-
Analytical Investigation of Two Benchmark Resource Allocation Algorithms for LTE-V2V
Authors:
A. Bazzi,
A. Zanella,
G. Cecchini,
B. M. Masini
Abstract:
Short-range wireless technologies will enable vehicles to communicate and coordinate their actions, thus improving people's safety and traffic efficiency. Whereas IEEE 802.11p (and related standards) had been the only practical solution for years, in 2016 a new option was introduced with Release 14 of long term evolution (LTE), which includes new features to enable direct vehicle-to-vehicle (V2V)…
▽ More
Short-range wireless technologies will enable vehicles to communicate and coordinate their actions, thus improving people's safety and traffic efficiency. Whereas IEEE 802.11p (and related standards) had been the only practical solution for years, in 2016 a new option was introduced with Release 14 of long term evolution (LTE), which includes new features to enable direct vehicle-to-vehicle (V2V) communications. LTE-V2V promises a more efficient use of the channel compared to IEEE 802.11p thanks to an improved PHY layer and the use of orthogonal resources at the MAC layer. In LTE-V2V, a key role is played by the resource allocation algorithm and increasing efforts are being made to design new solutions to optimize the spatial reuse.In this context, an important aspect still little studied, is therefore that of identifying references that allow: 1) to have a perception of the space in which the resource allocation algorithms move; and 2) to verify the performance of new proposals. In this work, we focus on a highway scenario and identify two algorithms to be used as a minimum and maximum reference in terms of the packet reception probability (PRP). The PRP is derived as a function of various parameters that describe the scenario and settings, from the application to the physical layer. Results, obtained both in a simplified Poisson point process scenario and with realistic traffic traces, show that the PRP varies considerably with different algorithms and that there is room for the improvement of current solutions.
△ Less
Submitted 14 July, 2023;
originally announced July 2023.
-
Multi-Channel Operation for the Release 2 of ETSI Cooperative Intelligent Transport Systems
Authors:
Alessandro Bazzi,
Miguel Sepulcre,
Quentin Delooz,
Andreas Festag,
Jonas Vogt,
Horst Wieker,
Friedbert Berens,
Paul Spaanderman
Abstract:
Vehicles and road infrastructure are starting to be equipped with vehicle-to-everything (V2X) communication solutions to increase road safety and provide new services to drivers and passengers. In Europe, the deployment is based on a set of Release 1 standards developed by ETSI to support basic use cases for cooperative intelligent transport systems (C-ITS). For them, the capacity of a single 10 M…
▽ More
Vehicles and road infrastructure are starting to be equipped with vehicle-to-everything (V2X) communication solutions to increase road safety and provide new services to drivers and passengers. In Europe, the deployment is based on a set of Release 1 standards developed by ETSI to support basic use cases for cooperative intelligent transport systems (C-ITS). For them, the capacity of a single 10 MHz channel in the ITS band at 5.9 GHz is considered sufficient. At the same time, the ITS stakeholders are working towards several advanced use cases, which imply a significant increment of data traffic and the need for multiple channels. To address this issue, ETSI has recently standardized a new multi-channel operation (MCO) concept for flexible, efficient, and future-proof use of multiple channels. This new concept is defined in a set of new specifications that represent the foundation for the future releases of C-ITS standards. The present paper provides a comprehensive review of the new set of specifications, describing the main entities extending the C-ITS architecture at the different layers of the protocol stack, In addition, the paper provides representative examples that describe how these MCO standards will be used in the future and discusses some of the main open issues arising. The review and analysis of this paper facilitate the understanding and motivation of the new set of Release 2 ETSI specifications for MCO and the identification of new research opportunities.
△ Less
Submitted 31 May, 2023;
originally announced May 2023.
