p-norm MINIMIZATION OVER INTERSECTIONS OF CONVEX SETS İlker Bayram

Size: px
Start display at page:

Download "p-norm MINIMIZATION OVER INTERSECTIONS OF CONVEX SETS İlker Bayram"

Transcription

1 p-norm MINIMIZATION OVER INTERSECTIONS OF CONVEX SETS İlker Bayram Istanbl Technical University, Department of Electronics and Telecommnications Engineering, Istanbl, Trkey ABSTRACT We consider the imization of the l p norm sbject to conve constraints. The problem considered in this paper may be regarded as a relaation of a similar problem that employs the l norm. We derive the dal problem, which is nconstrained and devise an algorithm for the dal problem by adapting the Doglas-Rachford algorithm. We demonstrate the tility of the algorithm on an eperiment and discss its differences with an eisting algorithm. Inde Terms Basis prsit, Doglas-Rachford algorithm, imm norm soltion, Dykstra s algorithm, bridge estimate.. INTRODUCTION Let K, K 2,..., K k be closed, conve sets (with nonempty intersection) in R n. In this paper, we consider the imization problem, p () K K 2... K k for < p <. We derive a dal problem and making se of the dal problem, propose an algorithm to obtain the imizer. Althogh solving () with p cold be of interest per se (see e.g. [8], Sec.6), we consider it as a variation of the basis prsit (BP) problem [3], s.t. A = d. (2) BP is eqivalent to a linear program and can be solved as sch. However, if the observations d are noisy, instead of BP, it is desirable to consider the problem s.t. A d 2 ɛ, (3) where ɛ is related to the noise level. One approach to address this problem is to consider the nconstrained problem ˆ λ = arg A d λ. (4) The athor thanks TÜBİTAK for partially fnding this research. For each λ, if we set ɛ λ = A λ d 2, then λ is the imizer of (3) for ɛ = ɛ λ. Moreover, for fied ɛ, we can find λ ɛ s.t. A λɛ d = ɛ that is, λɛ solves (3). There are methods (see, e.g. [7]) to trace the soltions λ as λ is varied. As a variant of this, [] traces the soltions of the LASSO problem A d 2 s.t. τ (5) for different τ. We also refer to [8] for a relevant interesting approach, which obtains an algorithm for LASSO throgh a stdy of the so-called bridge estimators. In this paper, we replace (i) the l norm with the l p norm, (ii) consider a more general constraint of the form K... K k where K i s are closed conve sets. These changes lead to the following advantages. (i) The soltion of the dal-problem for the l norm does not directly lead to the soltion of the primal problem. Relaing the l norm allows s to link the primal and the dal soltion directly. (ii) Decomposing the constraint set K as K = K... K k, allows s to tilize the projections onto K i s which can be easier to realize than projections onto K. As a final remark, we note that another approach to solving () might be to employ more general parallel proimal algorithms as described in [4, 3]. These algorithms employ projections or proimal mappings that are as easy to realize as the ones in the proposed algorithm. Parallel proimal algorithms are also attractive as they can work with p =. However, they are different from the proposed algorithm in that they do not differentiate between the l p term and the constraint projections in (). We provide a frther discssion on the possible conseqences in Section 4. Otline In Section 2 we derive the dal problem and Proposition. The Doglas-Rachford algorithm is briefly reviewed and adapted to the dal-problem in Section 3. In Section 4 we provide two different applications of the algorithm. Section 5 is the conclsion.

2 Notation Throghot the paper, bold variables, like z, denote vectors in R n. We denote the i th component of a vector z as either z i or z(i). We cation that, terms like z i denote vectors in R n. For a set K, the spport fnction of K, denoted by σ K (), is defined as σ K () = sp z K, z. We refer to [2] for a detailed investigation. 2. THE DUAL PROBLEM In this section, we derive the dal problem and discss how the soltion of the dal problem is related to the soltion of the primal problem for p. Specifically, we show that for /p + /q =, and K K 2... K k p p p (6) z,z 2,...,z k q z + z z k q q + sp, z K + sp 2, z sp k, z k. (7) 2 K 2 k K k are dal to each other. The imizers of the two problems are related as, Proposition. Sppose that < p <. If {z z 2..., z k } imize (7), then for z = z + z z k, sign(z) (z) q/p = sign(z ) z q sign(z2) (z2) q/p :=. (8) sign(zn) (zn) q/p imizes (6). Remark. For p = 2 (and hence q = 2), the primal-dal pair is well known. Indeed, Dykstra s algorithm [5, 0] can be interpreted as a coordinate-descent type algorithm working on the dal problem [9]. Remark 2. For p =, the soltion of the dal gives the signs of the soltion for the primal problem. The dal-problem consists of terms for which the proimal operators are feasible to realize. This in trn makes the Doglas-Rachford algorithm feasible. Or plan is to adapt the Doglas-Rachford algorithm to the dal problem and obtain the imizer of the primal problem by sing Prop.. Derivation of the Dal Problem We start by noting that P = inf K p p p = inf sp z p p p +, z σ K (z) }{{} h(,z) In words, the imization problem () is eqivalent to finding the saddle point of h(, z) (where we take K = i K i ). Now if we define the dal fnction g(z) as, g(z) = inf p p p +, z σ K (z) (9) we also have P = sp z g(z) [2]. If the imm of the lhs of (9) is achieved at, then, it can be shown that, 0 sign( i ) i p + z i for i =, 2,..., n. (0) Here, sign(t) is a set valed mapping defined as if t < 0, sign(t) = [, ] if t = 0, if t > 0. From this, we obtain, () z i sign( i ) i p for i =, 2,..., n. (2) Noting that, p = p/q, this is tre if i = sign(z i ) z i q/p for i =, 2,..., n. (3) Inserting this into the lhs of (9), and noting that q/p = q, we get g(z) = p z q q + sign(z) z q/p, z σ K (z) = p z q q z q q σ K (z) ( ) = q z q q + σ K (z) The dal problem ma z g(z), is therefore eqivalent to, (4) z q z q q + σ K (z). (5) Now if K = K K 2... K k then we have [2], σ K (z) = σ K (z ) σ Kk (z k ) z,...,z k sbject to z + z z k = z. (6) Inserting (6) into (5), the dal problem becomes z q z q q + σ K (z ) σ Kk (z k ) sbject to z + z z k = z, (7) which is eqivalent to (7). We see that if z is the imizer of (7), the relation stated in Prop. now follows from (2). Notice that, nlike the primal problem, the dal problem is nconstrained. This allows s to adapt known schemes to come p with an algorithm that converges to the imizer. In the following, we adapt the Doglas-Rachford algorithm [, 6] to this problem. Actally, sign( i ) i p is the i th entry of the sbgradient [2] of p p.

