-
LEEx-B: Low Energy Experimental Bench Development at IPHC-CNRS Strasbourg
Authors:
E. Bouquerel,
T. Adama,
C. Maazouzi,
E. Traykov,
P. Graehling,
C. Mathieu
Abstract:
As a part of future developments of beam diagnostics, a low energy experimental bench (LEEx-B) has been recently designed, built and commissioned at IPHC-CNRS of Strasbourg. The bench is composed of a Cs+ ion gun installed on a HV platform and providing beams up to 25 keV. A beam profiler and an Allison-type emittance-meter allow the qualification of the setup and also the characterization of the…
▽ More
As a part of future developments of beam diagnostics, a low energy experimental bench (LEEx-B) has been recently designed, built and commissioned at IPHC-CNRS of Strasbourg. The bench is composed of a Cs+ ion gun installed on a HV platform and providing beams up to 25 keV. A beam profiler and an Allison-type emittance-meter allow the qualification of the setup and also the characterization of the beam. During the commissioning process, the electronics, and the control system were upgraded in order to push the limits towards low beam currents measured by the emittance-meter.
△ Less
Submitted 2 July, 2024;
originally announced July 2024.
-
A Detailed Analysis of the SpaceSaving$\pm$ Family of Algorithms with Bounded Deletions
Authors:
Fuheng Zhao,
Divyakant Agrawal,
Amr El Abbadi,
Claire Mathieu,
Ahmed Metwally,
Michel de Rougemont
Abstract:
In this paper, we present an advanced analysis of near optimal deterministic algorithms using a small space budget to solve the frequency estimation, heavy hitters, frequent items, and top-k approximation in the bounded deletion model. We define the family of SpaceSaving$\pm$ algorithms and explain why the original SpaceSaving$\pm$ algorithm only works when insertions and deletions are not interle…
▽ More
In this paper, we present an advanced analysis of near optimal deterministic algorithms using a small space budget to solve the frequency estimation, heavy hitters, frequent items, and top-k approximation in the bounded deletion model. We define the family of SpaceSaving$\pm$ algorithms and explain why the original SpaceSaving$\pm$ algorithm only works when insertions and deletions are not interleaved. Next, we introduce the new DoubleSpaceSaving$\pm$ and the IntegratedSpaceSaving$\pm$ and prove their correctness. They show similar characteristics and both extend the popular space-efficient SpaceSaving algorithm. However, these two algorithms represent different trade-offs, in which DoubleSpaceSaving$\pm$ distributes the operations to two independent summaries while Integrated-SpaceSaving$\pm$ fully synchronizes deletions with insertions. Since data streams are often skewed, we present an improved analysis of these two algorithms and show that errors do not depend on the hot items and are only dependent on the cold and warm items. We also demonstrate how to achieve the relative error guarantee under mild assumptions. Moreover, we establish that the important mergeability property exists on these two algorithms which is desirable in distributed settings.
△ Less
Submitted 22 September, 2023;
originally announced September 2023.
-
Testing frequency distributions in a stream
Authors:
Claire Mathieu,
Michel de Rougemont
Abstract:
We study how to verify specific frequency distributions when we observe a stream of $N$ data items taken from a universe of $n$ distinct items. We introduce the \emph{relative Fréchet distance} to compare two frequency functions in a homogeneous manner. We consider two streaming models: insertions only and sliding windows. We present a Tester for a certain class of functions, which decides if…
▽ More
We study how to verify specific frequency distributions when we observe a stream of $N$ data items taken from a universe of $n$ distinct items. We introduce the \emph{relative Fréchet distance} to compare two frequency functions in a homogeneous manner. We consider two streaming models: insertions only and sliding windows. We present a Tester for a certain class of functions, which decides if $f $ is close to $g$ or if $f$ is far from $g$ with high probability, when $f$ is given and $g$ is defined by a stream. If $f$ is uniform we show a space $Ω(n)$ lower bound. If $f$ decreases fast enough, we then only use space $O(\log^2 n\cdot \log\log n)$. The analysis relies on the Spacesaving algorithm \cite{MAE2005,Z22} and on sampling the stream.
△ Less
Submitted 20 September, 2023;
originally announced September 2023.
-
Models for temporal clustering of extreme events with applications to mid-latitude winter cyclones
Authors:
Christina Mathieu,
Katharina Hees,
Roland Fried
Abstract:
The occurrence of extreme events like heavy precipitation or storms at a certain location often shows a clustering behaviour and is thus not described well by a Poisson process. We construct a general model for the inter-exceedance times in between such events which combines different candidate models for such behaviour. This allows us to distinguish data generating mechanisms leading to clusters…
▽ More
The occurrence of extreme events like heavy precipitation or storms at a certain location often shows a clustering behaviour and is thus not described well by a Poisson process. We construct a general model for the inter-exceedance times in between such events which combines different candidate models for such behaviour. This allows us to distinguish data generating mechanisms leading to clusters of dependent events with exponential inter-exceedance times in between clusters from independent events with heavy-tailed inter-exceedance times, and even allows us to combine these two mechanisms for better descriptions of such occurrences. We propose a modification of the Cramér-von Mises distance for model fitting. An application to mid-latitude winter cyclones illustrates the usefulness of our work.
△ Less
Submitted 11 July, 2024; v1 submitted 28 August, 2023;
originally announced August 2023.
-
An Approximation Algorithm for Distance-Constrained Vehicle Routing on Trees
Authors:
Marc Dufay,
Claire Mathieu,
Hang Zhou
Abstract:
In the Distance-constrained Vehicle Routing Problem (DVRP), we are given a graph with integer edge weights, a depot, a set of $n$ terminals, and a distance constraint $D$. The goal is to find a minimum number of tours starting and ending at the depot such that those tours together cover all the terminals and the length of each tour is at most $D$.
The DVRP on trees is of independent interest, be…
▽ More
In the Distance-constrained Vehicle Routing Problem (DVRP), we are given a graph with integer edge weights, a depot, a set of $n$ terminals, and a distance constraint $D$. The goal is to find a minimum number of tours starting and ending at the depot such that those tours together cover all the terminals and the length of each tour is at most $D$.
The DVRP on trees is of independent interest, because it is equivalent to the virtual machine packing problem on trees studied by Sindelar et al. [SPAA'11]. We design a simple and natural approximation algorithm for the tree DVRP, parameterized by $\varepsilon >0$. We show that its approximation ratio is $α+ \varepsilon$, where $α\approx 1.691$, and in addition, that our analysis is essentially tight. The running time is polynomial in $n$ and $D$. The approximation ratio improves on the ratio of 2 due to Nagarajan and Ravi [Networks'12].
The main novelty of this paper lies in the analysis of the algorithm. It relies on a reduction from the tree DVRP to the bounded space online bin packing problem via a new notion of reduced length.
△ Less
Submitted 7 October, 2022;
originally announced October 2022.
-
Unsplittable Euclidean Capacitated Vehicle Routing: A $(2+ε)$-Approximation Algorithm
Authors:
Fabrizio Grandoni,
Claire Mathieu,
Hang Zhou
Abstract:
In the unsplittable capacitated vehicle routing problem, we are given a metric space with a vertex called depot and a set of vertices called terminals. Each terminal is associated with a positive demand between 0 and 1. The goal is to find a minimum length collection of tours starting and ending at the depot such that the demand of each terminal is covered by a single tour (i.e., the demand cannot…
▽ More
In the unsplittable capacitated vehicle routing problem, we are given a metric space with a vertex called depot and a set of vertices called terminals. Each terminal is associated with a positive demand between 0 and 1. The goal is to find a minimum length collection of tours starting and ending at the depot such that the demand of each terminal is covered by a single tour (i.e., the demand cannot be split), and the total demand of the terminals in each tour does not exceed the capacity of 1.
Our main result is a polynomial-time $(2+ε)$-approximation algorithm for this problem in the two-dimensional Euclidean plane, i.e., for the special case where the terminals and the depot are associated with points in the Euclidean plane and their distances are defined accordingly. This improves on recent work by Blauth, Traub, and Vygen [IPCO'21] and Friggstad, Mousavi, Rahgoshay, and Salavatipour [IPCO'22].
△ Less
Submitted 12 September, 2022;
originally announced September 2022.
-
A Tight $(1.5+ε)$-Approximation for Unsplittable Capacitated Vehicle Routing on Trees
Authors:
Claire Mathieu,
Hang Zhou
Abstract:
In the unsplittable capacitated vehicle routing problem (UCVRP) on trees, we are given a rooted tree with edge weights and a subset of vertices of the tree called terminals. Each terminal is associated with a positive demand between 0 and 1. The goal is to find a minimum length collection of tours starting and ending at the root of the tree such that the demand of each terminal is covered by a sin…
▽ More
In the unsplittable capacitated vehicle routing problem (UCVRP) on trees, we are given a rooted tree with edge weights and a subset of vertices of the tree called terminals. Each terminal is associated with a positive demand between 0 and 1. The goal is to find a minimum length collection of tours starting and ending at the root of the tree such that the demand of each terminal is covered by a single tour (i.e., the demand cannot be split), and the total demand of the terminals in each tour does not exceed the capacity of 1.
