EFFICIENT SOLUTION OF SYSTEMS OF ORIENTATION CONSTRAINTS

Size: px
Start display at page:

Download "EFFICIENT SOLUTION OF SYSTEMS OF ORIENTATION CONSTRAINTS"

Transcription

1 EFFICIENT SOLUTION OF SSTEMS OF OIENTATION CONSTAINTS Joseh L. Ganley Cadence Design Systems, Inc. ABSTACT One sbtask in constraint-drien lacement is enforcing a set of orientation constraints on the deices being laced. Sch constraints are created in order to, for examle, imlement matching constraints or enforce reglarity among members of an array of deices. Here we resent an efficient algorithm for soling systems of discrete orientation constraints. The algorithm handles oerconstraints by selectiely relaxing constraints ntil the remaining set can all be simltaneosly enforced. The algorithm rns in linear time in the absence of oerconstraints. 1. INTODUCTION Part of the constraint-drien lacement roblem is finding a set of orientations for the deices being laced that satisfies certain orientation constraints. In this aer we resent an efficient algorithm that soles this roblem. It has been imlemented in the rectilinear metric for for tyes of orientation constraints, and can be easily extended to other metrics and other tyes of orientation constraints. For clarity of exosition, we focs on the rectilinear model, in which only horizontal and ertical lines are allowed, since this is the model we se in or imlementation and nder which most integrated circits are fabricated. (Note, howeer, that or algorithm is alicable to any metric in which the orientation of a deice can be described by a finite seqence of indeendent rotations and/or reflections.) In the rectilinear model, there are eight ossible orientations of a deice, which are shown in Figre 1 (we se the standard Cadence nomenclatre to describe them). With resect to these orientations, the following constraints are defined: AsingledeicehasFIED OIENTATION set to one of the eight orientations. Eery deice in a set of two or more mst hae the SAME OIENTATION. A air of deices mst hae MIOED OIENTATION abot either the x-ory-axis. Eery deice in a set of two or more mst hae either the SAME O MIOED OIENTATION (if mirrored, then abot either the x-ory-axis). 0 M M M90 M90 Figre 1. The eight ossible orientations. Here we resent an efficient algorithm that ses grah coloring to sole the following roblem: gien a set of deices and a set of constraints on these deices, where each constraint is one of the for described aboe, choose an orientation for each deice sch that all the constraints are satisfied (if ossible; see below). If one is only concerned with the first three of these tyes of constraints, then a simle iteratie algorithm that roagates orientations ot from the deices with fixed orientations sffices to sole this roblem. Howeer, not only is the coloring algorithm more efficient than sch an iteratie algorithm, bt it also handles SAME O MIOED OIENTATION constraints. The iteratie techniqe is insfficient to handle sch constraints; details are gien in the next section. Sometimes all constraints cannot be satisfied simltaneosly. For examle, sose two deices are members of both a SAME OIENTATION and a MIOED OIENTATION constraint; clearly these two constraints cannot be simltaneosly satisfied. Sch a condition is called an oerconstraint, and it is handled by relaxing (i.e. not enforcing) one or more of the constraints inoled in the oerconstraint, sch that the remaining constraints can be simltaneosly satisfied. The coloring algorithm, nlike the reios iteratie algorithm, allows total control oer the selection of which constraints to relax in order to resole oerconstraints. 2. PEVIOUS WOK To or knowledge, the literatre contains no reios work on this roblem. In the first release of or lacement rodct, soling orientation constraints was accomlished sing a simle iteratie algorithm. This algorithm roceeds as follows: Initially the orientation of eery deice is set to ndefined. Next the orientations of those deices on which there is a FIED OIENTATION constraint are set aroriately. The algorithm then reeats the following orientation roagation oeration: find an as-yet-nrocessed constraint, some of whose members orientations hae already been set, and set the orientations of the remaining deices in the constraint aroriately. If no sch constraint exists, then ick a deice whose orientation is ndefined and set its orientation arbitrarily, and reeat the orientation roagation loo. As mentioned aboe, this algorithm is sfficient to handle the

