
Christoph Dürr- Sorbonne University
Christoph Dürr
- Sorbonne University
About
101
Publications
11,092
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,180
Citations
Introduction
Skills and Expertise
Current institution
Publications
Publications (101)
We initiate the study of tree structures in the context of scenario-based robust optimization. Specifically, we study Binary Search Trees (BSTs) and Huffman coding, two fundamental techniques for efficiently managing and encoding data based on a known set of frequencies of keys. Given a number of distinct scenarios, each defined by a frequency dist...
In this work, we initiate the systemic study of decision-theoretic metrics in the design and analysis of algorithms with machine-learned predictions. We introduce approaches based on both deterministic measures such as distance-based evaluation, that help us quantify how close the algorithm is to an ideal solution, as well as stochastic measures th...
We initiate the study of tree structures in the context of scenario-based robust optimization. Specifically, we study Binary Search Trees (BSTs) and Huffman coding, two fundamental techniques for efficiently managing and encoding data based on a known set of frequencies of keys. Given $k$ different scenarios, each defined by a distinct frequency di...
The study of online algorithms with machine-learned predictions has gained considerable prominence in recent years. One of the common objectives in the design and analysis of such algorithms is to attain (Pareto) optimal tradeoffs between the consistency of the algorithm, i.e., its performance assuming perfect predictions, and its robustness, i.e.,...
Contract scheduling is a widely studied framework for designing real-time systems with interruptible capabilities. Previous work has showed that a prediction on the interruption time can help improve the performance of contract-based systems, however it has relied on a single prediction that is provided by a deterministic oracle. In this work, we i...
In search problems, a mobile searcher seeks to locate a target that hides in some unknown position of the environment. Such problems are typically considered to be of an on-line nature, in that the target’s position is unknown to the searcher, and the performance of a search strategy is usually analyzed by means of the standard framework of the com...
Given a hypergraph with uncertain node weights following known probability distributions, we study the problem of querying as few nodes as possible until the identity of a node with minimum weight can be determined for each hyperedge. Querying a node has a cost and reveals the precise weight of the node, drawn from the given probability distributio...
In the Multi-Level Aggregation Problem (MLAP ), requests for service arrive at the nodes of an edge-weighted rooted tree T. Each service is represented by a subtree X of T that contains its root. This subtree X serves all requests that are pending in the nodes of X, and the cost of this service is equal to the total weight of X. Each request also i...
In the bounded delay buffer management problem unit size packets arrive online to be sent over a network link. The objective is to maximize the total weight of packets sent before their deadline. In this paper we are interested in the two-valued variant of the problem, where every packet has either low (1) or high priority weight (α>1). We show tha...
We introduce a novel adversarial model for scheduling with explorable uncertainty. In this model, the processing time of a job can potentially be reduced (by an a priori unknown amount) by testing the job. Testing a job j takes one unit of time and may reduce its processing time from the given upper limit \(\bar{p}_j\) (which is the time taken to e...
We study the online maximum matching problem with recourse in a model in which the edges are associated with a known recourse parameter $k$. An online algorithm for this problem has to maintain a valid matching while edges of the underlying graph are presented one after the other. At any moment the algorithm can decide to include an edge into the m...
In the Multi-Level Aggregation Problem (MLAP), requests arrive at the nodes
of an edge-weighted tree T . A service is defined as a subtree X of T that
contains its root. This subtree X services all requests that are pending in the
nodes of X, and the cost of this service is equal to the total weight of X.
Each request also incurs waiting cost betwe...
In the bounded delay buffer management problem unit size packets arrive online to be sent over a network link. The objective is to maximize the total weight of packets sent before their deadline. In this paper we are interested in the two-valued variant of the problem, where every packet has either low (1) or high priority weight ($\alpha$ > 1). We...
Clique clustering is the problem of partitioning the vertices of a graph into disjoint clusters, where each cluster forms a clique in the graph, while optimizing some objective function. In online clustering, the input graph is given one vertex at a time, and any vertices that have previously been clustered together are not allowed to be separated....
The advice model of online computation captures the setting in which the online algorithm is given some partial information concerning the request sequence. This paradigm allows to establish tradeoffs between the amount of this additional information and the performance of the online algorithm. However, unlike real life in which advice is a recomme...
In this paper, we study the advice complexity of the online bin packing problem. In this well-studied setting, the online algorithm is supplemented with some additional information concerning the input. We improve upon both known upper and lower bounds of online algorithms for this problem. On the positive side, we first provide a relatively simple...
