Zum Hauptinhalt springen

Showing 1–50 of 66 results for author: Young, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.00713  [pdf, other

    cs.LG math.OC stat.ML

    Reinforcement Learning applied to Insurance Portfolio Pursuit

    Authors: Edward James Young, Alistair Rogers, Elliott Tong, James Jordon

    Abstract: When faced with a new customer, many factors contribute to an insurance firm's decision of what offer to make to that customer. In addition to the expected cost of providing the insurance, the firm must consider the other offers likely to be made to the customer, and how sensitive the customer is to differences in price. Moreover, firms often target a specific portfolio of customers that could dep… ▽ More

    Submitted 2 August, 2024; v1 submitted 1 August, 2024; originally announced August 2024.

    Comments: 16 pages, 1 figure

  2. arXiv:2407.00009  [pdf, other

    cs.DC cs.NI

    An Open-Source Fast Parallel Routing Approach for Commercial FPGAs

    Authors: Xinshi Zang, Wenhao Lin, Shiju Lin, Jinwei Liu, Evangeline F. Y. Young

    Abstract: In the face of escalating complexity and size of contemporary FPGAs and circuits, routing emerges as a pivotal and time-intensive phase in FPGA compilation flows. In response to this challenge, we present an open-source parallel routing methodology designed to expedite routing procedures for commercial FPGAs. Our approach introduces a novel recursive partitioning ternary tree to augment the parall… ▽ More

    Submitted 25 April, 2024; originally announced July 2024.

  3. arXiv:2405.05590  [pdf, other

    cs.CR cs.AR cs.LG

    TroLLoc: Logic Locking and Layout Hardening for IC Security Closure against Hardware Trojans

    Authors: Fangzhou Wang, Qijing Wang, Lilas Alrahis, Bangqi Fu, Shui Jiang, Xiaopeng Zhang, Ozgur Sinanoglu, Tsung-Yi Ho, Evangeline F. Y. Young, Johann Knechtel

    Abstract: Due to cost benefits, supply chains of integrated circuits (ICs) are largely outsourced nowadays. However, passing ICs through various third-party providers gives rise to many security threats, like piracy of IC intellectual property or insertion of hardware Trojans, i.e., malicious circuit modifications. In this work, we proactively and systematically protect the physical layouts of ICs against… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

  4. arXiv:2403.14584  [pdf, other

    cs.SI math.DS nlin.AO physics.soc-ph

    Dynamical importance and network perturbations

    Authors: Ethan Young, Mason A. Porter

    Abstract: The leading eigenvalue $λ$ of the adjacency matrix of a graph exerts much influence on the behavior of dynamical processes on that graph. It is thus relevant to relate notions of the importance (specifically, centrality measures) of network structures to $λ$ and its associated eigenvector. We study a previously derived measure of edge importance known as ``dynamical importance'', which estimates h… ▽ More

    Submitted 21 August, 2024; v1 submitted 21 March, 2024; originally announced March 2024.

    Comments: 12 pages; revised version

  5. arXiv:2403.12029  [pdf, other

    cs.CV cs.AI cs.LG

    Align and Distill: Unifying and Improving Domain Adaptive Object Detection

    Authors: Justin Kay, Timm Haucke, Suzanne Stathatos, Siqi Deng, Erik Young, Pietro Perona, Sara Beery, Grant Van Horn

    Abstract: Object detectors often perform poorly on data that differs from their training set. Domain adaptive object detection (DAOD) methods have recently demonstrated strong results on addressing this challenge. Unfortunately, we identify systemic benchmarking pitfalls that call past results into question and hamper further progress: (a) Overestimation of performance due to underpowered baselines, (b) Inc… ▽ More

    Submitted 25 August, 2024; v1 submitted 18 March, 2024; originally announced March 2024.

    Comments: 28 pages, 12 figures

  6. arXiv:2403.07257  [pdf, other

    cs.AR cs.ET

    The Dawn of AI-Native EDA: Opportunities and Challenges of Large Circuit Models

    Authors: Lei Chen, Yiqi Chen, Zhufei Chu, Wenji Fang, Tsung-Yi Ho, Ru Huang, Yu Huang, Sadaf Khan, Min Li, Xingquan Li, Yu Li, Yun Liang, Jinwei Liu, Yi Liu, Yibo Lin, Guojie Luo, Zhengyuan Shi, Guangyu Sun, Dimitrios Tsaras, Runsheng Wang, Ziyi Wang, Xinming Wei, Zhiyao Xie, Qiang Xu, Chenhao Xue , et al. (14 additional authors not shown)

    Abstract: Within the Electronic Design Automation (EDA) domain, AI-driven solutions have emerged as formidable tools, yet they typically augment rather than redefine existing methodologies. These solutions often repurpose deep learning models from other domains, such as vision, text, and graph analytics, applying them to circuit design without tailoring to the unique complexities of electronic circuits. Suc… ▽ More

    Submitted 1 May, 2024; v1 submitted 11 March, 2024; originally announced March 2024.

