Professional Documents
Culture Documents
Textbook Combinatorial Optimization and Applications 8Th International Conference Cocoa 2014 Wailea Maui Hi Usa December 19 21 2014 Proceedings 1St Edition Zhao Zhang Ebook All Chapter PDF
Textbook Combinatorial Optimization and Applications 8Th International Conference Cocoa 2014 Wailea Maui Hi Usa December 19 21 2014 Proceedings 1St Edition Zhao Zhang Ebook All Chapter PDF
https://textbookfull.com/product/combinatorial-optimization-and-
applications-12th-international-conference-cocoa-2018-atlanta-ga-
usa-december-15-17-2018-proceedings-donghyun-kim/
https://textbookfull.com/product/combinatorial-optimization-and-
applications-14th-international-conference-cocoa-2020-dallas-tx-
usa-december-11-13-2020-proceedings-weili-wu/
https://textbookfull.com/product/advanced-data-mining-and-
applications-10th-international-conference-adma-2014-guilin-
china-december-19-21-2014-proceedings-1st-edition-xudong-luo/
https://textbookfull.com/product/intelligent-robotics-and-
applications-7th-international-conference-icira-2014-guangzhou-
china-december-17-20-2014-proceedings-part-ii-1st-edition-
Intelligent Robotics and Applications 7th International
Conference ICIRA 2014 Guangzhou China December 17 20
2014 Proceedings Part I 1st Edition Xianmin Zhang
https://textbookfull.com/product/intelligent-robotics-and-
applications-7th-international-conference-icira-2014-guangzhou-
china-december-17-20-2014-proceedings-part-i-1st-edition-xianmin-
zhang/
https://textbookfull.com/product/integer-programming-and-
combinatorial-optimization-17th-international-conference-
ipco-2014-bonn-germany-june-23-25-2014-proceedings-1st-edition-
jon-lee/
Combinatorial
LNCS 8881
Optimization
and Applications
8th International Conference, COCOA 2014
Wailea, Maui, HI, USA, December 19–21, 2014
Proceedings
123
Lecture Notes in Computer Science 8881
Commenced Publication in 1973
Founding and Former Series Editors:
Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen
Editorial Board
David Hutchison
Lancaster University, Lancaster, UK
Takeo Kanade
Carnegie Mellon University, Pittsburgh, PA, USA
Josef Kittler
University of Surrey, Guildford, UK
Jon M. Kleinberg
Cornell University, Ithaca, NY, USA
Friedemann Mattern
ETH Zurich, Zürich, Switzerland
John C. Mitchell
Stanford University, Stanford, CA, USA
Moni Naor
Weizmann Institute of Science, Rehovot, Israel
C. Pandu Rangan
Indian Institute of Technology, Madras, India
Bernhard Steffen
TU Dortmund University, Dortmund, Germany
Demetri Terzopoulos
University of California, Los Angeles, CA, USA
Doug Tygar
University of California, Berkeley, CA, USA
Gerhard Weikum
Max Planck Institute for Informatics, Saarbruecken, Germany
More information about this series at http://www.springer.com/series/7407
Zhao Zhang Lidong Wu
•
Combinatorial
Optimization
and Applications
8th International Conference, COCOA 2014
Wailea, Maui, HI, USA, December 19–21, 2014
Proceedings
123
Editors
Zhao Zhang Wen Xu
Zhejiang Normal University Ding-Zhu Du
Jinhua, Zhejiang University of Texas
China Dallas, TX
USA
Lidong Wu
University of Texas
Tyler, TX
USA
Committees
General Co-chairs
Xiaodong Hu Chinese Academy of Sciences, China
Weili Wu University of Texas at Dallas, USA
Program Chairs
Ding-Zhu Du University of Texas at Dallas, USA
Thang Dinh Virginia Commonwealth University, USA
Lidong Wu University of Texas at Tyler, USA
Zhao Zhang Zhejiang Normal University, China
Program Committee
Wolfgang Bein University of Nevada, USA
Sergiy Butenko Texas A&M University, USA
Gruia Calinescu Illinois Institute of Technology, USA
Chiuyuan Chen National Chiao Tong University, Taiwan
Xujin Chen Chinese Academy of Sciences, China
He Chen South-Eastern University, China
Zhi-Xiang Chen University of Texas-Pan American, USA
Zhi-Zhong Chen Tokyo Denki University, Japan
Yongxi Cheng Xi’an Jiaotong University, China
Ovidiu Daescu University of Texas at Dallas, USA
Bhaskar Dasgupta University of Illinois at Chicago, USA
Vladimir Deineko The University of Warwick, UK
Ding-Zhu Du University of Texas at Dallas, USA
Zhenhua Duan Xidian University, China
Neng Fan University of Arizona, USA
Juraj Hromkovic ETH Zentrum, Switzerland
Wenlian Hsu Academia Sinica, Taiwan
Hejiao Huang Harbin Institute of Technology, China
Kazuo Iwama Kyoto University, Japan
Xinwen Jiang National University of Defense Technology, China
