CS224W Final Report. 1 Introduction. 3 Data Collection and Visualization. 2 Prior Work. Cyprien de Lichy, Renke Pan, Zheng Wu.

Size: px
Start display at page:

Download "CS224W Final Report. 1 Introduction. 3 Data Collection and Visualization. 2 Prior Work. Cyprien de Lichy, Renke Pan, Zheng Wu."

Transcription

1 CS224W Final Report Cyprien de Lichy, Renke Pan, Zheng W 1 Introdction December 9, 2015 Recommender systems are information filtering systems that provide sers with personalized sggestions for prodcts or items. They have become an important research area since the appearance of the first papers on collaborative filtering. Mch work has been done on developing new approaches to recommender systems over the last years becase of the growing need of applications to help sers deal with an increasing amont of information and provide them with personalized recommendations. Nowadays, recommender systems are sally based on the sers past behaviors and the similarity between sers and/or between items. Bt sch traditional recommendation systems sffer from several problems, one of them being data sparsity. Some sers may have very few recorded (or even no) interactions with the items, and ths it is hard to predict what they might like, which is called cold start. However, there is a noticeable social trend that people that are socially related share interests and tastes, and ths, the knowledge abot a person s social neighborhood strctre cold be sed to infer its preferences to some degree. Bt conventional recommendation systems don t leverage this network strctre to make predictions, ths depriving themselves of a rich sorce of information. The idea of this project wold be to take into consideration the relational strctre of the network to improve the recommendation power, for both ser network and item network. 2 Prior Work Recommender systems are sally classified into collaborative filtering methods and content-based methods. There are also hybrid approaches that combine several recommendation method. For instance in [5] the athors sed a combination of collaborative filtering and content filtering. Except the two approaches mentioned above, people are exploring more and more other information sch as social ties between people to help improve recommendation system s performance. Zheng et al. [1] were the first to introdce the method of social network collaborative filtering. Hill et al. [2] introdce a way to se the information of social network in collective inference withot heavy comptations. However, the comptational complexity for condcting sch inference techniqe on traditional social network is high. Ths, Hill et al. [2] sggests to only limit or interest to a small sbpoplation (those with high commercial potential).on the other hand, featres extracted from recommended contents network cold also make the system more robst. According to the stdy done by Teng et al. [6] to bild recommendation system for recipes, two featres can be extracted from recipes network. Sharma et al.[4] proposed a network-centric approach to recommendations and introdced PopCore, a platform that implements this approach on Facebook. They implemented 6 different algorithms, some of which are network-centric, to stdy and compare the effect of the recommendations and fond that the network-centric algorithms indeed perform better. Marlin et al.[7] showed that to improve the recommendation accracy of a recommender system, the algorithm shold not ignore the missing data mechanism and the MAR (Missing at Random) assmption is not valid, and we shold model the MNAR (Missing Not at Random) phenomenon. In practice we observe that sers tend not to give a rating to an item they didn t like than giving a bad rating. As a reslt the rating distribtion is more skewed toward good ratings. 3 Data Collection and Visalization We se Yelp Data for recommendation system implementation. The dataset contains the following information: 1. Users: Yelping since, votes, review conts, name, serid, friends, fans, average stars, type, compliments, elite. 2. Bsinesses: bsiness ID, fll address, hors, open, categories, city, review cont, name, neighborhood, longitde, state, stars, latitde, attribtes, type. 3. Reviews: votes, ser ID, review ID, stars, date, text, type, bsiness ID. 4. Tips :ser ID, text, bsiness ID, likes, date, type. 5. Check-ins : check-in info, type, bsiness ID. It has 1.6 Million reviews in total, covering 10 cities across United States, Germany, Canada and UK. 366k Users in the dataset form a large social network with 2.9 Million connections. We choose only bsinesses in Pittsbrgh in this case to speed p the calclation for the milestone. And only sers who have reviewed one of the bsinesses inclded will be considered. Ths the data set we se contains 2724 bsinesses, sers, ser connections and ser ratings. 3.1 User Network The degree distribtion of ser network in the whole data set. 1

2 other words, we consider an edge exist if the weight is above t. We se Frchterman Reingold lay ot method, with threshold 5. The degree distribtion of ser network in the Pittsbrgh data set. For User network, if we only display nodes with above 33 degrees, below is the network. We cold observe that there is no obvios clsterization. 4 Evalating Metric 3.2 Bsiness Network We define or crrent bsiness network as follows: Each bsiness is a node in the network. If same ser have been to both bsiness A and bsiness B, then we add an edge between bsiness A and bsiness B with weight 1. If bsiness A and bsiness B share k common sers, then they have an edge between them with weight k. To simplify the network, we limit the size of edges by ptting certain threshold t for the formation of edges. In Social network based top-k recommendation recommends to a ser a small nmber of items(k items) at a time. Most of the existing social network based recommender systems se the root mean sqare error (RMSE) as the optimization goal. Top-k recommendations are more commonly sed in real world problem. For these recommendation systems, the top-k hit ratio or recall is a more natral and sefl metric compared with root mean sqare error. The top-k hit ratio or recall is defined as below[8]: For each ser, we sort the items i according to descending order of the predicted rating ˆR i,. When we have same predicted rating to different items, we rank them randomly. An item is relevant to a ser in the test set if s/he likes it (e.g., the assigned rating in the test data is above a certain threshold). For example, with Yelp data, the rating vales range from 1 to 5 stars and we consider a 5 star rating as relevant(the ser definitely liked these items), while other rating vales and missing rating vales are considered not relevant. The top-k hit ratio or recall is the fraction of relevant items in the test set that are in the top-k of the ranking list, denoted by N(k, ), from among all relevant items, N(). 2

