CS224W Final Report. 1 Introduction. 3 Data Collection and Visualization. 2 Prior Work. Cyprien de Lichy, Renke Pan, Zheng Wu.
|
|
- Esmond Gibbs
- 5 years ago
- Views:
Transcription
1 CS224W Final Report Cyprien de Lichy, Renke Pan, Zheng W 1 Introdction December 9, 2015 Recommender systems are information filtering systems that provide sers with personalized sggestions for prodcts or items. They have become an important research area since the appearance of the first papers on collaborative filtering. Mch work has been done on developing new approaches to recommender systems over the last years becase of the growing need of applications to help sers deal with an increasing amont of information and provide them with personalized recommendations. Nowadays, recommender systems are sally based on the sers past behaviors and the similarity between sers and/or between items. Bt sch traditional recommendation systems sffer from several problems, one of them being data sparsity. Some sers may have very few recorded (or even no) interactions with the items, and ths it is hard to predict what they might like, which is called cold start. However, there is a noticeable social trend that people that are socially related share interests and tastes, and ths, the knowledge abot a person s social neighborhood strctre cold be sed to infer its preferences to some degree. Bt conventional recommendation systems don t leverage this network strctre to make predictions, ths depriving themselves of a rich sorce of information. The idea of this project wold be to take into consideration the relational strctre of the network to improve the recommendation power, for both ser network and item network. 2 Prior Work Recommender systems are sally classified into collaborative filtering methods and content-based methods. There are also hybrid approaches that combine several recommendation method. For instance in [5] the athors sed a combination of collaborative filtering and content filtering. Except the two approaches mentioned above, people are exploring more and more other information sch as social ties between people to help improve recommendation system s performance. Zheng et al. [1] were the first to introdce the method of social network collaborative filtering. Hill et al. [2] introdce a way to se the information of social network in collective inference withot heavy comptations. However, the comptational complexity for condcting sch inference techniqe on traditional social network is high. Ths, Hill et al. [2] sggests to only limit or interest to a small sbpoplation (those with high commercial potential).on the other hand, featres extracted from recommended contents network cold also make the system more robst. According to the stdy done by Teng et al. [6] to bild recommendation system for recipes, two featres can be extracted from recipes network. Sharma et al.[4] proposed a network-centric approach to recommendations and introdced PopCore, a platform that implements this approach on Facebook. They implemented 6 different algorithms, some of which are network-centric, to stdy and compare the effect of the recommendations and fond that the network-centric algorithms indeed perform better. Marlin et al.[7] showed that to improve the recommendation accracy of a recommender system, the algorithm shold not ignore the missing data mechanism and the MAR (Missing at Random) assmption is not valid, and we shold model the MNAR (Missing Not at Random) phenomenon. In practice we observe that sers tend not to give a rating to an item they didn t like than giving a bad rating. As a reslt the rating distribtion is more skewed toward good ratings. 3 Data Collection and Visalization We se Yelp Data for recommendation system implementation. The dataset contains the following information: 1. Users: Yelping since, votes, review conts, name, serid, friends, fans, average stars, type, compliments, elite. 2. Bsinesses: bsiness ID, fll address, hors, open, categories, city, review cont, name, neighborhood, longitde, state, stars, latitde, attribtes, type. 3. Reviews: votes, ser ID, review ID, stars, date, text, type, bsiness ID. 4. Tips :ser ID, text, bsiness ID, likes, date, type. 5. Check-ins : check-in info, type, bsiness ID. It has 1.6 Million reviews in total, covering 10 cities across United States, Germany, Canada and UK. 366k Users in the dataset form a large social network with 2.9 Million connections. We choose only bsinesses in Pittsbrgh in this case to speed p the calclation for the milestone. And only sers who have reviewed one of the bsinesses inclded will be considered. Ths the data set we se contains 2724 bsinesses, sers, ser connections and ser ratings. 3.1 User Network The degree distribtion of ser network in the whole data set. 1
2 other words, we consider an edge exist if the weight is above t. We se Frchterman Reingold lay ot method, with threshold 5. The degree distribtion of ser network in the Pittsbrgh data set. For User network, if we only display nodes with above 33 degrees, below is the network. We cold observe that there is no obvios clsterization. 4 Evalating Metric 3.2 Bsiness Network We define or crrent bsiness network as follows: Each bsiness is a node in the network. If same ser have been to both bsiness A and bsiness B, then we add an edge between bsiness A and bsiness B with weight 1. If bsiness A and bsiness B share k common sers, then they have an edge between them with weight k. To simplify the network, we limit the size of edges by ptting certain threshold t for the formation of edges. In Social network based top-k recommendation recommends to a ser a small nmber of items(k items) at a time. Most of the existing social network based recommender systems se the root mean sqare error (RMSE) as the optimization goal. Top-k recommendations are more commonly sed in real world problem. For these recommendation systems, the top-k hit ratio or recall is a more natral and sefl metric compared with root mean sqare error. The top-k hit ratio or recall is defined as below[8]: For each ser, we sort the items i according to descending order of the predicted rating ˆR i,. When we have same predicted rating to different items, we rank them randomly. An item is relevant to a ser in the test set if s/he likes it (e.g., the assigned rating in the test data is above a certain threshold). For example, with Yelp data, the rating vales range from 1 to 5 stars and we consider a 5 star rating as relevant(the ser definitely liked these items), while other rating vales and missing rating vales are considered not relevant. The top-k hit ratio or recall is the fraction of relevant items in the test set that are in the top-k of the ranking list, denoted by N(k, ), from among all relevant items, N(). 2