    Comments: The authors are ordered alphabetically. Contact: qxu@cse[dot]cuhk[dot]edu[dot]hk, gluo@pku[dot]edu[dot]cn, yuan.mingxuan@huawei[dot]com

  7. arXiv:2401.04915  [pdf, other

    cs.SI

    From low resource information extraction to identifying influential nodes in knowledge graphs

    Authors: Erica Cai, Olga Simek, Benjamin A. Miller, Danielle Sullivan-Pao, Evan Young, Christopher L. Smith

    Abstract: We propose a pipeline for identifying important entities from intelligence reports that constructs a knowledge graph, where nodes correspond to entities of fine-grained types (e.g. traffickers) extracted from the text and edges correspond to extracted relations between entities (e.g. cartel membership). The important entities in intelligence reports then map to central nodes in the knowledge graph… ▽ More

    Submitted 9 January, 2024; originally announced January 2024.

    Comments: 14 pages, 6 figures, to appear at CompleNet 2024

  8. arXiv:2302.09692  [pdf, ps, other

    cs.DS

    Classification via two-way comparisons

    Authors: Marek Chrobak, Neal E. Young

    Abstract: Given a weighted, ordered query set $Q$ and a partition of $Q$ into classes, we study the problem of computing a minimum-cost decision tree that, given any query $q$ in $Q$, uses equality tests and less-than comparisons to determine the class to which $q$ belongs. Such a tree can be much smaller than a lookup table, and much faster and smaller than a conventional search tree. We give the first pol… ▽ More

    Submitted 19 February, 2023; originally announced February 2023.

  9. arXiv:2211.07997  [pdf, other

    cs.CR cs.AR cs.LG

    Security Closure of IC Layouts Against Hardware Trojans

    Authors: Fangzhou Wang, Qijing Wang, Bangqi Fu, Shui Jiang, Xiaopeng Zhang, Lilas Alrahis, Ozgur Sinanoglu, Johann Knechtel, Tsung-Yi Ho, Evangeline F. Y. Young

    Abstract: Due to cost benefits, supply chains of integrated circuits (ICs) are largely outsourced nowadays. However, passing ICs through various third-party providers gives rise to many threats, like piracy of IC intellectual property or insertion of hardware Trojans, i.e., malicious circuit modifications. In this work, we proactively and systematically harden the physical layouts of ICs against post-desi… ▽ More

    Submitted 15 November, 2022; originally announced November 2022.

    Comments: To appear in ISPD'23

  10. arXiv:2207.09295  [pdf, other

    cs.CV cs.LG

    The Caltech Fish Counting Dataset: A Benchmark for Multiple-Object Tracking and Counting

    Authors: Justin Kay, Peter Kulits, Suzanne Stathatos, Siqi Deng, Erik Young, Sara Beery, Grant Van Horn, Pietro Perona

    Abstract: We present the Caltech Fish Counting Dataset (CFC), a large-scale dataset for detecting, tracking, and counting fish in sonar videos. We identify sonar videos as a rich source of data for advancing low signal-to-noise computer vision applications and tackling domain generalization in multiple-object tracking (MOT) and counting. In comparison to existing MOT and counting datasets, which are largely… ▽ More

    Submitted 19 July, 2022; originally announced July 2022.

    Comments: ECCV 2022. 33 pages, 12 figures

  11. arXiv:2206.05579  [pdf, other

    cs.DS

    Online Paging with Heterogeneous Cache Slots

    Authors: Marek Chrobak, Samuel Haney, Mehraneh Liaee, Debmalya Panigrahi, Rajmohan Rajaraman, Ravi Sundaram, Neal E. Young

    Abstract: It is natural to generalize the online $k$-Server problem by allowing each request to specify not only a point $p$, but also a subset $S$ of servers that may serve it. For uniform metrics, the problem is equivalent to a generalization of Paging in which each request specifies not only a page $p$, but also a subset $S$ of cache slots, and is satisfied by having a copy of $p$ in some slot in $S$. We… ▽ More

    Submitted 23 February, 2023; v1 submitted 11 June, 2022; originally announced June 2022.

    Comments: 33 pages, conference version appears in STACS 2023

    ACM Class: F.2.0; F.1.2; C.0

  12. arXiv:2110.01970  [pdf

    cs.CR

    Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure

    Authors: Edward Henry Young, Christos Chrysoulas, Nikolaos Pitropakis, Pavlos Papadopoulos, William J Buchanan

    Abstract: Little or no research has been directed to analysis and researching forensic analysis of the Bitcoin mixing or 'tumbling' service themselves. This work is intended to examine effective tooling and methodology for recovering forensic artifacts from two privacy focused mixing services namely Obscuro which uses the secure enclave on intel chips to provide enhanced confidentiality and Wasabi wallet wh… ▽ More

    Submitted 5 October, 2021; originally announced October 2021.