3 For each ser, the top-k hit ratio is given by: H(k, ) = N(k, ) N() With ser top-k hit rate, we can compte the overall top-k hit ratio/recall by: recall = Σ N(k, ) Σ N() A higher top-k hit ratio or recall indicates a better performance of or algorithm. We also compted the RMSE when rnning or recommendation algorithms: RMSE = 1 T (,i) T ( ˆRtest,i R,i test Where T is a test set of observed ratings, R,i test is the grond trth vale, is the corresponding predicted rating. ˆR test,i 5 Nearest Neighbor Methods In a Nearest Neighbor method, top-k recommendations makes prediction only based on items adored by a sbset of sers who have some connection (nder certain distance metric) with the target ser. This kind of connection cold be based on collaborative filtering or edges in the ser-ser network. Then we can integrate social information into Nearest Neighbor top-k recommendation system. 5.1 Collaborative Filtering Approach The Collaborative Filtering Approach ses AllRank to obtain the ser latent featres[8]. The distance is compted throgh the Pearson correlation coefficient. Then we gather items from The U nearest neighbors of the target ser. The voting for the candidate items is defined as follows: V ote,i = Σ v N Σ i sim(, v)δ i Iv where δ is the Kronecker delta; I v denotes the set of relevant items of ser v; and N is the set of U nearest neighbors of ser (as determined by the Pearson correlation). For ser, item i, we have V ote,i ; We give weights to neighbors according to their similarity sim(, v) with the target ser, which is defined as the Pearson correlation coefficient. w t (, v) is set to be 1/d v, where d v is the depth of ser v in the BFS tree rooted at ser. 5.3 Trst-Collaborative Filtering Approach Trst-Collaborative Filtering Approach is designed to hybrid ser latent featre space based collaborative filtering approach and social network based approach. In this approach, we first find U closest neighbors from the CF neighborhood, then find U closest neighbors from the trst neighborhood which are not in the first U neighbors. Then we gather information from the above neighbors: V ote,i = Σ (c) v N Σ i w(, v)δ i Iv where N (c) is the combined neighborhood and w(,v) is defined as following: { sim(, v) if v N w(, v) = w t (, v) if v N (t) 5.4 Reslt Or reslts show that trst information significantly improves top-k hit ratio when incorporated properly in Nearest Neighbor models. The top-k hit ratio for Trst-Collaborative Filtering Approach is the highest, followed by that of PreTrst Approach, which is significantly higher than that of Collaborative Filtering Approach. We have three parameters: 1. U, the nmber of sers considered in the neighborhood, both in the collaborative filtering approach and the network based approaches. 2. K, the pper limit of the nmber of items recommended to a ser. 3. R, the rating threshold sed to determine whether a recommendation is relevant. By changing these parameters, we got different top-k hit ratios. The next three figres show how the top-k hit ratio change with respect to different vales of U, K and R: 5.2 PreTrst Approach PreTrst approach finds neighbors by implementing BFS in the ser-ser network starting from ser. The voting is as follow: V ote,i = Σ (t) v N Σ i w t (, v)δ i Iv where N (t) is the set of trsted sers of, and w t (, v) is the voting weight of ser v. The vale of 3

4 U, the larger the U, the longer it takes to finish the comptation. For K, we cannot recommend say 1000 restarants simltaneosly to a ser. A reasonable K wold be somewhere below 50. For R, 5 seems to be the best not only becase it is the largest possible vale, bt also becase it makes the most sense in practice. Giving a 5 star review sggests the ser absoltely loved the restarant. 5.5 Commnity Detection We hypothesized that adding in commnity detection to pre trst approach is going to improve the hit rate. The assmption is that sers within the same commnity share the same taste. Ths giving recommendation based on sers from the same commnity will likely increase the hit rate/recall. We first implemented a version of PreTrst that restricts neighbors to only those that are within the same commnity, detected by Claset-Newman-Moore commnity detection method. We can see that recall increases as U increases, fixing K and R. The recall for collaborative filtering approach reaches a platea after certain threshold. This is probably becase there is not enogh sers that rated the same restarants and ths we cannot get a neighborhood of size U after certain large enogh U. On the other hand, the recall for the two network-based approaches keep increasing as U increases. This is probably becase the largest connected component is pretty large (it trns ot 46% percent of all sers are in the largest connected component) so we are always able to find a large enogh neighborhood in the network. From the period before the collaborative filtering approach reaches the platea, we can conclde that introdcing network featres significantly improves the recommendation. We can see that recall increases as K increases, fixing U and R. This is expected becase we are increasing the nominator of recall while keeping denominator fixed. We can see that recall increases as R increases, fixing U and K. This is expected becase we are increasing the nominator of recall slightly bt the denominator increased drastically if we decrease R. So overall we see the recall increases with U, K, R. Larger U, K, R always lead to better recall. However, the choice of U, K, R cannot be arbitrarily large. For As can be seen from the above graph, it trned ot that the hit rate actally decreased, which is qite nexpected. Then we dig deep into this and brainstormed what cold be casing this. We think the reason is that not every one of a ser s nearest neighbor falls within the same commnity with the ser. Ths these sers, which actally has the best predictive power, are exclded when making the recommendation. As an attempt to jstify this hypothesis and also improve the recommendation, we introdced a heristic: all the sers who are in the same commnity as the ser of interest are closer to this ser in the network. So once we skipped throgh nmber of sers in the same commnity, we no longer enforce same commnity rle when determining if a ser shold be considered, i.e. always consider them. This heristic in fact increased the recall. Or previos hypothesis is ths jstified. However, the improvement in the recall is not enogh. It still falls mch lower than the original approach. Frther more, both crves with commnity featres reach a platea. This is becase they both skipped some close sers in the network bt are not in the same commnity and these sers have the most predictive power. Inclding more sers frther ot doesn t really help the prediction mch becase the similarity between sers is mch lower. 4