In search problems, a mobile searcher seeks to locate a target that hides in some unknown position of the environment. Such problems are typically considered to be of an on-line nature, in that the input is unknown to the searcher, and the performance of a search strategy is usually analyzed by means of the standard framework of the competitive rat...
This paper introduces a novel scheduling problem, where jobs occupy a triangular shape on the time line. This problem is motivated by scheduling jobs with different criticality levels. A measure is introduced, namely the binary tree ratio. It is shown that the greedy algorithm solves the problem to optimality when the binary tree ratio of the input...
Since a few years there is an increasing interest in minimizing the energy consumption of computing systems. However in a shared computing system, users want to optimize their experienced quality of service, at the price of a high energy consumption. In this work, we address the problem of optimizing and designing mechanisms for a linear combinatio...
We study the online maximum matching problem in a model in which the edges are associated with a known recourse parameter $k$. An online algorithm for this problem has to maintain a valid matching while edges of the underlying graph are presented one after the other. At any moment the algorithm can decide to include an edge into the matching or to...
We introduce a novel model for scheduling with explorable uncertainty. In this model, the processing time of a job can potentially be reduced (by an a priori unknown amount) by testing the job. Testing a job $j$ takes one unit of time and may reduce its processing time from the given upper limit $\bar{p}_j$ (which is the time taken to execute the j...
We consider a strategic game, where players submit jobs to a machine that executes all jobs in a way that minimizes energy while respecting the given deadlines. The energy consumption is then charged to the players in some way. Each player wants to minimize the sum of that charge and of their job's deadline multiplied by a priority weight. Two char...
We consider the classical scheduling problem on a single machine, on which we need to schedule sequentially n given jobs. Every job j has a processing time \(p_j\) and a priority weight \(w_j\), and for a given schedule a completion time \(C_j\). In this paper, we consider the problem of minimizing the objective value \(\sum _j w_j C_j^\beta \) for...
We study two optimization problems in a multiprocessor environment in the presence of set-up costs. The first problem involves multiple parallel searchers (e.g., robots) that must locate a target which lies in one of many concurrent rays, and at an unknown position from their common origin. Every time a searcher turns direction, it incurs a turn co...
We consider the problem of searching for a hidden target in an environment that consists of a set of concurrent rays. Every time the searcher turns direction, it incurs a fixed cost. The objective is to derive a search strategy for locating the target as efficiently as possible, and the performance of the strategy is evaluated by means of the well-...
In the Multi-Level Aggregation Problem (MLAP), requests arrive at the nodes of an edge-weighted tree T , and have to be served eventually. A service is defined as a subtree X of T that contains its root. This subtree X serves all requests that are pending in the nodes of X, and the cost of this service is equal to the total weight of X. Each reques...
Les nombreux problèmes algorithmiques de ce livre constituent à la fois une formation à la programmation et une préparation efficace aux compétitions (ACM/ICPC, Google Code Jam, Prologin, France-ioi, etc.) et entretiens d’embauche d'entreprises spécialisées en informatique (telles que Google ou Facebook).La variété des problèmes étudiés convient au...
While randomized online algorithms have access to a sequence of uniform random bits, deterministic online algorithms with advice have access to a sequence of \textit{advice bits}, i.e., bits that are set by an all powerful oracle prior to the processing of the request sequence. Advice bits are at least as helpful as random bits, but how helpful are...
We study the problem of searching for a hidden target in an environment that is modeled by
an edge-weighted graph. Most of the previous work on this problem considers the pathwise cost
formulation, in which the cost incurred by the searcher is the overall time to locate the target,
assuming that the searcher moves at unit speed. More recent work in...
We study the problem of searching for a hidden target in an environment that is modeled by an edge-weighted graph. A sequence of edges is chosen starting from a given root vertex such that each edge is adjacent to a previously chosen edge. This search paradigm, known as expanding search was recently introduced by Apern and Lidbetter [2013] for mode...
This paper introduces a novel scheduling problem, where jobs occupy a triangular shape on the time line. This problem is motivated by scheduling jobs with different criticality levels. A measure is introduced, namely the binary tree ratio. It is shown that the greedy algorithm solves the problem to optimality when the binary tree ratio of the input...
In this paper, we study the advice complexity of the online bin packing problem. In this well-studied setting, the online algorithm is supplemented with some additional information concerning the input. We improve upon both known upper and lower bounds of online algorithms for this problem. On the positive side, we first provide a relatively simple...
A clique clustering of a graph is a partitioning of its vertices into disjoint cliques. The quality of a clique clustering is measured by the total number of edges in its cliques. We consider the online variant of the clique clustering problem, where the vertices of the input graph arrive one at a time. At each step, the newly arrived vertex forms...