Liying Kang Shanghai University, China
Naoki Katoh Kyoto University, Japan
Ilias S. Kotsireas Wilfrid Laurier University, Canada
Asaf Levin The Technion, Israel
Minming Li City University of Hong Kong, China
VIII Organization
My T. Thai
Geometric Optimization
Guarding Monotone Art Galleries with Sliding Cameras in Linear Time . . . . 113
Mark de Berg, Stephane Durocher, and Saeed Mehrabi
Network Optimization
A Practical Greedy Approximation for the Directed Steiner Tree Problem . . . 200
Dimitri Watel and Marc-Antoine Weisser
Optimization in Graphs
The List Coloring Reconfiguration Problem for Bounded Pathwidth Graphs . . . 314
Tatsuhiko Hatanaka, Takehiro Ito, and Xiao Zhou
Contents XIII
A Comparison Between the Zero Forcing Number and the Strong Metric
Dimension of Graphs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356
Cong X. Kang and Eunjeong Yi
Applied Optimization
CSoNet
A Fast Greedy Algorithm for the Critical Node Detection Problem . . . . . . . . 603
Mario Ventresca and Dionne Aleman
Miscellaneous
1 Introduction
We consider a variation on the classic job scheduling problem in which the goal
is to minimize the peak demand of a schedule. An important scenario where this
problem arises is in scheduling power jobs in the smart grid. It is advantageous
for utility providers to keep aggregate power demand as flat as possible since this
reduces the cost of generation and distribution. In addition, power generation
may be performed at a local level in which there is reduced benefit of averag-
ing over a large set of users. Currently, power job requests in the home are not
scheduled: power draw begins when the consumer turns on an appliance and
ends when the appliance is turned off. This on-demand scheduling can lead to
high peaks of power usage when consumers collectively issue many jobs, such as
in the evening when numerous household appliances are running. Though many
appliances need to be scheduled in an on-demand fashion to provide instant func-
tionality (e.g. television, light bulbs), other appliances may have more flexibility
and can be delayed and executed at a later time, when power draw is not so high
(e.g. dishwasher, plug-in vehicle charging) [17]. This job flexibility provides the
opportunity to flatten out the overall demand by intelligently delaying execution
of some jobs.
There are several interesting variations on the peak demand scheduling prob-
lem: To begin with, some jobs may be known in advance while others arrive in
a dynamic unpredictable fashion. Thus, the problem can be viewed in both
offline and online settings. Another variation is whether jobs are preemptable,
c Springer International Publishing Switzerland 2014
Z. Zhang et al. (Eds.): COCOA 2014, LNCS 8881, pp. 3–12, 2014.
DOI: 10.1007/978-3-319-12691-3 1
4 S. Yaw and B. Mumey
meaning they can be interrupted for some time, provided they are completed
by the deadline. Some loads such as heating an electric water heater or charg-
ing a plug-in electric vehicle are preemptable but other loads such as running a
dishwasher are not. Finally, some loads may be resizable in the sense that their
power requirements may be adjustable between higher or lower power levels in
conjunction with different execution times (e.g. battery charging). Each of these
variations has an impact on the computational complexity of creating a schedule
that minimizes the peak demand.
In this work, we focus on minimizing the peak demand of a schedule of non-
preemptable, non-resizable jobs having flexible timelines. We summarize our
contributions as follows: We formalize and present two algorithms for the peak
demand minimization problem. The first is an optimal FPT algorithm based on
dynamic programming and the second is a simple heuristic that is shown to have
good results in practice. We leverage current energy disaggregation research to
generate real world test scenarios and schedule them using our algorithms.
The rest of this paper is organized as follows. We discuss related work in
Sect. 2. We formulate the problem in Sect. 3 and examine its computational com-
plexity. Algorithms are presented in Sect. 4 and simulation results are presented
in Sect. 5. The paper is concluded in Sect. 6.
2 Related Work
Several variations on job scheduling for the smart grid have recently been explored.
