Browsing by Subject "Constraint theory"
Now showing 1 - 20 of 25
- Results Per Page
- Sort Options
Item Open Access Analysis of concurrency control protocols for real-time database systems(Elsevier, 1998) Ulusoy, ÖzgürThis paper provides an approximate analytic solution method for evaluating the performance of concurrency control protocols developed for real-time database systems (RTDBSs). Transactions processed in a RTDBS are associated with timing constraints typically in the form of deadlines. The primary consideration in developing a RTDBS concurrency control protocol is the fact that satisfaction of the timing constraints of transactions is as important as maintaining the consistency of the underlying database. The proposed solution method provides the evaluation of the performance of concurrency control protocols in terms of the satisfaction rate of timing constraints. As a case study, a RTDBS concurrency control protocol, called High Priority, is analyzed using the proposed method. The accuracy of the performance results obtained is ascertained via simulation. The solution method is also used to investigate the real-time performance benefits of the High Priority over the ordinary Two-Phase Locking.Item Open Access An animation system for fracturing of rigid objects(Springer, Berlin, Heidelberg, 2005) Küçükyilmaz, Ayşe; Özgüç, BülentThis paper describes a system for the animation of fracturing brittle objects. The system combines rigid body simulation methods with a constraint-based model to animate fracturing of arbitrary polyhedral shaped objects under impact. The objects are represented as sets of masses, where pairs of adjacent masses are connected via a distance-preserving linear constraint. Lagrange multipliers are used to compute the forces exerted by those constraints, where these forces determine how and where the object will break. However, a problem with existing systems is that the initial body models exhibit well-defined uniformity, which makes the generated animations unrealistic. This work introduces a method for generating more realistic cracks without any performance loss. This method is easy to implement and applicable on different models. © Springer-Verlag Berlin Heidelberg 2005.Item Open Access A compound graph layout algorithm for biological pathways(Springer, Berlin, Heidelberg, 2004-09-10) Doğrusöz, Uğur; Giral, Erhan; Çetintaş, Ahmet; Çivril, Ali; Demir, EmekWe present a new compound graph layout algorithm based on traditional force-directed layout scheme with extensions for nesting and other application-specific constraints. The algorithm has been successfully implemented within PATIKA, a pathway analysis tool for drawing complicated biological pathways with compartimental constraints and arbitrary nesting relations to represent molecular complexes and pathway abstractions. Experimental results show that execution times and quality of the produced drawings with respect to commonly accepted layout criteria and pathway drawing conventions are quite satisfactory. © Springer-Verlag Berlin Heidelberg 2004.Item Open Access A data-level parallel linear-quadratic penalty algorithm for multicommodity network flows(Association for Computing Machinery, 1994) Pinar, M. C.; Zenios, S. A.We describe the development of a data-level, massively parallel software system for the solution of multicommodity network flow problems. Using a smooth linear-quadratic penalty (LQP) algorithm we transform the multicommodity network flow problem into a sequence of independent min-cost network flow subproblems. The solution of these problems is coordinated via a simple, dense, nonlinear master program to obtain a solution that is feasible within some user-specified tolerance to the original multicommodity network flow problem. Particular emphasis is placed on the mapping of both the subproblem and master problem data to the processing elements of a massively parallel computer, the Connection Machine CM-2. As a result of this design we can solve large and sparse optimization problems on current SIMD massively parallel architectures. Details of the implementation are reported, together with summary computational results with a set of test problems drawn from a Military Airlift Command application.Item Open Access A derivation of Lovász' theta via augmented lagrange duality(E D P Sciences, 2003) Pınar, M. Ç.A recently introduced dualization technique for binary linear programs with equality constraints, essentially due to Poljak et al. [13], and further developed in Lemar´echal and Oustry [9], leads to simple alternative derivations of well-known, important relaxations to two well-known problems of discrete optimization: the maximum stable set problem and the maximum vertex cover problem. The resulting relaxation is easily transformed to the well-known Lov´asz θ number.Item Open Access Design of translucent optical networks: Partitioning and restoration(Kluwer, 2004) Karasan, E.; Arisoylu, M.We discuss the problem of designing translucent optical networks composed of restorable, transparent subnetworks interconnected via transponders. We develop an integer linear programming (ILP) formulation for partitioning an optical network topology into subnetworks, where the subnetworks are determined subject to the constraints that each subnetwork satisfies size limitations, and it is two-connected. A greedy heuristic partitioning algorithm is proposed for planar network topologies. We use section restoration for translucent networks where failed connections are rerouted within the subnetwork which contains the failed link. The network design problem of determining working and restoration capacities with section restoration is formulated as an ILP problem. Numerical results show that fiber costs with section restoration are close to those with path restoration for mesh topologies used in this study. It is also shown that the number of transponders with the translucent network architecture is substantially reduced compared to opaque networks.Item Open Access A distance-limited continuous location-allocation problem for spatial planning of decentralized systems(Elsevier, 2017) Gokbayrak, K.; Kocaman, A. S.We introduce a new continuous location-allocation problem where the facilities have both a fixed opening cost and a coverage distance limitation. The problem has wide applications especially in the spatial planning of water and/or energy access networks where the coverage distance might be associated