2 A Fixed (0) Same or? B C? Same or D Fixed (0) Figre 2. A Test Case for the Iteratie Algorithm. first three tyes of constraints, bt it faces a roblem when resented with a SAME O MIOED OIENTATION constraint. Within the local context of the constraints and deices being considered in each orientation roagation ste, there is insfficient information with which to choose whether to enforce a SAME O MIOED OIENTATION constraint as a SAME OIENTATION constraint or as a MIOED OIENTATION constraint. In or imlementation, one of the two was arbitrarily chosen; howeer, this can lead to sitations where no soltion is fond to a system of constraints that does, in fact, hae a soltion satisfying all constraints. Consider Figre 2, which illstrates a set of constraints on for deices A, B, C, andd. The algorithm begins by setting deices A and D to orientation 0. Howeer, it mst then decide whether to enforce each of the SAME O MIOED OIENTATION constraints as a SAME OI- ENTATION constraint or as a MIOED OIENTATION constraint. De to the MIOED OIENTATIONconstraint between B and C, the two SAME O MIOED OIENTATION constraints mst be enforced oositely one as a SAME OIENTATIONconstraint and the other as a MIOED OIENTATION constraint bt there is no way to determine this while considering only the constraints inoling deices whose orientations hae already been determined. One can easily deise a strategy to deal with this articlar test case, bt we can constrct a similar bt longer chain of SAME OI- ENTATION, MIOED OIENTATION,andSAME O MIOED OIENTATION constraints, terminated at the ends by FIED OI- ENTATION constraints, to defeat any sch ad hoc strategy. The iteratie algorithm also deals oorly with oerconstraints. The way they are handled in or imlementation was that if the orientation of a deice is already set, and a constraint now being considered wold force that deice to hae an orientation different from its crrent one, then there is an oerconstraint and the crrent constraint is relaxed. The iteratie algorithm has time comlexity O((n + m) 2 ), where n is the nmber of deices and m is the nmber of constraints. This rnning time cold robably be imroed by the se of sitable data strctres, bt in light of or new algorithm this hardly seems worthwhile. 3. THE COLOING ALGOITHM The key obseration leading to or coloring algorithm is that the orientation of a deice in the rectilinear metric can be reresented by the indeendent alication or nonalication of three oerations: otate the deice 90 degrees conterclockwise (90). Mirror the deice abot the x-axis (M). Mirror the deice abot the y-axis (M). If two or more of these oerations are alied, then they mst be alied in this order; i.e., 90 is alied before M or M, and M is alied before M. These oerations, if alied, start from the defalt orientation 0. Ths, each of the eight ossible orientations can be recisely and niqely described by choosing whether 90? M? M? 0 No No No M No es No M No No es 180 No es es 90 es No No 270 es es es M90 es es No M90 es No es Table 1. Oerations alied to rodce each orientation. or not to aly each of these oerations. Table 1 shows, for each of the orientations shown in Figre 1, which of these oerations are alied to rodce that orientation. We will now constrct three grahs. A grah G =(V; E) consists of a collection V of ertices and a collection E of edges, where each edge has two ertices and as endoints. Sch an edge is denoted (; ). Edges are ndirected, so (; ) and (; ) denote the same edge between ertices and. If edge (; ) is in E, then we say that and are adjacent and are one another s neighbors. The grahs will be colored sing two colors: red and green. A coloring is alid if, for eery edge (; ), ertices and hae different colors. Note that this imlies that if two ertices 1 and 2 are adjacent to a ertex i.e. ( 1;)and ( 2;)are both edges in E then 1 and 2 mst hae the same color. We will now constrct three grahs, denoted,, and, which corresond to the three orientation comonents 90, M, and M. In each grah, there is initially a ertex for each deice, and there are initially no edges. For a gien deice, the corresonding ertices in,, and are,,and, resectiely (if there is no danger of confsion, then these three ertices are collectiely referred to as ). We are going to color each of these three grahs sing two colors, red and green, sch that adjacent ertices hae different colors. After the grahs hae been sccessflly colored, if a ertex in is green, then the 90 oeration is to be alied to the corresonding deice; if is red, then the 90 oeration is not to be alied. Similarly, the colors of the ertices in and indicate whether the M and M oerations, resectiely, are to be alied to the deice corresonding to each ertex. Initially, the color of eery ertex is ndefined. A FIED OI- ENTATION constraint is imlemented for the deice corresonding to ertex by setting the colors of ertices,,and to the aroriate ales to imlement the orientation as rescribed in Table 1. We will now add edges and intermediate ertices between the ertices corresonding to deices inoled in each constraint, sch that a alid 2-coloring of each grah translates to an orientation for each deice sch that all constraints are satisfied. This is accomlished sing the fact that adjacent ertices mst hae different colors and airs of ertices each connected to an intermediate ertex mst hae the same color. A SAME OIENTATION constraint is imlemented as follows. If the constraint inoles more than two deices, then this oeration is alied airwise between an arbitrarily chosen deice A in the constraint and each additional deice in the constraint (clearly if all deices hae the same orientation as A, then they all hae the same orientation). For each sch air, let and be the ertices corresonding to the air of deices. Intermediate ertices,, and are added to,, and, resectiely. Edges ( ; ) and ( ; ) are added to, and similarly edges ( ; ) and ( ; ) are added to and edges ( ; ) and ( ; ) are added to.inthisway, and are forced to be colored the same color, as are and as well as and. Ths, the

3 Figre 3. The ertices and edges added for a SAME OIENTA- TION constraint. Figre 5. The ertices and edges added for a SAME O MI- OED OIENTATION constraint abot the x-axis. Figre 4. The ertices and edges added for a MIOED OI- ENTATION constraint abot the x-axis. deices corresonding to and are forced to hae the same orientation. This configration is shown in Figre 3. A MIOED OIENTATION constraint is imlemented as follows. Assme withot loss of generality that the constraint is with resect tothe x-axis. A MIOED OIENTATION constraint mst inclde exactly two deices; let and be the ertices corresonding to these two deices. Intermediate ertices and are added to and, resectiely. Edges ( ; ) and ( ; ) are added to, and edges ( ; )and ( ; )are added to. A single edge ( ; )withot an intermediate ertex is added to. Inthisway, and are forced to hae the same color, as are and. The ertices and are forced to hae different colors. Insection of Figre 1 and Table 1 shows that this forces the deices corresonding to and to hae mirrored orientation abot the x-axis. This configration is illstrated in Figre 4. The imlementation of a MIOED OIENTATION constraint with resect to the y-axis is similar, bt with and reersed throghot. That is, we add ertex and edges ( ; ) and ( ; ) to, weaddertex and edges ( ; ) and ( ; )to, and we add edge ( ; )to. The final constraint is the SAME O MIOED OIENTATION constraint. Again, assme withot loss of generality that the constraint is abot the x-axis. This tye of constraint can inclde more than two deices; as with the SAME OIENTATION constraint, the following oeration is alied airwise between an arbitrarily cho- sen deice A in the constraint and each additional deice in the constraint (again, if all deices satisfy the constraint with resect to A, then they mst satisfy it with resect to one another). For each sch air, let and be the corresonding air of ertices. We again add intermediate ertex and edges ( ; ) and ( ; )to and add intermediate ertex and edges ( ; ) and ( ; )to. No edge is added between and.inthis way, ertices and mst hae the same color, as mst ertices and. Vertices and may either hae the same color, in which case the deices corresonding to and will hae the same orientation, or they may hae different colors, in which case the deices corresonding to and will hae mirrored orientation abot the x-axis (again, this can be erified by examining Figre 1 and Table 1). This configration is illstrated in Figre 5. Again, a SAME O MIOED OIENTATION constraint abot the y-axis is similar, bt with and reersed throghot. That is, we add ertex and edges ( ; )and ( ; )to, and we add ertex and edges ( ; )and ( ; )to. We hae shown how to constrct grahs,,and sch that a alid 2-coloring of each grah translates to an orientation for each deice sch that all constraints are satisfied. What remains to be shown is how to comte sch a coloring, and how to deal with oerconstraints. In the absence of oerconstraints, a 2-coloring of each grah can be easily comted in time linear in the nmber of ertices and edges in the grah. One way to do so is by sing a dethfirst search (see Cormen, Leiserson, and iest [1, ], for a descrition of deth-first search, and see Kozen [2,. 119], for an exlanation of 2-coloring sing deth-first search). First, choose a ertex whose color has already been set de to a FIED OIENTATION constraint. If no sch ertex exists, then choose an arbitrary ertex and assign it the color green (in the latter case, there are at least two alid soltions with oosite colors, so the choice of color for the starting ertex is irreleant). We add afieldarent() to each ertex ; the contents of this field will be the ertex that was isited before. Now, aly the following rocedre starting from.

