EFFICIENT SOLUTION OF SYSTEMS OF ORIENTATION CONSTRAINTS
|
|
- Anabel Griffith
- 5 years ago
- Views:
Transcription
1 EFFICIENT SOLUTION OF SSTEMS OF OIENTATION CONSTAINTS Joseh L. Ganley Cadence Design Systems, Inc. ABSTACT One sbtask in constraint-drien lacement is enforcing a set of orientation constraints on the deices being laced. Sch constraints are created in order to, for examle, imlement matching constraints or enforce reglarity among members of an array of deices. Here we resent an efficient algorithm for soling systems of discrete orientation constraints. The algorithm handles oerconstraints by selectiely relaxing constraints ntil the remaining set can all be simltaneosly enforced. The algorithm rns in linear time in the absence of oerconstraints. 1. INTODUCTION Part of the constraint-drien lacement roblem is finding a set of orientations for the deices being laced that satisfies certain orientation constraints. In this aer we resent an efficient algorithm that soles this roblem. It has been imlemented in the rectilinear metric for for tyes of orientation constraints, and can be easily extended to other metrics and other tyes of orientation constraints. For clarity of exosition, we focs on the rectilinear model, in which only horizontal and ertical lines are allowed, since this is the model we se in or imlementation and nder which most integrated circits are fabricated. (Note, howeer, that or algorithm is alicable to any metric in which the orientation of a deice can be described by a finite seqence of indeendent rotations and/or reflections.) In the rectilinear model, there are eight ossible orientations of a deice, which are shown in Figre 1 (we se the standard Cadence nomenclatre to describe them). With resect to these orientations, the following constraints are defined: AsingledeicehasFIED OIENTATION set to one of the eight orientations. Eery deice in a set of two or more mst hae the SAME OIENTATION. A air of deices mst hae MIOED OIENTATION abot either the x-ory-axis. Eery deice in a set of two or more mst hae either the SAME O MIOED OIENTATION (if mirrored, then abot either the x-ory-axis). 0 M M M90 M90 Figre 1. The eight ossible orientations. Here we resent an efficient algorithm that ses grah coloring to sole the following roblem: gien a set of deices and a set of constraints on these deices, where each constraint is one of the for described aboe, choose an orientation for each deice sch that all the constraints are satisfied (if ossible; see below). If one is only concerned with the first three of these tyes of constraints, then a simle iteratie algorithm that roagates orientations ot from the deices with fixed orientations sffices to sole this roblem. Howeer, not only is the coloring algorithm more efficient than sch an iteratie algorithm, bt it also handles SAME O MIOED OIENTATION constraints. The iteratie techniqe is insfficient to handle sch constraints; details are gien in the next section. Sometimes all constraints cannot be satisfied simltaneosly. For examle, sose two deices are members of both a SAME OIENTATION and a MIOED OIENTATION constraint; clearly these two constraints cannot be simltaneosly satisfied. Sch a condition is called an oerconstraint, and it is handled by relaxing (i.e. not enforcing) one or more of the constraints inoled in the oerconstraint, sch that the remaining constraints can be simltaneosly satisfied. The coloring algorithm, nlike the reios iteratie algorithm, allows total control oer the selection of which constraints to relax in order to resole oerconstraints. 2. PEVIOUS WOK To or knowledge, the literatre contains no reios work on this roblem. In the first release of or lacement rodct, soling orientation constraints was accomlished sing a simle iteratie algorithm. This algorithm roceeds as follows: Initially the orientation of eery deice is set to ndefined. Next the orientations of those deices on which there is a FIED OIENTATION constraint are set aroriately. The algorithm then reeats the following orientation roagation oeration: find an as-yet-nrocessed constraint, some of whose members orientations hae already been set, and set the orientations of the remaining deices in the constraint aroriately. If no sch constraint exists, then ick a deice whose orientation is ndefined and set its orientation arbitrarily, and reeat the orientation roagation loo. As mentioned aboe, this algorithm is sfficient to handle the
2 A Fixed (0) Same or? B C? Same or D Fixed (0) Figre 2. A Test Case for the Iteratie Algorithm. first three tyes of constraints, bt it faces a roblem when resented with a SAME O MIOED OIENTATION constraint. Within the local context of the constraints and deices being considered in each orientation roagation ste, there is insfficient information with which to choose whether to enforce a SAME O MIOED OIENTATION constraint as a SAME OIENTATION constraint or as a MIOED OIENTATION constraint. In or imlementation, one of the two was arbitrarily chosen; howeer, this can lead to sitations where no soltion is fond to a system of constraints that does, in fact, hae a soltion satisfying all constraints. Consider Figre 2, which illstrates a set of constraints on for deices A, B, C, andd. The algorithm begins by setting deices A and D to orientation 0. Howeer, it mst then decide whether to enforce each of the SAME O MIOED OIENTATION constraints as a SAME OI- ENTATION constraint or as a MIOED OIENTATION constraint. De to the MIOED OIENTATIONconstraint between B and C, the two SAME O MIOED OIENTATION constraints mst be enforced oositely one as a SAME OIENTATIONconstraint and the other as a MIOED OIENTATION constraint bt there is no way to determine this while considering only the constraints inoling deices whose orientations hae already been determined. One can easily deise a strategy to deal with this articlar test case, bt we can constrct a similar bt longer chain of SAME OI- ENTATION, MIOED OIENTATION,andSAME O MIOED OIENTATION constraints, terminated at the ends by FIED OI- ENTATION constraints, to defeat any sch ad hoc strategy. The iteratie algorithm also deals oorly with oerconstraints. The way they are handled in or imlementation was that if the orientation of a deice is already set, and a constraint now being considered wold force that deice to hae an orientation different from its crrent one, then there is an oerconstraint and the crrent constraint is relaxed. The iteratie algorithm has time comlexity O((n + m) 2 ), where n is the nmber of deices and m is the nmber of constraints. This rnning time cold robably be imroed by the se of sitable data strctres, bt in light of or new algorithm this hardly seems worthwhile. 