Maximizing the number of unused bins
نویسندگان
چکیده
We analyze the approximation behavior of some of the best-known polynomial-time approximation algorithms for bin-packing under an approximation criterion, called differential ratio, informally the ratio (n − λ(I))/(n − β(I)), where n is the size of the input list, λ(I) is the size of the solution provided by an approximation algorithm and β(I) is the size of the optimal one. This measure has originally been introduced by Ausiello, D’Atri and Protasi and more recently revisited, in a more systematic way, by the first and the third authors of the present paper. Under the differential ratio, bin-packing has a natural formulation as the problem of maximizing the number of unused bins. We first show that two basic fit bin-packing algorithms, the first-fit and the best-fit, admit differential approximation ratios 1/2. Next, we show that slightly improved versions of them achieve ratios 2/3. Refining our analysis we show that the famous first-fit-decreasing and best-fit decreasing algorithms achieve differential approximation ratio 3/4. Finally, we show that first-fit-decreasing achieves asymptotic differential approximation ratio 7/9.
منابع مشابه
On-line bin-packing problem: maximizing the number of unused bins
In this paper, we study the on-line version of the bin-packing problem. We analyze the approximation behavior of an on-line bin-packing algorithm under an approximation criterion called differential ratio. We are interested in two types of results: the differential competitivity ratio guaranteed by the on-line algorithm and hardness results that account for the difficulty of the problem and for...
متن کاملOn-Line Maximizing the Number of Items Packed in Variable-Sized Bins
We study an on-line bin packing problem. A xed number n of bins, possibly of diierent sizes, are given. The items arrive on-line, and the goal is to pack as many items as possible. It is known that there exists a legal packing of the whole sequence in the n bins. We consider fair algorithms that reject an item, only if it does not t in the empty space of any bin. We show that the competitive ra...
متن کاملSecure FPGA Design by Filling Unused Spaces
Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...
متن کاملبررسی آلودگی های باکتریایی لوازم آرایشی مصرفی در اطراف چشم در قبل و پس از مصرف در ایران
Background: The possibility that cosmetic products may act as vehicles for pathogen transfer is a major health concern. The risk of this occurring is higher with cosmetics used around eyes, which could be responsible for a number of infectious diseases. This study was performed to evaluate the bacteriological quality of these products in Iran and also to study factors that predispose to bacteri...
متن کاملMedical Image Segmentation Based on Mutual Information Maximization
In this paper we propose a two-step mutual informationbased algorithm for medical image segmentation. In the first step, the image is structured into homogeneous regions, by maximizing the mutual information gain of the channel going from the histogram bins to the regions of the partitioned image. In the second step, the intensity bins of the histogram are clustered by minimizing the mutual inf...
متن کامل