In [11,12], the authors define a job model, derive a lower bound on the optimal
schedule cost for the offline, preemptive, non-resizable variation and also provide
an optimal online algorithm for the preemptive, non-resizable case, assuming a
statistical description of the input. In [7,13], the authors apply linear program-
ming techniques to power job scheduling with an emphasis on pricing and price
prediction models with the result of reducing peak loads. The main difference with
our work is that we look at specific jobs and aim to schedule them within an accept-
able window. These works do not look at specific jobs, but instead aim to reduce
overall usage with price incentives. In [16], an approximation algorithm for peak
minimization of non-preemptive jobs that have common arrival and completion
deadlines was described that has an approximation ratio of 7.82.1 This approxi-
mation ratio was reduced to 4 by an algorithm presented in [19]. Approximation
algorithms have also been studied for the special case of peak demand minimiza-
tion of jobs with unit demand [5,6].
A problem closely related to peak demand scheduling is the much studied
problem of job scheduling for a speed scalable CPU [4,14,18]. In this case, the
tasks are compute jobs and the processing unit can vary the speed at which
the current job executes; higher speed results in more energy use. While the
preemptive version of the problem has been well-studied and good offline and
1
While not explicitly stated in [16], the best approximation ratio achieved
√ for the MP
2a
algorithm results from minimizing a + 2 + a−1 , which occurs at a = 2 + 1 and yields
an approximation ratio of 7.82.
An Exact Algorithm for Non-preemptive Peak Demand Job Scheduling 5
online algorithms are known, only recently has the non-preemptive version been
addressed [1,3]. A version of the speed scaling problem that considers paralleliz-
able jobs has also received recent attention [8]. Scheduling parallelizable compute
jobs is similar for power jobs scheduling as both leverage concurrent execution.
Non-preemptive job scheduling is also similar to rectangular strip packing
[2,9,15]. The main differences are that, in the general case, jobs are limited in
where they can be placed in the strip and once jobs are scheduled, they do
not need to remain as intact rectangles. Since job height represents the power
required, each segment of a scheduled job will drop to lie on top of the job below
it, instead of remaining as an intact rectangle in the strip.
3 Problem Formulation
Job j is defined as a 4-tuple: (aj , dj , lj , hj ), where aj and dj are the arrival time
and deadline within the time interval [0, T ], lj is the job length, and hj is the
instantaneous resource requirement (demand). Job j is scheduled by assigning it
a start time, sj , and then runs in the closed-open interval [sj , sj + lj ) such that
[sj , sj + lj ) ⊂ [aj , dj ). The interval [aj , dj ) is called the execution window of j.
The demand at time t is the sum of the heights of jobs that are scheduled
during t, i.e.
H(t) = hj .
j:t∈[sj ,sj +lj )
max
Then, the peak demand, H , of the schedule is the maximum demand of
any of the timeslots in [0, T ],
In general, each job can have any valid arrival time and deadline pair which leads
to staggered execution windows as shown in Fig. 1. In this paper we consider the
general version of this problem as well as the case where jobs have common
execution windows (same arrival times and deadlines).
In [16], PDM was shown to be NP-hard via a reduction from the Subset-Sum
problem. We observe that PDM is even NP-hard to approximate within a ratio
of 2 by reducing it from the Scheduling with Release Times and Deadlines on a
Minimum Number of Machines (SRDM) problem.
Proof. The SRDM problem considers scheduling jobs that consist of release
times, deadlines, and lengths in a way that minimizes the number of machines
needed to construct a schedule. An instance of SRDM can be reduced to an
instance of PDM by retaining each job’s release time, deadline, length, and
making each job’s height to be 1.
Then, any solution to the PDM instance that results in a schedule of height
p, will be a schedule for the SRDM instance requiring p machines due to the
unit height of all the jobs. Likewise, any solution to the SRDM instance requir-
ing p machines will be a schedule for the PDM instance of height p because
that is the minimum number of concurrently executing jobs. It follows that any
approximation algorithm for PDM will provide the same approximation ratio
for SRDM. Since SRDM cannot be approximated within a factor of 2 − , so the
same hardness result applies to PDM [6].
4 Algorithms
In this section we present two algorithms for the PDM problem. The first is an
optimal, fixed parameter tractable (FPT), algorithm and the second is a simple
but effective heuristic algorithm.
Algorithm 1. PDM-Exact
Step 1 Sort jobs first by deadline and then by arrival time.
Compute Lj = {i : job i overlaps job j}.
let τmax = 1
Step 2 while (not Is-Feasible(τmax ))
τmax = 2 · τmax
endwhile
Apply binary search to determine
τmin = argminτ ∈(τmax /2,τmax ] Is-Feasible(τ )
Step 3 Build schedule S using the configurations for τmin :
select c ∈ Cn−1
set sn−1 according to c
for each job j = n − 2 to 0:
let c ∈ h(c) (note: c ∈ Cj )
set sj according to c
let c = c
endfor
Job Overlap Lists. Order the jobs by increasing deadline first and then by
increasing arrival time. Then determine, for each job j, the set of jobs that j
overlaps. We define overlap in a non-trivial manner: Job i is said to overlap
job j if i ≤ j and minl≥j (al ) < di . We define job overlap lists Lj , as follows:
Lj = {i : job i overlaps job j}. Figure 2 illustrates a non-trivial example of job
overlaps.
