Parallel Branch-And-Bound Revisited for Solving Permutation Combinatorial Optimization Problems on Multi-Core Processors and Coprocessors Rudi Leroy
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Generalizing Zeckendorf's Theorem to F-Decompositions
GENERALIZING ZECKENDORF’S THEOREM TO f-DECOMPOSITIONS PHILIPPE DEMONTIGNY, THAO DO, ARCHIT KULKARNI, STEVEN J. MILLER, DAVID MOON, AND UMANG VARMA ABSTRACT. A beautiful theorem of Zeckendorf states that every positive integer can be uniquely decomposed as a sum of non-consecutive Fibonacci numbers fFng, where F1 = 1, F2 = 2 and Fn+1 = Fn + Fn−1. For general recurrences fGng with non-negative coefficients, there is a notion of a legal decomposition which again leads to a unique representation, and the number of sum- mands in the representations of uniformly randomly chosen m 2 [Gn;Gn+1) converges to a normal distribution as n ! 1. We consider the converse question: given a notion of legal decomposition, is it possible to con- struct a sequence fang such that every positive integer can be decomposed as a sum of terms from the sequence? We encode a notion of legal decomposition as a function f : N0 ! N0 and say that if an is in an “f-decomposition”, then the decomposition cannot contain the f(n) terms immediately before an in the sequence; special choices of f yield many well known decompositions (including base-b, Zeckendorf and factorial). We prove that for any f : N0 ! N0, there exists a sequence 1 fangn=0 such that every positive integer has a unique f-decomposition using fang. Further, if f is periodic, then the unique increasing sequence fang that corresponds to f satisfies a linear recurrence relation. Previous research only handled recurrence relations with no negative coefficients. We find a function f that yields a sequence that cannot be described by such a recurrence relation. -
Dynamical Directions in Numeration Tome 56, No 7 (2006), P
R AN IE N R A U L E O S F D T E U L T I ’ I T N S ANNALES DE L’INSTITUT FOURIER Guy BARAT, Valérie BERTHÉ, Pierre LIARDET & Jörg THUSWALDNER Dynamical directions in numeration Tome 56, no 7 (2006), p. 1987-2092. <http://aif.cedram.org/item?id=AIF_2006__56_7_1987_0> © Association des Annales de l’institut Fourier, 2006, tous droits réservés. L’accès aux articles de la revue « Annales de l’institut Fourier » (http://aif.cedram.org/), implique l’accord avec les conditions générales d’utilisation (http://aif.cedram.org/legal/). Toute re- production en tout ou partie cet article sous quelque forme que ce soit pour tout usage autre que l’utilisation à fin strictement per- sonnelle du copiste est constitutive d’une infraction pénale. Toute copie ou impression de ce fichier doit contenir la présente mention de copyright. cedram Article mis en ligne dans le cadre du Centre de diffusion des revues académiques de mathématiques http://www.cedram.org/ Ann. Inst. Fourier, Grenoble 56, 7 (2006) 1987-2092 DYNAMICAL DIRECTIONS IN NUMERATION by Guy BARAT, Valérie BERTHÉ, Pierre LIARDET & Jörg THUSWALDNER (*) Abstract. — This survey aims at giving a consistent presentation of numer- ation from a dynamical viewpoint: we focus on numeration systems, their asso- ciated compactification, and dynamical systems that can be naturally defined on them. The exposition is unified by the fibred numeration system concept. Many examples are discussed. Various numerations on rational integers, real or complex numbers are presented with special attention paid to β-numeration and its gener- alisations, abstract numeration systems and shift radix systems, as well as G-scales and odometers. -
A Robust Software Watermarking for Copyright Protection
computers & security 28 (2009) 395–409 available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/cose A robust software watermarking for copyright protection Ibrahim Kamela,*, Qutaiba Albluwib aDepartment of Computer Engineering Sharjah University, P.O. Box 27272, United Arab Emirates bSchool of Computing, Queens University, Canada article info abstract Article history: This paper advocates protecting software copyright through hiding watermarks in various Received 18 August 2008 data structures used by the code, e.g., Bþ-trees, R-trees, linked lists, etc. Prior proposals Received in revised form hide the watermarks in dummy data structures, e.g., linked lists and graphs that are 13 January 2009 created, solely for this reason, during the execution of the hosting software. This makes Accepted 30 January 2009 them vulnerable to subtractive attacks, because the attacker can remove the dummy data structures without altering the functionality or the semantic of the software program. We Keywords: argue that hiding watermarks in one or more data structures that are used by the program Information security would make the watermark more robust because disturbing the watermark would affect R-trees the semantic and the functionality of the underlying software. The challenge is that the Watermarking insertion of the watermark should have a minimal effect on the operations and perfor- Multimedia indexes mance of the data structure. Spatial data structures This paper proposes a novel method for watermarking R-tree data structure and its variants. Copyright protection The proposed watermarking technique does not change the values of the stored data objects. It takes advantage of the redundancy in the order of entries inside the R-tree nodes. -