3 3. ADAPTING THE DOUGLAS-RACHFORD ALGORITHM Given a imization problem of the form, z f(z) + g(z) (8) the Doglas-Rachford algorithm finds the imizer throgh sccessive application of some combination of proimal operators of f and g. For a fnction h, its proimal operator with parameter λ is a mapping that maps a point z to the imizer of a fnctional defined in terms of h. More precisely, it is the operator Jh λ ( ) defined as, J λ h (z) = arg 2λ z h(). (9) In terms of J λ f, J λ g, the proimal operators for f and g, the Doglas-Rachford algorithm for solving (8) is [, 6], Algorithm The Doglas-Rachford Algorithm repeat ( z Jf λ 2 J λ g (z) z ) + ( z Jg λ (z) ) ntil convergence z Jg λ (z) Application of the Doglas-Rachford Algorithm to the Dal Problem For or problem, we define f and g as, f ( ) z, z 2,..., z k = z + z z k q q, q g ( z, z 2,..., z k ) = (20a) sp, z + sp 2, z K 2 K 2 + sp k K k k, z k (20b) Algorithm reqires s to sccessively apply J λ f and J λ g. Let s now derive what these operators correspond to, in or case. Comptation of J λ f To compte J λ f (z, z 2,..., z k ), we need to solve, 2,..., k 2 z z k k λ/q k q q. (2) The point J λ f (z, z 2,..., z k ) is the niqe point (, 2,..., k ) that satisfies, 0 i z i +λ sign ( ) k k q (22) for i =,..., k. 2 Smg these over i, we obtain, 0 z +λ k sign( ) q, (23) where = k and z = z z k. Notice that if we can solve for, then, i = z i λ sign( ) q. (24) Let s therefore look at (23). For the j th entry of, namely j, we need to solve j + (λ k) sign( j ) j q = z j. (25) To simplify notation, consider the problem of finding R sch that + d sign() q = z. (26) for d > 0. We note that sign() = sign(z). Now taking z > 0, again to frther simplify the eqality, we need to solve, for > 0, + d }{{ q = z. (27) } s() s() is a strictly increasing fnction with s(0) = 0 < z, and s(z) > z. Therefore, there is a niqe that satisfies s() = z with (0, z). This can be fond by an iterative algorithm. An algorithm that solves (2) is ths, Algorithm 2 Comptation of Jf λ Inpt : z, z 2,..., z k R n Otpt :, 2,..., k R n that imizes (2) z k i= z i d λ k for j = to n do a 0 b z(j) repeat c (a + b)/2 if c + d c q > z(j) then b c else a c end if ntil a b (j) sign ( z(j) ) (a + b)/2 for i = to k do i z i λ sign() q 2 Notice that, here the argment of the sign fnction is a vector the fnction is applied componentwise.

4 Comptation of J λ g To compte J λ g (z, z 2,..., z k ), we need to solve,..., k 2 z z k k λ σ K ( ) λ σ Kk ( k ). (28) This fnctional is separable with respect to i s. Therefore, we will only stdy the following imization problem. = arg 2 z λ σ K () (29) The following proposition (see [2] for a derivation of a similar reslt) will be sed to obtain a description of the imizer. Proposition 2. Let K be a closed conve set. Then, arg 2 z σ K () = z P K (z) (30) (a) (b) where P K (z) is the projection of z to K (i.e. the closest point in K to z). Using this proposition, and noting that λ σ K () = σ λ K (), we can write = z P λ K (z) (3) Here it is important that the projection operator be easily realizable. Algorithm 3 Comptation of J λ g Inpt : z, z 2,..., z k R n Otpt :, 2,..., k R n that imizes (28) for i = to k do i z i P λ Ki (z i ) Remark 3. The projections in Algorithm 3 can be performed in parallel. Taking this into accont leads to significant redction in rnning times, especially when the nmber of constraint sets is high, as in the Eperiment discssed below. 4. EXPERIMENTS We consider a denoising application where side information is also available. We have at hand the noisy image, namely y shown in Fig. a. We also have -D (Radon) projections of the image along the angles θ = k π/8 for k = 0,..., 7. We denote the linear operator which comptes the -D projection along the angle k π/8 as P k and the given projection data at k π/8 as d k. Or primary variables are the wavelet coefficients of the image (we sed an orthonormal wavelet transform with Dabechies filters that have 3 vanishing moments). (c) Fig.. Denoising with side information. The side information consists of Radon projections along the angles k π/8 for k = 0,..., 7. (a) Noisy image, RMSE = 0.2. Soltion for (b) p = 2, RMSE = , (c) p = 4/3, RMSE = , (d) p = 8/7, RMSE = We denote the synthesis operator corresponding to the wavelet basis as W. We also define the constraint sets as, (d) K i = { : P i W = d i } for i = 0,..., 7 (32) K 8 = { : W y σ} (33) where σ is taken as the standard deviation of the noise. Based on these definitions, we consider the imization problem, K p, where K = K 0... K 8. The reslts are shown in Fig. (b,c) for p = 2, p = 4/3 and p = 8/7. We observe that p leads to an improved reconstrction. Note that the formlation allows s to easily take into accont data Log-Dist. to Primal Soln. 5 0 p = 8/7 p = 4/3 Spingarn s Alg Iterations Fig. 2. Log-distance to the primal limit for the proposed algorithm and Spingarn s algorithm, derived from [3].