Lemma 2. For ordered jobs: i, ..., k, ..., j, if job i is in Lj , then job i is also
in Lk .
Proof. This is easy to confirm as i ∈ Lj implies that minl≥j (al ) < di . Since the
jobs are ordered by deadline, minl≥j (al ) < di ≤ dk .
Fig. 2. Illustration of overlap definition: job 0 overlaps job 1, due to job 2’s early arrival
time. Also note that L0 = {0}, L1 = {0, 1} and L2 = {0, 1, 2}.
8 S. Yaw and B. Mumey
Algorithm 2. Is-Feasible(τ )
Step 1 update Cj = {. . . , sk , . . . : k ∈ Lj , ak ≤ sk ≤ dk − lk ,
maxHeight(. . . , sk , . . .) ≤ τ }.
Step 2 for each job j = 1 to n − 1:
for each c ∈ Cj :
Let h(c ) = {c ∈ Cj−1 : c ∼ c }
if h(c ) = ∅
Cj .remove(c)
endif
endfor
if Cj = ∅
return false
endif
endfor
return true
jobs k in its overlap list Lj . Define maxHeight(. . . , sk , . . .) as the peak demand
of the jobs in Lj given these start times. Each configuration is a tuple consisting
of a valid start time for each job k in Lj , such that the peak demand of the
configuration is at most τ . The configuration lists are formally defined as:
Fig. 3. Configurations in C2 and C3 are compatible if all shared jobs (1, 2) have the same
start times. Note that since job 0 has multiple valid start times that do not interfere
with the other jobs, there are multiple configurations in C2 that are compatible with
c ∈ C3 .
An Exact Algorithm for Non-preemptive Peak Demand Job Scheduling 9
Theorem 1. The schedule found by PDM-Exact achieves the optimal peak power
demand.
Proof. Suppose S ∗ is an optimal PDM schedule for the given input jobs with
peak demand τ ∗ . Let c∗j be the configuration for job j that agrees with S ∗ .
Clearly, c∗0 will be an available configuration in C0 if the current test threshold
τ ≥ τ ∗ . By induction, c∗j will also be an available configuration in Cj Thus, τ
will reach τ ∗ and the schedule with the optimal peak demand will be found.
Algorithm 3. PDM-Heuristic
lj
Step 1 Sort jobs by decreasing wj = dj −aj
values.
5 Experimental Results
Simulations were conducted using both the PDM-Exact and PDM-Heuristic
algorithms, OnDemand schedules jobs to start at their arrival time. Jobs were
created using appliance specific data from six residences [10]. We identified appli-
ances (e.g. washing machine) likely to have flexible timelines and determined
their height, length, and arrival time distributions within a 24 h period. Dead-
lines were set to be uniformly distributed between the minimum deadline and
four times the average length.
We looked at two different scenarios to test the effectiveness of the algorithms.
First, we created a simpler scenario in order to test the performance of the PDM-
Exact algorithm. Instead of generating jobs as described above, we randomly
generated jobs with arrival time 0 to simulate a single peak. Figure 4 shows the
average results of running PDM-Exact, PDM-Heuristic and OnDemand on five
iterations of five jobs each from this simplified data generation. The average
peak power demand was 1.36 for PDM-Exact, 1.44 for PDM-Heuristic, and 2.89
for OnDemand scheduling. As can be seen in the figure, the PDM-Heuristic
algorithm achieves a near-optimal schedule.
An Exact Algorithm for Non-preemptive Peak Demand Job Scheduling 11
3
OnDemand
PDM-Exact
2.5 PDM-Heuristic
1.5
0.5
0
0 5 10 15 20
Time
45
OnDemand
40 PDM-Heuristic
35
Power Demand (kWh)
30
25
20
15
10
5
0
00:00 05:00 11:00 16:00 22:00
Time
Next, Fig. 5 shows the average of 1000 iterations of peak power demand versus
time of day for both PDM-Heuristic and the OnDemand algorithm (PDM-Exact
was unable to schedule a realistic number of these jobs) over a 24 h period. The
average peak power demand from OnDemand scheduling is 42.0 kWh while the
average peak for the PDM-Heuristic is 20.8 kWh.