For the special case when all terminals have equal demands, a long line of research culminated in a quasi-polynomial time approximation scheme [Jayaprakash and Salavatipour, SODA 2022] and a polynomial time approximation scheme [Mathieu and Zhou, ICALP 2022].
In this work, we study the general case when the terminals have arbitrary demands. Our main contribution is a polynomial time $(1.5+ε)$-approximation algorithm for the UCVRP on trees. This is the first improvement upon the 2-approximation algorithm more than 30 years ago [Labbé, Laporte, and Mercure, Operations Research, 1991]. Our approximation ratio is essentially best possible, since it is NP-hard to approximate the UCVRP on trees to better than a 1.5 factor.
△ Less
Submitted 8 November, 2022; v1 submitted 11 February, 2022;
originally announced February 2022.
-
Design and Commissioning of the first two CYRCé Extension Beamlines
Authors:
E. Bouquerel,
E. Traykov,
C. Maazouzi,
M. Rousseau,
M. Pellicioli,
J. Andrea,
T. Adam,
P. Graehling,
C. Mathieu,
G. Heitz,
M. Krauth,
D. Oster,
T. Foehrenbacher,
C. Ruescas,
J. Schuler,
U. Goerlach,
C. Haas
Abstract:
CYRCé is a TR24 cyclotron installed at the Institut Pluridisciplinaire Hubert Curien (IPHC) of Strasbourg operating at energies of 16-25 MeV and at intensities up to 400 $μ$A. The accelerator is used to produce and provide radioelements for PET and for SPECT. In 2015, IPHC started to develop a platform with the aim of performing radiobiological experiments. The PRECy platform foresees to contain t…
▽ More
CYRCé is a TR24 cyclotron installed at the Institut Pluridisciplinaire Hubert Curien (IPHC) of Strasbourg operating at energies of 16-25 MeV and at intensities up to 400 $μ$A. The accelerator is used to produce and provide radioelements for PET and for SPECT. In 2015, IPHC started to develop a platform with the aim of performing radiobiological experiments. The PRECy platform foresees to contain three-to-five experimental stations linked to beamlines expanded from the second exit port of the cyclotron. This extension allows devoting one of the beamlines for detector studies within the framework of the CMS project. The design, the development and the commissioning of the first two beamlines are discussed in this paper.
△ Less
Submitted 26 January, 2022;
originally announced January 2022.
-
A Simple Algorithm for Graph Reconstruction
Authors:
Claire Mathieu,
Hang Zhou
Abstract:
How efficiently can we find an unknown graph using distance queries between its vertices? We assume that the unknown graph is connected, unweighted, and has bounded degree. The goal is to find every edge in the graph. This problem admits a reconstruction algorithm based on multi-phase Voronoi-cell decomposition and using $\tilde O(n^{3/2})$ distance queries.
In our work, we analyze a simple reco…
▽ More
How efficiently can we find an unknown graph using distance queries between its vertices? We assume that the unknown graph is connected, unweighted, and has bounded degree. The goal is to find every edge in the graph. This problem admits a reconstruction algorithm based on multi-phase Voronoi-cell decomposition and using $\tilde O(n^{3/2})$ distance queries.
In our work, we analyze a simple reconstruction algorithm. We show that, on random $Δ$-regular graphs, our algorithm uses $\tilde O(n)$ distance queries. As by-products, we can reconstruct those graphs using $O(\log^2 n)$ queries to an all-distances oracle or $\tilde O(n)$ queries to a betweenness oracle, and we bound the metric dimension of those graphs by $\log^2 n$.
Our reconstruction algorithm has a very simple structure, and is highly parallelizable. On general graphs of bounded degree, our reconstruction algorithm has subquadratic query complexity.
△ Less
Submitted 8 December, 2021;
originally announced December 2021.
-
A PTAS for Capacitated Vehicle Routing on Trees
Authors:
Claire Mathieu,
Hang Zhou
Abstract:
We give a polynomial time approximation scheme (PTAS) for the unit demand capacitated vehicle routing problem (CVRP) on trees, for the entire range of the tour capacity. The result extends to the splittable CVRP.
We give a polynomial time approximation scheme (PTAS) for the unit demand capacitated vehicle routing problem (CVRP) on trees, for the entire range of the tour capacity. The result extends to the splittable CVRP.
△ Less
Submitted 11 April, 2022; v1 submitted 5 November, 2021;
originally announced November 2021.
-
Constrained School Choice with Incomplete Information
Authors:
Hugo Gimbert,
Claire Mathieu,
Simon Mauras
Abstract:
School choice is the two-sided matching market where students (on one side) are to be matched with schools (on the other side) based on their mutual preferences. The classical algorithm to solve this problem is the celebrated deferred acceptance procedure, proposed by Gale and Shapley. After both sides have revealed their mutual preferences, the algorithm computes an optimal stable matching. Most…
▽ More
School choice is the two-sided matching market where students (on one side) are to be matched with schools (on the other side) based on their mutual preferences. The classical algorithm to solve this problem is the celebrated deferred acceptance procedure, proposed by Gale and Shapley. After both sides have revealed their mutual preferences, the algorithm computes an optimal stable matching. Most often in practice, notably when the process is implemented by a national clearinghouse and thousands of schools enter the market, there is a quota on the number of applications that a student can submit: students have to perform a partial revelation of their preferences, based on partial information on the market. We model this situation by drawing each student type from a publicly known distribution and study Nash equilibria of the corresponding Bayesian game. We focus on symmetric equilibria, in which all students play the same strategy. We show existence of these equilibria in the general case, and provide two algorithms to compute such equilibria under additional assumptions, including the case where schools have identical preferences over students.
△ Less
Submitted 19 September, 2021;
originally announced September 2021.
-
Probabilistic Analysis of Euclidean Capacitated Vehicle Routing
Authors:
Claire Mathieu,
Hang Zhou
Abstract:
We give a probabilistic analysis of the unit-demand Euclidean capacitated vehicle routing problem in the random setting, where the input distribution consists of $n$ unit-demand customers modeled as independent, identically distributed uniform random points in the two-dimensional plane. The objective is to visit every customer using a set of routes of minimum total length, such that each route vis…
▽ More
We give a probabilistic analysis of the unit-demand Euclidean capacitated vehicle routing problem in the random setting, where the input distribution consists of $n$ unit-demand customers modeled as independent, identically distributed uniform random points in the two-dimensional plane. The objective is to visit every customer using a set of routes of minimum total length, such that each route visits at most $k$ customers, where $k$ is the capacity of a vehicle. All of the following results are in the random setting and hold asymptotically almost surely.
The best known polynomial-time approximation for this problem is the iterated tour partitioning (ITP) algorithm, introduced in 1985 by Haimovich and Rinnooy Kan. They showed that the ITP algorithm is near-optimal when $k$ is either $o(\sqrt{n})$ or $ω(\sqrt{n})$, and they asked whether the ITP algorithm was also effective in the intermediate range. In this work, we show that when $k=\sqrt{n}$, the ITP algorithm is at best a $(1+c_0)$-approximation for some positive constant $c_0$.
On the other hand, the approximation ratio of the ITP algorithm was known to be at most $0.995+α$ due to Bompadre, Dror, and Orlin, where $α$ is the approximation ratio of an algorithm for the traveling salesman problem. In this work, we improve the upper bound on the approximation ratio of the ITP algorithm to $0.915+α$. Our analysis is based on a new lower bound on the optimal cost for the metric capacitated vehicle routing problem, which may be of independent interest.
△ Less
Submitted 14 September, 2021;
originally announced September 2021.
-
Apportionment with Parity Constraints
Authors:
Claire Mathieu,
Victor Verdugo
Abstract:
In the classic apportionment problem the goal is to decide how many seats of a parliament should be allocated to each party as a result of an election. The divisor methods provide a way of solving this problem by defining a notion of proportionality guided by some rounding rule. Motivated by recent challenges in the context of electoral apportionment, we consider the question of how to allocate th…
▽ More
In the classic apportionment problem the goal is to decide how many seats of a parliament should be allocated to each party as a result of an election. The divisor methods provide a way of solving this problem by defining a notion of proportionality guided by some rounding rule. Motivated by recent challenges in the context of electoral apportionment, we consider the question of how to allocate the seats of a parliament under parity constraints between candidate types (e.g. equal number of men and women elected) while at the same time satisfying party proportionality.
We consider two different approaches for this problem. The first mechanism, that follows a greedy approach, corresponds to a recent mechanism used in the Chilean Constitutional Convention 2021 election. We analyze this mechanism from a theoretical point of view. The second mechanism follows the idea of biproportionality introduced by Balinski and Demange [Math. Program. 1989, Math. Oper. Res. 1989]. In contrast with the classic biproportional method by Balinski and Demange, this mechanism is ruled by two levels of proportionality: Proportionality is satisfied at the level of parties by means of a divisor method, and then biproportionality is used to decide the number of candidates allocated to each type and party. We provide a theoretical analysis of this mechanism, making progress on the theoretical understanding of methods with two levels of proportionality. A typical benchmark used in the context of two-dimensional apportionment is the fair share (a.k.a matrix scaling), which corresponds to an ideal fractional biproportional solution. We provide lower bounds on the distance between these two types of solutions, and we explore their consequences in the context of two-dimensional apportionment.