5 which cannot be epressed as an affine space. Comparison with Parallel Proimal Algorithms As we noted in the Introdction, there are other algorithms available for the primal problem (). Specifically, let s consider Spingarn s method of partial inverses [3] applied to the problem at hand (see Algorithm 4 below). For another similar algorithm, see [4]. Algorithm 4 Spingarn s Algorithm for () Initialize 0, y i 0 for i = 0,,..., m. repeat t 0 arg z 2 + y0 z z p 0 + y 0 t 0 for i = to m do t i P Ki ( + y i) i + y i t i m+ m i=0 ti for i = to m do y i i m+ m i=0 i ntil convergence Algorithm 4 consists of simple sbsteps like the proposed algorithm. However, this algorithm treats the proimal mapping of the l p norm and the projections onto K i s in the same manner. The pdated information from the sbsteps are merged only at the end of each iteration. On the other hand, the proposed algorithm treats the two parts of the dal problem differently. Once the projections onto K i s are performed, this information is fed into the proimal mapping of q q. In order to compare the performances of the two algorithms we performed the following eperiment on the phantom denoising problem described above. We ran both algorithms for 5000 iterations to obtain the limit in each case. We note that there are two limit points of interest one for the primal, one for the dal problem, related to each other throgh (2). Althogh the proposed algorithm works on the dal, we are interested in the ability of the algorithm to approach the imizer of the primal problem in as few iterations as possible. In order to provide a fair comparison, we normalized distances by setting the norm of the corresponding limit to nity. Fig.2 depicts the log-distance to the primal-limit for the proposed algorithm and Spingarn s algorithm. Since the proposed algorithm works on the dal-problem, we cannot claim that the distance to the primal-limit will be monotone decreasing. Indeed, the algorithm starts very far from the primal limit and the distance to the primal limit does increase in the first few iterations. However, interestingly, in 00 iterations, the distance to the primal-limit for the proposed algorithm is mch lower, compared to Spingarn s method. Considering the parallel natre of Spingarn s method, the scheme presented in this paper allows, in a sense, to trade the parallel strctre for faster convergence (given limited resorces). 5. CONCLUSION We considered a variation of the sparse reconstrction problem. Specifically, we replaced the the l norm with the l p norm for p >, and stdied a fleible formlation that allows mltiple constraints to be placed on the reconstrction. Althogh imm l p norm reconstrctions, for p >, are no longer sparse (in the strict sense of the word), this formlation can also be feasible. For p, the soltion of the primal problem provides an approimation to the imm l reconstrction. We also demonstrated that the proposed algorithm performs comparably with eisting alternatives. 6. REFERENCES [] E. Van Den Berg and M. P. Friedlander. Probing the pareto frontier for basis prsit soltions. SIAM J. Sci. Compt., 3(2):890 92, [2] A. Chambolle. An algorithm for total variation imization and applications. Jornal of Mathematical Imaging and Vision, 20(-2):89 97, Janary-March [3] S. S. Chen, D. L. Donoho, and M. A. Sanders. Atomic decomposition by basis prsit. SIAM J. on Scientific Compting, 20():33 6, 998. [4] P. L. Combettes and J.-C. Pesqet. A proimal decomposition method for solving conve variational inverse problems. Inverse Problems, 24(6), December [5] R. L. Dykstra. An algorithm for restricted least sqares regression. Jornal of the American Statistical Association, 78: , 983. [6] J. Eckstein and D. P. Bertsekas. On the Doglas-Rachford splitting method and the proimal point algorithm for maimal monotone operators. Mathematical Programg, 55(3):293 38, 992. [7] B. Efron, T. Hastie, I. Johnstone, and R. Tibshirani. Least angle regression. Annals of Statistics, 32(2): , [8] W. J. F. Penalized regressions : The bridge verss the lasso. J. Compt. Graph. Statist., 7(3):397 46, 998. [9] N. Gaffke and R. Mathar. A cyclic projection algorithm via dality. Metrika, 36:29 54, 989. [0] S.-P. Han. A sccessive projection method. Mathematical Programg, 40: 4, 988. [] P. L. Lions and B. Mercier. Splitting algorithms for the sm of two nonlinear operators. SIAM J. on Nmer. Anal., 6(6): , 979. [2] R. T. Rockafellar. Conve Analysis. Princeton University Press, 996. [3] J. E. Spingarn. Partial inverse of a monotone operator. Applied Math. and Optimization, 0(): , 983.

Image Denoising Algorithms

Image Denoising Algorithms Image Denoising Algorithms Xiang Hao School of Compting, University of Utah, USA, hao@cs.tah.ed Abstract. This is a report of an assignment of the class Mathematics of Imaging. In this assignment, we first

More information

Seismic trace interpolation with approximate message passing Navid Ghadermarzy and Felix Herrmann and Özgür Yılmaz, University of British Columbia

Seismic trace interpolation with approximate message passing Navid Ghadermarzy and Felix Herrmann and Özgür Yılmaz, University of British Columbia Seismic trace interpolation with approximate message passing Navid Ghadermarzy and Felix Herrmann and Özgür Yılmaz, University of British Colmbia SUMMARY Approximate message passing (AMP) is a comptationally

More information

COMPOSITION OF STABLE SET POLYHEDRA

COMPOSITION OF STABLE SET POLYHEDRA COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining

More information

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity

More information

h-vectors of PS ear-decomposable graphs

h-vectors of PS ear-decomposable graphs h-vectors of PS ear-decomposable graphs Nima Imani 2, Lee Johnson 1, Mckenzie Keeling-Garcia 1, Steven Klee 1 and Casey Pinckney 1 1 Seattle University Department of Mathematics, 901 12th Avene, Seattle,

More information

Tu P7 15 First-arrival Traveltime Tomography with Modified Total Variation Regularization

Tu P7 15 First-arrival Traveltime Tomography with Modified Total Variation Regularization T P7 15 First-arrival Traveltime Tomography with Modified Total Variation Reglarization W. Jiang* (University of Science and Technology of China) & J. Zhang (University of Science and Technology of China)

More information

Evaluating Influence Diagrams

Evaluating Influence Diagrams Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will

More information

New Architectures for Hierarchical Predictive Control

New Architectures for Hierarchical Predictive Control Preprint, 11th IFAC Symposim on Dynamics and Control of Process Systems, inclding Biosystems Jne 6-8, 216. NTNU, Trondheim, Norway New Architectres for Hierarchical Predictive Control Victor M. Zavala

More information

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003 From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information

More information

A sufficient condition for spiral cone beam long object imaging via backprojection

A sufficient condition for spiral cone beam long object imaging via backprojection A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral

More information

FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES

FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES RICARDO G. DURÁN AND ARIEL L. LOMBARDI Abstract. We consider the nmerical approximation of a model convection-diffsion

More information

Multiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET

Multiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET Mltiple-Choice Test Chapter 09.0 Golden Section Search Method Optimization COMPLETE SOLUTION SET. Which o the ollowing statements is incorrect regarding the Eqal Interval Search and Golden Section Search

More information

Optimal Sampling in Compressed Sensing

Optimal Sampling in Compressed Sensing Optimal Sampling in Compressed Sensing Joyita Dtta Introdction Compressed sensing allows s to recover objects reasonably well from highly ndersampled data, in spite of violating the Nyqist criterion. In

More information

An Optimization of Granular Network by Evolutionary Methods

An Optimization of Granular Network by Evolutionary Methods An Optimization of Granlar Networ by Evoltionary Methods YUN-HEE HAN, KEUN-CHANG KWAK* Dept. of Control, Instrmentation, and Robot Engineering Chosn University 375 Seos-dong, Dong-g, Gwangj, 50-759 Soth

More information

Convex optimization algorithms for sparse and low-rank representations

Convex optimization algorithms for sparse and low-rank representations Convex optimization algorithms for sparse and low-rank representations Lieven Vandenberghe, Hsiao-Han Chao (UCLA) ECC 2013 Tutorial Session Sparse and low-rank representation methods in control, estimation,

More information

Minimal Edge Addition for Network Controllability

Minimal Edge Addition for Network Controllability This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,

More information

Towards Understanding Bilevel Multi-objective Optimization with Deterministic Lower Level Decisions

Towards Understanding Bilevel Multi-objective Optimization with Deterministic Lower Level Decisions Towards Understanding Bilevel Mlti-objective Optimization with Deterministic Lower Level Decisions Ankr Sinha Ankr.Sinha@aalto.fi Department of Information and Service Economy, Aalto University School

More information

Augmented Lagrangian Methods

Augmented Lagrangian Methods Augmented Lagrangian Methods Stephen J. Wright 1 2 Computer Sciences Department, University of Wisconsin-Madison. IMA, August 2016 Stephen Wright (UW-Madison) Augmented Lagrangian IMA, August 2016 1 /

More information

The Alternating Direction Method of Multipliers

The Alternating Direction Method of Multipliers The Alternating Direction Method of Multipliers With Adaptive Step Size Selection Peter Sutor, Jr. Project Advisor: Professor Tom Goldstein October 8, 2015 1 / 30 Introduction Presentation Outline 1 Convex

More information

IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION

IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION ICAS 2 CONGRESS IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION Christophe Le Garrec, Marc Hmbert, Michel Lacabanne Aérospatiale Matra

More information

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code:

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code: EE8 Winter 25 Homework #2 Soltions De Thrsday, Feb 2, 5 P. ( points) Consider the following fragment of Java code: for (i=; i

More information

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment

More information

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read. The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5

More information

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods Annals of Operations Research 106, 19 46, 2001 2002 Klwer Academic Pblishers. Manfactred in The Netherlands. Discrete Cost Mlticommodity Network Optimization Problems and Exact Soltion Methods MICHEL MINOUX

More information

Resolving Linkage Anomalies in Extracted Software System Models

Resolving Linkage Anomalies in Extracted Software System Models Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program

More information

Date: December 5, 1999 Dist'n: T1E1.4

Date: December 5, 1999 Dist'n: T1E1.4 12/4/99 1 T1E14/99-559 Project: T1E14: VDSL Title: Vectored VDSL (99-559) Contact: J Cioffi, G Ginis, W Y Dept of EE, Stanford U, Stanford, CA 945 Cioffi@stanforded, 1-65-723-215, F: 1-65-724-3652 Date:

More information

An R Package flare for High Dimensional Linear Regression and Precision Matrix Estimation

An R Package flare for High Dimensional Linear Regression and Precision Matrix Estimation An R Package flare for High Dimensional Linear Regression and Precision Matrix Estimation Xingguo Li Tuo Zhao Xiaoming Yuan Han Liu Abstract This paper describes an R package named flare, which implements

More information

This chapter is based on the following sources, which are all recommended reading:

This chapter is based on the following sources, which are all recommended reading: Bioinformatics I, WS 09-10, D. Hson, December 7, 2009 105 6 Fast String Matching This chapter is based on the following sorces, which are all recommended reading: 1. An earlier version of this chapter

More information

Today s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of

Today s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of Today s Lectre Lectre 27: Introdction to Software Architectre Kenneth M. Anderson Fondations of Software Engineering CSCI 5828 - Spring Semester, 1999 Introdction and Backgrond of Software Architectre

More information

Convex or non-convex: which is better?