4 Color(): For each neighbor of not already colored: 1. Assign the oosite color from 2. Set arent()to 3. Color() In the absence of oerconstraints, when this rocedre comletes it will hae rodced a alid 2-coloring of the grah. An oerconstraint can be recognized if, in Ste (1) aboe, a neighbor of has already been assigned the same color as. In this case, the grah edges corresonding to the constraints in the oerconstraint either form a cycle, or else they form a ath whose endoints are ertices whose colors were assigned de to a FIED OIENTATION constraint. Using the arent field, we trace backward from ntil we either enconter again or enconter a ertex whose color was assigned de to a FIED OIENTATION constraint. One of these two eents mst occr, since if we do not enconter a ertex whose color was assigned de to a FIED OIENTATION constraint, then we mst find a cycle starting and ending at,orelsearent() wold be eqal to. Haing fond the oerconstraint, we form a set of constraints corresonding to the edges that the algorithm traced, ls the edge (; ). We ass this set of constraints to a rocedre that relaxes one of the constraints, and then we start all oer, bild the grahs,, and, and attemt to 2-color them again. This rocedre is reeated once for each oerconstraint ntil all oerconstraints hae been resoled and we rodce a alid 2-coloring of each grah. The criteria sed by the rocedre to decide which constraint to relax are indeendent of the algorithm; i.e., the algorithm works correctly regardless of which constraint the rocedre chooses to relax. Note that this differs from the way oerconstraints are handled by the iteratie algorithm, which simly relaxes the constraint it is crrently considering at the time the oerconstraint is detected. Once a alid 2-coloring has been comted, it is simle to translate the colors of each trio of ertices back into an orientation for the corresonding deice, sing the translations gien in Table 1. When this is done, each deice will hae been assigned an orientation sch that all constraints that were not relaxed de to oerconstraints are satisfied. Each coloring attemt reqires O(n + m) time [2], where n is the nmber of deices and m is the nmber of constraints (which is within a constant mltile of the nmber of edges in the grahs). This rocess, as well as the rocedre that decides which constraint in an oerconstraint to relax, is reeated once each time an oerconstraint is fond. Ths, if there are c oerconstraints and f (n; m) is the time reqired by the oerconstraint resoltion rocedre, then the total time reqired is O(c(n + m + f (n; m))). A tyical oerconstraint resoltion rocedre reqires at most O(n + m) time itself, which makes the total time reqired eqal to O(c(n + m)). In the actal imlementation, there is no need to constrct three searate grahs. Instead, one can comte a single grah, each of whose ertices contains three searate colors and three searate sets of edges (one for each of,, and ). In addition, there is no need to exlicitly add the intermediate ertices; rather, one can simly set a flag on the aroriate edges sch that they are treated as thogh were resent. In addition, it might be ossible to reconstrct only the ortions of the grahs inoled in an oerconstraint when one is fond, rather than reconstrcting the grahs entirely and 2-coloring them from scratch. Howeer, there are tyically few or no oerconstraints, and the algorithm rns in linear time for each oerconstraint, so this otimization is robably not cost-effectie. Time (seconds) Deices Constraints Figre 6. nning times for the gien nmbers of deices and constraints. 4. EPEIMENTAL ESULTS Or coloring algorithm has been imlemented as art of a Cadence lacement rodct. Exerimental reslts of rnning the algorithm on a nmber of randomly generated test cases are shown in Figre 6 (detailed nmerical data aailable on reqest). The test cases are randomly generated so as to aoid the most degenerate tyes of oerconstraints: constraints between two deices that both hae fixed orientation, and mltile constraints of different tyes between the same air of deices. Each tye of constraint is eqally robable. Each data oint is the reslt of rnning 1000 tests. Note that becase or test cases are randomly generated, desite being generated as to aoid simle tyes of oerconstraints, they still contain far more oerconstraints than wold a tyical real design. The majority of the rnning time of the algorithm on this test data is sent dealing with these oerconstraints, as eidenced by the fact that for large nmbers of constraints the rnning time actally decreases with increasing nmbers of deices, de to fewer oerconstraints. We can get more realistic measrements by rnning on test cases with the nmber of constraints eqal to half the nmber of deices. In sch test cases, we see aroximately one oerconstraint for eery 50 constraints, whereas for the first set of data we often see one or more oerconstraints for eery two constraints. The reslts of rnning on these more realistic test cases are shown in Figre CONCLUSIONS We hae resented an efficient algorithm that ses grah coloring to sole an imortant sbroblem in constraint-drien lacement: soling systems of orientation constraints. This algorithm is more efficient than its redecessor, handles oerconstraints more effectiely, and finds soltions in difficlt cases that defeated the reios algorithm. While we hae discssed only the for constraints that were interesting in or alication, this techniqe can enforce any arbitrary constraint that inoles a fixed, same, or different relation among the three orientation comonents 90, M, and M. For examle, one alication that arose after the initial imlementation of this algorithm was comlete was in the lacer s handling of fences. One can define a rectanglar region called a fence, and then reqire that certain deices be laced within the fence. In