△ Less
Submitted 9 August, 2021;
originally announced August 2021.
-
Competitive Data-Structure Dynamization
Authors:
Claire Mathieu,
Rajmohan Rajaraman,
Neal E. Young,
Arman Yousefi
Abstract:
Data-structure dynamization is a general approach for making static data structures dynamic. It is used extensively in geometric settings and in the guise of so-called merge (or compaction) policies in big-data databases such as Google Bigtable and LevelDB (our focus). Previous theoretical work is based on worst-case analyses for uniform inputs -- insertions of one item at a time and constant read…
▽ More
Data-structure dynamization is a general approach for making static data structures dynamic. It is used extensively in geometric settings and in the guise of so-called merge (or compaction) policies in big-data databases such as Google Bigtable and LevelDB (our focus). Previous theoretical work is based on worst-case analyses for uniform inputs -- insertions of one item at a time and constant read rate. In practice, merge policies must not only handle batch insertions and varying read/write ratios, they can take advantage of such non-uniformity to reduce cost on a per-input basis.
To model this, we initiate the study of data-structure dynamization through the lens of competitive analysis, via two new online set-cover problems. For each, the input is a sequence of disjoint sets of weighted items. The sets are revealed one at a time. The algorithm must respond to each with a set cover that covers all items revealed so far. It obtains the cover incrementally from the previous cover by adding one or more sets and optionally removing existing sets. For each new set the algorithm incurs build cost equal to the weight of the items in the set. In the first problem the objective is to minimize total build cost plus total query cost, where the algorithm incurs a query cost at each time $t$ equal to the current cover size. In the second problem, the objective is to minimize the build cost while kee** the query cost from exceeding $k$ (a given parameter) at any time. We give deterministic online algorithms for both variants, with competitive ratios of $Θ(\log^* n)$ and $k$, respectively. The latter ratio is optimal for the second variant.
△ Less
Submitted 9 December, 2021; v1 submitted 4 November, 2020;
originally announced November 2020.
-
Large Very Dense Subgraphs in a Stream of Edges
Authors:
Claire Mathieu,
Michel de Rougemont
Abstract:
We study the detection and the reconstruction of a large very dense subgraph in a social graph with $n$ nodes and $m$ edges given as a stream of edges, when the graph follows a power law degree distribution, in the regime when $m=O(n. \log n)$. A subgraph $S$ is very dense if it has $Ω(|S|^2)$ edges. We uniformly sample the edges with a Reservoir of size $k=O(\sqrt{n}.\log n)$. Our detection algor…
▽ More
We study the detection and the reconstruction of a large very dense subgraph in a social graph with $n$ nodes and $m$ edges given as a stream of edges, when the graph follows a power law degree distribution, in the regime when $m=O(n. \log n)$. A subgraph $S$ is very dense if it has $Ω(|S|^2)$ edges. We uniformly sample the edges with a Reservoir of size $k=O(\sqrt{n}.\log n)$. Our detection algorithm checks whether the Reservoir has a giant component. We show that if the graph contains a very dense subgraph of size $Ω(\sqrt{n})$, then the detection algorithm is almost surely correct. On the other hand, a random graph that follows a power law degree distribution almost surely has no large very dense subgraph, and the detection algorithm is almost surely correct. We define a new model of random graphs which follow a power law degree distribution and have large very dense subgraphs. We then show that on this class of random graphs we can reconstruct a good approximation of the very dense subgraph with high probability. We generalize these results to dynamic graphs defined by sliding windows in a stream of edges.
△ Less
Submitted 15 October, 2020;
originally announced October 2020.
-
Approximating maximum integral multiflows on bounded genus graphs
Authors:
Chien-chung Huang,
Mathieu Mari,
Claire Mathieu,
Jens Vygen
Abstract:
We devise the first constant-factor approximation algorithm for finding an integral multi-commodity flow of maximum total value for instances where the supply graph together with the demand edges can be embedded on an orientable surface of bounded genus. This extends recent results for planar instances. Our techniques include an uncrossing algorithm, which is significantly more difficult than in t…
▽ More
We devise the first constant-factor approximation algorithm for finding an integral multi-commodity flow of maximum total value for instances where the supply graph together with the demand edges can be embedded on an orientable surface of bounded genus. This extends recent results for planar instances. Our techniques include an uncrossing algorithm, which is significantly more difficult than in the planar case, a partition of the cycles in the support of an LP solution into free homotopy classes, and a new rounding procedure for freely homotopic non-separating cycles.
△ Less
Submitted 31 May, 2021; v1 submitted 1 May, 2020;
originally announced May 2020.
-
An Approximation Algorithm for Fully Planar Edge-Disjoint Paths
Authors:
Chien-Chung Huang,
Mathieu Mari,
Claire Mathieu,
Kevin Schewior,
Jens Vygen
Abstract:
We devise a constant-factor approximation algorithm for the maximization version of the edge-disjoint paths problem if the supply graph together with the demand edges form a planar graph. By planar duality this is equivalent to packing cuts in a planar graph such that each cut contains exactly one demand edge. We also show that the natural linear programming relaxations have constant integrality g…
▽ More
We devise a constant-factor approximation algorithm for the maximization version of the edge-disjoint paths problem if the supply graph together with the demand edges form a planar graph. By planar duality this is equivalent to packing cuts in a planar graph such that each cut contains exactly one demand edge. We also show that the natural linear programming relaxations have constant integrality gap, yielding an approximate max-multiflow min-multicut theorem.
△ Less
Submitted 6 January, 2020;
originally announced January 2020.
-
New front and back-end electronics for the upgraded GABRIELA detection system
Authors:
K. Hauschild,
R. Chakma,
A. Lopez-Martens,
K. Rezynkina,
V. Alaphillipe,
L. Gibelin,
N. Karkour,
D. Linget,
A. V. Yeremin,
A. G. Popeko,
O. N. Malyshev,
V. I. Chepigin,
A. I. Svirikhin,
A. V. Isaev,
E. A. Sokol,
M. L. Chelnokov,
Yu. A. Popov,
D. E. Katrasev,
A. N. Kuznetsov,
A. A. Kuznetsova,
M. S. Tezekbayeva,
O. Dorvaux,
B. J. P. Gall,
P. Brionnet,
K. Kessaci
, et al. (1 additional authors not shown)
Abstract:
The GABRIELA [1] set-up is used at the FLNR to perform detailed nuclear structure studies of transfermium nuclei. Following the modernization of the VASSILISSA separator (SHELS) [2] the GABRIELA detection system has also been upgraded. The characteristics of the upgraded detection system will be presented along with results from some recent electronics tests.
The GABRIELA [1] set-up is used at the FLNR to perform detailed nuclear structure studies of transfermium nuclei. Following the modernization of the VASSILISSA separator (SHELS) [2] the GABRIELA detection system has also been upgraded. The characteristics of the upgraded detection system will be presented along with results from some recent electronics tests.
△ Less
Submitted 24 October, 2019;
originally announced October 2019.
-
Recent Results from Polycrystalline CVD Diamond Detectors
Authors:
RD42 Collaboration,
L. Bäni,
A. Alexopoulos,
M. Artuso,
F. Bachmair,
M. Bartosik,
H. Beck,
V. Bellini,
V. Belyaev,
B. Bentele,
A. Bes,
J. -M. Brom,
M. Bruzzi,
G. Chiodini,
D. Chren,
V. Cindro,
G. Claus,
J. Collot,
J. Cumalat,
A. Dabrowski,
R. D'Alessandro,
D. Dauvergne,
W. de Boer,
C. Dorfer,
M. Dünser
, et al. (87 additional authors not shown)
Abstract:
Diamond is a material in use at many nuclear and high energy facilities due to its inherent radiation tolerance and ease of use. We have characterized detectors based on chemical vapor deposition (CVD) diamond before and after proton irradiation. We present preliminary results of the spatial resolution of unirradiated and irradiated CVD diamond strip sensors. In addition, we measured the pulse hei…
▽ More
Diamond is a material in use at many nuclear and high energy facilities due to its inherent radiation tolerance and ease of use. We have characterized detectors based on chemical vapor deposition (CVD) diamond before and after proton irradiation. We present preliminary results of the spatial resolution of unirradiated and irradiated CVD diamond strip sensors. In addition, we measured the pulse height versus particle rate of unirradiated and irradiated polycrystalline CVD (pCVD) diamond pad detectors up to a particle flux of $20\,\mathrm{MHz/cm^2}$ and a fluence up to $4 \times 10^{15}\,n/\mathrm{cm^2}$.
△ Less
Submitted 16 October, 2019;
originally announced October 2019.
-
Two-Sided Matching Markets with Correlated Random Preferences
Authors:
Hugo Gimbert,
Claire Mathieu,
Simon Mauras
Abstract:
Stable matching in a community consisting of men and women is a classical combinatorial problem that has been the subject of intense theoretical and empirical study since its introduction in 1962 in a seminal paper by Gale and Shapley, who designed the celebrated ``deferred acceptance'' algorithm for the problem.
