Evaluating Influence Diagrams
|
|
- Arthur Griffin
- 5 years ago
- Views:
Transcription
1 Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia Agst 31, 2004 Abstract In this paper we will srvey the history of Inflence Diagrams from their origin in Decision Theory to modern AI ses. We will compare the varios methods that have been sed to find an optimal strategy for a given inflence diagram. These methods have varios advantages nder different assmptions and there is a progression to the present of richer, more general soltions. We also look at an abstract algorithm sed as an informal tool and determine whether it is eqivalent to other formal methods in the literatre. 1 Introdction This paper will look at the development of inflence diagrams from their beginnings in decision analysis to their crrent important place in many areas of compter science inclding artificial intelligence. We will layot the different methods sed to optimize decisions sing inflence diagrams by compting them directly or via conversions to other models sch as decision graphs and bayesian networks. The latter type in particlar will be looked at in depth and it will be contrasted against the performance of varios algorithms. We will also explain an intitive algorithm sed informally by some researchers and analyze its advantages or similarities with methods described in the literatre. The main contribtion of this paper is to identify trends throgh all these soltions over time and help focs work on open qestions and to find new directions being pointed to by the existing literatre. 2 Inflence Diagrams Inflence diagrams (IDs) were proposed by Howard and Matheson [HM03] as a tool to simplify modelling and analysis of decision trees. Decision trees represent each decision or chance variable as a new level in a tree. The leaves of the tree are tilities that express which ending configrations are more desirable. Solving a decision problem reqires finding the optimal path throgh this tree that maximizes expected tility. 1
2 Now instead of representing each level of that tree we represent each variable as single nodes in a graph. An inflence diagram is a directed acyclic graph N containing nodes representing the variables of the decision problem, V = X D U. Each variable has its own domain of vales, dom(v). The set of parents of a node v i is denoted π vi. These variables are of three types, see Figre 1: chance nodes, x i X, represent random variables in the analysis. They have an associated conditional probability table (CPT) representing a distribtion P(x i π xi ). decision nodes, d i D, represent decisions to be made. We se decision rles δ i, to represent the mapping of each permtation of its parents to exactly one decision, δ i (π di ) dom(d i ) tility nodes, denoted i U, represent fnctions that map each permtation of its parents to exactly one tility vale val i (π i ) dom( i ). No other variables are allowed to depend on a tility directly so tility nodes do not have children. An optimal decision rle δ i is one that maximizes E δi [val i (π i )], the expected vale of the tility nodes it effects. The goal in decision analysis is to find an optimal policy, which is the set of all optimal decision rles = {δ 1,...,δ k }, one for each tility node. The expected vale of a tility node given is denoted E [val i (π i )]. Ths, we are seeking: and = {δ i D i U, argmax δi E δi [val i (π i )]} (1) E [N ]= E [val i (π i )] (2) i U Finding these is what we mean by evalating an inflence diagram. x 1 d 1 x 2 d 2 x3 Figre 1: A simple Inflence Diagram 2
3 Definition 1 An inflence diagram is reglar if there is a definite ordering of the decision nodes sch that there is a path from each decision to the next decision. Frther, the ID is no-forgetting if each decision has access to all of the information the previos decisions had. This means that every element of d i π di is a parent of every decision following d i. IDs have several well known advantages over decision trees. They simplify modelling by allowing the analyst to specify single nodes that represent entire probability distribtions over nearly arbitrary relationships with other variables. We still limit orselves to reglarity as defined above and no loops bt this still provides a level of expression not possible with trees. In order to express conditional independence relationships that are natral in an ID we wold need to resort to the se of complicated information sets amongst siblings in a tree. This may help comptationally bt not in terms of constrcting models. We also mst consider that as the nmber of variables in the problem grows, the size of a symmetric tree grows exponentially, which is not tre in the case of inflence diagrams and their CPTs since they need only represent the probabilities associated with their parents in the graph. So inflence diagrams have mch to offer if they can be evalated efficiently. 3 Using Bayesian Networks to Evalate Inflence Diagrams This approach was first pt forward by Cooper [Coo88] who showed primarily how to redce inflence diagrams to bayesian networks. Shachter and Peot [SP92] soon after showed an improved algorithm that was mch more efficient. Later, Zhang [Zha98] introdced a modified method that greatly redced the nmber of nodes being considered in each part of the evalation. Recently Xiang [XY01] has proposed an algorithm that claims to be as efficient as Zhang s bt simpler. We will briefly present the approaches of these algorithms. 3.1 Cooper s Redction Cooper [Coo88] converted the ID problem to a BN problem in the following way. An inflence diagram is essentially very similar to a bayesian network already, all that is reqired is to ensre that all nodes have proper probability distribtions associated with them to allow s to perform inference. We ths proceed by essentially converting all node types to chance nodes. Decision nodes are converted to chance nodes with an even distribtion: α di dom(d i ),P(α di π di )= 1 dom(d i ) We also need to assign some probability to tility nodes to represent their payoff. Cooper assigned the probability of the new binary-valed tility nodes given its parents 3