3. THE COLOING ALGOITHM The key obseration leading to or coloring algorithm is that the orientation of a deice in the rectilinear metric can be reresented by the indeendent alication or nonalication of three oerations: otate the deice 90 degrees conterclockwise (90). Mirror the deice abot the x-axis (M). Mirror the deice abot the y-axis (M). If two or more of these oerations are alied, then they mst be alied in this order; i.e., 90 is alied before M or M, and M is alied before M. These oerations, if alied, start from the defalt orientation 0. Ths, each of the eight ossible orientations can be recisely and niqely described by choosing whether 90? M? M? 0 No No No M No es No M No No es 180 No es es 90 es No No 270 es es es M90 es es No M90 es No es Table 1. Oerations alied to rodce each orientation. or not to aly each of these oerations. Table 1 shows, for each of the orientations shown in Figre 1, which of these oerations are alied to rodce that orientation. We will now constrct three grahs. A grah G =(V; E) consists of a collection V of ertices and a collection E of edges, where each edge has two ertices and as endoints. Sch an edge is denoted (; ). Edges are ndirected, so (; ) and (; ) denote the same edge between ertices and. If edge (; ) is in E, then we say that and are adjacent and are one another s neighbors. The grahs will be colored sing two colors: red and green. A coloring is alid if, for eery edge (; ), ertices and hae different colors. Note that this imlies that if two ertices 1 and 2 are adjacent to a ertex i.e. ( 1;)and ( 2;)are both edges in E then 1 and 2 mst hae the same color. We will now constrct three grahs, denoted,, and, which corresond to the three orientation comonents 90, M, and M. In each grah, there is initially a ertex for each deice, and there are initially no edges. For a gien deice, the corresonding ertices in,, and are,,and, resectiely (if there is no danger of confsion, then these three ertices are collectiely referred to as ). We are going to color each of these three grahs sing two colors, red and green, sch that adjacent ertices hae different colors. After the grahs hae been sccessflly colored, if a ertex in is green, then the 90 oeration is to be alied to the corresonding deice; if is red, then the 90 oeration is not to be alied. Similarly, the colors of the ertices in and indicate whether the M and M oerations, resectiely, are to be alied to the deice corresonding to each ertex. Initially, the color of eery ertex is ndefined. A FIED OI- ENTATION constraint is imlemented for the deice corresonding to ertex by setting the colors of ertices,,and to the aroriate ales to imlement the orientation as rescribed in Table 1. We will now add edges and intermediate ertices between the ertices corresonding to deices inoled in each constraint, sch that a alid 2-coloring of each grah translates to an orientation for each deice sch that all constraints are satisfied. This is accomlished sing the fact that adjacent ertices mst hae different colors and airs of ertices each connected to an intermediate ertex mst hae the same color. A SAME OIENTATION constraint is imlemented as follows. If the constraint inoles more than two deices, then this oeration is alied airwise between an arbitrarily chosen deice A in the constraint and each additional deice in the constraint (clearly if all deices hae the same orientation as A, then they all hae the same orientation). For each sch air, let and be the ertices corresonding to the air of deices. Intermediate ertices,, and are added to,, and, resectiely. Edges ( ; ) and ( ; ) are added to, and similarly edges ( ; ) and ( ; ) are added to and edges ( ; ) and ( ; ) are added to.inthisway, and are forced to be colored the same color, as are and as well as and. Ths, the
3 Figre 3. The ertices and edges added for a SAME OIENTA- TION constraint. Figre 5. The ertices and edges added for a SAME O MI- OED OIENTATION constraint abot the x-axis. Figre 4. The ertices and edges added for a MIOED OI- ENTATION constraint abot the x-axis. deices corresonding to and are forced to hae the same orientation. This configration is shown in Figre 3. A MIOED OIENTATION constraint is imlemented as follows. Assme withot loss of generality that the constraint is with resect tothe x-axis. A MIOED OIENTATION constraint mst inclde exactly two deices; let and be the ertices corresonding to these two deices. Intermediate ertices and are added to and, resectiely. Edges ( ; ) and ( ; ) are added to, and edges ( ; )and ( ; )are added to. A single edge ( ; )withot an intermediate ertex is added to. Inthisway, and are forced to hae the same color, as are and. The ertices and are forced to hae different colors. Insection of Figre 1 and Table 1 shows that this forces the deices corresonding to and to hae mirrored orientation abot the x-axis. This configration is illstrated in Figre 4. The imlementation of a MIOED OIENTATION constraint with resect to the y-axis is similar, bt with and reersed throghot. That is, we add ertex and edges ( ; ) and ( ; ) to, weaddertex and edges ( ; ) and ( ; )to, and we add edge ( ; )to. The final constraint is the SAME O MIOED OIENTATION constraint. Again, assme withot loss of generality