6 Conclusions
Emerging smart grid systems will allow for more control over the scheduling of
power jobs and thus the PDM problem is timely. In this work we presented a
new FPT algorithm for PDM and a simple yet effective heuristic. While approx-
imation algorithms are known for special cases of PDM ([5,6,16,19]), there are
none to date for the general case, so this is an interesting problem for future
work.
12 S. Yaw and B. Mumey
References
1. Antoniadis, A., Huang, C.-C.: Non-preemptive speed scaling. In: Fomin, F.V.,
Kaski, P. (eds.) SWAT 2012. LNCS, vol. 7357, pp. 249–260. Springer, Heidelberg
(2012)
2. Baker, B.S., Schwarz, J.S.: Shelf algorithms for two-dimensional packing problems.
SIAM J. Comput. 12(3), 508–525 (1983)
3. Bampis, E., Lucarelli, G., Nemparis, I.: Improved approximation algorithms for
the non-preemptive speed-scaling problem. arXiv preprint arXiv:1209.6481 (2012)
4. Bell, P., Wong, P.: Multiprocessor speed scaling for jobs with arbitrary sizes and
deadlines. J. Comb. Optim. 1–11 (2013)
5. Chuzhoy, J., Guha, S., Khanna, S., Naor, J.: Machine minimization for scheduling
jobs with interval constraints. In: Proceedings of 45th Annual IEEE Symposium
on Foundations of Computer Science, pp. 81–90. IEEE (2004)
6. Cieliebak, M., Erlebach, T., Hennecke, F., Weber, B., Widmayer, P.: Scheduling
with release times and deadlines on a minimum number of machines. In: Levy, J.J.,
Mayr, E., Mitchell, J. (eds.) Exploring New Frontiers of Theoretical Informatics.
IFIP, vol. 155, pp. 209–222. Springer, Boston (2004)
7. Conejo, A.J., Morales, J.M., Baringo, L.: Real-time demand response model. IEEE
Trans. Smart Grid 1(3), 236–242 (2010)
8. Fox, K., Im, S., Moseley, B.: Energy efficient scheduling of parallelizable jobs. In:
Symposium on Discrete Algorithms, pp. 948–957 (2013)
9. Gu, X., Chen, G., Xu, Y.: Average-case performance analysis of a 2d strip packing
algorithm - NFDH. J. Comb. Optim. 9(1), 19–34 (2005)
10. Kolter, J.Z., Johnson, M.J.: Redd: a public data set for energy disaggregation
research. In: SustKDD Workshop on Data Mining Applications in Sustainability
(2011)
11. Koutsopoulos, I., Tassiulas, L.: Control and optimization meet the smart power
grid: scheduling of power demands for optimal energy management. In: Interna-
tional Conference on Energy-Efficient Computing and Networking, pp. 41–50. ACM
(2011)
12. Koutsopoulos, I., Tassiulas, L.: Optimal control policies for power demand schedul-
ing in the smart grid. IEEE J. Sel. Areas Commun. 30(6), 1049–1060 (2012)
13. Mohsenian-Rad, A.H., Leon-Garcia, A.: Optimal residential load control with price
prediction in real-time electricity pricing environments. IEEE Trans. Smart Grid
1(2), 120–133 (2010)
14. Mu, Z., Li, M.: Dvs scheduling in a line or a star network of processors. J. Comb.
Optim. 1–20 (2013)
15. Ortmann, F.G., Ntene, N., van Vuuren, J.H.: New and improved level heuristics
for the rectangular strip packing and variable-sized bin packing problems. Eur. J.
Oper. Res. 203(2), 306–315 (2010)
16. Tang, S., Huang, Q., Li, X.Y., Wu, D.: Smoothing the energy consumption: peak
demand reduction in smart grid. In: INFOCOM, 2013 Proceedings IEEE, pp. 1133–
1141, April 2013
17. Vytelingum, P., Ramchurn, S.D., Voice, T.D., Rogers, A., Jennings, N.R.: Trading
agents for the smart electricity grid. In: International Conference on Autonomous
Agents and Multiagent Systems, pp. 897–904 (2010)
18. Yao, F., Demers, A., Shenker, S.: A scheduling model for reduced CPU energy. In:
Symposium on Foundations of Computer Science, pp. 374–382 (1995)
19. Yaw, S., Mumey, B., McDonald, E., Lemke, J.: Peak demand scheduling in the
smart grid. In: IEEE SmartGridComm (2014, to appear)
An Asymptotic Competitive Scheme for Online
Bin Packing
1 Introduction
Bin packing is one of the well-known combinatorial optimization problems in
operations research and theoretical computer science. An instance of bin packing
consists of a set of items with integral size up to B (a given integer), and the
goal is to pack these items into a minimum number of bins of size B. The off-
line bin packing problem, where all items are available before packing starts,
is NP-hard [7]. In terms of asymptotic performance ratio, a standard measure
for bin packing algorithms, de la Vega and Lueker [6] presented an APTAS and
Karmakar and Karp [11] improved this result by giving an AFPTAS. Apart from
this classical model, one can find many interesting extensions (e.g., [2,17]).