3 For each ser, the top-k hit ratio is given by: H(k, ) = N(k, ) N() With ser top-k hit rate, we can compte the overall top-k hit ratio/recall by: recall = Σ N(k, ) Σ N() A higher top-k hit ratio or recall indicates a better performance of or algorithm. We also compted the RMSE when rnning or recommendation algorithms: RMSE = 1 T (,i) T ( ˆRtest,i R,i test Where T is a test set of observed ratings, R,i test is the grond trth vale, is the corresponding predicted rating. ˆR test,i 5 Nearest Neighbor Methods In a Nearest Neighbor method, top-k recommendations makes prediction only based on items adored by a sbset of sers who have some connection (nder certain distance metric) with the target ser. This kind of connection cold be based on collaborative filtering or edges in the ser-ser network. Then we can integrate social information into Nearest Neighbor top-k recommendation system. 5.1 Collaborative Filtering Approach The Collaborative Filtering Approach ses AllRank to obtain the ser latent featres[8]. The distance is compted throgh the Pearson correlation coefficient. Then we gather items from The U nearest neighbors of the target ser. The voting for the candidate items is defined as follows: V ote,i = Σ v N Σ i sim(, v)δ i Iv where δ is the Kronecker delta; I v denotes the set of relevant items of ser v; and N is the set of U nearest neighbors of ser (as determined by the Pearson correlation). For ser, item i, we have V ote,i ; We give weights to neighbors according to their similarity sim(, v) with the target ser, which is defined as the Pearson correlation coefficient. w t (, v) is set to be 1/d v, where d v is the depth of ser v in the BFS tree rooted at ser. 5.3 Trst-Collaborative Filtering Approach Trst-Collaborative Filtering Approach is designed to hybrid ser latent featre space based collaborative filtering approach and social network based approach. In this approach, we first find U closest neighbors from the CF neighborhood, then find U closest neighbors from the trst neighborhood which are not in the first U neighbors. Then we gather information from the above neighbors: V ote,i = Σ (c) v N Σ i w(, v)δ i Iv where N (c) is the combined neighborhood and w(,v) is defined as following: { sim(, v) if v N w(, v) = w t (, v) if v N (t) 5.4 Reslt Or reslts show that trst information significantly improves top-k hit ratio when incorporated properly in Nearest Neighbor models. The top-k hit ratio for Trst-Collaborative Filtering Approach is the highest, followed by that of PreTrst Approach, which is significantly higher than that of Collaborative Filtering Approach. We have three parameters: 1. U, the nmber of sers considered in the neighborhood, both in the collaborative filtering approach and the network based approaches. 2. K, the pper limit of the nmber of items recommended to a ser. 3. R, the rating threshold sed to determine whether a recommendation is relevant. By changing these parameters, we got different top-k hit ratios. The next three figres show how the top-k hit ratio change with respect to different vales of U, K and R: 5.2 PreTrst Approach PreTrst approach finds neighbors by implementing BFS in the ser-ser network starting from ser. The voting is as follow: V ote,i = Σ (t) v N Σ i w t (, v)δ i Iv where N (t) is the set of trsted sers of, and w t (, v) is the voting weight of ser v. The vale of 3
4 U, the larger the U, the longer it takes to finish the comptation. For K, we cannot recommend say 1000 restarants simltaneosly to a ser. A reasonable K wold be somewhere below 50. For R, 5 seems to be the best not only becase it is the largest possible vale, bt also becase it makes the most sense in practice. Giving a 5 star review sggests the ser absoltely loved the restarant. 5.5 Commnity Detection We hypothesized that adding in commnity detection to pre trst approach is going to improve the hit rate. The assmption is that sers within the same commnity share the same taste. Ths giving recommendation based on sers from the same commnity will likely increase the hit rate/recall. We first implemented a version of PreTrst that restricts neighbors to only those that are within the same commnity, detected by Claset-Newman-Moore commnity detection method. We can see that recall increases as U increases, fixing K and R. The recall for collaborative filtering approach reaches a platea after certain threshold. This is probably becase there is not enogh sers that rated the same restarants and ths we cannot get a neighborhood of size U after certain large enogh U. On the other hand, the recall for the two network-based approaches keep increasing as U increases. This is probably becase the largest connected component is pretty large (it trns ot 46% percent of all sers are in the largest connected component) so we are always able to find a large enogh neighborhood in the network. From the period before the collaborative filtering approach reaches the platea, we can conclde that introdcing network featres significantly improves the recommendation. We can see that recall increases as K increases, fixing U and R. This is expected becase we are increasing the nominator of recall while keeping denominator fixed. We can see that recall increases as R increases, fixing U and K. This is expected becase we are increasing the nominator of recall slightly bt the