In the input, each participant ranks participants of the opposite type, so the inpu…
▽ More
Stable matching in a community consisting of men and women is a classical combinatorial problem that has been the subject of intense theoretical and empirical study since its introduction in 1962 in a seminal paper by Gale and Shapley, who designed the celebrated ``deferred acceptance'' algorithm for the problem.
In the input, each participant ranks participants of the opposite type, so the input consists of a collection of permutations, representing the preference lists. A bipartite matching is unstable if some man-woman pair is blocking: both strictly prefer each other to their partner in the matching. Stability is an important economics concept in matching markets from the viewpoint of manipulability. The unicity of a stable matching implies non-manipulability, and near-unicity implies limited manipulability, thus these are mathematical properties related to the quality of stable matching algorithms.
This paper is a theoretical study of the effect of correlations on approximate manipulability of stable matching algorithms. Our approach is to go beyond worst case, assuming that some of the input preference lists are drawn from a distribution. Our model encompasses a discrete probabilistic process inspired by a popularity model introduced by Immorlica and Mahdian, that provides a way to capture correlation between preference lists. Approximate manipulability is approached from several angles : when all stable partners of a person have approximately the same rank; or when most persons have a unique stable partner. Another quantity of interest is a person's number of stable partners. Our results aim to paint a picture of the manipulability of stable matchings in a ``beyond worst case'' setting.
△ Less
Submitted 8 March, 2021; v1 submitted 8 April, 2019;
originally announced April 2019.
-
How to aggregate Top-lists: Approximation algorithms via scores and average ranks
Authors:
Claire Mathieu,
Simon Mauras
Abstract:
A top-list is a possibly incomplete ranking of elements: only a subset of the elements are ranked, with all unranked elements tied for last. Top-list aggregation, a generalization of the well-known rank aggregation problem, takes as input a collection of top-lists and aggregates them into a single complete ranking, aiming to minimize the number of upsets (pairs ranked in opposite order in the inpu…
▽ More
A top-list is a possibly incomplete ranking of elements: only a subset of the elements are ranked, with all unranked elements tied for last. Top-list aggregation, a generalization of the well-known rank aggregation problem, takes as input a collection of top-lists and aggregates them into a single complete ranking, aiming to minimize the number of upsets (pairs ranked in opposite order in the input and in the output). In this paper, we give simple approximation algorithms for top-list aggregation.
* We generalize the footrule algorithm for rank aggregation.
* Using inspiration from approval voting, we define the score of an element as the frequency with which it is ranked, i.e. appears in an input top-list. We reinterpret Ailon's RepeatChoice algorithm for top-list aggregation using the score of an element and its average rank given that it is ranked.
* Using average ranks, we generalize and analyze Borda's algorithm for rank aggregation.
* We design a simple 2-phase variant of the Generalized Borda's algorithm, roughly sorting by scores and breaking ties by average ranks.
* We then design another 2-phase variant in which in order to break ties we use, as a black box, the Mathieu-Schudy PTAS for rank aggregation, yielding a PTAS for top-list aggregation.
* Finally, we discuss the special case in which all input lists have constant length.
△ Less
Submitted 10 October, 2019; v1 submitted 5 November, 2018;
originally announced November 2018.
-
Instance-Optimality in the Noisy Value-and Comparison-Model --- Accept, Accept, Strong Accept: Which Papers get in?
Authors:
Vincent Cohen-Addad,
Frederik Mallmann-Trenn,
Claire Mathieu
Abstract:
Motivated by crowdsourced computation, peer-grading, and recommendation systems, Braverman, Mao and Weinberg [STOC'16] studied the \emph{query} and \emph{round} complexity of fundamental problems such as finding the maximum (\textsc{max}), finding all elements above a certain value (\textsc{threshold-$v$}) or computing the top$-k$ elements (\textsc{Top}-$k$) in a noisy environment.
For example,…
▽ More
Motivated by crowdsourced computation, peer-grading, and recommendation systems, Braverman, Mao and Weinberg [STOC'16] studied the \emph{query} and \emph{round} complexity of fundamental problems such as finding the maximum (\textsc{max}), finding all elements above a certain value (\textsc{threshold-$v$}) or computing the top$-k$ elements (\textsc{Top}-$k$) in a noisy environment.
For example, consider the task of selecting papers for a conference. This task is challenging due the crowdsourcing nature of peer reviews: the results of reviews are noisy and it is necessary to parallelize the review process as much as possible. We study the noisy value model and the noisy comparison model: In the \emph{noisy value model}, a reviewer is asked to evaluate a single element: "What is the value of paper $i$?" (\eg accept). In the \emph{noisy comparison model} (introduced in the seminal work of Feige, Peleg, Raghavan and Upfal [SICOMP'94]) a reviewer is asked to do a pairwise comparison: "Is paper $i$ better than paper $j$?"
In this paper, we show optimal worst-case query complexity for the \textsc{max},\textsc{threshold-$v$} and \textsc{Top}-$k$ problems. For \textsc{max} and \textsc{Top}-$k$, we obtain optimal worst-case upper and lower bounds on the round vs query complexity in both models. For \textsc{threshold}-$v$, we obtain optimal query complexity and nearly-optimal round complexity, where $k$ is the size of the output) for both models.
We then go beyond the worst-case and address the question of the importance of knowledge of the instance by providing, for a large range of parameters, instance-optimal algorithms with respect to the query complexity. Furthermore, we show that the value model is strictly easier than the comparison model.
△ Less
Submitted 5 November, 2018; v1 submitted 21 June, 2018;
originally announced June 2018.
-
Exploring interlayer Dirac cone coupling in commensurately rotated few-layer graphene on SiC(000-1)
Authors:
C. Mathieu,
E. H. Conrad,
F. Wang,
J. E. Rault,
V. Feyer,
C. M. Schneider,
O. Renault,
N. Barrett
Abstract:
We investigate electronic band-structure images in reciprocal space of few layer graphene epitaxially grown on SiC(000-1). In addition to the observation of commensurate rotation angles of the graphene layers, the k-space images recorded near the Fermi edge highlight structures originating from diffraction of the Dirac cones due to the relative rotation of adjacent layers. The 21.9° and 27° rotati…
▽ More
We investigate electronic band-structure images in reciprocal space of few layer graphene epitaxially grown on SiC(000-1). In addition to the observation of commensurate rotation angles of the graphene layers, the k-space images recorded near the Fermi edge highlight structures originating from diffraction of the Dirac cones due to the relative rotation of adjacent layers. The 21.9° and 27° rotation angles between two sheets of graphene are responsible for a periodic pattern that can be described with a superlattice unit cells. The superlattice generates replicas of Dirac cones with smaller wave vectors, due to a Brillouin zone folding.
△ Less
Submitted 18 June, 2018;
originally announced June 2018.
-
Charge spill-out and work function of few-layer graphene on SiC(0001)
Authors:
O. Renault,
A. M. Pascon,
H. Rotella,
K. Kaja,
C. Mathieu,
J. E. Rault,
P. Blaise,
T. Poiroux,
N. Barrett,
L. R. C. Fonseca
Abstract:
We report on the charge spill-out and work function of epitaxial few-layer graphene on 6H-SiC(0001). Experiments from high-resolution, energy-filtered X-ray photoelectron emission microscopy (XPEEM) are combined with ab initio Density Functional Theory calculations using a relaxed interface model. Work function values obtained from theory and experiments are in qualitative agreement, reproducing t…
▽ More
We report on the charge spill-out and work function of epitaxial few-layer graphene on 6H-SiC(0001). Experiments from high-resolution, energy-filtered X-ray photoelectron emission microscopy (XPEEM) are combined with ab initio Density Functional Theory calculations using a relaxed interface model. Work function values obtained from theory and experiments are in qualitative agreement, reproducing the previously observed trend of increasing work function with each additional graphene plane. Electrons transfer at the SiC/graphene interface through a buffer layer causes an interface dipole moment which is at the origin of the graphene work function modulation. The total charge transfer is independent of the number of graphene layers, and is consistent with the constant binding energy of the SiC component of the C 1s core-level measured by XPEEM. Charge leakage into vacuum depends on the number of graphene layers explaining why the experimental, layer-dependent C 1s-graphene core-level binding energy shift does not rigidly follow that of the work function. Thus, a combination of charge transfer at the SiC/graphene interface and charge spill-out into vacuum resolves the apparent discrepancy between the experimental work function and C1s binding energy.
△ Less
Submitted 13 June, 2018;
originally announced June 2018.
-
Full field electron spectromicroscopy applied to ferroelectric materials
Authors:
N. Barrett,
J. E. Rault,
J. L. Wang,
C. Mathieu,
A. Locatelli,
T. O. Mentes,
M. A. Nino,
S. Fusil,
M. Bibes,
A. Barthelemy,
D. Sando,
W. Ren,
S. Prosandeev,
L. Bellaiche,
B. Vilquin,
A. Petraru,
I. P. Krug,
C. M. Schneider
Abstract:
The application of PhotoEmission Electron Microscopy (PEEM) and Low Energy Electron Microscopy (LEEM) techniques to the study of the electronic and chemical structure of ferroelectric materials is reviewed. Electron optics in both techniques gives spatial resolution of a few tens of nanometres. PEEM images photoelectrons whereas LEEM images reflected and elastically backscattered electrons. Both P…
▽ More
The application of PhotoEmission Electron Microscopy (PEEM) and Low Energy Electron Microscopy (LEEM) techniques to the study of the electronic and chemical structure of ferroelectric materials is reviewed. Electron optics in both techniques gives spatial resolution of a few tens of nanometres. PEEM images photoelectrons whereas LEEM images reflected and elastically backscattered electrons. Both PEEM and LEEM can be used in direct and reciprocal space imaging. Together, they provide access to surface charge, work function, topography, chemical map**, surface crystallinity and band structure. Examples of applications for the study of ferroelectric thin films and single crystals are presented.
