Algorithms for communication optimization

In this thesis, we present algorithms for communication problems. We consider two different combinatorial optimization problems to optimize communication in two different scenarios, namely the Buffer-Allocation Problem and the k-Observer Problem. The Buffer-Allocation Problem has emerged as a new challenge from recent progress in the design of multi-core platforms. With the availability of advanced multi-core platforms and emerging interface technologies, it is no longer possible, due to the huge design space, to compute an optimal allocation of logical data buffers to physical memories manually. Besides the allocation of the logical data buffers to memories, also an optimal routing for data flows through the multi-core platform must be computed. A data flow is an abstract representation of an application that emerges from a processing element and accesses a logical data buffer. We formalize these requirements by the Buffer-Allocation Problem. We also show that this problem is NP-hard and furthermore that this problem is APX-hard, this implies that it cannot be approximated arbitrarily close to the value of the optimal solution, unless P = NP. Despite of this, we introduce a (Mixed) Integer-Linear Program formulation to compute an optimal solution that is inspired by an extension of a Multi-Commodity Flow Problem. We also present a heuristic that computes a solution in polynomial time. Although, modern Linear-Program solver can compute optimal solutions for non-worst-case instances for Integer-Linear Programs with an acceptable running time, we evaluate the running time of a state-of-the-art solver and of our heuristic for representative data from the Long-Term-Evolution standard (LTE). Besides the running time, we also compare the quality of the computed solutions to show the applicability of our heuristic. We show that our heuristic outperforms the Linear-Program solver in this real-life instances. In the second part of this thesis, we consider the k-Observer Problem. Given a graph G = (V,E) as an abstract representation of a wireless sensor network, there has to be found a minimal set of nodes C ⊆ V such that the nodes observe all paths of a fixed length k in G. As a generalization of the well-known vertex cover problem, this problem is NP-hard. The nodes in C can, e.g., be used to observe traffic of a given network or provide data integrity in a sensor network. First, we focus on d-regular networks, where every node as a bounded constant degree of d ∈ N. We show, for the case k = 2, a (1 + 1 2d−2)-approximation for bipartite regular graphs. For general d-regular graphs, we present a (2 − o(1))-approximation algorithm, again for the case k = 2. For larger

[1]  Ahmed Amine Jerraya,et al.  An optimal memory allocation for application-specific multiprocessor system-on-chip , 2001, International Symposium on System Synthesis (IEEE Cat. No.01EX526).

[2]  George Karakostas,et al.  Faster approximation schemes for fractional multicommodity flow problems , 2008, TALG.

[3]  Marián Novotný,et al.  Design and Analysis of a Generalized Canvas Protocol , 2010, WISTP.

[4]  P.M. Kogge An exploration of the technology space for multi-core memory/logic chips for highly scalable parallel systems , 2005, Innovative Architecture for Future Generation High-Performance Processors and Systems (IWIA'05).

[5]  Prabhakar Raghavan,et al.  Randomized rounding: A technique for provably good algorithms and algorithmic proofs , 1985, Comb..

[6]  Subhash Khot,et al.  On the power of unique 2-prover 1-round games , 2002, Proceedings 17th IEEE Annual Conference on Computational Complexity.

[7]  Mihalis Yannakakis,et al.  Node-Deletion Problems on Bipartite Graphs , 1981, SIAM J. Comput..

[8]  Kenneth Steiglitz,et al.  Combinatorial Optimization: Algorithms and Complexity , 1981 .

[9]  Shiann-Rong Kuang,et al.  Multiport memory based data path allocation focusing on interconnection optimization , 1994, Proceedings of IEEE International Symposium on Circuits and Systems - ISCAS '94.

[10]  P. Hall On Representatives of Subsets , 1935 .

[11]  Ying Zhang,et al.  Next-Generation Applications on Cellular Networks: Trends, Challenges, and Solutions , 2012, Proceedings of the IEEE.

[12]  Wenli Zhou,et al.  A factor 2 approximation algorithm for the vertex cover P3 problem , 2011, Inf. Process. Lett..

[13]  Andrzej Pelc,et al.  Dissemination of Information in Communication Networks - Broadcasting, Gossiping, Leader Election, and Fault-Tolerance , 2005, Texts in Theoretical Computer Science. An EATCS Series.

[14]  Walter Knödel,et al.  New gossips and telephones , 1975, Discret. Math..