4 in the BN a probability proportional to the vale of the tility fnction in the ID for the same parents 1 : val (π ) P( = 1 π )= max π val (π ) P( = 0 π )=1 val (π ) max π val (π ) And obviosly no change is needed for the chance nodes from the ID itself. With the constrction complete they then showed that the problem of finding an optimal decision in the ID redces to a problem in the BN 2 : E δi [val (π )] = P( = 1 π,d i ) Their sggested method of solving then is to maximize these δ i for each permtation of π. This can reqire an exponential nmber of inference steps. Therefore later work based themselves on this redction method bt went frther. 3.2 Shachter and Peot s Algorithm This method [SP92] took advantage of the independence strctre of the BN and the reglarity constraint that says there is a defined order of decision nodes. They noted that instead of maximizing P( = 1 π,d i ) they cold instead maximize P(π,d i = 1). This is preferable since the comptations can now be done locally sing standard BN techniqes of belief propagation. We can recrsively optimize each δ i starting from the last contine optimizing δ i 1 ntil we reach the beginning. This method seems very intitive and is actally nearly eqivalent to Shachter s original techniqe from [Sha86] except that now the bayesian network is handling all of the graph maniplations which previosly had to be specified separately. 3.3 Zhang s Algorithm This method was based on previos advances made by Zhang and Poole regarding the notion of stepwise decomposable IDs [ZP92] and bayesian inference techniqes [ZP94]. The intition for this method is that in a reglar, no-forgetting ID the parents of each decision divide the graph into two independent partitions, see Figre 3.3. They show that if we consider the last decision in the ordering d k, called the tail decision node, then it partitions the network in an interesting way. Call the partition containing the tail decision node T. This set of nodes is separated from nodes previos to those in π di. It also only incldes nodes in π dk and V 2 that can effect the tilities in V 2, denoted U i. The optimal decision rle for d i can then be compted as follows: δ i (π d i )=arg max δi P T ( = 1 π di,d i ) (3) U 2 1 In this and the following section the algorithms limit the ID to only one tility node, therefore sbscripts on s are not necessary at this point 2 we inclde d i simply for emphasize bt it is not necessary since d i π 4
5 V 1 π di d i V 2 Figre 2: A simple Inflence Diagram Note that P T ( ) indicates that the probability is compted relative to nodes only in T since all other nodes earlier in the graph are irrelevant to this decision. This greatly redces the comptational task for compting the optimal tail decision. Previos methods always inclded the entire graph in their calclations even thogh they had no impact. The algorithm then proceeds to recrsively divide the BN into a body and a tail, optimizing the tail decision, setting that decision to have decision rle δ i and repeating on the remaining body. Dring this process more nodes can be prned from the redced tail to improve comptation frther. It trns ot that after we consider this we can see that the reqirement of noforgetting can now be dropped as long as reglarity is maintained. That is, a decision d i need not have incoming arcs from all d 1...d i 1 previos to it as long as there is still a rote going throgh d 1...d i in order. This means that previos decisions can now be hidden from s with chance nodes as shown in Figre 3. The information is not really hidden since d i is still conditionally dependent on d i 1 as long as c i 1 is not observed so the decision will still inflence ftre ones. Using Zhang s algorithm d i can still be optimized. So this opens p inflence diagram evalation to less restricted forms. V1 πdi V2 xi 2 xi 1 xi di Figre 3: A inflence diagram with no-forgetting rle dropped 5
6 3.4 Other algorithms Xiang and Ye [XY01] have recently pblished an algorithm sing BNs that claims to be as efficient as other described here and simpler than Zhang s in particlar. Frther analysis is reqired to determine if these claims are significant as the paper does not state any conclsions directly. Mch work has also occrred arond evalating inflence diagrams withot sing BNs bt sing other methods sch as Shenoy s valation based networks [She92] and some recent work by Dechter sing BNs bt with bcket elimination [Dec00]. 4 An Abstract Algorithm The following method has been proposed informally by David Poole and follows from several intitive observations. Assme we have inflence diagrams as described already which are represented as bayesian networks in the standard way as described by Cooper [Coo88]. Also assme that we have the variable elimination (VE) algorithm [ZP94]. Using VE we can specify to eliminate a node and a factor will be prodced to distribte away that node s probability to effected nodes in the graph. With these tools in hand we can simply specify a method for evalating inflence diagrams. We define U d to be the set of all U sch that d an(). This is the set of tility nodes that d needs to maximize. We note that as long as the parents of these tility nodes, π Ud, are all accessible to d then d can be optimized easily, as in Figre 4. Ths the algorithm eliminates any nodes that are parents of a node in U d bt not d. for all d D do {chosen in reverse order} while π Ud (π d d) do Let x be any node in (π Ud (π d d)) eliminate x sing Variable Elimination algorithm add all nodes in π x to π Ud end while for all instantions of variables in π d do δ (π d )=arg max d (P( = 1 π d,d)) {choose vale for d that maximizes U d } end for make d a chance node by setting its CPT to δ end for We see in Consider the ID N shown in Figre 4. In this sitation we can clearly see that the decision d has all the necessary information to decide optimally. For each permtation of π d choose each decision α dom(d) sch that α = arg max α (val (π,α)) After this we will have δ so we assign that to d s CPT to trn it into another chance node Then we eliminate d k which pdates the table of to take this decision rle into accont 6