    Comments: Accepted for publication in the International Conference on Data Analytics for Business and Industry (ICDABI) 2021 - (DATA'21)

  13. A Simple Algorithm for Optimal Search Trees with Two-Way Comparisons

    Authors: Marek Chrobak, Mordecai Golin, J. Ian Munro, Neal E. Young

    Abstract: We present a simple $O(n^4)$-time algorithm for computing optimal search trees with two-way comparisons. The only previous solution to this problem, by Anderson et al., has the same running time, but is significantly more complicated and is restricted to the variant where only successful queries are allowed. Our algorithm extends directly to solve the standard full variant of the problem, which al… ▽ More

    Submitted 4 October, 2021; v1 submitted 1 March, 2021; originally announced March 2021.

    Comments: v3 adds Appendix B, with a stronger alternative to Theorem 1

    MSC Class: 68P10; 68P30; 68W25; 94A45 ACM Class: E.4; G.1.6; G.2.2; H.3.1; I.4.2

    Journal ref: ACM Transactions on Algorithms 18(1) (2022) 1-11

  14. On the Cost of Unsuccessful Searches in Search Trees with Two-way Comparisons

    Authors: Marek Chrobak, Mordecai Golin, J. Ian Munro, Neal E. Young

    Abstract: Search trees are commonly used to implement access operations to a set of stored keys. If this set is static and the probabilities of membership queries are known in advance, then one can precompute an optimal search tree, namely one that minimizes the expected access cost. For a non-key query, a search tree can determine its approximate location by returning the inter-key interval containing the… ▽ More

    Submitted 9 March, 2021; v1 submitted 1 March, 2021; originally announced March 2021.

    Comments: v2 has updated bibliography

    MSC Class: 68P10; 68P30; 68W25; 94A45 ACM Class: E.4; G.1.6; G.2.2; H.3.1; I.4.2

    Journal ref: Information and Computation 281 (2021)

  15. arXiv:2011.02615  [pdf, other

    cs.DS cs.DB

    Competitive Data-Structure Dynamization

    Authors: Claire Mathieu, Rajmohan Rajaraman, Neal E. Young, Arman Yousefi

    Abstract: Data-structure dynamization is a general approach for making static data structures dynamic. It is used extensively in geometric settings and in the guise of so-called merge (or compaction) policies in big-data databases such as Google Bigtable and LevelDB (our focus). Previous theoretical work is based on worst-case analyses for uniform inputs -- insertions of one item at a time and constant read… ▽ More

    Submitted 23 July, 2024; v1 submitted 4 November, 2020; originally announced November 2020.

    Comments: Conference version in SODA (2021). Journal version in ACM TALG (accepted June 2024)

    MSC Class: 68W27; 68P15; 68R05 ACM Class: F.1.2; H.2.4

    Journal ref: ACM Trans. Algorithms. June 2024

  16. Attacking Split Manufacturing from a Deep Learning Perspective

    Authors: Haocheng Li, Satwik Patnaik, Abhrajit Sengupta, Haoyu Yang, Johann Knechtel, Bei Yu, Evangeline F. Y. Young, Ozgur Sinanoglu

    Abstract: The notion of integrated circuit split manufacturing which delegates the front-end-of-line (FEOL) and back-end-of-line (BEOL) parts to different foundries, is to prevent overproduction, piracy of the intellectual property (IP), or targeted insertion of hardware Trojans by adversaries in the FEOL facility. In this work, we challenge the security promise of split manufacturing by formulating various… ▽ More

    Submitted 8 July, 2020; originally announced July 2020.

  17. arXiv:2006.04838  [pdf

    cs.HC

    How are your robot friends doing? A design exploration of graphical techniques supporting awareness of robot team members in teleoperation

    Authors: Stela H. Seo, James E. Young, Pourang Irani

    Abstract: While teleoperated robots continue to proliferate in domains including search and rescue, field exploration, or the military, human error remains a primary cause for accidents or mistakes. One challenge is that teleoperating a remote robot is cognitively taxing as the operator needs to understand the robot's state and monitor all its sensor data. In a multi-robot team, an operator needs to additio… ▽ More

    Submitted 8 June, 2020; originally announced June 2020.

    Comments: submitted to International Journal of Social Robotics https://www.springer.com/journal/12369/

  18. Algorithmic approaches to selecting control clones in DNA array hybridization experiments

    Authors: Qi Fu, Elizabeth Bent, James Borneman, Marek Chrobak, Neal E. Young

    Abstract: We study the problem of selecting control clones in DNA array hybridization experiments. The problem arises in the OFRG method for analyzing microbial communities. The OFRG method performs classification of rRNA gene clones using binary fingerprints created from a series of hybridization experiments, where each experiment consists of hybridizing a collection of arrayed clones with a single oligonu… ▽ More

    Submitted 27 May, 2020; originally announced May 2020.

    Journal ref: Journal of Bioinformatics and Computational Biology 5(4) 937-961, 2007

  19. Distributed algorithms for covering, packing and maximum weighted matching

    Authors: Christos Koufogiannakis, Neal E. Young

    Abstract: This paper gives poly-logarithmic-round, distributed D-approximation algorithms for covering problems with submodular cost and monotone covering constraints (Submodular-cost Covering). The approximation ratio D is the maximum number of variables in any constraint. Special cases include Covering Mixed Integer Linear Programs (CMIP), and Weighted Vertex Cover (with D=2). Via duality, the paper also… ▽ More

    Submitted 27 May, 2020; originally announced May 2020.

