURNAL = {Wireless Networks}, TITLE = {Improved approximation algorithms for connected sensor cover}, ADDRESS = {Berlin, Germany}, NUMBER = {2}, PUBLISHER = {Springer}, MONTH = {April}, VOLUME = {13}, ISBN = {1022-0038}, DOI = {10.1007/s11276-006-3724-9}, YEAR = {2007}, PAGES = {153--164}, } @INPROCEEDINGS{FKKMS02, AUTHOR = {Fotakis, Dimitris and Kontogiannis, Spyros and Koutsoupias, Elias and Mavronicolas, Marios and Spirakis, Paul G.}, EDITOR = {Widmayer, Peter and Triguero, Francisco and Morales, Rafael and Hennessy, Matthew and Eidenbenz, Stephan and Conejo, Ricardo}, TITLE = {The Structure and Complexity of Nash Equilibria for a Selfish Routing Game}, BOOKTITLE = {Automata, Languages and Programming : 29th International Colloquium, ICALP 2002}, PADDRESS = {Berlin, Germany}, ADDRESS = {M{\'a}laga, Spain}, PUBLISHER = {Springer}, MONTH = {July}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {2380}, ISBN = {3-540-43864-5}, YEAR = {2002}, PAGES = {123--134}, ABSTRACT = {In this work, we study the combinatorial structure and the computational complexity of Nash equilibria for a certain game that models {\em selfish routing} over a network consisting of $m$ parallel {\em links}. We assume a collection of {\em $n$ users,} each employing a {\em mixed strategy,} which is a probability distribution over links, to control the routing of its own assigned {\em traffic}. In a {\em Nash equilibrium,} each user selfishly routes its traffic on those links that minimize its {\em expected latency cost,} given the network congestion caused by the other users. The {\em social cost} of a Nash equilibrium is the expectation, over all random choices of the users, of the maximum, over all links, {\em latency} through a link. We embark on a systematic study of several algorithmic problems related to the computation of Nash equilibria for the selfish routing game we consider. In a nutshell, these problems relate to deciding the existence of a Nash equilibrium, constructing a Nash equilibrium with given support characteristics, constructing the {\em worst} Nash equilibrium (the one with {\em maximum} social cost), constructing the {\em best} Nash equilibrium (the one with {\em minimum} social cost), or computing the social cost of a (given) Nash equilibrium. Our work provides a comprehensive collection of efficient algorithms, hardness results (both as $\NP$-hardness and $\#\Pc$-completeness results), and structural results for these algorithmic problems. Our results span and contrast a wide range of assumptions on the syntax of the Nash equilibria and on the parameters of the system.}, } @INPROCEEDINGS{FKLS2004, AUTHOR = {Funke, Stefan and Kesselman, Alexander and Lotker, Zvi and Segal, Michael}, EDITOR = {Nikolaidis, Ioanis and Barbeau, Michel and Kranakis, Evangelos}, TITLE = {Improved Approximation Algorithms for Connected Sensor Cover}, BOOKTITLE = {Ad-hoc, mobil and wireless networks : Third International Conference, ADHOC-NOW 2004}, PADDRESS = {Berlin, Germany}, ADDRESS = {Vancouver, Canada}, PUBLISHER = {Springer}, MONTH = {July}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {3158}, ISBN = {3-540-22543-9}, YEAR = {2004}, PAGES = {56--69}, ABSTRACT = {Wireless sensor networks have recently posed many new system building challenges. One of the main problems is energy conservation since most of the sensors are devices with limited battery life and it is infeasible to replenish energy via replacing batteries. An effective approach for energy conservation is scheduling sleep intervals for some sensors, while the remaining sensors stay active providing continuous service. In this paper we consider the problem of selecting a set of active sensors of minimum cardinality that maintains sensing coverage and network connectivity. We study different variations of this problem. The main contribution of this paper is a thorough investigation of algorithms for covering an area with sensors that have fixed locations.}, } @ARTICLE{FKMcEJC2010, AUTHOR = {Fountoulakis, Nikolaos and Kang, Ross and McDiarmid, Colin}, JOURNAL = {The Electronic Journal of Combinatorics}, TITLE = {The t-stability number of a random graph}, ADDRESS = {Philadelphia, PA}, NUMBER = {1}, PUBLISHER = {University of Pennsylvania}, VOLUME = {17}, YEAR = {2010}, PAGES = {R59,1--R59,29}, } @INPROCEEDINGS{FKMS2005, AUTHOR = {Funke, Stefan and Klein, Christian and Mehlhorn, Kurt and Schmitt, Susanne}, TITLE = {Controlled Perturbation for Delaunay Triangulations}, BOOKTITLE = {Proceedings of the sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-05)}, PADDRESS = {Philadelphia, USA}, ADDRESS = {Vancouver, Canada}, PUBLISHER = {SIAM}, ISBN = {0-89871-585-7}, YEAR = {2005}, PAGES = {1047--1056}, ABSTRACT = {Most geometric algorithms are idealistic in the sense that they are designed for the Real-RAM model of computation and for inputs in general position. Real inputs may be degenerate and floating point arithmetic is only an approximation of real arithmetic. Perturbation replaces an input by a nearby input which is (hopefully) in general position and on which the algorithm can be run with floating point arithmetic. Controlled perturbation as proposed by Halperin et al. calls for more: control over the amount of perturbation needed for a given precision of the floating point system. Or conversely, a control over the precision needed for a given amount of perturbation. Halperin et al.~gave controlled perturbation schemes for arrangements of polyhedral surfaces, spheres, and circles. We extend their work and point out that controlled perturbation is a general scheme for converting idealistic algorithms into algorithms which can be executed with floating point arithmetic. We also show how to use controlled perturbation in the context of randomized geometric algorithms without deteriorating the running time. Finally, we give concrete schemes for planar Delaunay triangulations and convex hulls and Delaunay triangulations in arbitrary dimensions. We analyze the relation between the perturbation amount and the precision of the floating point system. We also report about experiments with a planar Delaunay diagram algorithm. }, } @INPROCEEDINGS{FKMS2005b, AUTHOR = {Funke, Stefan and Kesselman, Alexander and Meyer, Ulrich and Segal, Michael}, TITLE = {A Simple Improved Distributed Algorithm for Minimum {CDS} in Unit Disk Graphs}, BOOKTITLE = {1st IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2005)}, PADDRESS = {Los Alamitos, USA}, ADDRESS = {Montreal, Canada}, PUBLISHER = {IEEE}, VOLUME = {2}, ISBN = {0-7803-9181-0}, YEAR = {2005}, PAGES = {220--223}, } @INPROCEEDINGS{fkw-eevsopcowsn-14, AUTHOR = {Friedrichs, Stephan and Kulau, Ulf and Wolf, Lars}, TITLE = {Energy-efficient voltage scheduling of peripheral components on wireless sensor nodes}, BOOKTITLE = {Communications Workshops (ICC), 2014 IEEE International Conference on}, PADDRESS = {New York, USA}, ADDRESS = {Sydney, Australia}, PUBLISHER = {IEEE}, MONTH = {June}, DOI = {10.1109/ICCW.2014.6881308}, YEAR = {2014}, PAGES = {860--865}, ABSTRACT = {Much effort has been put into optimizing the energy-efficiency of wireless sensor nodes, but existing work exclusively focuses on the transceiver and the processing unit. Nevertheless, the peripheral energy consumption may dominate that of the entire node. We introduce the concept of a dynamically scalable peripheral voltage supply: Even for peripheral devices, a lower voltage level leads to a lower energy consumption. Each peripheral requires a different minimum operating voltage, but switching the voltage level consumes energy as well. We combine theory and practice to present an algorithm weighing off the benefits of a downscaled voltage level against the switching overhead, i. e., for calculating an optimal peripheral voltage schedule. Our approach is capable of self-parameterization and has been implemented and tested on a prototype, saving up to 47% of peripheral energy as compared to existing solutions.}, } @INPROCEEDINGS{FL2007, AUTHOR = {Funke, Stefan and Laue, S{\"o}ren}, EDITOR = {Thomas, Wolfgang and Weil, Pascal}, TITLE = {Bounded-Hop Energy-Efficient Broadcast in Low-Dimensional Metrics Via Coresets}, BOOKTITLE = {STACS 2007 : 24th Annual Symposium on Theoretical Aspects of Computer Science}, PADDRESS = {Berlin, Germany}, ADDRESS = {Aachen, Germany}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4393}, ISBN = {3-540-70917-6}, DOI = {10.1007/978-3-540-70918-3_24}, YEAR = {2007}, PAGES = {272--283}, ABSTRACT = {We consider the problem of assigning powers to nodes of a wireless network in the plane such that a message from a source node s reaches all other nodes within a bounded number k of transmissions and the total amount of assigned energy is minimized. By showing the existence of a coreset of size we are able to (1 + $\varepsilon$)-approximate the bounded-hop broadcast problem in time linear in n which is a drastic improvement upon the previously best known algorithm. While actual network deployments often are in a planar setting, the experienced metric for several reasons is typically not exactly of the Euclidean type, but in some sense ’close’. Our algorithm (and others) also work for non-Euclidean metrics provided they exhibit a certain similarity to the Euclidean metric which is known in the literature as bounded doubling dimension. We give a novel characterization of such metrics also pointing out other applications such as space-efficient routing schemes. This work was supported by the Max Planck Center for Visual Computing and Communication (MPC-VCC) funded by the German Federal Ministry of Education and Research (FKZ 01IMC01).}, } @INPROCEEDINGS{Flash-WEA-2008, AUTHOR = {Ajwani, Deepak and Malinger, Itay and Meyer, Ulrich and Toledo, Sivan}, EDITOR = {McGeoch, Catherine}, TITLE = {Characterizing the Performance of Flash Memory Storage Devices and Its Impact on Algorithm Design}, BOOKTITLE = {Proc. 7th Intern. Workshop on Experimental Algorithms (WEA)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Provincetown, USA}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5038}, YEAR = {2008}, PAGES = {208--219}, } @INPROCEEDINGS{Fleischer-FUN-1999, AUTHOR = {Fleischer, Rudolf}, EDITOR = {Lodi, Elena and Pagli, Linda and Santoro, Nicola}, TITLE = {FUN with implementing algorithms}, BOOKTITLE = {Proceedings of the International Conference on FUN with Algorithms (FUN-98)}, PADDRESS = {Waterloo, Canada}, ADDRESS = {Elba, Italy}, PUBLISHER = {Carleton Scientific}, SERIES = {Proceedings in Informatics}, VOLUME = {4}, ISBN = {1-894145-03-8}, YEAR = {1999}, PAGES = {88--98}, ABSTRACT = {In this paper, I would like to argue -- based on my personal programming experience -- that implementing algorithms is FUN. Moreover, it can lead to a better understanding of the problem at hand, it can help to avoid embarrassing mistakes, and animated algorithms can be used in class as a tool for teaching.}, } @ARTICLE{Fleischer-Jung-Mehlhorn95, AUTHOR = {Fleischer, Rudolf and Jung, Hermann and Mehlhorn, Kurt}, JOURNAL = {Information and Computation}, TITLE = {A communication-randomness tradeoff for two-processor systems}, NUMBER = {2}, PUBLISHER = {Academic Press}, VOLUME = {116}, ISBN = {0890-5401}, YEAR = {1995}, PAGES = {155--161}, ABSTRACT = {We present a tight tradeoff between the expected communication complexity $\bar{C}$ (for a two-processor system) and the number $R$ of random bits used by any Las Vegas protocol for the list-nondisjointness function of two lists of $n$ numbers of $n$ bits each. This function evaluates to $1$ if and only if the two lists correspond in at least one position. We show a $\log(n^2/\bar{C})$ lower bound on the number of random bits used by any Las Vegas protocol, $\Omega(n)\le\bar{C}\le O(n^2)$. We also show that expected communication complexity $\bar{C}$, $\Omega(n\log n) \le\bar{C}\le O(n^2)$, can be achieved using no more than $\log(n^2/\bar{C}) + \lceil\log(2+\log(n^2/\bar{C}))\rceil+6$ random bits.", xxx-references = "STOC::AhoUY83, FOCS::CanettiG90, STOC::Furer87, STOC::HalstenbergR88, STOC::KrizancPU88, FOCS::LovaszS88, STOC::MehlhornS82, STOC::PapadimitriouS82, FOCS::Yao77, STOC::Yao79, FOCS::Yao83", references = "\cite{STOC::AhoUY1983} \cite{FOCS::CanettiG1990} \cite{STOC::Furer1987} \cite{STOC::HalstenbergR1988} \cite{STOC::KrizancPU1988} \cite{FOCS::LovaszS1988} \cite{STOC::MehlhornS1982} \cite{STOC::PapadimitriouS1982} \cite{FOCS::Yao1977} \cite{STOC::Yao1979} \cite{FOCS::Yao1983}}, } @INPROCEEDINGS{Fleischer1998bahncard, AUTHOR = {Fleischer, Rudolf}, EDITOR = {Hsu, Wen-Lian and Kao, Ming-Yang}, TITLE = {On the Bahncard problem}, BOOKTITLE = {Proceedings of the 4th International Conference on Computing and Combinatorics (COCOON-98)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Taipei, Taiwan, R.o.C.}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1449}, ISBN = {0302-9743}, YEAR = {1998}, PAGES = {65--74}, ABSTRACT = {In this paper, we generalize the Ski-Rental Problem to the Bahncard PRoblem which is an online problem of practical relevance for all travelers. The Bahncard is a railway pass of the Deutsche Bundesbahn (the German railway company) which entitles its holder to a 50% price reduction on nearly all train tickets. It costs 240 DM, and it is valid for 12 months. Similar bus or railway passes can be found in many other countries.}, } @PHDTHESIS{Fleischer1999, AUTHOR = {Fleischer, Rudolf}, TITLE = {{Effiziente und Online-Algorithmen}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Habilitation thesis}, YEAR = {1999}, } @ARTICLE{Fleischer96, AUTHOR = {Fleischer, Rudolf}, JOURNAL = {International Journal of Foundations of Computer Science}, TITLE = {A simple balanced search tree with {$O(1)$} worst-case update time}, ADDRESS = {Singapore}, NUMBER = {2}, PUBLISHER = {World Scientific}, VOLUME = {7}, ISBN = {0129-0541}, YEAR = {1996}, PAGES = {137--149}, } @INPROCEEDINGS{FleischerSkutella2003, AUTHOR = {Fleischer, Lisa and Skutella, Martin}, TITLE = {Minimum Cost Flows Over Time without Intermediate Storage}, BOOKTITLE = {Proceedings of the 14th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-03)}, ORGANIZATION = {Society of Industrial and Applied Mathematics}, PADDRESS = {New York, USA}, ADDRESS = {Baltimore, USA}, PUBLISHER = {ACM}, MONTH = {January}, ISBN = {0-89871-538-5}, YEAR = {2003}, PAGES = {66--75}, ABSTRACT = {Flows over time (also called dynamic flows) generalize standard network flows by introducing an element of time. They naturally model problems where travel and transmission are not instantaneous. Solving these problems raises issues that do not arise in standard network flows. One issue is the question of storage of flow at intermediate nodes. In most applications (such as, e.g., traffic routing, evacuation planning, telecommunications etc.), intermediate storage is limited, undesired, or prohibited. The minimum cost flow over time problem is NP-hard. In this paper we 1)~prove that the minimum cost flow over time never requires storage; 2)~provide the first approximation scheme for minimum cost flows over time that does not require storage; 3)~provide the first approximation scheme for minimum cost flows over time that meets hard cost constraints, while approximating only makespan. Our approach is based on a condensed variant of time-expanded networks. It also yields fast approximation schemes with simple solutions for the quickest multicommodity flow problem. Finally, using completely different techniques, we describe a very simple capacity scaling FPAS for the minimum cost flow over time problem when costs are proportional to transit times. The algorithm builds upon our observation about the structure of optimal solutions to this problem: they are universally quickest flows. Again, the FPAS does not use intermediate node storage. In contrast to the preceding algorithms that use a time-expanded network, this FPAS runs directly on the original network.}, } @ARTICLE{Fleischer_dectrees_1999, AUTHOR = {Fleischer, Rudolf}, JOURNAL = {Information and computation}, TITLE = {Decision trees: old and new results}, PUBLISHER = {Academic Press}, VOLUME = {152}, YEAR = {1999}, PAGES = {44--61}, ABSTRACT = {In this paper, we prove two general lower bounds for algebraic decision trees which test membership in a set $S\subseteq R^n$ which is defined by linear inequalities. Let $rank(S)$ be the maximal dimension of a linear subspace contained in the closure of $S$ {in the Euclidean topology}. First we show that any decision tree for $S$ which uses products of linear functions (we call such functions {\em mlf-functions}) must have depth at least $n-rank(S)$. This solves an open question raised by A.C.~Yao and can be used to show that mlf-functions are not really more powerful than simple comparisons between the input variables when computing the largest $k$ out of $n$ elements. Yao proved this result in the special case when products of at most two linear functions are allowed. Out proof also shows that any decision tree for this problem must have exponential size. Using the same methods, we can give an alternative proof of Rabin's Theorem, namely that the depth of any decision tree for $S$ using arbitrary analytic functions is at least $n-rank(S)$.}, } @INPROCEEDINGS{FLN2007, AUTHOR = {Funke, Stefan and Laue, S{\"o}ren and Naujoks, Rouven}, EDITOR = {Aspnes, James and Scheideler, Christian and Arora, Anish and Madden, Samuel}, TITLE = {Minimum Energy Broadcast with Few Senders}, BOOKTITLE = {Distributed Computing in Sensor Systems : Third IEEE International Conference, DCOSS 2007}, PADDRESS = {Berlin, Germany}, ADDRESS = {Santa Fe, USA}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4549}, ISBN = {3-540-73089-3}, YEAR = {2007}, PAGES = {404--416}, } @INPROCEEDINGS{FLNL2008, AUTHOR = {Funke, Stefan and Laue, S{\"o}ren and Naujoks, Rouven and Lotker, Zvi}, EDITOR = {Sotiris E. Nikoletseas and Bogdan S. Chlebus and David B. Johnson and Bhaskar Krishnamachari}, TITLE = {Power Assignment Problems in Wireless Communication: Covering Points by Disks, Reaching few Receivers Quickly, and Energy-Efficient Travelling Salesman Tours}, BOOKTITLE = {Distributed Computing in Sensor Systems, 4th {IEEE} International Conference, {DCOSS} 2008}, PADDRESS = {Berlin, Germany}, ADDRESS = {Santorini Island, Greece}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5067}, ISBN = {3-540-73089-3}, YEAR = {2008}, PAGES = {282--295}, } @INPROCEEDINGS{fm-lalokfgc-00, AUTHOR = {Funke, Stefan and Mehlhorn, Kurt}, TITLE = {LOOK - a Lazy Object-Oriented Kernel for Geometric Computation}, BOOKTITLE = {Proceedings of the 16th Annual Symposium on Computational Geometry (SCG-00)}, ORGANIZATION = {Association of Computing Machinery (ACM)}, PADDRESS = {New York, USA}, ADDRESS = {Hong Kong, China}, PUBLISHER = {ACM}, MONTH = {June}, ISBN = {1-58113-224-7}, YEAR = {2000}, PAGES = {156--165}, } @ARTICLE{fm-look-2002, AUTHOR = {Funke, Stefan and Mehlhorn, Kurt}, JOURNAL = {Computational Geometry - Theory and Applications}, TITLE = {{LOOK} - {A} Lazy Object-Oriented Kernel for Geometric Computation}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {1-3}, PUBLISHER = {Elsevier}, MONTH = {April}, VOLUME = {22}, YEAR = {2002}, PAGES = {99--118}, } @INPROCEEDINGS{FM2007, AUTHOR = {Funke, Stefan and Milosavljevic, Nikola}, TITLE = {Network Sketching or: "How much Geometry hides in Connectivity? - Part II"}, BOOKTITLE = {Proceedings of the eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-07)}, PADDRESS = {Philadelphia, USA}, ADDRESS = {New Orleans, USA}, PUBLISHER = {SIAM}, MONTH = {January}, ISBN = {978-0-898716-24-5}, YEAR = {2007}, PAGES = {958--967}, } @INPROCEEDINGS{FM2007b, AUTHOR = {Funke, Stefan and Milosavljevic, Nikola}, TITLE = {Guaranteed-delivery Geographic Routing under Uncertain Node Locations}, BOOKTITLE = {IEEE INFOCOM 2007 : 26th IEEE International Conference on Computer Communications}, PADDRESS = {Piscataway, NJ, USA}, ADDRESS = {Anchorage, USA}, PUBLISHER = {IEEE}, ISBN = {1-424-41046-0}, YEAR = {2007}, PAGES = {1244--1252}, } @INPROCEEDINGS{FM97, AUTHOR = {Fialko, Sergej and Mutzel, Petra}, TITLE = {A new approximation algorithm for the planar augmentation problem}, BOOKTITLE = {Proceedings of the 9th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-98)}, ORGANIZATION = {ACM}, TYPE = {Extended Abstract}, PADDRESS = {New York, USA}, ADDRESS = {San Francisco, USA}, PUBLISHER = {ACM Press / SIAM}, YEAR = {1998}, PAGES = {260--269}, } @INPROCEEDINGS{FMMW2006, AUTHOR = {Funke, Stefan and Malamatos, Theocharis and Matijevic, Domagoj and Wolpert, Nicola}, EDITOR = {Rappaport, David}, TITLE = {(Approximate) Conic Nearest Neighbors and the induced Voronoi Diagram}, BOOKTITLE = {18th Canadian Conference on Computational Geometry}, TYPE = {Extended Abstract}, PADDRESS = {Kingston, Ontario, K7L 3N6, Canada}, ADDRESS = {Kingston, Canada}, PUBLISHER = {School of Computing, Queen's University}, YEAR = {2006}, PAGES = {23--26}, ABSTRACT = {For a given point set in Euclidean space we consider the problem of finding (approximate) nearest neighbors of a query point but restricting only to points that lie within a fixed cone with apex at the query point. Apart from being a rather natural question to ask, solutions to this problem have applications in surface reconstruction and dimension detection. We investigate the structure of the Voronoi diagram induced by this notion of proximity and present approximate and exact data structures for answering cone-restricted nearest neighbor queries. In particular we develop an approximate Voronoi diagram of size $O((n/\epsilon^d)\log (1/\epsilon))$ that can be used to answer cone-restricted nearest neighbor queries in $O(\log (n/\epsilon))$ time.}, } @INPROCEEDINGS{FMN1999, AUTHOR = {Funke, Stefan and Mehlhorn, Kurt and N{\"a}her, Stefan}, TITLE = {Structural Filtering: a Paradigm for Efficient and Exact Geometric Programs}, BOOKTITLE = {Abstracts for the 11th Canadian Conference on Computational Geometry (CCCG-99)}, PADDRESS = {Vancouver, Canada}, ADDRESS = {Vancouver, Canada}, PUBLISHER = {University of British Columbia}, MONTH = {August}, YEAR = {1999}, PAGES = {39--42}, } @INPROCEEDINGS{FMR2004, AUTHOR = {Funke, Stefan and Malamatos, Theocharis and Ray, Rahul}, TITLE = {Finding Planar Regions in a Terrain: In Practice and with a Guarantee}, BOOKTITLE = {Proceedings of the Twentieth Annual Symposium on Computational Geometry : (SCG'04)}, ORGANIZATION = {Association of Computing Machinery (ACM)}, PADDRESS = {New York, USA}, ADDRESS = {New York, USA}, PUBLISHER = {ACM}, YEAR = {2004}, PAGES = {96--105}, } @INPROCEEDINGS{FMR2004b, AUTHOR = {Funke, Stefan and Malamatos, Theocharis and Ray, Rahul}, TITLE = {Finding Planar Regions in a Terrain}, BOOKTITLE = {20th European Workshop on Computational Geometry (EWCG)}, ORGANIZATION = {Seville University}, PADDRESS = {Sevilla, Spain}, ADDRESS = {Sevilla, Spain}, PUBLISHER = {Seville University}, YEAR = {2004}, PAGES = {1--4}, } @INPROCEEDINGS{FMS2003, AUTHOR = {Funke, Stefan and Matijevic, Domagoj and Sanders, Peter}, EDITOR = {Di Battista, Giuseppe and Zwick, Uri}, TITLE = {Approximating Energy Efficient Paths in Wireless Multi-hop Networks}, BOOKTITLE = {Algorithms - ESA 2003: 11th Annual European Symposium}, PADDRESS = {Berlin, Germany}, ADDRESS = {Budapest, Hungary}, PUBLISHER = {Springer}, MONTH = {September}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {2832}, ISBN = {3-540-20064-9}, YEAR = {2003}, PAGES = {230--241}, ABSTRACT = {Given the positions of $n$ sites in a radio network we consider the problem of finding routes between any pair of sites that minimize energy consumption and do not use more than some constant number $k$ of hops. Known exact algorithms for this problem required $\Omega(n \log n)$ per query pair $(p,q)$. In this paper we relax the exactness requirement and only require approximate $(1+\epsilon)$ solutions which allows us to derive schemes which guarantee constant query time using linear space and $O(n\log n)$ preprocessing time. The dependence on $\epsilon$ is polynomial in $1/\epsilon$. One tool used might be of independent interest: For any pair of points $(p,q)\in P\subseteq\mathbb{Z}^2$ report in constant time the cluster pair $(A,B)$ representing $(p,q)$ in a well-separated pair decomposition of $P$.}, } @INPROCEEDINGS{FMS2004, AUTHOR = {Funke, Stefan and Matijevic, Domagoj and Sanders, Peter}, TITLE = {Constant Time Queries for Energy Efficient Paths in Multi-Hop Wireless Networks}, BOOKTITLE = {First International Workshop on Algorithms for Wireless and Mobile Networks}, PADDRESS = {Bologna, Italy}, ADDRESS = {Boston, USA}, PUBLISHER = {University of Bologna}, YEAR = {2004}, PAGES = {97--111}, ABSTRACT = {We investigate algorithms for computing energy efficient paths in ad-hoc radio networks. We demonstrate how advanced data structures from computational geometry can be employed to preprocess the position of radio stations in such a way that approximately energy optimal paths can be retrieved in constant time, i.e., independent of the network size. We put particular emphasis on actual implementations which demonstrate that large constant factors hidden in the theoretical analysis are not a big problem in practice.}, } @INPROCEEDINGS{FNPS02, AUTHOR = {Fotakis, Dimitris and Nikoletseas, Sotiris and Papadopoulou, Vicky and Spirakis, Paul G.}, EDITOR = {Kucera, Ludek}, TITLE = {Radiocolorings in Periodic Planar Graphs: PSPACE-Completeness and Efficient Approximations for the Optimal Range of Frequencies}, BOOKTITLE = {Graph-Theoretic Concepts in Computer Science : 28th International Workshop, WG 2002}, PADDRESS = {Berlin, Germany}, ADDRESS = {Ceský Krumlov, Czech Republic}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {2573}, ISBN = {3-540-00331-2}, YEAR = {2002}, PAGES = {223--234}, ABSTRACT = {The Frequency Assignment Problem (FAP) in radio networks is the problem of assigning frequencies to transmitters exploiting frequency reuse while keeping signal interference to acceptable levels. The FAP is usually modelled by variations of the graph coloring problem. The Radiocoloring (RC) of a graph $G(V, E)$ is an assignment function $\Phi : V \mapsto N$ such that $|\Phi(u) - \Phi(v)| \geq 2$, when $u, v$ are neighbors in $G$, and $|\Phi(u) - \Phi(v)| \geq 1$ when the distance of $u, v$ in $G$ is two. The range of frequencies used is called {\em span}. Here, we consider the optimization version of the Radiocoloring Problem (RCP) of finding a radiocoloring assignment of minimum span, called {\em min span RCP}. In this paper, we deal with a variation of RCP: that of satisfying frequency assignment requests with some {\em periodic} behavior. In this case, the interference graph is an (infinite) periodic graph. Infinite periodic graphs model finite networks that accept periodic (in time, e.g. daily) requests for frequency assignment. Alternatively, they may model very large networks produced by the repetition of a small graph. A {\em periodic graph $G$} is defined by an infinite two-way sequence of repetitions of the same finite graph $G_i(V_i, E_i)$. The edge set of $G$ is derived by connecting the vertices of each iteration $G_i$ to some of the vertices of the next iteration $G_{i+1}$, the same for all $G_i$. The model of periodic graphs considered here is similar to that of periodic graphs in Orlin [13], Marathe et al [10]. We focus on planar periodic graphs, because in many cases real networks are planar and also because of their independent mathematical interest. We give two basic results: - We prove that the min span RCP is PSPACE-complete for periodic planar graphs. - We provide an $O(n(\Delta(G_i) + \sigma))$ time algorithm, (where $|V_i| = n$, $\Delta(G_i)$ is the maximum degree of the graph $G_i$ and $\sigma$ is the number of edges connecting each $G_i$ to $G_{i+1})$, which obtains a radiocoloring of a periodic planar graph G that {\em approximates the minimum span within a ratio which tends to 2 as $\Delta(G_i) + \sigma$ tends to infinity}.