7 x 1 x 2 d x 3 Figre 4: Base case of redction sing the algorithm Now we can eliminate x 1,x 2,x 3 to give s the tility node which is really jst E δ [N ] With this as or base case the rest of the method involves being able to redce more complicated IDs to ones containing the form in Figre 4. In Figre 5 we can see another simple case. Here the only node inhibiting optimizing d is x 4 since d does not observe it. With VE its easy to fix this, we simply eliminate x 4 which will pdate the CPTs for,x 1,d k. x 4 x 1 x 2 d x 3 Figre 5: Another simple case of redction sing the algorithm Let s now consider the ID shown previosly for Zhang s algorithm, Figre 3. Can or intitive algorithm evalate this sitation? If we consider the steps shown in Figre 6 it wold seem the answer is yes. Any information arc that wold come from d i 1 wold be irrelevant since x i 1 already provides information to s and it does not effect the actal tility. Also, since we are converting d i to a chance node once it is optimized, the no-forgetting constraint does not apply and d i can be eliminated sing VE withot complication. It is not srprising this method performs as well as Zhang s algorithm. The definition of stepwise-decomposability partitions nodes in the graph sing the same fndamental rles that govern conditional independence on which VE is based. The VE algorithm for marginalizing the probabilities inherently does comptations locally and 7
8 xi 2 xi 1 xi xi xi 2 xi 1 di (i) (ii) xi 2 xi 1 xi 2 (iii) (iv) Figre 6: Evalating a forgetfl ID. (i)tail decision node optimized (ii)-(iv) removing other chance nodes before next decision node need not rely on nodes frther back in the graph that are irrelevant given the parents of a node. Zhang s algorithm sets p this framework independent of VE however and ths is general enogh to se any bayesian inference techniqe that works. Or intitive algorithm is basically a special case of Zhang s where we have hardcoded the se of the inference techniqe and ths mch of the other complexity of the algorithm is taken care of already. 5 Conclsion We have shown a brief overview of the vast and still growing field of inflence diagram research. We have discssed their basis in decision analysis and shown some of the major algorithms for evalating them in order to come to an optimal policy that maximizes tility. Many of these algorithms tilize bayesian networks and we have also shown an informal algorithm from intition sed by researchers that is a special case of the algorithm by Zhang [Zha98]. There are many open areas of research being actively prsed inclding ways to frther improve evalation efficiency and extend inflence diagrams to ever more general realms. 8
9 References [Coo88] G.F. Cooper. A method for sing belief networks as inflence diagrams. In Procceedings of the Twelfth Conference on Uncertainty in Artificial Intelligence, pages 55 63, [Dec00] Rina Dechter. A new perspective on algorithms for optimizing policies nder ncertainty. American Association for Artificial Intelligence, [HM03] R. A. Howard and J. E. Matheson. Inflence diagrams. In Readings on the Principles and Applications of Decision Analysis, pages Strategic Decisions Grop, [Sha86] R.D. Shachter. Evaltating inflence diagrams. Operations Research, [She92] P.P. Shenoy. Valation-based systems for bayesian decision analysis. Operations Research, pages , [SP92] R.D. Shachter and Peot. Decision making sing probabilistic inference methods. In Procceedings of the Eigth Conference on Uncertainty in Artificial Intelligence, pages , [XY01] Y. Xiang and C. Ye. A simple method to evalate inflence diagrams. In Third International Conference on Cognitive Science, [Zha98] Nevin Zhang. Probabilistic inference in inflence diagrams. In Proceedings of the Forteenth Conference on Unvertainty in Artificial Intelligence, pages , [ZP92] [ZP94] Nevin Zhang and David Poole. Stepwise decomposable inflence diagrams. In Proceedings of the Forth International Conference on Knowledge Representation and Reasoning, pages , Nevin Zhang and David Poole. A simple approach to bayesian network comptations. In Proceedings of the Tenth Canadian Conference on Artificial Intelligence, pages ,
On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing
1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity
More informationREPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips
REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands
More informationPavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003
From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information
More informationTopic Continuity for Web Document Categorization and Ranking
Topic Continity for Web ocment Categorization and Ranking B. L. Narayan, C. A. Mrthy and Sankar. Pal Machine Intelligence Unit, Indian Statistical Institte, 03, B. T. Road, olkata - 70008, India. E-mail:
More informationOptimal Sampling in Compressed Sensing
Optimal Sampling in Compressed Sensing Joyita Dtta Introdction Compressed sensing allows s to recover objects reasonably well from highly ndersampled data, in spite of violating the Nyqist criterion. In
More informationMaximum Weight Independent Sets in an Infinite Plane
Maximm Weight Independent Sets in an Infinite Plane Jarno Nosiainen, Jorma Virtamo, Pasi Lassila jarno.nosiainen@tkk.fi, jorma.virtamo@tkk.fi, pasi.lassila@tkk.fi Department of Commnications and Networking
More informationThe final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.