    MSC Class: 90C26; 68W15 ACM Class: C.2.4; G.1.6

    Journal ref: Distributed Computing 24, 45--63 (2011)

  20. arXiv:1906.10773  [pdf, other

    cs.LG cs.CR stat.ML

    Are Adversarial Perturbations a Showstopper for ML-Based CAD? A Case Study on CNN-Based Lithographic Hotspot Detection

    Authors: Kang Liu, Haoyu Yang, Yuzhe Ma, Benjamin Tan, Bei Yu, Evangeline F. Y. Young, Ramesh Karri, Siddharth Garg

    Abstract: There is substantial interest in the use of machine learning (ML) based techniques throughout the electronic computer-aided design (CAD) flow, particularly those based on deep learning. However, while deep learning methods have surpassed state-of-the-art performance in several applications, they have exhibited intrinsic susceptibility to adversarial perturbations --- small but deliberate alteratio… ▽ More

    Submitted 25 June, 2019; originally announced June 2019.

    Journal ref: ACM Trans. Des. Autom. Electron. Syst. 25, 5, Article 48 (August 2020)

  21. On Huang and Wong's Algorithm for Generalized Binary Split Trees

    Authors: Marek Chrobak, Mordecai Golin, J. Ian Munro, Neal E. Young

    Abstract: Huang and Wong [1984] proposed a polynomial-time dynamic-programming algorithm for computing optimal generalized binary split trees. We show that their algorithm is incorrect. Thus, it remains open whether such trees can be computed in polynomial time. Spuler [1994] proposed modifying Huang and Wong's algorithm to obtain an algorithm for a different problem: computing optimal two-way-comparison se… ▽ More

    Submitted 14 February, 2022; v1 submitted 11 January, 2019; originally announced January 2019.

    MSC Class: 68P10; 68P30; 68W25; 94A45 ACM Class: E.4; G.1.6; G.2.2; H.3.1; I.4.2

    Journal ref: Acta Informatica (2022)

  22. arXiv:1710.03358  [pdf, other

    cs.DS

    Balanced power diagrams for redistricting

    Authors: Vincent Cohen-Addad, Philip N. Klein, Neal E. Young

    Abstract: We propose a method for redistricting, decomposing a geographical area into subareas, called districts, so that the populations of the districts are as close as possible and the districts are compact and contiguous. Each district is the intersection of a polygon with the geographical area. The polygons are convex and the average number of sides per polygon is less than six. The polygons tend to be… ▽ More

    Submitted 7 January, 2018; v1 submitted 9 October, 2017; originally announced October 2017.

  23. Optimal Search Trees with 2-Way Comparisons

    Authors: Marek Chrobak, Mordecai Golin, J. Ian Munro, Neal E. Young

    Abstract: In 1971, Knuth gave an $O(n^2)$-time algorithm for the classic problem of finding an optimal binary search tree. Knuth's algorithm works only for search trees based on 3-way comparisons, while most modern computers support only 2-way comparisons (e.g., $<, \le, =, \ge$, and $>$). Until this paper, the problem of finding an optimal search tree using 2-way comparisons remained open -- poly-time algo… ▽ More

    Submitted 9 March, 2021; v1 submitted 2 May, 2015; originally announced May 2015.

    Comments: ERRATUM: The proof of Theorem 3 of the ISAAC'15 paper (v4 here) is incorrect. Version v5 here contains: a full erratum, proofs of the other results, and pointers to journal versions expanding those results

    MSC Class: 68P10; 68P30; 68W25; 94A45; ACM Class: E.4; G.1.6; G.2.2; H.3.1; I.4.2

    Journal ref: Optimal Search Trees with 2-Way Comparisons. In: Elbassioni K., Makino K. (eds) Algorithms and Computation. ISAAC 2015. Lecture Notes in Computer Science, vol 9472 (2105). Springer, Berlin, Heidelberg

  24. arXiv:1407.3015  [pdf, ps, other

    cs.DS

    Nearly Linear-Work Algorithms for Mixed Packing/Covering and Facility-Location Linear Programs

    Authors: Neal E. Young

    Abstract: We describe the first nearly linear-time approximation algorithms for explicitly given mixed packing/covering linear programs, and for (non-metric) fractional facility location. We also describe the first parallel algorithms requiring only near-linear total work and finishing in polylog time. The algorithms compute $(1+ε)$-approximate solutions in time (and work) $O^*(N/ε^2)$, where $N$ is the num… ▽ More

    Submitted 5 November, 2014; v1 submitted 10 July, 2014; originally announced July 2014.

