Succinct Indices for Path Minimum, with Applications to Path Reporting

Size: px
Start display at page:

Download "Succinct Indices for Path Minimum, with Applications to Path Reporting"

Transcription

1 Succinct Indices for Path Minimum, with Appications to Path Reporting Timothy M. Chan 1, Meng He 2, J. Ian Munro 1, and Gein Zhou 1 1 David R. Cheriton Schoo of Computer Science, University of Wateroo, Canada. {tmchan, imunro, g5zhou}@uwateroo.ca 2 Facuty of Computer Science, Dahousie University, Canada. mhe@cs.da.ca Abstract. In the path minimum query probem, we preprocess a tree on n weighted nodes, such that given an arbitrary path, we can ocate the node with the smaest weight aong this path. We design nove succinct indices for this probem; one of our index structures supports queries in O(α(m, n)) time, and occupies O(m) bits of space in addition to the space required for the input tree, where m is an integer greater than or equa to n and α(m, n) is the inverse-ackermann function. These indices give us the first succinct data structures for the path minimum probem, and aow us to obtain new data structures for path reporting queries, which report the nodes aong a query path whose weights are within a query range. We achieve three different time/space tradeoffs for path reporting by designing (a) an O(n)-word structure with O(g ϵ n + occ g ϵ n) query time, where occ is the number of nodes reported; (b) an O(n g g n)-word structure with O(g g n + occ g g n) query time; and (c) an O(n g ϵ n)- word structure with O(g g n+occ) query time. These tradeoffs match the state of the art of two-dimensiona orthogona range reporting queries [8] which can be treated as a specia case of path reporting queries. When the number of distinct weights is much smaer than n, we further improve both the query time and the space cost of these three resuts. 1 Introduction As one of the most fundamenta structures in computer science, trees have been widey used in modeing and representing different types of data in numerous computer appications. In many cases, objects are represented by nodes and their properties are characterized by weights assigned to nodes. Researchers have studied the probems of maintaining a weighted tree, such that various types of path queries can be computed efficienty [1, 9, 24, 25, 23, 6, 20, 28, 22, 11]. In this paper, we consider path minimum (maximum) queries and path reporting queries. Path minimum(maximum): Given nodes u and v, return the minimum (maximum) node aong the path from u to v, i.e., the node aong the path whose weight is the minimum (maximum) one; This work was supported by NSERC and the Canada Research Chairs Program. Part of the first author s work was done during his visit to the Department of Computer Science and Engineering, Hong Kong University of Science and Technoogy.

2 Path reporting: Given nodes u and v aong with a range [p, q], report the nodes aong the path from u to v whose weights are between p and q. When the given tree is a path, the above queries become range minimum (maximum) queries [14, 11] and two-dimensiona orthogona range reporting queries [8], respectivey. As stated in [20], the path queries we consider generaize these fundamenta range queries to weighted trees. In this paper, we represent the input tree as an ordina one, i.e., a rooted tree in which sibings are ordered. The weights of nodes are assumed to be drawn from [1..σ]. We use g to denote the base-2 ogarithm and use ϵ to denote a constant in (0, 1). Uness otherwise specified, the underying mode of computation is the standard word RAM mode with word size w = Ω(g n). Path minimum. The probem of supporting path minimum queries has been heaviy studied [1, 9, 2, 29, 23, 6, 11]. Unike our formuation, previous work considers trees on weighted edges instead of weighted nodes. However, it is not hard to see that these two formuations are equivaent. The minimum spanning tree verification probem is a specia offine case of the path minimum probem, for which one shoud determine whether a given spanning tree is minimum. This probem can be soved using O(n + m) comparisons and inear overhead under the word RAM mode [24]. The onine version of this probem, i.e., the path minimum probem, was considered by Aon and Schieber [1]. In the pointer machine mode, they designed a structure that uses super-inear space. Concurrenty, Chazee [9] presented a inear space data structure under word RAM. Both structures require O(α(n)) query time to sum up weights aong a given path, where α(n) is the inverse-ackermann function, and weights are drawn from a semigroup. Thus the onine version of the path minimum probem can aso be supported in the same time and space. More recenty, severa soutions using O(n) words, i.e., O(n g n) bits, with O(1) query time have been designed under word RAM [2, 23, 6, 11]. Pettie [29] studied the ower bound in terms of comparisons of edge weights, and showed that Ω(q α(q, n)+n) comparisons are necessary to serve q queries over a tree of size n. In this paper we present ower and upper bounds for path minimum queries. In Lemma 4 we show that Ω(n g n) bits of space are necessary to encode the answers to path minimum queries over a tree of size n. This distinguishes path minimum queries from range minimum queries in terms of space cost. We adopt the indexing mode (aso caed the systematic mode) [3, 7, 5] in designing new data structures for path minimum queries. Appying this mode to weighted trees, we assume that weights are represented in an arbitrary given raw form; the ony requirement is that the given data support access to the weight of a node given its preorder rank. Auxiiary data structures caed indices are then constructed, and query agorithm uses indices and the access operator provided for the raw data. Not ony is this an important theoretica mode (its variants are frequenty used to prove ower bounds [12, 26, 17]), it is aso of practica importance as it addresses cases in which the (arge) raw data are stored in sower externa memory or even remotey, whie the (smaer) indices coud be stored in memory or ocay. The space of an index is caed additiona space. Note

3 that the ower bound in the previous paragraph is proved under the encoding mode, and thus does not appy to the indexing mode. To present our resuts, we assume the foowing definition for the Ackermann function: A 0 (i) = i + 1 and A +1 (i) = A (i+1) (i + 8), where A (0) (i) = i and A (i) (j) = A (A (i 1) (j)) for i 1. This is faster growing than the one defined by Cormen et a. [10]. Let α(m, n) be the smaest L such that A L ( m/n ) > n, and α(n) be α(n, n). The foowing theorem presents our indices for path minimum: Theorem 1. An ordina tree on n weighted nodes can be indexed (a) using O(m) bits of space to support path minimum queries in O(α(m, n)) time and O(α(m, n)) accesses to the weights of nodes, for any m n; or (b) using 2n+o(n) bits of space to support path minimum queries in O(α(n)) time and O(α(n)) accesses to the weights of nodes. To better understand variant (a) of this resut, we discuss the time and space costs for the foowing possibe vaues of m. When m = n, then we have an index of O(n) bits that supports path minimum queries in O(α(n)) time. When m = O(n(g ) n), for exampe, then it is we-known that α(m, n) = O(1), and thus we have an index of O(n(g ) n) 1 bits that supports path minimum queries in O(1) time. Previous soutions [2, 23, 6, 11] to the same probem with constant query time occupy Ω(n g n) bits of space in addition to the space required for the input tree. Combining the above resuts with a trivia encoding of node weights, we obtain the first succinct data structures for path minimum queries. With a itte extra work, we can even represent a weighted tree using n g σ + 2n + o(n) bits ony, i.e., within an o(n) additive term of the information-theoretic ower bound, to support queries in O(α(n)) time. Considering the construction time is O(n), this variant amost matches the ower bound of Pettie [29]. Path reporting. Path reporting queries were proposed by He et a. [20]. They obtained two soutions: one uses O(n) words and O(g σ + occ g σ) query time, and the other uses O(n g g σ) words but O(g σ + occ g g σ) query time, where σ is the number of distinct weights and occ is output size. For the same probem, Pati et a. [28] designed a succinct structure based on heavy path decomposition [31, 18]. Their structure requires ony n g σ+6n+o(n g σ) bits but O(g σ g n+occ g σ) time. Concurrenty, He et a. [22] designed another succinct structure based on a different idea. This structure, requiring O(g σ/ g g n+occ g σ/ g g n) query time, is the best previousy known inear space soution. In this paper, we design three new data structures for path reporting queries: Theorem 2. An ordina tree on n nodes whose weights are drawn from a set of σ distinct weights can be represented using O(n g σ s(σ)) bits of space, such that path reporting queries can be supported in O(min{g g σ + t(σ), g σ/ g g n} + occ min{t(σ), g σ/ g g n}) time, where occ is the size of output, and s(σ) and t(σ) are: (a) s(σ) = O(1) and t(σ) = O(g ϵ σ); (b) s(σ) = O(g g σ) and t(σ) = O(g g σ); or (c) s(σ) = O(g ϵ σ) and t(σ) = O(1). 1 (g ) is the number of times g must be iterativey appied before the resut becomes ess than or equa to 1.