The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5
More informationBlended Deformable Models
Blended Deformable Models (In IEEE Trans. Pattern Analysis and Machine Intelligence, April 996, 8:4, pp. 443-448) Doglas DeCarlo and Dimitri Metaxas Department of Compter & Information Science University
More informationTdb: A Source-level Debugger for Dynamically Translated Programs
Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,
More informationNash Convergence of Gradient Dynamics in General-Sum Games. Michael Kearns.
Convergence of Gradient Dynamics in General-Sm Games Satinder Singh AT&T Labs Florham Park, NJ 7932 bavejaresearch.att.com Michael Kearns AT&T Labs Florham Park, NJ 7932 mkearnsresearch.att.com Yishay
More informationCS224W Final Report. 1 Introduction. 3 Data Collection and Visualization. 2 Prior Work. Cyprien de Lichy, Renke Pan, Zheng Wu.
CS224W Final Report Cyprien de Lichy, Renke Pan, Zheng W 1 Introdction December 9, 2015 Recommender systems are information filtering systems that provide sers with personalized sggestions for prodcts
More information(2, 4) Tree Example (2, 4) Tree: Insertion
Presentation for se with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 B-Trees and External Memory (2, 4) Trees Each internal node has 2 to 4 children:
More informationA Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks
Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,
More informationComputer-Aided Mechanical Design Using Configuration Spaces
Compter-Aided Mechanical Design Using Configration Spaces Leo Joskowicz Institte of Compter Science The Hebrew University Jersalem 91904, Israel E-mail: josko@cs.hji.ac.il Elisha Sacks (corresponding athor)
More informationThe Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment
This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment
More informationFault Tolerance in Hypercubes
Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different
More informationCOMPOSITION OF STABLE SET POLYHEDRA
COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining
More informationAlliances and Bisection Width for Planar Graphs
Alliances and Bisection Width for Planar Graphs Martin Olsen 1 and Morten Revsbæk 1 AU Herning Aarhs University, Denmark. martino@hih.a.dk MADAGO, Department of Compter Science Aarhs University, Denmark.
More informationTowards Understanding Bilevel Multi-objective Optimization with Deterministic Lower Level Decisions
Towards Understanding Bilevel Mlti-objective Optimization with Deterministic Lower Level Decisions Ankr Sinha Ankr.Sinha@aalto.fi Department of Information and Service Economy, Aalto University School
More informationConstructing and Comparing User Mobility Profiles for Location-based Services
Constrcting and Comparing User Mobility Profiles for Location-based Services Xihi Chen Interdisciplinary Centre for Secrity, Reliability and Trst, University of Lxemborg Jn Pang Compter Science and Commnications,
More informationReal-time mean-shift based tracker for thermal vision systems
9 th International Conference on Qantitative InfraRed Thermography Jly -5, 008, Krakow - Poland Real-time mean-shift based tracker for thermal vision systems G. Bieszczad* T. Sosnowski** * Military University
More informationConstrained Routing Between Non-Visible Vertices
Constrained Roting Between Non-Visible Vertices Prosenjit Bose 1, Matias Korman 2, André van Renssen 3,4, and Sander Verdonschot 1 1 School of Compter Science, Carleton University, Ottawa, Canada. jit@scs.carleton.ca,
More informationFINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES
FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES RICARDO G. DURÁN AND ARIEL L. LOMBARDI Abstract. We consider the nmerical approximation of a model convection-diffsion
More informationPipelined van Emde Boas Tree: Algorithms, Analysis, and Applications
This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,
More informationThe single-cycle design from last time
lticycle path Last time we saw a single-cycle path and control nit for or simple IPS-based instrction set. A mlticycle processor fies some shortcomings in the single-cycle CPU. Faster instrctions are not
More informationPOWER-OF-2 BOUNDARIES
Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of
More informationEfficient and Accurate Delaunay Triangulation Protocols under Churn