    MSC Class: 90-08; 90C05; 49M29; 65K05 ACM Class: F.2.1; G.1.6

  25. arXiv:1407.3008  [pdf, other

    cs.DS

    Bigtable Merge Compaction

    Authors: Claire Mathieu, Carl Staelin, Neal E. Young, Arman Yousefi

    Abstract: NoSQL databases are widely used for massive data storage and real-time web applications. Yet important aspects of these data structures are not well understood. For example, NoSQL databases write most of their data to a collection of files on disk, meanwhile periodically compacting subsets of these files. A compaction policy must choose which files to compact, and when to compact them, without kno… ▽ More

    Submitted 9 July, 2015; v1 submitted 10 July, 2014; originally announced July 2014.

    MSC Class: 68W27; 68P15; 68R05 ACM Class: F.1.2; H.2.4

    Journal ref: SUPERSEDED BY https://arxiv.org/abs/2011.02615

  26. arXiv:1307.5296  [pdf, ps, other

    cs.DS cs.IT

    First-Come-First-Served for Online Slot Allocation and Huffman Coding

    Authors: Monik Khare, Claire Mathieu, Neal E. Young

    Abstract: Can one choose a good Huffman code on the fly, without knowing the underlying distribution? Online Slot Allocation (OSA) models this and similar problems: There are n slots, each with a known cost. There are n items. Requests for items are drawn i.i.d. from a fixed but hidden probability distribution p. After each request, if the item, i, was not previously requested, then the algorithm (knowing t… ▽ More

    Submitted 7 October, 2013; v1 submitted 19 July, 2013; originally announced July 2013.

    Comments: ACM-SIAM Symposium on Discrete Algorithms (SODA) 2014

    MSC Class: 68W40; 68Q87 ACM Class: F.1.2; F.2.0; H.1.1

  27. arXiv:1303.2920  [pdf, ps, other

    cs.DS

    Approximating 1-dimensional TSP Requires Omega(n log n) Comparisons

    Authors: Neal E. Young

    Abstract: We give a short proof that any comparison-based n^(1-epsilon)-approximation algorithm for the 1-dimensional Traveling Salesman Problem (TSP) requires Omega(n log n) comparisons.

    Submitted 26 March, 2013; v1 submitted 12 March, 2013; originally announced March 2013.

    Comments: Superseded by "On the complexity of approximating Euclidean traveling salesman tours and minimum spanning trees", by Das et al; Algorithmica 19:447-460 (1997)

    MSC Class: 68W25 ACM Class: F.2.2; G.2.2

  28. Approximation Algorithms for the Joint Replenishment Problem with Deadlines

    Authors: Marcin Bienkowski, Jaroslaw Byrka, Marek Chrobak, Neil Dobbs, Tomasz Nowicki, Maxim Sviridenko, Grzegorz Swirszcz, Neal E. Young

    Abstract: The Joint Replenishment Problem (JRP) is a fundamental optimization problem in supply-chain management, concerned with optimizing the flow of goods from a supplier to retailers. Over time, in response to demands at the retailers, the supplier ships orders, via a warehouse, to the retailers. The objective is to schedule these orders to minimize the sum of ordering costs and retailers' waiting costs… ▽ More

    Submitted 2 December, 2015; v1 submitted 13 December, 2012; originally announced December 2012.

    MSC Class: 68W25; 90C05 ACM Class: G.1.6

    Journal ref: J. Scheduling 18(6): 545-560 (2015)

  29. arXiv:1208.2724  [pdf, ps, other

    cs.DS

    Caching with rental cost and zapping

    Authors: Monik Khare, Neal E. Young

    Abstract: The \emph{file caching} problem is defined as follows. Given a cache of size $k$ (a positive integer), the goal is to minimize the total retrieval cost for the given sequence of requests to files. A file $f$ has size $size(f)$ (a positive integer) and retrieval cost $cost(f)$ (a non-negative number) for bringing the file into the cache. A \emph{miss} or \emph{fault} occurs when the requested file… ▽ More

    Submitted 18 October, 2012; v1 submitted 13 August, 2012; originally announced August 2012.

    Comments: Caching with rental cost, caching with zapping

  30. Hamming Approximation of NP Witnesses

    Authors: Daniel Sheldon, Neal E. Young

    Abstract: Given a satisfiable 3-SAT formula, how hard is it to find an assignment to the variables that has Hamming distance at most n/2 to a satisfying assignment? More generally, consider any polynomial-time verifier for any NP-complete language. A d(n)-Hamming-approximation algorithm for the verifier is one that, given any member x of the language, outputs in polynomial time a string a with Hamming dista… ▽ More

    Submitted 19 July, 2013; v1 submitted 1 August, 2012; originally announced August 2012.

    MSC Class: 03D15; 68Q25; 90C59 ACM Class: F.1.3; F.2.2

    Journal ref: Theory of Computing 9(22), 2013, pp. 685-702

  31. On a Linear Program for Minimum-Weight Triangulation

    Authors: Arman Yousefi, Neal E. Young

    Abstract: Minimum-weight triangulation (MWT) is NP-hard. It has a polynomial-time constant-factor approximation algorithm, and a variety of effective polynomial- time heuristics that, for many instances, can find the exact MWT. Linear programs (LPs) for MWT are well-studied, but previously no connection was known between any LP and any approximation algorithm or heuristic for MWT. Here we show the first suc… ▽ More

    Submitted 4 October, 2013; v1 submitted 22 November, 2011; originally announced November 2011.