In the scenario of online bin packing, items arrive one by one in a list. Upon
arrival of an item it must be irrevocably packed into a bin without knowing the
subsequent items. Given an instance I, let A(I) and OP T (I) be the number
of bins used by an online algorithm A and the optimal number of bins needed,
respectively. The asymptotic competitive ratio ρ∞A of algorithm A is the infimum ρ
such that the following inequality holds for any instance I, where κ is a constant,
One of the first online bin packing algorithms, First Fit, was studied by
Ullman and Johnson et al. [9,15]. They proved that the asymptotic competitive
Research was supported in part by NSFC(11071215,11271325).
c Springer International Publishing Switzerland 2014
Z. Zhang et al. (Eds.): COCOA 2014, LNCS 8881, pp. 13–24, 2014.
DOI: 10.1007/978-3-319-12691-3 2
14 L. Chen et al.
ratio of First Fit is 1.7. Then a sequence of improvements was proposed [12,13,
16] and the currently best known upper bound is 1.58889 [14], while the best
known lower bound is 1.54037 [1]. Very recently, the competitive ratio approxi-
mate scheme was introduced to online parallel machine scheduling problems by
Günther et al. [8]. For any given > 0, there exists an online algorithm {A }
that achieves a competitive ratio at most of (1 + ) times the optimal competi-
tive ratio. Motivated by their work, we revisit the online bin packing problem.
Following the simplified notion as [4], we use the competitive scheme instead of
the competitive ratio approximation scheme in this paper. Our task is to design
an asymptotic competitive scheme for the online bin packing problem. For sim-
plicity, throughout the paper, we use competitive ratio instead of asymptotic
competitive ratio.
General Idea. To prove Theorem 1, we start with the bounded instances where
the adversary only releases a constant number of items. Indeed, if the adversary
only releases C items, then the number of all the possible sequences of items is
bounded by B C , which is also a constant. It is not difficult to imagine that a
best possible online algorithm for the bounded instances could be determined.
Suppose this algorithm has a competitive ratio of ρ0 , then ρ∗ ≥ ρ0 since even
if we restrict the adversary to release at most C items, no online algorithm has
a competitive ratio better than ρ0 . The main technical part is to show that,
once C is large enough, we can generalize the algorithm of competitive ratio ρ0
for bounded instances to an algorithm of competitive ratio ρ0 + O() for the
general instances. To this end, we introduce the notion of modified instances as
an intermediate. In a modified instance, the adversary can release an arbitrary
number of items, however, the item list must conform to a certain pattern. We
will show that, an online algorithm for bounded instances could be generalized
to an online algorithm for modified instances with a loss of O() in its compet-
itive ratio. Meanwhile, an online algorithm for modified instances could also be
generalized to an online algorithm for general instances with a loss of O() in its
competitive ratio.
The paper is organized as follows. In Sect. 2, we provide some definitions and
notations. In Sect. 3, we show how to derive a best possible algorithm for the
bounded instances. It remains to show how the algorithm for bounded instances
could be generalized to an algorithm for modified instances, which is further
generalized to an algorithm for general instances. The latter part is easier and
we address it in Sect. 4, while the former part is presented in Sect. 5.
An Asymptotic Competitive Scheme for Online Bin Packing 15
2 Preliminaries
Given the bin size B, an input of the online bin packing problem is a list
(sequence) of items (J1 , J2 , . . . , Jn ) for n > 0, where the i-th item is denoted
by Ji , and we abuse the notation Ji to denote the size of the i-th item, which
is an integer belonging to {1, 2, · · · , B}. Given n items as an input, any packing
of these n items into (at most n) bins could be represented by a (2B)-tuple
(r(n), x(n)), where
– r(n) = (r1 (n), r2 (n), . . . , rB (n)), where ri (n) is the number of items of size
exactly i;
– x(n) = (x1 (n), x2 (n), . . . , xB (n)), where xi (n) is the number of bins whose
free space is exactly B − i for 1 ≤ i ≤ B.