△ Less
Submitted 13 June, 2018;
originally announced June 2018.
-
Polarization sensitive surface band structure of doped BaTiO3(001)
Authors:
J. E. Rault,
J. Dionot,
C. Mathieu,
V. Feyer,
C. M. Schneider,
G. Geneste,
N. Barrett
Abstract:
We present a spatial and wave-vector resolved study of the electronic structure of micron sized ferroelectric domains at the surface of a BaTiO3(001) single crystal. The n-type do** of the BaTiO3 is controlled by in-situ vacuum and oxygen annealing, providing experimental evidence of a surface paraelectric-ferroelectric transition below a critical do** level. Real space imaging of photoemissio…
▽ More
We present a spatial and wave-vector resolved study of the electronic structure of micron sized ferroelectric domains at the surface of a BaTiO3(001) single crystal. The n-type do** of the BaTiO3 is controlled by in-situ vacuum and oxygen annealing, providing experimental evidence of a surface paraelectric-ferroelectric transition below a critical do** level. Real space imaging of photoemission threshold, core level and valence band spectra show contrast due to domain polarization. Reciprocal space imaging of the electronic structure using linearly polarized light provides unambiguous evidence for the presence of both in and out-of plane polarization with two and fourfold symmetry, respectively. The results agree well with first principles calculations.
△ Less
Submitted 10 June, 2018;
originally announced June 2018.
-
Polarization dependent chemistry of ferroelectric BaTiO3 (001) domains
Authors:
Yanyu Mi,
Gregory Geneste,
Julien Rault,
Claire Mathieu,
Alexandre Pancotti,
Nicholas Barrett
Abstract:
Recent works suggest that the surface chemistry, in particular, the presence of oxygen vacancies can affect the polarization in a ferroelectric material. This should, in turn, influence the domain ordering driven by the need to screen the depolarizing field. Here we show using density functional theory that the presence of oxygen vacancies at the surface of BaTiO3 (001) preferentially stabilizes a…
▽ More
Recent works suggest that the surface chemistry, in particular, the presence of oxygen vacancies can affect the polarization in a ferroelectric material. This should, in turn, influence the domain ordering driven by the need to screen the depolarizing field. Here we show using density functional theory that the presence of oxygen vacancies at the surface of BaTiO3 (001) preferentially stabilizes an inward pointing, P-, polarization. Mirror electron microscopy measurements of the domain ordering confirm the theoretical results.
△ Less
Submitted 7 June, 2018;
originally announced June 2018.
-
Control of surface potential at polar domain walls in a nonpolar oxide
Authors:
G. F. Nataf,
M. Guennou,
J. Kreisel,
P. Hicher,
R. Haumont,
O. Aktas,
E. K. H. Salje,
L. Tortech,
C. Mathieu,
D. Martinotti,
N. Barrett
Abstract:
Ferroic domain walls could play an important role in microelectronics, given their nanometric size and often distinct functional properties. Until now, devices and device concepts were mostly based on mobile domain walls in ferromagnetic and ferroelectric materials. A less explored path is to make use of polar domain walls in nonpolar ferroelastic materials. Indeed, while the polar character of fe…
▽ More
Ferroic domain walls could play an important role in microelectronics, given their nanometric size and often distinct functional properties. Until now, devices and device concepts were mostly based on mobile domain walls in ferromagnetic and ferroelectric materials. A less explored path is to make use of polar domain walls in nonpolar ferroelastic materials. Indeed, while the polar character of ferroelastic domain walls has been demonstrated, polarization control has been elusive. Here, we report evidence for the electrostatic signature of the domain-wall polarization in nonpolar calcium titanate (CaTiO3). Macroscopic mechanical resonances excited by an ac electric field are observed as a signature of a piezoelectric response caused by polar walls. On the microscopic scale, the polarization in domain walls modifies the local surface potential of the sample. Through imaging of surface potential variations, we show that the potential at the domain wall can be controlled by electron injection. This could enable devices based on nondestructive information readout of surface potential.
△ Less
Submitted 7 February, 2018;
originally announced February 2018.
-
Skyline Computation with Noisy Comparisons
Authors:
Benoît Groz,
Frederik Mallmann-Trenn,
Claire Mathieu,
Victor Verdugo
Abstract:
Given a set of $n$ points in a $d$-dimensional space, we seek to compute the skyline, i.e., those points that are not strictly dominated by any other point, using few comparisons between elements. We adopt the noisy comparison model [FRPU94] where comparisons fail with constant probability and confidence can be increased through independent repetitions of a comparison. In this model motivated by C…
▽ More
Given a set of $n$ points in a $d$-dimensional space, we seek to compute the skyline, i.e., those points that are not strictly dominated by any other point, using few comparisons between elements. We adopt the noisy comparison model [FRPU94] where comparisons fail with constant probability and confidence can be increased through independent repetitions of a comparison. In this model motivated by Crowdsourcing applications, Groz & Milo [GM15] show three bounds on the query complexity for the skyline problem. We improve significantly on that state of the art and provide two output-sensitive algorithms computing the skyline with respective query complexity $O(nd\log (dk/δ))$ and $O(ndk\log (k/δ))$ where $k$ is the size of the skyline and $δ$ the expected probability that our algorithm fails to return the correct answer. These results are tight for low dimensions.
△ Less
Submitted 1 April, 2020; v1 submitted 5 October, 2017;
originally announced October 2017.
-
Dynamic clustering to minimize the sum of radii
Authors:
Monika Henzinger,
Dariusz Leniowski,
Claire Mathieu
Abstract:
In this paper, we study the problem of opening centers to cluster a set of clients in a metric space so as to minimize the sum of the costs of the centers and of the cluster radii, in a dynamic environment where clients arrive and depart, and the solution must be updated efficiently while remaining competitive with respect to the current optimal solution. We call this dynamic sum-of-radii clusteri…
▽ More
In this paper, we study the problem of opening centers to cluster a set of clients in a metric space so as to minimize the sum of the costs of the centers and of the cluster radii, in a dynamic environment where clients arrive and depart, and the solution must be updated efficiently while remaining competitive with respect to the current optimal solution. We call this dynamic sum-of-radii clustering problem.
We present a data structure that maintains a solution whose cost is within a constant factor of the cost of an optimal solution in metric spaces with bounded doubling dimension and whose worst-case update time is logarithmic in the parameters of the problem.
△ Less
Submitted 9 July, 2017;
originally announced July 2017.
-
Hierarchical Clustering: Objective Functions and Algorithms
Authors:
Vincent Cohen-Addad,
Varun Kanade,
Frederik Mallmann-Trenn,
Claire Mathieu
Abstract:
Hierarchical clustering is a recursive partitioning of a dataset into clusters at an increasingly finer granularity. Motivated by the fact that most work on hierarchical clustering was based on providing algorithms, rather than optimizing a specific objective, Dasgupta framed similarity-based hierarchical clustering as a combinatorial optimization problem, where a `good' hierarchical clustering is…
▽ More
Hierarchical clustering is a recursive partitioning of a dataset into clusters at an increasingly finer granularity. Motivated by the fact that most work on hierarchical clustering was based on providing algorithms, rather than optimizing a specific objective, Dasgupta framed similarity-based hierarchical clustering as a combinatorial optimization problem, where a `good' hierarchical clustering is one that minimizes some cost function. He showed that this cost function has certain desirable properties.
We take an axiomatic approach to defining `good' objective functions for both similarity and dissimilarity-based hierarchical clustering. We characterize a set of "admissible" objective functions (that includes Dasgupta's one) that have the property that when the input admits a `natural' hierarchical clustering, it has an optimal value.
Equipped with a suitable objective function, we analyze the performance of practical algorithms, as well as develop better algorithms. For similarity-based hierarchical clustering, Dasgupta showed that the divisive sparsest-cut approach achieves an $O(\log^{3/2} n)$-approximation. We give a refined analysis of the algorithm and show that it in fact achieves an $O(\sqrt{\log n})$-approx. (Charikar and Chatziafratis independently proved that it is a $O(\sqrt{\log n})$-approx.). This improves upon the LP-based $O(\log n)$-approx. of Roy and Pokutta. For dissimilarity-based hierarchical clustering, we show that the classic average-linkage algorithm gives a factor 2 approx., and provide a simple and better algorithm that gives a factor 3/2 approx..
Finally, we consider `beyond-worst-case' scenario through a generalisation of the stochastic block model for hierarchical clustering. We show that Dasgupta's cost function has desirable properties for these inputs and we provide a simple 1 + o(1)-approximation in this setting.
△ Less
Submitted 7 April, 2017;
originally announced April 2017.