with the physical loss constraints. We formulate a mixed integer quadratically constrained problem (MIQCP) under the Euclidean distance setting and present a three-stage heuristic algorithm for its solution: In the first stage, we solve a planar set covering problem (PSCP) under the distance limitation. In the second stage, we solve a discrete version of the proposed problem where the set of candidate locations for the facilities is formed by the union of the set of demand points and the set of locations in the PSCP solution. Finally, in the third stage, we apply a modified Weiszfeld's algorithm with projections that we propose to incorporate the coverage distance component of our problem for fine-tuning the discrete space solutions in the continuous space. We perform numerical experiments on three example data sets from the literature to demonstrate the performance of the suggested heuristic method.Item Open Access Dynamic financial planning: certainty equivalents, stochastic constraints and functional conjugate duality(Taylor & Francis, 2005) Jefferson, T. R.; Scott, C. H.This paper studies portfolios under risk and stochastic constraints. Certainty equivalents combine risk aversion and exponential utility to form the objective. Budget and stochastic constraints on the account balance are used to ensure a positive net worth over time. These portfolio models are analyzed by functional conjugate duality for general distributions and by conjugate duality for the normal distribution. All the programs are convex. The duals provide insight into this approach and relate it to other stochastic and financial concepts.Item Open Access A graph based approach for naming faces in news photos(I E E E Computer Society, 2006) Ozkan, D.; Duygulu, P.We propose a method to associate names and faces for querying people in large news photo collections. On the assumption that a person's face is likely to appear when his/her name is mentioned in the caption, first all the faces associated with the query name are selected. Among these faces, there could be many faces corresponding to the queried person in different conditions, poses and times, but there could also be other faces corresponding to other people in the caption or some non-face images due to the errors in the face detection method used. However, in most cases, the number of corresponding faces of the queried person will be large, and these faces will be more similar to each other than to others. In this study, we propose a graph based method to find the most similar subset among the set of possible faces associated with the query name, where the most similar subset is likely to correspond to the faces of the queried person. When the similarity of faces are represented in a graph structure, the set of most similar faces will be the densest component in the graph. We represent the similarity of faces using SIFT descriptors. The matching interest points on two faces are decided after the application of two constraints, namely the geometrical constraint and the unique match constraint. The average distance of the matching points are used to construct the similarity graph. The most similar set of faces is then found based on a greedy densest component algorithm. The experiments are performed on thousands of news photographs taken in real life conditions and, therefore, having a large variety of poses, illuminations and expressions. © 2006 IEEE.Item Open Access Guessing with lies(IEEE, 2002-06-07) Arıkan, Erdal; Boztaş, S.A practical algorithm was obtained for directly generating an optimal guessing sequence for guessing under lies. An optimal guessing strategy was defined as one which minimizes the number of average number of guesses in determining the correct value of a random variable. The information-theoretic bounds on the average number of guesses for optimal strategies were also derived.Item Open Access Information-based approach to punctuation(AAAI, 1997-07) Say, BilgeThis thesis analyzes, in an information-based framework, the semantic and discourse aspects of punctuation, drawing computational implications for Natural Language Processing (NLP) systems. The Discourse Representation Theory (DRT) is taken as the theoretical framework of the thesis. By following this analysis, it is hoped that NLP software writers will be able to make use of the punctuation marks effectively as well as reveal interesting linguistic phenomena in conjunction with punctuation marks.Item Open Access Marginal allocation algorithm for nonseparable functions(Taylor & Francis, 1999) Yüceer, Ü.Marginal allocation algorithm is implemented to discrete allocation problems with nonseparable objective functions subject to a single linear constraint. A Lagrangian analysis shows that the algorithm generates a sequence of undominated allocations under the condition of discretely convex objective functions and Lagrangian functions. The case of separable functions is proven to be a special case. An application is provided to illustrate the method and various size randomly chosen problems are run to demonstrate the efficiency of the marginal allocation algorithm.Item Open Access Multirelational k-anonymity(IEEE, 2007-04) Nergiz, M. Ercan; Clifton, C.; Nergiz, A. Erhank-Anonymity protects privacy by ensuring that data cannot be linked to a single individual. In a k-anonymous dataset, any identifying information occurs in at least k tuples. Much research has been done to modify a single table dataset to satisfy anonymity constraints. This paper extends the definitions of k-anonymity to multiple relations and shows that previously proposed methodologies either fail to protect privacy, or overly reduce the utility of the data, in a multiple relation setting. A new clustering algorithm is proposed to achieve multirelational anonymity. © 2007 IEEE.Item Open Access On algebraic properties of general proper decentralized systems(Elsevier, 1993) Yu, R.; Sezer, M. E.; Gao, W.The new concepts of the decentralized output feedback variable polynomial, the decentralized output feedback cycle index of general proper systems, and the geometric multiplicities of decentralized fixed modes are introduced. Their computational methods and some algebraic properties are presented. It is shown that the decentralized output feedback cycle index of a general proper system is equal to one when the system has no fixed modes or equal to the maximum of the geometric multiplicities of its decentralized