We consider a strategic game, where players submit jobs to a machine that
executes all jobs in a way that minimizes energy while respecting the given
eadlines. The energy consumption is then charged to the players in some way.
Each player wants to minimize the sum of that charge and of their job's
deadline ultiplied by a priority weight. Two chargi...
This special issue contains eight articles which are based on extended abstracts that were presented at the 29th Symposium on Theoretical Aspects of Computer Science (STACS), which was held at the Université Pierre et Marie-Curie, Paris, France from February 29th to March 3rd, 2012. These extended abstracts were among the top papers of those that w...
Since a few years there is an increasing interest in minimizing the energy consumption of computing systems. However in a shared computing system, users want to optimize their experienced quality of service, at the price of a high energy consumption. In this work, we address the problem of optimizing and designing mechanisms for a linear combinatio...
In the paper “The complexity of mean flow time scheduling problems with release times”, by Baptiste, Brucker, Chrobak, Dürr, Kravchenko and Sourd, the authors claimed to prove strong $${\mathbb {NP}}$$NP-hardness of the scheduling problem $$P|{\textit{pmtn}},r_j|\sum C_j$$P|pmtn,rj|∑Cj, namely multiprocessor preemptive scheduling where the objectiv...
The Wide Partition Conjecture (WPC) was introduced by Chow and B. Taylor as an attempt to prove inductively Rotaʼs Basis Conjecture, and in the simplest case tries to characterize partitions whose Young diagram admits a “Latin” filling. Chow et al. [T. Chow, C. K. Fan, M. Goemans, and J. Vondrak. Wide partitions, latin tableaux, and rotaʼs basis co...
Typically in a scheduling problem we are given jobs of different lengths p_j
and different priority weights w_j, and need to schedule them on a single
machine in order to minimize a specific cost function. In this paper we
consider the non-linear objective function \sum w_j C_j^\beta, where C_j is the
completion time of job j and \beta>0 is some ar...
The bounded-delay packet scheduling (or buffer management) problem is to schedule transmissions of packets arriving in a buffer of a network link. Each packet has a deadline and a weight associated with it. The objective is to maximize the weight of packets that are transmitted before their deadlines, assuming that only one packet can be transmitte...
Discrete tomography deals with reconstructing finite spatial objects from their projections. The objects we study in this paper are called tilings or tile-packings, and they consist of a number of disjoint copies of a fixed tile, where a tile is defined as a connected set of grid points. A row projection specifies how many grid points are covered b...
We study a temperature-aware scheduling problem aiming in maximizing the throughput of a set of unit-length jobs, each one having its own heat contribution, on a single processor operating under a strict temperature threshold. Following a simplified model for the processor’s thermal behavior, proposed by Chrobak et al.[9], we analyze the approximat...
We consider the problem of coloring a grid using $k$ colors with the restriction that each row and each column has a specific number of cells of each color. This problem has been known as the $(k-1)$-atom problem in the discrete tomography community. In an already classical result, Ryser obtained a necessary and sufficient condition for the existen...
We study coordination mechanisms for Scheduling Games (with unrelated machines). In these games, each job represents a player, who needs to choose a machine for its execution, and intends to complete earliest possible. In the paper, we focus on a general class of ℓ
k
-norm (for parameter k) on job completion times as social cost, that permits to ba...
For a given set of intervals on the real line, we consider the problem of
ordering the intervals with the goal of minimizing an objective function that
depends on the exposed interval pieces (that is, the pieces that are not
covered by earlier intervals in the ordering). This problem is motivated by an
application in molecular biology that concerns...
We consider the problem of scheduling on a single processor a given set of n
jobs. Each job j has a workload w_j and a release time r_j. The processor can
vary its speed and hibernate to reduce energy consumption. In a schedule
minimizing overall consumed energy, it might be that some jobs complete
arbitrarily far from their release time. So in ord...
Discrete tomography deals with reconstructing finite spatial objects from their projections. The objects we study in this paper are called tilings or tile-packings, and they consist of a number of disjoint copies of a fixed tile, where a tile is defined as a connected set of grid points. A row projection specifies how many grid points are covered b...
We consider an online scheduling problem, motivated by the issues present at the joints of networks using ATM and TCP/IP. Namely, IP packets have to broken down to small ATM cells and sent out before their deadlines, but cells corresponding to different packets can be interwoven. More formally, we consider the online scheduling problem with preempt...
In a scheduling game, each player owns a job and chooses a machine to execute it. While the social cost is the maximal load over all machines (makespan), the cost (disutility) of each player is the completion time of its own job. In the game, players may follow selfish strategies to optimize their cost and therefore their behaviors do not necessari...
