Loading...
Search for: graph-algorithms
0.005 seconds
Total 24 records

    α-visibility

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 7357 LNCS , 2012 , Pages 1-12 ; 03029743 (ISSN) ; 9783642311543 (ISBN) Ghodsi, M ; Maheshwari, A ; Nouri, M ; Sack, J. R ; Zarrabi Zadeh, H ; Sharif University of Technology
    2012
    Abstract
    We study a new class of visibility problems based on the notion of α-visibility. Given an angle α and a collection of line segments in the plane, a segment t is said to be α-visible from a point p, if there exists an empty triangle with one vertex at p and the side opposite to p on t such that the angle at p is α. In this model of visibility, we study the classical variants of point visibility, weak and complete segment visibility, and the construction of the visibility graph. We also investigate the natural query versions of these problems, when α is either fixed or specified at query time  

    Spanning trees with minimum weighted degrees

    , Article Information Processing Letters ; Volume 104, Issue 3 , 2007 , Pages 113-116 ; 00200190 (ISSN) Ghodsi, M ; Mahini, H ; Mirjalali, K ; Oveis Gharan, S ; Sayedi Roshkhar, A. S ; Zadimoghaddam, M ; Sharif University of Technology
    2007
    Abstract
    Given a metric graph G, we are concerned with finding a spanning tree of G where the maximum weighted degree of its vertices is minimum. In a metric graph (or its spanning tree), the weighted degree of a vertex is defined as the sum of the weights of its incident edges. In this paper, we propose a 4.5-approximation algorithm for this problem. We also prove it is NP-hard to approximate this problem within a 2 - ε factor. © 2007 Elsevier B.V. All rights reserved  

    Simultaneous graph learning and blind separation of graph signal sources

    , Article IEEE Signal Processing Letters ; Volume 28 , 2021 , Pages 1495-1499 ; 10709908 (ISSN) Einizade, A ; Hajipour Sardouie, S ; Shamsollahi, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    When our sources are graph signals, a more efficient algorithm for Blind Source Separation (BSS) can be provided by using structural graph information along with statistical independence and/or non-Gaussianity. To the best of our knowledge, the GraphJADE and GraDe algorithms are the only BSS methods addressing this issue in the case of known underlying graphs. However, in many real-world applications, these graphs are not necessarily a priori known. In this paper, we propose a method called GraphJADE-GL (GraphJADE with Graph Learning) that jointly separates the graph signal sources and learns the graphs related to them accurately, in an alternating style. © 1994-2012 IEEE  

    Ratio-balanced maximum flows

    , Article Information Processing Letters ; Volume 150 , 2019 , Pages 13-17 ; 00200190 (ISSN) Akrami, H ; Mehlhorn, K ; Odland, T ; Sharif University of Technology
    Elsevier B.V  2019
    Abstract
    When a loan is approved for a person or company, the bank is subject to credit risk; the risk that the lender defaults. To mitigate this risk, a bank will require some form of security, which will be collected if the lender defaults. Accounts can be secured by several securities and a security can be used for several accounts. The goal is to fractionally assign the securities to the accounts so as to balance the risk. This situation can be modeled by a bipartite graph. We have a set S of securities and a set A of accounts. Each security has a value vi and each account has an exposure ej. If a security i can be used to secure an account j, we have an edge from i to j. Let fij be the part of... 

    Computing boundary cycle of a pseudo-triangle polygon from its visibility graph

    , Article 3rd IFIP WG 1.8 International Conference on Topics in Theoretical Computer Science, TTCS 2020, 1 July 2020 through 2 July 2020 ; Volume 12281 LNCS , 2020 , Pages 61-71 Boomari, H ; Farokhi, S ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2020
    Abstract
    Visibility graph of a simple polygon is a graph with the same vertex set in which there is an edge between a pair of vertices if and only if the segment through them lies completely inside the polygon. Each pair of adjacent vertices on the boundary of the polygon are assumed to be visible. Therefore, the visibility graph of each polygon always contains its boundary edges. This implies that we have always a Hamiltonian cycle in a visibility graph which determines the order of vertices on the boundary of the corresponding polygon. In this paper, we propose a polynomial time algorithm for determining such a Hamiltonian cycle for a pseudo-triangle polygon from its visibility graph. © 2020, IFIP... 