B B
Obviously, i=1 ri (n) = n, and the number of bins used is i=1 xi (n). We call
(r(n), x(n)) as a state and write η n = (r(n), x(n)). If it is clear from context,
we also write (r(n), x(n)) as (r, x) for simplicity. Let STn be the set of all the
states with n items (i.e., all possible (r(n), x(n))’s), and denote its cardinality
as |STn |. We can thus list these states as η1n , · · · , η|ST
n
n|
. Specifically, we will use
n
η to denote an arbitrary state in STn . Note that ST0 consists of a unique state
η10 = (0, 0, · · · , 0).
Given any state η n = (r(n), x(n)), we denote as OP T (r(n)) the optimal
number of bins used when the items of r(n) are packed. As a consequence, we
define the instant ratio of the state η n as
B
ρ̃(η n ) = max{1, ( xi (n) − κ)/OP T (r(n))}.
i=1
Specifically, define ρ̃(η10 ) = 1. Here the constant κ in the above definition is the
κ in Theorem 1.
We can interpret an online algorithm for the bin packing problem in terms of
the states. Indeed, when an algorithm is applied to an item list (J1 , J2 , . . . , Jn ),
it returns a list of states η 0 → η 1 → · · · → η n , where η i is the state in which the
first i items are packed. Specifically, if the competitive ratio of this algorithm
is ρ, then ρ̃(η i ) ≤ ρ for any i, and meanwhile there exists a certain item list
(J1∗ , J2∗ , . . . , Jn∗ ) such that ρ̃(η n ) = ρ. In this view, the competitive ratio of an
online algorithm is the instant ratio of the worst state it could ever return.
Recall that the Next-Fit algorithm [10] for bin packing has a competitive ratio
of 2 (both in terms of asymptotic competitive ratio and absolute competitive
ratio). Thus ρ∗ ≤ 2 and we focus on states with instant ratio no more than 2.
States with instant ratio larger than 2 are deleted beforehand. Let d be some
constant that will be specified later and R = STd for simplicity. For any integer
k > 0, we define
kR = {(kr(d), kx(d)) = (kr1 (d), · · · , krB (d), kx1 (d), · · · , kxB (d))|(r(d), x(d)) ∈ R}.
for all i. According to this definition, a state in STkd might be the neighbor
of multiple states of kR. To make the notion of ‘neighborhood’ unique, we
define an assignment as a mapping that assigns every state in STkd to be a
neighbor of a unique state in kR (which can be achieved by assigning every
state in STkd to an arbitrary one of its neighbors). Given an assignment, all
the states in STkd are divided into |R| disjoint sets, with each containing one
state of kR and all its neighbors. Finally we define the perturbation. A per-
turbation is a vector Δ = (Δ(r), Δ(x)), where Δ(r) = (Δ1 (r), · · · , ΔB (r)),
Δ(x) = (Δ1 (x), · · · , ΔB (x)) with each coordinate being an integer. We define
D = ||Δ||∞ = max{|Δi (r)|, |Δi (x)|}, and write (r , x ) = (r, x)+Δ as the normal
vector addition. It is not difficult to verify that if OP T (r) > BD, then
xi + BD
ρ̃(r , x ) ≤ .
OP T (r) − BD
3 Bounded Instances
We consider bounded instances of bin packing, where the bounded instance refers
to the bin packing problem in which no more than C items could be released for
some constant C. In this section we will determine the competitive ratio of the
best possible online algorithm for the bounded instances via a dynamic program-
ming algorithm. Indeed, a best algorithm for bounded instances could also be
simply determined by brute force. However, as it needs to be further generalized,
the dynamic programming algorithm will provide additional information on its
structure.
We establish a layered graph G, in which there are |STh | vertices at the h-
th layer, each corresponding to some ηih . With a slight abuse of the notation
we also use ηih to denote its corresponding vertex. For every ηih , we construct
B vertices, namely αi,j h
for 1 ≤ j ≤ B representing the release of item of size
h
j by the adversary. For simplicity, all the αi,j are denoted as vertices of the
(h + 1/2)-th layer. There are only edges between vertices of the h-th layer and
the (h + 1/2)-th layer, and between vertices of the (h + 1/2)-th layer and the
(h + 1)-st layer. Indeed, there is an edge between ηih and αi,j h
for any h, i and
1 ≤ j ≤ B. There is an edge between αi,j h h+1
and ηk , if by packing the item of
size j into a certain bin, the state ηih is changed to ηkh+1 .
Now we can easily associate an online algorithm with a path in the layered
graph G. If the adversary releases n items of sizes J1 , J2 , · · · , Jn , and meanwhile
the algorithm returns a series of states ηi00 (obviously i0 = 1 since ST0 contains
only one element), ηi11 , · · · , ηinn , then associate it with a path in the graph as
ηi00 → αi00 ,j1 → ηi11 → · · · → αin−1
n−1 ,jn
→ ηinn .