denominator increased drastically if we decrease R. So overall we see the recall increases with U, K, R. Larger U, K, R always lead to better recall. However, the choice of U, K, R cannot be arbitrarily large. For As can be seen from the above graph, it trned ot that the hit rate actally decreased, which is qite nexpected. Then we dig deep into this and brainstormed what cold be casing this. We think the reason is that not every one of a ser s nearest neighbor falls within the same commnity with the ser. Ths these sers, which actally has the best predictive power, are exclded when making the recommendation. As an attempt to jstify this hypothesis and also improve the recommendation, we introdced a heristic: all the sers who are in the same commnity as the ser of interest are closer to this ser in the network. So once we skipped throgh nmber of sers in the same commnity, we no longer enforce same commnity rle when determining if a ser shold be considered, i.e. always consider them. This heristic in fact increased the recall. Or previos hypothesis is ths jstified. However, the improvement in the recall is not enogh. It still falls mch lower than the original approach. Frther more, both crves with commnity featres reach a platea. This is becase they both skipped some close sers in the network bt are not in the same commnity and these sers have the most predictive power. Inclding more sers frther ot doesn t really help the prediction mch becase the similarity between sers is mch lower. 4
5 6 Matrix Factorization The Matrix Factorization approach was fond to be the most accrate approach to redce the dimensionality of the problem when a high level of data sparsity is observed. 6.1 Basic approach In this model, the rating matrix R of dimensions 0 i 0 ( 0 being the nmber of sers and i 0 the nmber of items) is represented as the prodct of 2 low-rank matrices P and Q. The matrices P and Q are latent-featres representation of items and sers respectively, and they are said to be low-rank: rank(p ) = rank(q) = d, with d 0 and d i 0. The MF model is a kind of dimension redction, the objective is to find the matrix ˆR = QP T that best fits the original matrix R (which is sparse becase we have only a few items rated by each ser). Q is of dimensions 0 d and P is of dimensions i 0 d. To take into accont the phenomenon of MNAR (Missing Not at Random) of the ratings, an offset rating vale r m is added in the model in the following form: ˆR = r m + QP T One way to proceed to maximize the recall on the top-k recommendations wold be to optimize directly on the top-k hit ratio bt this is too costly comptationally. Instead, we can optimize a modified sqared error criterion that will lead to a better top-k hit rate than the classical sqared error: min P,Q i ( W,i R,i ˆR (,i + λ P 2 F + Q 2 ) F (1) Where R,i = R,i if the rating is observed and R,i = r m otherwise, r m is the impted rating when there is a missing vale, it is a tning parameter of the model, and according to the stdy by Yahoo! (See [7]) we expect its optimal vale to be rather small. The matrix W is introdced to balance the dataset (which is very sparse in reality) by giving more weight to the observed ratings. In addition to that we also have the typical L2 reglarization term to avoid over-fitting. 6.2 Inclding the social network Now, we can inclde the networks (ser-ser and bsiness-bsiness networks) information by inclding more terms i the following way. We introdce two matrices U and B representing the relationship between two sers and two bsinesses respectively, U and B cold be weighted adjacency matrix, it is proposed in [8]: deg(v) U,v = A,v deg(v) + deg() where A is the ser-ser adjacency matrix. The objective fnction to minimize becomes the following: min P,Q,V ( W,i R,i ˆR,i i + γ v W U,v ( U,v Û,v + λ ( P 2 F + Q 2 F + V 2 ) F Where Û = QV T, V is of size 0 d. (2) 6.3 Inclding a bsiness-bsiness network In or approach we imagined doing the same for bsinesses, by constrcting a bsiness-bsiness network sing the data abot the bsinesses (like descriptions, reviews) and the sers. Basically, we wold bild a network by linking two bsinesses if they have mtal cstomers and similar descriptions. In that way we se more available data than jst the ratings history to drive the CF comptations for the recommender system. The objective fnction to minimize wold be the following: min P,Q,V,C ( W,i R,i ˆR,i i + γ ( W,v U U,v Û,v v + β Wi,j (B B i,j ˆB i,j i j + λ ( P 2 F + Q 2 F + V 2 F + C 2 ) F Where ˆB = P C T, and C is of size i 0 d. 6.4 Social inflence weighting (3) By varying the weights W,i of the observed ratings according to the eigenvector centrality measre of ser, we are giving more weights to the important/inflential sers, this forces the algorithm to better fit the matrix factorization to these sers and these better reslts may diffse in the network (via the social part of the objective fnction) and yield better overall reslts. This comes from the intition that better fitting the more inflential sers is more sefl for the overall performance. 6.5 Optimization algorithm for the MF models We implemented all of these MF models sing an alternating optimization algorithm: Alternating Least Sqares, which is an efficient algorithm for this task. At each step of the algorithm 3 of the nknown matrices (P, Q, V and C) are fixed and the other one can be pdated to maximize the objective fnction via an exact formla. 5