In a scheduling game, each player owns a job and chooses a machine to execute it. While the social cost is the maximal load over all machines (makespan), the cost (disutility) of each player is the completion time of its own job. In the game, players may follow selfish strategies to optimize their cost and therefore their behaviors do not necessari...
We consider the problem of coloring a grid using k colors with the restriction that in each row and each column has an specific number of cells of each color. In an already classical result, Ryser obtained a necessary and sufficient condition for the existence of such a coloring when two colors are considered. This characterization yields a linear...
We consider an online scheduling problem, motivated by the issues present at the joints of networks using ATM and TCP/IP. Namely, IP packets have to be broken down into small ATM cells and sent out before their deadlines, but cells corresponding to different packets can be interwoven. More formally, we consider the online scheduling problem with pr...
Abstract We consider the problem of collecting weighted items from a dynamic queueS. Before each step, some items at the front ofS can be deleted and some other items can be added toS at any place. An item, once deleted, cannot be re-inserted | in other words, it \expires". We are allowed to collect one item from S per step. Each item can be collec...
We study a scheduling problem, motivated by air-traffic control. When aircraft reach the final descent in the "Terminal Radar Approach CONontrol" area (tracon), a set of disjoint time windows in which the landing is possible, can be automatically assigned to each aircraft. The objective is then to determine landing times, within these time windows,...
We study an online job scheduling problem arising in networks with aggregated links. The goal is to schedule n jobs, divided into k disjoint chains, on m identical machines, without preemption, so that the jobs within each chain complete in the order of release times and the maximum flow time is minimized.
We present a deterministic online algorith...
We study scheduling problems motivated by recently developed techniques for microprocessor thermal management at the operating systems level. The general scenario can be described as follows. The microprocessor’s temperature is controlled by the hardware thermal management system that continuously monitors the chip temperature and automatically red...
We study scheduling problems motivated by recently developed techniques for microprocessor thermal management at the operating systems level. The general scenario can be described as follows. The microprocessor temperature is controlled by the hardware thermal management system that continuously senses the chip temperature and automatically reduces...
We consider online competitive algorithms for the problem of collecting weighted items from a dynamic set S, when items are added to or deleted from S over time. The objective is to maximize the total weight of collected items. We study the general version, as well as variants with various restrictions, including the following: the uniform case, wh...
The aim of power management policies is to reduce the amount of energy
consumed by computer systems while maintaining satisfactory level of
performance. One common method for saving energy is to simply suspend the
system during the idle times. No energy is consumed in the suspend mode.
However, the process of waking up the system itself requires a...
We study the problem of preemptive scheduling n jobs with given release times on m identical parallel machines. The objective is to minimize the average flow time. We show that when all jobs have equal processing times then the problem can be solved in polynomial time using linear programming. Our algorithm can also be applied to the open-shop prob...
In this paper we study a game where every player is to choose a vertex (facility) in a given undirected graph. All vertices (customers) are then assigned to closest facilities and a player's payoff is the number of customers assigned to it. We show that deciding the existence of a Nash equilibrium for a given graph is NP-hard which to our knowledge...
Cette habilitation décrit mes travaux en tomographie discrète, calcul quantique et ordonnancement.
A popular approach in combinatorial optimization is to model problems as integer linear programs. Ideally, the relaxed linear
program would have only integer solutions, which happens for instance when the constraint matrix is totally unimodular. Still,
sometimes it is possible to build an integer solution with the same cost from the fractional solu...
We address a discrete tomography problem that arises in the study of the atomic structure of crystal lattices. A polyatomic
structure T can be defined as an integer lattice in dimension D≥2, whose points may be occupied by c distinct types of atoms. To “analyze” T, we conduct ℓ measurements that we call discrete X-rays. A discrete X-ray in directio...
We are interested in finding quantum algorithms for problems in the area of computation geometry. Many of the problems we study have already polynomial time algorithms. But since in this area the input sizes are huge,, quadratic time algorithms are often not good enough. Bounded error quantum algorithms can actually have sublinear running time. To...
An approach for scheduling of a problem using a polynomial-time algorithm technique, was described. The elegant feasibility algorithm of Carlier is based on dynamic programming and it processes jobs from left to right on the time-axis. The objective of the algorithm is to find a non-preemptive schedule that maximizes the number of jobs completed by...
In this paper we introduce a new quantum computation model, the linear quantum cellular automaton. Well-formedness is an essential property for any quantum computing device since it enables us to define the probability of a configuration in an observation as the squared magnitude of its amplitude. We give an efficient algorithm which decides if a l...