}, } @INPROCEEDINGS{FOCS::DietzfelbingerKMHRT1988, AUTHOR = {Dietzfelbinger, Martin and Karlin, Anna and Mehlhorn, Kurt and Meyer auf der Heide, Friedhelm and Rohnert, Hans and Tarjan, Robert E.}, TITLE = {Dynamic Perfect Hashing: Upper and Lower Bounds}, BOOKTITLE = {29th Annual Symposium on Foundations of Computer Science (FOCS 1988)}, PADDRESS = {Washington, USA}, ADDRESS = {White Plains, New York, USA}, PUBLISHER = {IEEE}, ISBN = {0-8186-0877-3}, YEAR = {1988}, PAGES = {524--531}, } @INPROCEEDINGS{FOCS::MehlhornNR1989, AUTHOR = {Mehlhorn, Kurt and N{\"a}her, Stefan and Rauch, Monika}, TITLE = {On the Complexity of a Game Related to the Dictionary Problem}, BOOKTITLE = {30th Annual Symposium on Foundations of Computer Science (FOCS 1989)}, PADDRESS = {Los Alamitos, USA}, ADDRESS = {Research Triangle Park, NC, USA}, PUBLISHER = {IEEE}, ISBN = {0-8186-1982-1}, YEAR = {1989}, PAGES = {546--548}, } @ARTICLE{FollertSchoemerSellenSmidThiel97, AUTHOR = {Follert, Frank and Sch{\"o}mer, Elmar and Sellen, J{\"u}rgen and Smid, Michiel and Thiel, Christian}, JOURNAL = {International Journal of Computational Geometry and Applications}, TITLE = {Computing the largest empty anchored cylinder, and related problems}, NUMBER = {6}, VOLUME = {7}, YEAR = {1997}, PAGES = {563--580}, } @INPROCEEDINGS{FominLokshtanovMisraPhilipSaurabh2011, AUTHOR = {Fomin, Fedor V. and Lokshtanov, Daniel and Misra, Neeldhara and Philip, Geevarghese and Saurabh, Saket}, EDITOR = {Schwentick, Thomas and D{\"u}rr, Christoph}, TITLE = {Hitting forbidden minors: Approximation and Kernelization}, BOOKTITLE = {28th International Symposium on Theoretical Aspects of Computer Science, STACS 2011, March 10-12, 2011, Dortmund, Germany}, PADDRESS = {Dagstuhl, Germany}, ADDRESS = {Dortmund, Germany}, PUBLISHER = {Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik}, SERIES = {Leibniz International Proceedings in Informatics}, VOLUME = {9}, ISBN = {978-3-939897-25-5}, DOI = {10.4230/LIPIcs.STACS.2011.189}, YEAR = {2011}, PAGES = {189--200}, ABSTRACT = {We study a general class of problems called $p$-\textsc{$\mathcal{F}$-Deletion} problems. In an $p$-\textsc{$\mathcal{F}$-Deletion} problem, we are asked whether a subset of at most $k$ vertices can be deleted from a graph $G$ such that the resulting graph does not contain as a minor any graph from the family ${\cal F}$ of forbidden minors. We obtain a number of algorithmic results on the $p$-\textsc{$\mathcal{F}$-Deletion} problem when $\mathcal{F}$ contains a planar graph. We give \begin{itemize} \item a linear vertex kernel on graphs excluding $t$-claw $K_{1,t}$, the star with $t$ leves, as an induced subgraph, where $t$ is a fixed integer. \item an approximation algorithm achieving an approximation ratio of $O(\log^{3/2} OPT)$, where $OPT$ is the size of an optimal solution on general undirected graphs. \end{itemize} Finally, we obtain polynomial kernels for the case when $\cal F$ only contains graph $\theta_c$ as a minor for a fixed integer $c$. The graph $\theta_c$ consists of two vertices connected by $c$ parallel edges. Even though this may appear to be a very restricted class of problems it already encompasses well-studied problems such as {\sc Vertex Cover}, {\sc Feedback Vertex Set} and \textsc{Diamond Hitting Set} . The generic kernelization algorithm is based on a non-trivial application of protrusion techniques, previously used only for problems on topological graph classes.}, } @INPROCEEDINGS{FominPhilipVillanger2011, AUTHOR = {Fomin, Fedor V. and Philip, Geevarghese and Villanger, Yngve}, EDITOR = {Chakraborty, Supratik and Kumar, Amit}, TITLE = {Minimum Fill-in of Sparse Graphs: Kernelization and Approximation}, BOOKTITLE = {IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, FSTTCS 2011, December 12-14, 2011, Mumbai, India}, PADDRESS = {Dagstuhl, Germany}, ADDRESS = {Mumbai, India}, PUBLISHER = {Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik}, SERIES = {Leibniz International Proceedings in Informatics}, VOLUME = {13}, ISBN = {978-3-939897-34-7}, DOI = {10.4230/LIPIcs.FSTTCS.2011.164}, YEAR = {2011}, PAGES = {164--175}, ABSTRACT = {The \textsc{Minimum Fill-in} problem is to decide if a graph can be triangulated by adding at most $k$ edges. The problem has important applications in numerical algebra, in particular in sparse matrix computations. We develop kernelization algorithms for the problem on several classes of sparse graphs. We obtain linear kernels on planar graphs, and kernels of size $O(k^{3/2})$ in graphs excluding some fixed graph as a minor and in graphs of bounded degeneracy. As a byproduct of our results, we obtain approximation algorithms with approximation ratios $O(\log{k})$ on planar graphs and $O(\sqrt{k}\log{k})$ on $H$-minor-free graphs. These results significantly improve the previously known kernelization and approximation results for \textsc{Minimum Fill-in} on sparse graphs.}, } @INPROCEEDINGS{FormalVerificationofCertifyingComputations, AUTHOR = {Alkassar, Eyad and B{\"o}hme, Sascha and Mehlhorn, Kurt and Rizkallah, Christine}, EDITOR = {Gopalakrishnan, Ganesh and Qadeer, Shaz}, TITLE = {Verification of Certifying Computations}, BOOKTITLE = {Computer Aided Verification : 23rd International Conference, CAV 2011}, PADDRESS = {Heidelberg}, ADDRESS = {Snowbird, USA}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6806}, ISBN = {978-3-642-22109-5}, DOI = {10.1007/978-3-642-22110-1_7}, YEAR = {2011}, PAGES = {67--82}, ABSTRACT = {Formal verification of complex algorithms is challenging. Verifying their implementations goes beyond the state of the art of current verification tools and proving their correctness usually involves non-trivial mathematical theorems. Certifying algorithms compute in addition to each output a witness certifying that the output is correct. A checker for such a witness is usually much simpler than the original algorithm -- yet it is all the user has to trust. Verification of checkers is feasible with current tools and leads to computations that can be completely trusted. In this paper we develop a framework to seamlessly verify certifying computations. The automatic verifier VCC is used for checking code correctness, and the interactive theorem prover Isabelle/HOL targets high-level mathematical properties of algorithms. We demonstrate the effectiveness of our approach by applying it to the verification of the algorithmic library LEDA.}, } @INPROCEEDINGS{FOSW08, AUTHOR = {Friedrich, Tobias and Oliveto, Pietro and Sudholt, Dirk and Witt, Carsten}, EDITOR = {Keijzer, Maarten}, TITLE = {Theoretical Analysis of Diversity Mechanisms for Global Exploration}, BOOKTITLE = {Proceedings of the 10th annual conference on Genetic and evolutionary computation (GECCO 2008)}, PADDRESS = {New York, USA}, ADDRESS = {Atlanta, USA}, PUBLISHER = {ACM}, ISBN = {978-1-60558-130-9}, DOI = {http://doi.acm.org/10.1145/1389095.1389276}, YEAR = {2008}, PAGES = {945--952}, } @INPROCEEDINGS{Fot03, AUTHOR = {Fotakis, Dimitris}, EDITOR = {Baeten, Jos C.M. and Lenstra, Jan Karel and Parrow, Joachim and Woeginger, Gerhard J.}, TITLE = {On the Competitive Ratio for Online Facility Location}, BOOKTITLE = {Automata, languages and programming : 30th International Colloquium, ICALP 2003}, ORGANIZATION = {European Association of Theoretical Computer Science (EATCS)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Eindhoven, The Netherlands}, PUBLISHER = {Springer}, MONTH = {June}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {2719}, ISBN = {3-540-40493-7}, YEAR = {2003}, PAGES = {637--652}, ABSTRACT = {We consider the problem of Online Facility Location, where demands arrive online and must be irrevocably assigned to an open facility upon arrival. The objective is to minimize the sum of facility and assignment costs. We prove that the competitive ratio for Online Facility Location is $\Theta(\frac{\log n}{\log\log n})$. On the negative side, we show that no randomized algorithm can achieve a competitive ratio better than $O(\frac{\log n}{\log\log n})$ against an oblivious adversary even if the demands lie on a line segment. On the positive side, we present a deterministic algorithm achieving a competitive ratio of $O(\frac{\log n}{\log\log n})$. The analysis is based on a hierarchical decomposition of the optimal facility locations such that each component either is relatively well-separated or has a relatively large diameter, and a potential function argument which distinguishes between the two kinds of components.}, } @INPROCEEDINGS{Fotakis2004a, AUTHOR = {Fotakis, Dimitris}, EDITOR = {Albers, Susanne and Radzik, Tomasz}, TITLE = {Incremental Algorithms for Facility Location and k-Median}, BOOKTITLE = {Algorithms – ESA 2004: 12th Annual European Symposium}, PADDRESS = {Berlin, Germany}, ADDRESS = {Bergen, Norway}, PUBLISHER = {Springer}, MONTH = {September}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {3221}, ISBN = {3-540-23025-4}, YEAR = {2004}, PAGES = {347--358}, ABSTRACT = {In the incremental versions of Facility Location and k-Median, the demand points arrive one at a time and the algorithm must maintain a good solution by either adding each new demand to an existing cluster or placing it in a new singleton cluster. The algorithm can also merge some of the existing clusters at any point in time. We present the first incremental algorithm for Facility Location with uniform facility costs which achieves a constant performance ratio and the first incremental algorithm for k-Median which achieves a constant performance ratio using O(k) medians.}, } @ARTICLE{Fountoulakis2007, AUTHOR = {Fountoulakis, Nikolaos and Reed, Bruce}, JOURNAL = {Probability Theory and Related Fields}, TITLE = {Faster Mixing and Small Bottlenecks}, PUBLISHER = {Springer}, VOLUME = {137}, YEAR = {2007}, PAGES = {475--486}, } @ARTICLE{Fountoulakis2008, AUTHOR = {Fountoulakis, Nikolaos and Reed, Bruce}, JOURNAL = {Random Structures and Algorithms}, TITLE = {The evolution of the mixing rate of a simple random walk on the giant component of a random graph}, PUBLISHER = {Wiley Interscience}, VOLUME = {33}, YEAR = {2008}, PAGES = {68--86}, } @ARTICLE{Fountoulakis2008a, AUTHOR = {Cooley, Oliver and Fountoulakis, Nikolaos and K{\"u}hn, Daniela and Osthus, Deryk}, JOURNAL = {Journal of Combinatorial Theory B}, TITLE = {3-Uniform hypergraphs of bounded degree have linear Ramsey numbers}, PUBLISHER = {Elsevier}, VOLUME = {98}, YEAR = {2008}, PAGES = {484--505}, } @ARTICLE{Fountoulakis2008b, AUTHOR = {Fountoulakis, Nikolaos and K{\"u}hn, Daniela and Osthus, Deryk}, JOURNAL = {Random Structures and Algorithms}, TITLE = {The order of the largest complete minor in a random graph}, PUBLISHER = {Wiley Interscience}, VOLUME = {33}, YEAR = {2008}, PAGES = {127--141}, } @ARTICLE{Fountoulakis2009, AUTHOR = {Cooley, Oliver and Fountoulakis, Nikolaos and K{\"u}hn, Daniela and Osthus, Deryk}, JOURNAL = {Combinatorica}, TITLE = {Embeddings and Ramsey numbers of sparse k-uniform hypergraphs}, ADDRESS = {New York, NY}, NUMBER = {3}, PUBLISHER = {Springer}, VOLUME = {29}, ISBN = {0209-9683}, DOI = {10.1007/s00493-009-2356-y}, YEAR = {2009}, PAGES = {263--297}, NOTE = {to appear}, } @ARTICLE{Fountoulakis2009a, AUTHOR = {Fountoulakis, Nikolaos}, JOURNAL = {Internet Mathematics}, TITLE = {Percolation on sparse random graphs with given degree sequence}, ADDRESS = {Natick, MA}, NUMBER = {4}, PUBLISHER = {A. K. Peters}, VOLUME = {4}, ISBN = {1542-7951}, YEAR = {2007}, PAGES = {329--356}, NOTE = {to appear}, } @ARTICLE{Fountoulakis2009b, AUTHOR = {Fountoulakis, Nikolaos and K{\"u}hn, Daniela and Osthus, Deryk}, JOURNAL = {Random Structures and Algorithms}, TITLE = {Minors in random regular graphs}, PUBLISHER = {Wiley Interscience}, VOLUME = {35}, YEAR = {2009}, PAGES = {444--463}, } @ARTICLE{Fountoulakis2011, AUTHOR = {Fountoulakis, Nikolaos and Panagiotou, Konstantinos}, JOURNAL = {Combinatorics, Probability \& Computing}, TITLE = {3-Connected Cores In Random Planar Graphs}, ADDRESS = {Cambridge, Mass.}, NUMBER = {3}, PUBLISHER = {Cambridge University Press}, VOLUME = {20}, ISBN = {0963-5483}, DOI = {10.1017/S0963548310000532}, YEAR = {2011}, PAGES = {381--412}, } @INPROCEEDINGS{FountoulakisHuberPanagiotouBrief2010, AUTHOR = {Fountoulakis, Nikolaos and Huber, Anna and Panagiotou, Konstantinos}, TITLE = {The Speed of Broadcasting in Random Networks: Density Does Not Matter}, BOOKTITLE = {23rd International Symposium on Distributed Computing (DISC '09)}, PADDRESS = {New York, USA}, ADDRESS = {Elche/Elx, Spain}, PUBLISHER = {Springer}, YEAR = {2009}, PAGES = {529--530}, } @INPROCEEDINGS{FountoulakisKhoslaPanagiotou2010, AUTHOR = {Fountoulakis, Nikolaos and Khosla, Megha and Panagiotou, Konstantinos}, EDITOR = {Randall, Dana}, TITLE = {The Multiple-orientability Thresholds for Random Hypergraphs}, BOOKTITLE = {Proceedings of the Twenty-Second Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2011)}, PADDRESS = {Philadelphia, Pa.}, ADDRESS = {San Francisco, CA}, PUBLISHER = {SIAM}, MONTH = {January}, YEAR = {2011}, PAGES = {1222--1236}, } @INPROCEEDINGS{FountoulakisPS12, AUTHOR = {Fountoulakis, Nikolaos and Panagiotou, Konstantinos and Sauerwald, Thomas}, EDITOR = {Rabani, Yuval}, TITLE = {Ultra-fast rumor spreading in social networks}, BOOKTITLE = {Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-12)}, PADDRESS = {Philadelphia, PA}, ADDRESS = {Kyoto, Japan}, PUBLISHER = {SIAM}, ISBN = {978-1-611972-11-5}, YEAR = {2012}, PAGES = {1642--1660}, } @PHDTHESIS{FouzDiss2012, AUTHOR = {Fouz, Mahmoud}, TITLE = {Randomized Rumor Spreading in Social Networks \& Complete Graphs}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Doctoral dissertation}, ADDRESS = {Saarbr{\"u}cken}, PUBLISHER = {Universit{\"a}t des Saarlandes}, MONTH = {July}, YEAR = {2012}, PAGES = {II,114p.}, } @ARTICLE{FP12RSA, AUTHOR = {Fountoulakis, Nikolaos and Panagiotou, Konstantinos}, JOURNAL = {Random Structures and Algorithms}, TITLE = {Tight Load Thresholds for Cuckoo Hashing}, ADDRESS = {Chichester}, NUMBER = {3}, PUBLISHER = {Wiley}, VOLUME = {41}, DOI = {10.1002/rsa.20426}, YEAR = {2012}, PAGES = {306--333}, } @INPROCEEDINGS{FPIcalp2010, AUTHOR = {Fountoulakis, Nikolaos and Panagiotou, Konstantinos}, EDITOR = {Abramsky, Samson and Gavoille, Cyril and Kirchner, Claude and Meyer auf der Heide, Friedhelm and Spirakis, Paul G.}, TITLE = {Orientability of random hypergraphs and the power of multiple choices}, BOOKTITLE = {Automata, Languages and Programming : 37th International Colloquium, ICALP 2010. - Pt. 1}, PADDRESS = {Berlin}, ADDRESS = {Bordeaux, France}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6198}, ISBN = {978-3-642-14164-5}, DOI = {10.1007/978-3-642-14165-2_30}, YEAR = {2010}, PAGES = {348--359}, } @INPROCEEDINGS{FPRandom10, AUTHOR = {Fountoulakis, Nikolaos and Panagiotou, Konstantinos}, EDITOR = {Serna, Maria and Shaltiel, Ronen and Jansen, Klaus and Rolim, Jos{\'e}}, TITLE = {Rumor spreading on random regular graphs and expanders}, BOOKTITLE = {Approximation, Randomization, and Combinatorial Optimization : Algorithms and Techniques ; 13th Internationa lWorkshop, APPROX 2010 and 14th International Workshop, RANDOM 2010}, PADDRESS = {Berlin}, ADDRESS = {Barcelona, Spain}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6302}, ISBN = {978-3-642-15368-6}, DOI = {10.1007/978-3-642-15369-3_42}, YEAR = {2010}, PAGES = {560--573}, } @INPROCEEDINGS{FPSS03, AUTHOR = {Fotakis, Dimitris and Pagh, Rasmus and Sanders, Peter and Spirakis, Paul G.}, EDITOR = {Alt, Helmut and Habib, Michel}, TITLE = {Space Efficient Hash Tables with Worst Case Constant Access Time}, BOOKTITLE = {Proceedings of the 20th Annual Symposium on Theoretical Aspects of Computer Science (STACS 2003)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Berlin, Germany}, PUBLISHER = {Springer}, MONTH = {February}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {2607}, ISBN = {3-540-00623-0}, YEAR = {2003}, PAGES = {271--282}, ABSTRACT = {We generalize Cuckoo Hashing \cite{PagRod01} to \emph{$d$-ary Cuckoo Hashing} and show how this yields a simple hash table data structure that stores $n$ elements in $(1+\epsilon)\,n$ memory cells, for any constant $\epsilon > 0$. Assuming uniform hashing, accessing or deleting table entries takes at most $d = O(\ln\frac{1}{\epsilon})$ probes and the expected amortized insertion time is constant. This is the first dictionary that has worst case constant access time and expected constant update time, works with $(1+\epsilon)\,n$ space, and supports satellite information. Experiments indicate that $d=4$ choices suffice for $\epsilon \approx 0.03$. We also describe a hash table data structure using explicit constant time hash functions, using at most $d= O(\ln^2\frac{1}{\epsilon})$ probes in the worst case. A corollary is an expected linear time algorithm for finding maximum cardinality matchings in a rather natural model of sparse random bipartite graphs. }, } @ARTICLE{FPSSICOMP2013, AUTHOR = {Fountoulakis, Nikolaos and Panagiotou, Konstantinos}, JOURNAL = {SIAM Journal on Computing}, TITLE = {On the Insertion Time of Cuckoo Hashing}, YEAR = {2013}, NOTE = {Accepted for publication.}, } @INPROCEEDINGS{fr-rcwcae-01, AUTHOR = {Funke, Stefan and Ramos, Edgar A.}, TITLE = {Reconstructing a Collection of Curves with Corners and Endpoints}, BOOKTITLE = {Proceedings of the 12th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-01)}, ORGANIZATION = {Association of Computing Machinery (ACM); Society for Industrial and Applied Mathematics (SIAM)}, PADDRESS = {New York, USA}, ADDRESS = {Washington DC, USA}, PUBLISHER = {ACM}, MONTH = {January}, ISBN = {0-89871-490-7}, YEAR = {2001}, PAGES = {344--353}, } @INPROCEEDINGS{fr-ssrinlt-02, AUTHOR = {Funke, Stefan and Ramos, Edgar A.}, TITLE = {Smooth-Surface Reconstruction in Near-Linear Time}, BOOKTITLE = {Proceedings of the Thirteenth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-02)}, ORGANIZATION = {Association of Computing Machinery (ACM); Society for Industrial and Applied Mathematics (SIAM)}, PADDRESS = {New York, USA}, ADDRESS = {San Francisco, USA}, PUBLISHER = {ACM}, MONTH = {January}, ISBN = {0-89871-513-X}, YEAR = {2002}, PAGES = {781--790}, } @ARTICLE{FredericksonSolis-Oba98, AUTHOR = {Frederickson, Greg N. and Solis-Oba, Roberto}, JOURNAL = {Combinatorica}, TITLE = {Algorithms for Measuring Perturbability in Matroid Optimization}, NUMBER = {4}, VOLUME = {18}, ISBN = {0209-9683}, YEAR = {1998}, PAGES = {503--518}, } @ARTICLE{FredmanKhachiyan96, AUTHOR = {Fredman, Michael and Khachiyan, Leonid}, JOURNAL = {J. Algorithms}, TITLE = {On the Complexity of Dualization of Monotone Disjunctive Normal Forms}, NUMBER = {3}, VOLUME = {21}, YEAR = {1996}, PAGES = {618--628}, } @MASTERSTHESIS{Friedrich2005, AUTHOR = {Friedrich, Tobias}, TITLE = {Deterministic Random Walks on Infinite Grids}, SCHOOL = {Friedrich-Schiller-Universit{\"a}t Jena}, TYPE = {Master's thesis}, MONTH = {December}, YEAR = {2005}, NOTE = {Mathematik-Diplomarbeit, eingereicht an der Friedrich-Schiller-Universit{\"a}t Jena}, ABSTRACT = {The rotor-router model is a simple deterministic analogue of random walk invented by Jim Propp. Instead of distributing chips to randomly chosen neighbors, it serves the neighbors in a fixed order. This thesis investigates how well this process simulates a random walk on an infinite two-dimensional grid. Independent of the starting configuration, at each time and on each vertex, the number of chips on this vertex deviates from the expected number of chips in the random walk model by at most a constant $c$. It is proved that $7.2 < c < 11.8$ in general. Surprisingly, these bounds depend on the order in which the neighbors are served. It is also shown that in a generalized setting, where one just requires that no neighbor gets more than $\Delta$ chips more than another, there is also such a constant $c'$ with $7.7\Delta < c' < 26.9\Delta$.}, } @INPROCEEDINGS{Friedrich2009, AUTHOR = {Friedrich, Tobias and Gairing, Martin and Sauerwald, Thomas}, EDITOR = {Charikar, Moses}, TITLE = {Quasirandom Load Balancing}, BOOKTITLE = {21st Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2010)}, PADDRESS = {Philadelphia, Pa.}, ADDRESS = {Austin, Texas}, PUBLISHER = {SIAM}, ISBN = {978-0-898716-98-6}, YEAR = {2010}, PAGES = {1620--1629}, } @ARTICLE{FriedrichDAM2011, AUTHOR = {Friedrich, Tobias and Hebbinghaus, Nils}, JOURNAL = {Discrete Applied Mathematics}, TITLE = {Average update times for fully-dynamic all-pairs shortest paths}, ADDRESS = {Amsterdam}, NUMBER = {16}, PUBLISHER = {Elsevier}, VOLUME = {159}, ISBN = {0166-218X}, DOI = {10.1016/j.dam.2011.02.007}, YEAR = {2011}, PAGES = {1751--1758}, } @ARTICLE{FriedrichGS2012, AUTHOR = {Friedrich, Tobias and Gairing, Martin and Sauerwald, Thomas}, JOURNAL = {SIAM Journal on Computing}, TITLE = {Quasirandom Load Balancing}, ADDRESS = {Philadelphia, PA}, NUMBER = {4}, PUBLISHER = {SIAM}, VOLUME = {41}, DOI = {/10.1137/100799216}, YEAR = {2012}, PAGES = {747--771}, } @ARTICLE{FriedrichKN2011, AUTHOR = {Friedrich, Tobias and Kroeger, Trent and Neumann, Frank}, JOURNAL = {International Journal of Machine Learning and Cybernetics}, TITLE = {Weighted preferences in evolutionary multi-objective optimization}, ADDRESS = {New York, NY}, PUBLISHER = {Springer}, VOLUME = {Online First}, ISBN = {1868-808X}, DOI = {10.1007/s13042-012-0083-y}, YEAR = {2012}, PAGES = {1--10}, } @ARTICLE{FriedrichOSW2009, AUTHOR = {Friedrich, Tobias and Oliveto, Pietro and Sudholt, Dirk and Witt, Carsten}, JOURNAL = {Evolutionary Computation}, TITLE = {Analysis of Diversity-Preserving Mechanisms for Global Exploration}, ADDRESS = {Cambridge, MA}, NUMBER = {4}, PUBLISHER = {MIT Press}, VOLUME = {17}, ISBN = {1063-6560}, DOI = {10.1162/evco.2009.17.4.17401}, YEAR = {2009}, PAGES = {455--476}, } @PHDTHESIS{FriedrichPhD2007, AUTHOR = {Friedrich, Tobias}, TITLE = {Use and Avoidance of Randomness}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Doctoral dissertation}, MONTH = {December}, YEAR = {2007}, ABSTRACT = {Randomness is a crucial component in the design and analysis of many efficient algorithms. This thesis covers three aspects of randomness in computer science. In the first chapter we examine a deterministic analogue to the random walk and prove that it resembles the random walk closely on a two-dimensional grid, but not on regular trees. We also propose and analyse a quasirandom analogue to the broadcasting model for disseminating information in networks and show that it achieves similar or better broadcasting times with a greatly reduced use of random bits. In the second chapter we present the first average-case analysis of three different algorithms for maintaining a topological ordering of the nodes of a directed acyclic graph under dynamic updates. We prove an expected runtime which is significantly less than the best known worst-case bound for this problem. We finish with a third chapter that deals with randomized search heuristics. We examine the impact of different diversity mechanisms on the runtime of a single-objective evolutionary algorithm. We also show how this can exponentially slow down evolutionary algorithms for multi-objective problems.}, } @INPROCEEDINGS{FriedrichRGG2010, AUTHOR = {Bradonji{\'c}, Milan and Els{\"a}sser, Robert and Friedrich, Tobias and Sauerwald, Thomas and Stauffer, Alexandre}, EDITOR = {Charikar, Moses}, TITLE = {Efficient Broadcast on Random Geometric Graphs}, BOOKTITLE = {Proceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2010)}, PADDRESS = {Philadelphia, PA}, ADDRESS = {Austin, Texas}, PUBLISHER = {SIAM}, ISBN = {978-0-898716-98-6}, YEAR = {2010}, PAGES = {1412--1421}, } @ARTICLE{FriedrichRSA2011, AUTHOR = {Friedrich, Tobias and Sauerwald, Thomas and Vilenchik, Dan}, JOURNAL = {Random Structures \& Algorithms}, TITLE = {Smoothed analysis of balancing networks}, ADDRESS = {Chichester}, NUMBER = {1}, PUBLISHER = {Wiley}, VOLUME = {39}, ISBN = {1042-9832}, DOI = {DOI: 10.1002/rsa.20341}, YEAR = {2011}, PAGES = {115--138}, } @INPROCEEDINGS{FriedrichSauerwald2010, AUTHOR = {Friedrich, Tobias and Sauerwald, Thomas}, EDITOR = {Thai, My T. and Sahni, Sartaj}, TITLE = {The Cover Time of Deterministic Random Walks}, BOOKTITLE = {Computing and Combinatorics : 16th Annual International Conference, COCOON 2010}, PADDRESS = {Berlin}, ADDRESS = {Nha Trang, Vietnam}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6196}, ISBN = {978-3-642-14030-3}, DOI = {10.1007/978-3-642-14031-0_16}, YEAR = {2010}, PAGES = {130--139}, } @ARTICLE{FriedrichSauerwald2010EJC, AUTHOR = {Friedrich, Tobias and Sauerwald, Thomas}, JOURNAL = {The Electronic Journal of Combinatorics}, TITLE = {The Cover Time of Deterministic Random Walks}, ADDRESS = {Philadelphia, PA}, NUMBER = {1}, PUBLISHER = {University of Pennsylvania}, MONTH = {December}, VOLUME = {17}, YEAR = {2010}, PAGES = {R167,1--R167,30}, } @INPROCEEDINGS{FriedrichSauerwaldVilenchik09, AUTHOR = {Friedrich, Tobias and Sauerwald, Thomas and Vilenchik, Dan}, EDITOR = {Albers, Susanne and Marchetti-Spaccamela, Alberto and Matias, Yossi and Nikoletseas, Sotiris and Thomas, Wolfgang}, TITLE = {Smoothed Analysis of Balancing Networks}, BOOKTITLE = {Automata, Languages and Programming : 36th International Colloquium, ICALP 2009}, PADDRESS = {Berlin, Germany}, ADDRESS = {Rhodes, Greece}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5556}, ISBN = {978-3-642-02929-5}, DOI = {10.1007/978-3-642-02930-1_39}, YEAR = {2009}, PAGES = {472--483}, } @INPROCEEDINGS{FriedrichSS11, AUTHOR = {Friedrich, Tobias and Sauerwald, Thomas and Stauffer, Alexandre}, EDITOR = {Asano, Takao and Nakano, Shin-Ichi and Okamoto, Yoshio and Watanabe, Osamu}, TITLE = {Diameter and Broadcast Time of Random Geometric Graphs in Arbitrary Dimensions}, BOOKTITLE = {22nd International Symposium on Algorithms and Computation (ISAAC-11)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Yokohama, Japan}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {7074}, YEAR = {2011}, PAGES = {190--199}, } @ARTICLE{FriedrichTCS2011, AUTHOR = {Friedrich, Tobias and Horoba, Christian and Neumann, Frank}, JOURNAL = {Theoretical Computer Science}, TITLE = {Illustration of fairness in evolutionary multi-objective optimization}, ADDRESS = {Amsterdam}, NUMBER = {17}, PUBLISHER = {Elsevier}, VOLUME = {412}, ISBN = {0304-3975}, DOI = {10.1016/j.tcs.2010.09.023}, YEAR = {2011}, PAGES = {1546--1556}, } @MASTERSTHESIS{Fries2000, AUTHOR = {Fries, Markus}, TITLE = {Implementation of a Dynamic Convex Hull Algorithm in Arbitrary Dimension}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {November}, YEAR = {2000}, } @MASTERSTHESIS{FriesDipl01, AUTHOR = {Fries, Markus}, TITLE = {Implementation of a Dynamic Convex Hall Algorithm in Arbitrary Dimension}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {January}, YEAR = {2001}, } @ARTICLE{FrietalECJ2009, AUTHOR = {Friedrich, Tobias and He, Jun and Hebbinghaus, Nils and Neumann, Frank and Witt, Carsten}, JOURNAL = {Evolutionary Computation,}, TITLE = {Analyses of Simple Hybrid Algorithms for the Vertex Cover Problem}, ADDRESS = {Cambridge, MA}, NUMBER = {1}, PUBLISHER = {MIT Press}, VOLUME = {17}, ISBN = {1063-6560}, DOI = {10.1162/evco.2009.17.1.3}, YEAR = {2009}, PAGES = {3--19}, } @INPROCEEDINGS{Frigioni-et-al-98, AUTHOR = {Frigioni, Daniele and Miller, Tobias and Nanni, Umberto and Pasqualone, Giulio and Sch{\"a}fer, Guido and Zaroliagis, Christos}, EDITOR = {Bilardi, Gianfranco and Italiano, Giuseppe F. and Pietracaprina, Andrea and Pucci, Geppino}, TITLE = {An experimental study of dynamic algorithms for directed graphs}, BOOKTITLE = {Proceedings of the 6th Annual European Symposium on Algorithms (ESA-98)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Venice, Italy}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1461}, YEAR = {1998}, PAGES = {368--380}, } @ARTICLE{FriHebNeuTCS2009, AUTHOR = {Friedrich, Tobias and Hebbinghaus, Nils and Neumann, Frank}, JOURNAL = {Theoretical Computer Science}, TITLE = {Comparison of Simple Diversity Mechanisms on Plateau Functions}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {26}, PUBLISHER = {Elsevier}, VOLUME = {410}, ISBN = {0304-3975}, DOI = {10.1016/j.tcs.2008.08.021}, YEAR = {2009}, PAGES = {2455--2462}, } @INPROCEEDINGS{FriHorNeuGECCO2009, AUTHOR = {Friedrich, Tobias and Horoba, Christian and Neumann, Frank}, EDITOR = {Raidl, G{\"u}nther and Rothlauf, Franz}, TITLE = {Multiplicative Approximations and the Hypervolume Indicator}, BOOKTITLE = {Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation (GECCO 2009)}, PADDRESS = {New York, USA}, ADDRESS = {Montreal, Canada}, PUBLISHER = {ACM}, ISBN = {978-1-60558-325-9}, DOI = {10.1145/1569901.1569981}, YEAR = {2009}, PAGES = {571--578}, NOTE = {Best Paper Award in the track "Evolutionary Multiobjective Optimization"}, } @INPROCEEDINGS{FriHorNeuPPSN2008, AUTHOR = {Friedrich, Tobias and Horoba, Christian and Neumann, Frank}, EDITOR = {Rudolph, G{\"u}nter and Jansen, Thomas and Lucas, Simon M. and Poloni, Carlo and Beume, Nicola}, TITLE = {Runtime Analyses for Using Fairness in Evolutionary Multi-Objective Optimization}, BOOKTITLE = {Parallel Problem Solving from Nature (PPSN X)}, PADDRESS = {Berlin}, ADDRESS = {Dortmund, Germany}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5199}, ISBN = {978-3-540-87699-1}, DOI = {10.1007/978-3-540-87700-4_67}, YEAR = {2008}, PAGES = {671--680}, } @INPROCEEDINGS{FriNeuCEC2008, AUTHOR = {Friedrich, Tobias and Neumann, Frank}, TITLE = {When to Use Bit-wise Neutrality}, BOOKTITLE = {IEEE Congress on Evolutionary Computation 2008}, PADDRESS = {Vancouver, CA}, ADDRESS = {Hong Kong}, PUBLISHER = {IEEE}, YEAR = {2008}, PAGES = {997--1003}, } @ARTICLE{FriNeuNat2009, AUTHOR = {Friedrich, Tobias and Neumann, Frank}, JOURNAL = {Natural Computing}, TITLE = {When to Use Bit-Wise Neutrality}, ADDRESS = {New York, NY}, NUMBER = {1}, PUBLISHER = {Springer}, VOLUME = {9}, ISBN = {1567-7818}, DOI = {10.1007/s11047-008-9106-8}, YEAR = {2010}, PAGES = {283 -- 294}, NOTE = {To appear}, } @ARTICLE{FroylandKMDW08, AUTHOR = {Froyland, Gary and Koch, Thorsten and Megow, Nicole and Duane, Emily and Wren, Howard}, JOURNAL = {OR Spectrum}, TITLE = {Optimizing the Landside Operation of a Container Terminal}, NUMBER = {1}, MONTH = {January}, VOLUME = {30}, YEAR = {2008}, PAGES = {53--75}, } @INPROCEEDINGS{fs-rsm-01, AUTHOR = {Fuhrmann, Artur and Sch{\"o}mer, Elmar}, TITLE = {A General Method for Computing the Reachable Space of Mechanisms}, BOOKTITLE = {Proceedings of the 2001 ASME Design Engineering Technical Conferences and Computers and Information in Engineering Conference. - Vol. 2, 27th Design Automation Conference (DETC'01)}, PADDRESS = {New York, USA}, ADDRESS = {Pittsburgh, Pennsylvania}, PUBLISHER = {American Society of Mechanical Engineers}, ISBN = {0791835316}, YEAR = {2001}, PAGES = {DAC--21057}, } @INPROCEEDINGS{FS09, AUTHOR = {Friedrich, Tobias and Sauerwald, Thomas}, TITLE = {Near-Perfect Load Balancing by Randomized Rounding}, BOOKTITLE = {STOC09 : Proceedings of the 2009 ACM International Symposium on Theory of Computing}, PADDRESS = {New York, NY}, ADDRESS = {Bethesda, Maryland, USA}, PUBLISHER = {ACM}, ISBN = {978-1-60558-613-7}, DOI = {10.1145/1536414.1536433}, YEAR = {2009}, PAGES = {121--130}, } @ARTICLE{FS2002a, AUTHOR = {Fotakis, Dimitris and Spirakis, Paul G.