6 6.6 Reslts Model RMSE MAR (r m, w m = 0) 1.61 MNAR (r m, w m = 2, ) 1.11 MNAR Social Network 1.02 MNAR Social & bsiness Network 1.01 From this table we can see that by taking into accont the phenomenon of MNAR we can greatly improve the RMSE at the expense of finding the optimal vales of 2 tning parameters (r m and w m ). We can also see that sing information abot the strctre of the social network (the adjacency matrix and the eigenvector centrality measre) can also improve the RMSE. However, we didn t get a noticeable improvement by considering or bsiness-bsiness network maybe becase or basic constrction of the network does not bring new information, the convergence of or algorithm is also longer. 7 Temporal Effects When we first proposed the project, we were thinking abot incorporating the temporal effects of the ratings and the network. However, when we actally want to go ahead and do it, we fond ot there is no timestamp of the friendship formation. So the network is a static snapshot, not evolving over time. However, we do have the review timestamp. The sage of the review timestamp is limited thogh, besides splitting the data into train and test set, predicting ftre reviews from past reviews, there is not an intitive way of tilizing this information. Ths stdying the temporal effects is not well sited for this data set. 8 Reprodcibility/Robstness We focsed or analysis with Pittsbrgh becase Pittsbrgh s data is diverse enogh and complete yet small enogh for fast prototyping. One concern is that the overall network strctre is different than the one in Pittsbrgh. This is a totally valid concern. However, the data consists of restarants from the following cities: U.K.: Edinbrgh Germany: Karlsrhe Canada: Montreal and Waterloo U.S.: Pittsbrgh, Charlotte, Urbana-Champaign, Phoenix, Las Vegas, Madison First of all, this is not the complete graph of the overall yelp network anyway. It s only a small portion of the global graph strctre. Frther redcing the graph to one city isn t any fndamentally different. Secondly, the cities are in disjoint regions of the contry or even different contries. we wold expect the graphs of each city to be a relative independent connected component and there is mch less inter-city connections. Therefore, stdying each individal city by itself is a valid approach. In fact, to make the most relevant prediction, I sspect Yelp wold se local information heavily as well. Therefore, it doesn t really make sense to rn the analysis with the whole data set. If we did that, We wold spent way too mch comptation time on an improperly defined network. To make sre or analysis is robst and can be reprodced. We did the exact same analysis on Phoenix data, which is diverse and complete yet sbstantially larger than Pittsbrgh. All the trends, relationships, orderings are retained with Phoenix data. To save space, we did not inclde the plots here. We have ths gained confidence that or approach can be reprodced in an independent data set and is robst. 9 Difficlties 1. The existing recommendation packages do not satisfy or need (mostly becase the flexibility of the algorithms is not satisfying) and or data is not ready to se for recommendation, so we had to implement all the algorithms and data processing from scratch. 2. The size of the data poses problems for details of implementing the algorithms. For example, we rn ot of memory when doing matrix operations and had to se sparse matrices and resort to comptational tricks. 3. The dataset is hge and the rnning time for the algorithms is rather long. 10 Ftre Works 1. Frther optimize the model, minor tweak the algorithms to have the best performance. 2. Have another data set, different from Yelp, which has friendship formation timestamps, to stdy temporal effects. 11 Acknowledgment We wold like to thank Lada and the TAs for providing a wonderfl qarter of learning experience and insightfl feedback on the project. References [1] R. Zheng, F. Provost and A. Ghose. Social Network Collaborative Filtering: Preliminary Reslts. Proceedings of the Sixth Workshop on ebsiness (WEB2007), New York, USA, December 2007 [2] S. Hill, F. Provost and C. Volinsky. Learning and Inference in Massive Social Networks. 5th International Workshop on Mining and Learning with Graphs, Agst
7 [3] G. Adomavicis and A. Tzhilin, Toward the Next Generation of Recommender Systems: A Srvey of the State-of-the-Art and Possible Extensions, IEEE Trans. Knowl. Data Eng. 17(6): , 2005 [4] A. Sharma and D. Cosley, Network-Centric Recommendation: Personalization with and in Social Networks, IEEE International Conference on Privacy, Secrity, Risk, and Trst, 2011 [5] A. B. Barragns-Martnez, E. Costa-Montenegro, J.C. Brgillo, M. Rey- Lpez, F. A. Mikic-Fonte, and A. Peleteiro. A hybrid content-based and item-based collaborative filtering approach to recommend TV programs enhanced with singlar vale decomposition. Information Sciences, 180(22), [6] C.-Y. Teng, Y.-R. Lin, and L. A. Adamic. Recipe recommendation sing ingredient networks. Proceedings of the 3rd Annal ACM Web Science Conference, pages , [7] Marlin, B.; Zemel, R.; Roweis, S; Slaney, M., Collaborative Filtering and the Missing at Random Assmption [8] Yang, X.; Steck, H.; Go, Y; Li, Y., On Top-k Recommendation sing Social Networks 7
Evaluating Influence Diagrams
Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will
More informationREPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips
REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands
More informationCS 153 Design of Operating Systems Spring 18
CS 53 Design of Operating Systems Spring 8 Lectre 2: Virtal Memory Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Recap: cache Well-written programs exhibit
More informationTopic Continuity for Web Document Categorization and Ranking
Topic Continity for Web ocment Categorization and Ranking B. L. Narayan, C. A. Mrthy and Sankar. Pal Machine Intelligence Unit, Indian Statistical Institte, 03, B. T. Road, olkata - 70008, India. E-mail:
More informationReal-time mean-shift based tracker for thermal vision systems
9 th International Conference on Qantitative InfraRed Thermography Jly -5, 008, Krakow - Poland Real-time mean-shift based tracker for thermal vision systems G. Bieszczad* T. Sosnowski** * Military University
More informationMulti-lingual Multi-media Information Retrieval System
Mlti-lingal Mlti-media Information Retrieval System Shoji Mizobchi, Sankon Lee, Fmihiko Kawano, Tsyoshi Kobayashi, Takahiro Komats Gradate School of Engineering, University of Tokshima 2-1 Minamijosanjima,
More informationA personalized search using a semantic distance measure in a graph-based ranking model