5 6 Matrix Factorization The Matrix Factorization approach was fond to be the most accrate approach to redce the dimensionality of the problem when a high level of data sparsity is observed. 6.1 Basic approach In this model, the rating matrix R of dimensions 0 i 0 ( 0 being the nmber of sers and i 0 the nmber of items) is represented as the prodct of 2 low-rank matrices P and Q. The matrices P and Q are latent-featres representation of items and sers respectively, and they are said to be low-rank: rank(p ) = rank(q) = d, with d 0 and d i 0. The MF model is a kind of dimension redction, the objective is to find the matrix ˆR = QP T that best fits the original matrix R (which is sparse becase we have only a few items rated by each ser). Q is of dimensions 0 d and P is of dimensions i 0 d. To take into accont the phenomenon of MNAR (Missing Not at Random) of the ratings, an offset rating vale r m is added in the model in the following form: ˆR = r m + QP T One way to proceed to maximize the recall on the top-k recommendations wold be to optimize directly on the top-k hit ratio bt this is too costly comptationally. Instead, we can optimize a modified sqared error criterion that will lead to a better top-k hit rate than the classical sqared error: min P,Q i ( W,i R,i ˆR (,i + λ P 2 F + Q 2 ) F (1) Where R,i = R,i if the rating is observed and R,i = r m otherwise, r m is the impted rating when there is a missing vale, it is a tning parameter of the model, and according to the stdy by Yahoo! (See [7]) we expect its optimal vale to be rather small. The matrix W is introdced to balance the dataset (which is very sparse in reality) by giving more weight to the observed ratings. In addition to that we also have the typical L2 reglarization term to avoid over-fitting. 6.2 Inclding the social network Now, we can inclde the networks (ser-ser and bsiness-bsiness networks) information by inclding more terms i the following way. We introdce two matrices U and B representing the relationship between two sers and two bsinesses respectively, U and B cold be weighted adjacency matrix, it is proposed in [8]: deg(v) U,v = A,v deg(v) + deg() where A is the ser-ser adjacency matrix. The objective fnction to minimize becomes the following: min P,Q,V ( W,i R,i ˆR,i i + γ v W U,v ( U,v Û,v + λ ( P 2 F + Q 2 F + V 2 ) F Where Û = QV T, V is of size 0 d. (2) 6.3 Inclding a bsiness-bsiness network In or approach we imagined doing the same for bsinesses, by constrcting a bsiness-bsiness network sing the data abot the bsinesses (like descriptions, reviews) and the sers. Basically, we wold bild a network by linking two bsinesses if they have mtal cstomers and similar descriptions. In that way we se more available data than jst the ratings history to drive the CF comptations for the recommender system. The objective fnction to minimize wold be the following: min P,Q,V,C ( W,i R,i ˆR,i i + γ ( W,v U U,v Û,v v + β Wi,j (B B i,j ˆB i,j i j + λ ( P 2 F + Q 2 F + V 2 F + C 2 ) F Where ˆB = P C T, and C is of size i 0 d. 6.4 Social inflence weighting (3) By varying the weights W,i of the observed ratings according to the eigenvector centrality measre of ser, we are giving more weights to the important/inflential sers, this forces the algorithm to better fit the matrix factorization to these sers and these better reslts may diffse in the network (via the social part of the objective fnction) and yield better overall reslts. This comes from the intition that better fitting the more inflential sers is more sefl for the overall performance. 6.5 Optimization algorithm for the MF models We implemented all of these MF models sing an alternating optimization algorithm: Alternating Least Sqares, which is an efficient algorithm for this task. At each step of the algorithm 3 of the nknown matrices (P, Q, V and C) are fixed and the other one can be pdated to maximize the objective fnction via an exact formla. 5

6 6.6 Reslts Model RMSE MAR (r m, w m = 0) 1.61 MNAR (r m, w m = 2, ) 1.11 MNAR Social Network 1.02 MNAR Social & bsiness Network 1.01 From this table we can see that by taking into accont the phenomenon of MNAR we can greatly improve the RMSE at the expense of finding the optimal vales of 2 tning parameters (r m and w m ). We can also see that sing information abot the strctre of the social network (the adjacency matrix and the eigenvector centrality measre) can also improve the RMSE. However, we didn t get a noticeable improvement by considering or bsiness-bsiness network maybe becase or basic constrction of the network does not bring new information, the convergence of or algorithm is also longer. 7 Temporal Effects When we first proposed the project, we were thinking abot incorporating the temporal effects of the ratings and the network. However, when we actally want to go ahead and do it, we fond ot there is no timestamp of the friendship formation. So the network is a static snapshot, not evolving over time. However, we do have the review timestamp. The sage of the review timestamp is limited thogh, besides splitting the data into train and test set, predicting ftre reviews from past reviews, there is not an intitive way of tilizing this information. Ths stdying the temporal effects is not well sited for this data set. 8 Reprodcibility/Robstness We focsed or analysis with Pittsbrgh becase Pittsbrgh s data is diverse enogh and complete yet small enogh for fast prototyping. One concern is that the overall network strctre is different than the one in Pittsbrgh. This is a totally valid concern. However, the data consists of restarants from the following cities: U.K.: Edinbrgh Germany: Karlsrhe Canada: Montreal and Waterloo U.S.: Pittsbrgh, Charlotte, Urbana-Champaign, Phoenix, Las Vegas, Madison First of all, this is not the complete graph of the overall yelp network anyway. It s only a small portion of the global graph strctre. Frther redcing the graph to one city isn t any fndamentally different. Secondly, the cities are in disjoint regions of the contry or even different contries. we wold expect the graphs of each city to be a relative independent connected component and there is mch less inter-city connections. Therefore, stdying each individal city by itself is a valid approach. In fact, to make the most relevant prediction, I sspect Yelp wold se local information heavily as well. Therefore, it doesn t really make sense to rn the analysis with the whole data set. If we did that, We wold spent way too mch comptation time on an improperly defined network. To make sre or analysis is robst and can be reprodced. We did the exact same analysis on Phoenix data, which is diverse and complete yet sbstantially larger than Pittsbrgh. All the trends, relationships, orderings are retained with Phoenix data. To save space, we did not inclde the plots here. We have ths gained confidence that or approach can be reprodced in an independent data set and is robst. 9 Difficlties 1. The existing recommendation packages do not satisfy or need (mostly becase the flexibility of the algorithms is not satisfying) and or data is not ready to se for recommendation, so we had to implement all the algorithms and data processing from scratch. 2. The size of the data poses problems for details of implementing the algorithms. For example, we rn ot of memory when doing matrix operations and had to se sparse matrices and resort to comptational tricks. 3. The dataset is hge and the rnning time for the algorithms is rather long. 10 Ftre Works 1. Frther optimize the model, minor tweak the algorithms to have the best performance. 2. Have another data set, different from Yelp, which has friendship formation timestamps, to stdy temporal effects. 11 Acknowledgment We wold like to thank Lada and the TAs for providing a wonderfl qarter of learning experience and insightfl feedback on the project. References [1] R. Zheng, F. Provost and A. Ghose. Social Network Collaborative Filtering: Preliminary Reslts. Proceedings of the Sixth Workshop on ebsiness (WEB2007), New York, USA, December 2007 [2] S. Hill, F. Provost and C. Volinsky. Learning and Inference in Massive Social Networks. 5th International Workshop on Mining and Learning with Graphs, Agst