}, JOURNAL = {Algorithmica}, TITLE = {Minimum Congestion Redundant Assignments to Tolerate Random Faults}, ADDRESS = {New York, USA}, NUMBER = {3}, PUBLISHER = {Springer}, VOLUME = {32}, ISBN = {0178-4617}, YEAR = {2002}, PAGES = {396--422}, ABSTRACT = {We consider the problem of computing minimum congestion, fault-tolerant, redundant assignments of messages to faulty, parallel delivery channels. In particular, we are given a set $K$ of faulty channels, each having an integer capacity $c_i$ and failing independently with probability $f_i$. We are also given a set $M$ of messages to be delivered over $K$, and a fault-tolerance constraint $(1-\epsilon)$, and we seek a redundant assignment $\phi$; that minimizes congestion ${\sf Cong}(\phi)$, i.e. the maximum channel load, subject to the constraint that, with probability no less than $(1-\epsilon)$, all the messages have a copy on at least one active channel. We present a polynomial-time 4-approximation algorithm for identical capacity channels and arbitrary message sizes, and a $2 \lceil \ln(|K|/\epsilon)/\ln(1/f_{{\rm max}}) \rceil$-approximation algorithm for related capacity channels and unit size messages. Both algorithms are based on computing a collection $\{K_1, \ldots, K_\nu\}$ of disjoint channel subsets such that, with probability no less than (1-\epsilon), at least one channel is active in each subset. The objective is to maximize the sum of the minimum subset capacities. Since the exact version of this problem is NP-complete, we provide a 2-approximation algorithm for identical capacities, and a polynomial-time $(8+{\rm o}(1))$-approximation algorithm for arbitrary capacities.}, } @INPROCEEDINGS{FuGui2006, AUTHOR = {Funke, Stefan and Guibas, Leonidas and Nguyen, An and Wang, Yusu}, EDITOR = {Gibbons, Phillip B. and Abdelzaher, Tarek F. and Aspnes, James and Rao, Ramesh}, TITLE = {Distance-Sensitive Information Brokerage in Sensor Networks}, BOOKTITLE = {Distributed Computing in Sensor Systems, Second IEEE International Conference, DCOSS 2006}, ORGANIZATION = {IEEE}, PADDRESS = {Berlin, Germany}, ADDRESS = {San Francisco, USA}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4026}, ISBN = {978-3-540-35227-3}, YEAR = {2006}, PAGES = {234--251}, ABSTRACT = {In a sensor network information from multiple nodes must usually be aggregated in order to accomplish a certain task. A natural way to view this information gathering is in terms of interactions between nodes that are producers of information, e.g., those that have collected data, detected events, etc., and nodes that are consumers of information, i.e., nodes that seek data or events of certain types. Our overall goal in this paper is to construct efficient schemes allowing consumer and producer nodes to discover each other so that the desired information can be delivered quickly to those who seek it. Here, efficiency means both limiting the redundancy of where producer information is stored, as well as bounding the consumer query times. We introduce the notion of distance-sensitive information brokerage and provide schemes for efficiently bringing together information producers and consumers at a cost proportional to the separation between them — even though neither the consumers nor the producers know about each other beforehand. Our brokerage scheme is generic and can be implemented on top of several hierarchical routing schemes that have been proposed in the past, provided that they are augmented with certain key sideway links. For such augmented hierarchical routing schemes we provide a rigorous theoretical performance analysis, which further allows us to prove worst case query times and storage requirements for our information brokerage scheme. Experimental results demonstrate that the practical performance of the proposed approaches far exceeds their theoretical (worst-case) bounds. The presented algorithms rely purely on the topology of the communication graph of the sensor network and do not require any geographic location information.}, } @INPROCEEDINGS{Funke1998, AUTHOR = {Burnikel, Christoph and Funke, Stefan and Seel, Michael}, TITLE = {Exact Geometric Predicates using Cascaded Computation}, BOOKTITLE = {Proceedings of the 14th International Annual ACM Symposium on Computational Geometry (SCG-98)}, ORGANIZATION = {Association of Computing Machinery (ACM)}, PADDRESS = {New York, USA}, ADDRESS = {Minneapolis, USA}, PUBLISHER = {ACM Press}, YEAR = {1998}, PAGES = {175--183}, } @INPROCEEDINGS{Funke2007, AUTHOR = {Aronov, Boris and Asano, Tetsuo and Funke, Stefan}, EDITOR = {Tokuyama, Takeshi}, TITLE = {Optimal Triangulation with Steiner Points}, BOOKTITLE = {Algorithms and Computation : 18th International Symposium, ISAAC 2007, Sendai, Japan, December 17-19, 2007. Proceedings}, PADDRESS = {Berlin}, ADDRESS = {Sendai, Japan}, PUBLISHER = {Springer}, MONTH = {December}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4835}, ISBN = {978-3-540-77118-0}, YEAR = {2007}, PAGES = {681--691}, } @MASTERSTHESIS{Funke97, AUTHOR = {Funke, Stefan}, TITLE = {Exact Arithmetic using Cascaded Computation}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, YEAR = {1997}, } @PHDTHESIS{FunkeDiss2001, AUTHOR = {Funke, Stefan}, TITLE = {Combinatorial Curve Reconstruction and the Efficient Exact Implementation of Geometric Algorithms}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Doctoral dissertation}, MONTH = {July}, YEAR = {2001}, } @INPROCEEDINGS{FunkeHD2005, AUTHOR = {Funke, Stefan}, TITLE = {Topological Hole Detection in Wireless Sensor Networks and its Applications}, BOOKTITLE = {3rd ACM/SIGMOBILE International Workshop on foundations of Mobile Computing (DIAL-M-POMC)}, ORGANIZATION = {ACM/SIGMOBILE}, PADDRESS = {New York, USA}, ADDRESS = {Cologne, Germany}, PUBLISHER = {ACM}, YEAR = {2005}, PAGES = {44--53}, } @INPROCEEDINGS{FunkeIE2005, AUTHOR = {Funke, Stefan and Milosavljevic, Nikola}, EDITOR = {Prasanna, Viktor K. and Iyengar, Sitharama and Spirakis, Paul and Welsh, Matt}, TITLE = {Infrastructure-Establishment from Scratch in Wireless Sensor Networks}, BOOKTITLE = {Distributed computing in sensor systems : First IEEE International Conference, DCOSS 2005}, ORGANIZATION = {Association for Computing Machinery (ACM), IEEE}, PADDRESS = {Berlin, Germany}, ADDRESS = {Marina Del Rey, USA}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {3560}, ISBN = {3-540-26422-1}, YEAR = {2005}, PAGES = {354--367}, } @MISC{FunkeLaueLotkerNaujoks2006, AUTHOR = {Funke, Stefan and Laue, S{\"o}ren and Naujoks, Rouven and Lotker, Zvi}, JOURNAL = {???}, TITLE = {Power Assignment Problems in Wireless Communication}, HOWPUBLISHED = {Internet}, YEAR = {2006}, PAGES = {1--14}, ABSTRACT = {A fundamental class of problems in wireless communication is concerned with the assignment of suitable transmission powers to wireless devices/stations such that the resulting communication graph satisfies certain desired properties and the overall energy consumed is minimized. Many concrete communication tasks in a wireless network like broadcast, multicast, point-to-point routing, creation of a communication backbone, etc. can be regarded as such a power assignment problem. This paper considers several problems of that kind; for example one problem studied before in \cite{Carrots, Bilo} aims to select and assign powers to $k$ of the stations such that all other stations are within reach of at least one of the selected stations. We improve the running time for obtaining a $(1+\epsilon)$-approximate solution for this problem from $n^{((\alpha/\epsilon)^{O(d)})}$ as reported by Bilo et al. (\cite{Bilo}) to $O(n+ {(\frac{k^{2d+1}}{\epsilon^d})}^{\min{\{2k, (\alpha/\epsilon)^{O(d)} \}}})$ that is, we obtain a running time that is \emph{linear} in the network size. Further results include a constant approximation algorithm for the TSP problem under squared (non-metric!) edge costs, which can be employed to implement a novel data aggregation protocol, as well as efficient schemes to perform $k$-hop multicasts. }, } @INPROCEEDINGS{FunkeRauf07, AUTHOR = {Funke, Stefan and Rauf, Imran}, EDITOR = {Kranakis, Evangelos and Opatrny, Jaroslav}, TITLE = {Information Brokerage Via Location-Free Double Rulings}, BOOKTITLE = {Ad-Hoc, Mobile, and Wireless Networks : 6th International Conference, ADHOC-NOW 2007, Morelia, Mexico, September 24-26, 2007, Proceedings}, PADDRESS = {Berlin, Germany}, ADDRESS = {Morelia, Mexico}, PUBLISHER = {Springer}, MONTH = {September}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4686}, ISBN = {3-540-74822-9}, DOI = {10.1007/978-3-540-74823-6}, YEAR = {2007}, PAGES = {87--100}, ABSTRACT = {The in-network aggregation and processing of information is what sets a sensor network apart from a pure data acquisition device. One way to model the exchange of information between the network nodes is to distinguish between nodes that are \emph{producers} of information, i.e., those that have collected data, detected events, etc., and nodes that are \emph{consumers} of information, i.e., nodes that seek data or events of certain types. In this paper we aim to support that exchange of information via a so-called \emph{information brokerage} scheme. Main features of our proposed scheme are that 1) it works in a location-free setting where nodes are unaware of their geographic locations 2) it is robust to non-regular network topologies and 3) it does not require the information producers and consumers to know of each other. Our proposed scheme employs boundary detection algorithms which only quite recently have been developed to extract geometry and topology information even in location-free network deployments.}, } @ARTICLE{F.Sibeyn-ActaInformatica38-1998, AUTHOR = {Sibeyn, Jop F.}, JOURNAL = {Acta Informatica}, TITLE = {List Ranking on Meshes}, NUMBER = {7}, PUBLISHER = {Springer}, VOLUME = {35}, ISBN = {0001-5903}, YEAR = {1998}, PAGES = {543--566}, } @PHDTHESIS{F.Sibeyn-HabilThesis-1999, AUTHOR = {Sibeyn, Jop F.}, TITLE = {{Effiziente parallele Algorithmen}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Habilitation thesis}, MONTH = {February}, YEAR = {1999}, NOTE = {Lebenslauf, Schriftenverzeichnis, Zusammenfassung}, ABSTRACT = { In diesem Bericht sind die Dokumente geb\"undelt, die erforderlich sind f\"ur eine m\"ogliche Er\"offnung des Habilitationsverfahren an der Technischen Fakult\"at der Universit\"at des Saarlandes. Nach meinem Lebenslauf folgt ein Schriftenverzeichnis. Darin wird ein \"Uberblick \"uber meine nicht-wissenschaftlichen Aktivit\"aten gegeben: Unterricht und Projekte. Der gr\"o\3te Teil dieses Berichtes wird von einer Zusammenfassung meiner wissenschaftlichen Aktivit\"aten seit Juli 1992 (meine Zeit in Saarbr\"ucken) eingenommen. Am Ende dieser Zusammenfassung sind die eigenen Ver\"offentlichungen aus diesem Zeitraum und Referenzen zu der relevanten Literatur aufgelistet. Der Bericht wird abgeschlossen mit einem Anhang, in dem Kopien der vorhandenen Lehrveranstaltungsbescheinigungen aufgenommen sind.}, } @INPROCEEDINGS{F.Sibeyn-HiPC-1999, AUTHOR = {Sibeyn, Jop F.}, EDITOR = {Banerjee, Prith and Prasanna, Viktor K. and Sinha, Bhabani F.}, TITLE = {Ultimate Parallel List Ranking?}, BOOKTITLE = {Proceedings of the 6th International Conference on High Performance Computing (HiPC-99)}, ORGANIZATION = {IEEE}, PADDRESS = {Berlin}, ADDRESS = {Calcutta}, PUBLISHER = {Springer}, MONTH = {December}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1745}, ISBN = {0302-9743}, YEAR = {1999}, PAGES = {197--201}, ABSTRACT = { Two improved list-ranking algorithms are presented. The ``peeling-off'' algorithm leads to an optimal PRAM algorithm, but was designed with application on a real parallel machine in mind. It is simpler than earlier algorithms, and in a range of problem sizes, where previously several algorithms where required for the best performance, now this single algorithm suffices. If the problem size is much larger than the number of available processors, then the ``sparse-ruling-sets'' algorithm is even better. In previous versions this algorithm had very restricted practical application because of the large number of communication rounds it was performing. This weakness is overcome by adding two new ideas, each of which reduces the number of communication rounds by a factor of two.}, } @ARTICLE{F.Sibeyn-IEEETransParaDistri-1998, AUTHOR = {Sibeyn, Jop F. and Juurlink, Ben and Rao, P. Srinivasa}, JOURNAL = {IEEE Transactions on Parallel and Distributed Systems}, TITLE = {Gossiping on Meshes and Tori}, NUMBER = {6}, PUBLISHER = {IEEE}, MONTH = {June}, VOLUME = {9}, ISBN = {1045-9219}, YEAR = {1998}, PAGES = {513--525}, } @INPROCEEDINGS{F.Sibeyn-IPPS-1999, AUTHOR = {Sibeyn, Jop F.}, TITLE = {Better Deterministic Routing on Meshes}, BOOKTITLE = {Proceedings of the 13th International Parallel Processing Symposium, and 10th Symposium on Parallel and Distributed Processing (IPPS/SPDP-99)}, PADDRESS = {Los Alamitos, USA}, ADDRESS = {St Juan, Puerto Rico}, PUBLISHER = {IEEE}, MONTH = {May}, ISBN = {0-7695-0143-5}, YEAR = {1999}, PAGES = {420--425}, ABSTRACT = { Optimal randomized and deterministic algorithms have been given for $k$-$k$ routing on two-dimensional $n \times n$ meshes. The deterministic algorithm is based on ``column-sort'' and exploits only part of the features of the mesh. For small $n$ and moderate $k$, the lower-order terms of this algorithm make it considerably more expensive than the randomized algorithm. In this paper, we present a novel deterministic algorithm, which, by exploiting the topology of the mesh, has lower-order terms that are almost negligible, even smaller than those of the randomized algorithm. An additional advantage of the new algorithm is that it routes average-case packet distributions twice as fast as worst-case distributions. In earlier algorithms this required additional steps for globally probing the distribution.}, } @ARTICLE{F.Sibeyn-JParallelDistributedComp-1998, AUTHOR = {Sibeyn, Jop F. and Grammatikakis, M.D. and Hsu, D.F. and Kraetzl, M.}, JOURNAL = {Journal of Parallel and Distributed Computing}, TITLE = {Packet Routing in Fixed-Connection Networks: A Survey}, PUBLISHER = {Academic Press}, VOLUME = {54}, ISBN = {0743-7315}, YEAR = {1998}, PAGES = {77--132}, } @INPROCEEDINGS{F.Sibeyn-PDCS-1999, AUTHOR = {Lambert, Oliver and Sibeyn, Jop F.}, EDITOR = {Zheng, S. Q.}, TITLE = {Parallel and External List Ranking and Connected Components on a Cluster of Workstations}, BOOKTITLE = {Proceedings of the 11th International Conference on Parallel and Distributed Computing and Systems (PDCS-99)}, ORGANIZATION = {IASTED}, PADDRESS = {Anaheim, USA}, ADDRESS = {Boston}, PUBLISHER = {IASTED}, MONTH = {November}, ISBN = {0-88986-275-3}, YEAR = {1999}, PAGES = {454--460}, ABSTRACT = { Improved parallel, external and parallel-external algorithms for list-ranking and computing the connected components of a graph are presented. These algorithms are implemented and tested on a cluster of workstations using the C programming language and mpich, a portable implementation of the MPI (Message-Passing Interface) standard. }, } @ARTICLE{F.Sibeyn-SIAM-1999, AUTHOR = {Sibeyn, Jop F.}, JOURNAL = {SIAM Journal on Computing}, TITLE = {Row-Major Sorting on Meshes}, NUMBER = {3}, PUBLISHER = {SIAM}, MONTH = {June}, VOLUME = {28}, YEAR = {1999}, PAGES = {847--863}, ABSTRACT = { In all recent near-optimal sorting algorithms for meshes, the packets are sorted with respect to some snake-like indexing. In this paper we present deterministic algorithms for sorting with respect to the more natural row-major indexing. For 1-1 sorting on an $n \times n$ mesh, we give an algorithm that runs in $2 \cdot n + o(n)$ steps, matching the distance bound, with maximal queue size five. It is considerably simpler than earlier algorithms. Another algorithm performs $k$-$k$ sorting in $k \cdot n / 2 + o(k \cdot n)$ steps, matching the bisection bound. Furthermore, we present {\em uni-axial} algorithms for row-major sorting. We show that 1-1 sorting can be performed in $2\breukk{1}{2} \cdot n + o(n)$ steps. Alternatively, this problem is solved with maximal queue size five in $4\breukk{1}{3} \cdot n$ steps, without any additional terms. }, } @INPROCEEDINGS{F.Sibeyn-SIROCCO-1999, AUTHOR = {Sibeyn, Jop F.}, EDITOR = {Gavoille, Cyril and Bermond, Jean-Claude and Raspaud, Andr{\'e}}, TITLE = {Power and Limitations of Optical Reconfigurable Arrays}, BOOKTITLE = {Proceedings of the 6th International Colloquium on Structural Information and Communication Complexity (SIROCCO 6)}, PADDRESS = {Waterloo, Canada}, ADDRESS = {Lacanau-Oc{\'e}an, France}, PUBLISHER = {Carleton Scientific}, MONTH = {July}, SERIES = {Proceedings in Informatics}, VOLUME = {5}, ISBN = {1-894145-04-6}, YEAR = {1999}, PAGES = {249--263}, ABSTRACT = { The mesh with optical reconfigurable buses is one of the strongest interconnection networks one can think of. There is a constant-time randomized selection algorithm. In this paper, a deterministic selection algorithm is given that runs in $\go{(\log\log N)^2}$ time. It was known that $h$-relations can be routed randomizedly in $\go{h}$ time, here we show that the same can be achieved with a deterministic algorithm. The sorting problem is analyzed in detail, and a new faster algorithm is presented.}, } @INPROCEEDINGS{F.Sibeyn-STACS-1999, AUTHOR = {Sibeyn, Jop F.}, EDITOR = {Meinel, Christoph and Tison, Sophie}, TITLE = {External Selection}, BOOKTITLE = {Proceedings of the 16th Annual Symposium on Theoretical Aspects of Computer Science (STACS-99)}, PADDRESS = {Berlin}, ADDRESS = {Trier}, PUBLISHER = {Springer}, MONTH = {March}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1563}, ISBN = {0302-9743}, YEAR = {1999}, PAGES = {291--301}, ABSTRACT = { Sequential selection has been solved in linear time by Blum e.a. Running this algorithm on a problem of size $N$ with $N > M$, the size of the main-memory, results in an algorithm that reads and writes $\go{N}$ elements, while the number of comparisons is also bounded by $\go{N}$. This is asymptotically optimal, but the constants are so large that in practice sorting is faster for most values of $M$ and $N$. This paper provides the first detailed study of the external selection problem. A randomized algorithm of a conventional type is close to optimal in all respects. Our deterministic algorithm is more or less the same, but first the algorithm builds an index structure of all the elements. This effort is not wasted: the index structure allows the retrieval of elements so that we do not need a second scan through all the data. This index structure can also be used for repeated selections, and can be extended over time. For a problem of size $N$, the deterministic algorithm reads $N + o(N)$ elements and writes only $o(N)$ elements and is thereby optimal to within lower-order terms. }, } @INPROCEEDINGS{F.SibeynSWAT1998, AUTHOR = {Sibeyn, Jop F.}, EDITOR = {Arnborg, Stefan and Ivansson, Lars}, TITLE = {Solving Fundamental Problems on Sparse-Meshes}, BOOKTITLE = {Proceedings of the 6th Scandinavian Workshop on Algorithm Theory (SWAT-98)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Stockholm}, PUBLISHER = {Springer}, MONTH = {July}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1432}, ISBN = {0302-9743}, YEAR = {1998}, PAGES = {288--299}, } @UNPUBLISHED{G4, AUTHOR = {P. Gao}, TITLE = {Distributions of sparse spanning subgraphs in random graphs}, YEAR = {2012}, NOTE = {Accepted for "SIAM Journal on Discrete Mathematics"}, } @UNPUBLISHED{G6, AUTHOR = {P. Gao}, TITLE = {Distribution of the number of spanning regular subgraphs in random graphs}, YEAR = {2012}, NOTE = {Accepted for "Random Structures and Algorithms"}, } @UNPUBLISHED{G7, AUTHOR = {P. Gao}, TITLE = {Uniform generation of d-factors in dense host graphs}, YEAR = {2012}, NOTE = {Accepted for "Graphs and Combinatorics"}, } @INPROCEEDINGS{GaertnerHotzr2009, AUTHOR = {G{\"a}rtner, Tobias and Hotz, G{\"u}nter}, EDITOR = {Ambos-Spies, Klaus and L{\"o}we, Benedikt and Merkle, Wolfgang}, TITLE = {Computability of Analytic Functions with Analytic Machines}, BOOKTITLE = {Mathematical Theory and Computational Practice : 5th Conference on Computability in Europe, CiE 2009}, PADDRESS = {Berlin, Germany}, ADDRESS = {Heidelberg, Germany}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5635}, ISBN = {978-3-642-03072-7}, DOI = {10.1007/978-3-642-03073-4_26}, YEAR = {2009}, PAGES = {250--259}, } @ARTICLE{GameAging2001, AUTHOR = {Doerr, Benjamin}, JOURNAL = {Electronic Notes in Discrete Mathematics}, TITLE = {Vector Balancing Games with Aging}, VOLUME = {10}, YEAR = {2001}, } @UNPUBLISHED{Gao2010DegSub, AUTHOR = {Gao, Pu (Jane) and Wormald, Nicholas and Su, Yi}, TITLE = {Induced subgraphs in sparse random graphs with given degree sequence}, MONTH = {September}, YEAR = {2010}, PAGES = {31}, ABSTRACT = {Let $\mathcal{G}_{n,d}$ denote the uniformly random $d$-regular graph on $n$ vertices. For any $S\subset [n]$, we obtain estimates of the probability that the subgraph of $\mathcal{G}_{n,d}$ induced by $S$ is a given graph $H$. The estimate gives an asymptotic formula for any $d=o(n^{1/3})$, provided that $H$ does not contain almost all the edges of the random graph. The result is further extended to the probability space of random graphs with a given degree sequence.}, } @UNPUBLISHED{Gao2012dFactor, AUTHOR = {Gao, Pu (Jane)}, TITLE = {Distribution of spanning regular subgraphs in random graphs}, MONTH = {February}, YEAR = {2011}, PAGES = {13}, ABSTRACT = {In this paper, we examine the moments of the number of spanning regular subgraphs in $\G(n,p)$ for all $p$ and $d$ satisfying $d^3=o(p^2n)$. We also determine the limiting distribution of the number of $d$-factors inside this range with further restriction that $1-p>>(dn)^{-1/2}$.}, } @INPROCEEDINGS{Garg-et-al96, AUTHOR = {Garg, Naveen and Papatriantafilou, Marina and Tsigas, Philippas}, TITLE = {Distributed List Coloring: How to Dynamically Allocate Frequencies to Mobile Base Stations}, BOOKTITLE = {8th Annual IEEE Symposium on Parallel and Distributed Processing (SPDP '96)}, PADDRESS = {Los Alamitos}, ADDRESS = {New Orleans}, PUBLISHER = {IEEE}, YEAR = {1996}, PAGES = {18--25}, } @ARTICLE{Garg-Vazirani-95, AUTHOR = {Garg, Naveen and Vazirani, Vijay V.}, JOURNAL = {Mathematical Programming (A)}, TITLE = {A polyhedron with all s-t cuts as vertices, and adjacency of cuts}, NUMBER = {1}, PUBLISHER = {Elsevier}, VOLUME = {70}, ISBN = {0025-5610}, YEAR = {1995}, PAGES = {17--25}, } @ARTICLE{Garg-Vazirani96, AUTHOR = {Garg, Naveen and Vazirani, Vijay V.}, JOURNAL = {SIAM Journal on Computing}, TITLE = {Approximate max-flow min-(multi)cut theorems and their applications}, NUMBER = {2}, PUBLISHER = {Society for Industrial and Applied Mathematics}, VOLUME = {25}, ISBN = {0097-5397}, YEAR = {1996}, PAGES = {235--251}, } @ARTICLE{GargKonjevodRavi2000, AUTHOR = {Garg, Naveen and Konjevod, Goran and Ravi, R.}, JOURNAL = {Journal of Algorithms}, TITLE = {Approximation algorithm for the group {Steiner} tree problem}, ADDRESS = {San Diego, USA}, NUMBER = {1}, PUBLISHER = {Academic Press}, VOLUME = {37}, ISBN = {0196-6774}, YEAR = {2000}, PAGES = {66--84}, ABSTRACT = {Given a weighted graph with some subsets of vertices called groups, the group Steiner tree problem is to find a minimum-weight subgraph which contains at least one vertex from each group. We give a randomized algorithm with a polylogarithmic approximation guarantee for the group Steiner tree problem. The previous best approximation guarantee was O (i2k1/i) in time O (nik2i) (Charikar, Chekuri, Goel, and Guha). Our algorithm also improves existing approximation results for network design problems with location-based constraints and for the symmetric generalized traveling salesman problem}, } @INPROCEEDINGS{GasienicJanssonLingasOestlin1997, AUTHOR = {Gasieniec, Leszek and Jansson, Jesper and Lingas, Andrzej and {\"O}stlin, Anna}, EDITOR = {Jiang, Tao and Lee, D. T.