Article A personalized search sing a semantic distance measre in a graph-based ranking model Jornal of Information Science XX (X) pp. 1-23 The Athor(s) 2011 Reprints and Permissions: sagepb.co.k/jornalspermissions.nav
More informationBias of Higher Order Predictive Interpolation for Sub-pixel Registration
Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz
More informationOn the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing
1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity
More informationTu P7 15 First-arrival Traveltime Tomography with Modified Total Variation Regularization
T P7 15 First-arrival Traveltime Tomography with Modified Total Variation Reglarization W. Jiang* (University of Science and Technology of China) & J. Zhang (University of Science and Technology of China)
More informationConstructing and Comparing User Mobility Profiles for Location-based Services
Constrcting and Comparing User Mobility Profiles for Location-based Services Xihi Chen Interdisciplinary Centre for Secrity, Reliability and Trst, University of Lxemborg Jn Pang Compter Science and Commnications,
More informationDIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES
DIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES Binh-Son Ha 1 Imari Sato 2 Kok-Lim Low 1 1 National University of Singapore 2 National Institte of Informatics, Tokyo, Japan ABSTRACT Dal
More informationAUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING
AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING Mingsheng LIAO, Li ZHANG, Zxn ZHANG, Jiangqing ZHANG Whan Technical University of Srveying and Mapping, Natinal Lab. for Information Eng. in
More informationOptimal Sampling in Compressed Sensing
Optimal Sampling in Compressed Sensing Joyita Dtta Introdction Compressed sensing allows s to recover objects reasonably well from highly ndersampled data, in spite of violating the Nyqist criterion. In
More informationTdb: A Source-level Debugger for Dynamically Translated Programs
Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,
More informationA sufficient condition for spiral cone beam long object imaging via backprojection
A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral
More informationMaster for Co-Simulation Using FMI
Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany
More informationIDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION
ICAS 2 CONGRESS IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION Christophe Le Garrec, Marc Hmbert, Michel Lacabanne Aérospatiale Matra
More informationObject Pose from a Single Image
Object Pose from a Single Image How Do We See Objects in Depth? Stereo Use differences between images in or left and right eye How mch is this difference for a car at 00 m? Moe or head sideways Or, the
More informationarxiv: v1 [cs.si] 12 Dec 2016
Connection Discovery sing Shared Images by Gassian Relational Topic Model Xiaopeng Li, Ming Cheng, James She HKUST-NIE Social Media Lab, Hong Kong University of Science & Technology, Hong Kong xlibo@connect.st.hk,
More informationFault Tolerance in Hypercubes
Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different
More informationPipelined van Emde Boas Tree: Algorithms, Analysis, and Applications
This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,
More informationMaximum Weight Independent Sets in an Infinite Plane
Maximm Weight Independent Sets in an Infinite Plane Jarno Nosiainen, Jorma Virtamo, Pasi Lassila jarno.nosiainen@tkk.fi, jorma.virtamo@tkk.fi, pasi.lassila@tkk.fi Department of Commnications and Networking
More informationImage Compression Compression Fundamentals
Compression Fndamentals Data compression refers to the process of redcing the amont of data reqired to represent given qantity of information. Note that data and information are not the same. Data refers
More informationSubgraph Matching with Set Similarity in a Large Graph Database
1 Sbgraph Matching with Set Similarity in a Large Graph Database Liang Hong, Lei Zo, Xiang Lian, Philip S. Y Abstract In real-world graphs sch as social networks, Semantic Web and biological networks,
More informationA RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA
A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA Mei Zho*, Ling-li Tang, Chan-rong Li, Zhi Peng, Jing-mei Li Academy of Opto-Electronics, Chinese Academy of Sciences, No.9, Dengzhang
More informationFINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES
FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES RICARDO G. DURÁN AND ARIEL L. LOMBARDI Abstract. We consider the nmerical approximation of a model convection-diffsion
More informationNetworks An introduction to microcomputer networking concepts
Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES
More informationWhat s New in AppSense Management Suite Version 7.0?
What s New in AMS V7.0 What s New in AppSense Management Site Version 7.0? AppSense Management Site Version 7.0 is the latest version of the AppSense prodct range and comprises three prodct components,
More informationA choice relation framework for supporting category-partition test case generation
Title A choice relation framework for spporting category-partition test case generation Athor(s) Chen, TY; Poon, PL; Tse, TH Citation Ieee Transactions On Software Engineering, 2003, v. 29 n. 7, p. 577-593
More informationA Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks
Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,
More informationStereo Matching and 3D Visualization for Gamma-Ray Cargo Inspection
Stereo Matching and 3D Visalization for Gamma-Ray Cargo Inspection Zhigang Zh *ab, Y-Chi H bc a Department of Compter Science, The City College of New York, New York, NY 3 b Department of Compter Science,
More informationCohesive Subgraph Mining on Attributed Graph
Cohesive Sbgraph Mining on Attribted Graph Fan Zhang, Ying Zhang, L Qin, Wenjie Zhang, Xemin Lin QCIS, University of Technology, Sydney, University of New Soth Wales fanzhang.cs@gmail.com, {Ying.Zhang,
More informationTOWARD AN UNCERTAINTY PRINCIPLE FOR WEIGHTED GRAPHS