-
Deep Learning-based Estimation for Multitarget Radar Detection
Authors:
Mamady Delamou,
Ahmad Bazzi,
Marwa Chafii,
El Mehdi Amhoud
Abstract:
Target detection and recognition is a very challenging task in a wireless environment where a multitude of objects are located, whether to effectively determine their positions or to identify them and predict their moves. In this work, we propose a new method based on a convolutional neural network (CNN) to estimate the range and velocity of moving targets directly from the range-Doppler map of th…
▽ More
Target detection and recognition is a very challenging task in a wireless environment where a multitude of objects are located, whether to effectively determine their positions or to identify them and predict their moves. In this work, we propose a new method based on a convolutional neural network (CNN) to estimate the range and velocity of moving targets directly from the range-Doppler map of the detected signals. We compare the obtained results to the two dimensional (2D) periodogram, and to the similar state of the art methods, 2DResFreq and VGG-19 network and show that the estimation process performed with our model provides better estimation accuracy of range and velocity index in different signal to noise ratio (SNR) regimes along with a reduced prediction time. Afterwards, we assess the performance of our proposed algorithm using the peak signal to noise ratio (PSNR) which is a relevant metric to analyse the quality of an output image obtained from compression or noise reduction. Compared to the 2D-periodogram, 2DResFreq and VGG-19, we gain 33 dB, 21 dB and 10 dB, respectively, in terms of PSNR when SNR = 30 dB.
△ Less
Submitted 5 May, 2023;
originally announced May 2023.
-
Breaking the $f+1$ Barrier: Executing Payment Transactions in Parallel with Less than $f+1$ Validations
Authors:
Rida A. Bazzi,
Sara Tucci-Piergiovanni
Abstract:
We consider the problem of supporting payment transactions in an asynchronous system in which up to $f$ validators are subject to Byzantine failures under the control of an adaptive adversary. It was shown that this problem can be solved without consensus by using byzantine quorum systems (requiring at least $2f+1$ validations per transaction in asynchronous systems). We show that it is possible t…
▽ More
We consider the problem of supporting payment transactions in an asynchronous system in which up to $f$ validators are subject to Byzantine failures under the control of an adaptive adversary. It was shown that this problem can be solved without consensus by using byzantine quorum systems (requiring at least $2f+1$ validations per transaction in asynchronous systems). We show that it is possible to validate transactions in parallel with less than $f$ validations per transaction if each transaction spends no more that a small fraction of a balance. Our solution relies on a novel quorum system that we introduce in this paper and that we call $(k_1,k_2)$-quorum systems. In the presence of a non-adaptive adversary, these systems can be used to allow up to $k_1$ transactions to be validated concurrently and asynchronously but prevent more than $k_2$ transactions from being validated. If the adversary is adaptive, these systems can be used to allow $k_1$ transaction to be validated and prevent more than $k'_2 > k_2$ transactions from being validated, the difference $k'_2-k_2$ being dependent on the quorum system's {\em validation slack}, which we define in this paper. Using $(k_1,k_2)$-quorum systems, a payer can execute multiple partial spending transactions to spend a portion of its initial balance with less than full quorum validation (less than $f$ validations per transaction) then reclaim any remaining funds using one fully validated transaction, which we call a {\em settlement} transaction.
△ Less
Submitted 24 January, 2023;
originally announced January 2023.
-
Adaptive Repetitions Strategies in IEEE 802.11bd
Authors:
Wu Zhuofei,
Stefania Bartoletti,
Vincent Martinez,
Alessandro Bazzi
Abstract:
A new backward compatible WiFi amendment is under development by the IEEE bd Task Group towards the so-called IEEE 802.11bd, which includes the possibility to transmit up to three repetitions of the same packet. This feature increases time diversity and enables the use of maximum ratio combining (MRC) at the receiver to improve the probability of correct decoding. In this work, we first investigat…
▽ More
A new backward compatible WiFi amendment is under development by the IEEE bd Task Group towards the so-called IEEE 802.11bd, which includes the possibility to transmit up to three repetitions of the same packet. This feature increases time diversity and enables the use of maximum ratio combining (MRC) at the receiver to improve the probability of correct decoding. In this work, we first investigate the packet repetition feature and analyze how it looses its efficacy increasing the traffic as an higher number of transmissions may augment the channel load and collision probability. Then, we propose two strategies for adaptively selecting the number of transmissions leveraging on an adapted version of the channel busy ratio (CBR), which is measured at the transmitter and is an indicator of the channel load. The proposed strategies are validated through network-level simulations that account for both the acquisition and decoding processes. Results show that the proposed strategies ensure that devices use optimal settings under variable traffic conditions.
