MATRIX ALGORITHM OF SOLVING GRAPH CUTTING PROBLEM

Size: px
Start display at page:

Download "MATRIX ALGORITHM OF SOLVING GRAPH CUTTING PROBLEM"

Transcription

1 UDC MATRIX ALGORITHM OF SOLVING GRAPH CUTTING PROBLEM V.K. Pogrebnoy TPU Institute «Cybernetic centre» Matrix algorithm o solving graph cutting problem has been suggested. The main algorithm points based on matrix graph presentation were considered. Formalization o the main algorithm procedures deining estimations or selecting relocatable matrix elements and matrix conversion by reciprocal transer o columns and lines was given. Algorithm operation was considered by the example o data transmission graph between the stations o local computer system network. Introduction The problem o graph cutting into minimally connected parts may be reerred to a number o classical problems o graph theory widely used in practical applications. Among the earliest and the most developed applications is the problem o cutting computer circuit given as a graph [1] or in the orm o more adequate model hypergraph [2]. For an ordinary graph [3] the problem o cutting is stated in the ollowing way. Graph G=(S,V) should be cut into parts G =(S,V ), =1,2,...,F, where F is the number o parts into which the graph is cut; S is the vertex set belonging to part; V is the set o arcs incident to vertices S. The set o parts B(G ) is called cutting o graph G, i G B( G )[ G & G = G]; G, Gq B( G )[ G Gq & S Sq = = & V V = V ],, q = 1,2,..., F. q q Here V q is the set o arcs connecting pairs o vertices one o which belongs to the part G, and another one G q. Let us denote V q =g q and call it by a number o arc attachment o parts G and G q. Then a number o arc attachment o cutting graph G is determined by g: F F g = g, q. = 1 q= 1 Traditional criterion o solving the problem o cutting graph G is minimization o a number o arc attachment g at restriction per vertex quantity in parts G. Among the known algorithms o graph cutting there are exact algorithms using techniques o solving the problems o discrete programming and the approximate ones. The approximate algorithms became more widespread. Among them the sequential, iteration and compound algorithms are singled out. In approximate algorithms o sequential type irstly, the graph vertex is selected by a certain criterion then other vertices are attached to it till the irst part obtaining. Then the second part and next parts are ormed rom the rest graph vertices till complete cutting. Iteration algorithms take a certain cutting obtained, or example, by one o sequential algorithms as the original one and then vertices are exchanged rom one part to another in serially connected pairs o parts so that perormance criterion quality is improved. q The analysis o the given algorithm results in the ollowing conclusions: presence o a large variety o algorithms which is generated by a tendency to take into account the speciic character o the investigated objects and graphs used or their description; algorithm alignment on operation directly with a list o vertices, arcs and their attributes; perorming operations o optimization o arc attachment between two parts o graph is o local character and «does not see» what happens to arc attachment between other parts o cutting. The irst two conclusions relect both positive and negative properties o algorithms. So, accounting speciic character results in algorithm uniqueness but allows increasing their eiciency. Using lists is preerable or graphs with a large number o vertices and small number o arcs. As or the third conclusion it relects the disadvantage o such algorithm which is diicult to be surmounted. It is when optimization is ulilled by local enhancements o arc attachments inside an ordinary pair o cutting parts. The cutting algorithm proposed in the given paper is based on graph representation by vertex connection matrix and more complete analysis o estimating eiciency o vertex assignment into subgraphs o cutting. The undamentals o matrix algorithm The cutting problem solution is considered or an ordinary weighted graph G=(S,V,R) represented by the matrix R= r ij, where r ij is the weight o the arc v ij V, i,j=1,2,...,n. Such graph is, or example, a data transer graph [4] between vertices s i S, which correspond in this case to the stations o local area network and weights r ij are the volumes o data transerred between stations s i and s j in network. Matrix R is symmetrical as the weight r ij includes the volume o data which transerred rom station s i to s j and rom s j to s i. Constructing local network o computer system on the basis o several backbones the problem o station distribution on backbones so that the volume o data transerred between stations connected to dierent backbones is minimal occurs. Such problem its to the problem o graph cutting into minimal subgraphs. Vertices included into one subgraph correspond to the stations connected to on backbone. 84