Convex or non-convex: which is better? Sparsity Amplified Ivan Selesnick Electrical and Computer Engineering Tandon School of Engineering New York University Brooklyn, New York March 7 / 4 Convex or non-convex: which is better? (for sparse-regularized

More information

SZ-1.4: Significantly Improving Lossy Compression for Scientific Data Sets Based on Multidimensional Prediction and Error- Controlled Quantization

SZ-1.4: Significantly Improving Lossy Compression for Scientific Data Sets Based on Multidimensional Prediction and Error- Controlled Quantization SZ-1.4: Significantly Improving Lossy Compression for Scientific Data Sets Based on Mltidimensional Prediction and Error- Controlled Qantization Dingwen Tao (University of California, Riverside) Sheng

More information

THE Unit Commitment problem (UCP) is the problem of

THE Unit Commitment problem (UCP) is the problem of IEEE TRANS IN POWER SYSTEMS 1 A new MILP-based approach for Unit Commitment in power prodction planning. Ana Viana and João Pedro Pedroso Abstract This paper presents a novel, iterative optimisation algorithm

More information

The single-cycle design from last time

The single-cycle design from last time lticycle path Last time we saw a single-cycle path and control nit for or simple IPS-based instrction set. A mlticycle processor fies some shortcomings in the single-cycle CPU. Faster instrctions are not

More information

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz

More information

Fast Ray Tetrahedron Intersection using Plücker Coordinates

Fast Ray Tetrahedron Intersection using Plücker Coordinates Fast Ray Tetrahedron Intersection sing Plücker Coordinates Nikos Platis and Theoharis Theoharis Department of Informatics & Telecommnications University of Athens Panepistemiopolis, GR 157 84 Ilissia,

More information

StaCo: Stackelberg-based Coverage Approach in Robotic Swarms

StaCo: Stackelberg-based Coverage Approach in Robotic Swarms Maastricht University Department of Knowledge Engineering Technical Report No.:... : Stackelberg-based Coverage Approach in Robotic Swarms Kateřina Staňková, Bijan Ranjbar-Sahraei, Gerhard Weiss, Karl

More information

Energy-Efficient Mobile-Edge Computation Offloading for Applications with Shared Data

Energy-Efficient Mobile-Edge Computation Offloading for Applications with Shared Data Energy-Efficient Mobile-Edge Comptation Offloading for Applications with Shared Data Xiangy He, Hong Xing, Ye Chen, Armgam Nallanathan School of Electronic Engineering and Compter Science Qeen Mary University

More information

Topological Drawings of Complete Bipartite Graphs

Topological Drawings of Complete Bipartite Graphs Topological Drawings of Complete Bipartite Graphs Jean Cardinal Stefan Felsner y Febrary 017 Abstract Topological drawings are natral representations of graphs in the plane, where vertices are represented

More information

CS 4204 Computer Graphics

CS 4204 Computer Graphics CS 424 Compter Graphics Crves and Srfaces Yong Cao Virginia Tech Reference: Ed Angle, Interactive Compter Graphics, University of New Mexico, class notes Crve and Srface Modeling Objectives Introdce types

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY 2007 1 On the Analysis of the Bletooth Time Division Dplex Mechanism Gil Zssman Member, IEEE, Adrian Segall Fellow, IEEE, and Uri Yechiali

More information

Deconvolution with curvelet-domain sparsity Vishal Kumar, EOS-UBC and Felix J. Herrmann, EOS-UBC

Deconvolution with curvelet-domain sparsity Vishal Kumar, EOS-UBC and Felix J. Herrmann, EOS-UBC Deconvolution with curvelet-domain sparsity Vishal Kumar, EOS-UBC and Felix J. Herrmann, EOS-UBC SUMMARY We use the recently introduced multiscale and multidirectional curvelet transform to exploit the

More information

Image Compression Compression Fundamentals

Image Compression Compression Fundamentals Compression Fndamentals Data compression refers to the process of redcing the amont of data reqired to represent given qantity of information. Note that data and information are not the same. Data refers

More information

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,

More information

Augmented Lagrangian Methods

Augmented Lagrangian Methods Augmented Lagrangian Methods Mário A. T. Figueiredo 1 and Stephen J. Wright 2 1 Instituto de Telecomunicações, Instituto Superior Técnico, Lisboa, Portugal 2 Computer Sciences Department, University of

More information

HYPERSPECTRAL IMAGE RESTORATION BY HYBRID SPATIO-SPECTRAL TOTAL VARIATION. Tokyo Institute of Technology

HYPERSPECTRAL IMAGE RESTORATION BY HYBRID SPATIO-SPECTRAL TOTAL VARIATION. Tokyo Institute of Technology HYPERSPECTRAL IMAGE RESTORATION BY HYBRID SPATIO-SPECTRAL TOTAL VARIATION Saori Takeyama, Shnske Ono, and Itso Kmazawa Tokyo Institte of Technology ABSTRACT We propose a new reglarization techniqe, named

More information

EUCLIDEAN SKELETONS USING CLOSEST POINTS. Songting Luo. Leonidas J. Guibas. Hong-Kai Zhao. (Communicated by the associate editor name)

EUCLIDEAN SKELETONS USING CLOSEST POINTS. Songting Luo. Leonidas J. Guibas. Hong-Kai Zhao. (Communicated by the associate editor name) Volme X, No. 0X, 200X, X XX Web site: http://www.aimsciences.org EUCLIDEAN SKELETONS USING CLOSEST POINTS Songting Lo Department of Mathematics, University of California, Irvine Irvine, CA 92697-3875,