7 [3] G. Adomavicis and A. Tzhilin, Toward the Next Generation of Recommender Systems: A Srvey of the State-of-the-Art and Possible Extensions, IEEE Trans. Knowl. Data Eng. 17(6): , 2005 [4] A. Sharma and D. Cosley, Network-Centric Recommendation: Personalization with and in Social Networks, IEEE International Conference on Privacy, Secrity, Risk, and Trst, 2011 [5] A. B. Barragns-Martnez, E. Costa-Montenegro, J.C. Brgillo, M. Rey- Lpez, F. A. Mikic-Fonte, and A. Peleteiro. A hybrid content-based and item-based collaborative filtering approach to recommend TV programs enhanced with singlar vale decomposition. Information Sciences, 180(22), [6] C.-Y. Teng, Y.-R. Lin, and L. A. Adamic. Recipe recommendation sing ingredient networks. Proceedings of the 3rd Annal ACM Web Science Conference, pages , [7] Marlin, B.; Zemel, R.; Roweis, S; Slaney, M., Collaborative Filtering and the Missing at Random Assmption [8] Yang, X.; Steck, H.; Go, Y; Li, Y., On Top-k Recommendation sing Social Networks 7

Evaluating Influence Diagrams

Evaluating Influence Diagrams Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will

More information

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 53 Design of Operating Systems Spring 8 Lectre 2: Virtal Memory Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Recap: cache Well-written programs exhibit

More information

Topic Continuity for Web Document Categorization and Ranking

Topic Continuity for Web Document Categorization and Ranking Topic Continity for Web ocment Categorization and Ranking B. L. Narayan, C. A. Mrthy and Sankar. Pal Machine Intelligence Unit, Indian Statistical Institte, 03, B. T. Road, olkata - 70008, India. E-mail:

More information

Real-time mean-shift based tracker for thermal vision systems

Real-time mean-shift based tracker for thermal vision systems 9 th International Conference on Qantitative InfraRed Thermography Jly -5, 008, Krakow - Poland Real-time mean-shift based tracker for thermal vision systems G. Bieszczad* T. Sosnowski** * Military University

More information

Multi-lingual Multi-media Information Retrieval System

Multi-lingual Multi-media Information Retrieval System Mlti-lingal Mlti-media Information Retrieval System Shoji Mizobchi, Sankon Lee, Fmihiko Kawano, Tsyoshi Kobayashi, Takahiro Komats Gradate School of Engineering, University of Tokshima 2-1 Minamijosanjima,

More information

A personalized search using a semantic distance measure in a graph-based ranking model

A personalized search using a semantic distance measure in a graph-based ranking model Article A personalized search sing a semantic distance measre in a graph-based ranking model Jornal of Information Science XX (X) pp. 1-23 The Athor(s) 2011 Reprints and Permissions: sagepb.co.k/jornalspermissions.nav

More information

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz

More information

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity

More information

Tu P7 15 First-arrival Traveltime Tomography with Modified Total Variation Regularization

Tu P7 15 First-arrival Traveltime Tomography with Modified Total Variation Regularization T P7 15 First-arrival Traveltime Tomography with Modified Total Variation Reglarization W. Jiang* (University of Science and Technology of China) & J. Zhang (University of Science and Technology of China)

More information

Constructing and Comparing User Mobility Profiles for Location-based Services

Constructing and Comparing User Mobility Profiles for Location-based Services Constrcting and Comparing User Mobility Profiles for Location-based Services Xihi Chen Interdisciplinary Centre for Secrity, Reliability and Trst, University of Lxemborg Jn Pang Compter Science and Commnications,

More information

DIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES

DIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES DIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES Binh-Son Ha 1 Imari Sato 2 Kok-Lim Low 1 1 National University of Singapore 2 National Institte of Informatics, Tokyo, Japan ABSTRACT Dal

More information

AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING

AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING Mingsheng LIAO, Li ZHANG, Zxn ZHANG, Jiangqing ZHANG Whan Technical University of Srveying and Mapping, Natinal Lab. for Information Eng. in

More information

Optimal Sampling in Compressed Sensing

Optimal Sampling in Compressed Sensing Optimal Sampling in Compressed Sensing Joyita Dtta Introdction Compressed sensing allows s to recover objects reasonably well from highly ndersampled data, in spite of violating the Nyqist criterion. In

More information

Tdb: A Source-level Debugger for Dynamically Translated Programs

Tdb: A Source-level Debugger for Dynamically Translated Programs Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,

More information

A sufficient condition for spiral cone beam long object imaging via backprojection

A sufficient condition for spiral cone beam long object imaging via backprojection A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral

More information

Master for Co-Simulation Using FMI

Master for Co-Simulation Using FMI Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany

More information

IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION

IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION ICAS 2 CONGRESS IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION Christophe Le Garrec, Marc Hmbert, Michel Lacabanne Aérospatiale Matra

More information

Object Pose from a Single Image

Object Pose from a Single Image Object Pose from a Single Image How Do We See Objects in Depth? Stereo Use differences between images in or left and right eye How mch is this difference for a car at 00 m? Moe or head sideways Or, the

More information

arxiv: v1 [cs.si] 12 Dec 2016

arxiv: v1 [cs.si] 12 Dec 2016 Connection Discovery sing Shared Images by Gassian Relational Topic Model Xiaopeng Li, Ming Cheng, James She HKUST-NIE Social Media Lab, Hong Kong University of Science & Technology, Hong Kong xlibo@connect.st.hk,

More information

Fault Tolerance in Hypercubes

Fault Tolerance in Hypercubes Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different

