Reports de recerca
http://hdl.handle.net/2117/3094
2017-01-18T23:33:50ZFirefighting as a Game
http://hdl.handle.net/2117/99479
Firefighting as a Game
Álvarez Faura, M. del Carme; Blesa Aguilera, Maria Josep; Molter, Hendrik
The Firefighter Problem was proposed in 1995 [16] as a deterministic discrete-time model for the spread (and containment) of a fire. Its applications reach from real fires to the spreading of deseases and the containment of floods. Furthermore, it can be used to model the spread of computer viruses or viral marketing in communication networks. In this work, we study the problem from a game-theorical perspective. Such a context seems very appropriate when applied to large networks, where entities may act and make decisions based on their own interests, without global coordination. We model the Firefighter Problem as a strategic game where there is one player for each time step who decides where to place the firefighters. We show that the Price of Anarchy is linear in the general case, but at most 2 for trees. We prove that the quality of the equilibria improves when allowing coalitional cooperation among players. In general, we have that the Price of Anarchy is in O( n / k ) where k is the coalition size. Furthermore, we show that there are topologies which have a constant Price of Anarchy even when constant sized coalitions are considered.
2017-01-17T13:25:59ZÁlvarez Faura, M. del CarmeBlesa Aguilera, Maria JosepMolter, HendrikThe Firefighter Problem was proposed in 1995 [16] as a deterministic discrete-time model for the spread (and containment) of a fire. Its applications reach from real fires to the spreading of deseases and the containment of floods. Furthermore, it can be used to model the spread of computer viruses or viral marketing in communication networks. In this work, we study the problem from a game-theorical perspective. Such a context seems very appropriate when applied to large networks, where entities may act and make decisions based on their own interests, without global coordination. We model the Firefighter Problem as a strategic game where there is one player for each time step who decides where to place the firefighters. We show that the Price of Anarchy is linear in the general case, but at most 2 for trees. We prove that the quality of the equilibria improves when allowing coalitional cooperation among players. In general, we have that the Price of Anarchy is in O( n / k ) where k is the coalition size. Furthermore, we show that there are topologies which have a constant Price of Anarchy even when constant sized coalitions are considered.A graph-semantics of business configurations
http://hdl.handle.net/2117/99474
A graph-semantics of business configurations
Fiadeiro, José Luiz; Mylonakis Pascual, Nicolás; Orejas Valdés, Fernando
In this paper we give graph-semantics to a fundamental part of the semantics of the service modeling language SRML. To achieve this goal we develop a new graph transformation system for what we call 2-level symbolic graphs. These kind of graphs extend symbolic graphs with a simple 2-level hierarchy that can be generalized to arbitrary hierarchies. We formalize the semantics using this new graph transformation system using a simple example of a trip booking agent.
2017-01-17T13:16:27ZFiadeiro, José LuizMylonakis Pascual, NicolásOrejas Valdés, FernandoIn this paper we give graph-semantics to a fundamental part of the semantics of the service modeling language SRML. To achieve this goal we develop a new graph transformation system for what we call 2-level symbolic graphs. These kind of graphs extend symbolic graphs with a simple 2-level hierarchy that can be generalized to arbitrary hierarchies. We formalize the semantics using this new graph transformation system using a simple example of a trip booking agent.Hierarchical conformance checking of process models based on event logs
http://hdl.handle.net/2117/99402
Hierarchical conformance checking of process models based on event logs
Muñoz Gama, Jorge; Carmona Vargas, Josep; Aalst, Wil M.P. van der
Process mining techniques aim to extract knowledge from event logs. Conformance checking is one of the hard problems in process mining: it aims to diagnose and quantify the mismatch between observed and modeled behavior. Precise conformance checking implies solving complex optimization problems and is therefore computationally challenging for real-life event logs. In this paper a technique to apply hierarchical conformance checking is presented, based on a state-of-the-art algorithm for deriving the subprocesses structure underlying a process model. Hierarchical conformance checking allows us to decompose problems that would otherwise be intractable. Moreover, users can navigate through conformance results and zoom into parts of the model that have a poor conformance. The technique has been implemented as a ProM plugin and an experimental evaluation showing the signicance of the approach is provided.
2017-01-17T09:43:18ZMuñoz Gama, JorgeCarmona Vargas, JosepAalst, Wil M.P. van derProcess mining techniques aim to extract knowledge from event logs. Conformance checking is one of the hard problems in process mining: it aims to diagnose and quantify the mismatch between observed and modeled behavior. Precise conformance checking implies solving complex optimization problems and is therefore computationally challenging for real-life event logs. In this paper a technique to apply hierarchical conformance checking is presented, based on a state-of-the-art algorithm for deriving the subprocesses structure underlying a process model. Hierarchical conformance checking allows us to decompose problems that would otherwise be intractable. Moreover, users can navigate through conformance results and zoom into parts of the model that have a poor conformance. The technique has been implemented as a ProM plugin and an experimental evaluation showing the signicance of the approach is provided.Fringe analysis of synchronized parallel algorithms on 2--3 trees
http://hdl.handle.net/2117/98212
Fringe analysis of synchronized parallel algorithms on 2--3 trees
Baeza-Yates, R; Gabarró Vallès, Joaquim; Messeguer Peypoch, Xavier
We are interested in the fringe analysis of synchronized parallel insertion algorithms on 2—3 trees namely the algorithm of W.Paul
U. Vishkin and H. Wagener PVW. This algorithm inserts k keys into
a tree of size n with parallel time Olog n log k
Fringe analysis studies the distribution of the bottom subtrees and it is
still an open problem for parallel algorithms on search trees. To tackle
this problem we introduce a new kind of algorithms whose two extreme
cases seems to upper and lower bounds the performance of the PVW
algorithm.
We extend the fringe analysis to parallel algorithms and we get a rich
mathematical structure giving new interpretations even in the sequential
case. The process of insertions is modeled by a Markov chain and the
coecients of the transition matrix are related with the expected local
behavior of our algorithm. Finally we show that this matrix has a power
expansion over (n+1)-1 where the coecients are the binomial transform
of the expected local behavior. This expansion shows that the parallel
case can be approximated by iterating the sequential case.
2016-12-14T13:10:05ZBaeza-Yates, RGabarró Vallès, JoaquimMesseguer Peypoch, XavierWe are interested in the fringe analysis of synchronized parallel insertion algorithms on 2—3 trees namely the algorithm of W.Paul
U. Vishkin and H. Wagener PVW. This algorithm inserts k keys into
a tree of size n with parallel time Olog n log k
Fringe analysis studies the distribution of the bottom subtrees and it is
still an open problem for parallel algorithms on search trees. To tackle
this problem we introduce a new kind of algorithms whose two extreme
cases seems to upper and lower bounds the performance of the PVW
algorithm.
We extend the fringe analysis to parallel algorithms and we get a rich
mathematical structure giving new interpretations even in the sequential
case. The process of insertions is modeled by a Markov chain and the
coecients of the transition matrix are related with the expected local
behavior of our algorithm. Finally we show that this matrix has a power
expansion over (n+1)-1 where the coecients are the binomial transform
of the expected local behavior. This expansion shows that the parallel
case can be approximated by iterating the sequential case.Simple and efficient tree comparison
http://hdl.handle.net/2117/97629
Simple and efficient tree comparison
Valiente Feruglio, Gabriel Alejandro
A new distance metric for rooted trees is presented which is based on
the largest common forest of two rooted trees. The new measure is
superior to previous measures based on tree edit distance, because no
particular tree edit operations together with their costs or weights
need to be defined. The
metric can be computed in expected time linear in the number of nodes,
on rooted trees of unbounded degree, either unordered or ordered,
labeled or unlabeled. An algorithm for computing the metric is given
which is based on a simple and efficient bottom-up algorithm for finding
all common rooted subtrees in a forest.