    Utilizing distributed learning automata to solve stochastic shortest path problems

    , Article International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems ; Volume 14, Issue 5 , 2006 , Pages 591-615 ; 02184885 (ISSN) Beigy, H ; Meybodi, M. R ; Sharif University of Technology
    2006
    Abstract
    In this paper, we first introduce a network of learning automata, which we call it as distributed learning automata and then propose some iterative algorithms for solving stochastic shortest path problem. These algorithms use distributed learning automata to find a policy that determines a path from a source node to a destination node with minimal expected cost (length). In these algorithms, at each stage distributed learning automata determines which edges to be sampled. This sampling method may result in decreasing unnecessary samples and hence decreasing the running time of algorithms. It is shown that the shortest path is found with a probability as close as to unity by proper choice of... 

    Dynamic k-graphs: an algorithm for dynamic graph learning and temporal graph signal clustering

    , Article 28th European Signal Processing Conference, EUSIPCO 2020, 24 August 2020 through 28 August 2020 ; Volume 2021-January , 2021 , Pages 2195-2199 ; 22195491 (ISSN); 9789082797053 (ISBN) Araghi, H ; Babaie Zadeh, M ; Achard, S ; Sharif University of Technology
    European Signal Processing Conference, EUSIPCO  2021
    Abstract
    Graph signal processing (GSP) have found many applications in different domains. The underlying graph may not be available in all applications, and it should be learned from the data. There exist complicated data, where the graph changes over time. Hence, it is necessary to estimate the dynamic graph. In this paper, a new dynamic graph learning algorithm, called dynamic K-graphs, is proposed. This algorithm is capable of both estimating the time-varying graph and clustering the temporal graph signals. Numerical experiments demonstrate the high performance of this algorithm compared with other algorithms. © 2021 European Signal Processing Conference, EUSIPCO. All rights reserved  

    A constraint-based performance comparison of hypercube and star multicomputers with failures

    , Article 19th International Conference on Advanced Information Networking and Applications, AINA 2005, Taipei, 28 March 2005 through 30 March 2005 ; Volume 1 , 2005 , Pages 841-846 ; 1550445X (ISSN); 0769522491 (ISBN); 9780769522494 (ISBN) Rezazad, M ; Sarbazi Azad, H ; Sharif University of Technology
    2005
    Abstract
    Many theoretical studies have compared the hypercube and star graphs from a graph theoretical viewpoint, under structural and algorithmic properties. None of these studies have, however, considered real working conditions and implementation constraints. In this paper, the hypercube and star graphs are compared in view of fault tolerance and technological implementation constraints. In order to realize a fair comparison, we use the unsafely-vector fault tolerant routing algorithm, recently introduced in [1] and [2], for the hypercube and star graph. Under two implementation constraints, namely constant bisection bandwidth and constant node pin-out, we have compared the performance of the two... 

    Urban Traffic Analysis Using Limited Queries from a Predicting Source

    , M.Sc. Thesis Sharif University of Technology Akbari Bibihayat, Saeed (Author) ; Abam, Mohammad Ali (Supervisor)
    Abstract
    In local transportation service companies, there is a need for estimation of arrival times (ETA) for customers. These companies not having the sufficient number of active online users, they are not able to obtain a proper estimation for ETA from that data. However, there are some overseas companies that have the established user base, and provide access to necessary data with a service fee. It is possible to solve this problem using the data which they provide.In this thesis, the problem of learning a hidden graph for the purpose of aiding local companies is explained and different aspects of it are introduced. In order to tackle this problem, first we define the idea of vertex separators,... 

    Kinetic pie delaunay graph and its applications

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 7357 LNCS , 2012 , Pages 48-58 ; 03029743 (ISSN) ; 9783642311543 (ISBN) Abam, M. A ; Rahmati, Z ; Zarei, A ; Sharif University of Technology
    2012
    Abstract
    We construct a new proximity graph, called the Pie Delaunay graph, on a set of n points which is a super graph of Yao graph and Euclidean minimum spanning tree (EMST). We efficiently maintain the Pie Delaunay graph where the points are moving in the plane. We use the kinetic Pie Delaunay graph to create a kinetic data structure (KDS) for maintenance of the Yao graph and the EMST on a set of n moving points in 2-dimensional space. Assuming x and y coordinates of the points are defined by algebraic functions of at most degree s, the structure uses O(n) space, O(nlogn) preprocessing time, and processes O(n 2 λ 2s∈+∈2(n)β s + 2(n)) events for the Yao graph and O(n 2 λ 2s + 2(n)) events for the... 