5 nning time (seconds) Deices (= Constraints * 2) Figre 7. nning times with the gien nmbers of deices and half that many constraints. The bars indicate the actal rnning time, and the line is a cre of O(c(n+m)) fit to the actal data. some cases, if the fence and a deice that it will contain are both long and thin, then the deice may only fit if it is oriented sch that its long dimension matches that of the fence. In other words, we wold like to enforce for this deice that the 90 comonent of its orientation be fixed, while the M and M comonents are free to ary. This is easily handled by or algorithm. In addition, the techniqe can be easily generalized to handle more general sets of orientations, as long as they can be niqely described by a discrete set of indeendent rotation and reflection oerations. 6. ACKNOWLEDGMENTS Thanks to Enrico Malaasi and Kathy Jones for many helfl comments. The algorithm described here is atent ending. EFEENCES [1] COMEN, T.H.,LEISESON, C.E., AND IVEST,.L. Introdction to Algorithms. MIT Press, Cambridge, Massachsetts, [2] KOZEN, D. The Design and Analysis of Algorithms. Sringer- Verlag, 1992.

Point Location. The Slab Method. Optimal Schemes. The Slab Method. Preprocess a planar, polygonal subdivision for point location queries.

Point Location. The Slab Method. Optimal Schemes. The Slab Method. Preprocess a planar, polygonal subdivision for point location queries. Point Location The Slab Method Prerocess a lanar, olygonal sbdiision for oint location qeries. = (18, 11) raw a ertical line throgh each ertex. This decomoses the lane into slabs. In each slab, the ertical

More information

A Distributed Algorithm for Deadlock Detection and Resolution

A Distributed Algorithm for Deadlock Detection and Resolution A Distribted Algorithm for Deadlock Detection and Resoltion Don P. Mitchell Michael J. Merritt AT&T Bell Laboratories ABSTRACT This aer resents two distribted algorithms for detecting and resoling deadlocks.

More information

Revisiting Connected Dominating Sets: An Optimal Local Algorithm?

Revisiting Connected Dominating Sets: An Optimal Local Algorithm? Reisiting Connected Dominating Sets: An Otimal Local Algorithm? Samir Khller Deartment of Comter Science Uniersity of Maryland College Park, MD 0740, USA Email: samir@md.ed Sheng Yang Deartment of Comter

More information

Lemma 1 Let the components of, Suppose. Trees. A tree is a graph which is. (a) Connected and. (b) has no cycles (acyclic). (b)

Lemma 1 Let the components of, Suppose. Trees. A tree is a graph which is. (a) Connected and. (b) has no cycles (acyclic). (b) Trees Lemma Let the components of ppose "! be (a) $&%('*)+ - )+ / A tree is a graph which is (b) 0 %(')+ - 3)+ / 6 (a) (a) Connected and (b) has no cycles (acyclic) (b) roof Eery path 8 in which is not

More information

Reconstructing Generalized Staircase Polygons with Uniform Step Length

Reconstructing Generalized Staircase Polygons with Uniform Step Length Jornal of Graph Algorithms and Applications http://jgaa.info/ ol. 22, no. 3, pp. 431 459 (2018) DOI: 10.7155/jgaa.00466 Reconstrcting Generalized Staircase Polygons with Uniform Step Length Nodari Sitchinaa

More information

Pushing squares around

Pushing squares around Pshing sqares arond Adrian Dmitresc János Pach Ý Abstract We stdy dynamic self-reconfigration of modlar metamorphic systems. We garantee the feasibility of motion planning in a rectanglar model consisting

More information

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation Maximal Cliqes in Unit Disk Graphs: Polynomial Approximation Rajarshi Gpta, Jean Walrand, Oliier Goldschmidt 2 Department of Electrical Engineering and Compter Science Uniersity of California, Berkeley,

More information

Integrated control of RTUs and refrigeration equipment in convenience stores

Integrated control of RTUs and refrigeration equipment in convenience stores Prde University Prde e-pbs International High Performance Bildings Conference School of Mechanical Engineering 2016 Integrated control of RTUs and refrigeration eqiment in convenience stores Donghn Kim

More information

CMSC 425: Lecture 16 Motion Planning: Basic Concepts

CMSC 425: Lecture 16 Motion Planning: Basic Concepts : Lecture 16 Motion lanning: Basic Concets eading: Today s material comes from various sources, including AI Game rogramming Wisdom 2 by S. abin and lanning Algorithms by S. M. LaValle (Chats. 4 and 5).

More information

Networks An introduction to microcomputer networking concepts

Networks An introduction to microcomputer networking concepts Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES

More information

Planarity-Preserving Clustering and Embedding for Large Planar Graphs

Planarity-Preserving Clustering and Embedding for Large Planar Graphs Planarity-Presering Clstering and Embedding for Large Planar Graphs Christian A. Dncan, Michael T. Goodrich, and Stephen G. Koboro Center for Geometric Compting The Johns Hopkins Uniersity Baltimore, MD

More information

grid. In this chapter we consider the drawings of 3-planar graphs on a hexagonal

grid. In this chapter we consider the drawings of 3-planar graphs on a hexagonal Chater Hexagonal Drawings In Chater we considered the drawings of - and -lanar grahs on a rectilinear grid. In this chater we consider the drawings of -lanar grahs on a hexagonal grid. In a hexagonal grid

More information

Chapter 5 Network Layer

Chapter 5 Network Layer Chapter Network Layer Network layer Physical layer: moe bit seqence between two adjacent nodes Data link: reliable transmission between two adjacent nodes Network: gides packets from the sorce to destination,

More information

On shortest-path all-optical networks without wavelength conversion requirements

On shortest-path all-optical networks without wavelength conversion requirements Research Collection Working Paper On shortest-path all-optical networks withot waelength conersion reqirements Athor(s): Erlebach, Thomas; Stefanakos, Stamatis Pblication Date: 2002 Permanent Link: https://doi.org/10.3929/ethz-a-004446054