}, TITLE = {On the complexity of computing evolutionary trees}, BOOKTITLE = {Proceedings of the 3rd International Conference on Computing and Combinatorics (COCOON-97)}, PADDRESS = {Berlin}, ADDRESS = {Shanghai, China}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1276}, YEAR = {1997}, PAGES = {134--145}, } @INPROCEEDINGS{Gasieniec-Indyk-Krysta97, AUTHOR = {Gasieniec, Leszek and Indyk, Piotr and Krysta, Piotr}, EDITOR = {Apostolico, Alberto and Hein, Jotun}, TITLE = {External inverse pattern matching}, BOOKTITLE = {Proceedings of the 8th Symposium on Combinatorial Pattern Matching (CPM-97)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Aarhus, Denmark}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1264}, YEAR = {1997}, PAGES = {90--101}, } @INPROCEEDINGS{Gasieniec1-96, AUTHOR = {Gasieniec, Leszek and Karpinski, Marek and Plandowski, Wojciech and Rytter, Wojciech}, EDITOR = {Karlsson, Rolf and Lingas, Andrzej}, TITLE = {Efficient Algorithms for Lempel-Ziv Encoding}, BOOKTITLE = {Algorithm Theory - SWAT'96: 5th Scandinavian Workshop on Algorithm Theory}, PADDRESS = {Berlin}, ADDRESS = {Reykjavik, Iceland}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1097}, YEAR = {1996}, PAGES = {392--403}, } @INPROCEEDINGS{Gasieniec2-96, AUTHOR = {Brodal, Gerth St{\o}lting and Gasieniec, Leszek}, EDITOR = {Hirschberg, Dan and Myers, Gene}, TITLE = {Approximate Dictionary Queries}, BOOKTITLE = {Combinatorial Pattern Matching: 7th Annual Symposium (CPM'96)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Laguna Beach}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1075}, YEAR = {1996}, PAGES = {65--74}, } @INPROCEEDINGS{Gasieniec3-96, AUTHOR = {Gasieniec, Leszek and Kranakis, Evangelos and Krizanc, Danny and Pelc, Andrzej}, EDITOR = {Penczek, Wojciech and Szalas, Andrzej}, TITLE = {Minimizing Congestion of Layouts for ATM Networks with Faulty Links}, BOOKTITLE = {Mathematical Foundations of Computer Science 1996: 21st International Symposium (MFCS'96)}, PADDRESS = {Berlin}, ADDRESS = {Cracow, Poland}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1113}, YEAR = {1996}, PAGES = {392--403}, } @INPROCEEDINGS{Gasieniec4-96, AUTHOR = {Chlebus, Bogdan S. and Czumaj, Artur and Gasieniec, Leszek and Kowaluk, Miroslaw and Plandowski, Wojciech}, EDITOR = {Penczek, Wojciech and Szalas, Andrzej}, TITLE = {Parallel Alternating-Direction Access Machine}, BOOKTITLE = {Mathematical Foundations of Computer Science 1996: 21st International Symposium (MFCS'96)}, PADDRESS = {Berlin}, ADDRESS = {Cracow, Poland}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1113}, YEAR = {1996}, PAGES = {255--266}, } @INPROCEEDINGS{Gasieniec5-96, AUTHOR = {Gasieniec, Leszek and Karpinski, Marek and Plandowski, Wojciech and Rytter, Wojciech}, EDITOR = {Hirschberg, Dan and Myers, Gene}, TITLE = {Randomized Efficient Algorithms for Compressed Strings: the Finger-Print Approach}, BOOKTITLE = {Combinatorial Pattern Matching: 7th Annual Symposium (CPM'96)}, PADDRESS = {Berlin}, ADDRESS = {Laguna Beach, CA, USA}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1075}, YEAR = {1996}, PAGES = {39--49}, } @ARTICLE{Gasieniec6-96, AUTHOR = {Gasieniec, Leszek and Pelc, Andrzej}, JOURNAL = {Parallel Computing}, TITLE = {Adaptive Broadcasting with Faulty Nodes}, NUMBER = {6}, PUBLISHER = {Elsevier}, VOLUME = {22}, ISBN = {0167-8191}, YEAR = {1996}, PAGES = {903--912}, } @INPROCEEDINGS{GasieniecIndyk97, AUTHOR = {Gasieniec, Leszek and Indyk, Piotr}, EDITOR = {Chlebus, Bogdan S. and Czaja, Ludwik}, TITLE = {Efficient Parallel Computing with Memory Faults}, BOOKTITLE = {Proceedings of the 11th Symposium on Fundamentals of Computation Theory (FCT-97)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Krakcw, Poland}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1279}, YEAR = {1997}, PAGES = {188--197}, } @ARTICLE{GasieniecPelc97, AUTHOR = {Gasieniec, Leszek and Pelc, Andrzej}, JOURNAL = {Journal of Parallel and Distributed Computing}, TITLE = {Broadcasting with a bounded fraction of faulty nodes}, NUMBER = {1}, VOLUME = {42}, YEAR = {1997}, PAGES = {11--20}, } @MASTERSTHESIS{Gast97, AUTHOR = {Gast, Christoph}, TITLE = {{Das Maximum-Weight-Trace-Problem bei multiplem Sequenz-Alignment}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, YEAR = {1997}, } @INPROCEEDINGS{Gawrychowski2012a, AUTHOR = {Gawrychowski, Pawel}, EDITOR = {D{\"u}rr, Christoph and Wilke, Thomas}, TITLE = {Tying up the loose ends in fully {LZW}-compressed pattern matching}, BOOKTITLE = {29th International Symposium on Theoretical Aspects of Computer Science : STACS'12}, PADDRESS = {Dagstuhl}, ADDRESS = {Paris, France}, PUBLISHER = {Schloss Dagstuhl/ Leibniz-Zentrum f{\"u}r Informatik}, SERIES = {LIPIcs}, VOLUME = {14}, ISBN = {978-3-939897-35-4}, DOI = {10.4230/LIPIcs.STACS.2012.624}, YEAR = {2012}, PAGES = {624--635}, } @INPROCEEDINGS{Gawrychowski2012b, AUTHOR = {Gawrychowski, Pawel}, EDITOR = {K{\"a}rkk{\"a}inen, Juha and Stoye, Jens}, TITLE = {Simple and efficient {LZW}-compressed multiple pattern matching}, BOOKTITLE = {Combinatorial Pattern Matching : 23rd Annual Symposium, CPM 2012}, PADDRESS = {Berlin}, ADDRESS = {Helsinki, Finland}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {7354}, ISBN = {978-3-642-31264-9}, DOI = {10.1007/978-3-642-31265-6}, YEAR = {2012}, PAGES = {232--242}, } @INPROCEEDINGS{Gawrychowski2012c, AUTHOR = {Gawrychowski, Pawel}, EDITOR = {Calder{\'o}n-Benavides, Liliana and Gonz{\'a}lez-Caro, Cristina N. and Ch{\'a}vez, Edgar and Ziviani, Nivio}, TITLE = {Faster Algorithm for Computing the Edit Distance between {SLP}-Compressed Strings}, BOOKTITLE = {String Processing and Information Retrieval : 19th International Symposium, SPIRE 2012}, PADDRESS = {Berlin}, ADDRESS = {Cartagena de Indias, Colombia}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {7608}, ISBN = {978-3-642-34108-3}, DOI = {10.1007/978-3-642-34109-0}, YEAR = {2012}, PAGES = {229--236}, } @INPROCEEDINGS{Gawrychowski2013, AUTHOR = {Gawrychowski, Pawel and Manea, Florin and Mercas, Robert and Nowotka, Dirk and Tiseanu, Catalin}, EDITOR = {Portier, Natacha and Wilke, Thomas}, TITLE = {Finding Pseudo-repetitions}, BOOKTITLE = {30th International Symposium on Theoretical Aspects of Computer Science (STACS 2013)}, PADDRESS = {Dagstuhl, Germany}, ADDRESS = {Kiel, Germany}, PUBLISHER = {Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik}, SERIES = {Leibniz International Proceedings in Informatics (LIPIcs)}, VOLUME = {20}, ISBN = {978-3-939897-50-7}, DOI = {10.4230/LIPIcs.STACS.2013.257}, YEAR = {2013}, PAGES = {257--268}, } @INPROCEEDINGS{Gawrychowski2013alphabetic, AUTHOR = {Gawrychowski, Pawel}, EDITOR = {Bulatov, Andrei A. and Shur, Arseny M.}, TITLE = {Alphabetic Minimax Trees in Linear Time}, BOOKTITLE = {8th International Computer Science Symposium in Russia (CSR 2013)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Yekaterinburg, Russia}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {7913}, ISBN = {978-3-642-38535-3}, DOI = {10.1007/978-3-642-38536-0_4}, YEAR = {2013}, PAGES = {36--48}, } @INPROCEEDINGS{Gawrychowski2013ancestors, AUTHOR = {Gagie, Travis and Gawrychowski, Pawel and Nekrich, Yakov}, TITLE = {Heaviest Induced Ancestors and Longest Common Substrings}, BOOKTITLE = {25th Canadian Conference on Computational Geometry (CCCG 13)}, PADDRESS = {Waterloo, Canada}, ADDRESS = {Waterloo, Canada}, YEAR = {2013}, PAGES = {145--150}, } @INPROCEEDINGS{Gawrychowski2013beating, AUTHOR = {Gawrychowski, Pawel and Straszak, Damian}, EDITOR = {Cai, Leizhen and Cheng, Siu-Wing and Lam, Tak Wah}, TITLE = {Beating O(nm) in Approximate LZW-Compressed Pattern Matching}, BOOKTITLE = {Algorithms and Computation - 24th International Symposium (ISAAC 2013)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Hong Kong, China}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {8283}, ISBN = {978-3-642-45029-7}, DOI = {10.1007/978-3-642-45030-3}, YEAR = {2013}, PAGES = {78--88}, } @INPROCEEDINGS{Gawrychowski2013converting, AUTHOR = {Bannai, Hideo and Gawrychowski, Pawel and Inenaga, Shunsuke and Takeda, Masayuki}, EDITOR = {Fischer, Johannes and Sanders, Peter}, TITLE = {Converting SLP to LZ78 in almost Linear Time}, BOOKTITLE = {Combinatorial Pattern Matching, 24th Annual Symposium (CPM 2013)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Bad Herrenalb, Germany}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {7922}, ISBN = {978-3-642-38904-7}, DOI = {10.1007/978-3-642-38905-4_6}, YEAR = {2013}, PAGES = {38--49}, } @INPROCEEDINGS{Gawrychowski2013discovering, AUTHOR = {Gawrychowski, Pawel and Manea, Florin and Nowotka, Dirk}, EDITOR = {Bonizzoni, Paola and Brattka, Vasco and Lowe, Benedikt}, TITLE = {Discovering Hidden Repetitions in Words}, BOOKTITLE = {9th Conference on Computability in Europe (CiE 2013)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Milan, Italy}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {7921}, ISBN = {978-3-642-39052-4}, DOI = {10.1007/978-3-642-39053-1}, YEAR = {2013}, PAGES = {210--219}, } @INPROCEEDINGS{Gawrychowski2013discriminating, AUTHOR = {Gawrychowski, Pawel and Kucherov, Gregory and Nekrich, Yakov and Starikovskaya, Tatiana}, EDITOR = {Kurland, Oren and Lewenstein, Moshe and Porat, Ely}, TITLE = {Minimal Discriminating Words Problem Revisited}, BOOKTITLE = {String Processing and Information Retrieval - 20th International Symposium (SPIRE 2013)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Jerusalem, Israel}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {8214}, ISBN = {978-3-319-02431-8}, DOI = {10.1007/978-3-319-02432-5}, YEAR = {2013}, } @INPROCEEDINGS{Gawrychowski2014, AUTHOR = {Gawrychowski, Pawel and Manea, Florin and Nowotka, Dirk}, EDITOR = {Mayr, Ernst W. and Portier, Natacha}, TITLE = {Testing Generalised Freeness of Words}, BOOKTITLE = {31st International Symposium on Theoretical Aspects of Computer Science (STACS 2014)}, PADDRESS = {Dagstuhl, Germany}, ADDRESS = {Lyon, France}, PUBLISHER = {Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik}, SERIES = {Leibniz International Proceedings in Informatics (LIPIcs)}, VOLUME = {25}, ISBN = {978-3-939897-65-1}, DOI = {10.4230/LIPIcs.STACS.2014.337}, YEAR = {2014}, PAGES = {337--349}, } @INPROCEEDINGS{Gawrychowski2014a, AUTHOR = {Gagie, Travis and Gawrychowski, Pawel and K{\"a}rkk{\"a}inen, Juha and Nekrich, Yakov and Puglisi, Simon J.}, EDITOR = {Parso, Alberto and Viola, Alfredo}, TITLE = {LZ77-Based Self-indexing with Faster Pattern Matching}, BOOKTITLE = {LATIN 2014: Theoretical Informatics - 11th Latin American Symposium, Montevideo, Uruguay, March 31 - April 4, 2014. Proceedings}, PADDRESS = {Berlin, Germany}, ADDRESS = {Montevideo, Uruguay}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {8392}, ISBN = {978-3-642-54422-4}, DOI = {10.1007/978-3-642-54423-1}, YEAR = {2014}, PAGES = {731--742}, } @INPROCEEDINGS{Gawrychowski2014b, AUTHOR = {Gawrychowski, Pawel and Mozes, Shay and Weimann, Oren}, EDITOR = {Esparza, Javier and Fraigniaud, Pierre and Husfeldt, Thore and Koutsoupias, Elias}, TITLE = {Improved Submatrix Maximum Queries in Monge Matrices}, BOOKTITLE = {Automata, Languages, and Programming - 41st International Colloquium, ICALP 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part I}, PADDRESS = {Berlin, Germany}, ADDRESS = {Copenhagen, Denmark}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {8572}, ISBN = {978-3-662-43947-0}, DOI = {10.1007/978-3-662-43948-7}, YEAR = {2014}, PAGES = {525--537}, } @INPROCEEDINGS{Gawrychowski2014c, AUTHOR = {Gawrychowski, Pawel and Uznanski, Przemyslaw}, EDITOR = {Kulikov, Alexander S. and Kuznetsov, Sergei O. and Pevzner, Pavel A.}, TITLE = {Order-Preserving Pattern Matching with k Mismatches}, BOOKTITLE = {Combinatorial Pattern Matching - 25th Annual Symposium, {CPM} 2014, Moscow, Russia, June 16-18, 2014. Proceedings}, PADDRESS = {Berlin, Germany}, ADDRESS = {Moscow, Russia}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {8486}, ISBN = {978-3-319-07565-5}, DOI = {10.1007/978-3-319-07566-2}, YEAR = {2014}, PAGES = {130--139}, } @INPROCEEDINGS{Gawrychowski2014d, AUTHOR = {Babenko, Maxim A. and Gawrychowski, Pawel and Kociumaka, Tomasz and Starikovskaya, Tatiana A.}, EDITOR = {Kulikov, Alexander S. and Kuznetsov, Sergei O. and Pevzner, Pavel A.}, TITLE = {Computing Minimal and Maximal Suffixes of a Substring Revisited}, BOOKTITLE = {Combinatorial Pattern Matching - 25th Annual Symposium, {CPM} 2014, Moscow, Russia, June 16-18, 2014. Proceedings}, PADDRESS = {Springer, Germany}, ADDRESS = {Moscow, Russia}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {8486}, ISBN = {978-3-319-07565-5}, DOI = {10.1007/978-3-319-07566-2}, YEAR = {2014}, PAGES = {30--39}, } @ARTICLE{Gawrychowski2014e, AUTHOR = {Gawrychowski, Pawel}, JOURNAL = {Journal of Discrete Algorithms}, TITLE = {Simple and efficient LZW-compressed multiple pattern matching}, ADDRESS = {Amsterdam, Netherlands}, PUBLISHER = {Elsevier}, MONTH = {March}, VOLUME = {25}, ISBN = {1570-8667}, DOI = {10.1016/j.jda.2013.10.004}, YEAR = {2014}, PAGES = {34--41}, } @ARTICLE{GawrychowskiJez2014, AUTHOR = {Gawrychowski, Pawel and Jez, Artur and Jez, Lukasz}, JOURNAL = {Theory of Computing Systems}, TITLE = {Validating the Knuth-Morris-Pratt Failure Function, Fast and Online}, ADDRESS = {Berlin}, NUMBER = {2}, PUBLISHER = {Springer}, MONTH = {February}, VOLUME = {54}, ISBN = {1432-4350}, YEAR = {2014}, PAGES = {337--372}, ABSTRACT = {Let $\pi'_w$ denote the failure function of the Knuth-Morris-Pratt algorithm for a word $w$. In this paper we study the following problem: given an integer array $A'[1 .. n]$, is there a word $w$ over an arbitrary alphabet $\Sigma$ such that $A'[i]=\pi'_w[i]$ for all $i$? Moreover, what is the minimum cardinality of $\Sigma$ required? We give an elementary and self-contained $\mathcal{O}(n\log n)$ time algorithm for this problem, thus improving the previously known solution, which had no polynomial time bound. Using both deeper combinatorial insight into the structure of $\pi'$ and advanced algorithmic tools, we further improve the running time to $\mathcal{O}(n)$.}, } @INPROCEEDINGS{GDCompRep1999, AUTHOR = {Brandenburg, Franz J. and Schreiber, Falk and J{\"u}nger, Michael and Marks, Joe and Mutzel, Petra}, EDITOR = {Kratochv{\'i}l, Jan}, TITLE = {Graph Drawing Contest Report}, BOOKTITLE = {Proceedings of the 7th International Symposium on Graph Drawing (GD-99)}, PADDRESS = {Berlin}, ADDRESS = {Prag, Czech Republic}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1731}, ISBN = {3-540-66904-3}, YEAR = {1999}, PAGES = {400--409}, } @PROCEEDINGS{gecco2009, EDITOR = {Raidl, G{\"u}nther R. and Alba, Enrique and Bacardit, Jaume and Beyer, Hans-Georg and Birattari, Mauro and Blum, Christian and Bosman, Peter A.N. and Congdon, Clare B. and Corne, David W. and Cotta, Carlos and Di Penta, Massimiliano and Doerr, Benjamin and Drechsle, Rolf and Ebner, Marc and Grahl, J{\"o}rn and Jansen, Thomas and Knowles, Joshua D. and Lenaerts, Tom and Middendorf, Martin and Miller, Julian F. and O'Neill, Michael and Poli, Riccardo and Squillero, Giovanni and Stanley, Kenneth O. and St{\"u}tzle, Thomas and van Hemert, Jano}, TITLE = {GECCO 2009: Proceedings of the 11th Annual conference on Genetic and evolutionary computation.}, PADDRESS = {New York, NY, USA}, ADDRESS = {Montreal, Qu{\'e}bec, Canada}, PUBLISHER = {ACM}, ISBN = {978-1-60558-325-9}, YEAR = {2009}, PAGES = {1--1956}, } @INPROCEEDINGS{Gergov-et-al96, AUTHOR = {Gergov, Jordan}, EDITOR = {Diaz, Josep and Serna, Maria}, TITLE = {Approximation Algorithms for Dynamic Storage Allocation}, BOOKTITLE = {Algorithms - ESA '96: 4th Annual European Symposium}, PADDRESS = {Berlin}, ADDRESS = {Barcelona}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1136}, YEAR = {1996}, PAGES = {52--61}, } @ARTICLE{Gergov-Meinel96, AUTHOR = {Gergov, Jordan and Meinel, Christoph}, JOURNAL = {Formal Methods in System Design}, TITLE = {Mod-2-OBDDs - a Date Structure that generalizes EXOR-Sum-of-Products and Ordered Binary Decision Diagrams}, ADDRESS = {Boston, USA}, NUMBER = {3}, PUBLISHER = {Kluwer}, VOLUME = {8}, ISBN = {0925-9856}, YEAR = {1996}, PAGES = {273--282}, } @PHDTHESIS{GergovDiss00, AUTHOR = {Gergov, Jordan}, TITLE = {Algorithms for Interval Coloring, Geometric Packing and Memory Optimization}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Doctoral dissertation}, MONTH = {November}, YEAR = {2000}, } @INPROCEEDINGS{ghhkms-bo3ds-03, AUTHOR = {Granados, Miguel and Hachenberger, Peter and Hert, Susan and Kettner, Lutz and Mehlhorn, Kurt and Seel, Michael}, EDITOR = {Di Battista, Giuseppe and Zwick, Uri}, TITLE = {Boolean Operations on {3D} Selective {Nef} Complexes: Data Structure, Algorithms, and Implementation}, BOOKTITLE = {Algorithms - ESA 2003: 11th Annual European Symposium}, PADDRESS = {Berlin, Germany}, ADDRESS = {Budapest, Hungary}, PUBLISHER = {Springer}, MONTH = {September}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {2832}, ISBN = {3-540-20064-9}, DOI = {10.1007/b13632}, YEAR = {2003}, PAGES = {654--666}, ABSTRACT = {We describe a data structure for three-dimensional Nef complexes, algorithms for boolean operations on them, and our implementation of data structure and algorithms. Nef polyhedra were introduced by W. Nef in his seminal 1978 book on polyhedra. They are the closure of half-spaces under boolean operations and can represent non-manifold situations, open and closed boundaries, and mixed dimensional complexes. Our focus lies on the generality of the data structure, the completeness of the algorithms, and the exactness and efficiency of the implementation. In particular, all degeneracies are handled.}, } @INPROCEEDINGS{ghs-che-01, AUTHOR = {Geismann, Nicola and Hemmer, Michael and Sch{\"o}mer, Elmar}, TITLE = {The Convex Hull of Ellipsoids (Video)}, BOOKTITLE = {Proceedings of the 17th Annual Symposium on Computational Geometry (SCG-01)}, PADDRESS = {New York}, ADDRESS = {Bosten, Massachusetts}, PUBLISHER = {ACM}, YEAR = {2001}, PAGES = {321--322}, ABSTRACT = {The treatment of curved algebraic surfaces becomes more and more the focus of attention in Computational Geometry. We present a video that illustrates the computation of the convex hull of a set of ellipsoids. The underlying algorithm is an application of our work on determining a cell in a 3-dimensional arrangement of quadrics, see \cite{ghs-ccaq-01}. In the video, the main emphasis is on a simple and comprehensible visualization of the geometric aspects of the algorithm. In addition, we give some insights into the underlying mathematical problems.}, } @INPROCEEDINGS{ghs-qsi-01, AUTHOR = {Geismann, Nicola and Hemmer, Michael and Sch{\"o}mer, Elmar}, TITLE = {Computing a 3-dimensional Cell in an Arrangement of Quadrics: Exactly and Actually!}, BOOKTITLE = {Proceedings of the 17th Annual Symposium on Computational Geometry (SCG-01)}, ORGANIZATION = {ACM SIGACT and SIGGRAPH}, PADDRESS = {New York}, ADDRESS = {Boston, Massachusetts}, PUBLISHER = {ACM}, YEAR = {2001}, PAGES = {264--273}, ABSTRACT = {We present two approaches to the problem of calculating a cell in a 3-dimensional arrangement of quadrics. The first approach solves the problem using rational arithmetic. It works with reductions to planar arrangements of algebraic curves. Degenerate situations such as tangential intersections and self-intersections of curves are intrinsic to the planar arrangements we obtain. The coordinates of the intersection points are given by the roots of univariate polynomials. We succeed in locating all intersection points either by extended local box hit counting arguments or by globally characterizing them with simple square root expressions. The latter is realized by a clever factorization of the univariate polynomials. Only the combination of these two results facilitates a practical and implementable algorithm. The second approach operates directly in 3-space by applying classical solid modeling techniques. Whereas the first approach guarantees a correct solution in every case the second one may fail in some degenerate situations. But with the help of verified floating point arithmetic it can detect these critical cases and is faster if the quadrics are in general position.}, } @INPROCEEDINGS{GiakkoupisS12, AUTHOR = {Giakkoupis, George and Sauerwald, Thomas}, EDITOR = {Rabani, Yuval}, TITLE = {Rumor spreading and vertex expansion}, BOOKTITLE = {Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-12)}, PADDRESS = {Philadelphia, PA}, ADDRESS = {Kyoto, Japan}, PUBLISHER = {SIAM}, ISBN = {978-1-611972-11-5}, YEAR = {2012}, PAGES = {1623--1641}, } @ARTICLE{Giannopoulos2010, AUTHOR = {Giannopoulos, Panos and Klein, Rolf and Kutz, Martin and Marx, Daniel}, JOURNAL = {International Journal of Computational Geometry \& Applications}, TITLE = {Computing geometric minimum-dilation graphs is {NP-hard}}, ADDRESS = {Singapore}, NUMBER = {2}, PUBLISHER = {World Scientific}, VOLUME = {20}, ISBN = {0218-1959}, DOI = {10.1142/S0218195910003244}, YEAR = {2010}, PAGES = {147--173}, } @INPROCEEDINGS{Gidenstam2007a, AUTHOR = {Gidenstam, Anders and Papatriantafilou, Marina}, EDITOR = {Tovar, Eduardo and Tsigas, Philippas and Fouchal, Hac{\`e}ne}, TITLE = {LFthreads: A Lock-Free Thread Library}, BOOKTITLE = {11th International Conference On Principles Of Distributed Systems ({OPODIS})}, ORGANIZATION = {Association Pour la Diffusion Scientifique (APODIS); UAG, Universit{\'e} des Antilles et de la Guyane; EPHE, I'Ecole Pratique des Hautes Etudes, Sorbonne, France; LaISC, Laboratoire d'Informatique et des Syst{\'e}mes Complexes, France; GDR ARP du CNRS; INRIA, Institut National de la Recherche en Informatique et en Automatique}, PADDRESS = {Berlin, Germany}, ADDRESS = {Guadeloupe, French West Indies, France}, PUBLISHER = {Springer}, MONTH = {December}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4878}, ISBN = {ISSN 0302-9743}, YEAR = {2007}, PAGES = {217--231}, ABSTRACT = {LFthreads is a thread library entirely based on lock-free methods, i.e. no spin-locks or similar synchronization mechanisms are employed in the implementation of the multithreading. Since lock-freedom is highly desirable in multiprocessors/multicores due to its advantages in parallelism, fault-tolerance, convoy-avoidance and more, there is an increased demand in lock-free methods in parallel applications, hence also in multiprocessor/multicore system services. This is why a lock-free multithreading library is important. To the best of our knowledge LFthreads is the first thread library that provides a lock-free implementation of blocking synchronization primitives for application threads. Lock-free implementation of objects with blocking semantics may sound like a contradicting goal. However, such objects have benefits: e.g. library operations that block and unblock threads on the same synchronization object can make progress in parallel while maintaining the desired thread-level semantics and without having to wait for any ``slow'' operations among them. Besides, as no spin-locks or similar synchronization mechanisms are employed, processors are always able to do useful work. As a consequence, applications, too, can enjoy enhanced parallelism and fault-tolerance. The synchronization in LFthreads is achieved by a new method, which we call \emph{responsibility hand-off} (RHO), that does not need any special kernel support.}, } @ARTICLE{Gidenstam200901, AUTHOR = {Larsson, Andreas and Gidenstam, Anders and Ha, Phuong H. and Papatriantafilou, Marina and Tsigas, Philippas}, JOURNAL = {Journal of experimental algorithmics}, TITLE = {Multiword Atomic Read/Write Registers on Multiprocessor Systems}, ADDRESS = {New York, NY}, NUMBER = {1}, PUBLISHER = {ACM}, VOLUME = {13}, ISBN = {1084-6654}, DOI = {10.1145/1412228.1455262}, YEAR = {2009}, PAGES = {7:1--7:30}, } @ARTICLE{Gidenstam200902, AUTHOR = {Gidenstam, Anders and Papatriantafilou, Marina and Sundell, H{\aa}kan and Tsigas, Philippas}, JOURNAL = {IEEE Transactions on Parallel and Distributed Systems}, TITLE = {Efficient and Reliable Lock-Free Memory Reclamation Based on Reference Counting}, ADDRESS = {Piscataway, NJ}, NUMBER = {8}, PUBLISHER = {IEEE}, VOLUME = {20}, ISBN = {1045-9219}, DOI = {10.1109/TPDS.2008.167}, YEAR = {2009}, PAGES = {1173--1187}, } @ARTICLE{Gidenstam200903, AUTHOR = {Gidenstam, Anders and Papatriantafilou, Marina and Tsigas, Phillipas}, JOURNAL = {Algorithmica}, TITLE = {NBmalloc : Allocating Memory in a Lock-Free Manner}, ADDRESS = {New York, NY}, PUBLISHER = {Springer}, VOLUME = {Online First}, ISBN = {1432-0541}, DOI = {10.1007/s00453-008-9268-x}, YEAR = {2009}, PAGES = {1--35}, } @ARTICLE{Gidenstam2010, AUTHOR = {Gidenstam, Anders and Papatriantafilou, Marina and Tsigas, Philippas}, JOURNAL = {Algorithmica}, TITLE = {NBmalloc: {Allocating} Memory in a Lock-Free Manner}, ADDRESS = {Berlin}, NUMBER = {2}, PUBLISHER = {Springer}, VOLUME = {58}, ISBN = {0178-4617}, DOI = {10.1007/s00453-008-9268-x}, YEAR = {2010}, PAGES = {304--338}, } @ARTICLE{Giesen2007, AUTHOR = {Giesen, Joachim and Schuberth, Eva and Simon, Klaus and Zolliker, Peter and Zweifel, Oliver}, JOURNAL = {IEEE Transactions on Image Processing}, TITLE = {Image-Dependent Gamut Mapping as Optimization Problem}, ADDRESS = {Los Alamitos, CA, USA}, NUMBER = {10}, PUBLISHER = {IEEE}, MONTH = {October}, VOLUME = {16}, ISBN = {1057-7149}, DOI = {10.1109/TIP.2007.904455}, YEAR = {2007}, PAGES = {2401--2410}, } @ARTICLE{Giesen2007b, AUTHOR = {Giesen, Joachim}, JOURNAL = {Computational Geometry - Theory and Applications}, TITLE = {Delaunay Triangulation Approximates Anchor Hull}, PUBLISHER = {Elsevier}, VOLUME = {36}, YEAR = {2008}, PAGES = {131--143}, } @ARTICLE{Giesen2007c, AUTHOR = {Giesen, Joachim}, JOURNAL = {IEEE Transactions on Visualization and Computer Graphics}, TITLE = {Conjoint Analysis for Measuring the Perceived Quality in Volume Rendering}, NUMBER = {6}, PUBLISHER = {IEEE}, VOLUME = {13}, YEAR = {2008}, PAGES = {1664--1671}, } @INPROCEEDINGS{Giesen2007col, AUTHOR = {Giesen, Joachim and Mitsche, Dieter and Schuberth, Eva}, EDITOR = {Kao, Ming-Yang and Li, Xiang-Yang}, TITLE = {Collaborative Ranking: an aggregation algorithm for individuals' preference estimation}, BOOKTITLE = {Algorithmic Aspects in Information and Management : Third International Conference, AAIM 2007}, PADDRESS = {Heidelberg, Germany}, ADDRESS = {Portland, USA}, PUBLISHER = {Springer}, VOLUME = {4508}, ISBN = {3-540-72868-9}, DOI = {10.1007/978-3-540-72870-2_6}, YEAR = {2007}, PAGES = {58--67}, } @INCOLLECTION{Giesen2007conj, AUTHOR = {Giesen, Joachim}, EDITOR = {A. Gustafsson and A. Herrmann and F. Huber}, TITLE = {The Combinatorial Structure of Polyhedral Choice Based Conjoint Analysis}, BOOKTITLE = {Conjoint Measurement: Methods and Applications}, CHAPTER = {13}, ADDRESS = {Heidelberg, Germany}, PUBLISHER = {Springer}, EDITION = {4}, YEAR = {2007}, PAGES = {259--271}, } @INPROCEEDINGS{Giesen2007e, AUTHOR = {Giesen, Joachim}, TITLE = {Medial Axis Approximation from Inner Voronoi Balls: A Demo of the Mesecina Tool}, BOOKTITLE = {23d Annual ACM Symposium on Computational Geometry}, PADDRESS = {New York}, ADDRESS = {Gyeongju, South-Korea}, PUBLISHER = {ACM}, YEAR = {2007}, PAGES = {123--124}, } @ARTICLE{Giesen2008z, AUTHOR = {Giesen, Joachim}, JOURNAL = {Computational Geometry - Theory and Applications}, TITLE = {The Flow Complex: A Data Structure for Geometric Modeling}, PUBLISHER = {Elsevier}, VOLUME = {39}, YEAR = {2008}, PAGES = {178--190}, } @ARTICLE{GKMMP06, AUTHOR = {Gotsman, Craig and Kaligosi, Kanela and Mehlhorn, Kurt and Michail, Dimitrios and Pyrga, Evangelia}, JOURNAL = {Computer Aided Geometric Design}, TITLE = {Cycle Bases of Graphs and Sampled Manifolds}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {8/9}, PUBLISHER = {Elsevier}, MONTH = {December}, VOLUME = {24}, DOI = {10.1016/j.cagd.2006.07.001}, YEAR = {2007}, PAGES = {464}, NOTE = {accepted for publication in Computer Aided Geometric Design journal}, } @ARTICLE{GKS, AUTHOR = {Georgiou, Chryssis and Kowalski, Dariusz and Shvartsman, Alexander}, JOURNAL = {Theoretical Computer Science}, TITLE = {Efficient gossip and robust distributed computation}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {1}, PUBLISHER = {Elsevier}, VOLUME = {347}, YEAR = {2005}, PAGES = {130--166}, NOTE = {submitted to journal. The extended abstract appeared DISC 2003.