△ Less
Submitted 14 July, 2022;
originally announced July 2022.
-
A Methodology for Abstracting the Physical Layer of Direct V2X Communications Technologies
Authors:
Wu Zhuofei,
Stefania Bartoletti,
Vincent Martinez,
Alessandro Bazzi
Abstract:
Recent advancements in V2X communications have greatly increased the flexibility of the physical and medium access control (MAC) layers. This increases the complexity when investigating the system from a network perspective to evaluate the performance of the supported applications. Such flexibility needs in fact to be taken into account through a cross-layer approach, which might lead to challengi…
▽ More
Recent advancements in V2X communications have greatly increased the flexibility of the physical and medium access control (MAC) layers. This increases the complexity when investigating the system from a network perspective to evaluate the performance of the supported applications. Such flexibility needs in fact to be taken into account through a cross-layer approach, which might lead to challenging evaluation processes. As an accurate simulation of the signals appears unfeasible, a typical solution is to rely on simple models for incorporating the physical layer of the supported technologies, based on off-line measurements or accurate link-level simulations. Such data is however limited to a subset of possible configurations and extending them to others is costly when not even impossible. The goal of this paper is to develop a new approach for modelling the physical layer of vehicle-to-everything (V2X) communications that can be extended to a wide range of configurations without leading to extensive measurement or simulation campaign at the link layer. In particular, given a scenario and starting from results in terms of packet error rate (PER) vs. signal-to-interference-plus-noise ratio (SINR) related to a subset of possible configurations, we derive one parameter, called implementation loss, that is then used to evaluate the network performance under any configuration in the same scenario. The proposed methodology, leading to a good trade-off among complexity, generality, and accuracy of the performance evaluation process, has been validated through extensive simulations with both IEEE 802.11p and LTE-V2X sidelink technologies in various scenarios.
△ Less
Submitted 24 October, 2022; v1 submitted 31 March, 2022;
originally announced March 2022.
-
Performance Analysis of IEEE 802.11p Preamble Insertion in C-V2X Sidelink Signals for Co-Channel Coexistence
Authors:
Alessandro Bazzi,
Stefania Bartoletti,
Alberto Zanella,
Vincent Martinez
Abstract:
Spectrum scarcity is one of the main challenges of future wireless technologies. When looking at vehicle-to-everything (V2X), this is amplified as spectrum sharing could impact road safety and traffic efficiency. It is therefore of particular importance to study solutions that allow the coexistence, in the same geographical area and in the same channels, of what are today the main V2X access techn…
▽ More
Spectrum scarcity is one of the main challenges of future wireless technologies. When looking at vehicle-to-everything (V2X), this is amplified as spectrum sharing could impact road safety and traffic efficiency. It is therefore of particular importance to study solutions that allow the coexistence, in the same geographical area and in the same channels, of what are today the main V2X access technologies, namely IEEE 802.11p and sidelink LTE-V2X Mode 4. In this work, in addition to investigating the impact of the reciprocal interference, which we demonstrate to have a strong impact especially on the first and in congested channel conditions, a mitigation solution is extensively studied, which is based on the insertion of the IEEE 802.11p preamble at the beginning of the LTE-V2X sidelink transmission. The proposal, which is also under discussion within the standardization bodies, requires no modifications to the IEEE 802.11p protocol stack and minor changes to LTE-V2X sidelink. This solution is directly applicable to upcoming IEEE 802.11bd and extendable to NR-V2X sidelink. The paper shows, through analysis and simulations in free-flow and dense scenarios, that the proposal allows for a mitigation of collisions caused by co-channel coexistence under low to high-load channel conditions and that the improvement is also granted in congested cases when combined with additional countermeasures. Regarding the latter aspect, in particular, different approaches are compared, demonstrating that acting on the congestion control mechanisms is a simple but effective solution.