More information

Curve Modeling (Spline) Dr. S.M. Malaek. Assistant: M. Younesi

Curve Modeling (Spline) Dr. S.M. Malaek. Assistant: M. Younesi Crve Modeling Sline Dr. S.M. Malae Assistant: M. Yonesi Crve Modeling Sline Crve Control Points Convex Hll Shae of sline crve Interolation Slines Aroximation Slines Continity Conditions Parametric & Geometric

More information

Tdb: A Source-level Debugger for Dynamically Translated Programs

Tdb: A Source-level Debugger for Dynamically Translated Programs Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,

More information

COMPOSITION OF STABLE SET POLYHEDRA

COMPOSITION OF STABLE SET POLYHEDRA COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining

More information

Faster Random Walks By Rewiring Online Social Networks On-The-Fly

Faster Random Walks By Rewiring Online Social Networks On-The-Fly 1 Faster Random Walks By Rewiring Online ocial Networks On-The-Fly Zhojie Zho 1, Nan Zhang 2, Zhigo Gong 3, Gatam Das 4 1,2 Compter cience Department, George Washington Uniersity 1 rexzho@gw.ed 2 nzhang10@gw.ed

More information

Object Pose from a Single Image

Object Pose from a Single Image Object Pose from a Single Image How Do We See Objects in Depth? Stereo Use differences between images in or left and right eye How mch is this difference for a car at 00 m? Moe or head sideways Or, the

More information

Locating and Bypassing Routing Holes in Sensor Networks

Locating and Bypassing Routing Holes in Sensor Networks Locating and Byassing Roting Holes in Sensor Networks Qing Fang Deartment of Electrical Engineering Stanford Uniersity Stanford, A 94305 E-mail: jqfang@stanford.ed Jie Gao Deartment of omter Science Stanford

More information

On Plane Constrained Bounded-Degree Spanners

On Plane Constrained Bounded-Degree Spanners Algorithmica manscript No. (ill be inserted by the editor) 1 On Plane Constrained Bonded-Degree Spanners 2 3 Prosenjit Bose Rolf Fagerberg André an Renssen Sander Verdonschot 4 5 Receied: date / Accepted:

More information

Mobility Control and Its Applications in Mobile Ad Hoc Networks

Mobility Control and Its Applications in Mobile Ad Hoc Networks Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai Department of Compter Science and Engineering Florida Atlantic Uniersity Boca Raton, FL 3331 Abstract Most existing localized

More information

Faster Random Walks By Rewiring Online Social Networks On-The-Fly

Faster Random Walks By Rewiring Online Social Networks On-The-Fly Faster Random Walks By Rewiring Online ocial Networks On-The-Fly Zhojie Zho 1, Nan Zhang 2, Zhigo Gong 3, Gatam Das 4 1,2 Compter cience Department, George Washington Uniersity 1 rexzho@gw.ed 2 nzhang10@gw.ed

More information

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un Dynamic Maintenance of Majority Information in Constant Time per Update? Gdmnd S. Frandsen and Sven Skym BRICS 1 Department of Compter Science, University of arhs, Ny Mnkegade, DK-8000 arhs C, Denmark

More information

A Method to Determine End-Points ofstraight Lines Detected Using the Hough Transform

A Method to Determine End-Points ofstraight Lines Detected Using the Hough Transform RESEARCH ARTICLE OPEN ACCESS A Method to Detere End-Points ofstraight Lines Detected Using the Hough Transform Gideon Kanji Damaryam Federal University, Lokoja, PMB 1154, Lokoja, Nigeria. Abstract The

More information

Academy of Sciences, Beijing, China

Academy of Sciences, Beijing, China Adanced aterials Research Online: 2013-09-18 ISS: 1662-8985, Vols. 756-759, 1566-1570 doi:10.4028/www.scientific.net/ar.756-759.1566 2013 Trans Tech Pblications, Switzerland OVA:A P2P-Clod Vod System for

More information

Chapter 5. Plane Graphs and the DCEL

Chapter 5. Plane Graphs and the DCEL Chapter 5 Plane Graphs and the DCEL So far we hae been talking abot geometric strctres sch as trianglations of polygons and arrangements of line segments withot paying mch attention to how to represent

More information

Source Coding and express these numbers in a binary system using M log

Source Coding and express these numbers in a binary system using M log Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is

More information

A sufficient condition for spiral cone beam long object imaging via backprojection

A sufficient condition for spiral cone beam long object imaging via backprojection A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

SPACE-SCALE DIAGRAMS: UNDERSTANDING MULTISCALE INTERFACES

SPACE-SCALE DIAGRAMS: UNDERSTANDING MULTISCALE INTERFACES SPACE-SCALE DIAGRAMS: UNDERSTANDING MULTISCALE INTERFACES George W. Frnas Bellcore, 445 Soth Street Morristown, NJ 07962-1910 (201) 829-4289 gwf@bellcore.com Benjamin B. Bederson* Bellcore, 445 Soth Street

More information

Improving Network Connectivity Using Trusted Nodes and Edges

Improving Network Connectivity Using Trusted Nodes and Edges Improing Network Connectiity Using Trsted Nodes and Edges Waseem Abbas, Aron Laszka, Yegeniy Vorobeychik, and Xenofon Kotsokos Abstract Network connectiity is a primary attribte and a characteristic phenomenon

More information

Parallel Construction of Multidimensional Binary Search Trees. Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka

Parallel Construction of Multidimensional Binary Search Trees. Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka Parallel Construction of Multidimensional Binary Search Trees Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka School of CIS and School of CISE Northeast Parallel Architectures Center Syracuse

More information

ABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS

ABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS Proceedings th FIG Symposim on Deformation Measrements Santorini Greece 00. ABSOUTE DEFORMATION PROFIE MEASUREMENT IN TUNNES USING REATIVE CONVERGENCE MEASUREMENTS Mahdi Moosai and Saeid Khazaei Mining