More information

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,

More information

Maximum Weight Independent Sets in an Infinite Plane

Maximum Weight Independent Sets in an Infinite Plane Maximm Weight Independent Sets in an Infinite Plane Jarno Nosiainen, Jorma Virtamo, Pasi Lassila jarno.nosiainen@tkk.fi, jorma.virtamo@tkk.fi, pasi.lassila@tkk.fi Department of Commnications and Networking

More information

Image Compression Compression Fundamentals

Image Compression Compression Fundamentals Compression Fndamentals Data compression refers to the process of redcing the amont of data reqired to represent given qantity of information. Note that data and information are not the same. Data refers

More information

Subgraph Matching with Set Similarity in a Large Graph Database

Subgraph Matching with Set Similarity in a Large Graph Database 1 Sbgraph Matching with Set Similarity in a Large Graph Database Liang Hong, Lei Zo, Xiang Lian, Philip S. Y Abstract In real-world graphs sch as social networks, Semantic Web and biological networks,

More information

A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA

A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA Mei Zho*, Ling-li Tang, Chan-rong Li, Zhi Peng, Jing-mei Li Academy of Opto-Electronics, Chinese Academy of Sciences, No.9, Dengzhang

More information

FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES

FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES RICARDO G. DURÁN AND ARIEL L. LOMBARDI Abstract. We consider the nmerical approximation of a model convection-diffsion

More information

Networks An introduction to microcomputer networking concepts

Networks An introduction to microcomputer networking concepts Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES

More information

What s New in AppSense Management Suite Version 7.0?

What s New in AppSense Management Suite Version 7.0? What s New in AMS V7.0 What s New in AppSense Management Site Version 7.0? AppSense Management Site Version 7.0 is the latest version of the AppSense prodct range and comprises three prodct components,

More information

A choice relation framework for supporting category-partition test case generation

A choice relation framework for supporting category-partition test case generation Title A choice relation framework for spporting category-partition test case generation Athor(s) Chen, TY; Poon, PL; Tse, TH Citation Ieee Transactions On Software Engineering, 2003, v. 29 n. 7, p. 577-593

More information

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,

More information

Stereo Matching and 3D Visualization for Gamma-Ray Cargo Inspection

Stereo Matching and 3D Visualization for Gamma-Ray Cargo Inspection Stereo Matching and 3D Visalization for Gamma-Ray Cargo Inspection Zhigang Zh *ab, Y-Chi H bc a Department of Compter Science, The City College of New York, New York, NY 3 b Department of Compter Science,

More information

Cohesive Subgraph Mining on Attributed Graph

Cohesive Subgraph Mining on Attributed Graph Cohesive Sbgraph Mining on Attribted Graph Fan Zhang, Ying Zhang, L Qin, Wenjie Zhang, Xemin Lin QCIS, University of Technology, Sydney, University of New Soth Wales fanzhang.cs@gmail.com, {Ying.Zhang,

More information

TOWARD AN UNCERTAINTY PRINCIPLE FOR WEIGHTED GRAPHS

TOWARD AN UNCERTAINTY PRINCIPLE FOR WEIGHTED GRAPHS TOWARD AN UNCERTAINTY PRINCIPLE FOR WEIGHTED GRAPHS Bastien Pasdelop, Réda Alami, Vincent Gripon Telecom Bretagne UMR CNRS Lab-STICC name.srname@telecom-bretagne.e Michael Rabbat McGill University ECE

More information

The Disciplined Flood Protocol in Sensor Networks

The Disciplined Flood Protocol in Sensor Networks The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab

More information

This chapter is based on the following sources, which are all recommended reading:

This chapter is based on the following sources, which are all recommended reading: Bioinformatics I, WS 09-10, D. Hson, December 7, 2009 105 6 Fast String Matching This chapter is based on the following sorces, which are all recommended reading: 1. An earlier version of this chapter

More information

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT PAAMETE OPTIMIZATION FO TAKAGI-SUGENO FUZZY MODELS LESSONS LEANT Manfred Männle Inst. for Compter Design and Falt Tolerance Univ. of Karlsrhe, 768 Karlsrhe, Germany maennle@compter.org Brokat Technologies

More information

h-vectors of PS ear-decomposable graphs

h-vectors of PS ear-decomposable graphs h-vectors of PS ear-decomposable graphs Nima Imani 2, Lee Johnson 1, Mckenzie Keeling-Garcia 1, Steven Klee 1 and Casey Pinckney 1 1 Seattle University Department of Mathematics, 901 12th Avene, Seattle,

More information

Putting the dynamic into software security testing

Putting the dynamic into software security testing Ptting the dynamic into software secrity testing Detecting and Addressing Cybersecrity Isses V1.1 2018-03-05 Code ahead! 2 Atomated vlnerability detection and triage + = 3 How did we get here? Vector was

More information

Uncertainty Determination for Dimensional Measurements with Computed Tomography

Uncertainty Determination for Dimensional Measurements with Computed Tomography Uncertainty Determination for Dimensional Measrements with Compted Tomography Kim Kiekens 1,, Tan Ye 1,, Frank Welkenhyzen, Jean-Pierre Krth, Wim Dewlf 1, 1 Grop T even University College, KU even Association

More information

ABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS

ABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS Proceedings th FIG Symposim on Deformation Measrements Santorini Greece 00. ABSOUTE DEFORMATION PROFIE MEASUREMENT IN TUNNES USING REATIVE CONVERGENCE MEASUREMENTS Mahdi Moosai and Saeid Khazaei Mining

More information

Efficient and Accurate Delaunay Triangulation Protocols under Churn

Efficient and Accurate Delaunay Triangulation Protocols under Churn Efficient and Accrate Delanay Trianglation Protocols nder Chrn Dong-Yong Lee and Simon S. Lam Department of Compter Sciences The University of Texas at Astin {dylee, lam}@cs.texas.ed November 9, 2007 Technical

More information

The Intersection of Two Ringed Surfaces and Some Related Problems

The Intersection of Two Ringed Surfaces and Some Related Problems Graphical Models 63, 8 44 001) doi:10.1006/gmod.001.0553, available online at http://www.idealibrary.com on The Intersection of Two Ringed Srfaces and Some Related Problems Hee-Seok Heo and Sng Je Hong