More information

Adaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model

Adaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model International Jornal of Knowledge Engineering, Vol. 1, No. 2, September 215 Adaptie Inflence Maximization in Microblog nder the Competitie Independent Cascade Model Zheng Ding, Kai Ni, and Zhiqiang He

More information

DIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES

DIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES DIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES Binh-Son Ha 1 Imari Sato 2 Kok-Lim Low 1 1 National University of Singapore 2 National Institte of Informatics, Tokyo, Japan ABSTRACT Dal

More information

Video Denoising using Transform Domain Method

Video Denoising using Transform Domain Method Video Denoising sing Transform Domain Method Lina Desale 1, Prof. S. B. Borse 1 E&TC Dept, LGNSCOE, Nashik E&TC Dept, LGNSCOE, Nashik Abstract Utmost prevailing practical digital video denoising techniqes

More information

A Frequency-optimized Discontinuous Formulation for Wave Propagation Problems

A Frequency-optimized Discontinuous Formulation for Wave Propagation Problems th Flid Dynamics Conference and Ehibit 8 Jne - Jly, Chicago, Illinois AIAA -55 A Freqency-optimized Discontinos Formlation for Wave Propagation Problems Yi Li and Z. J. Wang Department of Aerospace Engineering

More information

Topic Continuity for Web Document Categorization and Ranking

Topic Continuity for Web Document Categorization and Ranking Topic Continity for Web ocment Categorization and Ranking B. L. Narayan, C. A. Mrthy and Sankar. Pal Machine Intelligence Unit, Indian Statistical Institte, 03, B. T. Road, olkata - 70008, India. E-mail:

More information

A choice relation framework for supporting category-partition test case generation

A choice relation framework for supporting category-partition test case generation Title A choice relation framework for spporting category-partition test case generation Athor(s) Chen, TY; Poon, PL; Tse, TH Citation Ieee Transactions On Software Engineering, 2003, v. 29 n. 7, p. 577-593

More information

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un Dynamic Maintenance of Majority Information in Constant Time per Update? Gdmnd S. Frandsen and Sven Skym BRICS 1 Department of Compter Science, University of arhs, Ny Mnkegade, DK-8000 arhs C, Denmark

More information

STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWORK DYNAMICS FOR STATIC OPTIMIZATION

STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWORK DYNAMICS FOR STATIC OPTIMIZATION STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWOR DYNAMICS FOR STATIC OPTIMIZATION Grsel Serpen and Yifeng X Electrical Engineering and Compter Science Department, The University of Toledo, Toledo, OH

More information

4.13 Advanced Topic: An Introduction to Digital Design Using a Hardware Design Language 345.e1

4.13 Advanced Topic: An Introduction to Digital Design Using a Hardware Design Language 345.e1 .3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage 35.e.3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage to Describe and odel a Pipeline

More information

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation Maximal Cliqes in Unit Disk Graphs: Polynomial Approximation Rajarshi Gpta, Jean Walrand, Oliier Goldschmidt 2 Department of Electrical Engineering and Compter Science Uniersity of California, Berkeley,

More information

Fault Tolerance in Hypercubes

Fault Tolerance in Hypercubes Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different

More information

Application of Gaussian Curvature Method in Development of Hull Plate Surface

Application of Gaussian Curvature Method in Development of Hull Plate Surface Marine Engineering Frontiers (MEF) Volme 2, 204 Application of Gassian Crvatre Method in Development of Hll Plate Srface Xili Zh, Yjn Li 2 Dept. of Infor., Dalian Univ., Dalian 6622, China 2 Dept. of Naval

More information

Tdb: A Source-level Debugger for Dynamically Translated Programs

Tdb: A Source-level Debugger for Dynamically Translated Programs Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,

More information

SATELLITE IMAGE RECONSTRUCTION FROM AN IRREGULAR SAMPLING

SATELLITE IMAGE RECONSTRUCTION FROM AN IRREGULAR SAMPLING SATELLITE IMAGE RECONSTRUCTION FROM AN IRREGULAR SAMPLING Eric Bghin, Lare Blanc-Férad, Josiane Zerbia To cite this version: Eric Bghin, Lare Blanc-Férad, Josiane Zerbia. SATELLITE IMAGE RECONSTRUC- TION

More information

Networks An introduction to microcomputer networking concepts

Networks An introduction to microcomputer networking concepts Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES

More information

POWER-OF-2 BOUNDARIES

POWER-OF-2 BOUNDARIES Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of

More information

Secure Biometric-Based Authentication for Cloud Computing

Secure Biometric-Based Authentication for Cloud Computing Secre Biometric-Based Athentication for Clod Compting Kok-Seng Wong * and Myng Ho Kim School of Compter Science and Engineering, Soongsil University, Sangdo-Dong Dongjak-G, 156-743 Seol Korea {kswong,kmh}@ss.ac.kr

More information

Statistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem

Statistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem Statistical Methods in fnctional MRI Lectre 7: Mltiple Comparisons 04/3/13 Martin Lindqist Department of Biostatistics Johns Hopkins University Data Processing Pipeline Standard Analysis Data Acqisition

More information

Picking and Curves Week 6

Picking and Curves Week 6 CS 48/68 INTERACTIVE COMPUTER GRAPHICS Picking and Crves Week 6 David Breen Department of Compter Science Drexel University Based on material from Ed Angel, University of New Mexico Objectives Picking

More information

Blended Deformable Models

Blended Deformable Models Blended Deformable Models (In IEEE Trans. Pattern Analysis and Machine Intelligence, April 996, 8:4, pp. 443-448) Doglas DeCarlo and Dimitri Metaxas Department of Compter & Information Science University

More information

Method to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot

Method to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot Method to bild an initial adaptive Nero-Fzzy controller for joints control of a legged robot J-C Habmremyi, P. ool and Y. Badoin Royal Military Academy-Free University of Brssels 08 Hobbema str, box:mrm,

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introdction (forarding and roting) Reie of qeeing theor Roting algorithms Link state, Distance Vector Roter design and operation IP: Internet Protocol IP4 (datagram format, addressing, ICMP,

More information

Chapter 5 Network Layer

Chapter 5 Network Layer Chapter Network Layer Network layer Physical layer: moe bit seqence between two adjacent nodes Data link: reliable transmission between two adjacent nodes Network: gides packets from the sorce to destination,

More information

v e v 1 C 2 b) Completely assigned T v a) Partially assigned Tv e T v 2 p k

v e v 1 C 2 b) Completely assigned T v a) Partially assigned Tv e T v 2 p k Approximation Algorithms for a Capacitated Network Design Problem R. Hassin 1? and R. Rai 2?? and F. S. Salman 3??? 1 Department of Statistics and Operations Research, Tel-Ai Uniersity, Tel Ai 69978, Israel.