More information

[1] Hopcroft, J., D. Joseph and S. Whitesides, Movement problems for twodimensional

[1] Hopcroft, J., D. Joseph and S. Whitesides, Movement problems for twodimensional Acknoledgement. The athors thank Bill Lenhart for interesting discssions on the recongration of rlers. References [1] Hopcroft, J., D. Joseph and S. Whitesides, Moement problems for todimensional linkages,

More information

Evaluating Influence Diagrams

Evaluating Influence Diagrams Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

Real-Time Robot Path Planning via a Distance-Propagating Dynamic System with Obstacle Clearance

Real-Time Robot Path Planning via a Distance-Propagating Dynamic System with Obstacle Clearance POSTPRINT OF: IEEE TRANS. SYST., MAN, CYBERN., B, 383), 28, 884 893. 1 Real-Time Robot Path Planning ia a Distance-Propagating Dynamic System with Obstacle Clearance Allan R. Willms, Simon X. Yang Member,

More information

3D SURFACE RECONSTRUCTION BASED ON COMBINED ANALYSIS OF REFLECTANCE AND POLARISATION PROPERTIES: A LOCAL APPROACH

3D SURFACE RECONSTRUCTION BASED ON COMBINED ANALYSIS OF REFLECTANCE AND POLARISATION PROPERTIES: A LOCAL APPROACH 3D SURFACE RECONSTRUCTION BASED ON COMBINED ANALYSIS OF REFLECTANCE AND POLARISATION PROPERTIES: A LOCAL APPROACH Pablo d Angelo and Christian Wöhler DaimlerChrysler Research and Technology, Machine Perception

More information

Localized Delaunay Triangulation with Application in Ad Hoc Wireless Networks

Localized Delaunay Triangulation with Application in Ad Hoc Wireless Networks 1 Localized Delanay Trianglation with Application in Ad Hoc Wireless Networks Xiang-Yang Li Gria Călinesc Peng-Jn Wan Y Wang Department of Compter Science, Illinois Institte of Technology, Chicago, IL

More information

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity

More information

Randomized algorithms: Two examples and Yao s Minimax Principle

Randomized algorithms: Two examples and Yao s Minimax Principle Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum

More information

Lecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.)

Lecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.) Advanced Algorithms Fall 2015 Lecture 3: Geometric Algorithms(Convex sets, Divide & Conuer Algo.) Faculty: K.R. Chowdhary : Professor of CS Disclaimer: These notes have not been subjected to the usual

More information

Optimal Sampling in Compressed Sensing

Optimal Sampling in Compressed Sensing Optimal Sampling in Compressed Sensing Joyita Dtta Introdction Compressed sensing allows s to recover objects reasonably well from highly ndersampled data, in spite of violating the Nyqist criterion. In

More information

An Extended Fault-Tolerant Link-State Routing Protocol in the Internet

An Extended Fault-Tolerant Link-State Routing Protocol in the Internet An Extended Falt-Tolerant Link-State Roting Protocol in the Internet Jie W, Xiaola Lin, Jiannong Cao z, and Weijia Jia x Department of Compter Science and Engineering Florida Atlantic Uniersit Boca Raton,

More information

THE METHOD OF A MATERIAL LOSS DETECTION FOR CYLINDRICAL SHAPE PARTS OF ELEMENTS WITH A 3D SCANNING APPLICATION

THE METHOD OF A MATERIAL LOSS DETECTION FOR CYLINDRICAL SHAPE PARTS OF ELEMENTS WITH A 3D SCANNING APPLICATION International Jornal of Modern Manfactring Technologies ISSN 2067 3604, Vol. V, No. 2 / 2013 THE METHOD OF A MATERIAL LOSS DETECTION FOR CYLINDRICAL SHAPE PARTS OF ELEMENTS WITH A 3D SCANNING APPLICATION

More information

Alliances and Bisection Width for Planar Graphs

Alliances and Bisection Width for Planar Graphs Alliances and Bisection Width for Planar Graphs Martin Olsen 1 and Morten Revsbæk 1 AU Herning Aarhs University, Denmark. martino@hih.a.dk MADAGO, Department of Compter Science Aarhs University, Denmark.

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introdction (forarding and roting) Reie of qeeing theor Roting algorithms Link state, Distance Vector Roter design and operation IP: Internet Protocol IP4 (datagram format, addressing, ICMP,

More information

4.13 Advanced Topic: An Introduction to Digital Design Using a Hardware Design Language 345.e1

4.13 Advanced Topic: An Introduction to Digital Design Using a Hardware Design Language 345.e1 .3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage 35.e.3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage to Describe and odel a Pipeline

More information

Extracting Optimal Paths from Roadmaps for Motion Planning

Extracting Optimal Paths from Roadmaps for Motion Planning Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu

More information

Multiple Source Shortest Paths in a Genus g Graph

Multiple Source Shortest Paths in a Genus g Graph Mltiple Sorce Shortest Paths in a Gens g Graph Sergio Cabello Erin W. Chambers Abstract We gie an O(g n log n) algorithm to represent the shortest path tree from all the ertices on a single specified face

More information

On Bichromatic Triangle Game

On Bichromatic Triangle Game On Bichromatic Triangle Game Gordana Manić Daniel M. Martin Miloš Stojakoić Agst 16, 2012 Abstract We stdy a combinatorial game called Bichromatic Triangle Game, defined as follows. Two players R and B

More information

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Journal of Comuting and Information Technology - CIT 8, 2000, 1, 1 12 1 Comlexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Eunice E. Santos Deartment of Electrical

More information

OPTI-502 Optical Design and Instrumentation I John E. Greivenkamp Homework Set 11 Fall, 2018

OPTI-502 Optical Design and Instrumentation I John E. Greivenkamp Homework Set 11 Fall, 2018 Assigned: 11/14/18 Lectre 24 De: 11/21/18 Lectre 26 11-1) A 200 mm x 300 mm monochrome monitor is to be viewed b an observer at a distance of 0.5 m. The desired image qalit is to be excellent as determined