Efficient and Accrate Delanay Trianglation Protocols nder Chrn Dong-Yong Lee and Simon S. Lam Department of Compter Sciences The University of Texas at Astin {dylee, lam}@cs.texas.ed November 9, 2007 Technical
More informationMethod to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot
Method to bild an initial adaptive Nero-Fzzy controller for joints control of a legged robot J-C Habmremyi, P. ool and Y. Badoin Royal Military Academy-Free University of Brssels 08 Hobbema str, box:mrm,
More informationMulti-lingual Multi-media Information Retrieval System
Mlti-lingal Mlti-media Information Retrieval System Shoji Mizobchi, Sankon Lee, Fmihiko Kawano, Tsyoshi Kobayashi, Takahiro Komats Gradate School of Engineering, University of Tokshima 2-1 Minamijosanjima,
More informationDiscrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods
Annals of Operations Research 106, 19 46, 2001 2002 Klwer Academic Pblishers. Manfactred in The Netherlands. Discrete Cost Mlticommodity Network Optimization Problems and Exact Soltion Methods MICHEL MINOUX
More informationIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY 2007 1 On the Analysis of the Bletooth Time Division Dplex Mechanism Gil Zssman Member, IEEE, Adrian Segall Fellow, IEEE, and Uri Yechiali
More informationarxiv: v1 [cs.cg] 27 Nov 2015
On Visibility Representations of Non-planar Graphs Therese Biedl 1, Giseppe Liotta 2, Fabrizio Montecchiani 2 David R. Cheriton School of Compter Science, University of Waterloo, Canada biedl@waterloo.ca
More informationNetworks An introduction to microcomputer networking concepts
Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES
More informationA sufficient condition for spiral cone beam long object imaging via backprojection
A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral
More informationBias of Higher Order Predictive Interpolation for Sub-pixel Registration
Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz
More informationImage Compression Compression Fundamentals
Compression Fndamentals Data compression refers to the process of redcing the amont of data reqired to represent given qantity of information. Note that data and information are not the same. Data refers
More informationTAKING THE PULSE OF ICT IN HEALTHCARE
ICT TODAY THE OFFICIAL TRADE JOURNAL OF BICSI Janary/Febrary 2016 Volme 37, Nmber 1 TAKING THE PULSE OF ICT IN HEALTHCARE + PLUS + High-Power PoE + Using HDBaseT in AV Design for Schools + Focs on Wireless
More informationPARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT
PAAMETE OPTIMIZATION FO TAKAGI-SUGENO FUZZY MODELS LESSONS LEANT Manfred Männle Inst. for Compter Design and Falt Tolerance Univ. of Karlsrhe, 768 Karlsrhe, Germany maennle@compter.org Brokat Technologies
More informationThe Disciplined Flood Protocol in Sensor Networks
The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab
More informationThe Intersection of Two Ringed Surfaces and Some Related Problems
Graphical Models 63, 8 44 001) doi:10.1006/gmod.001.0553, available online at http://www.idealibrary.com on The Intersection of Two Ringed Srfaces and Some Related Problems Hee-Seok Heo and Sng Je Hong
More informationAppearance Based Tracking with Background Subtraction
The 8th International Conference on Compter Science & Edcation (ICCSE 213) April 26-28, 213. Colombo, Sri Lanka SD1.4 Appearance Based Tracking with Backgrond Sbtraction Dileepa Joseph Jayamanne Electronic
More informationThe extra single-cycle adders
lticycle Datapath As an added bons, we can eliminate some of the etra hardware from the single-cycle path. We will restrict orselves to sing each fnctional nit once per cycle, jst like before. Bt since
More informationInteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN:
Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: 1137-3601 revista@aepia.org Asociación Española para la Inteligencia Artificial España Zaballos, Lis J.; Henning, Gabriela
More informationA GENERIC MODEL OF A BASE-ISOLATED BUILDING
Chapter 5 A GENERIC MODEL OF A BASE-ISOLATED BUILDING This chapter draws together the work o Chapters 3 and 4 and describes the assembly o a generic model o a base-isolated bilding. The irst section describes
More informationMaster for Co-Simulation Using FMI
Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany
More informationEfficient Implementation of Binary Trees in LISP Systems
Efficient Implementation of Binary Trees in LISP Systems P. SIPALA Dipartimento di Eleltrotecnica, Eleltronica, Informatica, Universitd di Trieste, Italy In this paper, I consider how to implement the