More information

CS 557 Lecture IX. Drexel University Dept. of Computer Science

CS 557 Lecture IX. Drexel University Dept. of Computer Science CS 7 Lectre IX Dreel Uniersity Dept. of Compter Science Fall 00 Shortest Paths Finding the Shortest Paths in a graph arises in many different application: Transportation Problems: Finding the cheapest

More information

The extra single-cycle adders

The extra single-cycle adders lticycle Datapath As an added bons, we can eliminate some of the etra hardware from the single-cycle path. We will restrict orselves to sing each fnctional nit once per cycle, jst like before. Bt since

More information

Preserving Privacy of Continuous High-dimensional Data with Minimax Filters

Preserving Privacy of Continuous High-dimensional Data with Minimax Filters Preserving Privacy of Continos High-dimensional Data ith Filters Jihn Hamm Department of Compter Science and Engineering, The Ohio State University, OH 43210, USA Abstract Preserving privacy of high-dimensional

More information

Sparsity and image processing

Sparsity and image processing Sparsity and image processing Aurélie Boisbunon INRIA-SAM, AYIN March 6, Why sparsity? Main advantages Dimensionality reduction Fast computation Better interpretability Image processing pattern recognition

More information

Improving Network Connectivity Using Trusted Nodes and Edges

Improving Network Connectivity Using Trusted Nodes and Edges Improing Network Connectiity Using Trsted Nodes and Edges Waseem Abbas, Aron Laszka, Yegeniy Vorobeychik, and Xenofon Kotsokos Abstract Network connectiity is a primary attribte and a characteristic phenomenon

More information

Real-time mean-shift based tracker for thermal vision systems

Real-time mean-shift based tracker for thermal vision systems 9 th International Conference on Qantitative InfraRed Thermography Jly -5, 008, Krakow - Poland Real-time mean-shift based tracker for thermal vision systems G. Bieszczad* T. Sosnowski** * Military University

More information

PART I: Adding Instructions to the Datapath. (2 nd Edition):

PART I: Adding Instructions to the Datapath. (2 nd Edition): EE57 Instrctor: G. Pvvada ===================================================================== Homework #5b De: check on the blackboard =====================================================================

More information

Solving Optimization Problems That Employ Structural Similarity As The Fidelity Measure

Solving Optimization Problems That Employ Structural Similarity As The Fidelity Measure Solving Optimization Problems That Employ Structural Similarity As The Fidelity Measure Daniel Otero and Edward R. Vrscay Department of Applied Mathematics, University of Waterloo, Waterloo, Ontario, Canada

More information

Discretized Approximations for POMDP with Average Cost

Discretized Approximations for POMDP with Average Cost Discretized Approximations for POMDP with Average Cost Hizhen Y Lab for Information and Decisions EECS Dept., MIT Cambridge, MA 0239 Dimitri P. Bertsekas Lab for Information and Decisions EECS Dept., MIT

More information

Constrained Routing Between Non-Visible Vertices

Constrained Routing Between Non-Visible Vertices Constrained Roting Between Non-Visible Vertices Prosenjit Bose 1, Matias Korman 2, André van Renssen 3,4, and Sander Verdonschot 1 1 School of Compter Science, Carleton University, Ottawa, Canada. jit@scs.carleton.ca,

More information

Review Multicycle: What is Happening. Controlling The Multicycle Design

Review Multicycle: What is Happening. Controlling The Multicycle Design Review lticycle: What is Happening Reslt Zero Op SrcA SrcB Registers Reg Address emory em Data Sign etend Shift left Sorce A B Ot [-6] [5-] [-6] [5-] [5-] Instrction emory IR RegDst emtoreg IorD em em

More information

Xiang Li. Temple University. September 6, 2016

Xiang Li. Temple University. September 6, 2016 Introdction to Matlab Xiang Li Temple University September 6, 2016 Otline Matlab Introdction Get yor own copy of Matlab Data Types Matrices Operators MAT-LAB Introdction Matlab is a programming langage

More information

Advance Fuzzy Programming Approach to Bi-Level Quadratic Fractional Programming Problems by Genetic Algorithm

Advance Fuzzy Programming Approach to Bi-Level Quadratic Fractional Programming Problems by Genetic Algorithm American International Jornal of Research in Science, Technology, Engineering & Mathematics Available online at http://www.iasir.net ISSN (Print): 38-349, ISSN (Online): 38-3580, ISSN (CD-ROM): 38-369

More information

Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN:

Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: 1137-3601 revista@aepia.org Asociación Española para la Inteligencia Artificial España Zaballos, Lis J.; Henning, Gabriela

More information

Nonmonotonic and Paraconsistent Reasoning: From Basic Entailments to Plausible Relations. Ofer Arieli and Arnon Avron

Nonmonotonic and Paraconsistent Reasoning: From Basic Entailments to Plausible Relations. Ofer Arieli and Arnon Avron Nonmonotonic and Paraconsistent Reasoning: From Basic Entailments to Plasible Relations Ofer Arieli and Arnon Avron Department of Compter Science, School of Mathematical Sciences, Tel-Aviv University,