More information

Equality-Based Translation Validator for LLVM

Equality-Based Translation Validator for LLVM Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented

More information

CS 450: COMPUTER GRAPHICS 2D TRANSFORMATIONS SPRING 2016 DR. MICHAEL J. REALE

CS 450: COMPUTER GRAPHICS 2D TRANSFORMATIONS SPRING 2016 DR. MICHAEL J. REALE CS 45: COMUTER GRAHICS 2D TRANSFORMATIONS SRING 26 DR. MICHAEL J. REALE INTRODUCTION Now that we hae some linear algebra under our resectie belts, we can start ug it in grahics! So far, for each rimitie,

More information

Directed File Transfer Scheduling

Directed File Transfer Scheduling Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was

More information

Introduction to Parallel Algorithms

Introduction to Parallel Algorithms CS 1762 Fall, 2011 1 Introduction to Parallel Algorithms Introduction to Parallel Algorithms ECE 1762 Algorithms and Data Structures Fall Semester, 2011 1 Preliminaries Since the early 1990s, there has

More information

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands

More information

Truth Trees. Truth Tree Fundamentals

Truth Trees. Truth Tree Fundamentals Truth Trees 1 True Tree Fundamentals 2 Testing Grous of Statements for Consistency 3 Testing Arguments in Proositional Logic 4 Proving Invalidity in Predicate Logic Answers to Selected Exercises Truth

More information

OPTI-502 Optical Design and Instrumentation I John E. Greivenkamp Homework Set 9 Fall, 2018

OPTI-502 Optical Design and Instrumentation I John E. Greivenkamp Homework Set 9 Fall, 2018 OPTI-502 Optical Design and Instrmentation I John E. Greivenkamp Assigned: 10/31/18 Lectre 21 De: 11/7/18 Lectre 23 Note that in man 502 homework and exam problems (as in the real world!!), onl the magnitde

More information

GEOMETRIC CONSTRAINT SOLVING IN < 2 AND < 3. Department of Computer Sciences, Purdue University. and PAMELA J. VERMEER

GEOMETRIC CONSTRAINT SOLVING IN < 2 AND < 3. Department of Computer Sciences, Purdue University. and PAMELA J. VERMEER GEOMETRIC CONSTRAINT SOLVING IN < AND < 3 CHRISTOPH M. HOFFMANN Deartment of Comuter Sciences, Purdue University West Lafayette, Indiana 47907-1398, USA and PAMELA J. VERMEER Deartment of Comuter Sciences,

More information

Comprehensive performance model of differentiated service with token bucket marker

Comprehensive performance model of differentiated service with token bucket marker Comrehensive erformance model of differentiated service with token bcket marker H. S and M. Atiqzzaman Abstract: Differentiated services (DiffServ) networks se two tye of roters: edge roters mark the acket

More information

Efficient Parallel Hierarchical Clustering

Efficient Parallel Hierarchical Clustering Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore

More information

Graph Cut Matching In Computer Vision

Graph Cut Matching In Computer Vision Grah Cut Matching In Comuter Vision Toby Collins (s0455374@sms.ed.ac.uk) February 2004 Introduction Many of the roblems that arise in early vision can be naturally exressed in terms of energy minimization.

More information

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003 From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information

More information

Functions of Combinational Logic

Functions of Combinational Logic CHPTER 6 Fnctions of Combinational Logic CHPTER OUTLINE 6 6 6 6 6 5 6 6 6 7 6 8 6 9 6 6 Half and Fll dders Parallel inary dders Ripple Carry and Look-head Carry dders Comparators Decoders Encoders Code

More information

In Search of a Key Value Store with High Performance and High Availability

In Search of a Key Value Store with High Performance and High Availability In Search of a Key Vale Store with High Performance and High Availability Haibing Jian Yean Zh Yongchao Long Bin Li Sh Wang Xiliang W Zhich Zhong YY Inc. Jiaying University of China {jianhaibing1, zhyean,

More information

Lecture 8: Orthogonal Range Searching

Lecture 8: Orthogonal Range Searching CPS234 Comutational Geometry Setember 22nd, 2005 Lecture 8: Orthogonal Range Searching Lecturer: Pankaj K. Agarwal Scribe: Mason F. Matthews 8.1 Range Searching The general roblem of range searching is

More information

The Disciplined Flood Protocol in Sensor Networks

The Disciplined Flood Protocol in Sensor Networks The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab

More information

Hardware-Accelerated Formal Verification

Hardware-Accelerated Formal Verification Hardare-Accelerated Formal Verification Hiroaki Yoshida, Satoshi Morishita 3 Masahiro Fujita,. VLSI Design and Education Center (VDEC), University of Tokyo. CREST, Jaan Science and Technology Agency 3.

More information

Complete Information Pursuit Evasion in Polygonal Environments

Complete Information Pursuit Evasion in Polygonal Environments Complete Information Prsit Easion in Polygonal Enironments Kyle Klein and Sbhash Sri Department of Compter Science Uniersity of California Santa Barbara, CA 9306 Abstract Sppose an npredictable eader is

More information

An Approximate Analytical Performance Model for Multistage Interconnection Networks with Backpressure Blocking Mechanism

An Approximate Analytical Performance Model for Multistage Interconnection Networks with Backpressure Blocking Mechanism JOURNAL OF COMMUNICATIONS, VOL. 5, NO. 3, MARCH 47 An Aroximate Analytical Performance Model for Mltistage Interconnection Networs with Bacressre Blocing Mechanism John Garofalais eartment of Comter Engineering

More information

POWER-OF-2 BOUNDARIES

POWER-OF-2 BOUNDARIES Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of

More information

Cutting Cycles of Rods in Space: Hardness and Approximation

Cutting Cycles of Rods in Space: Hardness and Approximation Ctting Cycles of Rods in Space: Hardness and pproximation oris rono ark de erg Chris Gray Elena mford bstract We stdy the problem of ctting a set of rods (line segments in R 3 ) into fragments, sing a

More information

Lecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model.

Lecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model. U.C. Berkeley CS273: Parallel and Distributed Theory Lecture 18 Professor Satish Rao Lecturer: Satish Rao Last revised Scribe so far: Satish Rao (following revious lecture notes quite closely. Lecture

More information

Hardware-Accelerated Free-Form Deformation

Hardware-Accelerated Free-Form Deformation Hardware-Accelerated Free-Form Deformation Clint Cha and Ulrich Nemann Compter Science Department Integrated Media Systems Center University of Sothern California Abstract Hardware-acceleration for geometric

More information

Ma Lesson 18 Section 1.7

Ma Lesson 18 Section 1.7 Ma 15200 Lesson 18 Section 1.7 I Representing an Ineqality There are 3 ways to represent an ineqality. (1) Using the ineqality symbol (sometime within set-bilder notation), (2) sing interval notation,

More information

Assigning AS Relationships to Satisfy the Gao-Rexford Conditions

Assigning AS Relationships to Satisfy the Gao-Rexford Conditions Assigning AS Relationships to Satisfy the Gao-Rexford Conditions Lca Cittadini, Giseppe Di Battista, Thomas Erlebach, Marizio Patrignani, and Massimo Rimondini Dept. of Compter Science and Atomation, Roma

More information

Towards applications based on measuring the orbital angular momentum of light

Towards applications based on measuring the orbital angular momentum of light CHAPTER 8 Towards applications based on measring the orbital anglar momentm of light Efficient measrement of the orbital anglar momentm (OAM) of light has been a longstanding problem in both classical

More information

CS649 Sensor Networks IP Track Lecture 6: Graphical Models

CS649 Sensor Networks IP Track Lecture 6: Graphical Models CS649 Sensor Networks IP Track Lecture 6: Grahical Models I-Jeng Wang htt://hinrg.cs.jhu.edu/wsn06/ Sring 2006 CS 649 1 Sring 2006 CS 649 2 Grahical Models Grahical Model: grahical reresentation of joint

More information

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture

More information

Fast Obstacle Detection using Flow/Depth Constraint

Fast Obstacle Detection using Flow/Depth Constraint Fast Obstacle etection sing Flow/epth Constraint S. Heinrich aimlerchrylser AG P.O.Box 2360, -89013 Ulm, Germany Stefan.Heinrich@aimlerChrysler.com Abstract The early recognition of potentially harmfl

More information

Minimal Edge Addition for Network Controllability

Minimal Edge Addition for Network Controllability This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,

More information

Friend of My Friend: Network Formation with Two-Hop Benefit

Friend of My Friend: Network Formation with Two-Hop Benefit Friend of My Friend: Network Formation with Two-Hop Benefit Elliot Ansheleich, Onkar Bhardwaj, and Michael Usher Rensselaer Polytechnic Institte, Troy NY, USA Abstract. How and why people form ties is

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

(2, 4) Tree Example (2, 4) Tree: Insertion

(2, 4) Tree Example (2, 4) Tree: Insertion Presentation for se with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 B-Trees and External Memory (2, 4) Trees Each internal node has 2 to 4 children:

More information

ARRAY ANTENNA DIAGNOSTICS WITH THE 3D RECONSTRUCTION ALGORITHM

ARRAY ANTENNA DIAGNOSTICS WITH THE 3D RECONSTRUCTION ALGORITHM ARRAY ANTENNA DIAGNOSTICS WITH THE 3D RECONSTRUCTION ALGORITHM Cecilia Cappellin 1, Peter Meincke 1, Sergey Pinenko 2, Erik Jørgensen 1 1 TICRA, Læderstræde 34, DK-1201 Copenhagen, Denmark 2 DTU Elektro,

More information

On Plane Constrained Bounded-Degree Spanners

On Plane Constrained Bounded-Degree Spanners On Plane Constrained Bonded-Degree Spanners Prosenjit Bose 1, Rolf Fagerberg 2, André an Renssen 1, Sander Verdonschot 1 1 School of Compter Science, Carleton Uniersity, Ottaa, Canada. Email: jit@scs.carleton.ca,

More information

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links

More information

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna

More information

CS 557 Lecture IX. Drexel University Dept. of Computer Science

CS 557 Lecture IX. Drexel University Dept. of Computer Science CS 7 Lectre IX Dreel Uniersity Dept. of Compter Science Fall 00 Shortest Paths Finding the Shortest Paths in a graph arises in many different application: Transportation Problems: Finding the cheapest

More information

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,

More information

Constructing Multiple Light Multicast Trees in WDM Optical Networks

Constructing Multiple Light Multicast Trees in WDM Optical Networks Constrcting Mltiple Light Mlticast Trees in WDM Optical Networks Weifa Liang Department of Compter Science Astralian National University Canberra ACT 0200 Astralia wliang@csaneda Abstract Mlticast roting

More information

Mathematical model for storing and effective processing of directed graphs in semistructured data management systems

Mathematical model for storing and effective processing of directed graphs in semistructured data management systems Mathematical model for storing and effectie processing of directed graphs in semistrctred data management MALIKOV A, GULEVSKIY Y, PARKHOMENKO D Information Systems and Technologies Department North Cacass

More information

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1 Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and

More information

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal

More information

A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA

A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA Mei Zho*, Ling-li Tang, Chan-rong Li, Zhi Peng, Jing-mei Li Academy of Opto-Electronics, Chinese Academy of Sciences, No.9, Dengzhang

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 9: Synchronization (1) Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Cooperation between Threads

More information

Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication

Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication Using Permuted States and Validated Simulation to Analyze Conflict Rates in Otimistic Relication An-I A. Wang Comuter Science Deartment Florida State University Geoff H. Kuenning Comuter Science Deartment

More information