fixed modes. It is also shown that almost all decentralized output feedback can be used to make the zeros of the decentralized variable polynomial distinct, and disjoint from any given finite set of points on the complex plane.Item Open Access Perception of 3-D Surfaces from 2-D Contours(1993) Ulupinar F.; Nevatia, R.Inference of 3-D shape from 2-D contours in a single image is an important problem in machine vision. We survey classes of techniques proposed in the past and provide a critical analysis. We propose that two kinds of symmetries in figures, which are known as parallel and skew symmetries, give significant information about surface shape for a variety of objects. We derive the constraints imposed by these symmetries and show how to use them to infer 3-D shape. We discuss the zero Gaussian curvature (ZGC) surfaces in depth and show results on the recovery of surface orientation for various ZGC surfaces. © 1993 IEEEItem Open Access Processing real-time transactions in a replicated database system(Springer/Kluwer Academic Publishers, 1994) Ulusoy, ÖzgürA database system supporting a real-time application has to provide real-time information to the executing transactions. Each real-time transaction is associated with a timing constraint, typically in the form of a deadline. It is difficult to satisfy all timing constraints due to the consistency requirements of the underlying database. In scheduling the transactions it is aimed to process as many transactions as possible within their deadlines. Replicated database systems possess desirable features for real-time applications, such as a high level of data availability, and potentially improved response time for queries. On the other hand, multiple copy updates lead to a considerable overhead due to the communication required among the data sites holding the copies. In this paper, we investigate the impact of storing multiple copies of data on satisfying the timing constraints of real-time transactions. A detailed performance model of a distributed database system is employed in evaluating the effects of various workload parameters and design alternatives on the system performance. The performance is expressed in terms of the fraction of satisfied transaction deadlines. A comparison of several real-time concurrency control protocols, which are based on different approaches in involving timing constraints of transactions in scheduling, is also provided in performance experiments. © 1994 Kluwer Academic Publishers.Item Open Access Regenerator placement and traffic engineering with restoration in GMPLS networks(Springer, 2003) Yetginer, E.; Karasan, E.In this paper, we study regenerator placement and traffic engineering of restorable paths in generalized multiprotocol label switching (GMPLS) networks. Regenerators are necessary in optical networks in order to cope with transmission impairments. We study a network architecture where regenerators are placed only at selected nodes for decreasing cost of regeneration. We propose two heuristic algorithms for optimum placement of these regenerators. Performances of these algorithms in terms of required number of regenerators and computational complexity are evaluated. In this network architecture with sparse regeneration, off-line computation of working and restoration paths is studied for traffic engineering with path rerouting as the restoration scheme. We study two approaches for selecting working and restoration paths from a set of candidate paths and formulate each method as an integer linear programming (ILP) problem. A traffic uncertainty model is developed in order to compare these methods based on their robustness with respect to changing traffic patterns. Traffic engineering methods are compared based on number of additional demands resulting from traffic uncertainties that can be carried over the network. Proposed heuristic regenerator placement algorithms are also evaluated from a traffic engineering point of view.Item Open Access Simulation optimization: a comprehensive review on theory and applications(Taylor & Francis, 2004) Tekin, E.; Sabuncuoglu, I.For several decades, simulation has been used as a descriptive tool by the operations research community in the modeling and analysis of a wide variety of complex real systems. With recent developments in simulation optimization and advances in computing technology, it now becomes feasible to use simulation as a prescriptive tool in decision support systems. In this paper, we present a comprehensive survey on techniques for simulation optimization with emphasis given on recent developments. We classify the existing techniques according to problem characteristics such as shape of the response surface (global as compared to local optimization), objective functions (single or multiple objectives) and parameter spaces (discrete or continuous parameters). We discuss the major advantages and possible drawbacks of the different techniques. A comprehensive bibliography and future research directions are also provided in the paper.Item Open Access Solving school bus routing problems through integer programming(Palgrave Macmillan Ltd., 2007) Bektaş, T.; Elmastaş, S.In this paper, an exact solution approach is described for solving a real-life school bus routing problem (SBRP) for transporting the students of an elementary school throughout central Ankara, Turkey. The problem is modelled as a capacitated and distance constrained open vehicle routing problem and an associated integer linear program is presented. The integer program borrows some well-known inequalities from the vehicle routing problem, which are also shown to be valid for the SBRP under consideration. The optimal solution of the problem is computed using the proposed formulation, resulting in a saving of up to 28.6 in total travelling cost as compared to the current implementation. © 2007 Operational Research Society Ltd. All rights reserved.Item Open Access Theoretical investigation on exact blind channel and input sequence estimation(IEEE, Piscataway, NJ, United States, 1999) Özdemir, A. K.; Arıkan, OrhanRecent work on fractionally spaced blind equalizers have shown that it is possible to exactly identify the channel and its input sequence from the noise-free channel outputs. However, the obtained results are based on a set of over-restrictive constrainst on the channel. In this paper it is shown that the exact identification can be achieved in a broader class of channels.