More information

Tutte Embeddings of Planar Graphs

Tutte Embeddings of Planar Graphs Spectral Graph Theory and its Applications Lectre 21 Ttte Embeddings o Planar Graphs Lectrer: Daniel A. Spielman November 30, 2004 21.1 Ttte s Theorem We sally think o graphs as being speciied by vertices

More information

A PRIMAL-DUAL FRAMEWORK FOR MIXTURES OF REGULARIZERS. LIONS - EPFL Lausanne - Switzerland

A PRIMAL-DUAL FRAMEWORK FOR MIXTURES OF REGULARIZERS. LIONS - EPFL Lausanne - Switzerland A PRIMAL-DUAL FRAMEWORK FOR MIXTURES OF REGULARIZERS Baran Gözcü, Luca Baldassarre, Quoc Tran-Dinh, Cosimo Aprile and Volkan Cevher LIONS - EPFL Lausanne - Switzerland ABSTRACT Effectively solving many

More information

5.0 Curve and Surface Theory

5.0 Curve and Surface Theory 5. Cre and Srface Theor 5.1 arametric Representation of Cres Consider the parametric representation of a cre as a ector t: t [t t t] 5.1 The deriatie of sch a ector ealated at t t is gien b t [ t t t ]

More information

CMSC 828D: Fundamentals of Computer Vision Homework 7

CMSC 828D: Fundamentals of Computer Vision Homework 7 CMSC 828D: Homework 7 Instrctors: Larr Dais, Ramani Draiswami, Daniel DeMenthon, and Yiannis Aloimonos Soltion based on homework sbmitted b Haiing Li 1. Write a Matlab fnction that otpts the homogeneos

More information

A Computational Model for Inference Chains in Expert Systems

A Computational Model for Inference Chains in Expert Systems A Comptational Moel for Inference Chains in Expert Systems József Sziray Department of Informatics Széchenyi University Egyetem tér, H-926 Győr Hngary sziray@sze.h Abstract: This paper eals with the calclations

More information

Submodule construction for systems of I/O automata*

Submodule construction for systems of I/O automata* Sbmodle constrction for systems of I/O atomata* J. Drissi 1, G. v. Bochmann 2 1 Dept. d'iro, Université de Montréal, CP. 6128, Scc. Centre-Ville, Montréal, H3C 3J7, Canada, Phone: (514) 343-6161, Fax:

More information

Normalized averaging using adaptive applicability functions with application in image reconstruction from sparsely and randomly sampled data

Normalized averaging using adaptive applicability functions with application in image reconstruction from sparsely and randomly sampled data Normalized averaging sing adaptive applicability fnctions with application in image reconstrction from sparsely and randomly sampled data Tan Q. Pham, Lcas J. van Vliet Pattern Recognition Grop, Faclty

More information

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT PAAMETE OPTIMIZATION FO TAKAGI-SUGENO FUZZY MODELS LESSONS LEANT Manfred Männle Inst. for Compter Design and Falt Tolerance Univ. of Karlsrhe, 768 Karlsrhe, Germany maennle@compter.org Brokat Technologies

More information

Optimization for Machine Learning

Optimization for Machine Learning Optimization for Machine Learning (Problems; Algorithms - C) SUVRIT SRA Massachusetts Institute of Technology PKU Summer School on Data Science (July 2017) Course materials http://suvrit.de/teaching.html

More information

The effectiveness of PIES comparing to FEM and BEM for 3D elasticity problems

The effectiveness of PIES comparing to FEM and BEM for 3D elasticity problems The effectiveness of PIES comparing to FEM and BEM for 3D elasticit problems A. Boltc, E. Zienik, K. Sersen Faclt of Mathematics and Compter Science, Universit of Bialstok, Sosnowa 64, 15-887 Bialstok,

More information

METAMODEL FOR SOFTWARE SOLUTIONS IN COMPUTED TOMOGRAPHY

METAMODEL FOR SOFTWARE SOLUTIONS IN COMPUTED TOMOGRAPHY VOL. 10, NO 22, DECEBER, 2015 ISSN 1819-6608 ETAODEL FOR SOFTWARE SOLUTIONS IN COPUTED TOOGRAPHY Vitaliy ezhyev Faclty of Compter Systems and Software Engineering, Universiti alaysia Pahang, Gambang, alaysia

More information

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,

More information

ACCELERATED DUAL GRADIENT-BASED METHODS FOR TOTAL VARIATION IMAGE DENOISING/DEBLURRING PROBLEMS. Donghwan Kim and Jeffrey A.

ACCELERATED DUAL GRADIENT-BASED METHODS FOR TOTAL VARIATION IMAGE DENOISING/DEBLURRING PROBLEMS. Donghwan Kim and Jeffrey A. ACCELERATED DUAL GRADIENT-BASED METHODS FOR TOTAL VARIATION IMAGE DENOISING/DEBLURRING PROBLEMS Donghwan Kim and Jeffrey A. Fessler University of Michigan Dept. of Electrical Engineering and Computer Science

More information

p 1 p 2 p 3 S u( ) θ

p 1 p 2 p 3 S u( ) θ Preprint of a paper pblished in inimal Srfaces, Geometric Analysis and Symplectic Geometry Adv. Std. Pre ath, 34 (2002) 129 142. SOLUTION TO THE SHADOW PROBLE IN 3-SPACE OHAAD GHOI Abstract. If a convex

More information

Chapter 6: Pipelining

Chapter 6: Pipelining CSE 322 COPUTER ARCHITECTURE II Chapter 6: Pipelining Chapter 6: Pipelining Febrary 10, 2000 1 Clothes Washing CSE 322 COPUTER ARCHITECTURE II The Assembly Line Accmlate dirty clothes in hamper Place in

More information