Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Joseph Naor is active.

Publication


Featured researches published by Joseph Naor.


IEEE Transactions on Pattern Analysis and Machine Intelligence | 1984

Multiple Resolution Texture Analysis and Classification

Shmuel Peleg; Joseph Naor; Ralph Hartley; David Avnir

Textures are classified based on the change in their properties with changing resolution. The area of the gray level surface is measured at serveral resolutions. This area decreases at coarser resolutions since fine details that contribute to the area disappear. Fractal properties of the picture are computed from the rate of this decrease in area, and are used for texture comparison and classification. The relation of a texture picture to its negative, and directional properties, are also discussed.


Information Processing Letters | 1999

The budgeted maximum coverage problem

Samir Khuller; Anna Moss; Joseph Naor

Abstract The budgeted maximum coverage problem is: given a collection S of sets with associated costs defined over a domain of weighted elements, and a budget L , find a subset of S ′⫅ S such that the total cost of sets in S ′ does not exceed L , and the total weight of elements covered by S ′ is maximized. This problem is NP-hard. For the special case of this problem, where each set has unit cost, a (1−1/ e ) -approximation is known. Yet, prior to this work, no approximation results were known for the general cost version. The contribution of this paper is a (1−1/ e ) -approximation algorithm for the budgeted maximum coverage problem. We also argue that this approximation factor is the best possible, unless NP ⫅ DTIME (n O ( log log n) ) .


Journal of the ACM | 2001

A unified approach to approximating resource allocation and scheduling

Amotz Bar-Noy; Reuven Bar-Yehuda; Ari Freund; Joseph Naor; Baruch Schieber

We present a general framework for solving resource allocation and scheduling problems. Given a resource of fixed size, we present algorithms that approximate the maximum throughput or the minimum loss by a constant factor. Our approximation factors apply to many problems, among which are: (i) real-time scheduling of jobs on parallel machines, (ii) bandwidth allocation for sessions between two endpoints, (iii) general caching, (iv) dynamic storage allocation, and (v) bandwidth allocation on optical line and ring topologies. For some of these problems we provide the first constant factor approximation algorithm. Our algorithms are simple and efficient and are based on the local-ratio technique. We note that they can equivalently be interpreted within the primal-dual schema.


Algorithmica | 1998

Approximating minimum feedback sets and multicuts in directed graphs

Guy Even; Joseph Naor; Baruch Schieber; Madhu Sudan

Abstract. This paper deals with approximating feedback sets in directed graphs. We consider two related problems: the weighted feedback vertex set (FVS) problem, and the weighted feedback edge set (FES) problem. In the {FVS} (resp. FES) problem, one is given a directed graph with weights (each of which is at least one) on the vertices (resp. edges), and is asked to find a subset of vertices (resp. edges) with minimum total weight that intersects every directed cycle in the graph. These problems are among the classical NP-hard problems and have many applications. We also consider a generalization of these problems: subset-fvs and subset-fes, in which the feedback set has to intersect only a subset of the directed cycles in the graph. This subset consists of all the cycles that go through a distinguished input subset of vertices and edges, denoted by X . This generalization is also NP-hard even when |X|=2 . We present approximation algorithms for the subset-fvs and subset-fes problems. The first algorithm we present achieves an approximation factor of O(log2|X|) . The second algorithm achieves an approximation factor of O(min{log τ* log log τ*, log n log log n)} , where τ* is the value of the optimum fractional solution of the problem at hand, and n is the number of vertices in the graph. We also define a multicut problem in a special type of directed networks which we call circular networks, and show that the subset-fes and subset-fvs problems are equivalent to this multicut problem. Another contribution of our paper is a combinatorial algorithm that computes a (1+ɛ) approximation to the fractional optimal feedback vertex set. Computing the approximate solution is much simpler and more efficient than general linear programming methods. All of our algorithms use this approximate solution.


european symposium on algorithms | 2007

Online primal-dual algorithms for maximizing ad-auctions revenue

Niv Buchbinder; Kamal Jain; Joseph Naor

We study the online ad-auctions problem introduced by Mehta et al. [15]. We design a (1 - 1/e)-competitive (optimal) algorithm for the problem, which is based on a clean primal-dual approach, matching the competitive factor obtained in [15]. Our basic algorithm along with its analysis are very simple. Our results are based on a unified approach developed earlier for the design of online algorithms [7,8]. In particular, the analysis uses weak duality rather than a tailor made (i.e., problem specific) potential function. We show that this approach is useful for analyzing other classical online algorithms such as ski rental and the TCP-acknowledgement problem. We are confident that the primal-dual method will prove useful in other online scenarios as well. The primal-dual approach enables us to extend our basic ad-auctions algorithm in a straight forward manner to scenarios in which additional information is available, yielding improved worst case competitive factors. In particular, a scenario in which additional stochastic information is available to the algorithm, a scenario in which the number of interested buyers in each product is bounded by some small number d, and a general risk management framework.