2016-12-01T15:09:22ZValiente Feruglio, Gabriel AlejandroA new distance metric for rooted trees is presented which is based on
the largest common forest of two rooted trees. The new measure is
superior to previous measures based on tree edit distance, because no
particular tree edit operations together with their costs or weights
need to be defined. The
metric can be computed in expected time linear in the number of nodes,
on rooted trees of unbounded degree, either unordered or ordered,
labeled or unlabeled. An algorithm for computing the metric is given
which is based on a simple and efficient bottom-up algorithm for finding
all common rooted subtrees in a forest.Tree edit distance and common subtrees
http://hdl.handle.net/2117/97554
Tree edit distance and common subtrees
Valiente Feruglio, Gabriel Alejandro
The relationship between tree edit distance and maximum common
subtrees is established, showing that a tree edit distance constrained
by insertion and deletions on leaves only and by a simple condition on
the cost of the tree edit operations, corresponds to a maximum commonsubtree isomorphism, allowing thus the use of known tree edit distance algorithms to solve the maximum common subtree problem, and viceversa. Further, a tree distance based on the size of a maximum common subtree is introduced.
2016-11-30T16:31:58ZValiente Feruglio, Gabriel AlejandroThe relationship between tree edit distance and maximum common
subtrees is established, showing that a tree edit distance constrained
by insertion and deletions on leaves only and by a simple condition on
the cost of the tree edit operations, corresponds to a maximum commonsubtree isomorphism, allowing thus the use of known tree edit distance algorithms to solve the maximum common subtree problem, and viceversa. Further, a tree distance based on the size of a maximum common subtree is introduced.Exponential speedup of fixed parameter algorithms on K_{3,3}-minor-free or K_{5}-minor-free graphs
http://hdl.handle.net/2117/97525
Exponential speedup of fixed parameter algorithms on K_{3,3}-minor-free or K_{5}-minor-free graphs
Hajiaghayi, Mohammad Taghi; Demaine, Erik D.; Thilikos Touloupas, Dimitrios
We present a fixed parameter algorithm that constructively solves the
k-dominating set problem on graphs excluding one of the K_{5} or
K_3,3 as a minor in time O(3^{6sqrt{34 k}}n^{O(1)}). In fact,
we present our algorithm for any H-minor-free graph where H is
a single-crossing graph (can be drawn on the plane with at most one
crossing) and obtain the algorithm for K_{3,3} (K_{5})-minor-free
graphs as a special case. As a consequence, we extend our results to
several other problems such as vertex cover, edge dominating set,
independent set, clique-transversal set, kernels in digraphs,
feedback vertex set and a series of vertex removal problems.
Our work generalizes and extends the recent result of exponential speedup
in designing fixed-parameter algorithms on planar
graphs due to Alber et al. to other (non-planar) classes of graphs.
2016-11-30T14:35:59ZHajiaghayi, Mohammad TaghiDemaine, Erik D.Thilikos Touloupas, DimitriosWe present a fixed parameter algorithm that constructively solves the
k-dominating set problem on graphs excluding one of the K_{5} or
K_3,3 as a minor in time O(3^{6sqrt{34 k}}n^{O(1)}). In fact,
we present our algorithm for any H-minor-free graph where H is
a single-crossing graph (can be drawn on the plane with at most one
crossing) and obtain the algorithm for K_{3,3} (K_{5})-minor-free
graphs as a special case. As a consequence, we extend our results to
several other problems such as vertex cover, edge dominating set,
independent set, clique-transversal set, kernels in digraphs,
feedback vertex set and a series of vertex removal problems.
Our work generalizes and extends the recent result of exponential speedup
in designing fixed-parameter algorithms on planar
graphs due to Alber et al. to other (non-planar) classes of graphs.Classes of term rewrite systems with polynomial confluence problems
http://hdl.handle.net/2117/97487
Classes of term rewrite systems with polynomial confluence problems
Godoy Balil, Guillem; Nieuwenhuis, Robert Lukas Mario
The confluence property of ground (i.e., variable-free) term rewrite
systems (GTRS) is well-known to be decidable.