More information

Towards Understanding Bilevel Multi-objective Optimization with Deterministic Lower Level Decisions

Towards Understanding Bilevel Multi-objective Optimization with Deterministic Lower Level Decisions Towards Understanding Bilevel Mlti-objective Optimization with Deterministic Lower Level Decisions Ankr Sinha Ankr.Sinha@aalto.fi Department of Information and Service Economy, Aalto University School

More information

10.2 Solving Quadratic Equations by Completing the Square

10.2 Solving Quadratic Equations by Completing the Square . Solving Qadratic Eqations b Completing the Sqare Consider the eqation We can see clearl that the soltions are However, What if the eqation was given to s in standard form, that is 6 How wold we go abot

More information

Computer-Aided Mechanical Design Using Configuration Spaces

Computer-Aided Mechanical Design Using Configuration Spaces Compter-Aided Mechanical Design Using Configration Spaces Leo Joskowicz Institte of Compter Science The Hebrew University Jersalem 91904, Israel E-mail: josko@cs.hji.ac.il Elisha Sacks (corresponding athor)

More information

arxiv: v3 [math.co] 7 Sep 2018

arxiv: v3 [math.co] 7 Sep 2018 Cts in matchings of 3-connected cbic graphs Kolja Knaer Petr Valicov arxiv:1712.06143v3 [math.co] 7 Sep 2018 September 10, 2018 Abstract We discss conjectres on Hamiltonicity in cbic graphs (Tait, Barnette,

More information

MultiView: Improving Trust in Group Video Conferencing Through Spatial Faithfulness David T. Nguyen, John F. Canny

MultiView: Improving Trust in Group Video Conferencing Through Spatial Faithfulness David T. Nguyen, John F. Canny MltiView: Improving Trst in Grop Video Conferencing Throgh Spatial Faithflness David T. Ngyen, John F. Canny CHI 2007, April 28 May 3, 2007, San Jose, California, USA Presented by: Stefan Stojanoski 1529445

More information

An Extensive Study of Static Regression Test Selection in Modern Software Evolution

An Extensive Study of Static Regression Test Selection in Modern Software Evolution An Extensive Stdy of Static Regression Test Selection in Modern Software Evoltion Owolabi Legnsen 1, Farah Hariri 1, Agst Shi 1, Yafeng L 2, Lingming Zhang 2, and Darko Marinov 1 1 Department of Compter

More information

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna

More information

Seismic trace interpolation with approximate message passing Navid Ghadermarzy and Felix Herrmann and Özgür Yılmaz, University of British Columbia

Seismic trace interpolation with approximate message passing Navid Ghadermarzy and Felix Herrmann and Özgür Yılmaz, University of British Columbia Seismic trace interpolation with approximate message passing Navid Ghadermarzy and Felix Herrmann and Özgür Yılmaz, University of British Colmbia SUMMARY Approximate message passing (AMP) is a comptationally

More information

arxiv: v1 [cs.cr] 3 Jun 2017

arxiv: v1 [cs.cr] 3 Jun 2017 Spectrm-based deep neral networks for frad detection arxiv:1706.00891v1 [cs.cr] 3 Jn 2017 ABSTRACT Shhan Yan Tongji University 4e66@tongji.ed.cn Jn Li University of Oregon lijn@cs.oregon.ed In this paper,

More information

Method to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot

Method to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot Method to bild an initial adaptive Nero-Fzzy controller for joints control of a legged robot J-C Habmremyi, P. ool and Y. Badoin Royal Military Academy-Free University of Brssels 08 Hobbema str, box:mrm,

More information

Sampling Online Social Networks by Random Walk with Indirect Jumps

Sampling Online Social Networks by Random Walk with Indirect Jumps Sampling Online Social Networks by Random Walk with Indirect Jmps Jnzho Zhao, Pinghi Wang, John C.S. Li, Don Towsley, and Xiaohong Gan arxiv:708.0908v [cs.si] 30 Ag 207 Abstract Random walk-based sampling

More information

COMPOSITION OF STABLE SET POLYHEDRA

COMPOSITION OF STABLE SET POLYHEDRA COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining

More information

Isilon InsightIQ. Version 2.5. User Guide

Isilon InsightIQ. Version 2.5. User Guide Isilon InsightIQ Version 2.5 User Gide Pblished March, 2014 Copyright 2010-2014 EMC Corporation. All rights reserved. EMC believes the information in this pblication is accrate as of its pblication date.

More information

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems Reqirements Engineering Objectives An introdction to reqirements Gerald Kotonya and Ian Sommerville To introdce the notion of system reqirements and the reqirements process. To explain how reqirements

More information

Resolving Linkage Anomalies in Extracted Software System Models

Resolving Linkage Anomalies in Extracted Software System Models Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program

More information

Introduction to Computational Manifolds and Applications

Introduction to Computational Manifolds and Applications IMPA - Institto de Matemática Pra e Aplicada, Rio de Janeiro, RJ, Brazil Introdction to Comptational Manifolds and Applications Part 1 - Constrctions Prof. Marcelo Ferreira Siqeira mfsiqeira@dimap.frn.br

More information

Lecture 10. Diffraction. incident

Lecture 10. Diffraction. incident 1 Introdction Lectre 1 Diffraction It is qite often the case that no line-of-sight path exists between a cell phone and a basestation. In other words there are no basestations that the cstomer can see

More information

Statistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem

Statistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem Statistical Methods in fnctional MRI Lectre 7: Mltiple Comparisons 04/3/13 Martin Lindqist Department of Biostatistics Johns Hopkins University Data Processing Pipeline Standard Analysis Data Acqisition

More information

AAA CENTER FOR DRIVING SAFETY & TECHNOLOGY

AAA CENTER FOR DRIVING SAFETY & TECHNOLOGY AAA CENTER FOR DRIVING SAFETY & TECHNOLOGY 2017 FORD MUSTANG PREMIUM CONVERTIBLE INFOTAINMENT SYSTEM* DEMAND RATING Very High Demand The Ford Mstang Convertible s SYNC 3 (version 2.20) infotainment system