Meanwhile, any path of length 2n that starts at η10 and ends at ηin for some
i represents the packing of n items by a certain online algorithm. We adopt the
idea of [4] to reformulate the problem of finding the best online algorithm for
Another random document with
no related content on Scribd:
But the inspection was not too encouraging. We were distinctly
short of water. Qway thought we should have just enough to take us
out to his “Valley of the Mist,” and back again to Dakhla, if all went
well, but he pointed out that we had one lame camel and another
limping slightly, and that at that season it was quite possible that we
might get some hot days with a simum blowing, and he consequently
thought that it would be far better to be on the safe side and go
straight back to Dakhla, rest the camels, and then come out and go
on to the valley on the next journey.
As this was obviously sound advice, we struck camp, packed up
and prepared to set off at once towards Dakhla, leaving several
sacks of grain behind us, which greatly eased the burden of the
camels and allowed us to leave the two limping beasts unloaded.
The wady in which the camp had been pitched evidently lay on
the southern fringe of the plateau, and opened out on its eastern
side down a sandy slope on to the lower ground beyond. The
plateau, I knew, did not extend much farther to the east, so with two
damaged camels in the caravan, I thought it best to avoid a return
over the very rough road we had followed on our outward journey,
and to strike instead in an easterly direction, round the south-east
corner of the tableland, over the smooth sandy desert lying at the
foot of the scarp of the plateau.
This road, though somewhat longer than the one we had followed
on our outward journey, proved to be excellent going; it lay almost
entirely over smooth hard sand. We continued to follow an easterly
course till the middle of the next morning, when, on reaching the
edge of the dune belt that runs along the western boundary of
Dakhla, we turned up north towards Mut, and coasted along it.
The road was almost featureless. A few low rocky hills were seen
on the lower ground for a while after leaving the “Valley of the Rat,”
but even these soon ceased. From this point onwards we saw
nothing of interest, with the exception of some pieces of petrified
wood, lying on a greenish clay, until we reached our destination at
Mut, in Dakhla Oasis. In the desert round about Kharga and Dakhla
we several times came across the petrified remains of trees, though
they never occurred in large patches.
Qway proved to be right in his forebodings of hot weather, and we
had two days of fairly warm simum wind. We, however, managed to
get in without suffering unduly from thirst—but I felt rather glad that
we had not tried to reach that valley.
The state of my caravan necessitated my giving them some days’
rest, to enable them to recover their condition, and to allow their feet
to get right again after the hard usage they had received on the
sharp rocks of the plateau, before setting out again into the desert.
In the meantime I conducted an experiment to try and locate the
position of the place from which the palm doves—the kimri sifi—were
said to come. Their migration was just at its height, and several
times, while on the plateau, we put them up from the rocks on which
they had alighted to rest during their flight.
The kimri sifi always arrived in the oasis just before sunset, and
as they generally made for a particular well to the south-west of Mut,
I went there one evening with a compass and gun to wait for them. I
took the bearing with my compass to the direction in which a number
of them came. These bearings tallied very closely, the average of
them being 217° mag.
I then shot a few of them just as they were alighting, and cut them
open. They had all been feeding on seeds—grass seeds apparently
—and olives. The seeds were in an almost perfect condition, but the
olives were in such an advanced state of digestion as to be hardly
recognisable.
I next bought some doves of the ordinary kind kept in the oasis
from the villagers, and confined them in a cage. At sunrise the
following morning I fed them on olives and then, towards midday,
took them out one by one, at intervals of an hour, killed them, and
cut them open to see the state of the olives. Those of the one killed
at three o’clock seemed in the state most resembling those taken
from the kimri sifi I had shot, showing that it required about nine
hours’ digestion to reduce them to that condition.
The kimri sifi is a weak-flighted bird, and, judging from the
numbers we put up in the desert from places where they had settled
down to rest, spends a considerable part of the day during the flight
to Mut from the oasis where the olives grow, resting upon rocks in
the desert. I consequently concluded that its average speed,
including the rests, during its journey from the olive oasis, would be
about twenty-five miles an hour.
Applying the principles of Sherlock Holmes to the case I deduced
—I believe that to be the correct word—that the oasis the kimri came
from lay in the direction of the mean of the bearings I had taken, viz.
217° mag., at a distance of nine times twenty-five, or two hundred
and twenty-five miles, and that it contained olive trees. Some years
later an Arab told me that there was an oasis off there that contained
large quantities of olive trees. Boy scouts will, I trust, copy!
CHAPTER VIII