This was proved independently in [DTHL87,DHLT90]
and in [Oya87] using tree automata techniques and
ground tree transducer techniques (originated from this problem),
yielding EXPTIME decision procedures (PSPACE for strings). Since
then, it has been a well-known longstanding open question whether this
bound is optimal (see, e.g., [RTA01]).
In [CGN01] we gave the first polynomial-time algorithm for
deciding the confluence of GTRS. Later in [Tiw02] this result was
extended, using abstract congruent closure techniques, to linear-shallow TRS.
Here, we give a new and much simpler proof of the latter result.
2016-11-30T09:59:06ZGodoy Balil, GuillemNieuwenhuis, Robert Lukas MarioThe confluence property of ground (i.e., variable-free) term rewrite
systems (GTRS) is well-known to be decidable.
This was proved independently in [DTHL87,DHLT90]
and in [Oya87] using tree automata techniques and
ground tree transducer techniques (originated from this problem),
yielding EXPTIME decision procedures (PSPACE for strings). Since
then, it has been a well-known longstanding open question whether this
bound is optimal (see, e.g., [RTA01]).
In [CGN01] we gave the first polynomial-time algorithm for
deciding the confluence of GTRS. Later in [Tiw02] this result was
extended, using abstract congruent closure techniques, to linear-shallow TRS.
Here, we give a new and much simpler proof of the latter result.A Random graph model for optical networks of sensors
http://hdl.handle.net/2117/97399
A Random graph model for optical networks of sensors
Díaz Cort, Josep; Petit Silvestre, Jordi; Serna Iglesias, María José
In this paper we propose a model for Smart Dust Networks and show its applicability when the goal of the network is monitoring an area under the surveillance of a base station. We analyze basic parameters of these nets and simple distributed protocols. These protocols provide a communication layer for networks of sensors that communicate through optical links.
2016-11-29T11:24:32ZDíaz Cort, JosepPetit Silvestre, JordiSerna Iglesias, María JoséIn this paper we propose a model for Smart Dust Networks and show its applicability when the goal of the network is monitoring an area under the surveillance of a base station. We analyze basic parameters of these nets and simple distributed protocols. These protocols provide a communication layer for networks of sensors that communicate through optical links.Bounds on the max and min bisection of random cubic and 4-regular graphs
http://hdl.handle.net/2117/97396
Bounds on the max and min bisection of random cubic and 4-regular graphs
Díaz Cort, Josep; Do, Norman; Serna Iglesias, María José; Wormald, Nick
In this paper we present simple randomized algorithms to bisect
cubic and 4-regular graphs. These algorithms produce bisections of
size
asymptotically at most
0.17404n for typical random cubic n-vertex graphs, and n/3+eps n for
random 4-regular (any eps>0).
We also obtain asymptotic
lower bounds for the size of the maximum bisection, for random cubic and
random 4-regular graphs with $ vertices,
of 1.32697 n and 5n/3+eps n, respectively. In all cases
except the minimum bisection of cubic graphs, these give new results on
the
existence of regular graphs with small or large bisections. The
randomized
algorithms are derived from a greedy algorithm and the analysis is
based on the differential equation method.
2016-11-29T11:05:05ZDíaz Cort, JosepDo, NormanSerna Iglesias, María JoséWormald, NickIn this paper we present simple randomized algorithms to bisect
cubic and 4-regular graphs. These algorithms produce bisections of
size
asymptotically at most
0.17404n for typical random cubic n-vertex graphs, and n/3+eps n for
random 4-regular (any eps>0).
We also obtain asymptotic
lower bounds for the size of the maximum bisection, for random cubic and
random 4-regular graphs with $ vertices,
of 1.32697 n and 5n/3+eps n, respectively. In all cases
except the minimum bisection of cubic graphs, these give new results on
the
existence of regular graphs with small or large bisections. The
randomized
algorithms are derived from a greedy algorithm and the analysis is
based on the differential equation method.