    Comments: To appear in SICOMP. Extended abstract appeared in SODA 2012

    MSC Class: 68W25; 90C05 ACM Class: G.1.6; I.3.5

    Journal ref: SIAM Journal on Computing 43(1):25-51(2014)

  32. arXiv:1007.0217  [pdf, ps, other

    cs.DS

    A Bound on the Sum of Weighted Pairwise Distances of Points Constrained to Balls

    Authors: Neal E. Young

    Abstract: We consider the problem of choosing Euclidean points to maximize the sum of their weighted pairwise distances, when each point is constrained to a ball centered at the origin. We derive a dual minimization problem and show strong duality holds (i.e., the resulting upper bound is tight) when some locally optimal configuration of points is affinely independent. We sketch a polynomial time algorithm… ▽ More

    Submitted 1 July, 2010; originally announced July 2010.

    Comments: Cornell ORIE Tech Report

    Report number: 1103 MSC Class: 90C27 (Primary) 90C22; 52A40 (Secondary) ACM Class: G.1.6

  33. Greedy D-Approximation Algorithm for Covering with Arbitrary Constraints and Submodular Cost

    Authors: Christos Koufogiannakis, Neal E. Young

    Abstract: This paper describes a simple greedy D-approximation algorithm for any covering problem whose objective function is submodular and non-decreasing, and whose feasible region can be expressed as the intersection of arbitrary (closed upwards) covering constraints, each of which constrains at most D variables of the problem. (A simple example is Vertex Cover, with D = 2.) The algorithm generalizes pre… ▽ More

    Submitted 30 December, 2011; v1 submitted 4 July, 2008; originally announced July 2008.

    MSC Class: 68W25 ACM Class: G.1.6

    Journal ref: Algorithmica 66(1):113-152 (2013)

  34. A Nearly Linear-Time PTAS for Explicit Fractional Packing and Covering Linear Programs

    Authors: Christos Koufogiannakis, Neal E. Young

    Abstract: We give an approximation algorithm for packing and covering linear programs (linear programs with non-negative coefficients). Given a constraint matrix with n non-zeros, r rows, and c columns, the algorithm computes feasible primal and dual solutions whose costs are within a factor of 1+eps of the optimal cost in time O((r+c)log(n)/eps^2 + n).

    Submitted 13 March, 2013; v1 submitted 13 January, 2008; originally announced January 2008.

    Comments: corrected version of FOCS 2007 paper: 10.1109/FOCS.2007.62. Accepted to Algorithmica, 2013

    MSC Class: 68W25 ACM Class: G.1.6

    Journal ref: Algorithmica 70(4):648-674(2014)

  35. The reverse greedy algorithm for the metric k-median problem

    Authors: Marek Chrobak, Claire Kenyon, Neal E. Young

    Abstract: The Reverse Greedy algorithm (RGreedy) for the k-median problem works as follows. It starts by placing facilities on all nodes. At each step, it removes a facility to minimize the resulting total distance from the customers to the remaining facilities. It stops when k facilities remain. We prove that, if the distance function is metric, then the approximation ratio of RGreedy is between ?(log n/… ▽ More

    Submitted 27 September, 2005; v1 submitted 27 April, 2005; originally announced April 2005.

    Comments: to appear in IPL. preliminary version in COCOON '05

    ACM Class: G.1.6; G.2.2; F.2.2

    Journal ref: Information Processing Letters 97:68-72(2006)

  36. Incremental Medians via Online Bidding

    Authors: Marek Chrobak, Claire Kenyon, John Noga, Neal E. Young

    Abstract: In the k-median problem we are given sets of facilities and customers, and distances between them. For a given set F of facilities, the cost of serving a customer u is the minimum distance between u and a facility in F. The goal is to find a set F of k facilities that minimizes the sum, over all customers, of their service costs. Following Mettu and Plaxton, we study the incremental medians prob… ▽ More

    Submitted 28 May, 2020; v1 submitted 26 April, 2005; originally announced April 2005.

    Comments: conference version appeared in LATIN 2006 as "Oblivious Medians via Online Bidding"

    ACM Class: G.1.6; G.2.2; F.2.2

    Journal ref: Algorithmica 50(4):455-478(2008)

  37. A New Operation on Sequences: the Boustrouphedon Transform

    Authors: Jessica Millar, N. J. A. Sloane, Neal E. Young

    Abstract: A generalization of the Seidel-Entringer-Arnold method for calculating the alternating permutation numbers (or secant-tangent numbers) leads to a new operation on integer sequences, the Boustrophedon transform.

    Submitted 24 June, 2002; v1 submitted 20 May, 2002; originally announced May 2002.