that the constraint is abot the x-axis. This tye of constraint can inclde more than two deices; as with the SAME OIENTATION constraint, the following oeration is alied airwise between an arbitrarily cho- sen deice A in the constraint and each additional deice in the constraint (again, if all deices satisfy the constraint with resect to A, then they mst satisfy it with resect to one another). For each sch air, let and be the corresonding air of ertices. We again add intermediate ertex and edges ( ; ) and ( ; )to and add intermediate ertex and edges ( ; ) and ( ; )to. No edge is added between and.inthis way, ertices and mst hae the same color, as mst ertices and. Vertices and may either hae the same color, in which case the deices corresonding to and will hae the same orientation, or they may hae different colors, in which case the deices corresonding to and will hae mirrored orientation abot the x-axis (again, this can be erified by examining Figre 1 and Table 1). This configration is illstrated in Figre 5. Again, a SAME O MIOED OIENTATION constraint abot the y-axis is similar, bt with and reersed throghot. That is, we add ertex and edges ( ; )and ( ; )to, and we add ertex and edges ( ; )and ( ; )to. We hae shown how to constrct grahs,,and sch that a alid 2-coloring of each grah translates to an orientation for each deice sch that all constraints are satisfied. What remains to be shown is how to comte sch a coloring, and how to deal with oerconstraints. In the absence of oerconstraints, a 2-coloring of each grah can be easily comted in time linear in the nmber of ertices and edges in the grah. One way to do so is by sing a dethfirst search (see Cormen, Leiserson, and iest [1, ], for a descrition of deth-first search, and see Kozen [2,. 119], for an exlanation of 2-coloring sing deth-first search). First, choose a ertex whose color has already been set de to a FIED OIENTATION constraint. If no sch ertex exists, then choose an arbitrary ertex and assign it the color green (in the latter case, there are at least two alid soltions with oosite colors, so the choice of color for the starting ertex is irreleant). We add afieldarent() to each ertex ; the contents of this field will be the ertex that was isited before. Now, aly the following rocedre starting from.
4 Color(): For each neighbor of not already colored: 1. Assign the oosite color from 2. Set arent()to 3. Color() In the absence of oerconstraints, when this rocedre comletes it will hae rodced a alid 2-coloring of the grah. An oerconstraint can be recognized if, in Ste (1) aboe, a neighbor of has already been assigned the same color as. In this case, the grah edges corresonding to the constraints in the oerconstraint either form a cycle, or else they form a ath whose endoints are ertices whose colors were assigned de to a FIED OIENTATION constraint. Using the arent field, we trace backward from ntil we either enconter again or enconter a ertex whose color was assigned de to a FIED OIENTATION constraint. One of these two eents mst occr, since if we do not enconter a ertex whose color was assigned de to a FIED OIENTATION constraint, then we mst find a cycle starting and ending at,orelsearent() wold be eqal to. Haing fond the oerconstraint, we form a set of constraints corresonding to the edges that the algorithm traced, ls the edge (; ). We ass this set of constraints to a rocedre that relaxes one of the constraints, and then we start all oer, bild the grahs,, and, and attemt to 2-color them again. This rocedre is reeated once for each oerconstraint ntil all oerconstraints hae been resoled and we rodce a alid 2-coloring of each grah. The criteria sed by the rocedre to decide which constraint to relax are indeendent of the algorithm; i.e., the algorithm works correctly regardless of which constraint the rocedre chooses to relax. Note that this differs from the way oerconstraints are handled by the iteratie algorithm, which simly relaxes the constraint it is crrently considering at the time the oerconstraint is detected. Once a alid 2-coloring has been comted, it is simle to translate the colors of each trio of ertices back into an orientation for the corresonding deice, sing the translations gien in Table 1. When this is done, each deice will hae been assigned an orientation sch that all constraints that were not relaxed de to oerconstraints are satisfied. Each coloring attemt reqires O(n + m) time [2], where n is the nmber of deices and m is the nmber of constraints (which is within a constant mltile of the nmber of edges in the grahs). This rocess, as well as the rocedre that decides which constraint in an oerconstraint to relax, is reeated once each time an oerconstraint is fond. Ths, if there are c oerconstraints and f (n; m) is the time reqired by the oerconstraint resoltion rocedre, then the total time reqired is O(c(n + m + f (n; m))). A tyical oerconstraint resoltion rocedre reqires at most O(n + m) time itself, which makes the total time reqired eqal to O(c(n + m)). In the actal imlementation, there is no need to constrct three searate grahs. Instead, one can comte a single grah, each of whose ertices contains three searate colors and three searate sets of edges (one for each of,, and ). In addition, there is no need to exlicitly add the intermediate ertices; rather, one can simly set a flag on the aroriate edges sch that they are treated as thogh were resent. In addition, it might be ossible to reconstrct only the ortions of the grahs inoled in an oerconstraint when one is fond, rather than reconstrcting the grahs entirely and 2-coloring them from scratch. Howeer, there are tyically few or no oerconstraints, and the algorithm rns in linear time for each oerconstraint, so this otimization is robably not cost-effectie. Time (seconds) Deices Constraints Figre 6. nning times for the gien nmbers of deices and constraints. 