}, } @INPROCEEDINGS{GKS-DISC2003, AUTHOR = {Georgiou, Chryssis and Kowalski, Dariusz and Shvartsman, Alexander}, EDITOR = {Fich, Faith}, TITLE = {Efficient Gossip and Robust Distributed Computation}, BOOKTITLE = {Distributed Computing, 17th International Conference (DISC 2003)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Sorrento, Italy}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {2848}, ISBN = {3-540-20184-X}, YEAR = {2003}, PAGES = {224--238}, } @ARTICLE{GKWahlstroemW2012, AUTHOR = {Giannopoulos, Panos and Knauer, Christian and Wahlstr{\"o}m, Magnus and Werner, Daniel}, JOURNAL = {Journal of Complexity}, TITLE = {Hardness of discrepancy computation and $\varepsilon$-net verification in high dimension}, ADDRESS = {Amsterdam}, NUMBER = {2}, PUBLISHER = {Elsevier}, VOLUME = {28}, ISBN = {0885-064X}, DOI = {10.1016/j.jco.2011.09.001}, YEAR = {2012}, PAGES = {162--176}, } @ARTICLE{GnewuchWW12, AUTHOR = {Gnewuch, Michael and Wahlstr{\"o}m, Magnus and Winzen, Carola}, JOURNAL = {SIAM Journal on Numerical Analysis}, TITLE = {A New Randomized Algorithm to Approximate the Star Discrepancy Based on Threshold Accepting}, ADDRESS = {Philadelphia, PA}, NUMBER = {2}, PUBLISHER = {SIAM}, MONTH = {April}, VOLUME = {50}, ISBN = {1095-7170}, DOI = {10.1137/110833865}, YEAR = {2012}, PAGES = {781--807}, NOTE = {Also available from arxiv.}, ABSTRACT = {We present a new algorithm for estimating the star discrepancy of arbitrary point sets. Similar to the algorithm for discrepancy approximation of Winker and Fang [SIAM J. Numer. Anal., 34 (1997), pp. 2028–2042] it is based on the optimization algorithm threshold accepting. Our improvements include, amongst others, a nonuniform sampling strategy, which is more suited for higher-dimensional inputs and additionally takes into account the topological characteristics of given point sets, and rounding steps which transform axis-parallel boxes, on which the discrepancy is to be tested, into critical test boxes. These critical test boxes provably yield higher discrepancy values and contain the box that exhibits the maximum value of the local discrepancy. We provide comprehensive experiments to test the new algorithm. Our randomized algorithm computes the exact discrepancy frequently in all cases where this can be checked (i.e., where the exact discrepancy of the point set can be computed in feasible time). Most importantly, in higher dimensions the new method behaves clearly better than all previously known methods.}, } @INCOLLECTION{GnewuchWW13, AUTHOR = {Doerr, Carola and Gnewuch, Michael and Wahlstr{\"o}m, Magnus}, EDITOR = {Chen, W.W.L. and Srivastav, A. and Travaglini, G.}, TITLE = {Calculation of Discrepancy Measures and Applications}, BOOKTITLE = {A Panorama of Discrepancy Theory}, CHAPTER = {Calculation of Discrepancy Measures and Applications}, ADDRESS = {New York, NY}, PUBLISHER = {Springer}, EDITION = {2013}, YEAR = {2013}, PAGES = {1--55}, NOTE = {To appear}, ABSTRACT = {In this book chapter we survey known approaches and algorithms to compute discrepancy measures of point sets. After providing an introduction which puts the calculation of discrepancy measures in a more general context, we focus on the geometric discrepancy measures for which computation algorithms have been designed. In particular, we explain methods to determine $L_2$-discrepancies and approaches to tackle the inherently difficult problem to calculate the star discrepancy of given sample sets. We also discuss in more detail three applications of algorithms to approximate discrepancies. }, } @ARTICLE{GoemansSkutella2004, AUTHOR = {Goemans, Michel X. and Skutella, Martin}, JOURNAL = {Journal of Algorithms}, TITLE = {Cooperative facility location games}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {2}, PUBLISHER = {Elsevier}, MONTH = {February}, VOLUME = {50}, ISBN = {0196-6774}, YEAR = {2004}, PAGES = {194--214}, ABSTRACT = {The location of facilities in order to provide service for customers is a well-studied problem in the operations research literature. In the basic model, there is a predefined cost for opening a facility and also for connecting a customer to a facility, the goal being to minimize the total cost. Often, both in the case of public facilities (such as libraries, municipal swimming pools, fire stations, ...) and private facilities (such as distribution centers, switching stations, ...), we may want to find a ‘fair’ allocation of the total cost to the customers—--this is known as the cost allocation problem. A central question in cooperative game theory is whether the total cost can be allocated to the customers such that no coalition of customers has any incentive to build their own facility or to ask a competitor to service them. We establish strong connections between fair cost allocations and linear programming relaxations for several variants of the facility location problem. In particular, we show that a fair cost allocation exists if and only if there is no integrality gap for a corresponding linear programming relaxation; this was only known for the simplest unconstrained variant of the facility location problem. Moreover, we introduce a subtle variant of randomized rounding and derive new proofs for the existence of fair cost allocations for several classes of instances. We also show that it is in general NP-complete to decide whether a fair cost allocation exists and whether a given allocation is fair.}, } @PROCEEDINGS{GoeseleEtal2003, AUTHOR = {Goesele, Michael and Kautz, Jan and Lang, Jochen and Lensch, Hendrik P. A. and Seidel, Hans-Peter}, EDITOR = {Sch{\"o}mer, Elmar and Reichel, Joachim and Warken, Thomas and Lennerz, Christian}, TITLE = {7th ACM Symposium on Solid Modeling and Applications; Tutorial T1: Geometric Algorithms for Planning and Simulation Tasks in Virtual Prototyping}, PADDRESS = {Saarbr{\"u}cken, Germany}, ADDRESS = {Saarbr{\"u}cken, Germany}, PUBLISHER = {Max-Planck-Institut f{\"u}r Informatik}, MONTH = {June}, VOLUME = {T1}, YEAR = {2002}, PAGES = {175}, } @ARTICLE{GoldbergMacKenziePhilipPatersonSrinivasan2000, AUTHOR = {Goldberg, Leslie Ann and MacKenzie, Philip D. and Paterson, Mike and Srinivasan, Aravind}, JOURNAL = {Journal of the ACM}, TITLE = {Contention resolution with constant expected delay}, ADDRESS = {New York, USA}, NUMBER = {6}, PUBLISHER = {ACM Press}, VOLUME = {42}, YEAR = {2000}, PAGES = {1048--1096}, } @ARTICLE{GolinRamanSchwarzSmidSIAMJCOMPUT1998, AUTHOR = {Golin, Mordecai J. and Raman, Rajeev and Schwarz, Christian and Smid, Michiel}, JOURNAL = {SIAM Journal on Computing}, TITLE = {Randomized Data Structures for the Dynamic Closest-Pair Problem}, NUMBER = {4}, PUBLISHER = {SIAM}, MONTH = {August}, VOLUME = {27}, ISBN = {0097-5397}, YEAR = {1998}, PAGES = {1036--1072}, } @ARTICLE{GolumbicMR06, AUTHOR = {Golumbic, Martin Charles and Mintz, Aviad and Rotics, Udi}, JOURNAL = {Discrete Applied Mathematics}, TITLE = {Factoring and recognition of read-once functions using cographs and normality and the readability of functions associated with partial k-trees}, NUMBER = {10}, VOLUME = {154}, YEAR = {2006}, PAGES = {1465--1477}, } @ARTICLE{Goodrich-Ramos97, AUTHOR = {Goodrich, Michael T. and Ramos, Edgar A.}, JOURNAL = {Discrete and Computational Geometry}, TITLE = {Bounded-independence derandomization of geometric partitioning with applications to parallel fixed-dimensional linear programming}, VOLUME = {18}, YEAR = {1997}, PAGES = {397--420}, } @ARTICLE{Govindarajan2007, AUTHOR = {Govindarajan, Sathish and Dietze, Michael C. and Agarwal, Pankaj K. and Clark, James S.}, JOURNAL = {Journal of Intellingent Information Systems}, TITLE = {A scalable algorithm for dispersing population}, ADDRESS = {Berlin, Germany}, NUMBER = {1}, PUBLISHER = {Springer}, VOLUME = {29}, ISBN = {0925-9902}, DOI = {10.1007/s10844-006-0030-z}, YEAR = {2008}, PAGES = {39--61}, ABSTRACT = {Models of forest ecosystems are needed to understand how climate and land-use change can impact biodiversity. In this paper we describe an ecological dispersal model developed for the specific case of predicting seed dispersal by trees on a landscape for use in a forest simulation model. We present efficient approximation algorithms for computing seed dispersal. These algorithms allow us to simulate large landscapes for long periods of time. We also present experimental results that (1) quantify the inherent uncertainty in the dispersal model and (2) describe the variation of the approximation error as a function of the approximation parameters. Based on these experiments, we provide guidelines for choosing the right approximation parameters, for a given model simulation. }, } @INPROCEEDINGS{GPFOGA11, AUTHOR = {Durrett, Greg and Neumann, Frank and O'Reilly, Una-May}, EDITOR = {Beyer, Hans- Georg and Langdon, William}, TITLE = {Computational complexity analysis of simple genetic programming on two problems modeling isolated program semantics}, BOOKTITLE = {FOGA'11 : Proceedings of the 2011 ACM/SIGEVO Foundations of Genetic Algorithms XI}, PADDRESS = {New York, NY}, ADDRESS = {Schwarzenberg, Austria}, PUBLISHER = {ACM}, ISBN = {978-1-4503-0633-1}, DOI = {10.1145/1967654.1967661}, YEAR = {2011}, PAGES = {69--80}, } @INPROCEEDINGS{Graphlets, AUTHOR = {Shervashidze, Nino and Vishwanathan, S .V. N. and Petri, Tobias H. and Mehlhorn, Kurt and Borgwardt, Karsten M.}, EDITOR = {van Dyk, David and Welling, Max}, TITLE = {Efficient Graphlet Kernels for Large Graph Comparison}, BOOKTITLE = {Proceedings of the Twelfth International Conference on Artificial Intelligence and Statistics (AISTATS)}, PADDRESS = {Cambridge, MA}, ADDRESS = {Clearwater Beach, Florida, USA}, PUBLISHER = {CSAIL}, SERIES = {JMLR: Workshop and Conference Proceedings}, VOLUME = {5}, YEAR = {2009}, PAGES = {488--495}, } @INPROCEEDINGS{Grove-et-al-1-95a, AUTHOR = {Awerbuch, Baruch and Azar, Yossi and Grove, Edward and Kao, Ming-Yang and Krishnan, P. and Vitter, Jeffrey Scott}, TITLE = {Load Balancing in the Euclidean Norm}, BOOKTITLE = {36th Annual Symposium on Foundations of Computer Science}, PADDRESS = {Los Alamitos}, ADDRESS = {Milwaukee, Wisconsin, USA}, PUBLISHER = {IEEE}, YEAR = {1995}, PAGES = {383--391}, } @INPROCEEDINGS{Grove-et-al-1-95b, AUTHOR = {Chian, Yi-Feng and Goodrich, Michael T. and Grove, Edward and Tamassia, Roberto and Vengroff, Darren Erik and Vitter, Jeffrey Scott}, TITLE = {External-Memory Graph Algorithms}, BOOKTITLE = {6th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA95)}, PADDRESS = {New York}, ADDRESS = {San Francisco, California, USA}, PUBLISHER = {acm-Press}, YEAR = {1995}, PAGES = {139--149}, } @INPROCEEDINGS{Grove-et-al-2-95, AUTHOR = {Barve, Rakesh D. and Grove, Edward and Vitter, Jeffrey Scott}, TITLE = {An Application-Controlled Paging Algorithm for a Shared Cache}, BOOKTITLE = {36th Annual Symposium on Foundations of Computer Science}, PADDRESS = {Los Alamitos}, ADDRESS = {Milwaukee, Wisconsin, USA}, PUBLISHER = {IEEE}, YEAR = {1995}, PAGES = {204--213}, } @INPROCEEDINGS{Grove-et-al95, AUTHOR = {Grove, Edward and Kao, Ming-Yang and Krishnan, P. and Vitter, Jeffrey Scott}, EDITOR = {Akl, Selim G. and Dehne, Frank and Sack, J{\"o}rg-R{\"u}diger and Santoro, Nicola}, TITLE = {Online Perfect Matching and Mobile Computing}, BOOKTITLE = {Algorithms and Data Structures: 4th International Workshop (WADS95)}, PADDRESS = {Berlin}, ADDRESS = {Kingston, Canada}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {955}, YEAR = {1995}, PAGES = {194--205}, } @INPROCEEDINGS{Grove95, AUTHOR = {Grove, Edward}, TITLE = {On-line Bin Packing with Lookahead}, BOOKTITLE = {6th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA95)}, PADDRESS = {New York}, ADDRESS = {San Francisco, California, USA}, PUBLISHER = {acm-Press}, YEAR = {1995}, PAGES = {430--436}, } @INPROCEEDINGS{GSV, AUTHOR = {Garg, Naveen}, TITLE = {A 3-approximation for the minimum tree spanning with k-vertices}, BOOKTITLE = {Foundations of computer science (FOCS-96) : 37th annual symposium}, PADDRESS = {Los Alamitos, USA}, ADDRESS = {Burlington, USA}, PUBLISHER = {IEEE}, YEAR = {1996}, PAGES = {302--309}, } @INPROCEEDINGS{GuentherKM2010, AUTHOR = {G{\"u}nther, Elisabeth and K{\"o}nig, Felix and Megow, Nicole}, EDITOR = {Bampis, Evripidis and Jansen, Klaus}, TITLE = {Scheduling and Packing Malleable Tasks with Precedence Constraints of Bounded Width}, BOOKTITLE = {Approximation and Online Algorithms : 7th International Workshop, WAOA 2009}, PADDRESS = {Berlin}, ADDRESS = {Copenhagen, Denmark}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5893}, ISBN = {978-3-642-12449-5}, DOI = {10.1007/978-3-642-12450-1_16}, YEAR = {2010}, PAGES = {170--181}, } @MASTERSTHESIS{Guillaume97, AUTHOR = {Guillaume, Frank}, TITLE = {{Praktisches Paralleles Paralleles List Ranking}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, YEAR = {1997}, } @INPROCEEDINGS{Gunopulos-et-al97, AUTHOR = {Gunopulos, Dimitrios and Mannila, Heikki and Saluja, Sanjeev}, EDITOR = {Afrati, Foto and Kolaitis, Photokion}, TITLE = {Discovering all most specific sentences by randomized algorithms}, BOOKTITLE = {Proceedings of the 6th International Conference on Database Theory (ICDT-97)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Delphi, Greece}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1186}, YEAR = {1997}, PAGES = {215--229}, } @INPROCEEDINGS{Gupta-et-al95, AUTHOR = {Gupta, Prosenjit and Janardan, Ravi and Smid, Michiel and Dasgupta, Bhaskar}, TITLE = {The rectangle enclosure and point-dominance problems revisited}, BOOKTITLE = {11th Annual ACM Symposium on Computing Geometry}, PADDRESS = {-}, ADDRESS = {-}, PUBLISHER = {-}, YEAR = {1995}, PAGES = {162--171}, } @ARTICLE{Gupta-Janardan-Smid-1-95, AUTHOR = {Gupta, Prosenjit and Janardan, Ravi and Smid, Michiel}, JOURNAL = {Journal of Algorithms}, TITLE = {Further results on generalized intersection searching problems: counting, reporting, and dynamization}, NUMBER = {2}, PUBLISHER = {Academic Press}, VOLUME = {19}, ISBN = {0196-6774}, YEAR = {1995}, PAGES = {282--317}, } @INPROCEEDINGS{Gupta-Janardan-Smid-2-95, AUTHOR = {Gupta, Prosenjit and Janardan, Ravi and Smid, Michiel}, TITLE = {The rectangle enclosure and point-dominance problems revisited}, BOOKTITLE = {11th Annual !CM Symposium on Computational Geometry}, PADDRESS = {New York}, ADDRESS = {Vancouver, British Columbia, Canada}, PUBLISHER = {acm-Press}, YEAR = {1995}, PAGES = {162--171}, } @ARTICLE{GuptaJanardanSmid96a-1, AUTHOR = {Gupta, Prosenjit and Janardan, Ravi and Smid, Michiel}, JOURNAL = {Computational Geometry}, TITLE = {Algorithms for generalized halfspace range searching and other intersection searching problems}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {6}, PUBLISHER = {Elsevier}, VOLUME = {5}, ISBN = {0925-7721}, YEAR = {1996}, PAGES = {321--340}, ABSTRACT = {In a generalized intersection searching problem, a set S of colored geometric objects is to be preprocessed so that, given a query object q, the distinct colors of the objects of S that are intersected by q can be reported or counted efficiently. These problems generalize the well-studied standard intersection searching problems and have many applications. Unfortunately, the solutions known for the standard problems do not yield efficient solutions to the generalized problems. Recently, efficient solutions have been given for generalized problems where the input and query objects are iso-oriented (i.e., axes-parallel) or where the color classes satisfy additional properties (e.g., connectedness). In this paper, efficient algorithms are given for several generalized problems involving objects that are not necessarily iso-oriented. These problems include: generalized halfspace range searching in , for any fixed d ≥ 2, and segment intersection searching, triangle stabbing, and triangle range searching in for certain classes of line segments and triangles. The techniques used include: computing suitable sparse representations of the input, persistent data structures, and filtering search. }, } @ARTICLE{GuptaJanardanSmid96a-2, AUTHOR = {Gupta, Prosenjit and Janardan, Ravi and Smid, Michiel}, JOURNAL = {Computational Geometry}, TITLE = {Algorithms for generalized halfspace range searching and other intersection searching problems}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {1}, PUBLISHER = {Elsevier}, VOLUME = {6}, ISBN = {0925-7721}, YEAR = {1996}, PAGES = {1--19}, ABSTRACT = {In a generalized intersection searching problem, a set S of colored geometric objects is to be preprocessed so that, given a query object q, the distinct colors of the objects of S that are intersected by q can be reported or counted efficiently. These problems generalize the well-studied standard intersection searching problems and have many applications. Unfortunately, the solutions known for the standard problems do not yield efficient solutions to the generalized problems. Recently, efficient solutions have been given for generalized problems where the input and query objects are iso-oriented (i.e., axes-parallel) or where the color classes satisfy additional properties (e.g., connectedness). In this paper, efficient algorithms are given for several generalized problems involving objects that are not necessarily iso-oriented. These problems include: generalized halfspace range searching in , for any fixed d ≥ 2, and segment intersection searching, triangle stabbing, and triangle range searching in for certain classes of line segments and triangles. The techniques used include: computing suitable sparse representations of the input, persistent data structures, and filtering search. }, } @ARTICLE{GuptaJanardanSmid96b, AUTHOR = {Gupta, Prosenjit and Janardan, Ravi and Smid, Michiel}, JOURNAL = {Computational Geometry}, TITLE = {Fast algorithms for collision and proximity problems involving moving geometric objects}, ADDRESS = {Amsterdam, The Netherlands}, PUBLISHER = {Elsevier}, VOLUME = {6}, ISBN = {0925-7721}, YEAR = {1996}, PAGES = {371--391}, } @ARTICLE{GuptaJanardanSmid99, AUTHOR = {Gupta, Prosenjit and Janardan, Ravi and Smid, Michiel}, JOURNAL = {Information Processing Letters}, TITLE = {Efficient algorithms for counting and reporting pairwise intersections between convex polygons}, NUMBER = {1}, MONTH = {January}, VOLUME = {69}, YEAR = {1999}, PAGES = {7--13}, } @ARTICLE{GuptaJanardanSmidDasgupta1997, AUTHOR = {Gupta, Prosenjit and Janardan, Ravi and Smid, Michiel and Dasgupta, Bhaskar}, JOURNAL = {International Journal of Computational Geometry and Applications}, TITLE = {The rectangle enclosure and point-dominance problems revisited}, NUMBER = {5}, VOLUME = {7}, YEAR = {1997}, PAGES = {437--456}, } @INPROCEEDINGS{GuptaKallerMahajanShermer96, AUTHOR = {Gupta, Arvind and Kaller, Damon and Mahajan, Sanjeev and Shermer, Thomas C.}, EDITOR = {Karlsson, Rolf and Lingas, Andrzej}, TITLE = {Vertex partitioning problems on partial k-trees}, BOOKTITLE = {Algorithm Theory - SWAT'96: 5th Scandinavian Workshop on Algorithm Theory}, PADDRESS = {Berlin}, ADDRESS = {Reykjavik, Iceland}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1097}, YEAR = {1996}, PAGES = {161--172}, } @ARTICLE{GuptaMahajan1997, AUTHOR = {Gupta, Arvind and Mahajan, Sanjeev}, JOURNAL = {Computational Complexity}, TITLE = {Using amplification to compute majority with small majority gates}, NUMBER = {1}, VOLUME = {6}, YEAR = {1997}, PAGES = {46--63}, } @ARTICLE{Gurvich77, AUTHOR = {Gurvich, Vladimir}, JOURNAL = {Uspekhi Mat. Nauk. (Russian Math. Surveys)}, TITLE = {On repetition-free Boolean functions}, VOLUME = {32}, YEAR = {1977}, PAGES = {183--184}, NOTE = {(in Russian)}, } @ARTICLE{Gurvich91, AUTHOR = {Gurvich, Vladimir}, JOURNAL = {Soviet Math. Dokl.}, TITLE = {Criteria for repetition-freeness of functions in the algebra of logic}, NUMBER = {3}, VOLUME = {43}, YEAR = {1991}, PAGES = {721--726}, } @MASTERSTHESIS{Gutwenger1999, AUTHOR = {Gutwenger, Carsten}, TITLE = {{Design und Implementierung einer Algorithmen-Bibliothek zum Zeichnen von Graphen}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {May}, YEAR = {1999}, } @INPROCEEDINGS{GutwengerMutzel1998, AUTHOR = {Gutwenger, Carsten and Mutzel, Petra}, EDITOR = {Whitesides, Sue H.}, TITLE = {Planar Polyline Drawings with Good Angular Resolution}, BOOKTITLE = {Proceedings of the 6th International Symposium on Graph Drawing (GD-98)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Montreal, Canada}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1547}, ISBN = {3-540-65473-9}, YEAR = {1998}, PAGES = {167--182}, } @INPROCEEDINGS{h-cap-01, AUTHOR = {Hert, Susan}, TITLE = {Connected Area Partitioning}, BOOKTITLE = {Proceedings of the 17th European Workshop on Computational Geometry (CG-01)}, TYPE = {Extended Abstract}, PADDRESS = {Berlin, Germany}, ADDRESS = {Berlin, Germany}, PUBLISHER = {Freie Universit{\"a}t Berlin}, MONTH = {March}, YEAR = {2001}, PAGES = {35--38}, ABSTRACT = {We present an algorithm to solve the following polygon partitioning problem, which is motivated by a terrain-covering application in robotics: Given a simply connected polygon $\cal P$ and values \subrange{a}{1}{p+1} such that $\sum_{i = 1}^{p+1} a_i = Area({\cal P})$, find a partitioning of $\cal P$ into $p+1$ polygons \subrange{P}{1}{p+1} such that $Area(P_i) = a_i$ for all $i$ and polygon $P_{p+1}$ is connected to each of the other polygons. The algorithm we present runs in $O(n + q \log q + pn)$ time for a polygon with $n$ vertices that has been partitioned into $q$ convex pieces.}, } @MASTERSTHESIS{Hachenberger1999, AUTHOR = {Hachenberger, Peter}, TITLE = {Dynamic shortest Path Algorithms for Planar and Outerplanar Graphs}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {August}, YEAR = {1999}, } @INPROCEEDINGS{HachenbergerKettner2005Nef, AUTHOR = {Hachenberger, Peter and Kettner, Lutz}, EDITOR = {Kobbelt, Leif and Shapiro, Vadim}, TITLE = {Boolean Operations on 3D Selective {Nef} Complexes: Optimized Implementation and Experiments}, BOOKTITLE = {ACM Symposium on Solid and Physical Modeling (SPM 2005)}, ORGANIZATION = {Association for Computing Machinery (ACM)}, PADDRESS = {New York, USA}, ADDRESS = {Cambridge, MA, USA}, PUBLISHER = {ACM}, MONTH = {June}, ISBN = {1-59593-015-9}, YEAR = {2005}, PAGES = {163--174}, ABSTRACT = {Nef polyhedra in $d$-dimensional space are the closure of half-spaces under boolean set operation. In consequence, they can represent non-manifold situations, open and closed sets, mixed-dimensional complexes and they are closed under all boolean and topological operations, such as complement and boundary. They were introduced by W. Nef in his seminal 1978 book on polyhedra. We presented in previous work a new data structure for the boundary representation of three-dimensional Nef polyhedra with efficient algorithms for boolean operations. These algorithms were designed for correctness and can handle all cases, in particular all \emph{degeneracies}. To this extent we rely on exact arithmetic to avoid well known problems with floating-point arithmetic. In this paper, we present important optimizations for the algorithms. We describe the chosen implementations for the point-location and the intersection-finding subroutines, a kd-tree and a fast box-intersection algorithm, respectively. We evaluate this optimized implementation with extensive experiments that supplement the runtime analysis from our previous paper and that illustrate the effectiveness of our optimizations. We compare our implementation with the \textsc{Acis} CAD kernel and demonstrate the power and cost of the exact arithmetic in near-degenerate situations. The implementation was released as Open Source in the \textsc{Cgal} release 3.1 in December 2004.}, } @INPROCEEDINGS{Hagedoorn2000:nvpapm, AUTHOR = {Hagedoorn, Michiel and Overmars, Mark H. and Veltkamp, Remco}, EDITOR = {Borgefors, G and Nystrom, I and Sanniti di Baja, G}, TITLE = {A New Visibility Partition for Affine Pattern Matching}, BOOKTITLE = {Discrete Geometry for Computer Imagery, Proceedings of the 9th International Conference (DGCI-00)}, ORGANIZATION = {Swedish Society for Automated Image Analysis, International Association for Pattern Recognition}, PADDRESS = {Berlin, Germany}, ADDRESS = {Uppsala, Sweden}, PUBLISHER = {Springer}, MONTH = {December}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1953}, ISBN = {0302-9743}, YEAR = {2000}, PAGES = {358--370}, } @INPROCEEDINGS{Hagedoorn2003:nncbfe, AUTHOR = {Hagedoorn, Michiel}, EDITOR = {Calvanese, Diego and Lenzerini, Maurizio and Motwani, Rajeev}, TITLE = {Nearest Neighbors Can Be Found Efficiently If the Dimension Is Small Relative to the Input Size}, BOOKTITLE = {Database Theory - ICDT 2003 : 9th International Conference}, PADDRESS = {New York, USA}, ADDRESS = {Siena, Italy}, PUBLISHER = {Springer}, MONTH = {January}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {2572}, ISBN = {3-540-00323-1}, YEAR = {2003}, PAGES = {440--454}, } @ARTICLE{Hagerup-1-95, AUTHOR = {Hagerup, Torben}, JOURNAL = {Information and Computation}, TITLE = {A Lower Bound for the Emulation of PRAM Memories on Processor Networks}, NUMBER = {1}, PUBLISHER = {Academic Press}, VOLUME = {119}, ISBN = {0890-5401}, YEAR = {1995}, PAGES = {124--128}, } @ARTICLE{Hagerup-2-95, AUTHOR = {Hagerup, Torben}, JOURNAL = {Journal of Algorithms}, TITLE = {Fast Deterministic Processor Allocation}, NUMBER = {3}, PUBLISHER = {Academic Press}, VOLUME = {18}, ISBN = {0196-6774}, YEAR = {1995}, PAGES = {629--649}, } @ARTICLE{Hagerup-3-95, AUTHOR = {Hagerup, Torben}, JOURNAL = {Information Processing Letters}, TITLE = {The Parallel Complexity of Integer Prefix Summation}, NUMBER = {1}, PUBLISHER = {Elsevier}, VOLUME = {56}, ISBN = {0020-0190}, YEAR = {1995}, PAGES = {59--64}, } @ARTICLE{Hagerup-97b, AUTHOR = {Hagerup, Torben}, JOURNAL = {Journal of Parallel and Distributed Computing}, TITLE = {Allocating Independent Tasks to Parallel Processors: An Experimental Study}, NUMBER = {2}, VOLUME = {47}, YEAR = {1997}, PAGES = {185--197}, } @INPROCEEDINGS{Hagerup-et-al-1-95, AUTHOR = {Andersson, Arne and Hagerup, Torben and Nilsson, Stefan and Raman, Rajeev}, TITLE = {Sorting in Linear Time?