△ Less
Submitted 6 April, 2022; v1 submitted 18 January, 2022;
originally announced January 2022.
-
Optimizations for Hardware-in-the-Loop-Based V2X Validation Platforms
Authors:
Babak Mafakheri,
Pierpaolo Gonnella,
Alessandro Bazzi,
Barbara Mavi Masini,
Michele Caggiano,
Roberto Verdone
Abstract:
Connectivity and automation are increasingly getting importance in the automotive industry, which is observing a radical change from vehicles driven by humans to fully automated and remotely controlled ones. The test and validation of all the related devices and applications is thus becoming a crucial aspect; this is raising the interest on hardware-in-the-loop (HiL) platforms which reduce the nee…
▽ More
Connectivity and automation are increasingly getting importance in the automotive industry, which is observing a radical change from vehicles driven by humans to fully automated and remotely controlled ones. The test and validation of all the related devices and applications is thus becoming a crucial aspect; this is raising the interest on hardware-in-the-loop (HiL) platforms which reduce the need for complicated field trials, thus limiting the costs and delay added to the process. With reference to the test and validation of vehicle-to-everything (V2X) communications aspects, and assuming either sidelink LTE/5GV2X or IEEE 802.11p/bd technologies, in this work we focus on the real-time HiL simulation of the information exchanged by one vehicle under test and the surrounding, simulated, objects. Such exchange must be reproduced in a time-efficient manner, with elaborations done fast enough to allow testing the applications in real-time. More precisely, we discuss the simulation of nonideal positioning and channel propagation taking into account current impairments. We also provide details on optimization solutions that allowed us to trade-off minor loss in accuracy with a significant reduction of the computation time burden, reaching up to more than one order of magnitude speed increase in our experiments.
△ Less
Submitted 26 April, 2021;
originally announced May 2021.
-
Co-channel Coexistence: Let ITS-G5 and Sidelink C-V2X Make Peace
Authors:
Alessandro Bazzi,
Alberto Zanella,
Ioannis Sarris,
Vincent Martinez
Abstract:
In the last few years, two technologies have been developed to enable direct exchange of information between vehicles. These technologies, currently seen as alternatives, are ITS-G5, as commonly referred in Europe, and sidelink LTE-vehicle-to-everything (LTE-V2X) (one of the solutions of the so-called cellular-V2X, C-V2X). For this reason, the attention has been mostly concentrated on comparing th…
▽ More
In the last few years, two technologies have been developed to enable direct exchange of information between vehicles. These technologies, currently seen as alternatives, are ITS-G5, as commonly referred in Europe, and sidelink LTE-vehicle-to-everything (LTE-V2X) (one of the solutions of the so-called cellular-V2X, C-V2X). For this reason, the attention has been mostly concentrated on comparing them and remarking their strengths and weaknesses to motivate a choice. Differently, in this work we focus on a scenario where both are used in the same area and using the same frequency channels, without the assistance from any infrastructure. Our results show that under co-channel coexistence the range of ITS-G5 is severely degraded, while impact on LTE-V2X is marginal. Additionally, a mitigation method where the CAM data generation is constrained to periodical intervals is shown to reduce the impact of co-channel coexistence, with less degradation on ITS-G5 performance and even improvement for LTE-V2X.
△ Less
Submitted 20 March, 2020;
originally announced March 2020.