TOWARD AN UNCERTAINTY PRINCIPLE FOR WEIGHTED GRAPHS Bastien Pasdelop, Réda Alami, Vincent Gripon Telecom Bretagne UMR CNRS Lab-STICC name.srname@telecom-bretagne.e Michael Rabbat McGill University ECE
More informationThe Disciplined Flood Protocol in Sensor Networks
The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab
More informationThis chapter is based on the following sources, which are all recommended reading:
Bioinformatics I, WS 09-10, D. Hson, December 7, 2009 105 6 Fast String Matching This chapter is based on the following sorces, which are all recommended reading: 1. An earlier version of this chapter
More informationPARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT
PAAMETE OPTIMIZATION FO TAKAGI-SUGENO FUZZY MODELS LESSONS LEANT Manfred Männle Inst. for Compter Design and Falt Tolerance Univ. of Karlsrhe, 768 Karlsrhe, Germany maennle@compter.org Brokat Technologies
More informationh-vectors of PS ear-decomposable graphs
h-vectors of PS ear-decomposable graphs Nima Imani 2, Lee Johnson 1, Mckenzie Keeling-Garcia 1, Steven Klee 1 and Casey Pinckney 1 1 Seattle University Department of Mathematics, 901 12th Avene, Seattle,
More informationPutting the dynamic into software security testing
Ptting the dynamic into software secrity testing Detecting and Addressing Cybersecrity Isses V1.1 2018-03-05 Code ahead! 2 Atomated vlnerability detection and triage + = 3 How did we get here? Vector was
More informationUncertainty Determination for Dimensional Measurements with Computed Tomography
Uncertainty Determination for Dimensional Measrements with Compted Tomography Kim Kiekens 1,, Tan Ye 1,, Frank Welkenhyzen, Jean-Pierre Krth, Wim Dewlf 1, 1 Grop T even University College, KU even Association
More informationABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS
Proceedings th FIG Symposim on Deformation Measrements Santorini Greece 00. ABSOUTE DEFORMATION PROFIE MEASUREMENT IN TUNNES USING REATIVE CONVERGENCE MEASUREMENTS Mahdi Moosai and Saeid Khazaei Mining
More informationEfficient and Accurate Delaunay Triangulation Protocols under Churn
Efficient and Accrate Delanay Trianglation Protocols nder Chrn Dong-Yong Lee and Simon S. Lam Department of Compter Sciences The University of Texas at Astin {dylee, lam}@cs.texas.ed November 9, 2007 Technical
More informationThe Intersection of Two Ringed Surfaces and Some Related Problems
Graphical Models 63, 8 44 001) doi:10.1006/gmod.001.0553, available online at http://www.idealibrary.com on The Intersection of Two Ringed Srfaces and Some Related Problems Hee-Seok Heo and Sng Je Hong
More informationTowards Understanding Bilevel Multi-objective Optimization with Deterministic Lower Level Decisions
Towards Understanding Bilevel Mlti-objective Optimization with Deterministic Lower Level Decisions Ankr Sinha Ankr.Sinha@aalto.fi Department of Information and Service Economy, Aalto University School
More information10.2 Solving Quadratic Equations by Completing the Square
. Solving Qadratic Eqations b Completing the Sqare Consider the eqation We can see clearl that the soltions are However, What if the eqation was given to s in standard form, that is 6 How wold we go abot
More informationComputer-Aided Mechanical Design Using Configuration Spaces
Compter-Aided Mechanical Design Using Configration Spaces Leo Joskowicz Institte of Compter Science The Hebrew University Jersalem 91904, Israel E-mail: josko@cs.hji.ac.il Elisha Sacks (corresponding athor)
More informationarxiv: v3 [math.co] 7 Sep 2018
Cts in matchings of 3-connected cbic graphs Kolja Knaer Petr Valicov arxiv:1712.06143v3 [math.co] 7 Sep 2018 September 10, 2018 Abstract We discss conjectres on Hamiltonicity in cbic graphs (Tait, Barnette,
More informationMultiView: Improving Trust in Group Video Conferencing Through Spatial Faithfulness David T. Nguyen, John F. Canny
MltiView: Improving Trst in Grop Video Conferencing Throgh Spatial Faithflness David T. Ngyen, John F. Canny CHI 2007, April 28 May 3, 2007, San Jose, California, USA Presented by: Stefan Stojanoski 1529445
More informationAn Extensive Study of Static Regression Test Selection in Modern Software Evolution
An Extensive Stdy of Static Regression Test Selection in Modern Software Evoltion Owolabi Legnsen 1, Farah Hariri 1, Agst Shi 1, Yafeng L 2, Lingming Zhang 2, and Darko Marinov 1 1 Department of Compter
More informationAn Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast
University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna
More informationSeismic trace interpolation with approximate message passing Navid Ghadermarzy and Felix Herrmann and Özgür Yılmaz, University of British Columbia
Seismic trace interpolation with approximate message passing Navid Ghadermarzy and Felix Herrmann and Özgür Yılmaz, University of British Colmbia SUMMARY Approximate message passing (AMP) is a comptationally
More informationarxiv: v1 [cs.cr] 3 Jun 2017
Spectrm-based deep neral networks for frad detection arxiv:1706.00891v1 [cs.cr] 3 Jn 2017 ABSTRACT Shhan Yan Tongji University 4e66@tongji.ed.cn Jn Li University of Oregon lijn@cs.oregon.ed In this paper,
More informationMethod to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot
Method to bild an initial adaptive Nero-Fzzy controller for joints control of a legged robot J-C Habmremyi, P. ool and Y. Badoin Royal Military Academy-Free University of Brssels 08 Hobbema str, box:mrm,
More informationSampling Online Social Networks by Random Walk with Indirect Jumps
Sampling Online Social Networks by Random Walk with Indirect Jmps Jnzho Zhao, Pinghi Wang, John C.S. Li, Don Towsley, and Xiaohong Gan arxiv:708.0908v [cs.si] 30 Ag 207 Abstract Random walk-based sampling
More informationCOMPOSITION OF STABLE SET POLYHEDRA
COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining
More informationIsilon InsightIQ. Version 2.5. User Guide
Isilon InsightIQ Version 2.5 User Gide Pblished March, 2014 Copyright 2010-2014 EMC Corporation. All rights reserved. EMC believes the information in this pblication is accrate as of its pblication date.
More informationRequirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems
Reqirements Engineering Objectives An introdction to reqirements Gerald Kotonya and Ian Sommerville To introdce the notion of system reqirements and the reqirements process. To explain how reqirements
More informationResolving Linkage Anomalies in Extracted Software System Models
Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program
More informationIntroduction to Computational Manifolds and Applications
IMPA - Institto de Matemática Pra e Aplicada, Rio de Janeiro, RJ, Brazil Introdction to Comptational Manifolds and Applications Part 1 - Constrctions Prof. Marcelo Ferreira Siqeira mfsiqeira@dimap.frn.br
More informationLecture 10. Diffraction. incident
1 Introdction Lectre 1 Diffraction It is qite often the case that no line-of-sight path exists between a cell phone and a basestation. In other words there are no basestations that the cstomer can see
More informationStatistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem
Statistical Methods in fnctional MRI Lectre 7: Mltiple Comparisons 04/3/13 Martin Lindqist Department of Biostatistics Johns Hopkins University Data Processing Pipeline Standard Analysis Data Acqisition
More informationAAA CENTER FOR DRIVING SAFETY & TECHNOLOGY
AAA CENTER FOR DRIVING SAFETY & TECHNOLOGY 2017 FORD MUSTANG PREMIUM CONVERTIBLE INFOTAINMENT SYSTEM* DEMAND RATING Very High Demand The Ford Mstang Convertible s SYNC 3 (version 2.20) infotainment system
More informationTAKING THE PULSE OF ICT IN HEALTHCARE
ICT TODAY THE OFFICIAL TRADE JOURNAL OF BICSI Janary/Febrary 2016 Volme 37, Nmber 1 TAKING THE PULSE OF ICT IN HEALTHCARE + PLUS + High-Power PoE + Using HDBaseT in AV Design for Schools + Focs on Wireless
More informationPavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003
From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information
More informationAppearance Based Tracking with Background Subtraction
The 8th International Conference on Compter Science & Edcation (ICCSE 213) April 26-28, 213. Colombo, Sri Lanka SD1.4 Appearance Based Tracking with Backgrond Sbtraction Dileepa Joseph Jayamanne Electronic
More informationDiscrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods
Annals of Operations Research 106, 19 46, 2001 2002 Klwer Academic Pblishers. Manfactred in The Netherlands. Discrete Cost Mlticommodity Network Optimization Problems and Exact Soltion Methods MICHEL MINOUX
More informationPOWER-OF-2 BOUNDARIES
Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of
More informationCS 4204 Computer Graphics
CS 424 Compter Graphics Crves and Srfaces Yong Cao Virginia Tech Reference: Ed Angle, Interactive Compter Graphics, University of New Mexico, class notes Crve and Srface Modeling Objectives Introdce types
More informationDate: December 5, 1999 Dist'n: T1E1.4
12/4/99 1 T1E14/99-559 Project: T1E14: VDSL Title: Vectored VDSL (99-559) Contact: J Cioffi, G Ginis, W Y Dept of EE, Stanford U, Stanford, CA 945 Cioffi@stanforded, 1-65-723-215, F: 1-65-724-3652 Date:
More informationThe Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment
This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment
More informationPROGRAM LICENSE AGREEMENT LIMITED WARRANTY... 4 Trademarks Contents Preface... 11
. Contents PROGRAM LICENSE AGREEMENT... LIMITED WARRANTY... 4 Trademarks... 6. Contents... 8 Preface... 2. Overview... 3 2. Jst one other important thing... 3 2.2 Abot the ser manal... 4 2.3 Manal System
More informationSZ-1.4: Significantly Improving Lossy Compression for Scientific Data Sets Based on Multidimensional Prediction and Error- Controlled Quantization
SZ-1.4: Significantly Improving Lossy Compression for Scientific Data Sets Based on Mltidimensional Prediction and Error- Controlled Qantization Dingwen Tao (University of California, Riverside) Sheng
More informationFast Obstacle Detection using Flow/Depth Constraint
Fast Obstacle etection sing Flow/epth Constraint S. Heinrich aimlerchrylser AG P.O.Box 2360, -89013 Ulm, Germany Stefan.Heinrich@aimlerChrysler.com Abstract The early recognition of potentially harmfl
More informationComputer User s Guide 4.0
Compter User s Gide 4.0 2001 Glenn A. Miller, All rights reserved 2 The SASSI Compter User s Gide 4.0 Table of Contents Chapter 1 Introdction...3 Chapter 2 Installation and Start Up...5 System Reqirements
More informationHistory Slicing: Assisting Code-Evolution Tasks
History Slicing: Assisting Code-Evoltion Tasks Francisco Servant Department of Informatics University of California, Irvine Irvine, CA, U.S.A. 92697-3440 fservant@ics.ci.ed James A. Jones Department of
More informationA GENERIC MODEL OF A BASE-ISOLATED BUILDING
Chapter 5 A GENERIC MODEL OF A BASE-ISOLATED BUILDING This chapter draws together the work o Chapters 3 and 4 and describes the assembly o a generic model o a base-isolated bilding. The irst section describes
More informationNormalized averaging using adaptive applicability functions with application in image reconstruction from sparsely and randomly sampled data
Normalized averaging sing adaptive applicability fnctions with application in image reconstrction from sparsely and randomly sampled data Tan Q. Pham, Lcas J. van Vliet Pattern Recognition Grop, Faclty
More information(2, 4) Tree Example (2, 4) Tree: Insertion
Presentation for se with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 B-Trees and External Memory (2, 4) Trees Each internal node has 2 to 4 children:
More informationEfficient Mining of Partial Periodic Patterns in Time Series Database
Wright tate University CORE cholar Kno.e.sis Pblications The Ohio Center of Excellence in Knowledge- Enabled Compting (Kno.e.sis) 3-1999 Efficient Mining of Partial Periodic Patterns in Time eries Database
More informationCautionary Aspects of Cross Layer Design: Context, Architecture and Interactions
Cationary Aspects of Cross Layer Design: Context, Architectre and Interactions Vikas Kawadia and P. R. Kmar Dept. of Electrical and Compter Engineering, and Coordinated Science Lab University of Illinois,
More informationIMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING
International Jornal of Modern Engineering Research (IJMER) www.imer.com Vol.1, Isse1, pp-134-139 ISSN: 2249-6645 IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING
More informationAn Introduction to GPU Computing. Aaron Coutino MFCF
An Introdction to GPU Compting Aaron Cotino acotino@waterloo.ca MFCF What is a GPU? A GPU (Graphical Processing Unit) is a special type of processor that was designed to render and maniplate textres. They
More informationBlended Deformable Models
Blended Deformable Models (In IEEE Trans. Pattern Analysis and Machine Intelligence, April 996, 8:4, pp. 443-448) Doglas DeCarlo and Dimitri Metaxas Department of Compter & Information Science University
More informationAn Optimization of Granular Network by Evolutionary Methods
An Optimization of Granlar Networ by Evoltionary Methods YUN-HEE HAN, KEUN-CHANG KWAK* Dept. of Control, Instrmentation, and Robot Engineering Chosn University 375 Seos-dong, Dong-g, Gwangj, 50-759 Soth
More informationEMC AppSync. User Guide. Version REV 01
EMC AppSync Version 1.5.0 User Gide 300-999-948 REV 01 Copyright 2012-2013 EMC Corporation. All rights reserved. Pblished in USA. EMC believes the information in this pblication is accrate as of its pblication
More informationThe final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.