4. EPEIMENTAL ESULTS Or coloring algorithm has been imlemented as art of a Cadence lacement rodct. Exerimental reslts of rnning the algorithm on a nmber of randomly generated test cases are shown in Figre 6 (detailed nmerical data aailable on reqest). The test cases are randomly generated so as to aoid the most degenerate tyes of oerconstraints: constraints between two deices that both hae fixed orientation, and mltile constraints of different tyes between the same air of deices. Each tye of constraint is eqally robable. Each data oint is the reslt of rnning 1000 tests. Note that becase or test cases are randomly generated, desite being generated as to aoid simle tyes of oerconstraints, they still contain far more oerconstraints than wold a tyical real design. The majority of the rnning time of the algorithm on this test data is sent dealing with these oerconstraints, as eidenced by the fact that for large nmbers of constraints the rnning time actally decreases with increasing nmbers of deices, de to fewer oerconstraints. We can get more realistic measrements by rnning on test cases with the nmber of constraints eqal to half the nmber of deices. In sch test cases, we see aroximately one oerconstraint for eery 50 constraints, whereas for the first set of data we often see one or more oerconstraints for eery two constraints. The reslts of rnning on these more realistic test cases are shown in Figre CONCLUSIONS We hae resented an efficient algorithm that ses grah coloring to sole an imortant sbroblem in constraint-drien lacement: soling systems of orientation constraints. This algorithm is more efficient than its redecessor, handles oerconstraints more effectiely, and finds soltions in difficlt cases that defeated the reios algorithm. While we hae discssed only the for constraints that were interesting in or alication, this techniqe can enforce any arbitrary constraint that inoles a fixed, same, or different relation among the three orientation comonents 90, M, and M. For examle, one alication that arose after the initial imlementation of this algorithm was comlete was in the lacer s handling of fences. One can define a rectanglar region called a fence, and then reqire that certain deices be laced within the fence. In
5 nning time (seconds) Deices (= Constraints * 2) Figre 7. nning times with the gien nmbers of deices and half that many constraints. The bars indicate the actal rnning time, and the line is a cre of O(c(n+m)) fit to the actal data. some cases, if the fence and a deice that it will contain are both long and thin, then the deice may only fit if it is oriented sch that its long dimension matches that of the fence. In other words, we wold like to enforce for this deice that the 90 comonent of its orientation be fixed, while the M and M comonents are free to ary. This is easily handled by or algorithm. In addition, the techniqe can be easily generalized to handle more general sets of orientations, as long as they can be niqely described by a discrete set of indeendent rotation and reflection oerations. 6. ACKNOWLEDGMENTS Thanks to Enrico Malaasi and Kathy Jones for many helfl comments. The algorithm described here is atent ending. EFEENCES [1] COMEN, T.H.,LEISESON, C.E., AND IVEST,.L. Introdction to Algorithms. MIT Press, Cambridge, Massachsetts, [2] KOZEN, D. The Design and Analysis of Algorithms. Sringer- Verlag, 1992.
Point Location. The Slab Method. Optimal Schemes. The Slab Method. Preprocess a planar, polygonal subdivision for point location queries.
Point Location The Slab Method Prerocess a lanar, olygonal sbdiision for oint location qeries. = (18, 11) raw a ertical line throgh each ertex. This decomoses the lane into slabs. In each slab, the ertical
More informationA Distributed Algorithm for Deadlock Detection and Resolution
A Distribted Algorithm for Deadlock Detection and Resoltion Don P. Mitchell Michael J. Merritt AT&T Bell Laboratories ABSTRACT This aer resents two distribted algorithms for detecting and resoling deadlocks.
More informationRevisiting Connected Dominating Sets: An Optimal Local Algorithm?
Reisiting Connected Dominating Sets: An Otimal Local Algorithm? Samir Khller Deartment of Comter Science Uniersity of Maryland College Park, MD 0740, USA Email: samir@md.ed Sheng Yang Deartment of Comter
More informationLemma 1 Let the components of, Suppose. Trees. A tree is a graph which is. (a) Connected and. (b) has no cycles (acyclic). (b)
Trees Lemma Let the components of ppose "! be (a) $&%('*)+ - )+ / A tree is a graph which is (b) 0 %(')+ - 3)+ / 6 (a) (a) Connected and (b) has no cycles (acyclic) (b) roof Eery path 8 in which is not
More informationReconstructing Generalized Staircase Polygons with Uniform Step Length
Jornal of Graph Algorithms and Applications http://jgaa.info/ ol. 22, no. 3, pp. 431 459 (2018) DOI: 10.7155/jgaa.00466 Reconstrcting Generalized Staircase Polygons with Uniform Step Length Nodari Sitchinaa
More informationPushing squares around
Pshing sqares arond Adrian Dmitresc János Pach Ý Abstract We stdy dynamic self-reconfigration of modlar metamorphic systems. We garantee the feasibility of motion planning in a rectanglar model consisting
More informationMaximal Cliques in Unit Disk Graphs: Polynomial Approximation
Maximal Cliqes in Unit Disk Graphs: Polynomial Approximation Rajarshi Gpta, Jean Walrand, Oliier Goldschmidt 2 Department of Electrical Engineering and Compter Science Uniersity of California, Berkeley,
More informationIntegrated control of RTUs and refrigeration equipment in convenience stores
Prde University Prde e-pbs International High Performance Bildings Conference School of Mechanical Engineering 2016 Integrated control of RTUs and refrigeration eqiment in convenience stores Donghn Kim
More informationCMSC 425: Lecture 16 Motion Planning: Basic Concepts
: Lecture 16 Motion lanning: Basic Concets eading: Today s material comes from various sources, including AI Game rogramming Wisdom 2 by S. abin and lanning Algorithms by S. M. LaValle (Chats. 4 and 5).