More information

TAKING THE PULSE OF ICT IN HEALTHCARE

TAKING THE PULSE OF ICT IN HEALTHCARE ICT TODAY THE OFFICIAL TRADE JOURNAL OF BICSI Janary/Febrary 2016 Volme 37, Nmber 1 TAKING THE PULSE OF ICT IN HEALTHCARE + PLUS + High-Power PoE + Using HDBaseT in AV Design for Schools + Focs on Wireless

More information

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003 From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information

More information

Appearance Based Tracking with Background Subtraction

Appearance Based Tracking with Background Subtraction The 8th International Conference on Compter Science & Edcation (ICCSE 213) April 26-28, 213. Colombo, Sri Lanka SD1.4 Appearance Based Tracking with Backgrond Sbtraction Dileepa Joseph Jayamanne Electronic

More information

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods Annals of Operations Research 106, 19 46, 2001 2002 Klwer Academic Pblishers. Manfactred in The Netherlands. Discrete Cost Mlticommodity Network Optimization Problems and Exact Soltion Methods MICHEL MINOUX

More information

POWER-OF-2 BOUNDARIES

POWER-OF-2 BOUNDARIES Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of

More information

CS 4204 Computer Graphics

CS 4204 Computer Graphics CS 424 Compter Graphics Crves and Srfaces Yong Cao Virginia Tech Reference: Ed Angle, Interactive Compter Graphics, University of New Mexico, class notes Crve and Srface Modeling Objectives Introdce types

More information

Date: December 5, 1999 Dist'n: T1E1.4

Date: December 5, 1999 Dist'n: T1E1.4 12/4/99 1 T1E14/99-559 Project: T1E14: VDSL Title: Vectored VDSL (99-559) Contact: J Cioffi, G Ginis, W Y Dept of EE, Stanford U, Stanford, CA 945 Cioffi@stanforded, 1-65-723-215, F: 1-65-724-3652 Date:

More information

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment

More information

PROGRAM LICENSE AGREEMENT LIMITED WARRANTY... 4 Trademarks Contents Preface... 11

PROGRAM LICENSE AGREEMENT LIMITED WARRANTY... 4 Trademarks Contents Preface... 11 . Contents PROGRAM LICENSE AGREEMENT... LIMITED WARRANTY... 4 Trademarks... 6. Contents... 8 Preface... 2. Overview... 3 2. Jst one other important thing... 3 2.2 Abot the ser manal... 4 2.3 Manal System

More information

SZ-1.4: Significantly Improving Lossy Compression for Scientific Data Sets Based on Multidimensional Prediction and Error- Controlled Quantization

SZ-1.4: Significantly Improving Lossy Compression for Scientific Data Sets Based on Multidimensional Prediction and Error- Controlled Quantization SZ-1.4: Significantly Improving Lossy Compression for Scientific Data Sets Based on Mltidimensional Prediction and Error- Controlled Qantization Dingwen Tao (University of California, Riverside) Sheng

More information

Fast Obstacle Detection using Flow/Depth Constraint

Fast Obstacle Detection using Flow/Depth Constraint Fast Obstacle etection sing Flow/epth Constraint S. Heinrich aimlerchrylser AG P.O.Box 2360, -89013 Ulm, Germany Stefan.Heinrich@aimlerChrysler.com Abstract The early recognition of potentially harmfl

More information

Computer User s Guide 4.0

Computer User s Guide 4.0 Compter User s Gide 4.0 2001 Glenn A. Miller, All rights reserved 2 The SASSI Compter User s Gide 4.0 Table of Contents Chapter 1 Introdction...3 Chapter 2 Installation and Start Up...5 System Reqirements

More information

History Slicing: Assisting Code-Evolution Tasks

History Slicing: Assisting Code-Evolution Tasks History Slicing: Assisting Code-Evoltion Tasks Francisco Servant Department of Informatics University of California, Irvine Irvine, CA, U.S.A. 92697-3440 fservant@ics.ci.ed James A. Jones Department of

More information

A GENERIC MODEL OF A BASE-ISOLATED BUILDING

A GENERIC MODEL OF A BASE-ISOLATED BUILDING Chapter 5 A GENERIC MODEL OF A BASE-ISOLATED BUILDING This chapter draws together the work o Chapters 3 and 4 and describes the assembly o a generic model o a base-isolated bilding. The irst section describes

More information

Normalized averaging using adaptive applicability functions with application in image reconstruction from sparsely and randomly sampled data

Normalized averaging using adaptive applicability functions with application in image reconstruction from sparsely and randomly sampled data Normalized averaging sing adaptive applicability fnctions with application in image reconstrction from sparsely and randomly sampled data Tan Q. Pham, Lcas J. van Vliet Pattern Recognition Grop, Faclty

More information

(2, 4) Tree Example (2, 4) Tree: Insertion

(2, 4) Tree Example (2, 4) Tree: Insertion Presentation for se with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 B-Trees and External Memory (2, 4) Trees Each internal node has 2 to 4 children:

More information

Efficient Mining of Partial Periodic Patterns in Time Series Database

Efficient Mining of Partial Periodic Patterns in Time Series Database Wright tate University CORE cholar Kno.e.sis Pblications The Ohio Center of Excellence in Knowledge- Enabled Compting (Kno.e.sis) 3-1999 Efficient Mining of Partial Periodic Patterns in Time eries Database

More information

Cautionary Aspects of Cross Layer Design: Context, Architecture and Interactions

Cautionary Aspects of Cross Layer Design: Context, Architecture and Interactions Cationary Aspects of Cross Layer Design: Context, Architectre and Interactions Vikas Kawadia and P. R. Kmar Dept. of Electrical and Compter Engineering, and Coordinated Science Lab University of Illinois,

More information

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING International Jornal of Modern Engineering Research (IJMER) www.imer.com Vol.1, Isse1, pp-134-139 ISSN: 2249-6645 IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING

More information

An Introduction to GPU Computing. Aaron Coutino MFCF

An Introduction to GPU Computing. Aaron Coutino MFCF An Introdction to GPU Compting Aaron Cotino acotino@waterloo.ca MFCF What is a GPU? A GPU (Graphical Processing Unit) is a special type of processor that was designed to render and maniplate textres. They

