Topic
Greedy algorithm
About: Greedy algorithm is a research topic. Over the lifetime, 15347 publications have been published within this topic receiving 393945 citations.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: In this paper, the problem of finding the candidate that minimizes the residual is modeled as a combinatoric tree search problem and the greedy search strategy is a good fit for solving this problem.
Abstract: In this paper, we propose an algorithm referred to as multipath matching pursuit (MMP) that investigates multiple promising candidates to recover sparse signals from compressed measurements. Our method is inspired by the fact that the problem to find the candidate that minimizes the residual is readily modeled as a combinatoric tree search problem and the greedy search strategy is a good fit for solving this problem. In the empirical results as well as the restricted isometry property-based performance guarantee, we show that the proposed MMP algorithm is effective in reconstructing original sparse signals for both noiseless and noisy scenarios.
162 citations
•
TL;DR: In this article, the authors explore how to avoid the time bottleneck for randomized rounding algorithms for packing and covering linear programs (either mixed integer linear programs or linear programs with no negative coefficients).
Abstract: Randomized rounding is a standard method, based on the probabilistic method, for designing combinatorial approximation algorithms. In Raghavan's seminal paper introducing the method (1988), he writes: "The time taken to solve the linear program relaxations of the integer programs dominates the net running time theoretically (and, most likely, in practice as well)."
This paper explores how this bottleneck can be avoided for randomized rounding algorithms for packing and covering problems (linear programs, or mixed integer linear programs, having no negative coefficients). The resulting algorithms are greedy algorithms, and are faster and simpler to implement than standard randomized-rounding algorithms.
This approach can also be used to understand Lagrangian-relaxation algorithms for packing/covering linear programs: such algorithms can be viewed as as (derandomized) randomized-rounding schemes.
162 citations
••
19 May 2008TL;DR: This work considers an amplify-and-forward scheme for two-way relaying over OFDM, in which two nodes wish to exchange information via a relay, and performs power allocation for the relay and both information-exchanging nodes as well as tone permutation at the relay, to maximize the sum capacity.
Abstract: We consider an amplify-and-forward scheme for two-way relaying over OFDM, in which two nodes wish to exchange information via a relay. Assuming full channel knowledge, we perform power allocation for the relay and both information-exchanging nodes, as well as tone permutation at the relay, so as to maximize the sum capacity. A dual decomposition technique is employed for power allocation, while a greedy approach is proposed for tone permutation. In particular, we explore an interesting water-filling behavior displayed by this power allocation solution. Numerical results demonstrate that substantial capacity gains are achieved by implementing the two proposed solutions, either individually or successively.
162 citations
••
TL;DR: In this paper, the authors exploit the multi-antenna non-orthogonal multiple access (NOMA) technique for multiuser computation offloading, such that different users can simultaneously offload their computation tasks to the multiple antenna BS over the same time/frequency resources, and the BS can employ successive interference cancellation (SIC) to efficiently decode all users' offloaded tasks for remote execution.
Abstract: This paper studies a multiuser mobile edge computing (MEC) system in which one base station (BS) serves multiple users with intensive computation tasks. We exploit the multi-antenna non-orthogonal multiple access (NOMA) technique for multiuser computation offloading, such that different users can simultaneously offload their computation tasks to the multi-antenna BS over the same time/frequency resources, and the BS can employ successive interference cancelation (SIC) to efficiently decode all users’ offloaded tasks for remote execution. In particular, we pursue energy-efficient MEC designs by considering two cases with partial and binary offloading, respectively. We aim to minimize the weighted sum-energy consumption at all users subject to their computation latency constraints, by jointly optimizing the communication and computation resource allocation as well as the BS’s decoding order for SIC. For the case with partial offloading, the weighted sum-energy minimization is a convex optimization problem, for which an efficient algorithm based on the Lagrange duality method is presented to obtain the globally optimal solution. For the case with binary offloading, the weighted sum-energy minimization corresponds to a mixed Boolean convex optimization problem that is generally more difficult to be solved. We first use the branch-and-bound (BnB) method to obtain the globally optimal solution and then develop two low-complexity algorithms based on the greedy method and the convex relaxation, respectively, to find suboptimal solutions with high quality in practice. Via numerical results, it is shown that the proposed NOMA-based computation offloading design significantly improves the energy efficiency of the multiuser MEC system as compared to other benchmark schemes. It is also shown that for the case with binary offloading, the proposed greedy method performs close to the optimal BnB-based solution, and the convex relaxation-based solution achieves a suboptimal performance but with lower implementation complexity.
162 citations
••
TL;DR: Three algorithms are presented: a constructive algorithm, a randomized greedy algorithm and a very simple tabu search procedure used in a Branch and Cut procedure that successfully solved to optimality large CVRP instances.
162 citations