-
Congestion Control Mechanisms in IEEE 802.11p and Sidelink C-V2X
Authors:
Alessandro Bazzi
Abstract:
Connected vehicles are expected to play a major role in the next future to improve safety and traffic efficiency on the road and short-range technologies have been defined to enable the direct exchange of information. To this aim, two solutions are currently the subject of a debate that goes beyond the technician, i.e., IEEE 802.11p and sidelink cellular-vehicle-to-anything (C-V2X). Tested and mat…
▽ More
Connected vehicles are expected to play a major role in the next future to improve safety and traffic efficiency on the road and short-range technologies have been defined to enable the direct exchange of information. To this aim, two solutions are currently the subject of a debate that goes beyond the technician, i.e., IEEE 802.11p and sidelink cellular-vehicle-to-anything (C-V2X). Tested and mature for deployment the first, possibly more efficient the second. In both cases, one of the main aspects is the management of channel congestions, which can cause serious packet losses and have a critical impact on the reliability of applications. Congestions can be managed through different approaches, including the control of transmission power, packet generation frequency, and the adopted modulation and coding scheme. Congestion management has been well studied in IEEE 802.11p, with consolidated algorithms included in the standards, whereas it appears somehow as a new topic looking at C-V2X. In this work, a review of the main congestion control mechanisms and a discussion of their applicability and efficiency in the two technologies is provided. This topic is addressed without focusing on specific algorithms and with the aim to provide general guidelines as a starting point for new proposals.
△ Less
Submitted 23 January, 2020;
originally announced January 2020.
-
A Hardware-in-the-Loop Evaluation of the Impact of the V2X Channel on the Traffic-Safety Versus Efficiency Trade-offs
Authors:
Alessandro Bazzi,
Thomas Blazek,
Michele Menarini,
Barbara M. Masini,
Alberto Zanella,
Christoph Mecklenbrauker,
Golsa Ghiaasi
Abstract:
Vehicles are increasingly becoming connected and short-range wireless communications promise to introduce a radical change in the drivers' behaviors. Among the main use cases, the intersection management is surely one of those that could mostly impact on both traffic safety and efficiency. In this work, we consider an intersection collision warning application and exploit an hardware-in-the-loop (…
▽ More
Vehicles are increasingly becoming connected and short-range wireless communications promise to introduce a radical change in the drivers' behaviors. Among the main use cases, the intersection management is surely one of those that could mostly impact on both traffic safety and efficiency. In this work, we consider an intersection collision warning application and exploit an hardware-in-the-loop (HIL) platform to verify the impact on the risk of accidents as well as the average time to travel a given distance. Besides including real ITS-G5 compliant message exchanges, the platform also includes a channel emulator with real signals. Results show that the risk of collisions can be drastically reduced, with an overall trade-off between safety and traffic efficiency. At the same time, it is shown that the presence of real channel conditions cannot guarantee the same condition of zero-risk as with ideal channel propagation, remarking the importance of channel conditions and signal processing.
△ Less
Submitted 22 January, 2020;
originally announced January 2020.
-
Study of the Impact of PHY and MAC Parameters in 3GPP C-V2V Mode 4
Authors:
Alessandro Bazzi,
Giammarco Cecchini,
Barbara M. Masini,
Alberto Zanella
Abstract:
In the latest years, 3GPP has added short range cellular-vehicle-to-anything (C-V2X) to the features of LTE and 5G in order to make vehicles, roadside devices, and vulnerable users directly exchange information using the same chipset as for classical long range connections. C-V2X is based on the use of advanced physical layer techniques and orthogonal resources, and one of the main aspects affecti…
▽ More
In the latest years, 3GPP has added short range cellular-vehicle-to-anything (C-V2X) to the features of LTE and 5G in order to make vehicles, roadside devices, and vulnerable users directly exchange information using the same chipset as for classical long range connections. C-V2X is based on the use of advanced physical layer techniques and orthogonal resources, and one of the main aspects affecting its performance is the way resources are allocated. Allocations can be either managed by the network or in a distributed way, directly by the nodes. The latter case, called Mode 4, is defined to manage those situations where the network cannot be involved in the scheduling process, for example due to a lack of coverage, but could also be adopted in order to reduce the processing burden of eNodeB. An algorithm, defined in the standards, makes nodes sense the medium and identify the best time-frequency combination to allocate their messages. Focusing on C-V2V Mode 4, in this work we analyze the parameters of the algorithm designed by 3GPP and their impact on the system performance. Through simulations in different large scale scenarios, we show that modifying some parameters have negligible effect, that the proper choice of others can indeed improve the quality of service, and that a group of parameters allows to trade-off reliability with update delay. The provided results can also be exploited to guide future work.