4 These resuts competey subsume amost a previous resuts; the ony exceptions are the succinct data structures for this probem designed in previous work, whose query times are worse than our inear-space soution. Furthermore, our data structures match the state of the art of 2D range reporting queries [8] when σ = n, and have better performance when σ is much ess than n. Overview of Techniques. Unike previous succinct tree structures [16, 28, 22, 19, 13], our approach for path minimum is based on topoogica partitions [15] which transform the input tree into a binary tree and further recursivey decomposes it into a hierarchy of custers with constant externa degrees. Our main strategy of constructing path minimum query structures (in Section 3) is to recursivey divide the set of eves of decomposition into mutipe subsets of eves; with a carefuy-defined version of the path minimum query probem which takes eves in the decomposition as parameters, the query over the entire structure can be answered by conquering the subprobems oca to the subsets of eves. Soutions to specia cases of the query probem are aso designed, so that we can present the time and space costs of our soution using recursive formuas. Then, by carefuy constructing a number series and using it in the division of eves into subsets, we can prove that our structures achieve the tradeoff presented in Theorem 1 using the inverse-ackermann function. This approach is nove and exciting, and it does not directy use standard techniques for word RAM at a. The above strategy woud not achieve the desired space bound without a succinct data structure that supports navigations in the input tree, the binary tree that it is transformed into and the custers in the topoogica partition. We design such a structure (in Section 4) occupying ony 2n + o(n) bits, which is of independent interest. Finay, to design soutions to path reporting (in Section 5), we foow the genera framework of He et a. [22] to extract subtrees based on the partitions of the entire weight range, and make use of a conceptua structure that borrows ideas from the cassica range tree. One strategy of achieving improved resuts is to further reduce path reporting into queries in which the weight ranges are one-sided, which aows us to appy our succinct index for path minimum queries to achieve the tradeoffs presented in the second haf of the abstract. We further appy a tree covering strategy to reduce the space cost for the case in which the number of distinct weights is much smaer than n, and hence prove Theorem 2. 2 Preiminaries Succinct Data Structures. Bit vectors are one of the main buiding bocks in many space efficient data structures. Let B[1..n] denote a bit vector of size n. For α {0, 1}, rank α (B, i) counts α-bits in B[1..i], whie seect α (B, i) finds the i-th α-bit in B. The foowing emma presents succinct bit vector representations: Lemma 1 ([30]). A bit vector with n m zeros and m ones can be represented using g ( n m) + O(n g g n/ g n) bits of space to support rankα, seect α, and the access to each bit in constant time.

5 The next emma presents succinct ordina trees over an aphabet of size σ = o(g g n), and unabeed trees can be considered as a specia case: Lemma 2 ([16, 19, 13]). An ordina tree T on n nodes over an aphabet of size σ can be encoded in n(g σ + 2) + O(σn g g g n/ g g n) bits of space to support the foowing operations in O(1) time. Here x and y, which are nodes in T, are identified by preorder ranks. A node is its own 0-th ancestor. In addition, a node with abe α is an α-node, and an α-node is an α-ancestor of its descendants. depth(t, x): the depth of x (i.e., the number of ancestors of x); depth α (T, x): the number of α-ancestors of x; parent(t, x): the parent of x; eve anc(t, x, i): the i-th owest ancestor of x; eve anc α (T, x, i): the i-th owest α-ancestor of x; LCA(T, x, y): the owest common ancestor of x and y. Topoogica Partitions and Topoogy Trees. Frederickson [15] presented topoogica partitions for onine updating of minimum spanning trees. An input tree T, which may have arbitrary degree, is transformed into a binary tree B; and then B is partitioned as foows: Lemma 3 ([15]). A binary tree B on n nodes can be partitioned into a hierarchy of custers with h + 1 eves for some h = O(g n): each custer is a connected component of B; the ony custer at eve h contains a the nodes in B, and each custer at eve 0 contains a singe node; a custer at eve i > 0 is the disjoint union of at most 4 custers at eve i 1; at eve i, there are at most (3/4) i n custers of size at most 4 i, which form a partition of the nodes in the binary tree; and each custer has at most 3 nodes that are connected to the outside, which are caed its endpoints. The hierarchy of custers is referred to as the topoogy tree of T and B, which is denoted by H. A node at eve i > 0 of H represents a custer C at eve i of the hierarchy, and its chidren represent the custers at the ower eve that partition C. In particuar, the eaf nodes of H, which are at eve 0, represent individua nodes of the binary tree B. Tree Extraction. He et a. [20, 22] introduced tree extraction to support path queries. This technique is based on the deetion operation of tree edit distance [4]. To deete a non-root node u, its chidren are inserted in pace of u into the ist of chidren of its parent, preserving the origina eft-to-right order. Let T be an ordina tree and X be a subset of nodes in T. The X-extraction of T, F X, is defined to be the ordina forest obtained by deeting a the nodes that are not in X from T. There is a natura one-to-one correspondence between the nodes in X and the nodes in F X, and the ancestor-descendant and preorder reationships among the remaining nodes are preserved. If X contains the root of T, then F X consists of a singe ordina tree ony, which is denoted by T X.

6 3 Path Minimum Queries We first give a simpe ower bound for path minimum queries under the encoding mode. Due to page imitation, the proof is omitted here. Lemma 4. In the worst case, Ω(n g n) bits are required to encode the answers to a possibe path minimum queries over a tree on n weighted nodes. Unike the ower bound of Pettie [29], Lemma 4 provides a separation between path minimum and range minimum in terms of space: Ω(n g n) bits are required to encode path minimum queries over a tree on n weighted nodes, whie range minimum over an array of ength n can aways be encoded in 2n bits [14]. Now we consider the support for path minimum queries. The space cost of maintaining a weighted tree is dominated by storing the weights of nodes. Thus we represent the input tree as an ordina one, for which the nodes are identified by their preorder ranks. This does not significanty affect the space cost. We wi assume the indexing mode described in Section 1 and deveop severa nove succinct indices for path minimum queries. Thus the weights of nodes are assumed to be stored separatey from the index for queries, and can be accessed with the preorder ranks of nodes. The time cost to answer a given query is measured by the number of accesses to the index and that to node weights. Let T be an input tree on n nodes. Here T is represented as an ordina one, and its nodes are identified by preorder ranks. We transform T into a binary tree B as foows (essentiay as in the usua way but with added dummy nodes): For each node u with d > 2 chidren, where v 1, v 2,, v d are chidren of u, we add d 2 dummy nodes x 1, x 2,, x d 2. The first and the second chid of u are set to be v 1 and x 1, respectivey. For 1 k < d 2, the first and the second chid of x k are set to be v k+1 and x k+1, respectivey. Finay, the first and the second chid of x d 2 are set to be v d 1 and v d, respectivey. In this way we have repaced u and its chidren with a right-eaning binary tree, where the eaf nodes are chidren of u. This transformation does not change the preorder reationship among the nodes in T. In addition, the set of non-dummy nodes aong the path between any two non-dummy nodes remain the same after transformation. We decompose B and obtain the topoogy tree H using Lemma 3. For simpicity, a custer at eve i is caed a eve-i custer, and its endpoints are caed eve-i endpoints. Since T and B are both rooted trees, each custer contains a node that is the ancestor of a the other nodes in the same custer. This node is referred to as the root of the custer. In the topoogy tree H, sibing custers are ordered by the preorder ranks of their roots. Each custer C is identified by its topoogica rank, i.e., the preorder rank of the node in H that represents C. To faciitate the use of topoogy trees, we define operations reevant to nodes, custers and endpoints. Here we assume that x and y are nodes in B. conversions between nodes in B and T ; eve custer(h, i, x): the eve-i custer that contains node x; LCC(H, x, y): the owest-eve custer C that contains nodes x and y; custer root(h, C): the root of eve-i custer C;

7 custer endpoints(h, C): the endpoints of eve-i custer C; cosest endpoint(h, C, x): the endpoint of C that is the cosest to node x, given that x is outside of C; parent(b, x): the parent node of x; LCA(B, x, y): the owest common ancestor of x and y; endpoint rank(b, i, x): the number of eve-i endpoints preceding x in preorder of B; endpoint seect(b, i, j): the j-th eve-i endpoint in preorder of B. Lemma 5. Let T be an ordina tree on n nodes. Then T, the transformed binary tree B, and their topoogy tree H can be encoded in 2n + o(n) bits of space such that the operations isted above can be supported in O(1) query time. To present our key strategy first, we defer the proof of Lemma 5 to Section 4. As the conversion between nodes in T and B can be performed in O(1) time, we assume that each given query is specified by two nodes in B. Let h denote the highest eve of H. The foowing two query probems are defined in terms of custers and endpoints, for 0 i < j h: P i,j (C 0, C 1, C 2 ): find the minimum node aong the path from an endpoint of a eve-i custer C 1 to an endpoint of another eve-i custer C 2, where both C 1 and C 2 are contained in the same eve-j custer C 0 ; P i,j (C 0, C 1 ): find the minimum node aong the path from an endpoint of a eve-i custer C 1 to an endpoint of a eve-j custer C 0, where C 1 is in C 0. For simpicity, we drop the parameters when referring to these probems in the rest of this section. Thus the origina probem is P 0,h. If P i,j is soved, then P i,j and P i,j for i > i are aso naturay soved. Let h 0 > 0 be a parameter whose vaue wi be determined ater. We wi sove P 0,h0 using brute-force search, and support P h0,h using a nove recursive approach as described beow. For each custer C whose eve is higher than or equa to h 0, we expicity store the minimum node on the bridges of C, where bridges are paths connecting pairs of endpoints of C (excuding the endpoints). This requires 6i bits for a custer at eve i, as it has at most three bridges. The overa space cost is h i=h 0 ( 6i (3/4) i n ) = O(h 0 (3/4) h0 n) bits, which is o(n) bits when h 0 = ω(1). We have the foowing emmas as base cases of recursion. Lemma 6. For i h 0, P i,i+8 can be soved in O(1) query time and 0 extra bits. The correctness of this emma foows from the fact that each eve-(i + 8) custer contains a constant number of eve-i custers, which makes it possibe to spit a query path into a constant number of subpaths, each being either a eve-i endpoint or a bridge of some eve-i custer which have been preprocessed. Lemma 7. P i,j can be soved using O(1) query time and O((3/4)i n) extra bits. Proof. We construct an ordina tree T i by extracting a eve-i endpoints from B. The size of T i is O((3/4) i n). For convenience, we denote a node in T i by u iff it corresponds to a eve-i endpoint u in B. The conversion between u and u

8 can be performed in O(1) time using endpoint rank and endpoint seect. Next we assign abes from aphabet {0, 1} to the nodes of T i. We ony consider the case in which the eve-j endpoint is the first one in preorder of its custer; the other cases can be handed simiary. Let u be any eve-i endpoint and et v be the first endpoint of C 0 = eve custer(b, j, u), i.e., the eve-j custer that contains u. Like the proof of Lemma 6, the path from u to v in B can be spit into a sequence of eve-i endpoints and bridges of eve-i custers. Let x be the next eve-i endpoint on the path. We assign 1 to u in T i if the minimum node between u and v is smaer than that between x and v; otherwise we assign 0 to u. We represent this abeed tree in O((3/4) i n) bits using Lemma 2. To find the minimum node between u and v, we need ony find the cosest 1-node to u aong the path from u to v in T i. This can be done in O(1) time by performing eve anc α and depth α operations on T i. Let x be such a node. Then the minimum node between u and v must be x or appear on some bridge of the eve-i custer that contains x, and thus can be retrieved in O(1) time. Now we turn to consider genera P i,j, for which we wi deveop a recursive strategy with mutipe iterations. At each iteration, we pick a sequence i = i 0 < i 1 < i 2 <... < i k = j, for which P i0,i 1, P i1,i 2,..., P ik 1,i k are assumed to be soved at the previous iteration. By Lemma 7, we sove P i,i 1, P i,i 2,..., P i,i k using O(k(3/4) i n) bits of additiona space. Consider the support for a query of P i,j, for which eve-i endpoints u and t are endpoints of the query path, and u and t are contained in the same eve-j custer. W..o.g, we assume that t is an ancestor of u (the case in which neither node is an ancestor of the other can be reduced to this case easiy). We compute C 0 = LCC(B, u, t), which is the owest eve custer that contains both u and t. Let i be the eve of C 0. Then we determine s such that i s < i i s+1 ; s can be computed in constant time by precomputing the resut for each of the h + 1 = O(g n) eves. Let C 1 be the eve-i s custer that contains u and et x be an endpoint of C 1 that is between u and t. Simiary, et C 2 be the eve-i s custer that contains t and et z be an endpoint of C 2 that is between u and t. Note that x and z can be found in constant time using eve custer and cosest endpoint. Thus the query path can be decomposed into u x z t. The minimum node on u x and that on z t can be found by querying P i,i s. The minimum node on x z can be found by recursivey querying P is,i s+1. Summarizing the discussion above, we have the foowing recurrences. Here is the number of iterations, and Q (i, j) and S (i, j) are time and space costs for soving P i,j at the -th iteration. k 1 S +1 (i, j) = S (i s, i s+1 ) + O(k(3/4) i n) (1) s=0 Q +1 (i, j) = k 1 max s=0 Q (i s, i s+1 ) + O(1) (2) Lemma 8. Given a fixed vaue L, there exists a recursive strategy and some constant c such that, for 0 L, S (i, A (i)) c(4/5) i n and Q (i, A (i)) c.

9 Proof. At the 0-th iteration, we have A 0 (i) = i + 1. This can be used as the base case. By Lemma 6, P i,i+1 can be supported using constant query time at no extra space cost. Thus the statement hods for = 0. At the ( + 1)-th iteration, we choose the sequence i, i + 8, A (i + 8), A (2) (i + 8),..., A (i) (i + 8), A(i+1) (i + 8). The ast term is A +1 (i). Then by Equation 1: S +1 (i, A +1 (i)) 0 j i S (A (j) (i + 8), A (j+1) (i + 8)) + O(i(3/4) i n) O(i(3/4) i n) + 0 j i c(4/5) A(j) (i+8) n O(i(3/4) i n) + 5c(4/5) i+8 n c(4/5) i n for some sufficienty arge constant c. This convergence foows because 5(4/5) 8 is ess than 1. Equation 2 impies Q +1 (i, A +1 (i)) O(1) + max 0 j i Q (A (j) (i + 8), A (j+1) (i+8)) O(1)+c c(+1) for some sufficienty arge c. The induction thus carries through. To achieve desired time-space tradeoffs, we recurse one more iteration. Given a parameter m n, we set L = α(m, n) and h 0 = 0. At the fina (L + 1)-th iteration, choose the sequence 0, 1, 2,..., m/n, A L ( m/n ). This gives S L+1 (0, A L ( m/n )) S L ( m/n, A L ( m/n )) + O( m/n n) O(m) and Q L+1 (0, A L ( m/n )) O(L) = O(α(m, n)). Thus we have proved part (a) of Theorem 1. To further decrease the space cost of our index to 2n + o(n) bits, we sti recurse L eves. We choose L = α(n) and h 0 = og 4 L. Note that h 0 = ω(1) and A L (h 0 ) h. Therefore we have S L (h 0, A L (h 0 )) = O((4/5) h 0 n) = o(n), and Q L (h 0, A L (h 0 )) = O(L) = O(α(n)). To sove P 0,h0 and P 0,h 0, we perform bruteforce search on the query path in O(4 h 0 ) = O(α(n)) time, as a eve-h 0 custer has at most 4 h0 nodes. Thus we have proved part (b) of Theorem 1. By further constructing the preorder abe sequence [22, 21] of T, we have: Coroary 1. Let T be an ordina tree on n nodes, each having a weight drawn from [1..σ]. Then T can be represented (a) using n g σ + O(m) bits of space to support path minimum queries in O(α(m, n)) time, for any m n; or (b) using n(g σ+2)+o(n) bits of space to support path minimum queries in O(α(n)) time. 4 Encoding Topoogy Trees Let T be an ordina tree on n nodes. As described in Section 3, we transform T into a binary tree B, and compute the topoogy tree of B as H. Let n H denote the number of nodes in H; ceary n H = O(n). Let i 1 = 8 g g n and i 2 = (1/2) g g n 1. By Lemma 3, there are at most n 1 = (3/4) i 1 n = O(n/(4/3) 8 g g n ) = O(n/ g 8 g(4/3) n) < O(n/ g 3 n) custers at eve i 1, each

10 being of size at most m 1 = 4 i g g n+1 = 4 g 16 n. Simiary, there are at most n 2 = (3/4) i2 n = O(n/ g (1/2) g(4/3) n) < O(n/(g 1/5 n)) custers at eve i 2, each being size of at most m 2 = 4 i 2 4 (1/2) g g n 1 = (g n)/4. Leve-i 1 custers are caed mini-custers, and eve-i 2 ones are caed micro-custers. We first store the encodings of micro-custers. Lemma 9. A micro-custers can be encoded in 2n + o(n) bits of space such that given the topoogica rank of a custer, its encoding can be retrieved in O(1) time if it is a micro-custer. Proof. Note that B has at most 2n nodes. Given a micro-custer C, we do not store its encoding directy because it coud require about 4n bits of space for a micro-custers. Instead, we define X to be the union of non-dummy nodes and endpoints of C and store ony C X, where C X is the X-extraction of C as defined in Section 2. We aso mark the (at most 3) dummy nodes in C X, which requires O(g m 2 ) = O(g g n) bits per node. Encoding C X as baanced parentheses [27], the overa space cost of encoding C is 2n C + O(g g n) bits, where n C is the number of non-dummy nodes in C. We concatenate the above encodings of a micro-custers ordered by topoogica rank and store them in a sequence, P, of n = 2n + O(n g g n/(g 1/5 n)) bits. We construct a sparse bit vector, P, of the same ength, and set P [i] to 1 iff P [i] is the first bit of the encoding of a micro-custer. P can be represented using Lemma 1 in g ( ) n n 2 + O(n g g n/ g n) = O(n g g n/(g 1/5 n)) bits to support rank α and seect α in constant time. We construct another bit vector B 0 [1..n H ], in which B 0 [j] = 1 iff the custer with topoogica rank j is a micro-custer, which has the same asymptotic space cost. To retrieve the encoding of a custer, C, whose topoogica rank is j, we first use B 0 to check if C is a micro-custer. If it is, et r = rank 1 (B 0, j). Then the encoding of C X is P [seect 1 (P, r)..seect 1 (P, r + 1) 1]. To recover C from C X, we need ony foow the procedure described at the beginning of Section 3. This can be done in O(1) time using a ookup tabe F 0 of o(n) bits. To support operations, our main strategy is to encode goba information at eves on or above i 1, information oca to a mini-custer among eves between i 2 and i 1, and ookup tabes for the eves contained in a micro-custer. Extra care is needed as the topoogica order of custers is not the same as the reative order of their roots in preorder. Detais are omitted due to page imitation. 5 A Sketch of Supporting Path Reporting Queries In this section we sketch our improved data structures for path reporting queries. The detais of supporting path reporting queries are deferred to the fu version of this paper. Our soutions present various agorithmic techniques we deveoped to prove Theorem 2, as we as a simpified approach to achieve simiar timespace tradeoffs for the 2D orthogona range reporting probem on an n σ grid. Foowing the approach of He et a. [22], we buid a conceptua range tree on

11 [1..σ] with branching factor f = g ϵ n. We keep spitting ranges unti the bottom eve contains σ eaf ranges. This conceptua range tree has h = og f σ + 1 eves, among which the top eve is the first eve, and the bottom eve is the h-th eve. For each range [a..b] in the conceptua range tree, we obtain F a,b by extracting a nodes whose weights are in [a..b] from T. Each node x in F a,b is assigned a abe between 1 and f, which indicates the chid range at the ower eve that contains the node that corresponds to x. A these F a,b s are maintained in succinct representations such that path reporting queries with respect to abes can be answered in constant time per node. Let u and v be the endpoints of query path and [p..q] be the query range. The agorithm of He et a. [22] traverses the conceptua range tree from top to bottom, and spits [p..q] into O(g σ/ g g n) canonica ranges, each being a singe range, or the union of consecutive sibing ranges in the conceptua range tree. Thus the origina query can be transformed into O(g σ/ g g n) subqueries on different F a,b s. This reativey simpe agorithm requires an overhead of O(g σ/ g g n) time, in addition to O(g σ/ g g n) time per node in the output, since we need convert a node in F a,b to that of T eve by eve. Our new agorithm avoids traversing the conceptua range tree eve by eve. We make use of the ba-inheritance probem, such that, given a node x in some F a,b, we can determine the node in T that corresponds to x much faster than O(g σ/ g g n) time. To support the given query, we first find the owest range [a..b] in the conceptua range tree that competey contains [p..q]. Let [a 1..b 1 ], [a 2..b 2 ],..., [a f..b f ] be the chid ranges of [a..b] in increasing order of eft endpoints. We determine α, β [1..f], such that [a α..b β ] covers [p..q], and β α is minimized. The query range can thus be decomposed into [p..b α ], [a α+1..b β 1 ] and [a β..q]. The support for the second subrange is the same as that of He et a. [22]. For the third subrange, we empoy the succinct index designed in Theorem 1 with m = O(n g n), such that we can enumerate the nodes in F aβ,q that are on the query path in increasing order of weights. For each of them, we use the auxiiary data structures for the ba-inheritance probem to find the corresponding node in T. This procedure is terminated if the weight of the current node is above q. The support for the first subrange is simiar. References 1. Aon, N., Schieber, B.: Optima preprocessing for answering on-ine product queries. Tech. rep., Te Aviv University (1987) 2. Astrup, S., Hom, J.: Improved agorithms for finding eve ancestors in dynamic trees. In: ICALP. pp (2000) 3. Barbay, J., He, M., Munro, J.I., Satti, S.R.: Succinct indexes for strings, binary reations and mutiabeed trees. ACM Transactions on Agorithms 7(4), 52 (2011) 4. Bie, P.: A survey on tree edit distance and reated probems. Theor. Comput. Sci. 337(1-3), (2005) 5. Bringmann, K., Larsen, K.G.: Succinct samping from discrete distributions. In: STOC. pp (2013) 6. Broda, G.S., Davoodi, P., Rao, S.S.: Path minima queries in dynamic weighted trees. In: WADS. pp (2011)

12 7. Broda, G.S., Davoodi, P., Rao, S.S.: On space efficient two dimensiona range minimum data structures. Agorithmica 63(4), (2012) 8. Chan, T.M., Larsen, K.G., Pǎtraşcu, M.: Orthogona range searching on the RAM, revisited. In: Symposium on Computationa Geometry. pp (2011) 9. Chazee, B.: Computing on a free tree via compexity-preserving mappings. Agorithmica 2, (1987) 10. Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Agorithms (3. ed.). MIT Press (2009) 11. Demaine, E.D., Landau, G.M., Weimann, O.: On cartesian trees and range minimum queries. Agorithmica 68(3), (2014) 12. Demaine, E.D., López-Ortiz, A.: A inear ower bound on index size for text retrieva. J. Agorithms 48(1), 2 15 (2003) 13. Farzan, A., Munro, J.I.: A uniform paradigm to succincty encode various famiies of trees. Agorithmica 68(1), (2014) 14. Fischer, J., Heun, V.: Space-efficient preprocessing schemes for range minimum queries on static arrays. SIAM J. Comput. 40(2), (2011) 15. Frederickson, G.N.: Data structures for on-ine updating of minimum spanning trees, with appications. SIAM J. Comput. 14(4), (1985) 16. Geary, R.F., Raman, R., Raman, V.: Succinct ordina trees with eve-ancestor queries. ACM Transactions on Agorithms 2(4), (2006) 17. Goynski, A.: Optima ower bounds for rank and seect indexes. Theor. Comput. Sci. 387(3), (2007) 18. Hare, D., Tarjan, R.E.: Fast agorithms for finding nearest common ancestors. SIAM J. Comput. 13(2), (1984) 19. He, M., Munro, J.I., Satti, S.R.: Succinct ordina trees based on tree covering. ACM Transactions on Agorithms 8(4), 42 (2012) 20. He, M., Munro, J.I., Zhou, G.: Path queries in weighted trees. In: ISAAC. pp (2011) 21. He, M., Munro, J.I., Zhou, G.: A framework for succinct abeed ordina trees over arge aphabets. In: ISAAC. pp (2012) 22. He, M., Munro, J.I., Zhou, G.: Succinct data structures for path queries. In: ESA. pp (2012) 23. Kapan, H., Shafrir, N.: Path minima in incrementa unrooted trees. In: ESA. pp (2008) 24. King, V.: A simper minimum spanning tree verification agorithm. Agorithmica 18(2), (1997) 25. Krizanc, D., Morin, P., Smid, M.H.M.: Range mode and range median queries on ists and trees. Nord. J. Comput. 12(1), 1 17 (2005) 26. Mitersen, P.B.: Lower bounds on the size of seection and rank indexes. In: SODA. pp (2005) 27. Munro, J.I., Raman, V.: Succinct representation of baanced parentheses and static trees. SIAM J. Comput. 31(3), (2001) 28. Pati, M., Shah, R., Thankachan, S.V.: Succinct representations of weighted trees supporting path queries. J. Discrete Agorithms 17, (2012) 29. Pettie, S.: An inverse-ackermann type ower bound for onine minimum spanning tree verification. Combinatorica 26(2), (2006) 30. Raman, R., Raman, V., Satti, S.R.: Succinct indexabe dictionaries with appications to encoding k-ary trees, prefix sums and mutisets. ACM Transactions on Agorithms 3(4) (2007) 31. Seator, D.D., Tarjan, R.E.: A data structure for dynamic trees. J. Comput. Syst. Sci. 26(3), (1983)

Path Queries in Weighted Trees

Path Queries in Weighted Trees Path Queries in Weighted Trees Meng He 1, J. Ian Munro 2, and Gelin Zhou 2 1 Faculty of Computer Science, Dalhousie University, Canada. mhe@cs.dal.ca 2 David R. Cheriton School of Computer Science, University

More information

l Tree: set of nodes and directed edges l Parent: source node of directed edge l Child: terminal node of directed edge

l Tree: set of nodes and directed edges l Parent: source node of directed edge l Child: terminal node of directed edge Trees & Heaps Week 12 Gaddis: 20 Weiss: 21.1-3 CS 5301 Fa 2016 Ji Seaman 1 Tree: non-recursive definition Tree: set of nodes and directed edges - root: one node is distinguished as the root - Every node

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

Space-Time Trade-offs.

Space-Time Trade-offs. Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe

More information

An Exponential Time 2-Approximation Algorithm for Bandwidth

An Exponential Time 2-Approximation Algorithm for Bandwidth An Exponentia Time 2-Approximation Agorithm for Bandwidth Martin Fürer 1, Serge Gaspers 2, Shiva Prasad Kasiviswanathan 3 1 Computer Science and Engineering, Pennsyvania State University, furer@cse.psu.edu

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

Solutions to the Final Exam

Solutions to the Final Exam CS/Math 24: Intro to Discrete Math 5//2 Instructor: Dieter van Mekebeek Soutions to the Fina Exam Probem Let D be the set of a peope. From the definition of R we see that (x, y) R if and ony if x is a

More information

Alpha labelings of straight simple polyominal caterpillars

Alpha labelings of straight simple polyominal caterpillars Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.

More information

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

Path Minima Queries in Dynamic Weighted Trees

Path Minima Queries in Dynamic Weighted Trees Path Minima Queries in Dynamic Weighted Trees Gerth Stølting Brodal 1, Pooya Davoodi 1, S. Srinivasa Rao 2 1 MADALGO, Department of Computer Science, Aarhus University. E-mail: {gerth,pdavoodi}@cs.au.dk

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

A Petrel Plugin for Surface Modeling

A Petrel Plugin for Surface Modeling A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Fastest-Path Computation

Fastest-Path Computation Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters

Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters Crossing Minimiation Probems o Drawing Bipartite Graphs in Two Custers Lanbo Zheng, Le Song, and Peter Eades Nationa ICT Austraia, and Schoo o Inormation Technoogies, University o Sydney,Austraia Emai:

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University Arithmetic Coding Prof. Ja-Ling Wu Department of Computer Science and Information Engineering Nationa Taiwan University F(X) Shannon-Fano-Eias Coding W..o.g. we can take X={,,,m}. Assume p()>0 for a. The

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

Priority Queueing for Packets with Two Characteristics

Priority Queueing for Packets with Two Characteristics 1 Priority Queueing for Packets with Two Characteristics Pave Chuprikov, Sergey I. Nikoenko, Aex Davydow, Kiri Kogan Abstract Modern network eements are increasingy required to dea with heterogeneous traffic.

More information

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed

More information

Pattern Matching. a b a c a a b. a b a c a b. a b a c a b

Pattern Matching. a b a c a a b. a b a c a b. a b a c a b Pattern Matching a b a c a a b 1 a b a c a b 4 3 2 a b a c a b Strings A string is a seuence of characters Exampes of strings: n Python program n HTML document n DNA seuence n Digitized image An aphabet

More information

CERIAS Tech Report Replicated Parallel I/O without Additional Scheduling Costs by Mikhail J. Atallah Center for Education and Research

CERIAS Tech Report Replicated Parallel I/O without Additional Scheduling Costs by Mikhail J. Atallah Center for Education and Research CERIAS Tech Report 2003-50 Repicated Parae I/O without Additiona Scheduing Costs by Mikhai J. Ataah Center for Education and Research Information Assurance and Security Purdue University, West Lafayette,

More information

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) botton@poms.uc.ac.be Bernard

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,

More information

Chapter Multidimensional Direct Search Method

Chapter Multidimensional Direct Search Method Chapter 09.03 Mutidimensiona Direct Search Method After reading this chapter, you shoud be abe to:. Understand the fundamentas of the mutidimensiona direct search methods. Understand how the coordinate

More information

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162 oward Efficient Spatia Variation Decomposition via Sparse Regression Wangyang Zhang, Karthik Baakrishnan, Xin Li, Duane Boning and Rob Rutenbar 3 Carnegie Meon University, Pittsburgh, PA 53, wangyan@ece.cmu.edu,

More information

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

Image Segmentation Using Semi-Supervised k-means

Image Segmentation Using Semi-Supervised k-means I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging

More information

M. Badent 1, E. Di Giacomo 2, G. Liotta 2

M. Badent 1, E. Di Giacomo 2, G. Liotta 2 DIEI Dipartimento di Ingegneria Eettronica e de informazione RT 005-06 Drawing Coored Graphs on Coored Points M. Badent 1, E. Di Giacomo 2, G. Liotta 2 1 University of Konstanz 2 Università di Perugia

More information

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions 2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing

More information

Planar Graphs of Bounded Degree have Constant Queue Number

Planar Graphs of Bounded Degree have Constant Queue Number Panar Graphs of Bounded Degree have Constant Queue Number Michae A. Bekos, Henry Förster, Martin Gronemann, Tamara Mchedidze 3 Fabrizio Montecchiani 4, Chrysanthi Raftopouou 5, Torsten Ueckerdt 3 Institute

More information

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES Eya En Gad, Akshay Gadde, A. Saman Avestimehr and Antonio Ortega Department of Eectrica Engineering University of Southern

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

On Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture

On Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture On inding the est Partia Muticast Protection Tree under ua-homing rchitecture Mei Yang, Jianping Wang, Xiangtong Qi, Yingtao Jiang epartment of ectrica and omputer ngineering, University of Nevada Las

More information

Community-Aware Opportunistic Routing in Mobile Social Networks

Community-Aware Opportunistic Routing in Mobile Social Networks IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract

More information

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM JOINT IMAGE REGISTRATION AND AMPLE-BASED SUPER-RESOLUTION ALGORITHM Hyo-Song Kim, Jeyong Shin, and Rae-Hong Park Department of Eectronic Engineering, Schoo of Engineering, Sogang University 35 Baekbeom-ro,

More information

Minmax Regret 1-Center on a Path/Cycle/Tree

Minmax Regret 1-Center on a Path/Cycle/Tree ADVCOMP 2012 : The Sixth Internationa Conference on Adanced Engineering Computing and Appications in Sciences Minmax Regret 1-Center on a Path/Cyce/Tree Binay Bhattacharya, Tsunehiko Kameda, and Zhao Song

More information

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints *

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG

More information

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction

More information

Semi-Supervised Learning with Sparse Distributed Representations

Semi-Supervised Learning with Sparse Distributed Representations Semi-Supervised Learning with Sparse Distributed Representations David Zieger dzieger@stanford.edu CS 229 Fina Project 1 Introduction For many machine earning appications, abeed data may be very difficut

More information

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line American J. of Engineering and Appied Sciences 3 (): 5-24, 200 ISSN 94-7020 200 Science Pubications Appication of Inteigence Based Genetic Agorithm for Job Sequencing Probem on Parae Mixed-Mode Assemby

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

Further Concepts in Geometry

Further Concepts in Geometry ppendix F Further oncepts in Geometry F. Exporing ongruence and Simiarity Identifying ongruent Figures Identifying Simiar Figures Reading and Using Definitions ongruent Trianges assifying Trianges Identifying

More information

Enumeration of MSO Queries on Strings with Constant Delay and Logarithmic Updates

Enumeration of MSO Queries on Strings with Constant Delay and Logarithmic Updates Enumeration of MSO Queries on Strings with Constant Deay and Logarithmic Updates ABSTRACT Matthias Niewerth University of Bayreuth We consider the enumeration of MSO queries over strings under updates.

More information

Understanding the Mixing Patterns of Social Networks: The Impact of Cores, Link Directions, and Dynamics

Understanding the Mixing Patterns of Social Networks: The Impact of Cores, Link Directions, and Dynamics Understanding the Mixing Patterns of Socia Networks: The Impact of Cores, Link Directions, and Dynamics [Last revised on May 22, 2011] Abedeaziz Mohaisen Huy Tran Nichoas Hopper Yongdae Kim University

More information

Searching, Sorting & Analysis

Searching, Sorting & Analysis Searching, Sorting & Anaysis Unit 2 Chapter 8 CS 2308 Fa 2018 Ji Seaman 1 Definitions of Search and Sort Search: find a given item in an array, return the index of the item, or -1 if not found. Sort: rearrange

More information

A Simple Linear-Space Data Structure for Constant-Time Range Minimum Query

A Simple Linear-Space Data Structure for Constant-Time Range Minimum Query A Simple Linear-Space Data Structure for Constant-Time Range Minimum Query Stephane Durocher University of Manitoba, Winnipeg, Canada, durocher@cs.umanitoba.ca Abstract. We revisit the range minimum query

More information

arxiv: v1 [cs.cg] 3 Dec 2013

arxiv: v1 [cs.cg] 3 Dec 2013 Linear transformation distance for bichromatic matchings Oswin Aichhozer Luis Barba Thomas Hack Aexander Piz Birgit Vogtenhuber arxiv:1312.0884v1 [cs.cg] 3 Dec 2013 Abstract Let P = B R be a set of 2n

More information

Interval Stabbing Problems in Small Integer Ranges

Interval Stabbing Problems in Small Integer Ranges Interval Stabbing Problems in Small Integer Ranges Jens M. Schmidt Freie Universität Berlin, Germany Enhanced version of August 2, 2010 Abstract Given a set I of n intervals, a stabbing query consists

More information

Versatile Size-l Object Summaries for Relational Keyword Search

Versatile Size-l Object Summaries for Relational Keyword Search IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. X, NO. Y, XXXX, YYYY Versatie Size- Object Summaries for Reationa Keyword Search Georgios J. Fakas, Zhi Cai and Nikos Mamouis Abstract The Object

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models On Upper Bounds for Assortment Optimization under the Mixture of Mutinomia Logit Modes Sumit Kunnumka September 30, 2014 Abstract The assortment optimization probem under the mixture of mutinomia ogit

More information

Efficient and Practical Modular Decomposition?

Efficient and Practical Modular Decomposition? Efficient and Practica Moduar Decomposition? Eiias Dahhaust Jens Gusted6 Ross M. McConne Abstract We give a simpe recursive agorithm for moduar decomposition of undirected graphs that runs in O(n + ma(m,n))

More information

A Method for Calculating Term Similarity on Large Document Collections

A Method for Calculating Term Similarity on Large Document Collections $ A Method for Cacuating Term Simiarity on Large Document Coections Wofgang W Bein Schoo of Computer Science University of Nevada Las Vegas, NV 915-019 bein@csunvedu Jeffrey S Coombs and Kazem Taghva Information

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

On-Chip CNN Accelerator for Image Super-Resolution

On-Chip CNN Accelerator for Image Super-Resolution On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement

More information

Distributed Approximation of k-service Assignment

Distributed Approximation of k-service Assignment Distributed Approximation of k-service Assignment Magnús M. Hadórsson, Sven Köher 2, and Dror Rawitz 3 Reykjavik University, Iceand, mmh@ru.is 2 University of Freiburg, koehers@informatik.uni-freiburg.de

More information

Linear-Space Data Structures for Range Minority Query in Arrays

Linear-Space Data Structures for Range Minority Query in Arrays Linear-Space Data Structures for Range Minority Query in Arrays Timothy M. Chan 1, Stephane Durocher 2, Matthew Skala 2, and Bryan T. Wilkinson 1 1 Cheriton School of Computer Science, University of Waterloo,

More information

(0,l) (0,0) (l,0) (l,l)

(0,l) (0,0) (l,0) (l,l) Parae Domain Decomposition and Load Baancing Using Space-Fiing Curves Srinivas Auru Fatih E. Sevigen Dept. of CS Schoo of EECS New Mexico State University Syracuse University Las Cruces, NM 88003-8001

More information

arxiv: v1 [math.qa] 31 Aug 2018

arxiv: v1 [math.qa] 31 Aug 2018 arxiv:808.0575v [math.qa] 3 Aug 208 A new approach to the SL n spider Stephen Bigeow September 3, 208 Abstract The SL n spider gives adiagrammatic way toencode therepresentation category of the quantum

More information

Delay Budget Partitioning to Maximize Network Resource Usage Efficiency

Delay Budget Partitioning to Maximize Network Resource Usage Efficiency Deay Budget Partitioning to Maximize Network Resource Usage Efficiency Kartik Gopaan Tzi-cker Chiueh Yow-Jian Lin Forida State University Stony Brook University Tecordia Technoogies kartik@cs.fsu.edu chiueh@cs.sunysb.edu

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

Privacy Preserving Subgraph Matching on Large Graphs in Cloud

Privacy Preserving Subgraph Matching on Large Graphs in Cloud Privacy Preserving Subgraph Matching on Large Graphs in Coud Zhao Chang,#, Lei Zou, Feifei Li # Peing University, China; # University of Utah, USA; {changzhao,zouei}@pu.edu.cn; {zchang,ifeifei}@cs.utah.edu

More information

Response Surface Model Updating for Nonlinear Structures

Response Surface Model Updating for Nonlinear Structures Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,

More information

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER!

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER! [1,2] have, in theory, revoutionized cryptography. Unfortunatey, athough offer many advantages over conventiona and authentication), such cock synchronization in this appication due to the arge operand

More information

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network Service Chain (SC) Mapping with Mutipe SC Instances in a Wide Area Network This is a preprint eectronic version of the artice submitted to IEEE GobeCom 2017 Abhishek Gupta, Brigitte Jaumard, Massimo Tornatore,

More information

Approximate Closest Community Search in Networks

Approximate Closest Community Search in Networks Approximate Cosest Community Search in Networks Xin Huang, Laks V.S. Lakshmanan, Jeffrey Xu Yu, Hong Cheng University of British Coumbia, The Chinese University of Hong Kong {xin,aks}@cs.ubc.ca, {yu, hcheng}@se.cuhk.edu.hk

More information

Encoding Data Structures

Encoding Data Structures Encoding Data Structures Rajeev Raman University of Leicester ERATO-ALSIP special seminar RMQ problem Given a static array A[1..n], pre-process A to answer queries: RMQ(l, r) : return max l i r A[i]. 47

More information

Geometric clustering for line drawing simplification

Geometric clustering for line drawing simplification Eurographics Symposium on Rendering (2005) Kavita Baa, Phiip Dutré (Editors) Geometric custering for ine drawing simpification P. Bara, J.Thoot and F. X. Siion ε ARTIS GRAVIR/IMAG INRIA Figure 1: The two

More information

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y. FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four

More information

A Local Optimal Method on DSA Guiding Template Assignment with Redundant/Dummy Via Insertion

A Local Optimal Method on DSA Guiding Template Assignment with Redundant/Dummy Via Insertion A Loca Optima Method on DSA Guiding Tempate Assignment with Redundant/Dummy Via Insertion Xingquan Li 1, Bei Yu 2, Jiani Chen 1, Wenxing Zhu 1, 24th Asia and South Pacific Design T h e p i c Automation

More information

Binarized support vector machines

Binarized support vector machines Universidad Caros III de Madrid Repositorio instituciona e-archivo Departamento de Estadística http://e-archivo.uc3m.es DES - Working Papers. Statistics and Econometrics. WS 2007-11 Binarized support vector

More information

The Big Picture WELCOME TO ESIGNAL

The Big Picture WELCOME TO ESIGNAL 2 The Big Picture HERE S SOME GOOD NEWS. You don t have to be a rocket scientist to harness the power of esigna. That s exciting because we re certain that most of you view your PC and esigna as toos for

More information

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations Formuation of Loss minimization Probem Using Genetic Agorithm and Line-Fow-based Equations Sharanya Jaganathan, Student Member, IEEE, Arun Sekar, Senior Member, IEEE, and Wenzhong Gao, Senior member, IEEE

More information

Dynamic Range Majority Data Structures

Dynamic Range Majority Data Structures Dynamic Range Majority Data Structures Amr Elmasry 1, Meng He 2, J. Ian Munro 3, and Patrick K. Nicholson 3 1 Department of Computer Science, University of Copenhagen, Denmark 2 Faculty of Computer Science,

More information

Quality of Service Evaluations of Multicast Streaming Protocols *

Quality of Service Evaluations of Multicast Streaming Protocols * Quaity of Service Evauations of Muticast Streaming Protocos Haonan Tan Derek L. Eager Mary. Vernon Hongfei Guo omputer Sciences Department University of Wisconsin-Madison, USA {haonan, vernon, guo}@cs.wisc.edu

More information

A Locally Encodable and Decodable Compressed Data Structure

A Locally Encodable and Decodable Compressed Data Structure A Locay Encodabe and Decodabe Compressed Data Structure Venkat Chandar Devavrat Shah Gregory W. Worne Abstract In a variety of appications, ranging from highspeed networks to massive databases, there is

More information

Polygonal Approximation of Point Sets

Polygonal Approximation of Point Sets Poygona Approximation of Point Sets Longin Jan Latecki 1, Rof Lakaemper 1, and Marc Sobe 2 1 CIS Dept., Tempe University, Phiadephia, PA 19122, USA, atecki@tempe.edu, akamper@tempe.edu 2 Statistics Dept.,

More information

Split Restoration with Wavelength Conversion in WDM Networks*

Split Restoration with Wavelength Conversion in WDM Networks* Spit Reoration with aveength Conversion in DM Networks* Yuanqiu Luo and Nirwan Ansari Advanced Networking Laborator Department of Eectrica and Computer Engineering New Jerse Initute of Technoog Universit

More information

MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY

MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY R.D. FALGOUT, T.A. MANTEUFFEL, B. O NEILL, AND J.B. SCHRODER Abstract. The need for paraeism in the time dimension is being driven

More information

MACHINE learning techniques can, automatically,

MACHINE learning techniques can, automatically, Proceedings of Internationa Joint Conference on Neura Networks, Daas, Texas, USA, August 4-9, 203 High Leve Data Cassification Based on Network Entropy Fiipe Aves Neto and Liang Zhao Abstract Traditiona

More information

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method 297 Rea-Time Feature escriptor Matching via a Muti-Resoution Ehaustive Search Method Chi-Yi Tsai, An-Hung Tsao, and Chuan-Wei Wang epartment of Eectrica Engineering, Tamang University, New Taipei City,

More information

Linear-Space Data Structures for Range Frequency Queries on Arrays and Trees

Linear-Space Data Structures for Range Frequency Queries on Arrays and Trees Noname manuscript No. (will be inserted by the editor) Linear-Space Data Structures for Range Frequency Queries on Arrays and Trees Stephane Durocher Rahul Shah Matthew Skala Sharma V. Thankachan the date

More information

Fast b-matching via Sufficient Selection Belief Propagation

Fast b-matching via Sufficient Selection Belief Propagation Fast b-matching via Sufficient Seection Beief Propagation Bert Huang Computer Science Department Coumbia University New York, NY 127 bert@cs.coumbia.edu Tony Jebara Computer Science Department Coumbia

More information

Fast b-matching via Sufficient Selection Belief Propagation

Fast b-matching via Sufficient Selection Belief Propagation Bert Huang Computer Science Department Coumbia University New York, NY 127 bert@cs.coumbia.edu Tony Jebara Computer Science Department Coumbia University New York, NY 127 jebara@cs.coumbia.edu Abstract

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

Range Mode and Range Median Queries on Lists and Trees

Range Mode and Range Median Queries on Lists and Trees Range Mode and Range Median Queries on Lists and Trees Danny Krizanc 1, Pat Morin 2, and Michiel Smid 2 1 Department of Mathematics and Computer Science, Wesleyan University, Middletown, CT 06459 USA dkrizanc@wesleyan.edu

More information

UnixWare 7 System Administration UnixWare 7 System Configuration

UnixWare 7 System Administration UnixWare 7 System Configuration UnixWare 7 System Administration - CH 3 - UnixWare 7 System Configuration Page 1 of 8 [Figures are not incuded in this sampe chapter] UnixWare 7 System Administration - 3 - UnixWare 7 System Configuration

More information

Approximation schemes for Euclidean k-medians and related problems

Approximation schemes for Euclidean k-medians and related problems Approximation schemes for Eucidean k-medians and reated probems Sanjeev Arora* Princeton University Prabhakar Raghavant IBM Research Satish Rae* NEC Research Abstract In t.he k-median probem we are given

More information

Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering

Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering Kin-Hon Ho, Michae Howarth, Ning Wang, George Pavou and Styianos Georgouas Centre for Communication Systems Research, University

More information

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002*

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002* RDF Objects 1 Aex Barne Information Infrastructure Laboratory HP Laboratories Bristo HPL-2002-315 November 27 th, 2002* E-mai: Andy_Seaborne@hp.hp.com RDF, semantic web, ontoogy, object-oriented datastructures

More information

1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation

1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation 1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER 2014 Bacward Fuzzy Rue Interpoation Shangzhu Jin, Ren Diao, Chai Que, Senior Member, IEEE, and Qiang Shen Abstract Fuzzy rue interpoation

More information

Automatic Grouping for Social Networks CS229 Project Report

Automatic Grouping for Social Networks CS229 Project Report Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct

More information