ar X iv : 1 70 8 . 07 78 6 v 1 [ cs . D S ] 2 5 A ug 2 01 7 Efficient Adaptive Implementation of the Serial Schedule Generation Scheme using Preprocessing and Bloom Filters
نویسنده
چکیده
The majority of scheduling metaheuristics use indirect representation of solutions as a way to efficiently explore the search space. Thus, a crucial part of such metaheuristics is a “schedule generation scheme” – procedure translating the indirect solution representation into a schedule. Schedule generation scheme is used every time a new candidate solution needs to be evaluated. Being relatively slow, it eats up most of the running time of the metaheuristic and, thus, its speed plays significant role in performance of the metaheuristic. Despite its importance, little attention has been paid in the literature to efficient implementation of schedule generation schemes. We give detailed description of serial schedule generation scheme, including new improvements, and propose a new approach for speeding it up, by using Bloom filters. The results are further strengthened by automated control of parameters. Finally, we employ online algorithm selection to dynamically choose which of the two implementations to use. This hybrid approach significantly outperforms conventional implementation on a wide range of instances.
منابع مشابه
Efficient Adaptive Implementation of the Serial Schedule Generation Scheme Using Preprocessing and Bloom Filters
The majority of scheduling metaheuristics use indirect representation of solutions as a way to efficiently explore the search space. Thus, a crucial part of such metaheuristics is a “schedule generation scheme” – procedure translating the indirect solution representation into a schedule. Schedule generation scheme is used every time a new candidate solution needs to be evaluated. Being relative...
متن کاملar X iv : 0 70 8 . 23 95 v 1 [ cs . C R ] 1 7 A ug 2 00 7 Key Agreement and Authentication Schemes Using Non - Commutative Semigroups
We give a new two-pass authentication scheme, which is a generalisation of an authentication scheme of Sibert-Dehornoy-Girault based on the Diffie-Hellman conjugacy problem. Compared to the above scheme, for some parameters it is more efficient with respect to multiplications. We sketch a proof that our authentication scheme is secure.
متن کاملar X iv : 0 80 8 . 01 63 v 1 [ cs . D S ] 1 A ug 2 00 8 Twice - Ramanujan Sparsifiers ∗
We prove that for every d > 1 and every undirected, weighted graph G = (V, E), there exists a weighted graph H with at most ⌈d |V |⌉ edges such that for every x ∈ IR , 1 ≤ x T LHx x LGx ≤ d + 1 + 2 √ d d + 1 − 2 √ d , where LG and LH are the Laplacian matrices of G and H , respectively.
متن کاملBoolean Unateness Testing with $\widetilde{O}(n^{3/4})$ Adaptive Queries
We give an adaptive algorithm which tests whether an unknown Boolean function f : {0, 1} → {0, 1} is unate, i.e. every variable of f is either non-decreasing or non-increasing, or ε-far from unate with one-sided error using Õ(n/ε) queries. This improves on the best adaptive O(n/ε)-query algorithm from Baleshzar, Chakrabarty, Pallavoor, Raskhodnikova and Seshadhri [BCP17b] when 1/ε n. Combined w...
متن کاملApproximate Generalized Matching: $f$-Factors and $f$-Edge Covers
In this paper we present linear time approximation schemes for several generalized matching problems on nonbipartite graphs. Our results include O (m)-time algorithms for (1 − )maximum weight f -factor and (1+ )-approximate minimum weight f -edge cover. As a byproduct, we also obtain direct algorithms for the exact cardinality versions of these problems running in O(m √ f(V )) time. The technic...
متن کامل