△ Less
Submitted 28 November, 2018; v1 submitted 27 July, 2018;
originally announced July 2018.
-
An Efficient Streaming Algorithm for the Submodular Cover Problem
Authors:
Ashkan Norouzi-Fard,
Abbas Bazzi,
Marwa El Halabi,
Ilija Bogunovic,
Ya-** Hsieh,
Volkan Cevher
Abstract:
We initiate the study of the classical Submodular Cover (SC) problem in the data streaming model which we refer to as the Streaming Submodular Cover (SSC). We show that any single pass streaming algorithm using sublinear memory in the size of the stream will fail to provide any non-trivial approximation guarantees for SSC. Hence, we consider a relaxed version of SSC, where we only seek to find a p…
▽ More
We initiate the study of the classical Submodular Cover (SC) problem in the data streaming model which we refer to as the Streaming Submodular Cover (SSC). We show that any single pass streaming algorithm using sublinear memory in the size of the stream will fail to provide any non-trivial approximation guarantees for SSC. Hence, we consider a relaxed version of SSC, where we only seek to find a partial cover.
We design the first Efficient bicriteria Submodular Cover Streaming (ESC-Streaming) algorithm for this problem, and provide theoretical guarantees for its performance supported by numerical evidence. Our algorithm finds solutions that are competitive with the near-optimal offline greedy algorithm despite requiring only a single pass over the data stream. In our numerical experiments, we evaluate the performance of ESC-Streaming on active set selection and large-scale graph cover problems.
△ Less
Submitted 25 November, 2016;
originally announced November 2016.
-
Small Extended Formulation for Knapsack Cover Inequalities from Monotone Circuits
Authors:
Abbas Bazzi,
Samuel Fiorini,
Sangxia Huang,
Ola Svensson
Abstract:
Initially developed for the min-knapsack problem, the knapsack cover inequalities are used in the current best relaxations for numerous combinatorial optimization problems of covering type. In spite of their widespread use, these inequalities yield linear programming (LP) relaxations of exponential size, over which it is not known how to optimize exactly in polynomial time. In this paper we addres…
▽ More
Initially developed for the min-knapsack problem, the knapsack cover inequalities are used in the current best relaxations for numerous combinatorial optimization problems of covering type. In spite of their widespread use, these inequalities yield linear programming (LP) relaxations of exponential size, over which it is not known how to optimize exactly in polynomial time. In this paper we address this issue and obtain LP relaxations of quasi-polynomial size that are at least as strong as that given by the knapsack cover inequalities.
For the min-knapsack cover problem, our main result can be stated formally as follows: for any $\varepsilon >0$, there is a $(1/\varepsilon)^{O(1)}n^{O(\log n)}$-size LP relaxation with an integrality gap of at most $2+\varepsilon$, where $n$ is the number of items. Prior to this work, there was no known relaxation of subexponential size with a constant upper bound on the integrality gap.
Our construction is inspired by a connection between extended formulations and monotone circuit complexity via Karchmer-Wigderson games. In particular, our LP is based on $O(\log^2 n)$-depth monotone circuits with fan-in~$2$ for evaluating weighted threshold functions with $n$ inputs, as constructed by Beimel and Weinreb. We believe that a further understanding of this connection may lead to more positive results complementing the numerous lower bounds recently proved for extended formulations.
△ Less
Submitted 18 November, 2016; v1 submitted 13 September, 2016;
originally announced September 2016.