-
Optimization of Bootstrap** in Circuits
Authors:
Fabrice Benhamouda,
Tancrède Lepoint,
Claire Mathieu,
Hang Zhou
Abstract:
In 2009, Gentry proposed the first Fully Homomorphic Encryption (FHE) scheme, an extremely powerful cryptographic primitive that enables to perform computations, i.e., to evaluate circuits, on encrypted data without decrypting them first. This has many applications, in particular in cloud computing.
In all currently known FHE schemes, encryptions are associated to some (non-negative integer) noi…
▽ More
In 2009, Gentry proposed the first Fully Homomorphic Encryption (FHE) scheme, an extremely powerful cryptographic primitive that enables to perform computations, i.e., to evaluate circuits, on encrypted data without decrypting them first. This has many applications, in particular in cloud computing.
In all currently known FHE schemes, encryptions are associated to some (non-negative integer) noise level, and at each evaluation of an AND gate, the noise level increases. This is problematic because decryption can only work if the noise level stays below some maximum level $L$ at every gate of the circuit. To ensure that property, it is possible to perform an operation called \emph{bootstrap**} to reduce the noise level. However, bootstrap** is time-consuming and has been identified as a critical operation. This motivates a new problem in discrete optimization, that of choosing where in the circuit to perform bootstrap** operations so as to control the noise level; the goal is to minimize the number of bootstrap**s in circuits.
In this paper, we formally define the \emph{bootstrap problem}, we design a polynomial-time $L$-approximation algorithm using a novel method of rounding of a linear program, and we show a matching hardness result: $(L-ε)$-inapproximability for any $ε>0$.
△ Less
Submitted 16 August, 2016;
originally announced August 2016.
-
Characterization of PARIS LaBr$_3$(Ce)-NaI(Tl) phoswich detectors upto $E_γ$ $\sim$ 22 MeV
Authors:
C. Ghosh,
V. Nanal,
R. G. Pillay,
Anoop K. V,
N. Dokania,
Sanjoy Pal,
M. S. Pose,
G. Mishra,
P. C. Rout,
Suresh Kumar,
Deepak Pandit,
Debasish Mondal,
Surajit Pal,
S. R. Banerjee,
Paweł J. Napiorkowski,
Oliver Dorvaux,
S. Kihel,
C. Mathieu,
A. Maj
Abstract:
In order to understand the performance of the PARIS (Photon Array for the studies with Radioactive Ion and Stable beams) detector, detailed characterization of two individual phoswich (LaBr$_3$(Ce)-NaI(Tl)) elements has been carried out. The detector response is investigated over a wide range of $E_γ$ = 0.6 to 22.6 MeV using radioactive sources and employing $^{11}B(p,γ)$ reaction at $E_p$ = 163 k…
▽ More
In order to understand the performance of the PARIS (Photon Array for the studies with Radioactive Ion and Stable beams) detector, detailed characterization of two individual phoswich (LaBr$_3$(Ce)-NaI(Tl)) elements has been carried out. The detector response is investigated over a wide range of $E_γ$ = 0.6 to 22.6 MeV using radioactive sources and employing $^{11}B(p,γ)$ reaction at $E_p$ = 163 keV and $E_p$ = 7.2 MeV. The linearity of energy response of the LaBr$_3$(Ce) detector is tested upto 22.6 MeV using three different voltage dividers. The data acquisition system using CAEN digitizers is set up and optimized to get the best energy and time resolution. The energy resolution of $\sim$ 2.1% at $E_γ$ = 22.6~MeV is measured for the configuration giving best linearity upto high energy. Time resolution of the phoswich detector is measured with a $^{60}$Co source after implementing CFD algorithm for the digitized pulses and is found to be excellent (FWHM $\sim$ 315~ps). In order to study the effect of count rate on detectors, the centroid position and width of the $E_γ$ = 835~keV peak were measured upto 220 kHz count rate. The measured efficiency data with radioactive sources are in good agreement with GEANT4 based simulations. The total energy spectrum after the add-back of energy signals in phoswich components is also presented.
△ Less
Submitted 20 May, 2016; v1 submitted 3 May, 2016;
originally announced May 2016.
-
Local search yields approximation schemes for k-means and k-median in Euclidean and minor-free metrics
Authors:
Vincent Cohen-Addad,
Philip N. Klein,
Claire Mathieu
Abstract:
We give the first polynomial-time approximation schemes (PTASs) for the following problems: (1) uniform facility location in edge-weighted planar graphs; (2) $k$-median and $k$-means in edge-weighted planar graphs; (3) $k$-means in Euclidean spaces of bounded dimension. Our first and second results extend to minor-closed families of graphs. All our results extend to cost functions that are the…
▽ More
We give the first polynomial-time approximation schemes (PTASs) for the following problems: (1) uniform facility location in edge-weighted planar graphs; (2) $k$-median and $k$-means in edge-weighted planar graphs; (3) $k$-means in Euclidean spaces of bounded dimension. Our first and second results extend to minor-closed families of graphs. All our results extend to cost functions that are the $p$-th power of the shortest-path distance. The algorithm is local search where the local neighborhood of a solution $S$ consists of all solutions obtained from $S$ by removing and adding $1/ε^{O(1)}$ centers.
△ Less
Submitted 7 April, 2016; v1 submitted 31 March, 2016;
originally announced March 2016.
-
Trap** in irradiated p-on-n silicon sensors at fluences anticipated at the HL-LHC outer tracker
Authors:
W. Adam,
T. Bergauer,
M. Dragicevic,
M. Friedl,
R. Fruehwirth,
M. Hoch,
J. Hrubec,
M. Krammer,
W. Treberspurg,
W. Waltenberger,
S. Alderweireldt,
W. Beaumont,
X. Janssen,
S. Luyckx,
P. Van Mechelen,
N. Van Remortel,
A. Van Spilbeeck,
P. Barria,
C. Caillol,
B. Clerbaux,
G. De Lentdecker,
D. Dobur,
L. Favart,
A. Grebenyuk,
Th. Lenzi
, et al. (663 additional authors not shown)
Abstract:
The degradation of signal in silicon sensors is studied under conditions expected at the CERN High-Luminosity LHC. 200 $μ$m thick n-type silicon sensors are irradiated with protons of different energies to fluences of up to $3 \cdot 10^{15}$ neq/cm$^2$. Pulsed red laser light with a wavelength of 672 nm is used to generate electron-hole pairs in the sensors. The induced signals are used to determi…
▽ More
The degradation of signal in silicon sensors is studied under conditions expected at the CERN High-Luminosity LHC. 200 $μ$m thick n-type silicon sensors are irradiated with protons of different energies to fluences of up to $3 \cdot 10^{15}$ neq/cm$^2$. Pulsed red laser light with a wavelength of 672 nm is used to generate electron-hole pairs in the sensors. The induced signals are used to determine the charge collection efficiencies separately for electrons and holes drifting through the sensor. The effective trap** rates are extracted by comparing the results to simulation. The electric field is simulated using Synopsys device simulation assuming two effective defects. The generation and drift of charge carriers are simulated in an independent simulation based on PixelAV. The effective trap** rates are determined from the measured charge collection efficiencies and the simulated and measured time-resolved current pulses are compared. The effective trap** rates determined for both electrons and holes are about 50% smaller than those obtained using standard extrapolations of studies at low fluences and suggests an improved tracker performance over initial expectations.
△ Less
Submitted 7 May, 2015;
originally announced May 2015.
-
Building Classifiers to Predict the Start of Glucose-Lowering Pharmacotherapy Using Belgian Health Expenditure Data
Authors:
Marc Claesen,
Frank De Smet,
Pieter Gillard,
Chantal Mathieu,
Bart De Moor
Abstract:
Early diagnosis is important for type 2 diabetes (T2D) to improve patient prognosis, prevent complications and reduce long-term treatment costs. We present a novel risk profiling approach based exclusively on health expenditure data that is available to Belgian mutual health insurers. We used expenditure data related to drug purchases and medical provisions to construct models that predict whether…
▽ More
Early diagnosis is important for type 2 diabetes (T2D) to improve patient prognosis, prevent complications and reduce long-term treatment costs. We present a novel risk profiling approach based exclusively on health expenditure data that is available to Belgian mutual health insurers. We used expenditure data related to drug purchases and medical provisions to construct models that predict whether a patient will start glucose-lowering pharmacotherapy in the coming years, based on that patient's recent medical expenditure history. The design and implementation of the modeling strategy are discussed in detail and several learning methods are benchmarked for our application. Our best performing model obtains between 74.9% and 76.8% area under the ROC curve, which is comparable to state-of-the-art risk prediction approaches for T2D based on questionnaires. In contrast to other methods, our approach can be implemented on a population-wide scale at virtually no extra operational cost. Possibly, our approach can be further improved by additional information about some risk factors of T2D that is unavailable in health expenditure data.
△ Less
Submitted 28 April, 2015;
originally announced April 2015.