Quantum algorithms for graph problems are considered, both in the adjacency matrix model and in an adjacency list-like array model. We give almost tight lower and upper bounds for the bounded error quantum query complexity of Connectivity, Strong Connectivity, Minimum Spanning Tree, and Single Source Shortest Paths. For example, we show that the qu...
We present several applications of quantum amplitude amplification to finding claws and collisions in ordered or unordered functions. Our algorithms generalize those of Brassard, Hoyer, and Tapp, and imply an O(N^{3/4} log N) quantum upper bound for the element distinctness problem in the comparison complexity model (contrasting with Theta(N log N)...
We study the problem of preemptive scheduling of n equal-length jobs with given release times on m identical parallel machines. The objective is to minimize the average flow time. Recently, Brucker and Kravchenko (1) proved that the optimal schedule can be computed in polynomial time by solving a linear program with O(n3) variables and constraints,...
Quantum algorithms for graph problems are considered, both in the adjacency matrix model and in an adjacency list-like array model. We give almost tight lower and upper bounds for the bounded error quantum query complexity of Connectivity, Strong Connectivity, Minimum Spanning Tree, and Single Source Shortest Paths. For example we show that the que...
We study the problem of computing a preemptive schedule of equal-length jobs with given release times, deadlines and weights. Our goal is to maximize the weighted throughput. In Graham's notation this problem is described as (1|rj;pj=3Dp;pmtn|? wjUj). We provide an O(n4)-time algorithm, improving the previous bound of O(n10).
Given a tiling of a 2D grid with several types of tiles, we can count for every row and column how many tiles of each type it intersects. These numbers are called the projections. We are interested in the problem of reconstructing a tiling which has given projections. Some simple variants of this problem, involving tiles that are 1×1 or 1×2 rectang...
We wish to tile a rectangle or a torus with only vertical and horizontal bars of a given length, such that the number of bars in every column and row equals given numbers. We present results for particular instances and for a more general problem, while leaving open the initial problem. Keywords: Tiling, tomography, reconstruction Resume nous nous...
The model of cellular automata is fascinating because very simple local rules can generate complex global behaviors. The relationship between local and global function is subject of many studies. We tackle this question by using results on communication complexity theory and, as a by-product, we provide (yet another) classification of cellular auto...
Linear quantum cellular automata were introduced recently as one of the models of quan- tum computing. A basic postulate of quantum mechanics imposes a strong constraint on any quantum machine: it has to be unitary, that is its time evolution operator has to be a unitary transformation. In this paper we give an ecient algorithm to decide if a linea...
We address a discrete tomography problem that arises in the study of the atomic structure of crystal lattices. A polyatomic structure T can be defined as an integer lattice in dimension D⩾2, whose points may be occupied by c distinct types of atoms. To “analyze” T, we conduct ℓ measurements that we call discrete X-rays. A discrete X-ray in directio...
Given a tiling of a 2D grid with several types of tiles, we can count for every row and column how many tiles of each type it intersects. These numbers are called the projections. We are interested in the problem of reconstructing a tiling which has given projections. Some simple variants of this problem, involving tiles that are 1 1 or 1 2 rectang...
We wish to tile a rectangle or a torus with only vertical and horizontal bars of a given length, such that the number of bars in every column and row equals given numbers. We present results for particular instances and for a more general problem, while leaving open the initial problem.
Tomography is the area of reconstructing objects from projections. Here we wish to reconstruct a set of cells in a two dimensional grid, given the number of cells in every row and column. The set is required to be an hv-convex polyomino, that is all its cells must be connected and the cells in every row and column must be consecutive. A simple, pol...
In this paper we introduce a new quantum computation model, the linear
quantum cellular automaton. Well-formedness is an essential property for
any quantum computing device since it enables us to define the
probability of a configuration in an observation as the squared
magnitude of its amplitude. We give an efficient algorithm which decides
if a l...
We give a quantum algorithm to find the index y in a table T of size N such
that in time O(c sqrt N), T[y] is minimum with probability at least 1-1/2^c.
We consider the problem of coloring a grid using k colors with the restriction that in each row and each column has an specific number of cells of each color. In an already
classical result, Ryser obtained a necessary and sufficient condition for the existence of such a coloring when two colors
are considered. This characterization yields a linear...
In this paper we study a game where every player is to choose a vertex (facility) in a given undirected graph. All vertices
(customers) are then assigned to closest facilities and a player’s payoff is the number of customers assigned to it. We show
that deciding the existence of a Nash equilibrium for a given graph is
NP\mathcal{NP}
-hard. We also...