More information

Blended Deformable Models

Blended Deformable Models Blended Deformable Models (In IEEE Trans. Pattern Analysis and Machine Intelligence, April 996, 8:4, pp. 443-448) Doglas DeCarlo and Dimitri Metaxas Department of Compter & Information Science University

More information

An Optimization of Granular Network by Evolutionary Methods

An Optimization of Granular Network by Evolutionary Methods An Optimization of Granlar Networ by Evoltionary Methods YUN-HEE HAN, KEUN-CHANG KWAK* Dept. of Control, Instrmentation, and Robot Engineering Chosn University 375 Seos-dong, Dong-g, Gwangj, 50-759 Soth

More information

EMC AppSync. User Guide. Version REV 01

EMC AppSync. User Guide. Version REV 01 EMC AppSync Version 1.5.0 User Gide 300-999-948 REV 01 Copyright 2012-2013 EMC Corporation. All rights reserved. Pblished in USA. EMC believes the information in this pblication is accrate as of its pblication

More information

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read. The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5

More information

QoS-driven Runtime Adaptation of Service Oriented Architectures

QoS-driven Runtime Adaptation of Service Oriented Architectures Qo-driven Rntime Adaptation of ervice Oriented Architectres Valeria ardellini 1 Emiliano asalicchio 1 Vincenzo Grassi 1 Francesco Lo Presti 1 Raffaela Mirandola 2 1 Dipartimento di Informatica, istemi

More information

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un Dynamic Maintenance of Majority Information in Constant Time per Update? Gdmnd S. Frandsen and Sven Skym BRICS 1 Department of Compter Science, University of arhs, Ny Mnkegade, DK-8000 arhs C, Denmark

More information

Addressing in Future Internet: Problems, Issues, and Approaches

Addressing in Future Internet: Problems, Issues, and Approaches Addressing in Ftre Internet: Problems, Isses, and Approaches Mltimedia and Mobile commnications Laboratory Seol National University Jaeyong Choi, Chlhyn Park, Hakyng Jng, Taekyong Kwon, Yanghee Choi 19

More information

Unit Testing with VectorCAST and AUTOSAR

Unit Testing with VectorCAST and AUTOSAR Unit Testing with VectorCAST and AUTOSAR Vector TechDay Software Testing with VectorCAST V1.0 2018-11-15 Agenda Introdction Unit Testing Demo Working with AUTOSAR Generated Code Unit Testing AUTOSAR SWCs

More information

PlenoPatch: Patch-based Plenoptic Image Manipulation

PlenoPatch: Patch-based Plenoptic Image Manipulation 1 PlenoPatch: Patch-based Plenoptic Image Maniplation Fang-Le Zhang, Member, IEEE, Je Wang, Senior Member, IEEE, Eli Shechtman, Member, IEEE, Zi-Ye Zho, Jia-Xin Shi, and Shi-Min H, Member, IEEE Abstract

More information

Multiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET

Multiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET Mltiple-Choice Test Chapter 09.0 Golden Section Search Method Optimization COMPLETE SOLUTION SET. Which o the ollowing statements is incorrect regarding the Eqal Interval Search and Golden Section Search

More information

Dr Paolo Guagliardo. Fall 2018

Dr Paolo Guagliardo. Fall 2018 The NULL vale Dr Paolo Gagliardo dbs-lectrer@ed.ac.k Fall 2018 NULL: all-prpose marker to represent incomplete information Main sorce of problems and inconsistencies... this topic cannot be described in

More information

Sensor-Based Fast Thermal Evaluation Model For Energy Efficient High-Performance Datacenters

Sensor-Based Fast Thermal Evaluation Model For Energy Efficient High-Performance Datacenters Sensor-ased Fast Thermal valation Model For nergy fficient High-Performance atacenters Qinghi Tang Tridib Mkherjee, Sandeep K. S. Gpta Phil ayton ept. of lectrical ng. ept. of ompter Science and ng. Intel

More information

PlenoPatch: Patch-based Plenoptic Image Manipulation

PlenoPatch: Patch-based Plenoptic Image Manipulation 1 PlenoPatch: Patch-based Plenoptic Image Maniplation Fang-Le Zhang, Member, IEEE, Je Wang, Senior Member, IEEE, Eli Shechtman, Member, IEEE, Zi-Ye Zho, Jia-Xin Shi, and Shi-Min H, Member, IEEE Abstract

More information

Illumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY

Illumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY Illmina LIMS Software Gide Jne 2017 ILLUMINA PROPRIETARY This docment and its contents are proprietary to Illmina, Inc. and its affiliates ("Illmina"), and are intended solely for the contractal se of

More information

Hardware-Accelerated Free-Form Deformation

Hardware-Accelerated Free-Form Deformation Hardware-Accelerated Free-Form Deformation Clint Cha and Ulrich Nemann Compter Science Department Integrated Media Systems Center University of Sothern California Abstract Hardware-acceleration for geometric

More information

EUCLIDEAN SKELETONS USING CLOSEST POINTS. Songting Luo. Leonidas J. Guibas. Hong-Kai Zhao. (Communicated by the associate editor name)

EUCLIDEAN SKELETONS USING CLOSEST POINTS. Songting Luo. Leonidas J. Guibas. Hong-Kai Zhao. (Communicated by the associate editor name) Volme X, No. 0X, 200X, X XX Web site: http://www.aimsciences.org EUCLIDEAN SKELETONS USING CLOSEST POINTS Songting Lo Department of Mathematics, University of California, Irvine Irvine, CA 92697-3875,

More information

The extra single-cycle adders

The extra single-cycle adders lticycle Datapath As an added bons, we can eliminate some of the etra hardware from the single-cycle path. We will restrict orselves to sing each fnctional nit once per cycle, jst like before. Bt since

More information

Constrained Routing Between Non-Visible Vertices

Constrained Routing Between Non-Visible Vertices Constrained Roting Between Non-Visible Vertices Prosenjit Bose 1, Matias Korman 2, André van Renssen 3,4, and Sander Verdonschot 1 1 School of Compter Science, Carleton University, Ottawa, Canada. jit@scs.carleton.ca,

More information