-
The Unreasonable Success of Local Search: Geometric Optimization
Authors:
Vincent Cohen-Addad,
Claire Mathieu
Abstract:
What is the effectiveness of local search algorithms for geometric problems in the plane? We prove that local search with neighborhoods of magnitude $1/ε^c$ is an approximation scheme for the following problems in the Euclidian plane: TSP with random inputs, Steiner tree with random inputs, facility location (with worst case inputs), and bicriteria $k$-median (also with worst case inputs). The ran…
▽ More
What is the effectiveness of local search algorithms for geometric problems in the plane? We prove that local search with neighborhoods of magnitude $1/ε^c$ is an approximation scheme for the following problems in the Euclidian plane: TSP with random inputs, Steiner tree with random inputs, facility location (with worst case inputs), and bicriteria $k$-median (also with worst case inputs). The randomness assumption is necessary for TSP.
△ Less
Submitted 9 September, 2015; v1 submitted 2 October, 2014;
originally announced October 2014.
-
Bigtable Merge Compaction
Authors:
Claire Mathieu,
Carl Staelin,
Neal E. Young,
Arman Yousefi
Abstract:
NoSQL databases are widely used for massive data storage and real-time web applications. Yet important aspects of these data structures are not well understood. For example, NoSQL databases write most of their data to a collection of files on disk, meanwhile periodically compacting subsets of these files. A compaction policy must choose which files to compact, and when to compact them, without kno…
▽ More
NoSQL databases are widely used for massive data storage and real-time web applications. Yet important aspects of these data structures are not well understood. For example, NoSQL databases write most of their data to a collection of files on disk, meanwhile periodically compacting subsets of these files. A compaction policy must choose which files to compact, and when to compact them, without knowing the future workload. Although these choices can affect computational efficiency by orders of magnitude, existing literature lacks tools for designing and analyzing online compaction policies --- policies are now chosen largely by trial and error.
Here we introduce tools for the design and analysis of compaction policies for Google Bigtable, propose new policies, give average-case and worst-case competitive analyses, and present preliminary empirical benchmarks.
△ Less
Submitted 9 July, 2015; v1 submitted 10 July, 2014;
originally announced July 2014.
-
Lower bounds for testing digraph connectivity with one-pass streaming algorithms
Authors:
Glencora Borradaile,
Claire Mathieu,
Theresa Migler
Abstract:
In this note, we show that three graph properties - strong connectivity, acyclicity, and reachability from a vertex $s$ to all vertices - each require a working memory of $Ω(εm)$ on a graph with $m$ edges to be determined correctly with probability greater than $(1+ε)/2$.
In this note, we show that three graph properties - strong connectivity, acyclicity, and reachability from a vertex $s$ to all vertices - each require a working memory of $Ω(εm)$ on a graph with $m$ edges to be determined correctly with probability greater than $(1+ε)/2$.
△ Less
Submitted 8 April, 2014; v1 submitted 4 April, 2014;
originally announced April 2014.
-
Facility Location in Evolving Metrics
Authors:
David Eisenstat,
Claire Mathieu,
Nicolas Schabanel
Abstract:
Understanding the dynamics of evolving social or infrastructure networks is a challenge in applied areas such as epidemiology, viral marketing, or urban planning. During the past decade, data has been collected on such networks but has yet to be fully analyzed. We propose to use information on the dynamics of the data to find stable partitions of the network into groups. For that purpose, we intro…
▽ More
Understanding the dynamics of evolving social or infrastructure networks is a challenge in applied areas such as epidemiology, viral marketing, or urban planning. During the past decade, data has been collected on such networks but has yet to be fully analyzed. We propose to use information on the dynamics of the data to find stable partitions of the network into groups. For that purpose, we introduce a time-dependent, dynamic version of the facility location problem, that includes a switching cost when a client's assignment changes from one facility to another. This might provide a better representation of an evolving network, emphasizing the abrupt change of relationships between subjects rather than the continuous evolution of the underlying network. We show that in realistic examples this model yields indeed better fitting solutions than optimizing every snapshot independently. We present an $O(\log nT)$-approximation algorithm and a matching hardness result, where $n$ is the number of clients and $T$ the number of time steps. We also give an other algorithms with approximation ratio $O(\log nT)$ for the variant where one pays at each time step (leasing) for each open facility.
△ Less
Submitted 26 March, 2014;
originally announced March 2014.
-
Energy-efficient algorithms for non-preemptive speed-scaling
Authors:
Vincent Cohen-Addad,
Zhentao Li,
Claire Mathieu,
Ioannis Millis
Abstract:
We improve complexity bounds for energy-efficient speed scheduling problems for both the single processor and multi-processor cases. Energy conservation has become a major concern, so revisiting traditional scheduling problems to take into account the energy consumption has been part of the agenda of the scheduling community for the past few years.
We consider the energy minimizing speed scaling…
▽ More
We improve complexity bounds for energy-efficient speed scheduling problems for both the single processor and multi-processor cases. Energy conservation has become a major concern, so revisiting traditional scheduling problems to take into account the energy consumption has been part of the agenda of the scheduling community for the past few years.
We consider the energy minimizing speed scaling problem introduced by Yao et al. where we wish to schedule a set of jobs, each with a release date, deadline and work volume, on a set of identical processors. The processors may change speed as a function of time and the energy they consume is the $α$th power of its speed. The objective is then to find a feasible schedule which minimizes the total energy used.
We show that in the setting with an arbitrary number of processors where all work volumes are equal, there is a $2(1+\varepsilon)(5(1+\varepsilon))^{α-1}\tilde{B}_α=O_α(1)$ approximation algorithm, where $\tilde{B}_α$ is the generalized Bell number. This is the first constant factor algorithm for this problem. This algorithm extends to general unequal processor-dependent work volumes, up to losing a factor of $(\frac{(1+r)r}{2})^α$ in the approximation, where $r$ is the maximum ratio between two work volumes. We then show this latter problem is APX-hard, even in the special case when all release dates and deadlines are equal and $r$ is 4.
In the single processor case, we introduce a new linear programming formulation of speed scaling and prove that its integrality gap is at most $12^{α-1}$. As a corollary, we obtain a $(12(1+\varepsilon))^{α-1}$ approximation algorithm where there is a single processor, improving on the previous best bound of $2^{α-1}(1+\varepsilon)^α\tilde{B}_α$ when $α\ge 25$.
△ Less
Submitted 18 February, 2014; v1 submitted 17 February, 2014;
originally announced February 2014.
-
Near-Linear Query Complexity for Graph Inference
Authors:
Sampath Kannan,
Claire Mathieu,
Hang Zhou
Abstract:
How efficiently can we find an unknown graph using distance or shortest path queries between its vertices? Let $G = (V,E)$ be an unweighted, connected graph of bounded degree. The edge set $E$ is initially unknown, and the graph can be accessed using a \emph{distance oracle}, which receives a pair of vertices $(u,v)$ and returns the distance between $u$ and $v$. In the \emph{verification} problem,…
▽ More
How efficiently can we find an unknown graph using distance or shortest path queries between its vertices? Let $G = (V,E)$ be an unweighted, connected graph of bounded degree. The edge set $E$ is initially unknown, and the graph can be accessed using a \emph{distance oracle}, which receives a pair of vertices $(u,v)$ and returns the distance between $u$ and $v$. In the \emph{verification} problem, we are given a hypothetical graph $\hat G = (V,\hat E)$ and want to check whether $G$ is equal to $\hat G$. We analyze a natural greedy algorithm and prove that it uses $n^{1+o(1)}$ distance queries. In the more difficult \emph{reconstruction} problem, $\hat G$ is not given, and the goal is to find the graph $G$. If the graph can be accessed using a \emph{shortest path oracle}, which returns not just the distance but an actual shortest path between $u$ and $v$, we show that extending the idea of greedy gives a reconstruction algorithm that uses $n^{1+o(1)}$ shortest path queries. When the graph has bounded treewidth, we further bound the query complexity of the greedy algorithms for both problems by $\tilde O(n)$. When the graph is chordal, we provide a randomized algorithm for reconstruction using $\tilde O(n)$ distance queries.
△ Less
Submitted 18 February, 2015; v1 submitted 17 February, 2014;
originally announced February 2014.
-
First-Come-First-Served for Online Slot Allocation and Huffman Coding
Authors:
Monik Khare,
Claire Mathieu,
Neal E. Young
Abstract:
Can one choose a good Huffman code on the fly, without knowing the underlying distribution? Online Slot Allocation (OSA) models this and similar problems: There are n slots, each with a known cost. There are n items. Requests for items are drawn i.i.d. from a fixed but hidden probability distribution p. After each request, if the item, i, was not previously requested, then the algorithm (knowing t…
▽ More
Can one choose a good Huffman code on the fly, without knowing the underlying distribution? Online Slot Allocation (OSA) models this and similar problems: There are n slots, each with a known cost. There are n items. Requests for items are drawn i.i.d. from a fixed but hidden probability distribution p. After each request, if the item, i, was not previously requested, then the algorithm (knowing the slot costs and the requests so far, but not p) must place the item in some vacant slot j(i). The goal is to minimize the sum, over the items, of the probability of the item times the cost of its assigned slot.
The optimal offline algorithm is trivial: put the most probable item in the cheapest slot, the second most probable item in the second cheapest slot, etc. The optimal online algorithm is First Come First Served (FCFS): put the first requested item in the cheapest slot, the second (distinct) requested item in the second cheapest slot, etc. The optimal competitive ratios for any online algorithm are 1+H(n-1) ~ ln n for general costs and 2 for concave costs. For logarithmic costs, the ratio is, asymptotically, 1: FCFS gives cost opt + O(log opt).