THÈSE DOCTEUR DE L'université DU LUXEMBOURG EN INFORMATIQUE ET DOCTEUR DE L'université LILLE1 EN INFORMATIQUE Malika Mehd
PhD-FSTC-2011-17 Faculté des Sciences, de la Technologie et de Faculté des Sciences et Technologies de Lille la Communication THÈSE Soutenue le 20/10/2011 à Luxembourg En vue de l’obtention du grade académique de DOCTEUR DE L’UNIVERSITÉ DU LUXEMBOURG EN INFORMATIQUE ET DOCTEUR DE L’UNIVERSITÉ LILLE1 EN INFORMATIQUE par Malika Mehdi née le 10 septembre 1981 à Bejaia PARALLEL HYBRID OPTIMIZATION METHODS FOR PERMUTATION BASED PROBLEMS Jury de thèse Prof. Dr. Pascal Bouvry, directeur de thèse Professeur, Université du Luxembourg Prof. Dr. El-Ghazali Talbi, directeur de thèse Professeur, Université Lille1 Prof. Dr. Nouredine Melab, co-directeur de thèse Professeur, Université Lille1 Prof. Dr. Raymond Bisdorff, président Professeur, Université du Luxembourg Prof. Dr. Enrique Alba, membre Professeur, Université de Malaga Dr. Didier El-Baz, membre HDR, LAAS-CNRS, Toulouse Abstract Solving efficiently large benchmarks of NP-hard permutation-based problems re- quires the development of hybrid methods combining different classes of optimiza- tion methods. Indeed, it is now acknowledged that such methods perform better than traditional optimization methods when used separately. The key challenge is how to find connections between the divergent search strategies used in each class of methods in order to build efficient hybridization strategies. Genetic algorithms (GAs) are very popular population-based metaheuristics based on stochastic evo- lutionary operators. The hybridization of GAs with tree-based exact methods such as Branch-and-Bound is a promising research trend. B&B algorithms are based on an implicit enumeration of the solution space represented as a tree. Our hybridization approach consists in providing a common solution and search space coding and associated search operators enabling an efficient cooperation between the two methods. -
Basic Computer Arithmetic
BASIC COMPUTER ARITHMETIC TSOGTGEREL GANTUMUR Abstract. First, we consider how integers and fractional numbers are represented and manipulated internally on a computer. The focus is on the principles behind the algorithms, rather than on implementation details. Then we develop a basic theoretical framework for analyzing algorithms involving inexact arithmetic. Contents 1. Introduction 1 2. Integers 2 3. Simple division algorithms 6 4. Long division 11 5. The SRT division algorithm 16 6. Floating point numbers 18 7. Floating point arithmetic 21 8. Propagation of error 24 9. Summation and product 29 1. Introduction There is no way to encode all real numbers by using finite length words, even if we use an alphabet with countably many characters, because the set of finite sequences of integers is countable. Fortunately, the real numbers support many countable dense subsets, and hence the encoding problem of real numbers may be replaced by the question of choosing a suitable countable dense subset. Let us look at some practical examples of real number encodings. ● Decimal notation. Examples: 36000, 2:35(75), −0:000072. ● Scientific notation. Examples: 3:6⋅104, −72⋅10−6. The general form is m⋅10e. In order to have a unique (or near unique) representation of each number, one can impose a normalization, such as requiring 1 ≤ ∣m∣ < 10. 2 −1 ● System with base/radix β. Example: m2m1m0:m−1 = m2β +m1β +m0 +m−1β . The dot separating the integer and fractional parts is called the radix point. ● Binary (β = 2), octal (β = 8), and hexadecimal (β = 16) numbers. ● Babylonian hexagesimal (β = 60) numbers. -
The What and Why of Whole Number Arithmetic: Foundational Ideas from History, Language and Societal Changes