More informationTHE Unit Commitment problem (UCP) is the problem of
IEEE TRANS IN POWER SYSTEMS 1 A new MILP-based approach for Unit Commitment in power prodction planning. Ana Viana and João Pedro Pedroso Abstract This paper presents a novel, iterative optimisation algorithm
More informationCS 153 Design of Operating Systems Spring 18
CS 53 Design of Operating Systems Spring 8 Lectre 2: Virtal Memory Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Recap: cache Well-written programs exhibit
More informationTOWARD AN UNCERTAINTY PRINCIPLE FOR WEIGHTED GRAPHS
TOWARD AN UNCERTAINTY PRINCIPLE FOR WEIGHTED GRAPHS Bastien Pasdelop, Réda Alami, Vincent Gripon Telecom Bretagne UMR CNRS Lab-STICC name.srname@telecom-bretagne.e Michael Rabbat McGill University ECE
More informationPicking and Curves Week 6
CS 48/68 INTERACTIVE COMPUTER GRAPHICS Picking and Crves Week 6 David Breen Department of Compter Science Drexel University Based on material from Ed Angel, University of New Mexico Objectives Picking
More informationTopological Drawings of Complete Bipartite Graphs
Topological Drawings of Complete Bipartite Graphs Jean Cardinal Stefan Felsner y Febrary 017 Abstract Topological drawings are natral representations of graphs in the plane, where vertices are represented
More informationHardware-Accelerated Free-Form Deformation
Hardware-Accelerated Free-Form Deformation Clint Cha and Ulrich Nemann Compter Science Department Integrated Media Systems Center University of Sothern California Abstract Hardware-acceleration for geometric
More informationarxiv: v1 [cs.cg] 26 Sep 2018
Convex partial transversals of planar regions arxiv:1809.10078v1 [cs.cg] 26 Sep 2018 Vahideh Keikha Department of Mathematics and Compter Science, University of Sistan and Balchestan, Zahedan, Iran va.keikha@gmail.com
More informationUncertainty Determination for Dimensional Measurements with Computed Tomography
Uncertainty Determination for Dimensional Measrements with Compted Tomography Kim Kiekens 1,, Tan Ye 1,, Frank Welkenhyzen, Jean-Pierre Krth, Wim Dewlf 1, 1 Grop T even University College, KU even Association
More informationSensor-Based Fast Thermal Evaluation Model For Energy Efficient High-Performance Datacenters
Sensor-ased Fast Thermal valation Model For nergy fficient High-Performance atacenters Qinghi Tang Tridib Mkherjee, Sandeep K. S. Gpta Phil ayton ept. of lectrical ng. ept. of ompter Science and ng. Intel
More informationIsilon InsightIQ. Version 2.5. User Guide
Isilon InsightIQ Version 2.5 User Gide Pblished March, 2014 Copyright 2010-2014 EMC Corporation. All rights reserved. EMC believes the information in this pblication is accrate as of its pblication date.
More informationA choice relation framework for supporting category-partition test case generation
Title A choice relation framework for spporting category-partition test case generation Athor(s) Chen, TY; Poon, PL; Tse, TH Citation Ieee Transactions On Software Engineering, 2003, v. 29 n. 7, p. 577-593
More informationWhat s New in AppSense Management Suite Version 7.0?
What s New in AMS V7.0 What s New in AppSense Management Site Version 7.0? AppSense Management Site Version 7.0 is the latest version of the AppSense prodct range and comprises three prodct components,
More informationAn Extensive Study of Static Regression Test Selection in Modern Software Evolution
An Extensive Stdy of Static Regression Test Selection in Modern Software Evoltion Owolabi Legnsen 1, Farah Hariri 1, Agst Shi 1, Yafeng L 2, Lingming Zhang 2, and Darko Marinov 1 1 Department of Compter
More informationSubgraph Matching with Set Similarity in a Large Graph Database
1 Sbgraph Matching with Set Similarity in a Large Graph Database Liang Hong, Lei Zo, Xiang Lian, Philip S. Y Abstract In real-world graphs sch as social networks, Semantic Web and biological networks,
More informationarxiv: v3 [math.co] 7 Sep 2018
Cts in matchings of 3-connected cbic graphs Kolja Knaer Petr Valicov arxiv:1712.06143v3 [math.co] 7 Sep 2018 September 10, 2018 Abstract We discss conjectres on Hamiltonicity in cbic graphs (Tait, Barnette,
More informationMultiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET
Mltiple-Choice Test Chapter 09.0 Golden Section Search Method Optimization COMPLETE SOLUTION SET. Which o the ollowing statements is incorrect regarding the Eqal Interval Search and Golden Section Search
More informationRequirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems
Reqirements Engineering Objectives An introdction to reqirements Gerald Kotonya and Ian Sommerville To introdce the notion of system reqirements and the reqirements process. To explain how reqirements
More informationAugmenting the edge connectivity of planar straight line graphs to three
Agmenting the edge connectivity of planar straight line graphs to three Marwan Al-Jbeh Mashhood Ishaqe Kristóf Rédei Diane L. Sovaine Csaba D. Tóth Pavel Valtr Abstract We characterize the planar straight
More informationComputer User s Guide 4.0
Compter User s Gide 4.0 2001 Glenn A. Miller, All rights reserved 2 The SASSI Compter User s Gide 4.0 Table of Contents Chapter 1 Introdction...3 Chapter 2 Installation and Start Up...5 System Reqirements
More informationSTABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWORK DYNAMICS FOR STATIC OPTIMIZATION
STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWOR DYNAMICS FOR STATIC OPTIMIZATION Grsel Serpen and Yifeng X Electrical Engineering and Compter Science Department, The University of Toledo, Toledo, OH
More informationThis chapter is based on the following sources, which are all recommended reading:
Bioinformatics I, WS 09-10, D. Hson, December 7, 2009 105 6 Fast String Matching This chapter is based on the following sorces, which are all recommended reading: 1. An earlier version of this chapter
More informationDate: December 5, 1999 Dist'n: T1E1.4
12/4/99 1 T1E14/99-559 Project: T1E14: VDSL Title: Vectored VDSL (99-559) Contact: J Cioffi, G Ginis, W Y Dept of EE, Stanford U, Stanford, CA 945 Cioffi@stanforded, 1-65-723-215, F: 1-65-724-3652 Date:
More informationProf. Kozyrakis. 1. (10 points) Consider the following fragment of Java code:
EE8 Winter 25 Homework #2 Soltions De Thrsday, Feb 2, 5 P. ( points) Consider the following fragment of Java code: for (i=; i
More informationObject Pose from a Single Image
Object Pose from a Single Image How Do We See Objects in Depth? Stereo Use differences between images in or left and right eye How mch is this difference for a car at 00 m? Moe or head sideways Or, the
More informationAn Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast
University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna
More informationABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS
Proceedings th FIG Symposim on Deformation Measrements Santorini Greece 00. ABSOUTE DEFORMATION PROFIE MEASUREMENT IN TUNNES USING REATIVE CONVERGENCE MEASUREMENTS Mahdi Moosai and Saeid Khazaei Mining
More informationA Recovery Algorithm for Reliable Multicasting in Reliable Networks
A Recovery Algorithm for Reliable Mlticasting in Reliable Networks Danyang Zhang Sibabrata Ray Dept. of Compter Science University of Alabama Tscaloosa, AL 35487 {dzhang, sib}@cs.a.ed Ragopal Kannan S.
More informationConstructing Multiple Light Multicast Trees in WDM Optical Networks
Constrcting Mltiple Light Mlticast Trees in WDM Optical Networks Weifa Liang Department of Compter Science Astralian National University Canberra ACT 0200 Astralia wliang@csaneda Abstract Mlticast roting
More informationIMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING
International Jornal of Modern Engineering Research (IJMER) www.imer.com Vol.1, Isse1, pp-134-139 ISSN: 2249-6645 IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING
More informationCurves and Surfaces. CS 537 Interactive Computer Graphics Prof. David E. Breen Department of Computer Science
Crves and Srfaces CS 57 Interactive Compter Graphics Prof. David E. Breen Department of Compter Science E. Angel and D. Shreiner: Interactive Compter Graphics 6E Addison-Wesley 22 Objectives Introdce types
More informationResolving Linkage Anomalies in Extracted Software System Models
Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program
More informationTowards Tight Bounds on Theta-Graphs
Toards Tight Bonds on Theta-Graphs arxiv:10.633v1 [cs.cg] Apr 01 Prosenjit Bose Jean-Lo De Carfel Pat Morin André van Renssen Sander Verdonschot Abstract We present improved pper and loer bonds on the
More informationIP Multicast Fault Recovery in PIM over OSPF
1 IP Mlticast Falt Recovery in PIM over OSPF Abstract Relatively little attention has been given to nderstanding the falt recovery characteristics and performance tning of native IP mlticast networks.