    Comments: very minor change: corrected typo in author list. June 24 2002: correction to a proof; additional references

    MSC Class: 05A15

    Journal ref: J. Combinatorial Theory, Series A 76(1):44-54 (1996)

  38. Designing Multi-Commodity Flow Trees

    Authors: Samir Khuller, Balaji Raghavachari, Neal E. Young

    Abstract: The traditional multi-commodity flow problem assumes a given flow network in which multiple commodities are to be maximally routed in response to given demands. This paper considers the multi-commodity flow network-design problem: given a set of multi-commodity flow demands, find a network subject to certain constraints such that the commodities can be maximally routed. This paper focuses on t… ▽ More

    Submitted 30 May, 2002; originally announced May 2002.

    Comments: Conference version in WADS'93

    ACM Class: F.2.2; G.2.2

    Journal ref: Information Processing Letters 50:49-55 (1994)

  39. Rounding Algorithms for a Geometric Embedding of Minimum Multiway Cut

    Authors: David Karger, Phil Klein, Cliff Stein, Mikkel Thorup, Neal E. Young

    Abstract: The multiway-cut problem is, given a weighted graph and k >= 2 terminal nodes, to find a minimum-weight set of edges whose removal separates all the terminals. The problem is NP-hard, and even NP-hard to approximate within 1+delta for some small delta > 0. Calinescu, Karloff, and Rabani (1998) gave an algorithm with performance guarantee 3/2-1/k, based on a geometric relaxation of the problem.… ▽ More

    Submitted 15 September, 2003; v1 submitted 19 May, 2002; originally announced May 2002.

    Comments: Conference version in ACM Symposium on Theory of Computing (1999). To appear in Mathematics of Operations Research

    ACM Class: F.2.0; G.1.6; G.2.2

    Journal ref: Mathematics of Operations Research 29(3):436-461(2004)

  40. A Network-Flow Technique for Finding Low-Weight Bounded-Degree Spanning Trees

    Authors: S. Fekete, S. Khuller, M. Klemmstein, B. Raghavachari, Neal E. Young

    Abstract: The problem considered is the following. Given a graph with edge weights satisfying the triangle inequality, and a degree bound for each vertex, compute a low-weight spanning tree such that the degree of each vertex is at most its specified bound. The problem is NP-hard (it generalizes Traveling Salesman (TSP)). This paper describes a network-flow heuristic for modifying a given tree T to meet t… ▽ More

    Submitted 18 May, 2002; originally announced May 2002.

    ACM Class: F.2.2; G.2.2

    Journal ref: Journal of Algorithms 24(2):310-324 (1997)

  41. Prefix Codes: Equiprobable Words, Unequal Letter Costs

    Authors: Mordecai Golin, Neal E. Young

    Abstract: Describes a near-linear-time algorithm for a variant of Huffman coding, in which the letters may have non-uniform lengths (as in Morse code), but with the restriction that each word to be encoded has equal probability. [See also ``Huffman Coding with Unequal Letter Costs'' (2002).]

    Submitted 18 May, 2002; originally announced May 2002.

    Comments: proceedings version in ICALP (1994)

    ACM Class: F.2.0; E.4; I.4.2

    Journal ref: SIAM J. Computing 25(6):1281-1304 (1996)

  42. Huffman Coding with Letter Costs: A Linear-Time Approximation Scheme

    Authors: Mordecai Golin, Claire Mathieu, Neal E. Young

    Abstract: We give a polynomial-time approximation scheme for the generalization of Huffman Coding in which codeword letters have non-uniform costs (as in Morse code, where the dash is twice as long as the dot). The algorithm computes a (1+epsilon)-approximate solution in time O(n + f(epsilon) log^3 n), where n is the input size.

    Submitted 23 April, 2012; v1 submitted 18 May, 2002; originally announced May 2002.

    ACM Class: F.2.0; E.4; I.4.2

    Journal ref: SIAM Journal on Computing 41(3):684-713(2012)

  43. arXiv:cs/0205047  [pdf, ps, other

    cs.DS cs.DM

    K-Medians, Facility Location, and the Chernoff-Wald Bound

    Authors: Neal E. Young

    Abstract: The paper gives approximation algorithms for the k-medians and facility-location problems (both NP-hard). For k-medians, the algorithm returns a solution using at most ln(n+n/epsilon)k medians and having cost at most (1+epsilon) times the cost of the best solution that uses at most k medians. Here epsilon > 0 is an input to the algorithm. In comparison, the best previous algorithm (Jyh-Han Lin a… ▽ More

    Submitted 8 April, 2005; v1 submitted 18 May, 2002; originally announced May 2002.