Portland State University PDXScholar Mathematics and Statistics Faculty Fariborz Maseeh Department of Mathematics Publications and Presentations and Statistics 3-2018 The What and Why of Whole Number Arithmetic: Foundational Ideas from History, Language and Societal Changes Xu Hu Sun University of Macau Christine Chambris Université de Cergy-Pontoise Judy Sayers Stockholm University Man Keung Siu University of Hong Kong Jason Cooper Weizmann Institute of Science SeeFollow next this page and for additional additional works authors at: https:/ /pdxscholar.library.pdx.edu/mth_fac Part of the Science and Mathematics Education Commons Let us know how access to this document benefits ou.y Citation Details Sun X.H. et al. (2018) The What and Why of Whole Number Arithmetic: Foundational Ideas from History, Language and Societal Changes. In: Bartolini Bussi M., Sun X. (eds) Building the Foundation: Whole Numbers in the Primary Grades. New ICMI Study Series. Springer, Cham This Book Chapter is brought to you for free and open access. It has been accepted for inclusion in Mathematics and Statistics Faculty Publications and Presentations by an authorized administrator of PDXScholar. Please contact us if we can make this document more accessible: [email protected]. Authors Xu Hu Sun, Christine Chambris, Judy Sayers, Man Keung Siu, Jason Cooper, Jean-Luc Dorier, Sarah Inés González de Lora Sued, Eva Thanheiser, Nadia Azrou, Lynn McGarvey, Catherine Houdement, and Lisser Rye Ejersbo This book chapter is available at PDXScholar: https://pdxscholar.library.pdx.edu/mth_fac/253 Chapter 5 The What and Why of Whole Number Arithmetic: Foundational Ideas from History, Language and Societal Changes Xu Hua Sun , Christine Chambris Judy Sayers, Man Keung Siu, Jason Cooper , Jean-Luc Dorier , Sarah Inés González de Lora Sued , Eva Thanheiser , Nadia Azrou , Lynn McGarvey , Catherine Houdement , and Lisser Rye Ejersbo 5.1 Introduction Mathematics learning and teaching are deeply embedded in history, language and culture (e.g. -
Datatype Defining Rewrite Systems for Naturals and Integers
UvA-DARE (Digital Academic Repository) Datatype defining rewrite systems for naturals and integers Bergstra, J.A.; Ponse, A. DOI 10.23638/LMCS-17(1:17)2021 Publication date 2021 Document Version Final published version Published in Logical Methods in Computer Science License CC BY Link to publication Citation for published version (APA): Bergstra, J. A., & Ponse, A. (2021). Datatype defining rewrite systems for naturals and integers. Logical Methods in Computer Science, 17(1), [17]. https://doi.org/10.23638/LMCS- 17(1:17)2021 General rights It is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), other than for strictly personal, individual use, unless the work is under an open content license (like Creative Commons). Disclaimer/Complaints regulations If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library: https://uba.uva.nl/en/contact, or a letter to: Library of the University of Amsterdam, Secretariat, Singel 425, 1012 WP Amsterdam, The Netherlands. You will be contacted as soon as possible. UvA-DARE is a service provided by the library of the University of Amsterdam (https://dare.uva.nl) Download date:30 Sep 2021 Logical Methods in Computer Science Volume 17, Issue 1, 2021, pp. 17:1–17:31 Submitted Jan. 15, 2020 https://lmcs.episciences.org/ Published Feb. -
Version 13.0 Release Notes
Release Notes The tool of thought for expert programming Version 13.0 Dyalog is a trademark of Dyalog Limited Copyright 1982-2011 by Dyalog Limited. All rights reserved. Version 13.0 First Edition April 2011 No part of this publication may be reproduced in any form by any means without the prior written permission of Dyalog Limited. Dyalog Limited makes no representations or warranties with respect to the contents hereof and specifically disclaims any implied warranties of merchantability or fitness for any particular purpose. Dyalog Limited reserves the right to revise this publication without notification. TRADEMARKS: SQAPL is copyright of Insight Systems ApS. UNIX is a registered trademark of The Open Group. Windows, Windows Vista, Visual Basic and Excel are trademarks of Microsoft Corporation. All other trademarks and copyrights are acknowledged. iii Contents C H A P T E R 1 Introduction .................................................................................... 1 Summary........................................................................................................................... 1 System Requirements ....................................................................................................... 2 Microsoft Windows .................................................................................................... 2 Microsoft .Net Interface .............................................................................................. 2 Unix and Linux .......................................................................................................... -
Experimental Methods and Instrumentation for Chemical Engineers Experimental Methods and Instrumentation for Chemical Engineers