Journal of the ACM | 2000

Divide-and-conquer approximation algorithms via spreading metrics

Guy Even; Joseph Naor; Satish Rao; Baruch Schieber

We present a novel divide-and-conquer paradigm for approximating NP-hard graph optimization problems. The paradigm models graph optimization problems that satisfy two properties: First, a divide-and-conquer approach is applicable. Second, a fractional spreading metric is computable in polynomial time. The spreading metric assigns lengths to either edges or vertices of the input graph, such that all subgraphs for which the optimization problem is nontrivial have large diameters. In addition, the spreading metric provides a lower bound, <inline-equation><f> <g>t</g></f> </inline-equation>, on the cost of solving the optimization problem. We present a polynomial time approximation algorithm for problems modeled by our paradigm whose approximation factor is <italic>O</italic>(min{log <inline-equation><f> <g>t</g>,</f> </inline-equation>log log <inline-equation><f> <g>t</g></f> </inline-equation>, log <italic>k</italic> log log <italic>k</italic>}) where <italic>k</italic> denotes the number of “interesting” vertices in the problem instance, and is at most the number of vertices. We present seven problems that can be formulated to fit the paradigm. For all these problems our algorithm improves previous results. The problems are: (1) linear arrangement; (2) embedding a graph in a <italic>d</italic>-dimensional mesh; (3) interval graph completion; (4) minimizing storage-time product; (5) subset feedback sets in directed graphs and multicuts in circular networks; (6) symmetric multicuts in directed networks; (7) balanced partitions and <italic>p</italic>-separators (for small values of <italic>p</italic>) in directed graphs.


Mathematics of Operations Research | 2002

Minimizing Service and Operation Costs of Periodic Scheduling

Amotz Bar-Noy; Randeep Bhatia; Joseph Naor; Baruch Schieber

We study the problem of scheduling activities of several types under the constraint that, at most, a fixed number of activities can be scheduled in any single time slot. Any given activity type is associated with a service cost and an operating cost that increases linearly with the number of time slots since the last service of this type. The problem is to find an optimal schedule that minimizes the long-run average cost per time slot. Applications of such a model are the scheduling of maintenance service to machines, multi-item replenishment of stock, and minimizing the mean response time in Broadcast Disks. Broadcast Disks recently gained a lot of attention because they were used to model backbone communications in wireless systems, Teletext systems, and Web caching in satellite systems. The first contribution of this paper is the definition of a general model that combines into one several important previous models. We prove that an optimal cyclic schedule for the general problem exists, and we establish the NP-hardness of the problem. Next, we formulate a nonlinear program that relaxes the optimal schedule and serves as a lower bound on the cost of an optimal schedule. We present an efficient algorithm for finding a near-optimal solution to the nonlinear program. We use this solution to obtain several approximation algorithms. 1 A 9/8 approximation for a variant of the problem that models the Broadcast Disks application. The algorithm uses some properties of “Fibonacci sequences.” Using this sequence, we present a 1.57-approximation algorithm for the general problem. 2 A simple randomized algorithm and a simple deterministic greedy algorithm for the problem. We prove that both achieve approximation factor of 2. To the best of our knowledge this is the first worst-case analysis of a widely used greedy heuristic for this problem.


international conference on computer communications | 2015

Near optimal placement of virtual network functions

Rami Cohen; Liane Lewin-Eytan; Joseph Naor; Danny Raz

Network Function Virtualization (NFV) is a new networking paradigm where network functions are executed on commodity servers located in small cloud nodes distributed across the network, and where software defined mechanisms are used to control the network flows. This paradigm is a major turning point in the evolution of networking, as it introduces high expectations for enhanced economical network services, as well as major technical challenges. In this paper, we address one of the main technical challenges in this domain: the actual placement of the virtual functions within the physical network. This placement has a critical impact on the performance of the network, as well as on its reliability and operation cost. We perform a thorough study of the NFV location problem, show that it introduces a new type of optimization problems, and provide near optimal approximation algorithms guaranteeing a placement with theoretically proven performance. The performance of the solution is evaluated with respect to two measures: the distance cost between the clients and the virtual functions by which they are served, as well as the setup costs of these functions. We provide bi-criteria solutions reaching constant approximation factors with respect to the overall performance, and adhering to the capacity constraints of the networking infrastructure by a constant factor as well. Finally, using extensive simulations, we show that the proposed algorithms perform well in many realistic scenarios.


foundations of computer science | 2012

A Tight Linear Time (1/2)-Approximation for Unconstrained Submodular Maximization

Niv Buchbinder; Moran Feldman; Joseph Naor; Roy Schwartz

We consider the Unconstrained Submodular Maximization problem in which we are given a non-negative submodular function f : 2N → ℝ+, and the objective is to find a subset S ⊆ N maximizing f(S). This is one of the most basic submodular optimization problems, having a wide range of applications. Some well known problems captured by Unconstrained Submodular Maximization include MaxCut, Max-DiCut, and variants of Max-SAT and maximum facility location. We present a simple randomized linear time algorithm achieving a tight approximation guarantee of 1/2, thus matching the known hardness result of Feige et al. [11]. Our algorithm is based on an adaptation of the greedy approach which exploits certain symmetry properties of the problem. Our method might seem counterintuitive, since it is known that the greedy algorithm fails to achieve any bounded approximation factor for the problem.


foundations of computer science | 1989

The probabilistic method yields deterministic parallel algorithms

Rajeev Motwani; Joseph Naor; Moni Naor

A method is provided for converting randomized parallel algorithms into deterministic parallel algorithms. The approach is based on a parallel implementation of the method of conditional probabilities. Results obtained by applying the method to the set balancing problem, lattice approximation, edge-coloring graphs, random sampling, and combinatorial constructions are presented. The general form in which the method of conditional probabilities is applied sequentially is described. The reason why this form does not lend itself to parallelization are discussed. The general form of the case for which the method of conditional probabilities can be applied in the parallel context is given. >

Collaboration


Dive into the Joseph Naor's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Amotz Bar-Noy

City University of New York

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ariel Orda

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Moran Feldman

École Polytechnique Fédérale de Lausanne

View shared research outputs
Top Co-Authors

Avatar

Danny Raz

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Nikhil Bansal

Eindhoven University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge