MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES. Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou

Size: px
Start display at page:

Download "MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES. Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou"

Transcription

1 MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou Departent of Coputer Science and Inforation Engineering, National Chiayi University, Taiwan ABSTRACT In this paper, we propose a fast search ethod for asyetric distance coputation in large-scale binary codes. Asyetric distances take advantage of less inforation loss at the query side. However, calculating asyetric distances with the linear scan approach is prohibitive in a large-scale dataset. We present a novel algorith called ulti-index voting, which integrates the ulti-index hashing technique with a voting echanis, to select appropriate candidates and calculate their asyetric distances. Substantial experiental evaluations are given to deonstrate that, guided by the voting echanis, the proposed ethod can yield an approxiate accuracy to the linear scan approach while accelerating the run tie with a significant speedup. For exaple, one result shows that in a dataset of one billion 256-bit binary codes, exaining only.5% of the dataset can reach 95~99% close accuracy to the linear scan approach but can accelerate over 73~128 ties. Index Ters Nearest neighbor search, asyetric distance coputation, ulti-index hashing and voting 1. INTRODUCTION Searching the nearest neighbors (NN) is a proble of finding the closest data with respect to a given query. It is a fundaental requireent in any applications, such as inforation retrieval, signal processing, pattern recognition, and coputer vision. However, within a high-diensional feature space and a large-scale dataset volue, the NN search becoes a very challenging task when faced with the accuracy, efficiency, and eory issues siultaneously. A nuber of binary ebedding algoriths have been recently proposed to address these issues [1][3][4][7][8][1]. By ebedding the original data into the binary space, the binary ebedding algoriths enable a faster NN search by hardware-supported bit operations and anageable eory consuption with the copact binary representation. However, the use of binary ebedding causes severe inforation loss after ebedding. Even though these binary ebedding algoriths try to bridge the gap through learning, an inevitable large inforation loss exists in apping a realvalued vector to a binary code. Besides, the Haing distance between two binary codes allows only a few distinct values. Hence, the NN search in the binary space causes a weaker discriination than that in the real-valued space. A novel concept called asyetric distance atching for binary codes has recently been proposed, and has been shown to be ore accurate than Haing distance atching [2][5]. Asyetric eans that the distance is coputed between two different spaces. For exaple, in our case, the query is a real-valued vector while the reference data are binary codes. Since asyetric atching does not ebed the query to the binary space, it takes advantage of a lesser aount of inforation loss at the query side. The NN search in the real-valued space would yield a ore discriinating result. We follow Gordo et al. s forulation of asyetric distances for binary ebedding codes [2]. Assue that a binary ebedding function h(x i ) = q(f(x i )) can be decoposed into two functions f and q, where f(x i ): {R} s {I} t transfors s-diensional real-valued vector x i to a t-diensional real-valued vector y i, and q(y i ): {I} t {B} t transfors y i to a t-diensional binary code z i. 1 The asyetric distance between a real-valued vector (query) and a binary code (reference) is calculated in the interediate space {I} t. In Gordo et al. s approach, they adopted the linear scan schee to exhaustively calculate the asyetric distances of all reference data. However, this is prohibitive when searching in a large-scale dataset. In this paper, we propose a fast search ethod for asyetric distance coputation in large-scale binary codes. For a reference dataset of binary codes, we divide each code into disjoint binary subvectors and store the in different index tables. Given a query of the real-valued vector, it is transfored and divided into interediate real-valued subvectors. We calculate the Euclidean distances in the interediate space between each query subvector and centroids of all entries in an index table, and rank these entries fro near to far. We then sequentially scan the ranked entries across the index tables for voting. A reference binary code that has ultiple subvectors close to the query, i.e., it gets enough votes fro the query, is selected as a candidate. Finally, we calculate candidates asyetric distances and output NNs for the query. 1 R, I, and B represent the original real-valued, interediate, and ebedded binary spaces, respectively /16/$ IEEE 116 ICASSP 216

2 The candidate selection algorith is called ulti-index voting. Epirical studies are given through substantial experiental evaluations on large-scale datasets. Results show that, guided by the voting echanis, the proposed ethod deonstrates a satisfactory accuracy with a significant speedup. For exaple, in a dataset of one billion 256-bit binary codes, our ethod that exaines only.5% of the reference dataset can reach 95~99% close accuracy to the linear scan approach but can accelerate over 73~128 ties [2]. Two state-of-the-art ethods for asyetric NN search, including product quantization [5] and ulti-index hashing [9] are ipleented for coparison. The proposed ethod yields the best accuracy by taking advantage of cobining ulti-index voting and interediate space coputation. In particular, without the voting echanis, the accuracy is uch lower than the linear scan approach; adopting the voting echanis can generate a burst iproveent in accuracy. The reainder of this paper is organized as follows. In Section 2, we briefly introduce the related work. Section 3 describes and analyzes the proposed ulti-index voting algorith in detail. Section 4 deonstrates and discusses the experiental results. Conclusions are given in Section RELATED WORK The NN search for binary codes can be divided into two categories: syetric and asyetric. For the syetric approach, a query x Q is transfored to a binary code through the binary ebedding function. The distance fro x Q to a reference data x i is expressed as the Haing distance of their binary codes. Matching binary codes can be done efficiently with a couple of achine instructions (e.g., XOR and POPCNT instructions). In particular, Norouzi et al. [9] proposed an efficient ulti-index hashing (MIH) schee to perfor an exact search for binary codes. Reference binary codes are divided into disjoint subvectors and hashed into different index tables. Given a query and a search radius r, the reference codes that differ fro the query by r bits or less can be exactly returned. A key factor for speedup is that for each index table, the search radius is decreased to only r bits. This is because, when two binary codes differ by r bits or less, at least in one of their subvectors they differ by at ost r bits. Rather than the syetric approach that purely exploits the binary space structure, the asyetric approach utilizes the original space inforation of binary codes. However, the asyetric distance between x Q and x i is coputed in neither the original space nor the binary space; it is calculated in their interediate space. Gordo et al. [2] presented two asyetric distance coputation (ADC) schees based on statistic expectation and lower-bound. Jégou et al. [5] proposed an inverted file syste with asyetric distance coputation (IVF-ADC) for approxiate NN search based on product quantization. The inverted file syste is served as a coarse quantizer. The residual vector between a vector and its corresponding coarse centroid is encoded with a product quantizer, which proceeds by decoposing the high-diensional space into a Cartesian product of low-diensional subspaces. 3. MULTI-INDEX VOTING Suppose we have a reference dataset of n t-diensional binary codes {z i {B} t i = 1, 2,, n}, whose correspondences are s-diensional real-valued vectors in the original space {x i {R} s i = 1, 2,, n} and t- diensional real-valued vectors in the interediate space {y i {I} t i = 1, 2,, n}. Every binary code z i is divided into disjoint subvectors, each of which coprises of g = t bits (assue t is divisible by ). g should be chosen appropriately so that the syste can bear O(2 g ) data space occupied in eory. We then build index tables with respect to subvectors as follows. Denote the jth subvector as z i, j [1, ]. A cluster Z β = {i z i β} is generated to store a set of reference identities whose jth subvectors are, where β {B} g is a g-diensional binary code. We also copute the cluster ean in the interediate space of Z β : y β = 1 Z β y i i Z β where denotes the cardinality of the set. For any subvector z i = β, its correspondence in the interediate space can be considered to be y β. In other words, we build a quantizer u of the jth subvector in the interediate space: u (y i ) = y β for i Z β. Z β and y β are calculated for all j and offline. An online knn search algorith for the given query x Q {R} s is presented hereafter. The query x Q is projected to the interediate space as y Q and then divided into subvectors. For the jth subvector y Q, we sort the clusters {Z β } based on its Euclidean distances to the cluster eans {y β } in ascending order. Denote the sorted cluster indexes as {B r r = 1,2,, 2 g }, where y Br is the rth nearest to y Q in the interediate space. Started fro the nearest clusters of all subvectors {Z B1 j = 1,2,, }, if a reference data x i is stored in Z B1, we denote x i is voted by x Q. When the vote count of x i accuulates ore than the vote threshold T v, x i is put in a candidate set. The process is repeated for the next nearest clusters until the size of the candidate set is greater than the candidate threshold T c. The search algorith, tered ulti-index voting, is listed in the following:, 1161

3 Algorith: Multi-index voting Input: n reference binary codes {z i }, index tables {Z β }, and the query x Q. Output: k NN binary codes for x Q. 1. Generate a t-diensional vector in the interediate space for x Q : y Q = f(x Q ). 2. For each subvector index j and binary code, calculate the Euclidean distance between y Q and yβ : ed (y Q, yβ ) = yq yβ For each j, sort the above Euclidean distances to obtain an index list {B r r = 1,2,, 2 g }, where y Br is the rth nearest to y Q in the interediate space. 4. Initialize an epty candidate set C and vote counts for all x i : x i.votecount =, i = 1, 2,, n. 5. Let C be the size of C, T v and T c be the thresholds of the vote count and the candidate size respectively. Do the loop: do for r = 1 to 2 g for j = 1 to for i Z Br x i.votecount = x i.votecount + 1. if x i.votecount T v Add x i to C. while C < T c. 6. For each x i C, calculate the asyetric distance between x Q and x i in the interediate space: ad(x Q, x i ) = ed (y Q, yβ ), j=1 where i Z β. Build a axheap to store the k sallest asyetric distances seen so far. 7. Apply the heap sort algorith to the axheap and output the k NN binary codes. 4. EXPERIMENTAL RESULT We carried out the experients on a public large-scale dataset: ANN_SIFT1B [6]. It contains one billion SIFT vectors (each with 128-diensional real values) and 1, queries along with the ground truth of 1, nearest neighbors for each query. The real-valued vectors are transfored to 128/256 bits binary codes by using locality sensitive hashing (LSH). Experients were run on a PC using Windows 7, with Intel Core i7 3.4GHz CPU (only one thread is used), 256KB L2 cache, and 64GB RAM. We ipleent five NN search ethods for coparison, including exhaustive syetric distance coputation (abbreviated as SDC), exhaustive asyetric distance coputation (ADC) [2], inverted file syste with asyetric distance coputation (IVF-ADC) [5], ultiindex hashing with asyetric distance coputation (MIH- ADC) [9], and the proposed ulti-index voting with asyetric distance coputation (MIV-ADC). The forer two ethods perfor an exact but exhaustive search. They can be considered the baselines of the syetric and asyetric approaches, respectively. The latter three ethods act as the approxiate but speedup versions of ADC. The ain difference aong the is in the inverted indexing: IVF-ADC eploys a single index table; MIH- ADC and MIV-ADC adopt ultiple index tables but with different candidate selection echaniss. MIH-ADC selects candidates that are hit by the query only once and within r bits Haing distance to the query in the binary space. MIV-ADC applies a voting echanis to select candidates if they are hit by the query at least T v ties in different index tables, and candidates are selected in order according to their Euclidean distances to the query in the interediate space. Figure 1 plots ean average precision () for SDC, ADC, and MIV-ADC. The abscissa axes represent T v, and the ordinate axes represent. Solid curves represent various T c = {1K, 5K, 1K, 5K, 1M} of MIV-ADC, while dash lines represent SDC and ADC. In general, ADC stands for the accuracy upper bound for in asyetric binary code search. MIV-ADC gets an iproveent on accuracy with an increasing voting threshold T v. However, it turns out to be degenerated when T v is close to the nuber of index tables due to the cuulative quantization error in the interediate space MIV-ADC_1K MIV-ADC_5K MIV-ADC_1K MIV-ADC_5K MIV-ADC_1M ADC SDC T v T v (a) (b) Fig. 1. for querying the 1B (a) 128-bit and (b) 256-bit datasets. Solid curves represent various T c = {1K, 5K, 1K, 5K, 1M} of MIV-ADC, while dash lines represent SDC and ADC. Tables I and II suarize the run tie for the 128-bit and 256-bit datasets, respectively. In general, as the candidate size T c increases ten ties, the run tie increases uch less than ten ties. It iplies the proposed ethod runs in a sublinear tie coplexity. In addition, the speedup of MIV-ADC over ADC is ore proinent in a longer-bit dataset. As an exaple of the 256-bit dataset, when T v = 3 and T c = 5K (.5% of the reference dataset), MIV-ADC can reach 99% close to ADC but run over 73 ties faster than ADC; if we change T v = 2, MIV-ADC can reach 95% close accuracy to ADC with 128 ties acceleration over ADC MIV-ADC_1K MIV-ADC_5K MIV-ADC_1K MIV-ADC_5K MIV-ADC_1M ADC SDC 1162

4 Table I. Run tie (second) for querying the 1B 128-bit dataset T v = 1 T v = 2 T v = 3 T v = 4 T v = 5 T v = 6 T v = 7 T v = 8 T c = 1K T c = 5K MIV-ADC T c = 1K T c = 5K T c = 1M E-SDC E-ADC Table II. Run tie (second) for querying the 1B 256-bit dataset T v = 1 T v = 2 T v = 3 T v = 4 T v = 5 T v = 6 T v = 7 T v = 8 T c = 1K T c = 5K MIV-ADC T c = 1K T c = 5K T c = 1M E-SDC E-ADC Next, we copare and discuss the three approxiate ADC ethods: IVF-ADC, MIH-ADC, and MIV-ADC. Figure 2 shows and run tie for querying the 128-bit dataset. All ethods apply the sae feature decoposition schee by partitioning the original SIFT vector into eight disjoint subvectors. In the 128-bit dataset, IVF-ADC eploys one index table, whereas MIH-ADC and MIV- ADC eploy eight index tables; each index table coprises of 2 16 entries (clusters). We do not show the result of the 256-bit dataset because MIH-ADC requires ore eory beyond the 64GB RAM achine. Despite the voting echanis, MIV-ADC yields the best accuracy aong these ethods. Considering MIV- ADC and MIH-ADC, they both use ultiple index tables but apply different candidate selection strategies. MIV-ADC selects candidates in the interediate space, whereas MIH- ADC does it in the binary space, which is known to be less discriinatory. Therefore, MIV-ADC can obtain higher quality candidates to yield a better accuracy than MIH-ADC. An interesting observation is that, in Figure 2(b), the run tie of MIH-ADC and MIV-ADC has a crossover in the interval T c = {1K, 5K}. In other words, when T c is raised, MIH-ADC will take ore tie to collect ore candidates than MIV-ADC. This is because the candidate set of MIH-ADC grows rapidly with the order of the binoial coefficient, whereas that of MIV-ADC increases gradually in the proposed voting algorith. For the run tie, IVF-ADC is the fastest NN search ethod due to its siple single-index structure. Without the voting echanis, however, the accuracy is uch lower than the accuracy upper bound posed by the linear scan ethod ADC. It requires a large aount of candidates to be exained to approach the accuracy upper bound, and thus uch ore tie is spent for the candidate exaination. MIV-ADC that adopts the voting echanis can generate a burst iproveent in accuracy, which is close to the accuracy upper bound, by exaining relatively sall aount of candidates. For exaple in the 256-bit dataset, IVF-ADC yields.15 by spends 5.8 seconds to scanning one hundred illion candidates (1% of the 1B reference dataset), while MIV-ADC yields the sae accuracy by spending.93 seconds to scan five hundred thousand candidates (.5% of the 1B reference dataset) under T v = IVF-ADC MIH-ADC MIV-ADC T =1 v =2 =3 1K 1K 5K 1M T c (a) (b) Fig. 2. (a) and (b) run tie for searching the 1B 128- bit SIFT dataset by IVF-ADC, MIH-ADC, and MIV-ADC. 5. CONCLUSIONS In this paper, we present an approxiate asyetric NN search ethod for binary ebedding codes. By taking advantage of ulti-index voting in the interediate space, the proposed ethod achieves an outstanding perforance in ters of the tradeoff between the accuracy and the efficiency. Experiental results show the proposed NN search ethod yields a close accuracy to the linear scan approach and a significant speedup by applying a sall vote threshold in exaining a fraction of the dataset. ACKNOWLEDGEMENTS 1K 1K 5K 1M T c This work was supported in part by the Ministry of Science and Technology, Taiwan, under Grants MOST E MY3 and MOST E MY2. run tie IVF-ADC MIH-ADC MIV-ADC T =1 v =2 =3 1163

5 REFERENCES [1] T. Ge, K. He, and J. Sun, Graph cuts for supervised binary coding, In Proceedings of European conference on Coputer Vision (Zurich, Switzerland, Sep. 6-12, 214). ECCV 14. [2] A. Gordo, F. Perronnin, Y. Gong, and S. Lazebnik, Asyetric distances for binary ebeddings, IEEE Transactions on Pattern Analysis and Machine Intelligence. Vol. 36, No. 1, pp , 214. [3] K. He, F. Wen, and J. Sun, K-eans hashing: an affinity-preserving quantization ethod for learning binary copact codes, In Proceedings of IEEE International Conference on Coputer Vision and Pattern Recognition. (Portland, USA, Jun ). CVPR 13. [4] G. Irie, Z. Li, X. M. Wu, and S. F. Chang, Locally linear hashing for extracting non-linear anifolds, In Proceedings of IEEE International Conference on Coputer Vision and Pattern Recognition (Colubus, USA, Jun , 214). CVPR 14. [5] H. Jégou, M. Douze, and C. Schid, Product quantization for nearest neighbor search, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 33, No. 1, pp , 211. [6] H. Jégou, R. Tavenard, M. Douze, and L. Asaleg, Searching in one billion vectors: re-rank with source coding, In Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (Prague, Czech Republic, May 22-27, 211). ICASSP 11. [7] W. Liu, J. Wang, S. Kuar, and S. F. Chang, Hashing with graphs, In Proceedings of International Conference on Machine Learning (Bellevue, USA, Jun. 28-Jul. 2, 211). ICML 11. [8] M. Norouzi and D. J. Fleet, Minial loss hashing for copact binary codes, In Proceedings of International Conference on Machine Learning (Bellevue, USA, Jun. 28-Jul. 2, 211). ICML 11. [9] M. Norouzi, A. Punjani, and D. J. Fleet, Fast exact search in Haing space with ulti-index hashing, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 36, No. 6, pp , 214. [1] Y. Weiss, A. Torralba, and R. Fergus, Spectral hashing, In Proceedings of Annual Conference on Neural Inforation Processing Systes (Vancouver, Canada, Dec. 8-13, 28). NIPS

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13 Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

Image Filter Using with Gaussian Curvature and Total Variation Model

Image Filter Using with Gaussian Curvature and Total Variation Model IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.

More information

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute

More information

Ascending order sort Descending order sort

Ascending order sort Descending order sort Scalable Binary Sorting Architecture Based on Rank Ordering With Linear Area-Tie Coplexity. Hatrnaz and Y. Leblebici Departent of Electrical and Coputer Engineering Worcester Polytechnic Institute Abstract

More information

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3 2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition

More information

2013 IEEE Conference on Computer Vision and Pattern Recognition. Compressed Hashing

2013 IEEE Conference on Computer Vision and Pattern Recognition. Compressed Hashing 203 IEEE Conference on Coputer Vision and Pattern Recognition Copressed Hashing Yue Lin Rong Jin Deng Cai Shuicheng Yan Xuelong Li State Key Lab of CAD&CG, College of Coputer Science, Zhejiang University,

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches Efficient Estiation of Inclusion Coefficient using HyperLogLog Sketches Azade Nazi, Bolin Ding, Vivek Narasayya, Surajit Chaudhuri Microsoft Research {aznazi, bolind, viveknar, surajitc}@icrosoft.co ABSTRACT

More information

Searching in one billion vectors: re-rank with source coding

Searching in one billion vectors: re-rank with source coding Searching in one billion vectors: re-rank with source coding Hervé Jégou INRIA / IRISA Romain Tavenard Univ. Rennes / IRISA Laurent Amsaleg CNRS / IRISA Matthijs Douze INRIA / LJK ICASSP May 2011 LARGE

More information

Optimal Route Queries with Arbitrary Order Constraints

Optimal Route Queries with Arbitrary Order Constraints IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL.?, NO.?,? 20?? 1 Optial Route Queries with Arbitrary Order Constraints Jing Li, Yin Yang, Nikos Maoulis Abstract Given a set of spatial points DS,

More information

Image hiding with an improved genetic algorithm and an optimal pixel adjustment process

Image hiding with an improved genetic algorithm and an optimal pixel adjustment process Eighth International Conference on Intelligent Systes Design and Applications Iage hiding with an iproved genetic algorith and an optial pixel adjustent process Lin-Yu Tseng Yung-Kuan Chan Yu-An Ho Yen-Ping

More information

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

Large-scale visual recognition Efficient matching

Large-scale visual recognition Efficient matching Large-scale visual recognition Efficient matching Florent Perronnin, XRCE Hervé Jégou, INRIA CVPR tutorial June 16, 2012 Outline!! Preliminary!! Locality Sensitive Hashing: the two modes!! Hashing!! Embedding!!

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

News Events Clustering Method Based on Staging Incremental Single-Pass Technique

News Events Clustering Method Based on Staging Incremental Single-Pass Technique News Events Clustering Method Based on Staging Increental Single-Pass Technique LI Yongyi 1,a *, Gao Yin 2 1 School of Electronics and Inforation Engineering QinZhou University 535099 Guangxi, China 2

More information

Privacy-preserving String-Matching With PRAM Algorithms

Privacy-preserving String-Matching With PRAM Algorithms Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

Large scale object/scene recognition

Large scale object/scene recognition Large scale object/scene recognition Image dataset: > 1 million images query Image search system ranked image list Each image described by approximately 2000 descriptors 2 10 9 descriptors to index! Database

More information

HIGH PERFORMANCE PRE-SEGMENTATION ALGORITHM FOR SONAR IMAGES

HIGH PERFORMANCE PRE-SEGMENTATION ALGORITHM FOR SONAR IMAGES HIGH PERFORMANCE PRE-SEGMENTATION ALGORITHM FOR SONAR IMAGES Benjain Lehann*, Konstantinos Siantidis*, Dieter Kraus** *ATLAS ELEKTRONIK GbH Sebaldsbrücker Heerstraße 235 D-28309 Breen, GERMANY Eail: benjain.lehann@atlas-elektronik.co

More information

1 Extended Boolean Model

1 Extended Boolean Model 1 EXTENDED BOOLEAN MODEL It has been well-known that the Boolean odel is too inflexible, requiring skilful use of Boolean operators to obtain good results. On the other hand, the vector space odel is flexible

More information

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural

More information

Real-Time Detection of Invisible Spreaders

Real-Time Detection of Invisible Spreaders Real-Tie Detection of Invisible Spreaders MyungKeun Yoon Shigang Chen Departent of Coputer & Inforation Science & Engineering University of Florida, Gainesville, FL 3, USA {yoon, sgchen}@cise.ufl.edu Abstract

More information

Identifying Converging Pairs of Nodes on a Budget

Identifying Converging Pairs of Nodes on a Budget Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering

More information

Gromov-Hausdorff Distance Between Metric Graphs

Gromov-Hausdorff Distance Between Metric Graphs Groov-Hausdorff Distance Between Metric Graphs Jiwon Choi St Mark s School January, 019 Abstract In this paper we study the Groov-Hausdorff distance between two etric graphs We copute the precise value

More information

Novel Image Representation and Description Technique using Density Histogram of Feature Points

Novel Image Representation and Description Technique using Density Histogram of Feature Points Novel Iage Representation and Description Technique using Density Histogra of Feature Points Keneilwe ZUVA Departent of Coputer Science, University of Botswana, P/Bag 00704 UB, Gaborone, Botswana and Tranos

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER

A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER VIOLETA TOMAŠEVIĆ, SLOBODAN BOJANIĆ 2 and OCTAVIO NIETO-TALADRIZ 2 The Mihajlo Pupin Institute, Volgina 5, 000 Belgrade, SERBIA AND MONTENEGRO 2 Technical University

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

Galois Homomorphic Fractal Approach for the Recognition of Emotion

Galois Homomorphic Fractal Approach for the Recognition of Emotion Galois Hooorphic Fractal Approach for the Recognition of Eotion T. G. Grace Elizabeth Rani 1, G. Jayalalitha 1 Research Scholar, Bharathiar University, India, Associate Professor, Departent of Matheatics,

More information

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se

More information

Data & Knowledge Engineering

Data & Knowledge Engineering Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID

More information

Approaching the Skyline in Z Order

Approaching the Skyline in Z Order Approaching the Skyline in Z Order KenC.K.Lee Baihua Zheng Huajing Li Wang-Chien Lee cklee@cse.psu.edu bhzheng@su.edu.sg huali@cse.psu.edu wlee@cse.psu.edu Pennsylvania State University, University Park,

More information

Leveraging Relevance Cues for Improved Spoken Document Retrieval

Leveraging Relevance Cues for Improved Spoken Document Retrieval Leveraging Relevance Cues for Iproved Spoken Docuent Retrieval Pei-Ning Chen 1, Kuan-Yu Chen 2 and Berlin Chen 1 National Taiwan Noral University, Taiwan 1 Institute of Inforation Science, Acadeia Sinica,

More information

Action Recognition Using Local SpatioTemporal Oriented Energy Features and Additive. Kernel SVMs

Action Recognition Using Local SpatioTemporal Oriented Energy Features and Additive. Kernel SVMs International Journal of Electronics and Electrical Engineering Vol., No., June, 4 Action Recognition Using Local SpatioTeporal Oriented Energy Features and Additive Kernel SVMs Jiangfeng Yang and Zheng

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

Adaptive Holistic Scheduling for In-Network Sensor Query Processing

Adaptive Holistic Scheduling for In-Network Sensor Query Processing Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,

More information

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions *

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 607-626 (2005) A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Mebership Functions * SHIH-HSU HUANG AND JIAN-YUAN LAI + Departent of

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

Detecting Anomalous Structures by Convolutional Sparse Models

Detecting Anomalous Structures by Convolutional Sparse Models Detecting Anoalous Structures by Convolutional Sparse Models Diego Carrera, Giacoo Boracchi Dipartiento di Elettronica, Inforazione e Bioingegeria Politecnico di Milano, Italy {giacoo.boracchi, diego.carrera}@polii.it

More information

A Learning Framework for Nearest Neighbor Search

A Learning Framework for Nearest Neighbor Search A Learning Fraework for Nearest Neighbor Search Lawrence Cayton Departent of Coputer Science University of California, San Diego lcayton@cs.ucsd.edu Sanjoy Dasgupta Departent of Coputer Science University

More information

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada

More information

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao

More information

Manifold Regularized Transfer Distance Metric Learning

Manifold Regularized Transfer Distance Metric Learning HAIBO SHI, YONG LUO, CHAO XU, YONGGANG WEN: MTDML 1 Manifold Regularized Transfer Distance Metric Learning Haibo Shi 1 shh@pku.edu.cn Yong Luo 2 yluo180@gail.co Chao Xu 1 xuchao@cis.pku.edu.cn Yonggang

More information

A Learning Framework for Nearest Neighbor Search

A Learning Framework for Nearest Neighbor Search A Learning Fraework for Nearest Neighbor Search Lawrence Cayton Departent of Coputer Science University of California, San Diego lcayton@cs.ucsd.edu Sanjoy Dasgupta Departent of Coputer Science University

More information

The Internal Conflict of a Belief Function

The Internal Conflict of a Belief Function The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of

More information

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang IEEE International Conference on ultiedia and Expo POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION Junjun Jiang, Ruiin Hu, Zhen Han, Tao Lu, and Kebin Huang National Engineering

More information

Feature-Centric Evaluation for Efficient Cascaded Object Detection

Feature-Centric Evaluation for Efficient Cascaded Object Detection IEEE Conference on Coputer Vision and Pattern (CVPR, 2004 Feature-Centric Evaluation for Efficient Cascaded Object Detection Henry Schneideran 1 Robotics Institute Carnegie Mellon University Pittsburgh,

More information

A Method of Generating Multi-Scale Disc-Like Distributions for NDT Registration Algorithm

A Method of Generating Multi-Scale Disc-Like Distributions for NDT Registration Algorithm International Journal of Mechanical Engineering and Robotics Research Vol. 5, o., January 06 A Method of Generating Multi-Scale Disc-Like Distributions for D Registration Algorith Hyunki Hong and Beohee

More information

Implementation of fast motion estimation algorithms and comparison with full search method in H.264

Implementation of fast motion estimation algorithms and comparison with full search method in H.264 IJCSNS International Journal of Coputer Science and Network Security, VOL.8 No.3, March 2008 139 Ipleentation of fast otion estiation algoriths and coparison with full search ethod in H.264 A.Ahadi, M.M.Azadfar

More information

Collaborative Web Caching Based on Proxy Affinities

Collaborative Web Caching Based on Proxy Affinities Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA

More information

Boosted Detection of Objects and Attributes

Boosted Detection of Objects and Attributes L M M Boosted Detection of Objects and Attributes Abstract We present a new fraework for detection of object and attributes in iages based on boosted cobination of priitive classifiers. The fraework directly

More information

Feature Selection to Relate Words and Images

Feature Selection to Relate Words and Images The Open Inforation Systes Journal, 2009, 3, 9-13 9 Feature Selection to Relate Words and Iages Wei-Chao Lin 1 and Chih-Fong Tsai*,2 Open Access 1 Departent of Coputing, Engineering and Technology, University

More information

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium 1 A Distributed Multi-service Resource Allocation Algorith in Heterogeneous Wireless Access Mediu Muhaad Isail, Student Meber, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract In this paper, radio resource

More information

A Novel 2D Texture Classifier For Gray Level Images

A Novel 2D Texture Classifier For Gray Level Images 2012, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.co A Novel 2D Texture Classifier For Gray Level Iages B.S. Mousavi 1 Young Researchers Club, Zahedan

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

A Novel Quantization Approach for Approximate Nearest Neighbor Search to Minimize the Quantization Error

A Novel Quantization Approach for Approximate Nearest Neighbor Search to Minimize the Quantization Error A Novel Quantization Approach for Approximate Nearest Neighbor Search to Minimize the Quantization Error Uriti Archana 1, Urlam Sridhar 2 P.G. Student, Department of Computer Science &Engineering, Sri

More information

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of

More information

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San

More information

! What is mrmr feature selection. ! Applications in cancer classification. ! Applications in image pattern recognition. ! Theoretical basis of mrmr

! What is mrmr feature selection. ! Applications in cancer classification. ! Applications in image pattern recognition. ! Theoretical basis of mrmr Miniu Redundancy and Maxiu Relevance Feature election and Its Applications Hanchuan Peng Janelia Far Research Capus, Howard Hughes Medical Institute What is RMR feature selection Applications in cancer

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

AN INTEGRATED APPROACH TO MUSIC BOUNDARY DETECTION

AN INTEGRATED APPROACH TO MUSIC BOUNDARY DETECTION 10th International Society for Music Inforation Retrieval Conference (ISMIR 2009) AN INTEGRATED APPROACH TO MUSIC BOUNDARY DETECTION Min-Yian Su, Yi-Hsuan Yang, Yu-Ching Lin, Hoer Chen National Taiwan

More information

A Periodic Dynamic Load Balancing Method

A Periodic Dynamic Load Balancing Method 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation

More information

Rule Extraction using Artificial Neural Networks

Rule Extraction using Artificial Neural Networks Rule Extraction using Artificial Neural Networks S. M. Karuzzaan 1 Ahed Ryadh Hasan 2 Abstract Artificial neural networks have been successfully applied to a variety of business application probles involving

More information

EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B.

EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B. EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B. Girod1 1 Stanford University, USA 2 Qualco Inc., USA ABSTRACT We study

More information

Planet Scale Software Updates

Planet Scale Software Updates Planet Scale Software Updates Christos Gkantsidis 1, Thoas Karagiannis 2, Pablo Rodriguez 1, and Milan Vojnović 1 1 Microsoft Research 2 UC Riverside Cabridge, UK Riverside, CA, USA {chrisgk,pablo,ilanv}@icrosoft.co

More information

A Study of the Relationship Between Support Vector Machine and Gabriel Graph

A Study of the Relationship Between Support Vector Machine and Gabriel Graph A Study of the Relationship Between Support Vector Machine and Gabriel Graph Wan Zhang and Irwin King {wzhang, king}@cse.cuhk.edu.hk Departent of Coputer Science & Engineering The Chinese University of

More information

Discrete Fourier Transform

Discrete Fourier Transform Discrete Fourier Transfor This is the first tutorial in our ongoing series on tie series spectral analysis. In this entry, we will closely exaine the discrete Fourier transfor (aa DFT) and its inverse,

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

Reconfigurable Architecture for VLSI 9/7-5/3 Wavelet Filter

Reconfigurable Architecture for VLSI 9/7-5/3 Wavelet Filter Reconfigurable Architecture for VSI 9/7-5/3 Wavelet Filter Tze-Yun Sung * Hsi-Chin Hsin ** * Departent of Microelectronics Engineering Chung Hua University 77, Sec., Wufu Road, Hsinchu City 3- TAIWAN bobsung@chu.edu.tw

More information

Reconstruction of Time Series using Optimal Ordering of ICA Components

Reconstruction of Time Series using Optimal Ordering of ICA Components Reconstruction of Tie Series using Optial Ordering of ICA Coponents Ar Goneid and Abear Kael Departent of Coputer Science & Engineering, The Aerican University in Cairo, Cairo, Egypt e-ail: goneid@aucegypt.edu

More information

Multi Packet Reception and Network Coding

Multi Packet Reception and Network Coding The 2010 Military Counications Conference - Unclassified Progra - etworking Protocols and Perforance Track Multi Packet Reception and etwork Coding Aran Rezaee Research Laboratory of Electronics Massachusetts

More information

A Spectral Framework for Detecting Inconsistency across Multi-Source Object Relationships

A Spectral Framework for Detecting Inconsistency across Multi-Source Object Relationships A Spectral Fraework for Detecting Inconsistency across Multi-Source Object Relationships Jing Gao, Wei Fan, Deepak Turaga, Srinivasan Parthasarathy, and Jiawei Han University of Illinois at Urbana-Chapaign,

More information

ACNS: Adaptive Complementary Neighbor Selection in BitTorrent-like Applications

ACNS: Adaptive Complementary Neighbor Selection in BitTorrent-like Applications ACNS: Adaptive Copleentary Neighbor Selection in BitTorrent-like Applications Zhenbao Zhou 1, 2, Zhenyu Li 1, 2, Gaogang Xie 1 1 Institute of Coputing Technology, Chinese Acadey of Sciences, Beijing 100190,

More information

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade

More information

Collection Selection Based on Historical Performance for Efficient Processing

Collection Selection Based on Historical Performance for Efficient Processing Collection Selection Based on Historical Perforance for Efficient Processing Christopher T. Fallen and Gregory B. Newby Arctic Region Supercoputing Center University of Alaska Fairbanks Fairbanks, Alaska

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses International Journal of Industrial Engineering & Production Research Septeber 03, Volue 4, Nuber 3 pp. 9-35 ISSN: 008-4889 http://ijiepr.iust.ac.ir/ Using Iperialist Copetitive Algorith in Optiization

More information

arxiv: v1 [cs.dc] 3 Oct 2018

arxiv: v1 [cs.dc] 3 Oct 2018 Sparse Winograd Convolutional neural networks on sall-scale systolic arrays Feng Shi, Haochen Li, Yuhe Gao, Benjain Kuschner, Song-Chun Zhu University of California Los Angeles Los Angeles, USA {shi.feng,sczh}@cs.ucla.edu

More information

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones Advance Access publication on 24 February 2017 The British Coputer Society 2017. All rights reserved. For Perissions, please eail: journals.perissions@oup.co doi:10.1093/cojnl/bxx015 Fair Energy-Efficient

More information

THE rounding operation is performed in almost all arithmetic

THE rounding operation is performed in almost all arithmetic This is the author's version of an article that has been published in this journal. Changes were ade to this version by the publisher prior to publication. The final version of record is available at http://dx.doi.org/.9/tvlsi.5.538

More information

Fast Accumulation Lattice Algorithm for Mining Sequential Patterns

Fast Accumulation Lattice Algorithm for Mining Sequential Patterns Proceedings of the 6th WSEAS International Conference on Applied Coputer Science, Hangzhou, China, April 15-17, 2007 229 Fast Accuulation Lattice Algorith for Mining Sequential Patterns NANCY P. LIN, WEI-HUA

More information

LOSSLESS COMPRESSION OF BAYER MASK IMAGES USING AN OPTIMAL VECTOR PREDICTION TECHNIQUE

LOSSLESS COMPRESSION OF BAYER MASK IMAGES USING AN OPTIMAL VECTOR PREDICTION TECHNIQUE 1th European Signal Processing Conference (EUSIPCO 2006), Florence, Italy, Septeber -8, 2006, copyright by EUASIP LOSSLESS COMPESSION OF AYE MASK IMAES USIN AN OPTIMAL VECTO PEDICTION TECHNIQUE Stefano

More information

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

λ-harmonious Graph Colouring Lauren DeDieu

λ-harmonious Graph Colouring Lauren DeDieu λ-haronious Graph Colouring Lauren DeDieu June 12, 2012 ABSTRACT In 198, Hopcroft and Krishnaoorthy defined a new type of graph colouring called haronious colouring. Haronious colouring is a proper vertex

More information

Carving Differential Unit Test Cases from System Test Cases

Carving Differential Unit Test Cases from System Test Cases Carving Differential Unit Test Cases fro Syste Test Cases Sebastian Elbau, Hui Nee Chin, Matthew B. Dwyer, Jonathan Dokulil Departent of Coputer Science and Engineering University of Nebraska - Lincoln

More information

Affine Invariant Texture Analysis Based on Structural Properties 1

Affine Invariant Texture Analysis Based on Structural Properties 1 ACCV: The 5th Asian Conference on Coputer Vision, --5 January, Melbourne, Australia Affine Invariant Texture Analysis Based on tructural Properties Jianguo Zhang, Tieniu Tan National Laboratory of Pattern

More information

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan

More information

Asynchronous Distributed Data Parallelism for Machine Learning

Asynchronous Distributed Data Parallelism for Machine Learning Asynchronous Distributed Data Parallelis for Machine Learning Zheng Yan, Yunfeng Shao Shannon Lab, Huawei Technologies Co., Ltd. Beijing, China, 100085 {yanzheng, shaoyunfeng}@huawei.co Abstract Distributed

More information

Experiences with complex user profiles for approximate P2P community matching

Experiences with complex user profiles for approximate P2P community matching Experiences with coplex user profiles for approxiate PP counity atching Patrizio Dazzi ISTI-CNR Pisa, Italy p.dazzi@isti.cnr.it Matteo Mordacchini IIT-CNR Pisa, Italy.ordacchini@iit.cnr.it Fabio Baglini

More information

Approximate String Matching with Reduced Alphabet

Approximate String Matching with Reduced Alphabet Approxiate String Matching with Reduced Alphabet Leena Salela 1 and Jora Tarhio 2 1 University of Helsinki, Departent of Coputer Science leena.salela@cs.helsinki.fi 2 Aalto University Deptartent of Coputer

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

Massive amounts of high-dimensional data are pervasive in multiple domains,

Massive amounts of high-dimensional data are pervasive in multiple domains, Challenges of Feature Selection for Big Data Analytics Jundong Li and Huan Liu, Arizona State University Massive aounts of high-diensional data are pervasive in ultiple doains, ranging fro social edia,

More information