-
Towards Tight Lower Bounds for Scheduling Problems
Authors:
Abbas Bazzi,
Ashkan Norouzi-Fard
Abstract:
We show a close connection between structural hardness for $k$-partite graphs and tight inapproximability results for scheduling problems with precedence constraints. Assuming a natural but nontrivial generalisation of the bipartite structural hardness result of Bansal and Khot, we obtain a hardness of $2-ε$ for the problem of minimising the makespan for scheduling precedence-constrained jobs with…
▽ More
We show a close connection between structural hardness for $k$-partite graphs and tight inapproximability results for scheduling problems with precedence constraints. Assuming a natural but nontrivial generalisation of the bipartite structural hardness result of Bansal and Khot, we obtain a hardness of $2-ε$ for the problem of minimising the makespan for scheduling precedence-constrained jobs with preemption on identical parallel machines. This matches the best approximation guarantee for this problem. Assuming the same hypothesis, we also obtain a super constant inapproximability result for the problem of scheduling precedence-constrained jobs on related parallel machines, making progress towards settling an open question in both lists of ten open questions by Williamson and Shmoys, and by Schuurman and Woeginger.
The study of structural hardness of $k$-partite graphs is of independent interest, as it captures the intrinsic hardness for a large family of scheduling problems. Other than the ones already mentioned, this generalisation also implies tight inapproximability to the problem of minimising the weighted completion time for precedence-constrained jobs on a single machine, and the problem of minimising the makespan of precedence-constrained jobs on identical parallel machine, and hence unifying the results of Bansal and Khot, and Svensson, respectively.
△ Less
Submitted 7 July, 2015;
originally announced July 2015.
-
A Formal Study on Backward Compatible Dynamic Software Updates
Authors:
Jun Shen,
Rida A. Bazzi
Abstract:
We study the dynamic software update problem for programs interacting with an environment that is not necessarily updated. We argue that such updates should be backward compatible. We propose a general definition of backward compatibility and cases of backward compatible program update. Based on our detailed study of real world program evolution, we propose classes of backward compatible update fo…
▽ More
We study the dynamic software update problem for programs interacting with an environment that is not necessarily updated. We argue that such updates should be backward compatible. We propose a general definition of backward compatibility and cases of backward compatible program update. Based on our detailed study of real world program evolution, we propose classes of backward compatible update for interactive programs, which are included at an average of 32% of all studied program changes. The definitions of update classes are parameterized by our novel framework of program equivalence, which generalizes existing results on program equivalence to non-terminating executions. Our study of backward compatible updates is based on a typed extension of W language.
△ Less
Submitted 10 September, 2015; v1 submitted 24 March, 2015;
originally announced March 2015.
-
No Small Linear Program Approximates Vertex Cover within a Factor $2 - ε$
Authors:
Abbas Bazzi,
Samuel Fiorini,
Sebastian Pokutta,
Ola Svensson
Abstract:
The vertex cover problem is one of the most important and intensively studied combinatorial optimization problems. Khot and Regev (2003) proved that the problem is NP-hard to approximate within a factor $2 - ε$, assuming the Unique Games Conjecture (UGC). This is tight because the problem has an easy 2-approximation algorithm. Without resorting to the UGC, the best inapproximability result for the…
▽ More
The vertex cover problem is one of the most important and intensively studied combinatorial optimization problems. Khot and Regev (2003) proved that the problem is NP-hard to approximate within a factor $2 - ε$, assuming the Unique Games Conjecture (UGC). This is tight because the problem has an easy 2-approximation algorithm. Without resorting to the UGC, the best inapproximability result for the problem is due to Dinur and Safra (2002): vertex cover is NP-hard to approximate within a factor 1.3606. We prove the following unconditional result about linear programming (LP) relaxations of the problem: every LP relaxation that approximates vertex cover within a factor $2-ε$ has super-polynomially many inequalities. As a direct consequence of our methods, we also establish that LP relaxations (as well as SDP relaxations) that approximate the independent set problem within any constant factor have super-polynomial size.
△ Less
Submitted 26 November, 2015; v1 submitted 2 March, 2015;
originally announced March 2015.