[15]  Walter Unger,et al.  The k-Observer Problem on d-regular Graphs , 2015, SSS.

[16]  Lei Xu,et al.  Feedback from nature: an optimal distributed algorithm for maximal independent set selection , 2013, PODC '13.

[17]  Jonathan L. Gross,et al.  Topological Graph Theory , 1987, Handbook of Graph Theory.

[18]  Rainer Leupers,et al.  Optimized buffer allocation in multicore platforms , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[19]  Toniann Pitassi,et al.  Integrality Gaps of 2-o(1) for Vertex Cover SDPs in the Lov[a-acute]sz--Schrijver Hierarchy , 2010, SIAM J. Comput..

[20]  Nam Ling,et al.  Expectations and challenges for next generation video compression , 2010, 2010 5th IEEE Conference on Industrial Electronics and Applications.

[21]  Robert E. Tarjan,et al.  Applications of a planar separator theorem , 1977, 18th Annual Symposium on Foundations of Computer Science (sfcs 1977).

[22]  Mihalis Yannakakis,et al.  Primal-dual approximation algorithms for integral flow and multicut in trees , 1997, Algorithmica.

[23]  Xudong Wang,et al.  Efficient algorithm for virtual topology design in multihop lightwave networks , 1994, TNET.

[24]  Subhash Khot,et al.  Vertex cover might be hard to approximate to within 2-/spl epsiv/ , 2003, 18th IEEE Annual Conference on Computational Complexity, 2003. Proceedings..

[25]  Oded Goldreich Using the FGLSS-Reduction to Prove Inapproximability Results for Minimum Vertex Cover in Hypergraphs , 2011, Studies in Complexity and Cryptography.

[26]  A. Land,et al.  An Automatic Method for Solving Discrete Programming Problems , 1960, 50 Years of Integer Programming.

[27]  Paul D. Seymour,et al.  Graph minors. V. Excluding a planar graph , 1986, J. Comb. Theory B.

[28]  Venkatesan Guruswami,et al.  Near-optimal hardness results and approximation algorithms for edge-disjoint paths and related problems , 2003, J. Comput. Syst. Sci..

[29]  Mihalis Yannakakis,et al.  Optimization, approximation, and complexity classes , 1991, STOC '88.

[30]  Narendra Karmarkar,et al.  A new polynomial-time algorithm for linear programming , 1984, STOC '84.

[31]  Kumar N. Sivarajan,et al.  Optical Networks: A Practical Perspective , 1998 .

[32]  Gerd Finke,et al.  On the Complexity of Dissociation Set Problems in Graphs , 2009 .

[33]  Alexander Schrijver,et al.  On the Size of Systems of Sets Every t of Which Have an SDR, with an Application to the Worst-Case Ratio of Heuristics for Packing Problems , 1989, SIAM J. Discret. Math..

[34]  Carsten Thomassen,et al.  The Graph Genus Problem is NP-Complete , 1989, J. Algorithms.

[35]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[36]  Dorit S. Hochbaum,et al.  Efficient bounds for the stable set, vertex cover and set packing problems , 1983, Discret. Appl. Math..

[37]  B. Mukherjee,et al.  A Review of Routing and Wavelength Assignment Approaches for Wavelength- Routed Optical WDM Networks , 2000 .

[38]  P. Krishnan,et al.  The cache location problem , 2000, TNET.

[39]  Jens Vygen Near-Optimum Global Routing with Coupling, Delay Bounds, and Power Consumption , 2004, IPCO.

[40]  Klaus Jansen,et al.  Constrained Bipartite Edge Coloring with Applications to Wavelength Routing , 1997, ICALP.

[41]  L. Khachiyan Polynomial algorithms in linear programming , 1980 .

[42]  Rainer Leupers,et al.  A heuristic for logical data buffer allocation in multicore platforms , 2014, 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC).

[43]  Jochen Könemann,et al.  Faster and simpler algorithms for multicommodity flow and other fractional packing problems , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).

[44]  Jaikumar Radhakrishnan,et al.  Greed is good: Approximating independent sets in sparse and bounded-degree graphs , 1997, Algorithmica.

[45]  Kwangsoo Seo,et al.  Allocation of multiport memories in ASIC data path synthesis , 1994, Proceedings of IEEE International Symposium on Circuits and Systems - ISCAS '94.

[46]  Kumar N. Sivarajan,et al.  Routing and wavelength assignment in all-optical networks , 1995, TNET.