More informationQoS-driven Runtime Adaptation of Service Oriented Architectures
Qo-driven Rntime Adaptation of ervice Oriented Architectres Valeria ardellini 1 Emiliano asalicchio 1 Vincenzo Grassi 1 Francesco Lo Presti 1 Raffaela Mirandola 2 1 Dipartimento di Informatica, istemi
More informationMinimal Edge Addition for Network Controllability
This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,
More informationEMC ViPR. User Guide. Version
EMC ViPR Version 1.1.0 User Gide 302-000-481 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is accrate
More information5 Performance Evaluation
5 Performance Evalation his chapter evalates the performance of the compared to the MIP, and FMIP individal performances. We stdy the packet loss and the latency to restore the downstream and pstream of
More informationAccepted Manuscript. SNOWMAN is PSPACE-complete. Weihua He, Ziwen Liu, Chao Yang S (17) Reference: TCS 11111
Accepted Manscript SNOWMAN is PSPACE-complete Weiha He, Ziwen Li, Chao Yang PII: S00-975(7)005-0 DOI: http://dx.doi.org/0.06/j.tcs.07.0.0 Reference: TCS To appear in: Theoretical Compter Science Received
More informationMPC for Humanoid Gait Generation: Stability and Feasibility
MPC for Hmanoid Gait Generation: Stability and Feasibility Nicola Scianca, Daniele De Simone, Leonardo Lanari, Giseppe Oriolo arxiv:191.855v1 [cs.ro] 24 Jan 219 Abstract We present a novel MPC framework
More informationA personalized search using a semantic distance measure in a graph-based ranking model
Article A personalized search sing a semantic distance measre in a graph-based ranking model Jornal of Information Science XX (X) pp. 1-23 The Athor(s) 2011 Reprints and Permissions: sagepb.co.k/jornalspermissions.nav
More informationMaximal Cliques in Unit Disk Graphs: Polynomial Approximation
Maximal Cliqes in Unit Disk Graphs: Polynomial Approximation Rajarshi Gpta, Jean Walrand, Oliier Goldschmidt 2 Department of Electrical Engineering and Compter Science Uniersity of California, Berkeley,
More informationNormalized averaging using adaptive applicability functions with application in image reconstruction from sparsely and randomly sampled data
Normalized averaging sing adaptive applicability fnctions with application in image reconstrction from sparsely and randomly sampled data Tan Q. Pham, Lcas J. van Vliet Pattern Recognition Grop, Faclty
More informationp 1 p 2 p 3 S u( ) θ
Preprint of a paper pblished in inimal Srfaces, Geometric Analysis and Symplectic Geometry Adv. Std. Pre ath, 34 (2002) 129 142. SOLUTION TO THE SHADOW PROBLE IN 3-SPACE OHAAD GHOI Abstract. If a convex
More informationIDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION
ICAS 2 CONGRESS IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION Christophe Le Garrec, Marc Hmbert, Michel Lacabanne Aérospatiale Matra
More information10.2 Solving Quadratic Equations by Completing the Square
. Solving Qadratic Eqations b Completing the Sqare Consider the eqation We can see clearl that the soltions are However, What if the eqation was given to s in standard form, that is 6 How wold we go abot
More informationSwitched state-feedback controllers with multi-estimators for MIMO systems
Proceedings of the th WEA Int Conf on COMPUTATIONAL INTELLIGENCE MAN-MACHINE YTEM AND CYBERNETIC Venice Ital November - 6 89 witched state-feedback controllers with mlti-estimators for MIMO sstems LIBOR
More informationAUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING
AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING Mingsheng LIAO, Li ZHANG, Zxn ZHANG, Jiangqing ZHANG Whan Technical University of Srveying and Mapping, Natinal Lab. for Information Eng. in
More informationNETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS
ETWORK PRESERVATIO THROUGH A TOPOLOGY COTROL ALGORITHM FOR WIRELESS MESH ETWORKS F. O. Aron, T. O. Olwal, A. Krien, Y. Hamam Tshwane University of Technology, Pretoria, Soth Africa. Dept of the French
More informationAn Extreme Value Approach to Information Technology Security Investment
Association for Information Systems AIS Electronic Library (AISeL) ICIS 2005 Proceedings International Conference on Information Systems (ICIS) December 2005 An Extreme Vale Approach to Information Technology
More informationarxiv: v2 [cs.cg] 5 Aug 2014
The θ 5 -graph is a spanner Prosenjit Bose Pat Morin André van Renssen Sander Verdonschot November 5, 2018 arxiv:12120570v2 [cscg] 5 Ag 2014 Abstract Given a set of points in the plane, e sho that the
More informationarxiv: v1 [cs.si] 12 Dec 2016
Connection Discovery sing Shared Images by Gassian Relational Topic Model Xiaopeng Li, Ming Cheng, James She HKUST-NIE Social Media Lab, Hong Kong University of Science & Technology, Hong Kong xlibo@connect.st.hk,
More informationEngineering, University of Malaya, Kuala Lumpur, Malaysia 2 Department of Mechanical Engineering, Osaka University, 2-1
nternational Jornal o Mechanical and Materials Engineering (JMME), Vol. 4 (2009), No. 1, 98-102. TECHNCAL NOTE: MMERSED BOUNDARY METHOD (BODY FORCE) FOR FLOW AROUND THN BODES WTH SHARP EDGES T. M. Y. S.
More informationEEC 483 Computer Organization
EEC 483 Compter Organization Chapter 4.4 A Simple Implementation Scheme Chans Y The Big Pictre The Five Classic Components of a Compter Processor Control emory Inpt path Otpt path & Control 2 path and
More informationData/Metadata Data and Data Transformations
A Framework for Classifying Scientic Metadata Helena Galhardas, Eric Simon and Anthony Tomasic INRIA Domaine de Volcea - Rocqencort 7853 Le Chesnay France email: First-Name.Last-Name@inria.fr Abstract
More information