More informationNetworks An introduction to microcomputer networking concepts
Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES
More informationPlanarity-Preserving Clustering and Embedding for Large Planar Graphs
Planarity-Presering Clstering and Embedding for Large Planar Graphs Christian A. Dncan, Michael T. Goodrich, and Stephen G. Koboro Center for Geometric Compting The Johns Hopkins Uniersity Baltimore, MD
More informationgrid. In this chapter we consider the drawings of 3-planar graphs on a hexagonal
Chater Hexagonal Drawings In Chater we considered the drawings of - and -lanar grahs on a rectilinear grid. In this chater we consider the drawings of -lanar grahs on a hexagonal grid. In a hexagonal grid
More informationChapter 5 Network Layer
Chapter Network Layer Network layer Physical layer: moe bit seqence between two adjacent nodes Data link: reliable transmission between two adjacent nodes Network: gides packets from the sorce to destination,
More informationOn shortest-path all-optical networks without wavelength conversion requirements
Research Collection Working Paper On shortest-path all-optical networks withot waelength conersion reqirements Athor(s): Erlebach, Thomas; Stefanakos, Stamatis Pblication Date: 2002 Permanent Link: https://doi.org/10.3929/ethz-a-004446054
More informationCurve Modeling (Spline) Dr. S.M. Malaek. Assistant: M. Younesi
Crve Modeling Sline Dr. S.M. Malae Assistant: M. Yonesi Crve Modeling Sline Crve Control Points Convex Hll Shae of sline crve Interolation Slines Aroximation Slines Continity Conditions Parametric & Geometric
More informationTdb: A Source-level Debugger for Dynamically Translated Programs
Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,
More informationCOMPOSITION OF STABLE SET POLYHEDRA
COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining
More informationFaster Random Walks By Rewiring Online Social Networks On-The-Fly
1 Faster Random Walks By Rewiring Online ocial Networks On-The-Fly Zhojie Zho 1, Nan Zhang 2, Zhigo Gong 3, Gatam Das 4 1,2 Compter cience Department, George Washington Uniersity 1 rexzho@gw.ed 2 nzhang10@gw.ed
More informationObject Pose from a Single Image
Object Pose from a Single Image How Do We See Objects in Depth? Stereo Use differences between images in or left and right eye How mch is this difference for a car at 00 m? Moe or head sideways Or, the
More informationLocating and Bypassing Routing Holes in Sensor Networks
Locating and Byassing Roting Holes in Sensor Networks Qing Fang Deartment of Electrical Engineering Stanford Uniersity Stanford, A 94305 E-mail: jqfang@stanford.ed Jie Gao Deartment of omter Science Stanford
More informationOn Plane Constrained Bounded-Degree Spanners
Algorithmica manscript No. (ill be inserted by the editor) 1 On Plane Constrained Bonded-Degree Spanners 2 3 Prosenjit Bose Rolf Fagerberg André an Renssen Sander Verdonschot 4 5 Receied: date / Accepted:
More informationMobility Control and Its Applications in Mobile Ad Hoc Networks
Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai Department of Compter Science and Engineering Florida Atlantic Uniersity Boca Raton, FL 3331 Abstract Most existing localized
More informationFaster Random Walks By Rewiring Online Social Networks On-The-Fly
Faster Random Walks By Rewiring Online ocial Networks On-The-Fly Zhojie Zho 1, Nan Zhang 2, Zhigo Gong 3, Gatam Das 4 1,2 Compter cience Department, George Washington Uniersity 1 rexzho@gw.ed 2 nzhang10@gw.ed
More informationDynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un
Dynamic Maintenance of Majority Information in Constant Time per Update? Gdmnd S. Frandsen and Sven Skym BRICS 1 Department of Compter Science, University of arhs, Ny Mnkegade, DK-8000 arhs C, Denmark
More informationA Method to Determine End-Points ofstraight Lines Detected Using the Hough Transform
RESEARCH ARTICLE OPEN ACCESS A Method to Detere End-Points ofstraight Lines Detected Using the Hough Transform Gideon Kanji Damaryam Federal University, Lokoja, PMB 1154, Lokoja, Nigeria. Abstract The
More informationAcademy of Sciences, Beijing, China
Adanced aterials Research Online: 2013-09-18 ISS: 1662-8985, Vols. 756-759, 1566-1570 doi:10.4028/www.scientific.net/ar.756-759.1566 2013 Trans Tech Pblications, Switzerland OVA:A P2P-Clod Vod System for
More informationChapter 5. Plane Graphs and the DCEL
Chapter 5 Plane Graphs and the DCEL So far we hae been talking abot geometric strctres sch as trianglations of polygons and arrangements of line segments withot paying mch attention to how to represent
More informationSource Coding and express these numbers in a binary system using M log
Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is
More informationA sufficient condition for spiral cone beam long object imaging via backprojection
A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral
More informationSpace-efficient Region Filling in Raster Graphics
"The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich
More informationSPACE-SCALE DIAGRAMS: UNDERSTANDING MULTISCALE INTERFACES
SPACE-SCALE DIAGRAMS: UNDERSTANDING MULTISCALE INTERFACES George W. Frnas Bellcore, 445 Soth Street Morristown, NJ 07962-1910 (201) 829-4289 gwf@bellcore.com Benjamin B. Bederson* Bellcore, 445 Soth Street
More informationImproving Network Connectivity Using Trusted Nodes and Edges
Improing Network Connectiity Using Trsted Nodes and Edges Waseem Abbas, Aron Laszka, Yegeniy Vorobeychik, and Xenofon Kotsokos Abstract Network connectiity is a primary attribte and a characteristic phenomenon
More informationParallel Construction of Multidimensional Binary Search Trees. Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka
Parallel Construction of Multidimensional Binary Search Trees Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka School of CIS and School of CISE Northeast Parallel Architectures Center Syracuse
More informationABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS
Proceedings th FIG Symposim on Deformation Measrements Santorini Greece 00. ABSOUTE DEFORMATION PROFIE MEASUREMENT IN TUNNES USING REATIVE CONVERGENCE MEASUREMENTS Mahdi Moosai and Saeid Khazaei Mining
More information[1] Hopcroft, J., D. Joseph and S. Whitesides, Movement problems for twodimensional
Acknoledgement. The athors thank Bill Lenhart for interesting discssions on the recongration of rlers. References [1] Hopcroft, J., D. Joseph and S. Whitesides, Moement problems for todimensional linkages,
More informationEvaluating Influence Diagrams
Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will
More informationSensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network
1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann
More informationReal-Time Robot Path Planning via a Distance-Propagating Dynamic System with Obstacle Clearance
POSTPRINT OF: IEEE TRANS. SYST., MAN, CYBERN., B, 383), 28, 884 893. 1 Real-Time Robot Path Planning ia a Distance-Propagating Dynamic System with Obstacle Clearance Allan R. Willms, Simon X. Yang Member,
More information3D SURFACE RECONSTRUCTION BASED ON COMBINED ANALYSIS OF REFLECTANCE AND POLARISATION PROPERTIES: A LOCAL APPROACH
3D SURFACE RECONSTRUCTION BASED ON COMBINED ANALYSIS OF REFLECTANCE AND POLARISATION PROPERTIES: A LOCAL APPROACH Pablo d Angelo and Christian Wöhler DaimlerChrysler Research and Technology, Machine Perception
More informationLocalized Delaunay Triangulation with Application in Ad Hoc Wireless Networks
1 Localized Delanay Trianglation with Application in Ad Hoc Wireless Networks Xiang-Yang Li Gria Călinesc Peng-Jn Wan Y Wang Department of Compter Science, Illinois Institte of Technology, Chicago, IL
More informationOn the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing
1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity
More informationRandomized algorithms: Two examples and Yao s Minimax Principle
Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum
More informationLecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.)
Advanced Algorithms Fall 2015 Lecture 3: Geometric Algorithms(Convex sets, Divide & Conuer Algo.) Faculty: K.R. Chowdhary : Professor of CS Disclaimer: These notes have not been subjected to the usual
More informationOptimal Sampling in Compressed Sensing
Optimal Sampling in Compressed Sensing Joyita Dtta Introdction Compressed sensing allows s to recover objects reasonably well from highly ndersampled data, in spite of violating the Nyqist criterion. In
More informationAn Extended Fault-Tolerant Link-State Routing Protocol in the Internet
An Extended Falt-Tolerant Link-State Roting Protocol in the Internet Jie W, Xiaola Lin, Jiannong Cao z, and Weijia Jia x Department of Compter Science and Engineering Florida Atlantic Uniersit Boca Raton,
More informationTHE METHOD OF A MATERIAL LOSS DETECTION FOR CYLINDRICAL SHAPE PARTS OF ELEMENTS WITH A 3D SCANNING APPLICATION
International Jornal of Modern Manfactring Technologies ISSN 2067 3604, Vol. V, No. 2 / 2013 THE METHOD OF A MATERIAL LOSS DETECTION FOR CYLINDRICAL SHAPE PARTS OF ELEMENTS WITH A 3D SCANNING APPLICATION
More informationAlliances and Bisection Width for Planar Graphs
Alliances and Bisection Width for Planar Graphs Martin Olsen 1 and Morten Revsbæk 1 AU Herning Aarhs University, Denmark. martino@hih.a.dk MADAGO, Department of Compter Science Aarhs University, Denmark.