For Huffman coding, FCFS yields an online algorithm (one that allocates codewords on demand, without knowing the underlying probability distribution) that guarantees asymptotically optimal cost: at most opt + 2 log(1+opt) + 2.
△ Less
Submitted 7 October, 2013; v1 submitted 19 July, 2013;
originally announced July 2013.
-
Graph Reconstruction via Distance Oracles
Authors:
Claire Mathieu,
Hang Zhou
Abstract:
We study the problem of reconstructing a hidden graph given access to a distance oracle. We design randomized algorithms for the following problems: reconstruction of a degree bounded graph with query complexity $\tilde{O}(n^{3/2})$; reconstruction of a degree bounded outerplanar graph with query complexity $\tilde{O}(n)$; and near-optimal approximate reconstruction of a general graph.
We study the problem of reconstructing a hidden graph given access to a distance oracle. We design randomized algorithms for the following problems: reconstruction of a degree bounded graph with query complexity $\tilde{O}(n^{3/2})$; reconstruction of a degree bounded outerplanar graph with query complexity $\tilde{O}(n)$; and near-optimal approximate reconstruction of a general graph.
△ Less
Submitted 24 April, 2013;
originally announced April 2013.
-
A polynomial-time approximation scheme for Euclidean Steiner forest
Authors:
Glencora Borradaile,
Philip Klein,
Claire Mathieu
Abstract:
We give a randomized O(n polylog n)-time approximation scheme for the Steiner forest problem in the Euclidean plane. For every fixed eps > 0 and given n terminals in the plane with connection requests between some pairs of terminals, our scheme finds a (1 + eps)-approximation to the minimum-length forest that connects every requested pair of terminals.
We give a randomized O(n polylog n)-time approximation scheme for the Steiner forest problem in the Euclidean plane. For every fixed eps > 0 and given n terminals in the plane with connection requests between some pairs of terminals, our scheme finds a (1 + eps)-approximation to the minimum-length forest that connects every requested pair of terminals.
△ Less
Submitted 24 February, 2014; v1 submitted 28 February, 2013;
originally announced February 2013.
-
Effect of Oxygen Adsorption on the Local Properties of Epitaxial Graphene on SiC (0001)
Authors:
C. Mathieu,
B. Lalmi,
T. O. Mentes,
E. Pallecchi,
A. Locatelli,
S. Latil,
R. Belkhou,
A. Ouerghi
Abstract:
The effect of oxygen adsorption on the local structure and electronic properties of monolayer graphene grown on SiC(0001) has been studied by means of Low Energy Electron Microscopy (LEEM), microprobe Low Energy Electron Diffraction (\muLEED) and microprobe Angle Resolved Photoemission (\muARPES). We show that the buffer layer of epitaxial graphene on SiC(0001) is partially decoupled after oxidati…
▽ More
The effect of oxygen adsorption on the local structure and electronic properties of monolayer graphene grown on SiC(0001) has been studied by means of Low Energy Electron Microscopy (LEEM), microprobe Low Energy Electron Diffraction (\muLEED) and microprobe Angle Resolved Photoemission (\muARPES). We show that the buffer layer of epitaxial graphene on SiC(0001) is partially decoupled after oxidation. The monitoring of the oxidation process demonstrates that the oxygen saturates the Si dangling bonds, breaks some Si-C bonds at the interface and intercalates the graphene layer. Accurate control over the oxidation parameters enables us to tune the charge density modulation in the layer.
△ Less
Submitted 12 June, 2012;
originally announced June 2012.
-
Observation of the quantum Hall effect in epitaxial graphene on SiC(0001) with oxygen adsorption
Authors:
E. Pallecchi,
M. Ridene,
D. Kazazis,
C. Mathieu,
F. Schopfer,
W. Poirier,
D. Mailly,
A. Ouerghi
Abstract:
In this letter we report on transport measurements of epitaxial graphene on SiC(0001) with oxygen adsorption. In a $50\times 50 μ\mathrm{m^2}$ size Hall bar we observe the half-integer quantum Hall effect with a transverse resistance plateau quantized at filling factor around $ν= 2$, an evidence of monolayer graphene. We find low electron concentration of $9\times 10^{11} \textrm{cm}^{-2}$ and we…
▽ More
In this letter we report on transport measurements of epitaxial graphene on SiC(0001) with oxygen adsorption. In a $50\times 50 μ\mathrm{m^2}$ size Hall bar we observe the half-integer quantum Hall effect with a transverse resistance plateau quantized at filling factor around $ν= 2$, an evidence of monolayer graphene. We find low electron concentration of $9\times 10^{11} \textrm{cm}^{-2}$ and we show that a do** of $10^{13}\textrm{cm}^{-2}$ which is characteristic of intrinsic epitaxial graphene can be restored by vacuum annealing. The effect of oxygen adsorption on carrier density is confirmed by local angle-resolved photoemission spectroscopy measurements. These results are important for understanding oxygen adsorption on epitaxial graphene and for its application to metrology and mesoscopic physics where a low carrier concentration is required.
△ Less
Submitted 12 July, 2012; v1 submitted 15 March, 2012;
originally announced March 2012.
-
The min mean-weight cycle in a random network
Authors:
Claire Mathieu,
David B. Wilson
Abstract:
The mean weight of a cycle in an edge-weighted graph is the sum of the cycle's edge weights divided by the cycle's length. We study the minimum mean-weight cycle on the complete graph on n vertices, with random i.i.d. edge weights drawn from an exponential distribution with mean 1. We show that the probability of the min mean weight being at most c/n tends to a limiting function of c which is anal…
▽ More
The mean weight of a cycle in an edge-weighted graph is the sum of the cycle's edge weights divided by the cycle's length. We study the minimum mean-weight cycle on the complete graph on n vertices, with random i.i.d. edge weights drawn from an exponential distribution with mean 1. We show that the probability of the min mean weight being at most c/n tends to a limiting function of c which is analytic for c<=1/e, discontinuous at c=1/e, and equal to 1 for c>1/e. We further show that if the min mean weight is <=1/(en), then the length of the relevant cycle is Theta_p(1) (i.e., it has a limiting probability distribution which does not scale with n), but that if the min mean weight is >1/(en), then the relevant cycle almost always has mean weight (1+o(1))/(en) and length at least (2/pi^2-o(1)) log^2 n log log n.
△ Less
Submitted 5 July, 2013; v1 submitted 18 January, 2012;
originally announced January 2012.
-
Maximum Matching in Semi-Streaming with Few Passes
Authors:
Christian Konrad,
Frédéric Magniez,
Claire Mathieu
Abstract:
In the semi-streaming model, an algorithm receives a stream of edges of a graph in arbitrary order and uses a memory of size $O(n \mbox{ polylog } n)$, where $n$ is the number of vertices of a graph. In this work, we present semi-streaming algorithms that perform one or two passes over the input stream for maximum matching with no restrictions on the input graph, and for the important special case…
▽ More
In the semi-streaming model, an algorithm receives a stream of edges of a graph in arbitrary order and uses a memory of size $O(n \mbox{ polylog } n)$, where $n$ is the number of vertices of a graph. In this work, we present semi-streaming algorithms that perform one or two passes over the input stream for maximum matching with no restrictions on the input graph, and for the important special case of bipartite graphs that we refer to as maximum bipartite matching (MBM). The Greedy matching algorithm performs one pass over the input and outputs a $1/2$ approximation. Whether there is a better one-pass algorithm has been an open question since the appearance of the first paper on streaming algorithms for matching problems in 2005 [Feigenbaum et al., SODA 2005]. We make the following progress on this problem:
In the one-pass setting, we show that there is a deterministic semi-streaming algorithm for MBM with expected approximation factor $1/2+0.005$, assuming that edges arrive one by one in (uniform) random order. We extend this algorithm to general graphs, and we obtain a $1/2+0.003$ approximation.
In the two-pass setting, we do not require the random arrival order assumption (the edge stream is in arbitrary order). We present a simple randomized two-pass semi-streaming algorithm for MBM with expected approximation factor $1/2 + 0.019$. Furthermore, we discuss a more involved deterministic two-pass semi-streaming algorithm for MBM with approximation factor $1/2 + 0.019$ and a generalization of this algorithm to general graphs with approximation factor $1/2 + 0.0071$.
△ Less
Submitted 10 April, 2014; v1 submitted 1 December, 2011;
originally announced December 2011.
-
An efficient polynomial-time approximation scheme for Steiner forest in planar graphs
Authors:
David Eisenstat,
Philip Klein,
Claire Mathieu
Abstract:
We give an $O(n \log^3 n)$ approximation scheme for Steiner forest in planar graphs, improving on the previous approximation scheme for this problem, which runs in $O(n^{f(ε)})$ time.
We give an $O(n \log^3 n)$ approximation scheme for Steiner forest in planar graphs, improving on the previous approximation scheme for this problem, which runs in $O(n^{f(ε)})$ time.
△ Less
Submitted 25 October, 2011; v1 submitted 6 October, 2011;
originally announced October 2011.