    Overlapped ontology partitioning based on semantic similarity measures

    , Article 2010 5th International Symposium on Telecommunications, IST 2010, 4 December 2010 through 6 December 2010 ; 2010 , Pages 1013-1018 ; 9781424481835 (ISBN) Etminani, K ; Rezaeian Delui, A ; Naghibzadeh, M ; Sharif University of Technology
    Abstract
    Today, public awareness about the benefits of using ontologies in information processing and the semantic web has increased. Since ontologies are useful in various applications, many large ontologies have been developed so far. But various areas like publication, maintenance, validation, processing, and security policies need further research. One way to better tackle these areas is to partition large ontologies into sub partitions. In this paper, we present a new method to partition large ontologies. For the proposed method, three steps are required: (1) transforming an ontology to a weighted graph, (2) partitioning the graph with an algorithm which recognizes the most important concepts,... 

    1 + ϵ approximation of tree edit distance in quadratic time

    , Article 51st Annual ACM SIGACT Symposium on Theory of Computing, STOC 2019, 23 June 2019 through 26 June 2019 ; 2019 , Pages 709-720 ; 07378017 (ISSN); 9781450367059 (ISBN) Boroujeni, M ; Ghodsi, M ; Hajiaghayi, M ; Seddighin, S ; Sharif University of Technology
    Association for Computing Machinery  2019
    Abstract
    Edit distance is one of the most fundamental problems in computer science. Tree edit distance is a natural generalization of edit distance to ordered rooted trees. Such a generalization extends the applications of edit distance to areas such as computational biology, structured data analysis (e.g., XML), image analysis, and compiler optimization. Perhaps the most notable application of tree edit distance is in the analysis of RNA molecules in computational biology where the secondary structure of RNA is typically represented as a rooted tree. The best-known solution for tree edit distance runs in cubic time. Recently, Bringmann et al. show that an O(n2.99) algorithm for weighted tree edit... 

    A local constant approximation factor algorithm for minimum dominating set of certain planar graphs

    , Article 32nd ACM Symposium on Parallelism in Algorithms and Architectures, SPAA 2020, 15 July 2020 through 17 July 2020 ; 2020 , Pages 501-502 Alipour, S ; Jafari, A
    Association for Computing Machinery  2020
    Abstract
    In this paper, we present a randomized LOCAL constant approximation factor algorithm for minimum dominating set (MDS) problem and minimum total dominating set (MTDS) problem in graphs. The approximation factor of this algorithm for planar graphs with no 4-cycles is 18 and 9 for MDS and MTDS problems, respectively. © 2020 Owner/Author  

    Complexity of computing the anti-ramsey numbers for paths

    , Article 45th International Symposium on Mathematical Foundations of Computer Science, MFCS 2020, 25 August 2020 through 26 August 2020 ; Volume 170 , 2020 Amiri, S. A ; Popa, A ; Roghani, M ; Shahkarami, G ; Soltani, R ; Vahidi, H ; Sharif University of Technology
    Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing  2020
    Abstract
    The anti-Ramsey numbers are a fundamental notion in graph theory, introduced in 1978, by Erdös, Simonovits and Sós. For given graphs G and H the anti-Ramsey number ar(G, H) is defined to be the maximum number k such that there exists an assignment of k colors to the edges of G in which every copy of H in G has at least two edges with the same color. Usually, combinatorists study extremal values of anti-Ramsey numbers for various classes of graphs. There are works on the computational complexity of the problem when H is a star. Along this line of research, we study the complexity of computing the anti-Ramsey number ar(G, Pk), where Pk is a path of length k. First, we observe that when k is... 

    Faster Algorithms for Quantitative Analysis of MCs and MDPs with Small Treewidth

    , Article 18th International Symposium on Automated Technology for Verification and Analysis, ATVA 2020, 19 October 2020 through 23 October 2020 ; Volume 12302 LNCS , 2020 , Pages 253-270 Asadi, A ; Chatterjee, K ; Kafshdar Goharshady, A ; Mohammadi, K ; Pavlogiannis, A ; Sharif University of Technology
    Springer Science and Business Media Deutschland GmbH  2020
    Abstract
    Discrete-time Markov Chains (MCs) and Markov Decision Processes (MDPs) are two standard formalisms in system analysis. Their main associated quantitative objectives are hitting probabilities, discounted sum, and mean payoff. Although there are many techniques for computing these objectives in general MCs/MDPs, they have not been thoroughly studied in terms of parameterized algorithms, particularly when treewidth is used as the parameter. This is in sharp contrast to qualitative objectives for MCs, MDPs and graph games, for which treewidth-based algorithms yield significant complexity improvements. In this work, we show that treewidth can also be used to obtain faster algorithms for the... 