}, BOOKTITLE = {27th Annual ACM Symposium on Theory of Computing (STOC95)}, PADDRESS = {New York}, ADDRESS = {Las Vegas, Nevada, USA}, PUBLISHER = {acm-Press}, YEAR = {1995}, PAGES = {427--436}, } @INPROCEEDINGS{Hagerup-et-al-1-96, AUTHOR = {Hagerup, Torben}, EDITOR = {Ferreira, Afonso and Rolim, Jos{\'e} and Saad, Youssef and Yang, Tao}, TITLE = {Allocating Independent Tasks to Parallel Processors: An Experimental Study}, BOOKTITLE = {Parallel Algorithms for Irregularly Structured Problems: 3rd International Workshop (IRREGULAR'96)}, PADDRESS = {Berlin}, ADDRESS = {Santa Barbara}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1117}, YEAR = {1996}, PAGES = {1--33}, } @INPROCEEDINGS{Hagerup-et-al-2-95, AUTHOR = {Hagerup, Torben and Katajainen, Jyrki and Nishimura, Naomi and Ragde, Prabhakar}, TITLE = {Characterizations of k-Terminal Flow Networks and Computing Network Flows in Partial k-Trees}, BOOKTITLE = {6th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA95)}, PADDRESS = {New York}, ADDRESS = {San Francisco, California, USA}, PUBLISHER = {asm-Press}, YEAR = {1995}, PAGES = {641--649}, } @INPROCEEDINGS{Hagerup-et-al95, AUTHOR = {Berthom{\'e}, P. and Duboux, T. and Hagerup, Torben and Newman, I. and Schuster, Assaf}, EDITOR = {Spirakis, Paul}, TITLE = {Self-Simulation for the Passive Optical Star Model}, BOOKTITLE = {Algorithms-ESA'95: 3rd Annual European Symposium}, PADDRESS = {Berlin}, ADDRESS = {Corfu, Greece}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {979}, YEAR = {1995}, PAGES = {268--380}, } @ARTICLE{Hagerup-et-al97, AUTHOR = {Dietzfelbinger, Martin and Hagerup, Torben and Katajainen, Jyrki and Penttonen, Martti}, JOURNAL = {Journal of Algorithms}, TITLE = {A reliable randomized algorithm for the closest-pair problem}, NUMBER = {1}, VOLUME = {25}, YEAR = {1997}, PAGES = {19--51}, } @ARTICLE{Hagerup-Keller95, AUTHOR = {Hagerup, Torben and Keller, J{\"o}rg}, JOURNAL = {Parallel Processing Letters}, TITLE = {Fast Parallel Permutation Algorithms}, NUMBER = {2}, VOLUME = {5}, YEAR = {1995}, PAGES = {139--148}, } @ARTICLE{Hagerup-Kutylowski97, AUTHOR = {Hagerup, Torben and Kutylowski, Miroslaw}, JOURNAL = {Algorithmica}, TITLE = {Fast integer merging on the EREW PRAM}, VOLUME = {17}, YEAR = {1997}, PAGES = {55--66}, } @ARTICLE{Hagerup00, AUTHOR = {Hagerup, Torben}, JOURNAL = {Information and Computation}, TITLE = {Parallel preprocessing for path queries without concurrent reading}, ADDRESS = {San Diego, USA}, NUMBER = {1}, PUBLISHER = {Academic Press}, MONTH = {April}, VOLUME = {158}, ISBN = {0890-5401}, YEAR = {2000}, PAGES = {18--28}, } @ARTICLE{Hagerup2000a, AUTHOR = {Hagerup, Torben}, JOURNAL = {Algorithmica}, TITLE = {Dynamic algorithms for graphs of bounded treewidth}, ADDRESS = {New York, USA}, NUMBER = {3/4}, PUBLISHER = {Springer}, VOLUME = {27}, ISBN = {0178-4617}, YEAR = {2000}, PAGES = {292--315}, ABSTRACT = {The formalism of monadic second-order (MS) logic has been very successful in unifying a large number of algorithms for graphs of bounded treewidth. We extend the elegant framework of MS logic from static problems to dynamic problems, in which queries about MS properties of a graph of bounded treewidth are interspersed with updates of vertex and edge labels. This allows us to unify and occasionally strengthen a number of scattered previous results obtained in an ad hoc manner and to enable solutions to a wide range of additional problems to be derived automatically. As an auxiliary result of independent interest, we dynamize a data structure of Chazelle for answering queries about products of labels along paths in a tree with edges labeled by elements of a semigroup.}, } @INPROCEEDINGS{Hagerup97a, AUTHOR = {Hagerup, Torben}, EDITOR = {Degano, Pierpaolo and Gorrieri, Roberto and Marchetti-Spaccamela, Alberto}, TITLE = {Dynamic algorithms for graphs of bounded treewidth}, BOOKTITLE = {Proceedings of the 24th International Colloquium on Automata, Languages, and Programming (ICALP-97)}, PADDRESS = {Berlin}, ADDRESS = {Bologna, Italy}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1256}, YEAR = {1997}, PAGES = {292--302}, } @INPROCEEDINGS{Hagerup98, AUTHOR = {Hagerup, Torben}, EDITOR = {Morvan, Michel and Meinel, Christoph and Krob, Daniel}, TITLE = {Sorting and Searching on the Word RAM}, BOOKTITLE = {Proceedings of the 15th Annual Symposium on Theoretical Aspects of Computer Science (STACS-98)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Paris, France}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1373}, ISBN = {3-540-64230-7}, YEAR = {1998}, PAGES = {366--398}, } @INPROCEEDINGS{HagerupICAL98, AUTHOR = {Hagerup, Torben}, EDITOR = {Larsen, Kim G. and Skyum, Sven}, TITLE = {Simpler and Faster Dictionaries on the AC° RAM}, BOOKTITLE = {Proceedings of the 25th International Colloquium on Automata, Languages and Programming (ICALP-98)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Aalborg, Denmark}, PUBLISHER = {Springer}, MONTH = {July}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1443}, ISBN = {0302-9743}, YEAR = {1998}, PAGES = {79--90}, } @INPROCEEDINGS{HagSanTra98, AUTHOR = {Hagerup, Torben and Sanders, Peter and Tr{\"a}ff, Jesper Larsson}, EDITOR = {Mehlhorn, Kurt}, TITLE = {An Implementation of the Binary Blocking Flow Algorithm}, BOOKTITLE = {Proceedings of the 2nd Workshop on Algorithm Engineering (WAE-98)}, PADDRESS = {Saarbr{\"u}cken, Germany}, ADDRESS = {Saarbr{\"u}cken, Germany}, NUMBER = {MPI-I-98-1-019}, PUBLISHER = {Max-Planck-Institut f{\"u}r Informatik}, MONTH = {August}, YEAR = {1998}, PAGES = {143--154}, } @INPROCEEDINGS{HaJaPS11, AUTHOR = {Harren, Rolf and Jansen, Klaus and Pr{\"a}del, Lars and van Stee, Rob}, EDITOR = {Dehne, Frank and Iacono, John and Sack, J{\"o}rg-R{\"u}diger}, TITLE = {A (5/3 + $\varepsilon$)-Approximation for Strip Packing}, BOOKTITLE = {Algorithms and Data Structures : 12th International Symposium, WADS 2011}, PADDRESS = {New York, NY}, ADDRESS = {New York, NY}, PUBLISHER = {Springer}, MONTH = {August}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6844}, ISBN = {978-3-642-22299-3}, DOI = {10.1007/978-3-642-22300-6_40}, YEAR = {2011}, PAGES = {475--487}, ABSTRACT = {We study strip packing, which is one of the most classical two-dimensional packing problems: given a collection of rectangles, the problem is to find a feasible orthogonal packing without rotations into a strip of width $1$ and minimum height. In this paper we present an approximation algorithm for the strip packing problem with absolute approximation ratio of $5/3+\eps$ for any $\eps>0$. This result significantly narrows the gap between the best known upper bound and the lower bound of $3/2$; previously, the best upper bound was $1.9396$ due to Harren and van Stee.}, } @INPROCEEDINGS{HallHipplerSkutella2003, AUTHOR = {Hall, Alex and Hippler, Steffen and Skutella, Martin}, EDITOR = {Baeten, Jos C.M. and Lenstra, Jan Karel and Parrow, Joachim and Woeginger, Gerhard J.}, TITLE = {Multicommodity Flows Over Time: Efficient Algorithms and Complexity}, BOOKTITLE = {Automata, languages and programming : 30th International Colloquium, ICALP 2003}, PADDRESS = {Berlin, Germany}, ADDRESS = {Eindhoven, The Netherlands}, PUBLISHER = {Springer}, MONTH = {June}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {2719}, ISBN = {3-540-40493-7}, YEAR = {2003}, PAGES = {397--409}, ABSTRACT = { Flow variation over time is an important feature in network flow problems arising in various applications such as road or air traffic control, production systems, communication networks (e.g., the Internet), and financial flows. The common characteristic are networks with capacities and transit times on the arcs which specify the amount of time it takes for flow to travel through a particular arc. Moreover, in contrast to static flow problems, flow values on arcs may change with time in these networks. While the `maximum $s$-$t$-flow over time' problem can be solved efficiently and `min-cost flows over time' are known to be NP-hard, the complexity of (fractional) `multicommodity flows over time' has been open for many years. We prove that this problem is NP-hard, even for series-parallel networks, and present new and efficient algorithms under certain assumptions on the transit times or on the network topology. As a result, we can draw a complete picture of the complexity landscape for flow over time problems.}, } @INPROCEEDINGS{HallLangkauSkutella2003, AUTHOR = {Hall, Alex and Langkau, Katharina and Skutella, Martin}, EDITOR = {Arora, Sanjeev and Jansen, Klaus and Rolim, Jose D. P. and Sahai, Amit}, TITLE = {An FPTAS for Quickest Multicommodity Flows with Inflow-Dependent Transit Times}, BOOKTITLE = {Approximation, Randomization, and Combinatorial Optimization : Algorithms and Techniques ; 6th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems, APPROX 2003 and 7th International Workshop on Randomization and Approximation Techniques in Computer Science, RANDOM 2003}, PADDRESS = {Berlin, Germany}, ADDRESS = {Princeton, USA}, PUBLISHER = {Springer}, MONTH = {August}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {2764}, ISBN = {3-540-40770-7}, YEAR = {2003}, PAGES = {71--82}, ABSTRACT = { Given a network with capacities and transit times on the arcs, the quickest flow problem asks for a `flow over time' that satisfies given demands within minimal time. In the setting of flows over time, flow on arcs may vary over time and the transit time of an arc is the time it takes for flow to travel through this arc. In most real-world applications (such as, e.g., road traffic, communication networks, production systems, etc.), transit times are not fixed but depend on the current flow situation in the network. We consider the model where the transit time of an arc is given as a nondecreasing function of the rate of inflow into the arc. We prove that the quickest $s$-$t$-flow problem is NP-hard in this setting and give various approximation results, including an FPTAS for the quickest multicommodity flow problem with bounded cost.}, } @MASTERSTHESIS{Hammerschmidt1999, AUTHOR = {Hammerschmidt, Frank}, TITLE = {{Konzeption und Entwicklung des streng strukturierten und erweiterbaren Datentyps html_page f{\"u}r LEDA}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {November}, YEAR = {1999}, } @INPROCEEDINGS{Happ2008, AUTHOR = {Doerr, Benjamin and Happ, Edda and Klein, Christian}, EDITOR = {Ryan, Conor and Keijzer, Maarten}, TITLE = {Crossover Can Provably be Useful in Evolutionary Computation}, BOOKTITLE = {Genetic and Evolutionary Computation Conference 2008}, ORGANIZATION = {Association for Computing Machinery (ACM)}, PADDRESS = {New York, USA}, ADDRESS = {Atlanta, USA}, PUBLISHER = {ACM}, SERIES = {Proceedings of the 10th annual conference on Genetic and evolutionary computation}, ISBN = {978-1-60558-130-9}, YEAR = {2008}, PAGES = {539--546}, NOTE = {Best paper award}, } @INPROCEEDINGS{HappJohannsenKleinNeumann2008a, AUTHOR = {Happ, Edda and Johannsen, Daniel and Klein, Christian and Neumann, Frank}, EDITOR = {Ryan, Conor and Keijzer, Maarten}, TITLE = {Rigorous Analyses of Fitness-Proportional Selection for Optimizing Linear Functions}, BOOKTITLE = {Genetic and Evolutionary Computation Conference 2008}, ORGANIZATION = {Association for Computing Machinery (ACM)}, PADDRESS = {New York, USA}, ADDRESS = {Atlanta, USA}, PUBLISHER = {ACM}, ISBN = {978-1-60558-130-9}, DOI = {http://doi.acm.org/10.1145/1389095.1389277}, YEAR = {2008}, PAGES = {953--960}, ABSTRACT = {Rigorous runtime analyses of evolutionary algorithms (EAs) mainly investigate algorithms that use elitist selection methods. Two algorithms commonly studied are Randomized Local Search (RLS) and the (1+1)~EA and it is well known that both optimize any linear pseudo-Boolean function on $n$ bits within an expected number of $\ensuremath{{O}}(n \log n)$ fitness evaluations. In this paper, we analyze variants of these algorithms that use fitness proportional selection. A well-known method in analyzing the local changes in the solutions of RLS is a reduction to the gambler's ruin problem. We extend this method in order to analyze the global changes imposed by the (1+1)~EA. By applying this new technique we show that with high probability using fitness proportional selection leads to an exponential optimization time for any linear pseudo-Boolean function with non-zero weights. Even worse, all solutions of the algorithms during an exponential number of fitness evaluations differ with high probability in linearly many bits from the optimal solution. Our theoretical studies are complemented by experimental investigations which confirm the asymptotic results on realistic input sizes.}, } @PHDTHESIS{HappPhD2009, AUTHOR = {Happ, Edda}, TITLE = {Analyses of Evolutionary Algorithms}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Doctoral dissertation}, ADDRESS = {Saarbr{\"u}cken}, PUBLISHER = {Universit{\"a}t des Saarlandes}, YEAR = {2009}, } @ARTICLE{Hariharan-et-al95, AUTHOR = {Cole, Richard and Hariharan, Ramesh and Paterson, Mike and Zwick, Uri}, JOURNAL = {SIAM Journal on Computing}, TITLE = {Tighter Lower Bounds on the Exact Complexity of String Matching}, NUMBER = {1}, PUBLISHER = {Society for Industrial and Applied Mathematics}, VOLUME = {24}, ISBN = {0097-5397}, YEAR = {1995}, PAGES = {30--45}, } @ARTICLE{Hariharan-Kapoor95, AUTHOR = {Hariharan, Ramesh and Kapoor, Sanjiv}, JOURNAL = {SIAM Journal on Computing}, TITLE = {Algorithms for Enumerating all Spanning Trees of an Undirected Graph}, NUMBER = {2}, PUBLISHER = {Society for Industrial and Applied Mathematics}, VOLUME = {24}, ISBN = {0097-5397}, YEAR = {1995}, PAGES = {247--265}, } @INPROCEEDINGS{Hariharan-Kelsen-Mahajan96, AUTHOR = {Hariharan, Ramesh and Kelsen, Pierre and Mahajan, Sanjeev}, EDITOR = {Karlsson, Rolf and Lingas, Andrzej}, TITLE = {Coloring 2-colorable hypergraphs with a sublinear number of colors}, BOOKTITLE = {Scandinavian Workshop on Algorithm Theory (SWAT96)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Reykjavik, Iceland}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1097}, YEAR = {1996}, PAGES = {41--52}, } @INPROCEEDINGS{Hariharan-Mahajan95, AUTHOR = {Hariharan, Ramesh and Mahajan, Sanjeev}, TITLE = {Derandomizing semidefinite programming based approximation algorithms}, BOOKTITLE = {36th IEEE Symposium on Foundations of Computer Science}, PADDRESS = {-}, ADDRESS = {-}, PUBLISHER = {-}, YEAR = {1995}, PAGES = {162--16}, } @ARTICLE{Hariharan-Muthukrishnan95, AUTHOR = {Hariharan, Ramesh and Muthukrishnan, S.}, JOURNAL = {Information and Computation}, TITLE = {String Matching over a General Matching Relation}, NUMBER = {1}, PUBLISHER = {Academic Press}, VOLUME = {122}, ISBN = {0890-5401}, YEAR = {1995}, PAGES = {140--148}, } @INPROCEEDINGS{HarKer11, AUTHOR = {Harren, Rolf and Kern, Walter}, EDITOR = {Solis-Oba, Roberto and Persiano, Giuseppe}, TITLE = {Improved Lower Bound for Online Strip Packing}, BOOKTITLE = {Approximation and Online Algorithms : 9th International Workshop ,WAOA 2011}, PADDRESS = {Berlin}, ADDRESS = {Saarbruecken, Germany}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {7164}, ISBN = {978-3-642-29115-9}, DOI = {10.1007/978-3-642-29116-6_18}, YEAR = {2012}, PAGES = {211--218}, } @ARTICLE{HarksHKS2013, AUTHOR = {Harks, Tobias and Hoefer, Martin and Klimm, Max and Skopalik, Alexander}, JOURNAL = {Mathematical Programming}, TITLE = {Computing Pure Nash and Strong Equilibria in Bottleneck Congestion Games}, NUMBER = {1-2}, VOLUME = {141}, YEAR = {2013}, PAGES = {193--215}, } @INPROCEEDINGS{Harren2006a, AUTHOR = {Harren, Rolf}, EDITOR = {Bugliesi, M. and Preneel, B. and Sassone, V. and Wegener, I.}, TITLE = {Approximating the Orthogonal Knapsack Problem for Hypercubes}, BOOKTITLE = {Automata, Languages and Programming}, PADDRESS = {Berlin / Heidelberg}, ADDRESS = {Venice, Italy}, NUMBER = {1}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4051}, ISBN = {978-3-540-35904-3}, DOI = {10.1007/11786986_22}, YEAR = {2006}, PAGES = {238--249}, ABSTRACT = {Given a list of $d$-dimensional cuboid items with associated profits, the \emph{orthogonal knapsack problem} asks for a packing of a selection with maximal profit into the unit cube. We restrict the items to hypercube shapes and derive a $(\frac{5}{4}+\epsilon)$-approximation for the two-dimensional case. In a second step we generalize our result to a $(\frac{2^d+1}{2^d}+\epsilon)$-approximation for $d$-dimensional packing.}, } @MASTERSTHESIS{Harren2006b, AUTHOR = {Harren, Rolf}, TITLE = {{Approximation mehrdimensionaler Packungsprobleme}}, SCHOOL = {Universit{\"a}t Dortmund}, TYPE = {Diploma thesis}, MONTH = {December}, YEAR = {2006}, ABSTRACT = {Orthogonal packing problems are natural multidimensional generalizations of the classical \probname{Bin Packing Problem} and \probname{Knapsack Problem} and occur in many different settings. The input consists of a set $I=\{r_1, \ldots, r_n\}$ of $d$-dimensional rectangular items $r_i = (a_{i1}, \ldots, a_{id})$ and a space $B$. The task is to pack the items in an orthogonal, non-rotational, non-overlapping manner into the given space. In the \probname{Bin Packing} setting the space $B$ is an unlimited number of unit sized bins and the goal is to minimize the number of used bins in order to pack the whole list of items. In the \probname{Strip Packing} setting the space $B$ is given by a strip of bounded basis and unlimited height. The objective is to pack all items into a strip of minimal height. Finally, in the \probname{Knapsack Packing} setting the given space $B$ is a single, usually unit sized bin and the items have an associated profit $p_i$. The goal is to maximize the profit of a selection of items that can be packed into the bin. In this thesis we present state-of-the-art algorithms for two-dimensional \probname{Strip Packing} \cite{KenyonRemila2000} and \probname{Knapsack Packing with large resources} \cite{FishkinGerberJansen2004} as well as for multidimensional \probname{Bin Packing for hypercubes} \cite{BansalCorreaKenyonSviridenko2005}. Furthermore, we describe our own results on orthogonal packing problems restricted to hypercubes, i.e., a $(\frac{5}{4}+\epsilon)$-approximation algorithm for \probname{Square Packing}, a $(\frac{2^d+1}{2^d}+\epsilon)$-approximation algorithm for $d$-dimensional \probname{Knapsack Packing for hypercubes} and asymptotic polynomial time approximation schemes (\complexity{APTAS}) for $d$-dimensional \probname{Strip Packing for hypercubes} as well as for $d$-dimensional \probname{Knapsack Packing with large Resources for hypercubes}. All of these results were published in \cite{Harren2006} but especially for the latter two approximation schemes no details were given due to page limitations.}, } @INPROCEEDINGS{Harren2007, AUTHOR = {Diedrich, Florian and Harren, Rolf and Jansen, Klaus and Th{\"o}le, Ralf and Thomas, Henning}, EDITOR = {Cai, Jin-Yi and Cooper, S. Barry and Zhu, Hong}, TITLE = {Approximation Algorithms for 3D Orthogonal Knapsack}, BOOKTITLE = {Theory and Applications of Models of Computation}, PADDRESS = {Berlin / Heidelberg}, ADDRESS = {Shanghai, China}, PUBLISHER = {Springer}, MONTH = {May}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4484}, ISBN = {978-3-540-72503-9}, DOI = {10.1007/978-3-540-72504-6_3}, YEAR = {2007}, PAGES = {34--45}, ABSTRACT = {We study non-overlapping axis-parallel packings of 3D boxes with profits into a dedicated bigger box where rotation is forbidden; we wish to maximize the total profit. Since this optimization problem is NP-hard, we focus on approximation algorithms. We obtain fast and simple algorithms with approximation ratios $9+\epsilon$ and $8+\epsilon$ as well as an algorithm with approximation ratio $7+\epsilon$ that uses more sophisticated techniques; these are the smallest approximation ratios known for this problem.}, } @BOOK{Harren2007b, AUTHOR = {Harren, Rolf}, TITLE = {{Mehrdimensionale Packungsprobleme - Approximation geometrischer Verallgemeinerungen klassischer Packungsprobleme}}, ADDRESS = {Saarbr{\"u}cken, Germany}, PUBLISHER = {VDM Verlag Dr. M{\"u}ller}, MONTH = {November}, ISBN = {978-3836446891}, YEAR = {2007}, PAGES = {66}, ABSTRACT = {Das Rucksackproblem ist eines der grundlegenden Probleme der Informatik. Die in diesem Buch betrachtete Variante l{\"a}sst sich leicht anhand einer allt{\"a}glichen Situation beschreiben: Wie finde ich eine Auswahl an Gegenst{\"a}nden, die sich gemeinsam in meinen Rucksack packen lassen und mir bei meiner Reise den gr{\"o}{\ss}tm{\"o}glichen Nutzen bringen? In der kombinatorischen Optimierung beschr{\"a}nkt man sich auf rechteckige Gegenst{\"a}nde und Rucks{\"a}cke. Anwendungen finden sich bei Schnittproblemen - hier werden Objekte aus einem Materialblock herausgeschnitten - sowie in der Transportindustrie. Der Autor gibt einf{\"u}hrend einen {\"U}berblick {\"u}ber die verschiedenen Verallgemeinerungen klassischer Packungsprobleme. Dies sind neben dem Rucksackproblem auch das Aufteilungs- sowie ein Stapelungsproblem. Nach einer ausf{\"u}hrlichen Behandlung wichtiger Methoden werden Approximationsalgorithmen f{\"u}r die zweidimensionalen Problemvarianten vorgestellt. Darauf aufbauend werden die h{\"o}herdimensionalen Probleme behandelt. Das Buch richtet sich an Studenten der Informatik, die ihren Schwerpunkt auf den Bereich Algorithmik legen, sowie an alle, die sich im wissenschaftlichen Kontext mit Approximationsalgorithmen besch{\"a}ftigen.}, } @ARTICLE{Harren2009a, AUTHOR = {Harren, Rolf}, JOURNAL = {Theoretical Computer Science}, TITLE = {Approximation Algorithms for Orthogonal Packing Problems for Hypercubes}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {44}, PUBLISHER = {Elsevier}, VOLUME = {410}, ISBN = {0304-3975}, DOI = {10.1016/j.tcs.2009.07.030}, YEAR = {2009}, PAGES = {4504--4532}, ABSTRACT = {Orthogonal packing problems are natural multidimensional generalizations of the classical bin packing problem and knapsack problem and occur in many different settings. The input consists of a set $I=\{r_1, \ldots, r_n\}$ of $d$-dimensional rectangular items $r_i = (a_{i,1}, \ldots, a_{i,d})$ and a space $Q$. The task is to pack the items in an orthogonal and non-overlapping manner without using rotations into the given space. In the strip packing setting the space $Q$ is given by a strip of bounded basis and unlimited height. The objective is to pack all items into a strip of minimal height. In the knapsack packing setting the given space $Q$ is a single, usually unit sized bin and the items have associated profits $p_i$. The goal is to maximize the profit of a selection of items that can be packed into the bin. We mainly focus on orthogonal knapsack packing restricted to hypercubes and our main results are a $(5/4+\epsilon)$-approximation algorithm for two-dimensional hypercube knapsack packing, also known as square packing, and a $(1 + 1/2^d+\epsilon)$-approximation algorithm for $d$-dimensional hypercube knapsack packing. In addition we consider $d$-dimensional hypercube strip packing in the case of a bounded ratio between the shortest and longest side of the basis of the strip. We derive an asymptotic polynomial time approximation scheme (APTAS) for this problem. Finally, we present an algorithm that packs hypercubes with a total profit of at least $(1-\epsilon)\mathrm{OPT}$ into a large bin (the size of the bin depends on $\epsilon$). This problem is known as hypercube knapsack packing with large resources. A preliminary version was published in [H., \emph{Approximating the orthogonal knapsack problem for hypercubes}, ICALP 2006] but especially for the latter two approximation schemes no details were given due to page limitations.}, } @PHDTHESIS{HarrenPhD2010, AUTHOR = {Harren, Rolf}, TITLE = {Two-dimensional packing problems}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Doctoral dissertation}, ADDRESS = {Saarbr{\"u}cken}, PUBLISHER = {Universit{\"a}t des Saarlandes}, MONTH = {October}, YEAR = {2010}, PAGES = {118}, } @INPROCEEDINGS{HarrenvanStee2008, AUTHOR = {Harren, Rolf and van Stee, Rob}, EDITOR = {Gudmundsson, Joachim}, TITLE = {Packing Rectangles into 2 OPT Bins using Rotations}, BOOKTITLE = {11th Scandinavian Workshop on Algorithm Theory}, PADDRESS = {Berlin}, ADDRESS = {Gothenburg, Sweden}, PUBLISHER = {Springer}, MONTH = {July}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5124}, ISBN = {978-3-540-69900-2}, DOI = {10.1007/978-3-540-69903-3}, YEAR = {2008}, PAGES = {306--318}, ABSTRACT = {We consider the problem of packing rectangles into bins that are unit squares, where the goal is to minimize the number of bins used. All rectangles can be rotated by $90$ degrees and have to be packed non-overlapping and orthogonal, i.e., axis-parallel. We present an algorithm for this problem with an absolute worst-case ratio of 2, which is optimal provided $\mathcal{P} \not= \mathcal{NP}$.}, } @INPROCEEDINGS{HarrenvanStee2009b, AUTHOR = {Harren, Rolf and van Stee, Rob}, EDITOR = {Dinur, Irit and Jansen, Klaus and Naor, Joseph and Rolim, Jos{\'e}}, TITLE = {Improved Absolute Approximation Ratios for Two-Dimensional Packing Problems}, BOOKTITLE = {Approximation, Randomization, and Combinatorial Optimization : Algorithms and Techniques ; 12th International Workshop, APPROX 2009 and 13th International Workshop, RANDOM 2009}, PADDRESS = {Berlin, Germany}, ADDRESS = {Berkeley, CA}, PUBLISHER = {Springer}, MONTH = {August}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {5687}, ISBN = {978-3-642-03684-2}, DOI = {10.1007/978-3-642-03685-9_14}, YEAR = {2009}, PAGES = {177--189}, ABSTRACT = {We consider the two-dimensional bin packing and strip packing problem, where a list of rectangles has to be packed into a minimal number of rectangular bins or a strip of minimal height, respectively. All packings have to be non-overlapping and orthogonal, i.e., axis-parallel. Our algorithm for strip packing has an absolute approximation ratio of $1.9396$ and is the first algorithm to break the approximation ratio of 2 which was established more than a decade ago. Moreover, we present an algorithm for two-dimensional bin packing with an absolute worst-case ratio of 2, which is optimal provided $\mathcal{P} \not= \mathcal{NP}$. }, } @ARTICLE{HarSte12, AUTHOR = {Harren, Rolf and van Stee, Rob}, JOURNAL = {Journal of Scheduling}, TITLE = {Absolute Approximation Ratios for Packing Rectangles into Bins}, ADDRESS = {New York, NY}, NUMBER = {1}, PUBLISHER = {Springer}, MONTH = {February}, VOLUME = {15}, ISBN = {1094-6136}, DOI = {10.1007/s10951-009-0110-3}, YEAR = {2012}, PAGES = {63--75}, ABSTRACT = {We consider the problem of packing rectangles into bins that are unit squares, where the goal is to minimize the number of bins used. All rectangles have to be packed non-overlapping and orthogonal, i.e., axis-parallel. We present an algorithm with an absolute worst-case ratio of 2 for the case where the rectangles can be rotated by 90 degrees. This is optimal provided P != NP. For the case where rotation is not allowed, we prove an approximation ratio of 3 for the algorithm Hybrid First Fit which was introduced by Chung, Gary \& Johnson [1982] and whose running time is slightly better than the running time of Zhang's previously known 3-approximation algorithm [2005].}, } @MASTERSTHESIS{Hazboun1999, AUTHOR = {Hazboun, Jack}, TITLE = {{Molek{\"u}l-Docking-Reaktionen}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {November}, YEAR = {1999}, } @INPROCEEDINGS{Hebbinghaus2005, AUTHOR = {Doerr, Benjamin and Hebbinghaus, Nils}, EDITOR = {Felsner, Stefan}, TITLE = {Discrepancy of Products of Hypergraphs}, BOOKTITLE = {2005 European Conference on Combinatorics, Graph Theory and Applications (EuroComb '05)}, PADDRESS = {Nancy, France}, ADDRESS = {Berlin, Germany}, PUBLISHER = {DMTCS}, MONTH = {September}, SERIES = {DMTCS Proceedings}, VOLUME = {AE}, YEAR = {2005}, PAGES = {323--328}, ABSTRACT = {For a hypergraph {${\mathcal{H} = (V,\mathcal{E})}$}, its {${d}$}--fold symmetric product is {${ \Delta ^{d} \mathcal{H} = (V^{d},\{ E^{d} | E {\in}\mathcal{E} \}) }$}. We give several upper and lower bounds for the {${c}$}-color discrepancy of such products. In particular, we show that the bound {${ \textrm{disc}(\Delta ^{d} \mathcal{H},2) {\leq}\textrm{disc}(\mathcal{H},2) }$} proven for all {${d}$} in [B.\ Doerr, A.\ Srivastav, and P.\ Wehr, Discrepancy of {C}artesian products of arithmetic progressions, Electron. J. Combin. 