More informationChapter 4: Network Layer
Chapter 4: Introdction (forarding and roting) Reie of qeeing theor Roting algorithms Link state, Distance Vector Roter design and operation IP: Internet Protocol IP4 (datagram format, addressing, ICMP,
More information4.13 Advanced Topic: An Introduction to Digital Design Using a Hardware Design Language 345.e1
.3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage 35.e.3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage to Describe and odel a Pipeline
More informationExtracting Optimal Paths from Roadmaps for Motion Planning
Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu
More informationMultiple Source Shortest Paths in a Genus g Graph
Mltiple Sorce Shortest Paths in a Gens g Graph Sergio Cabello Erin W. Chambers Abstract We gie an O(g n log n) algorithm to represent the shortest path tree from all the ertices on a single specified face
More informationOn Bichromatic Triangle Game
On Bichromatic Triangle Game Gordana Manić Daniel M. Martin Miloš Stojakoić Agst 16, 2012 Abstract We stdy a combinatorial game called Bichromatic Triangle Game, defined as follows. Two players R and B
More informationComplexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks
Journal of Comuting and Information Technology - CIT 8, 2000, 1, 1 12 1 Comlexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Eunice E. Santos Deartment of Electrical
More informationOPTI-502 Optical Design and Instrumentation I John E. Greivenkamp Homework Set 11 Fall, 2018
Assigned: 11/14/18 Lectre 24 De: 11/21/18 Lectre 26 11-1) A 200 mm x 300 mm monochrome monitor is to be viewed b an observer at a distance of 0.5 m. The desired image qalit is to be excellent as determined
More informationEquality-Based Translation Validator for LLVM
Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented
More informationCS 450: COMPUTER GRAPHICS 2D TRANSFORMATIONS SPRING 2016 DR. MICHAEL J. REALE
CS 45: COMUTER GRAHICS 2D TRANSFORMATIONS SRING 26 DR. MICHAEL J. REALE INTRODUCTION Now that we hae some linear algebra under our resectie belts, we can start ug it in grahics! So far, for each rimitie,
More informationDirected File Transfer Scheduling
Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was
More informationIntroduction to Parallel Algorithms
CS 1762 Fall, 2011 1 Introduction to Parallel Algorithms Introduction to Parallel Algorithms ECE 1762 Algorithms and Data Structures Fall Semester, 2011 1 Preliminaries Since the early 1990s, there has
More informationREPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips
REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands
More informationTruth Trees. Truth Tree Fundamentals
Truth Trees 1 True Tree Fundamentals 2 Testing Grous of Statements for Consistency 3 Testing Arguments in Proositional Logic 4 Proving Invalidity in Predicate Logic Answers to Selected Exercises Truth
More informationOPTI-502 Optical Design and Instrumentation I John E. Greivenkamp Homework Set 9 Fall, 2018
OPTI-502 Optical Design and Instrmentation I John E. Greivenkamp Assigned: 10/31/18 Lectre 21 De: 11/7/18 Lectre 23 Note that in man 502 homework and exam problems (as in the real world!!), onl the magnitde
More informationGEOMETRIC CONSTRAINT SOLVING IN < 2 AND < 3. Department of Computer Sciences, Purdue University. and PAMELA J. VERMEER
GEOMETRIC CONSTRAINT SOLVING IN < AND < 3 CHRISTOPH M. HOFFMANN Deartment of Comuter Sciences, Purdue University West Lafayette, Indiana 47907-1398, USA and PAMELA J. VERMEER Deartment of Comuter Sciences,
More informationComprehensive performance model of differentiated service with token bucket marker
Comrehensive erformance model of differentiated service with token bcket marker H. S and M. Atiqzzaman Abstract: Differentiated services (DiffServ) networks se two tye of roters: edge roters mark the acket
More informationEfficient Parallel Hierarchical Clustering
Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore
More informationGraph Cut Matching In Computer Vision
Grah Cut Matching In Comuter Vision Toby Collins (s0455374@sms.ed.ac.uk) February 2004 Introduction Many of the roblems that arise in early vision can be naturally exressed in terms of energy minimization.
More informationPavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003
From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information
More informationFunctions of Combinational Logic
CHPTER 6 Fnctions of Combinational Logic CHPTER OUTLINE 6 6 6 6 6 5 6 6 6 7 6 8 6 9 6 6 Half and Fll dders Parallel inary dders Ripple Carry and Look-head Carry dders Comparators Decoders Encoders Code
More informationIn Search of a Key Value Store with High Performance and High Availability
In Search of a Key Vale Store with High Performance and High Availability Haibing Jian Yean Zh Yongchao Long Bin Li Sh Wang Xiliang W Zhich Zhong YY Inc. Jiaying University of China {jianhaibing1, zhyean,
More informationLecture 8: Orthogonal Range Searching
CPS234 Comutational Geometry Setember 22nd, 2005 Lecture 8: Orthogonal Range Searching Lecturer: Pankaj K. Agarwal Scribe: Mason F. Matthews 8.1 Range Searching The general roblem of range searching is
More informationThe Disciplined Flood Protocol in Sensor Networks
The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab
More informationHardware-Accelerated Formal Verification
Hardare-Accelerated Formal Verification Hiroaki Yoshida, Satoshi Morishita 3 Masahiro Fujita,. VLSI Design and Education Center (VDEC), University of Tokyo. CREST, Jaan Science and Technology Agency 3.
More informationComplete Information Pursuit Evasion in Polygonal Environments
Complete Information Prsit Easion in Polygonal Enironments Kyle Klein and Sbhash Sri Department of Compter Science Uniersity of California Santa Barbara, CA 9306 Abstract Sppose an npredictable eader is
More informationAn Approximate Analytical Performance Model for Multistage Interconnection Networks with Backpressure Blocking Mechanism
JOURNAL OF COMMUNICATIONS, VOL. 5, NO. 3, MARCH 47 An Aroximate Analytical Performance Model for Mltistage Interconnection Networs with Bacressre Blocing Mechanism John Garofalais eartment of Comter Engineering
More informationPOWER-OF-2 BOUNDARIES
Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of
More informationCutting Cycles of Rods in Space: Hardness and Approximation
Ctting Cycles of Rods in Space: Hardness and pproximation oris rono ark de erg Chris Gray Elena mford bstract We stdy the problem of ctting a set of rods (line segments in R 3 ) into fragments, sing a
More informationLecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model.