The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5
More informationQoS-driven Runtime Adaptation of Service Oriented Architectures
Qo-driven Rntime Adaptation of ervice Oriented Architectres Valeria ardellini 1 Emiliano asalicchio 1 Vincenzo Grassi 1 Francesco Lo Presti 1 Raffaela Mirandola 2 1 Dipartimento di Informatica, istemi
More informationDynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un
Dynamic Maintenance of Majority Information in Constant Time per Update? Gdmnd S. Frandsen and Sven Skym BRICS 1 Department of Compter Science, University of arhs, Ny Mnkegade, DK-8000 arhs C, Denmark
More informationAddressing in Future Internet: Problems, Issues, and Approaches
Addressing in Ftre Internet: Problems, Isses, and Approaches Mltimedia and Mobile commnications Laboratory Seol National University Jaeyong Choi, Chlhyn Park, Hakyng Jng, Taekyong Kwon, Yanghee Choi 19
More informationUnit Testing with VectorCAST and AUTOSAR
Unit Testing with VectorCAST and AUTOSAR Vector TechDay Software Testing with VectorCAST V1.0 2018-11-15 Agenda Introdction Unit Testing Demo Working with AUTOSAR Generated Code Unit Testing AUTOSAR SWCs
More informationPlenoPatch: Patch-based Plenoptic Image Manipulation
1 PlenoPatch: Patch-based Plenoptic Image Maniplation Fang-Le Zhang, Member, IEEE, Je Wang, Senior Member, IEEE, Eli Shechtman, Member, IEEE, Zi-Ye Zho, Jia-Xin Shi, and Shi-Min H, Member, IEEE Abstract
More informationMultiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET
Mltiple-Choice Test Chapter 09.0 Golden Section Search Method Optimization COMPLETE SOLUTION SET. Which o the ollowing statements is incorrect regarding the Eqal Interval Search and Golden Section Search
More informationDr Paolo Guagliardo. Fall 2018
The NULL vale Dr Paolo Gagliardo dbs-lectrer@ed.ac.k Fall 2018 NULL: all-prpose marker to represent incomplete information Main sorce of problems and inconsistencies... this topic cannot be described in
More informationSensor-Based Fast Thermal Evaluation Model For Energy Efficient High-Performance Datacenters
Sensor-ased Fast Thermal valation Model For nergy fficient High-Performance atacenters Qinghi Tang Tridib Mkherjee, Sandeep K. S. Gpta Phil ayton ept. of lectrical ng. ept. of ompter Science and ng. Intel
More informationPlenoPatch: Patch-based Plenoptic Image Manipulation
1 PlenoPatch: Patch-based Plenoptic Image Maniplation Fang-Le Zhang, Member, IEEE, Je Wang, Senior Member, IEEE, Eli Shechtman, Member, IEEE, Zi-Ye Zho, Jia-Xin Shi, and Shi-Min H, Member, IEEE Abstract
More informationIllumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY
Illmina LIMS Software Gide Jne 2017 ILLUMINA PROPRIETARY This docment and its contents are proprietary to Illmina, Inc. and its affiliates ("Illmina"), and are intended solely for the contractal se of
More informationHardware-Accelerated Free-Form Deformation
Hardware-Accelerated Free-Form Deformation Clint Cha and Ulrich Nemann Compter Science Department Integrated Media Systems Center University of Sothern California Abstract Hardware-acceleration for geometric
More informationEUCLIDEAN SKELETONS USING CLOSEST POINTS. Songting Luo. Leonidas J. Guibas. Hong-Kai Zhao. (Communicated by the associate editor name)
Volme X, No. 0X, 200X, X XX Web site: http://www.aimsciences.org EUCLIDEAN SKELETONS USING CLOSEST POINTS Songting Lo Department of Mathematics, University of California, Irvine Irvine, CA 92697-3875,
More informationThe extra single-cycle adders
lticycle Datapath As an added bons, we can eliminate some of the etra hardware from the single-cycle path. We will restrict orselves to sing each fnctional nit once per cycle, jst like before. Bt since
More informationConstrained Routing Between Non-Visible Vertices
Constrained Roting Between Non-Visible Vertices Prosenjit Bose 1, Matias Korman 2, André van Renssen 3,4, and Sander Verdonschot 1 1 School of Compter Science, Carleton University, Ottawa, Canada. jit@scs.carleton.ca,
More information