11(2004), Research Paper 5, 16 pp.] cannot be extended to more than {${c = 2}$} colors. In fact, for any {${c}$} and {${d}$} such that {${c}$} does not divide {${d!}$}, there are hypergraphs having arbitrary large discrepancy and {${ \textrm{disc}(\Delta ^{d} \mathcal{H},c) = \Omega_{d}(\textrm{disc}(\mathcal{H},c)^{d}) }$}. Apart from constant factors (depending on {${c}$} and {${d}$}), in these cases the symmetric product behaves no better than the general direct product {${\mathcal{H}^{d}}$}, which satisfies {${ \textrm{disc}(\mathcal{H}^{d},c) = O_{c,d}(\textrm{disc}(\mathcal{H},c)^{d}) }$}. }, } @INPROCEEDINGS{Hebbinghaus2006, AUTHOR = {Doerr, Benjamin and Hebbinghaus, Nils and Neumann, Frank}, EDITOR = {Runarsson, Thomas Ph. and Beyer, Hans G. and Burke, Edmund and Merelo-Guerv{\'o}s, Juan J. and Whitley, L. Darrell and Yao, Xin}, TITLE = {Speeding Up Evolutionary Algorithms Through Restricted Mutation Operators}, BOOKTITLE = {Parallel Problem Solving from Nature - PPSN IX, 9th International Conference}, ORGANIZATION = {Springer-Verlag GmbH}, PADDRESS = {Berlin, Germany}, ADDRESS = {Reykjavik, Iceland}, PUBLISHER = {Springer}, MONTH = {October}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4193}, ISBN = {978-3-540-38990-3}, YEAR = {2006}, PAGES = {978--987}, ABSTRACT = {We investigate the effect of restricting the mutation operator in evolutionary algorithms with respect to the runtime behavior. For the Eulerian cycle problem; we present runtime bounds on evolutionary algorithms with a restricted operator that are much smaller than the best upper bounds for the general case. It turns out that a plateau that both algorithms have to cope with is left faster by the new algorithm. In addition, we present a lower bound for the unrestricted algorithm which shows that the restricted operator speeds up computation by at least a linear factor.}, } @ARTICLE{Hebbinghaus2006a, AUTHOR = {Bundy, David and Hebbinghaus, Nils and Stellmacher, Bernd}, JOURNAL = {Journal of Algebra}, TITLE = {The Local C(G,T) Theorem}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {2}, PUBLISHER = {Elsevier}, MONTH = {June}, VOLUME = {300}, ISBN = {0021-8693}, YEAR = {2006}, PAGES = {741--789}, } @TECHREPORT{Hebbinghaus2007, AUTHOR = {Hebbinghaus, Nils}, TITLE = {Discrepancy of Sums of two Arithmetic Progressions}, INSTITUTION = {Cornell University (ArXiv)}, TYPE = {ArXiv}, ADDRESS = {ArXiv}, NUMBER = {math.NT/0703108}, MONTH = {March}, YEAR = {2007}, PAGES = {15}, ABSTRACT = {Estimating the discrepancy of the hypergraph of all arithmetic progressions in the set $[N]=\{1,2,\hdots,N\}$ was one of the famous open problems in combinatorial discrepancy theory for a long time. An extension of this classical hypergraph is the hypergraph of sums of $k$ ($k\geq 1$ fixed) arithmetic progressions. The hyperedges of this hypergraph are of the form $A_{1}+A_{2}+\hdots+A_{k}$ in $[N]$, where the $A_{i}$ are arithmetic progressions. For this hypergraph Hebbinghaus (2004) proved a lower bound of $\Omega(N^{k/(2k+2)})$. Note that the probabilistic method gives an upper bound of order $O((N\log N)^{1/2})$ for all fixed $k$. P\v{r}\'{i}v\v{e}tiv\'{y} improved the lower bound for all $k\geq 3$ to $\Omega(N^{1/2})$ in 2005. Thus, the case $k=2$ (hypergraph of sums of two arithmetic progressions) remained the only case with a large gap between the known upper and lower bound. We bridge his gap (up to a logarithmic factor) by proving a lower bound of order $\Omega(N^{1/2})$ for the discrepancy of the hypergraph of sums of two arithmetic progressions.}, } @MASTERSTHESIS{HeidrichBachelor2012, AUTHOR = {Heydrich, Sandy}, TITLE = {Dividing connected chores fairly}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Bachelor thesis}, YEAR = {2012}, } @ARTICLE{HeinyKasprzikKoetzing2012, AUTHOR = {Heinz, Jeffrey and Kasprzik, Anna and K{\"o}tzing, Timo}, JOURNAL = {Theoretical Computer Science}, TITLE = {Learning in the limit with lattice-structured hypothesis spaces}, ADDRESS = {Amsterdam}, PUBLISHER = {Elsevier}, VOLUME = {457}, ISBN = {0304-3975}, DOI = {10.1016/j.tcs.2012.07.017}, YEAR = {2012}, PAGES = {111 -- 127}, } @INPROCEEDINGS{HelNeuWan2009, AUTHOR = {Helwig, Sabine and Neumann, Frank and Wanka, Rolf}, EDITOR = {Bouchachia, Abdelhamid and Nedjah, Nadia and de Macedo Mourelle, Luiza and Pedrycz, Witold}, TITLE = {Particle Swarm Optimization with Velocity Adaptation}, BOOKTITLE = {2009 International Conference on Adaptive and Intelligent Systems ICAIS 2009 : proceedings}, PADDRESS = {Los Alamitos, CA}, ADDRESS = {Klagenfurt, Austria}, PUBLISHER = {IEEE Computer Society}, ISBN = {978-0-7695-3827-3}, DOI = {10.1109/ICAIS.2009.32}, YEAR = {2009}, PAGES = {146--151}, NOTE = {Best Paper Award}, } @MASTERSTHESIS{Hemmer2002, AUTHOR = {Hemmer, Michael}, TITLE = {Reliable computation of planar and spatial arrangements of quadrics}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {April}, YEAR = {2002}, } @INPROCEEDINGS{Hemmer2007, AUTHOR = {Dupont, Laurent and Hemmer, Michael and Petitjean, Sylvain and Sch{\"o}mer, Elmar}, EDITOR = {Arge, Lars and Hoffmann, Michael and Welzl, Emo}, TITLE = {Complete, Exact and Efficient Implementation for Computing the Adjacency Graph of an Arrangement of Quadrics}, BOOKTITLE = {15th Annual European Symposium on Algorithms}, PADDRESS = {Heidelberg}, ADDRESS = {Eilat, Israel}, PUBLISHER = {Springer}, MONTH = {October}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4698}, ISBN = {978-3-540-75519-7}, DOI = {10.1007/978-3-540-75520-3_56}, YEAR = {2007}, PAGES = {633--644}, ABSTRACT = {We present a complete, exact and efficient implementation to compute the adjacency graph of an arrangement of quadrics, i.e. surfaces of algebraic degree 2. This is a major step towards the computation of the full 3D arrangement. We enhanced an implementation for an exact parameterization of the intersection curves of two quadrics, such that we can compute the exact parameter value for intersection points and from that the adjacency graph of the arrangement. Our implementation is complete in the sense that it can handle all kinds of inputs including all degenerate ones, i.e. singularities or tangential intersection points. It is exact in that it always computes the mathematically correct result. It is efficient measured in running times, i.e. it compares favorably to the only previous implementation.}, } @PHDTHESIS{Hemmer2008, AUTHOR = {Hemmer, Michael}, TITLE = {Exact Computation of the Adjacency Graph of an Arrangement of Quadrics}, SCHOOL = {Johannes Gutenberg-Universit{\"a}t Mainz}, TYPE = {Doctoral dissertation}, ADDRESS = {Saarstr. 21, D 55122 Mainz}, PUBLISHER = {Johannes Gutenberg-Universit{\"a}t Mainz}, MONTH = {May}, YEAR = {2008}, ABSTRACT = {We present a complete, exact and efficient algorithm to compute the adjacency graph of an arrangement of quadrics, i.e. surfaces of algebraic degree 2. This is a major step towards the computation of the full 3D arrangement. We enhanced an implementation for an exact parameterization of the intersection curves of two quadrics, such that we can compute the exact parameter value for intersection points and from that the adjacency graph of the arrangement. Our implementation is complete in the sense that it can handle all kinds of inputs including all degenerate ones, i.e. singularities or tangential intersection points. It is exact in that it always computes the mathematically correct result. It is efficient measured in running times, i.e. it compares favorably to the only previously implemented approach. Our approach has been implemented within the EXACUS project. The central goal of Exacus is the development of a demonstrator of a reliable and efficient CAD geometry kernel. Although we call our library design prototypical, we spent nonetheless a great effort on completeness, exactness, efficiency, documentation and reusability. Beside its primary contribution, the algorithm presented in this work had an essential impact on fundamental parts of EXACUS due to its specific requirements. This work has in particular contributed to the generic number type support and the modular methods used within Exacus. In the context of our ongoing integration of EXACUS into CGAL these parts have been successfully advanced into mature CGAL packages.}, } @ARTICLE{Hemmer2011, AUTHOR = {Hemmer, Michael and Dupon, Laurent and Petitjean, Sylvain and Schomer, Elmar}, JOURNAL = {Journal of Symbolic Computation}, TITLE = {A complete, exact and efficient implementation for computing the edge-adjacency graph of an arrangement of quadrics}, ADDRESS = {Amsterdam}, NUMBER = {4}, PUBLISHER = {Elsevier}, VOLUME = {46}, ISBN = {0747-7171}, DOI = {10.1016/j.jsc.2010.11.002}, YEAR = {2011}, PAGES = {467--494}, } @INPROCEEDINGS{Hermelin2010, AUTHOR = {Bar-Yehuda, Reuven and Hermelin, Danny and Rawitz, Dror}, EDITOR = {de Berg, Mark and Meyer, Ulrich}, TITLE = {Minimum Vertex Cover in Rectangle Graphs}, BOOKTITLE = {Algorithms - ESA 2010 : 18th Annual European Symposium. - Pt. I}, PADDRESS = {Berlin}, ADDRESS = {Liverpool, England}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6347}, ISBN = {978-3-642-15780-6}, DOI = {10.1007/978-3-642-15775-2_22}, YEAR = {2010}, PAGES = {255--266}, } @ARTICLE{Hermelin2010b, AUTHOR = {Butman, Ayelet and Hermelin, Danny and Lewenstein, Moshe and Rawitz, Dror}, JOURNAL = {ACM Transactions on Algorithms}, TITLE = {Optimization problems in multiple-interval graphs}, ADDRESS = {New York, NY}, NUMBER = {2}, PUBLISHER = {ACM}, VOLUME = {6}, ISBN = {1549-6325}, DOI = {10.1145/1721837.1721856}, YEAR = {2010}, PAGES = {40,1--40,18}, } @INPROCEEDINGS{Hermelin2012, AUTHOR = {Hermelin, Danny and Rizzi, Romeo and Vialette, Stephane}, EDITOR = {Chao, Kun-Mao and Hsu, Tsan-sheng and Lee, Der-Tsai}, TITLE = {Algorithmic Aspects of the Intersection and Overlap Numbers of a Graph}, BOOKTITLE = {Algorithms and Computation : 23rd International Symposium, ISAAC 2012}, PADDRESS = {Berlin}, ADDRESS = {Taipei, Taiwan}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {7676}, ISBN = {978-3-642-35260-7}, DOI = {10.1007/978-3-642-35261-4_49}, YEAR = {2012}, PAGES = {465--474}, } @INPROCEEDINGS{HermelinCulex2010, AUTHOR = {Nor, Igor and Hermelin, Danny and Charlat, Sylvain and Engelstadter, Jan and Reuter, Max and Duron, Olivier Sagot, Marie-France}, EDITOR = {Amir, Amihood and Parida, Laxmi}, TITLE = {Mod/Resc Parsimony Inference}, BOOKTITLE = {Combinatorial Pattern Matching : 21st Annual Symposium, CPM 2010}, PADDRESS = {Berlin}, ADDRESS = {New York, USA}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6129}, ISBN = {978-3-642-13508-8}, DOI = {10.1007/978-3-642-13509-5_19}, YEAR = {2010}, PAGES = {202--213}, } @INPROCEEDINGS{HermelinHuangKratschWahlstrom2011, AUTHOR = {Hermelin, Danny and Huang, Chien-Chung and Kratsch, Stefan and Wahlstr{\"o}m, Magnus}, EDITOR = {Kolman, Petr and Kratochv{\'i}l, Jan}, TITLE = {Parameterized Two-Player {N}ash Equilibrium}, BOOKTITLE = {Graph-Theoretic Concepts in Computer Science : 37th International Workshop, WG 2011}, PADDRESS = {Berlin}, ADDRESS = {Tepl{\'a} Monastery, Czech Republic}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6986}, ISBN = {978-3-642-25869-5}, DOI = {10.1007/978-3-642-25870-1_20}, YEAR = {2011}, PAGES = {215--226}, } @INPROCEEDINGS{HermelinLCS2010, AUTHOR = {Gotthilf, Zvi and Hermelin, Danny and Landau, Gad M. and Lewenstein, Moshe}, TITLE = {Restricted {LCS}}, BOOKTITLE = {17th International Symposium on String Processing and Information Retrieval}, PADDRESS = {Berlin}, ADDRESS = {Los Cabos, Mexico}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6393}, YEAR = {2010}, PAGES = {250--257}, } @INPROCEEDINGS{HermelinLevyWeimanYuster2011, AUTHOR = {Hermelin, Danny and Levy, Avivit and Weimann, Oren and Yuster, Raphael}, EDITOR = {Aceto, Luca and Henzinger, Monika and Sgall, Jiri}, TITLE = {Distance Oracles for Vertex-Labeled Graphs}, BOOKTITLE = {Automata, Languages and Programming : 38th International Colloquium, ICALP 2011}, PADDRESS = {Berlin}, ADDRESS = {Zurich, Switzerland}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6756}, ISBN = {978-3-642-22011-1}, DOI = {10.1007/978-3-642-22012-8_39}, YEAR = {2011}, PAGES = {490--501}, } @INPROCEEDINGS{HermelinMestreRawitz2012, AUTHOR = {Hermelin, Danny and Mestre, Julian and Rawitz, Dror}, EDITOR = {Golumbic, Martin Charles and Stern, Michal and Levy, Avivit and Morgenstern, Gila}, TITLE = {Optimization Problems in Dotted Interval Graphs}, BOOKTITLE = {Graph-Theoretic Concepts in Computer Science : 38th InternationalWorkshop, WG 2012}, PADDRESS = {Berlin}, ADDRESS = {Jerusalem, Israel}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {7551}, ISBN = {978-3-642-34610-1}, DOI = {10.1007/978-3-642-34611-8_8}, YEAR = {2012}, PAGES = {46--56}, } @INPROCEEDINGS{HermelinMnichvanLeeuwen2012, AUTHOR = {Hermelin, Danny and Mnich, Matthias and van Leeuwen, Erik Jan}, EDITOR = {Epstein, Leah and Ferragina, Paolo}, TITLE = {Parameterized complexity of induced {H}-matching on claw-free graphs}, BOOKTITLE = {Algorithms - ESA 2012 : 20th Annual European Symposium}, PADDRESS = {Berlin}, ADDRESS = {Ljubljana, Slovenia}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {7501}, ISBN = {978-3-642-33089-6}, DOI = {10.1007/978-3-642-33090-2_54}, YEAR = {2012}, PAGES = {624--635}, } @INPROCEEDINGS{HermelinMnichVanLeeuwenWoeginger2011, AUTHOR = {Hermelin, Danny and Mnich, Matthias and van Leeuwen, Erik Jan and Woeginger, Gerhard J.}, EDITOR = {Aceto, Luca and Henzinger, Monika and Sgall, Jiri}, TITLE = {Domination When the Stars Are Out}, BOOKTITLE = {Automata, Languages and Programming : 38th International Colloquium, ICALP 2011}, PADDRESS = {Berlin}, ADDRESS = {Zurich, Switzerland}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6746}, ISBN = {978-3-642-22011-1}, DOI = {10.1007/978-3-642-22006-7_39}, YEAR = {2011}, PAGES = {462--473}, } @ARTICLE{HermelinRawitz2011, AUTHOR = {Hermelin, Danny and Rawitz, Dror}, JOURNAL = {Discrete Applied Mathematics}, TITLE = {Optimization problems in multiple subtree graphs}, ADDRESS = {Amsterdam}, NUMBER = {7}, PUBLISHER = {Elsevier}, VOLUME = {159}, DOI = {/10.1016/j.dam.2010.03.010}, YEAR = {2011}, PAGES = {588--594}, } @INPROCEEDINGS{HermelinWu2012, AUTHOR = {Hermelin, Danny and Wu, Xi}, EDITOR = {Rabani, Yuval}, TITLE = {Weak compositions and their applications to polynomial lower bounds for kernelization}, BOOKTITLE = {Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms (SODA-12)}, PADDRESS = {Philadelphia, PA}, ADDRESS = {Tokyo, Japan}, PUBLISHER = {SIAM}, ISBN = {978-1-611972-11-5}, YEAR = {2012}, PAGES = {104--113}, } @ARTICLE{Hert1999, AUTHOR = {Hert, Susan and Lumelsky, Vladimir}, JOURNAL = {IEEE Transactions on Robotics and Automation}, TITLE = {Motion Planning in R^3 for Multiple Tethered Robots}, NUMBER = {4}, MONTH = {August}, VOLUME = {15}, YEAR = {1999}, PAGES = {623--639}, ABSTRACT = {The problem of motion planning in three dimensions for $n$ tethered robots is considered. Motivation for this problem comes from the need to coordinate the motion of a group of tethered underwater vehicles. The motion plan must be such that it can be executed without the robots' tethers becoming tangled. The simultaneous-motion plan is generated in three steps. First, an ordering of the robots is produced that maximizes the number of robots that can move along straight lines to their targets. Then paths for the robots are computed assuming they move sequentially in the given order. Two methods of computing the sequential-motion plan for the robots are presented. The first method is computationally simple but guarantees no bound on the path length with respect to the optimal length; the second method guarantees nearly optimal paths for the given ordering at the expense of additional computation. Finally, trajectories are determined that allow the robots to move simultaneously. The motion plan generated is guaranteed not to result in tangled tethers. The algorithms we present are shown to run in $O(n^4)$ time in total in the worst case, which is less than the additional computation needed to produce the nearly optimal paths using existing approximation algorithms.}, } @TECHREPORT{Hertel84/02, AUTHOR = {Hertel, Stefan and Mehlhorn, Kurt and M{\"a}ntyl{\"a}, Martti and Nievergelt, Jurg}, TITLE = {Space sweep solves intersection of two convex polyhedra elegantly}, INSTITUTION = {Universit{\"a}t des Saarlandes / Fachbereich Angewandte Mathematik und Informatik}, ADDRESS = {Saarbr{\"u}cken}, NUMBER = {A 84/02}, YEAR = {1984}, PAGES = {33S.}, } @ARTICLE{Heydrich2015, AUTHOR = {Heydrich, Sandy and van Stee, Rob}, JOURNAL = {Theoretical Computer Science}, TITLE = {Dividing Connected Chores Fairly}, MONTH = {August}, VOLUME = {593}, DOI = {10.1016/j.tcs.2015.05.041}, YEAR = {2015}, PAGES = {51--61}, ABSTRACT = {In this paper we consider the fair division of chores (tasks that need to be performed by agents, with negative utility for them), and study the loss in social welfare due to fairness. Previous work has been done on this so-called price of fairness, concerning fair division of cakes and chores with non-connected pieces and of cakes with connected pieces. In this paper, we consider situations where each player has to receive one connected piece of the chores. We provide tight or nearly tight bounds on the price of fairness with respect to the three main fairness criteria proportionality, envy-freeness and equitability and for utilitarian and egalitarian welfare. We also give the first proof of the existence of equitable divisions for chores with connected pieces.}, } @INPROCEEDINGS{HeySte13, AUTHOR = {Heydrich, Sandy and van Stee, Rob}, EDITOR = {Voecking, Berthold}, TITLE = {Dividing connected chores fairly}, BOOKTITLE = {6th International Symposium on Algorithmic Game Theory}, PADDRESS = {New York}, ADDRESS = {Aachen, Germany}, PUBLISHER = {Springer}, MONTH = {October}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {8146}, ISBN = {978-3-642-41391-9}, YEAR = {2013}, PAGES = {420--433}, } @ARTICLE{HF2009, AUTHOR = {Fountoulakis, Nikolaos and Huber, Anna}, JOURNAL = {SIAM Journal on Discrete Mathematics}, TITLE = {Quasirandom rumor spreading on the complete graph is as fast as randomized rumor spreading}, NUMBER = {4}, VOLUME = {23}, DOI = {10.1137/09075768X}, YEAR = {2009}, PAGES = {1964--1991}, ABSTRACT = {In this paper, we provide a detailed comparison between a fully randomized protocol for rumour spreading on a complete graph and a quasirandom protocol introduced by Doerr, Friedrich and Sauerwald (2008). In the former, initially there is one vertex which holds a piece of information and during each round every one of the informed vertices chooses one of its neighbours uniformly at random and independently and informs it. In the quasirandom version of this method (cf. Doerr et al.) each vertex has a cyclic list of its neighbours. Once a vertex has been informed, it chooses uniformly at random only one neighbour. In the following round, it informs this neighbour and at each subsequent round it picks the next neighbour from its list and informs it. We give a precise analysis of the evolution of the quasirandom protocol on the complete graph with $n$ vertices and show that it evolves essentially in the same way as the randomized protocol. In particular, if $S(n)$ denotes the number of rounds that are needed until all vertices are informed, we show that for any slowly growing function $\omega (n)$ $$\log_2 n + \ln n - 4\ln \ln n \leq S(n) \leq \log_2 n + \ln n + \omega (n),$$ with probability $1-o(1)$. }, } @INPROCEEDINGS{hh-mgcd-2009, AUTHOR = {Hemmer, Michael and H{\"u}lse, Dominik}, TITLE = {Generic implementation of a modular GCD over Algebraic Extension Fields}, BOOKTITLE = {EuroCG'09 : 25th European Workshop on Computational Geometry}, PADDRESS = {Brussels, Belgium}, ADDRESS = {Brussels, Belgium}, PUBLISHER = {Universit{\'e} Libre de Bruxelles}, YEAR = {2009}, PAGES = {321--324}, } @INPROCEEDINGS{hhkps-aegk-01, AUTHOR = {Hert, Susan and Hoffmann, Michael and Kettner, Lutz and Pion, Sylvain and Seel, Michael}, EDITOR = {Brodal, Gerth Stolting and Frigioni, Daniele and Marchetti-Spaccamela, Alberto}, TITLE = {An Adaptable and Extensible Geometry {Kernel}}, BOOKTITLE = {Proceedings of the 5th International Workshop on Algorithm Engineering (WAE-01)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Aarhus, Denmark}, PUBLISHER = {Springer}, MONTH = {September}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {2141}, ISBN = {3-540-42500-4}, YEAR = {2001}, PAGES = {79--90}, ABSTRACT = { Geometric algorithms are based on geometric objects such as points, lines and circles. The term \textit{Kernel\/} refers to a collection of representations for constant-size geometric objects and operations on these representations. This paper describes how such a geometry kernel can be designed and implemented in C++, having special emphasis on adaptability, extensibility and efficiency. We achieve these goals following the generic programming paradigm and using templates as our tools. These ideas are realized and tested in \cgal~\cite{svy-cgal}, the Computational Geometry Algorithms Library.}, } @MASTERSTHESIS{Hilpert96, AUTHOR = {Hilpert, Peter}, TITLE = {{Heuristiken fur das euklidische Travelling Salesman Problem}}, SCHOOL = {Universitat des Saarlandes}, TYPE = {Master's thesis}, YEAR = {1996}, } @INPROCEEDINGS{HKMN08, AUTHOR = {Huang, Chien-Chung and Kavitha, Telikepalli and Michail, Dimitrios and Nasre, Meghana}, TITLE = {Bounded Unpopularity Matchings}, BOOKTITLE = {11th Scandinavian Workshop on Algorithm Theory (SWAT)}, PADDRESS = {Heidelberg, Germany}, ADDRESS = {Gothenburg, Sweden}, PUBLISHER = {Springer}, YEAR = {2008}, PAGES = {127--137}, } @INPROCEEDINGS{hls-qarr-2009, AUTHOR = {Hemmer, Michael and Limbach, Sebastian and Sch{\"o}mer, Elmar}, TITLE = {Continued Work on the Computation of an Exact Arrangement of Quadrics}, BOOKTITLE = {EuroCG'09 : 25th European Workshop on Computational Geometry}, PADDRESS = {Brussels, Belgium}, ADDRESS = {Brussels, Belgium}, PUBLISHER = {Universit{\'e} Libre de Bruxelles}, MONTH = {March}, YEAR = {2009}, PAGES = {313--316}, } @INPROCEEDINGS{HMPT97, AUTHOR = {Hundack, Christoph and Mutzel, Petra and Pouchkarev, Igor and Thome, Stefan}, EDITOR = {Di Battista, Giuseppe}, TITLE = {ArchE: A Graph Drawing System for Archaeology}, BOOKTITLE = {Proceedings of the 5th Symposium on Graph Drawing (GD-97)}, TYPE = {Demo}, PADDRESS = {Berlin}, ADDRESS = {Rome, Italy}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1353}, YEAR = {1997}, PAGES = {297--302}, } @ARTICLE{HMT04:round-robin, AUTHOR = {Henz, Martin and M{\"u}ller, Tobias and Thiel, Sven}, JOURNAL = {European Journal of Operational Research}, TITLE = {Global constraints for round robin tournament scheduling}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {1}, PUBLISHER = {Elsevier}, VOLUME = {153}, YEAR = {2004}, PAGES = {92--101}, } @ARTICLE{Hoefer-IJGT-2013, AUTHOR = {Hoefer, Martin}, JOURNAL = {International Journal of Game Theory}, TITLE = {Strategic Cooperation in Cost Sharing Games}, NUMBER = {1}, VOLUME = {42}, YEAR = {2013}, PAGES = {29--53}, } @INPROCEEDINGS{Hoefer03, AUTHOR = {Hoefer, Martin}, EDITOR = {Jansen, Klaus and Margraf, Marian and Mastrolli, Monaldo and Rolim, Jos{\'e} D. P.}, TITLE = {Experimental comparison of heuristic and approximation algorithms for uncapacitated facility location}, BOOKTITLE = {2nd International Workshop on Experimental and Efficient Algorithms (WEA-03)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Ascona, Switzerland}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {2647}, ISBN = {3-540-40205-5}, YEAR = {2003}, PAGES = {165--178}, } @ARTICLE{Hoefer2013, AUTHOR = {Hoefer, Martin}, JOURNAL = {Information \& Computation}, TITLE = {Local Matching Dynamics in Social Networks}, VOLUME = {222}, YEAR = {2013}, PAGES = {20--35}, } @INPROCEEDINGS{HoeferK2013, AUTHOR = {Hoefer, Martin and Kesselheim, Thomas}, TITLE = {Brief Announcement: Universally Truthful Secondary Spectrum Auctions}, BOOKTITLE = {25th Symposium on Parallelism in Algorithms and Architectures (SPAA-13)}, PADDRESS = {New York, USA}, ADDRESS = {Montreal, Canada}, PUBLISHER = {ACM}, YEAR = {2013}, PAGES = {99--101}, } @INPROCEEDINGS{HoeferKV2013, AUTHOR = {Hoefer, Martin and Kesselheim, Thomas and V{\"o}cking, Berthold}, TITLE = {Truthfulness and Stochastic Dominance with Monetary Transfers.}, BOOKTITLE = {14th Conf. Electronic Commerce (EC-13)}, PADDRESS = {New York, USA}, ADDRESS = {Philadelphia, USA}, PUBLISHER = {ACM}, YEAR = {2013}, PAGES = {567--582}, } @ARTICLE{HoeferS-TEAC-2013, AUTHOR = {Hoefer, Martin and Skopalik, Alexander}, JOURNAL = {ACM Transactions on Economics and Computation}, TITLE = {Altruism in Atomic Congestion Games}, NUMBER = {4}, VOLUME = {1}, YEAR = {2013}, PAGES = {21}, } @ARTICLE{HoeferS-TOCS-2013, AUTHOR = {Hoefer, Martin and Skopalik, Alexander}, JOURNAL = {Theory of Computing Systems}, TITLE = {On the Complexity of Pareto-optimal Nash and Strong Equilibria}, NUMBER = {3}, VOLUME = {53}, YEAR = {2013}, PAGES = {441--453}, } @INPROCEEDINGS{HoeferS2013, AUTHOR = {Hoefer, Martin and Sauerwald, Thomas}, TITLE = {Brief Announcement: Threshold Load Balancing in Networks}, BOOKTITLE = {32nd Symposium on Principles of Distributed Computing (PODC-13)}, PADDRESS = {New York, USA}, ADDRESS = {Montreal, Canada}, PUBLISHER = {ACM}, YEAR = {2013}, PAGES = {54--56}, } @INPROCEEDINGS{HoeferW-WINE-2013, AUTHOR = {Hoefer, Martin and Wagner, Lisa}, EDITOR = {Chen, Yiling and Immorlica, Nicole}, TITLE = {Designing Profit Shares in Matching and Coalition Formation Games}, BOOKTITLE = {9th Conference on Web and Internet Economics (WINE-13)}, PADDRESS = {New York, USA}, ADDRESS = {Cambridge, USA}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {8289}, YEAR = {2013}, PAGES = {249--262}, } @INPROCEEDINGS{HoeferW2013, AUTHOR = {Hoefer, Martin and Wagner, Lisa}, EDITOR = {Fomin, Fedor and Freivalds, Rusins and Kwiatkowska, Marta and Peleg, David}, TITLE = {Locally Stable Marriage with Strict Preferences}, BOOKTITLE = {40th International Colloquium on Automata, Languages and Programming (ICALP-13)}, PADDRESS = {New York, USA}, ADDRESS = {Riga, Latvia}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {7966}, YEAR = {2013}, PAGES = {620--631}, } @INPROCEEDINGS{Hoepman-Papatr-Tsigas95, AUTHOR = {Hoepman, Jaap-Henk and Papatriantafilou, Marina and Tsigas, Philippas}, EDITOR = {H{\'e}lary, Jean-Michel and Raynal, Michel}, TITLE = {Self-Stabilization in Wait-Free Shared Memory Objects}, BOOKTITLE = {Distributed Algorithms: 9th International Workshop (WDAG95)}, PADDRESS = {Berlin}, ADDRESS = {Le Mont-Saint Michel, France}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {972}, YEAR = {1995}, PAGES = {273--287}, } @ARTICLE{HoogeveenSkutellaWoeginger2003, AUTHOR = {Hoogeveen, Han and Skutella, Martin and Woeginger, Gerhard J.}, JOURNAL = {Mathematical Programming}, TITLE = {Preemptive scheduling with rejection}, ADDRESS = {Berlin, Germany}, NUMBER = {2-3}, PUBLISHER = {Springer}, MONTH = {January}, VOLUME = {94}, ISBN = {0025-5610}, YEAR = {2003}, PAGES = {361--374}, ABSTRACT = { We consider the problem of preemptively scheduling a set of $n$ jobs on $m$ (identical, uniformly related, or unrelated) parallel machines. The scheduler may reject a subset of the jobs and thereby incur job-dependent penalties for each rejected job, and he must construct a schedule for the remaining jobs so as to optimize the preemptive makespan on the $m$ machines plus the sum of the penalties of the jobs rejected. We provide a complete classification of these scheduling problems with respect to complexity and approximability. Our main results are on the variant with an arbitrary number of unrelated machines. This variant is \apx-hard, and we design a $1.58$-approximation algorithm for it. All other considered variants are weakly \np-hard, and we provide fully polynomial time approximation schemes for them. Finally, we argue that our results for unrelated machines can be carried over to the corresponding preemptive open shop scheduling problem with rejection.