U.C. Berkeley CS273: Parallel and Distributed Theory Lecture 18 Professor Satish Rao Lecturer: Satish Rao Last revised Scribe so far: Satish Rao (following revious lecture notes quite closely. Lecture
More informationHardware-Accelerated Free-Form Deformation
Hardware-Accelerated Free-Form Deformation Clint Cha and Ulrich Nemann Compter Science Department Integrated Media Systems Center University of Sothern California Abstract Hardware-acceleration for geometric
More informationMa Lesson 18 Section 1.7
Ma 15200 Lesson 18 Section 1.7 I Representing an Ineqality There are 3 ways to represent an ineqality. (1) Using the ineqality symbol (sometime within set-bilder notation), (2) sing interval notation,
More informationAssigning AS Relationships to Satisfy the Gao-Rexford Conditions
Assigning AS Relationships to Satisfy the Gao-Rexford Conditions Lca Cittadini, Giseppe Di Battista, Thomas Erlebach, Marizio Patrignani, and Massimo Rimondini Dept. of Compter Science and Atomation, Roma
More informationTowards applications based on measuring the orbital angular momentum of light
CHAPTER 8 Towards applications based on measring the orbital anglar momentm of light Efficient measrement of the orbital anglar momentm (OAM) of light has been a longstanding problem in both classical
More informationCS649 Sensor Networks IP Track Lecture 6: Graphical Models
CS649 Sensor Networks IP Track Lecture 6: Grahical Models I-Jeng Wang htt://hinrg.cs.jhu.edu/wsn06/ Sring 2006 CS 649 1 Sring 2006 CS 649 2 Grahical Models Grahical Model: grahical reresentation of joint
More informationOMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications
OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture
More informationFast Obstacle Detection using Flow/Depth Constraint
Fast Obstacle etection sing Flow/epth Constraint S. Heinrich aimlerchrylser AG P.O.Box 2360, -89013 Ulm, Germany Stefan.Heinrich@aimlerChrysler.com Abstract The early recognition of potentially harmfl
More informationMinimal Edge Addition for Network Controllability
This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,
More informationFriend of My Friend: Network Formation with Two-Hop Benefit
Friend of My Friend: Network Formation with Two-Hop Benefit Elliot Ansheleich, Onkar Bhardwaj, and Michael Usher Rensselaer Polytechnic Institte, Troy NY, USA Abstract. How and why people form ties is
More informationAn empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs
An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science
More information(2, 4) Tree Example (2, 4) Tree: Insertion
Presentation for se with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 B-Trees and External Memory (2, 4) Trees Each internal node has 2 to 4 children:
More informationARRAY ANTENNA DIAGNOSTICS WITH THE 3D RECONSTRUCTION ALGORITHM
ARRAY ANTENNA DIAGNOSTICS WITH THE 3D RECONSTRUCTION ALGORITHM Cecilia Cappellin 1, Peter Meincke 1, Sergey Pinenko 2, Erik Jørgensen 1 1 TICRA, Læderstræde 34, DK-1201 Copenhagen, Denmark 2 DTU Elektro,
More informationOn Plane Constrained Bounded-Degree Spanners
On Plane Constrained Bonded-Degree Spanners Prosenjit Bose 1, Rolf Fagerberg 2, André an Renssen 1, Sander Verdonschot 1 1 School of Compter Science, Carleton Uniersity, Ottaa, Canada. Email: jit@scs.carleton.ca,
More informationPREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS
PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links
More informationAn Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast
University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna
More informationCS 557 Lecture IX. Drexel University Dept. of Computer Science
CS 7 Lectre IX Dreel Uniersity Dept. of Compter Science Fall 00 Shortest Paths Finding the Shortest Paths in a graph arises in many different application: Transportation Problems: Finding the cheapest
More informationPipelined van Emde Boas Tree: Algorithms, Analysis, and Applications
This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,
More informationConstructing Multiple Light Multicast Trees in WDM Optical Networks
Constrcting Mltiple Light Mlticast Trees in WDM Optical Networks Weifa Liang Department of Compter Science Astralian National University Canberra ACT 0200 Astralia wliang@csaneda Abstract Mlticast roting
More informationMathematical model for storing and effective processing of directed graphs in semistructured data management systems
Mathematical model for storing and effectie processing of directed graphs in semistrctred data management MALIKOV A, GULEVSKIY Y, PARKHOMENKO D Information Systems and Technologies Department North Cacass
More informationMulticast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1
Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and
More informationImproved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties
Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal
More informationA RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA
A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA Mei Zho*, Ling-li Tang, Chan-rong Li, Zhi Peng, Jing-mei Li Academy of Opto-Electronics, Chinese Academy of Sciences, No.9, Dengzhang
More informationCS 153 Design of Operating Systems Spring 18
CS 153 Design of Operating Systems Spring 18 Lectre 9: Synchronization (1) Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Cooperation between Threads
More informationUsing Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication
Using Permuted States and Validated Simulation to Analyze Conflict Rates in Otimistic Relication An-I A. Wang Comuter Science Deartment Florida State University Geoff H. Kuenning Comuter Science Deartment
More information