    ACM Class: F.2.1; G.1.6; G.2.2; G.3

    Journal ref: ACM-SIAM Symposium on Discrete Algorithms (2000)

  44. On the Number of Iterations for Dantzig-Wolfe Optimization and Packing-Covering Approximation Algorithms

    Authors: Phil Klein, Neal E. Young

    Abstract: We give a lower bound on the iteration complexity of a natural class of Lagrangean-relaxation algorithms for approximately solving packing/covering linear programs. We show that, given an input with $m$ random 0/1-constraints on $n$ variables, with high probability, any such algorithm requires $Ω(ρ\log(m)/ε^2)$ iterations to compute a $(1+ε)$-approximate solution, where $ρ$ is the width of the inp… ▽ More

    Submitted 19 November, 2015; v1 submitted 19 May, 2002; originally announced May 2002.

    ACM Class: F.2.1; G.1.6

    Journal ref: LNCS 1610 (IPCO): 320-327 (1999); SIAM Journal on Computing 44(4):1154-1172(2015)

  45. Balancing Minimum Spanning and Shortest Path Trees

    Authors: Samir Khuller, Balaji Raghavachari, Neal E. Young

    Abstract: This paper give a simple linear-time algorithm that, given a weighted digraph, finds a spanning tree that simultaneously approximates a shortest-path tree and a minimum spanning tree. The algorithm provides a continuous trade-off: given the two trees and epsilon > 0, the algorithm returns a spanning tree in which the distance between any vertex and the root of the shortest-path tree is at most 1… ▽ More

    Submitted 18 May, 2002; originally announced May 2002.

    Comments: conference version: ACM-SIAM Symposium on Discrete Algorithms (1993)

    ACM Class: F.2.2; G.2.2

    Journal ref: Algorithmica 14(4):305-322 (1995)

  46. The K-Server Dual and Loose Competitiveness for Paging

    Authors: Neal E. Young

    Abstract: This paper has two results. The first is based on the surprising observation that the well-known ``least-recently-used'' paging algorithm and the ``balance'' algorithm for weighted caching are linear-programming primal-dual algorithms. This observation leads to a strategy (called ``Greedy-Dual'') that generalizes them both and has an optimal performance guarantee for weighted caching. For the… ▽ More

    Submitted 18 May, 2002; originally announced May 2002.

    Comments: conference version: "On-Line Caching as Cache Size Varies", SODA (1991)

    ACM Class: F.1.2; F.2.0; C.2.0

    Journal ref: Algorithmica 11(6):525-541 (1994)

  47. Low-Degree Spanning Trees of Small Weight

    Authors: Samir Khuller, Balaji Raghavachari, Neal E. Young

    Abstract: The degree-d spanning tree problem asks for a minimum-weight spanning tree in which the degree of each vertex is at most d. When d=2 the problem is TSP, and in this case, the well-known Christofides algorithm provides a 1.5-approximation algorithm (assuming the edge weights satisfy the triangle inequality). In 1984, Christos Papadimitriou and Umesh Vazirani posed the challenge of finding an al… ▽ More

    Submitted 18 May, 2002; originally announced May 2002.

    Comments: conference version in Symposium on Theory of Computing (1994)

    ACM Class: F.2.2; G.2.2

    Journal ref: SIAM J. Computing 25(2):355-368 (1996)

  48. Orienting Graphs to Optimize Reachability

    Authors: S. L. Hakimi, E. Schmeichel, Neal E. Young

    Abstract: The paper focuses on two problems: (i) how to orient the edges of an undirected graph in order to maximize the number of ordered vertex pairs (x,y) such that there is a directed path from x to y, and (ii) how to orient the edges so as to minimize the number of such pairs. The paper describes a quadratic-time algorithm for the first problem, and a proof that the second problem is NP-hard to appro… ▽ More

    Submitted 18 May, 2002; originally announced May 2002.

    ACM Class: F.2.2; G.2.2

    Journal ref: Information Processing Letters 63:229-235 (1997)

  49. Faster Parametric Shortest Path and Minimum Balance Algorithms

    Authors: Neal Young, Robert Tarjan, James Orlin

    Abstract: The parametric shortest path problem is to find the shortest paths in graph where the edge costs are of the form w_ij+lambda where each w_ij is constant and lambda is a parameter that varies. The problem is to find shortest path trees for every possible value of lambda. The minimum-balance problem is to find a ``weighting'' of the vertices so that adjusting the edge costs by the vertex weights… ▽ More

    Submitted 18 May, 2002; originally announced May 2002.

    ACM Class: F.2.2; G.2.2; G.1.6

    Journal ref: Networks 21(2):205-221 (1991)

  50. Approximating the Minimum Equivalent Digraph

    Authors: Samir Khuller, Balaji Raghavachari, Neal E. Young

    Abstract: The MEG (minimum equivalent graph) problem is, given a directed graph, to find a small subset of the edges that maintains all reachability relations between nodes. The problem is NP-hard. This paper gives an approximation algorithm with performance guarantee of pi^2/6 ~ 1.64. The algorithm and its analysis are based on the simple idea of contracting long cycles. (This result is strengthened slig… ▽ More

    Submitted 18 May, 2002; originally announced May 2002.

    Comments: conference version in ACM-SIAM Symposium on Discrete Algorithms (1994)

    ACM Class: F.2.2; G.2.2

    Journal ref: SIAM J. Computing 24(4):859-872 (1995)