}, } @INPROCEEDINGS{HorNeuFOGA2009, AUTHOR = {Horoba, Chrisitian and Neumann, Frank}, TITLE = {Additive Approximations of Pareto-Optimal Sets by Evolutionary Multi-Objective Algorithms}, BOOKTITLE = {FOGA'09 : Revised Selected Papers from ACM SIGEVO Foundations of Genetic Algorithms X}, PADDRESS = {New York, NY}, ADDRESS = {Orlando, USA}, PUBLISHER = {ACM}, ISBN = {978-1-60558-414-0}, DOI = {10.1145/1527125.1527137}, YEAR = {2009}, PAGES = {79--86}, } @INPROCEEDINGS{HorNeuGECCO2008, AUTHOR = {Horoba, Christian and Neumann, Frank}, EDITOR = {Ryan, Conor and Keijzer, Maarten}, TITLE = {Benefits and Drawbacks for the Use of epsilon-Dominance in Evolutionary Multi-Objective Optimization}, BOOKTITLE = {Genetic and Evolutionary Computation Conference 2008}, PADDRESS = {New York, USA}, ADDRESS = {Atlanta, USA}, PUBLISHER = {ACM Press}, YEAR = {2008}, PAGES = {641--680}, } @INPROCEEDINGS{hr-mrmpipppg-01, AUTHOR = {Hert, Susan and Richards, Brad}, EDITOR = {Christensen, Henrik and Hager, Greg}, TITLE = {Multiple Robot Motion Planning = Parallel Processing + Geometry}, BOOKTITLE = {Sensor Based Intelligent Robots}, PADDRESS = {Berlin, Germany}, ADDRESS = {Schloss Dagstuhl, Wadern, Germany}, PUBLISHER = {Springer}, MONTH = {November}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {2238}, YEAR = {2002}, PAGES = {183--205}, ABSTRACT = {We present two problems in multiple-robot motion planning that can be quite naturally solved using techniques from the parallel processing community to dictate how the robots interact with each other and techniques from computational geometry to apply these techniques in the geometric environment in which the robots operate. The first problem we consider is a load-balancing problem in which a pool of work must be divided among a set of processors in order to minimize the amount of time required to complete all the work. We describe a simple polygon partitioning algorithm that allows techniques from parallel processor scheduling to be applied in the multiple-robot setting in order to achieve a good balance of the work. The second problem is that of collision avoidance, where one must avoid that two (or more) processors occupy the same resource at the same time. For this problem, we describe a procedure for robot interaction that is derived from procedures used to shared-memory computers along with a geometric data structure that can efficiently determine when there are potential robot collisions.}, } @INPROCEEDINGS{HTM06a, AUTHOR = {Hariharan, Ramesh and Telikepalli, Kavitha and Mehlhorn, Kurt}, EDITOR = {Bugliesi, Michele and Preneel, Bart and Sassone, Vladimir and Wegener, Ingo}, TITLE = {A Faster Deterministic Algorithm for Minimum Cycle Bases in Directed Graphs}, BOOKTITLE = {Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Part I}, PADDRESS = {Berlin, Germany}, ADDRESS = {Venice, Italy}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4051}, ISBN = {3-540-35904-4}, DOI = {10.1007/11786986_23}, YEAR = {2006}, PAGES = {250--261}, ABSTRACT = {We consider the problem of computing a minimum cycle basis in a directed graph. The input to this problem is a directed graph G whose edges have non-negative weights. A cycle in this graph is actually a cycle in the underlying undirected graph with edges traversable in both directions. A {–1,0,1} edge incidence vector is associated with each cycle: edges traversed by the cycle in the right direction get 1 and edges traversed in the opposite direction get -1. The vector space over generated by these vectors is the cycle space of G. A minimum cycle basis is a set of cycles of minimum weight that span the cycle space of G. The current fastest algorithm for computing a minimum cycle basis in a directed graph with m edges and n vertices runs in time (where ω< 2.376 is the exponent of matrix multiplication). Here we present an O(m3n + m2n2logn) algorithm. We also slightly improve the running time of the current fastest randomized algorithm from O(m2nlogn) to O(m2 n + mn2 logn).}, } @INPROCEEDINGS{HTZ-AKCROSS-2009, AUTHOR = {Hemmer, Michael and Tsigaridas, Elias P. and Zafeirakopoulos, Zafeirakis and Emiris, Ioannis Z. and Karavelas, Menelaos I. and Mourrain, Bernard}, TITLE = {Experimental evaluation and cross-benchmarking of univariate real solvers}, BOOKTITLE = {Symbolic Numeric Computation 2009 (SNC 2009)}, PADDRESS = {New York, NY}, ADDRESS = {Kyoto, Japan}, PUBLISHER = {ACM}, ISBN = {978-1-60558-664-9}, DOI = {10.1145/1577190.1577202}, YEAR = {2009}, PAGES = {45--54}, } @INPROCEEDINGS{Huang2008, AUTHOR = {Bhaskar, Umang and Fleischer, Lisa and Hoy, Darrell and Huang, Chien-Chung}, EDITOR = {Mathieu, Claire}, TITLE = {Equilibria of Atomic Flow Games are not Unique}, BOOKTITLE = {Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2009)}, PADDRESS = {New York, NY}, ADDRESS = {New York, U.S.A.}, PUBLISHER = {ACM}, MONTH = {January}, YEAR = {2009}, PAGES = {748--757}, ABSTRACT = {In STOC 2006, Hayrapetyan, Tardos and Wexler introduced the problem of studying collusion in network routing games. In this work, we show that collusion adds significant complexity to the structure of equilibria in nonatomic routing games, answering an open question posed by Cominetti, Correa, and Stier-Moses (ICALP 2006): Without collusion, it follows from well-known convexity arguments that equilibria exist and are unique (up to induced delays, and under weak assumptions on delay functions). The question is, does this uniqueness continue to hold in the presence of collusion? We answer no: we show that if collusion is allowed in nonatomic routing games, there may be multiple equilibria. We demonstrate the multiplicity via two specific examples. In addition, we show our examples are topologically minimal by giving a complete characterization of the class of network topologies for which unique equilibria exist. Our proofs and examples are based on a novel characterization of these topologies in terms of sets of circulations.}, } @INPROCEEDINGS{Huang2010, AUTHOR = {Huang, Chien-Chung}, EDITOR = {Charikar, Moses}, TITLE = {Classified stable matching}, BOOKTITLE = {21st Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2010)}, PADDRESS = {Philadelphia, Pa.}, ADDRESS = {Austin, TX, USA}, PUBLISHER = {SIAM}, ISBN = {978-0-898716-98-6}, YEAR = {2010}, PAGES = {1235--1253}, } @ARTICLE{Huang2010a, AUTHOR = {Huang, Chien-Chung}, JOURNAL = {Algorithmica}, TITLE = {Circular stable matching and 3-way kidney transplant}, ADDRESS = {New York, NY}, NUMBER = {1}, PUBLISHER = {Springer}, VOLUME = {58}, ISBN = {0178-4617}, DOI = {10.1007/s00453-009-9356-6}, YEAR = {2010}, PAGES = {137--150}, } @ARTICLE{Huang2011, AUTHOR = {Huang, Chien-Chung and Kavitha, Telikepalli and Michael, Dimitrios and Nasr, Meghana}, JOURNAL = {Algorithmica}, TITLE = {Bounded Unpopularity Matchings}, ADDRESS = {New York, NY}, NUMBER = {3}, PUBLISHER = {Springer}, VOLUME = {61}, ISBN = {0178-4617}, DOI = {10.1007/s00453-010-9434-9}, YEAR = {2011}, PAGES = {738--757}, } @INPROCEEDINGS{Huang2011a, AUTHOR = {Huang, Chien-Chung and Kavitha, Telikepalli}, TITLE = {Popular Matchings in the Stable Marriage Problem}, BOOKTITLE = {38th International Colloquium on Automata, Languages and Programming (ICALP)}, PADDRESS = {Springer-Verlag GmbH Heidelberger Platz 3 14197 Berlin}, ADDRESS = {Z{\"u}rich, Switzerland}, PUBLISHER = {Springer}, YEAR = {2011}, NOTE = {Journal version to appear in Information and Computation}, } @INPROCEEDINGS{Huang2011b, AUTHOR = {Huang, Chien-Chung and Kavitha, Telikepalli}, TITLE = {Near-popular matchings in the Roommates problem}, BOOKTITLE = {19th European Symposium on Algorithms (ESA)}, PADDRESS = {Springer-Verlag GmbH Heidelberger Platz 3 14197 Berlin}, ADDRESS = {Saarbr{\"u}cken, Germany}, PUBLISHER = {Springer}, YEAR = {2011}, NOTE = {Journal version to appear in SIAM Journal on Discrete Mathematics}, } @INPROCEEDINGS{Huang2012a, AUTHOR = {Huang, Chien-Chung}, EDITOR = {Fomin, Fedor V. and Kaski, Petteri}, TITLE = {Non-preemptive Speed Scaling}, BOOKTITLE = {Algorithm Theory - SWAT 2012 : 13th Scandinavian Symposium and Workshops}, PADDRESS = {Berlin}, ADDRESS = {Helsinki, Finland}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {7357}, ISBN = {978-3-642-31154-3}, DOI = {10.1007/978-3-642-31155-0_22}, YEAR = {2012}, PAGES = {249--260}, NOTE = {Journal version to appear at Journal of Scheduling}, } @PHDTHESIS{HuberPhD2010, AUTHOR = {Huber, Anna}, TITLE = {Randomized rounding and rumor spreading with stochastic dependencies}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Doctoral dissertation}, ADDRESS = {Saarbr{\"u}cken}, PUBLISHER = {Universit{\"a}t des Saarlandes}, MONTH = {September}, YEAR = {2010}, PAGES = {105}, } @MASTERSTHESIS{Humble97, AUTHOR = {Humble, Monika}, TITLE = {{Die Berechnung maximaler Fl{\"u}sse in Netzwerken}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, YEAR = {1997}, } @INCOLLECTION{HundackProemelSteger97, AUTHOR = {Hundack, Christoph and Pr{\"o}mel, Hans J{\"u}rgen and Steger, Angelika}, EDITOR = {Bellob{\'a}s, B{\'e}la and Thomason, Andrew}, TITLE = {Extremal Graph Problems for Graphs with a Color-Critical Vertex}, BOOKTITLE = {Combinatorics, Geometry and Probability}, ADDRESS = {Cambridge}, PUBLISHER = {Cambridge University Press}, ISBN = {0-521-58472-8}, YEAR = {1997}, PAGES = {421--433}, } @INPROCEEDINGS{HutSanVit2001, AUTHOR = {Hutchinson, David A. and Sanders, Peter and Vitter, Jeffrey Scott}, EDITOR = {Meyer auf der Heide, Friedhelm}, TITLE = {Duality Between Prefetching and Queued Writing with Parallel Disks}, BOOKTITLE = {Proceedings of the 9th Annual European Symposium on Algorithms (ESA-01)}, ORGANIZATION = {EATCS}, PADDRESS = {Berlin, Germany}, ADDRESS = {Aarhus, Denmark}, PUBLISHER = {Springer}, MONTH = {August}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {2161}, ISBN = {3-540-42493-8}, YEAR = {2001}, PAGES = {62--73}, ABSTRACT = {Parallel disks promise to be a cost effective means for achieving high bandwidth in applications involving massive data sets, but algorithms for parallel disks can be difficult to devise. To combat this problem, we define a useful and natural duality between writing to parallel disks and the seemingly more difficult problem of prefetching. We first explore this duality for applications involving read-once accesses using parallel disks. We get a simple linear time algorithm for computing optimal prefetch schedules and analyze the efficiency of the resulting schedules for randomly placed data and for arbitrary interleaved accesses to striped sequences. Duality also provides an optimal schedule for the integrated caching and prefetching problem, in which blocks can be accessed multiple times. Another application of this duality gives us the first parallel disk sorting algorithms that are provably optimal up to lower order terms. One of these algorithms is a simple and practical variant of multiway merge sort, addressing a question that has been open for some time.}, } @INPROCEEDINGS{HutSanVit2001a, AUTHOR = {Hutchinson, David A. and Sanders, Peter and Vitter, Jeffrey Scott}, TITLE = {The Power of Duality for Prefetching and Sorting with Parallel Disks}, BOOKTITLE = {Proceedings of the 13th Annual ACM Symposium on Parallel Algorithms and Architectures (SPAA-01)}, PADDRESS = {New York}, ADDRESS = {Crete Island, Greece}, PUBLISHER = {ACM}, MONTH = {July}, ISBN = {1-58113-409-6}, YEAR = {2001}, PAGES = {334--335}, } @INPROCEEDINGS{HybridVC07, AUTHOR = {Friedrich, Tobias and He, Jun and Hebbinghaus, Nils and Neumann, Frank and Witt, Carsten}, TITLE = {On Improving Approximate Solutions by Evolutionary Algorithms}, BOOKTITLE = {IEEE Congress on Evolutionary Computation 2007}, ORGANIZATION = {IEEE}, PADDRESS = {Vancouver, BC, Canada,}, ADDRESS = {Singapore, Singapore}, PUBLISHER = {IEEE}, ISBN = {1-4244-1340-0}, YEAR = {2007}, PAGES = {2614--2621}, } @INPROCEEDINGS{ICALP::MehlhornP1989, AUTHOR = {Mehlhorn, Kurt and Paul, Wolfgang J.}, EDITOR = {Ausiello, Giorgio and Dezani-Ciancaglini, Mariangiola and Ronchi Della Rocca, Simonetta}, TITLE = {Two Versus One Index Register and Modifiable Versus Non-modifiable Programs}, BOOKTITLE = {Automata, languages and programming (ICALP-89) : 16th international colloquium}, PADDRESS = {Berlin, Germany}, ADDRESS = {Stresa, Italy}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {372}, ISBN = {3-540-51371-X}, YEAR = {1989}, PAGES = {603--609}, } @INPROCEEDINGS{ICALP::MehlhornY1988, AUTHOR = {Mehlhorn, Kurt and Yap, Chee-Keng}, EDITOR = {Lepist{\"o}, Timo and Salomaa, Arto}, TITLE = {Constructive {Hopf's} Theorem: Or How to Untangle Closed Planar Curves}, BOOKTITLE = {Automata, languages and programming (ICALP-88) : 15th international colloquium}, PADDRESS = {Berlin, Germany}, ADDRESS = {Tampere, Finland}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {317}, YEAR = {1988}, PAGES = {410--423}, } @ARTICLE{IC::HoffmanMRT1986, AUTHOR = {Hoffmann, Kurt and Mehlhorn, Kurt and Rosenstiehl, Pierre and Tarjan, Robert E.}, JOURNAL = {Information and Control}, TITLE = {Sorting {Jordan} Sequences in Linear Time Using Level-Linked Search Trees}, ADDRESS = {New York, NY, USA}, NUMBER = {1--3}, PUBLISHER = {Academic Press}, VOLUME = {68}, YEAR = {1986}, PAGES = {170--184}, } @ARTICLE{IC::MehlhornP1987, AUTHOR = {Mehlhorn, Kurt and Preparata, Franco P.}, JOURNAL = {Information and Computation}, TITLE = {Area-Time Optimal Division for $T=\Omega((\log n)^{1+\epsilon})$}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {3}, PUBLISHER = {Elsevier}, VOLUME = {72}, ISBN = {0890-5401}, YEAR = {1987}, PAGES = {270--282}, ABSTRACT = {Area-time optimal VLSI division circuits are described for all computation times in the range for arbitrary > 0.}, } @MASTERSTHESIS{ImmichDipl01, AUTHOR = {Immich, Stefan}, TITLE = {{Berechnung der Momente von quadratischen Komplexen}}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, MONTH = {November}, YEAR = {2001}, } @ARTICLE{ImpBoun2006, AUTHOR = {Doerr, Benjamin and Hebbinghaus, Nils and Werth, S{\"o}ren}, JOURNAL = {Theoretical Computer Science}, TITLE = {Improved Bounds and Schemes for the Declustering Problem}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {1-3}, PUBLISHER = {Elsevier}, VOLUME = {359}, ISBN = {0304-3975}, YEAR = {2006}, PAGES = {123--132}, ABSTRACT = {The declustering problem is to allocate given data on parallel working storage devices in such a manner that typical requests find their data evenly distributed on the devices. Using deep results from discrepancy theory, we improve previous work of several authors concerning range queries to higher-dimensional data. We give a declustering scheme with an additive error of Od(logd-1M) independent of the data size, where d is the dimension, M the number of storage devices and d-1 does not exceed the smallest prime power in the canonical decomposition of M into prime powers. In particular, our schemes work for arbitrary M in dimensions two and three. For general d, they work for all Md-1 that are powers of two. Concerning lower bounds, we show that a recent proof of a Ωd(log(d-1)/2M) bound contains an error. We close the gap in the proof and thus establish the bound.}, } @INPROCEEDINGS{Imreh2001, AUTHOR = {Epstein, Leah and Imreh, Csan{\'a}d and van Stee, Rob}, EDITOR = {Diks, Krzysztof and Rytter, Wojciech}, TITLE = {More on weighted servers or FIFO is better than LRU}, BOOKTITLE = {Mathematical Foundations of Computer Science 2002 : 27th International Symposium, MFCS 2002}, ORGANIZATION = {European Association for theoretical Computer Science}, PADDRESS = {Berlin, Germany}, ADDRESS = {Warsawa-Otwock, Poland}, NUMBER = {2420}, PUBLISHER = {Springer}, MONTH = {August}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {August}, YEAR = {2002}, PAGES = {257--268}, ABSTRACT = {We consider a generalized 2-server problem on the uniform space in which servers have different costs. Previous work focused on the case where the ratio between these costs was very large. We give results for varying ratios. For ratios below 2.2, we present an optimal algorithm which is trackless. %Furthermore, our algorithm is trackless, %which means that it is restricted from storing %explicitly points from the metric space. We present a general lower bound for trackless algorithms depending on the cost ratio, proving that our algorithm is the optimal trackless algorithm up to a constant factor for any cost ratio. The results are extended for the case where we have two sets of servers with different costs.}, } @MASTERSTHESIS{IngalalliMaster2011, AUTHOR = {Ingalalli, Vijay}, TITLE = {Evolutionary algorithms to compute lower bounds for the star discrepancy}, SCHOOL = {Universit{\"a}t des Saarlandes}, TYPE = {Master's thesis}, ADDRESS = {Saarbr{\"u}cken}, PUBLISHER = {Universit{\"a}t des Saarlandes}, MONTH = {October}, YEAR = {2011}, PAGES = {XIII,63}, } @TECHREPORT{INRIA-00340887:1, AUTHOR = {Emiris, Ioannis Z. and Hemmer, Michael and Karavelas, Menelaos and Mourrain, Bernard and Tsigaridas, Elias P. and Zafeirakopoulos, Zafeirakis}, TITLE = {Experimental evaluation and cross-benchmarking of univariate real solvers}, INSTITUTION = {INRIA}, TYPE = {Rapport de recherche}, ADDRESS = {Sophia Antipolis, France}, NUMBER = {EMIRIS:2008:INRIA-00340887:1}, MONTH = {December}, YEAR = {2008}, PAGES = {20}, } @ARTICLE{inserpoints2006, AUTHOR = {Teramoto, Sachio and Asano, Tetsuo and Katoh, Naoki and Doerr, Benjamin}, JOURNAL = {IEICE - Transactions on Information and Systems}, TITLE = {Inserting Points Uniformly at Every Instance}, ADDRESS = {Oxford, UK}, NUMBER = {8}, PUBLISHER = {Oxford University Press}, VOLUME = {E89-D}, ISBN = {0916-8532}, YEAR = {2006}, PAGES = {2348--2356}, ABSTRACT = {Arranging n points as uniformly as possible is a frequently occurring problem. It is equivalent to packing n equal and non-overlapping circles in a unit square. In this paper we generalize this problem in such a way that points are inserted one by one with uniformity preserved at every instance. Our criterion for uniformity is to minimize the gap ratio (which is the maximum gap over the minimum gap) at every point insertion. We present a linear time algorithm for finding an optimal n-point sequence with the maximum gap ratio bounded by 2n/2 /(n/2+1) in the 1-dimensional case. We describe how hard the same problem is for a point set in the plane and propose a local search heuristics for finding a good solution.}, } @INPROCEEDINGS{IntLiar2006, AUTHOR = {Doerr, Benjamin and Lengler, Johannes and Steurer, Daniel}, EDITOR = {Asano, Tetsuo}, TITLE = {The Interval Liar Game}, BOOKTITLE = {Algorithms and Computation : 17th International Symposium, ISAAC 2006}, PADDRESS = {Berlin, Germany}, ADDRESS = {Kolkata, India}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {4288}, ISBN = {3-540-49694-6}, YEAR = {2006}, PAGES = {318--327}, ABSTRACT = {We regard the problem of communication in the presence of faulty transmissions. In contrast to the classical works in this area, we assume some structure on the times when the faults occur. More realistic seems the model that all faults occur in some small time interval. Like previous work, our problem can best be modelled as a two-player perfect information game, in which one player (“Paul”) has to guess a number x from {1, . . . , n} using Yes/No-questions, which the second player (“Carole”) has to answer truthfully apart from few lies. In our setting, all lies have to be in a consecutive set of k rounds. We show that Paul needs roughly log n + log log n + k rounds to determine the number, which is only k more than the case of just one single lie.}, } @ARTICLE{IPL::FriesMNT1987, AUTHOR = {Fries, O. and Mehlhorn, Kurt and N{\"a}her, Stefan and Tsakalidis, A.}, JOURNAL = {Information Processing Letters}, TITLE = {A {$\log \log n$} data structure for three-sided range queries}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {4}, PUBLISHER = {Elsevier}, VOLUME = {25}, ISBN = {0020-0190}, YEAR = {1987}, PAGES = {269--273}, } @ARTICLE{IPL::JungM1988, AUTHOR = {Jung, Hermann and Mehlhorn, Kurt}, JOURNAL = {Information Processing Letters}, TITLE = {Parallel algorithms for computing maximal independent sets in trees and for updating minimum spanning trees}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {5}, PUBLISHER = {Elsevier}, VOLUME = {27}, ISBN = {0020-0190}, YEAR = {1988}, PAGES = {227--236}, } @ARTICLE{IPL::Mehlhorn1988, AUTHOR = {Mehlhorn, Kurt}, JOURNAL = {Information Processing Letters}, TITLE = {A faster approximation algorithm for the {Steiner} problem in graphs}, ADDRESS = {Amsterdam, The Netherlands}, NUMBER = {3}, PUBLISHER = {Elsevier}, VOLUME = {27}, ISBN = {0020-0190}, YEAR = {1988}, PAGES = {125--128}, } @INPROCEEDINGS{Issac2015Sampling, AUTHOR = {Issac, Davis}, EDITOR = {Xu, Dachuan and Du, Donglei and Du, Dingzhu}, TITLE = {Sampling in Space Restricted Settings}, BOOKTITLE = {Computing and Combinatorics 2015}, PADDRESS = {Basel, Switzerland}, ADDRESS = {Beijng, China}, PUBLISHER = {Springer}, YEAR = {2015}, } @ARTICLE{ITMMP2006, AUTHOR = {Irving, Robert W. and Telikepalli, Kavitha and Mehlhorn, Kurt and Michail, Dimitrios and Paluch, Katarzyna}, JOURNAL = {ACM Transactions on Algorithms}, TITLE = {Rank-Maximal Matchings}, ADDRESS = {New York, USA}, NUMBER = {4}, PUBLISHER = {ACM}, MONTH = {October}, VOLUME = {2}, DOI = {10.1145/1198513.1198520}, YEAR = {2006}, PAGES = {602--610}, ABSTRACT = {Suppose that each member of a set A of applicants ranks a subset of a set P of posts in an order of preference, possibly involving ties. A matching is a set of (applicant, post) pairs such that each applicant and each post appears in at most one pair. A rank-maximal matching is one in which the maximum possible number of applicants are matched to their first choice post, and subject to that condition, the maximum possible number are matched to their second choice post, and so on. This is a relevant concept in any practical matching situation and it was first studied by Irving [2003].We give an algorithm to compute a rank-maximal matching with running time O(min(n + C,C√n)m), where C is the maximal rank of an edge used in a rank-maximal matching, n is the number of applicants and posts and m is the total size of the preference lists.}, } @ARTICLE{JACM::MehlhornP1986, AUTHOR = {Mehlhorn, Kurt and Preparata, F. P.}, JOURNAL = {Journal of the ACM}, TITLE = {Routing through a Rectangle}, ADDRESS = {New York, NY, USA}, NUMBER = {1}, PUBLISHER = {ACM}, VOLUME = {33}, YEAR = {1986}, PAGES = {60--85}, ABSTRACT = {In this paper an O(N log N) algorithm for routing through a rectangle is presented. Consider an n-by-m rectangular grid and a set of N two-terminal nets. A net is a pair of points on the boundary of the rectangle. A layout is a set of edge-disjoint paths, one for each net. Our algorithm constructs a layout, if there is one, in O(N log N) time; this contrasts favorably with the area of the layout that might be as large as N2. The layout constructed can be wired using four layers of interconnect with only O(N) contact cuts. A partial extension to multiterminal nets is also discussed.}, } @INPROCEEDINGS{JainKoetzingStephan2011, AUTHOR = {Jain, Sanjay and K{\"o}tzing, Timo and Stephan, Frank}, EDITOR = {Bshouty, Nader and Stoltz, Gilles and Vayatis, Nicolas and Zeugmann, Thomas}, TITLE = {Enlarging Learnable Classes}, BOOKTITLE = {Algorithmic Learning Theory : 23rd International Conference, ALT 2012}, PADDRESS = {Berlin}, ADDRESS = {Lyon, France}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Artificial Intelligence}, VOLUME = {7568}, ISBN = {978-3-642-34105-2}, DOI = {10.1007/978-3-642-34106-9_7}, YEAR = {2012}, PAGES = {36--50}, } @ARTICLE{JALGO::KaufmannM1986, AUTHOR = {Kaufmann, Michael and Mehlhorn, Kurt}, JOURNAL = {Journal of Algorithms}, TITLE = {Routing through a Generalized Switchbox}, ADDRESS = {Orlando, FL, USA}, NUMBER = {4}, PUBLISHER = {Academic Press}, VOLUME = {7}, YEAR = {1986}, PAGES = {510--531}, } @INPROCEEDINGS{Janardan-Smid95, AUTHOR = {Janardan, Ravi and Smid, Michiel}, TITLE = {On the width and roundness of a set of points in the plane}, BOOKTITLE = {7th Canadian Conference on Computational Geometry}, PADDRESS = {-}, ADDRESS = {-}, PUBLISHER = {-}, YEAR = {1995}, PAGES = {193--198}, } @INPROCEEDINGS{Jansen-Latin-98, AUTHOR = {Jansen, Klaus}, EDITOR = {Lucchesi, Cl{\'a}udio L. and Moura, Arnaldo V.}, TITLE = {A New Characterization for Parity Graphs and a Coloring Problem with Costs}, BOOKTITLE = {Proceedings of the 3rd Latin American Symposium on Theoretical Informatics (Latin-98)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Campinas, Brazil}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1380}, ISBN = {30540-64275-7}, YEAR = {1998}, PAGES = {249--260}, } @INPROCEEDINGS{Jansen-STACS-98, AUTHOR = {Jansen, Klaus}, EDITOR = {Morvan, Michel and Meinel, Christoph and Krob, Daniel}, TITLE = {The Mutual Exclusion Scheduling Problem for Permutation and Comparability Graphs}, BOOKTITLE = {Proceedings of the 15th Annual Symposium on Theoretical Aspects of Computer Science (STACS-98)}, PADDRESS = {Berlin, Germany}, ADDRESS = {Paris, France}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {1373}, ISBN = {3-540-64230-7}, YEAR = {1998}, PAGES = {287--297}, } @INPROCEEDINGS{JansenKMS2010, AUTHOR = {Jansen, Klaus and Kratsch, Stefan and Marx, D{\'a}niel and Schlotter, Ildik{\'o}}, EDITOR = {Kaplan, Haim}, TITLE = {Bin Packing with Fixed Number of Bins Revisited}, BOOKTITLE = {Algorithm Theory - SWAT 2010 : 12th Scandinavian Symposium and Workshops on Algorithm Theory}, PADDRESS = {Berlin}, ADDRESS = {Bergen, Norway}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6139}, ISBN = {978-3-642-13730-3}, DOI = {10.1007/978-3-642-13731-0_25}, YEAR = {2010}, PAGES = {260--272}, } @ARTICLE{JansenNeumann2010, AUTHOR = {Jansen, Thomas and Neumann, Frank}, JOURNAL = {Evolutionary Computation}, TITLE = {Editorial for the Special Issue on Theoretical Aspects of Evolutionary Multi-Objective Optimization}, ADDRESS = {Cambridge, Mass.}, NUMBER = {3}, PUBLISHER = {MIT Press}, VOLUME = {18}, ISBN = {1063-6560}, DOI = {10.1162/EVCO_e_00019}, YEAR = {2010}, PAGES = {333--334}, } @ARTICLE{JansenPorkolab2002, AUTHOR = {Jansen, Klaus and Porkolab, Lorant}, JOURNAL = {Algorithmica}, TITLE = {Linear-Time Approximation Schemes for Scheduling Malleable Parallel Tasks}, ADDRESS = {Berlin, Germany}, NUMBER = {3}, PUBLISHER = {Springer}, VOLUME = {32}, ISBN = {0178-4617}, YEAR = {2002}, PAGES = {507--520}, } @INCOLLECTION{JansenSolisObaSviridenko2000, AUTHOR = {Jansen, Klaus and Solis-Oba, Roberto and Sviridenko, Maxim}, EDITOR = {Pardalos, Panos M.}, TITLE = {Linear time approximation schemes for shop scheduling problems}, BOOKTITLE = {Approximation and complexity in numerical optimization}, ADDRESS = {Dordrecht, The Netherlands}, PUBLISHER = {Kluwer}, SERIES = {Nonconvex optimization and its applications}, VOLUME = {42}, ISBN = {0-7923-6275-6}, YEAR = {2000}, PAGES = {338--346}, } @ARTICLE{Jez2008ICALP, AUTHOR = {Jez, Artur and Okhotin, Alexander}, JOURNAL = {Information and Computation}, TITLE = {Computational completeness of equations over sets of natural numbers}, ADDRESS = {Amsterdam, The Netherlands}, PUBLISHER = {Elsevier}, MONTH = {October}, VOLUME = {237}, ISBN = {0890-5401}, YEAR = {2014}, PAGES = {56--94}, ABSTRACT