    Some properties of WK-recursive and swapped networks

    , Article 5th International Symposium on Parallel and Distributed Processing and Applications, ISPA 2007, Niagara Falls, 29 August 2007 through 31 August 2007 ; Volume 4742 LNCS , 2007 , Pages 856-867 ; 03029743 (ISSN); 3540747419 (ISBN); 9783540747413 (ISBN) Imani, N ; Sarbazi Azad, H ; Zomaya, A. Y ; Sharif University of Technology
    Springer Verlag  2007
    Abstract
    The surface area which is defined as the number of vertices at a given distance from a base vertex of a graph is considered to be as one of the most useful yet abstract combinatorial properties of a graph. The applicability of surface area spans many problem spaces such as those in parallel and distributed computing. These problems normally involve combinatorial analysis of underlying graph structures (e.g., spanning tree construction, minimum broadcast algorithms, efficient VLSI layout, performance modeling). In this paper, we focus on the problem of finding the surface area of a class of popular graphs, namely the family of WK-recursive and swapped networks. These are attractive networks... 

    A sampling method based on distributed learning automata for solving stochastic shortest path problem

    , Article Knowledge-Based Systems ; Volume 212 , 2021 ; 09507051 (ISSN) Beigy, H ; Meybodi, M. R ; Sharif University of Technology
    Elsevier B.V  2021
    Abstract
    This paper studies an iterative stochastic algorithm for solving the stochastic shortest path problem. This algorithm, which uses a distributed learning automata, tries to find the shortest path by taking a sufficient number of samples from the edges of the graph. In this algorithm, which edges to be sampled are determined dynamically as the algorithm proceeds. At each iteration of this algorithm, a distributed learning automata used to determine which edges to be sampled. This sampling method, which uses distributed learning automata, reduces the number of samplings from those edges, which may not be along the shortest path, and resulting in a reduction in the number of the edges to be... 

    Heavy mobile crane lift path planning in congested modular industrial plants using a robotics approach

    , Article Automation in Construction ; Volume 122 , 2021 ; 09265805 (ISSN) Kayhani, N ; Taghaddos, H ; Mousaei, A ; Behzadipour, S ; Hermann, U ; Sharif University of Technology
    Elsevier B.V  2021
    Abstract
    Lift path planning is a significant subtask in constructability analysis, sequencing, and scheduling of congested industrial modular projects, impacting project cost, and safety. Although intuitive lift planning is still prevalent among the practitioners, this manual process might be tedious and error-prone for hundreds of lifts. This research presents an automated lift path planning method for heavy crawler cranes in no-walk scenarios employing a robotics approach. This method treats the lifted object as a three-degree-of-freedom convex mobile robot with discretized rotational and continuous translational motions. The proposed resolution-complete method models the crane capacity chart,... 

    Graphic: Graph-based hierarchical clustering for single-molecule localization microscopy

    , Article 18th IEEE International Symposium on Biomedical Imaging, ISBI 2021, 13 April 2021 through 16 April 2021 ; Volume 2021-April , 2021 , Pages 1892-1896 ; 19457928 (ISSN); 9781665412469 (ISBN) Pourya, M ; Aziznejad, S ; Unser, M ; Sage, D ; Sharif University of Technology
    IEEE Computer Society  2021
    Abstract
    We propose a novel method for the clustering of point-cloud data that originate from single-molecule localization microscopy (SMLM). Our scheme has the ability to infer a hierarchical structure from the data. It takes a particular relevance when quantitatively analyzing the biological particles of interest at different scales. It assumes a prior neither on the shape of particles nor on the background noise. Our multiscale clustering pipeline is built upon graph theory. At each scale, we first construct a weighted graph that represents the SMLM data. Next, we find clusters using spectral clustering. We then use the output of this clustering algorithm to build the graph in the next scale; in... 

    GIM: GPU accelerated RIS-Based influence maximization algorithm

    , Article IEEE Transactions on Parallel and Distributed Systems ; Volume 32, Issue 10 , 2021 , Pages 2386-2399 ; 10459219 (ISSN) Shahrouz, S ; Salehkaleybar, S ; Hashemi, M ; Sharif University of Technology
    IEEE Computer Society  2021
    Abstract
    Given a social network modeled as a weighted graph GG, the influence maximization problem seeks kk vertices to become initially influenced, to maximize the expected number of influenced nodes under a particular diffusion model. The influence maximization problem has been proven to be NP-hard, and most proposed solutions to the problem are approximate greedy algorithms, which can guarantee a tunable approximation ratio for their results with respect to the optimal solution. The state-of-the-art algorithms are based on Reverse Influence Sampling (RIS) technique, which can offer both computational efficiency and non-trivial (1-1/e-ϵ)-approximation ratio guarantee for any epsilon >0ϵ>0....