Experimental Methods and Instrumentation for Chemical Engineers Experimental Methods and Instrumentation for Chemical Engineers Gregory S. Patience AMSTERDAM • BOSTON • HEIDELBERG • LONDON NEW YORK • OXFORD • PARIS • SAN DIEGO SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO Elsevier 225 Wyman Street, Waltham, MA 02451, USA The Boulevard, Langford Lane, Kidlington, Oxford OX5 1GB, UK Radarweg 29, PO Box 211, 1000 AE Amsterdam, The Netherlands First edition 2013 Copyright © 2013 Elsevier B.V. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions. This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein). Notices Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments -
Unranking Combinations Lexicographically: an Efficient New Strategy Compared with Others Cyann Donnot, Antoine Genitrini, Yassine Herida
Unranking Combinations Lexicographically: an efficient new strategy compared with others Cyann Donnot, Antoine Genitrini, Yassine Herida To cite this version: Cyann Donnot, Antoine Genitrini, Yassine Herida. Unranking Combinations Lexicographically: an efficient new strategy compared with others. 2020. hal-02462764 HAL Id: hal-02462764 https://hal.sorbonne-universite.fr/hal-02462764 Preprint submitted on 31 Jan 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Unranking Combinations Lexicographically: an efficient new strategy compared with others Cyann Donnot1, Antoine Genitrini2, and Yassine Herida1 1 Full-time master student at Sorbonne University 2 Sorbonne University, LIP6. [email protected] Abstract. We propose a comparative study of four algorithms dedi- cated to the lexicographic unranking of combinations. The three first ones are algorithms from the literature. We give some key ideas how to analyze them in average and describe their strengths and weaknesses. We then introduce a new algorithm based on a new strategy inside the classical factorial numeral system (or factoradics). We conclude the pa- per with an experimental study, in particular when n = 10000; k = 5000, our algorithm is 36 (resp. 53) times as fast as our C++ implementation of Matlab’s (resp. -
Math Book from Wikipedia
Math book From Wikipedia PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Mon, 25 Jul 2011 10:39:12 UTC Contents Articles 0.999... 1 1 (number) 20 Portal:Mathematics 24 Signed zero 29 Integer 32 Real number 36 References Article Sources and Contributors 44 Image Sources, Licenses and Contributors 46 Article Licenses License 48 0.999... 1 0.999... In mathematics, the repeating decimal 0.999... (which may also be written as 0.9, , 0.(9), or as 0. followed by any number of 9s in the repeating decimal) denotes a real number that can be shown to be the number one. In other words, the symbols 0.999... and 1 represent the same number. Proofs of this equality have been formulated with varying degrees of mathematical rigour, taking into account preferred development of the real numbers, background assumptions, historical context, and target audience. That certain real numbers can be represented by more than one digit string is not limited to the decimal system. The same phenomenon occurs in all integer bases, and mathematicians have also quantified the ways of writing 1 in non-integer bases. Nor is this phenomenon unique to 1: every nonzero, terminating decimal has a twin with trailing 9s, such as 8.32 and 8.31999... The terminating decimal is simpler and is almost always the preferred representation, contributing to a misconception that it is the only representation. The non-terminating form is more convenient for understanding the decimal expansions of certain fractions and, in base three, for the structure of the ternary Cantor set, a simple fractal. -
The Mayan Long Count Calendar Thomas Chanier
The Mayan Long Count Calendar Thomas Chanier To cite this version: Thomas Chanier. The Mayan Long Count Calendar. 2015. hal-00750006v11 HAL Id: hal-00750006 https://hal.archives-ouvertes.fr/hal-00750006v11 Preprint submitted on 8 Dec 2015 (v11), last revised 16 Dec 2015 (v12) HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. The Mayan Long Count Calendar Thomas Chanier∗1 1 Universit´ede Brest, 6 avenue Victor le Gorgeu, F-29285 Brest Cedex, France The Mayan Codices, bark-paper books from the Late Postclassic period (1300 to 1521 CE) contain many astronomical tables correlated to ritual cycles, evidence of the achievement of Mayan naked- eye astronomy and mathematics in connection to religion. In this study, a calendar supernumber is calculated by computing the least common multiple of 8 canonical astronomical periods. The three major calendar cycles, the Calendar Round, the Kawil and the Long Count Calendar are shown to derive from this supernumber. The 360-day Tun, the 365-day civil year Haab’ and the 3276-day Kawil-direction-color cycle are determined from the prime factorization of the 8 canonical astronomical input parameters.