2 Control, computer engineering and inormation science The result o solving cutting problem may be presented by the matrix R divided into blocks as it is shown in Fig. 1. Each block is a connection matrix o subgraph G vertices. Elements o matrix R being outside the blocks determine a number o arc attachment o cutting graph G and orm a section area. Matrix shown in Fig. 1 relative to matrix R may be considered as a matrix pattern speciying cutting conditions graph dimension, block composition indicating the dimension o each o them, block binding to numbers o lines and columns o the pattern. Blocks are considered in this case as potential targets o graph vertices at their inclusion into proper subgraph. I such pattern is overlapped on matrix R o graph G the original cutting in which graph vertex numbers coincide with numbers o lines and columns o the pattern is obtained. In Fig. 1 numbers o lines and columns o the pattern are shown on the let and on the top respectively and numbers o vertices are shown on the right and below. In this case index sets J and J q include numbers o lines and columns o the pattern and J * and J q* o matrix R. For initial cutting J =J *, J q =J q*. Fig. 1. Matrix-pattern or cutting problem Quality o cutting or the considered application is determined by a sum o weights o arc attachment o cutting that corresponds to a sum o elements o matrix R situated in the range o pattern section. Let us denote the sum o weights by value r and element set o section region by value V c. It ollows rom this that r = rij. vij Vc It is possible to decrease value r by equivalent conversion o matrix R moving elements rom set V c with higher weights into the region o pattern blocks. Matrix R and matrix R k obtained as a result o k transormation are equivalent i each o them is the vertex matrix o one and the same graph G. On the basis o this the cutting problem consists in conversion o matrix R to the orm in which a sum o weights o section region elements is minimal and a sum o weights o block region elements is maximal, respectively, while moving elements rom section region into block region and saving the equivalence o matrix R. To implement this approach it is necessary to develop a policy o selection and moving elements o matrix R ulilling the conditions o equivalence or solving cutting problem. A proper algorithm is called matrix and includes two main procedures: determination o estimates or selecting relocatable elements; equivalent conversion o matrix R implementing the selected relocation. Implementing this policy two variants o matrix algorithm are singled out. In the irst pattern blocks are considered as ree places or assignment o selected elements. The second variant o algorithm uses pattern overlap on the matrix R. The initial cutting variant obtained in this case is improved by reciprocal element relocation between section and block regions. The second simpler variant o algorithm is suggested urther. Matrix element relocation Relocation is perormed over the elements o matrix R on which matrix pattern is overlapped. The necessity o element relocation is stipulated by a criterion o solving cutting problem according to which a minimal sum o element weights should remain in section region. At pattern overlapping on matrix R we obtain the initial cutting variant. So, operations o element relocation are perormed in conditions when all places in blocks are occupied. Thereore, to perorm the relocation, the target or moved elements should be released. I the released elements are not carried out o the matrix or saving and arranged on the places o moved elements then reciprocal element relocation occurs; such rule o relocation its to the suggested variant o matrix algorithm. Matrix element may move along a line or a column as it is shown in Fig. 1 or element r', situated in the 2 d column o the matrix. I element moves with the change o line and column as it is shown or the element r" situated in (n 1) column then two relocations are ulilled, or example, irstly, along the column and then on a line or on the contrary. To save matrix equivalence the proper line and column should be moved together with element relocation. I relocation is perormed on a line then a column and appropriate line are moved. So relocation o element r' into block G F results in transer o 2 d column into (n 2) column and 2 d line into (n 2) line. Similarly, at relocation o element r' along the column the (n 1) line is transerred into 3 d line and the (n 1) column is transerred into 3 d column. An object o relocation is oten not one but several elements. A number o elements are determined as a rule by dimension o the block where they move. Relocation o 4 elements o the 3 d column into the 1 st column o the block G with the dimension 4 4 is shown in Fig. 1. One o relocated elements alls on block diagonal element in this case it is the 1 element rom the top. I this element has the weight r ij >0 then it is transerred to the place o diagonal element o relocated column. Similarly, i nonzero element alls on diagonal element at 85

3 line relocation then it is transerred to diagonal element o the relocated line. Such rule o interaction o nonzero element and diagonal element is also used at transer o lines and columns with released elements. Element selection or relocation On the basis o tendency to move elements with maximal total weights rom section region into block region let us introduce preerence judgment o elements or their reciprocal transer. For this purpose each column o matrix is divided into groups o elements according to their belonging to the lines o one block so that group o elements corresponds to lines J, belonging to block G. or example, or the matrix in Fig. 1, 1 st group o all columns consists o irst three elements and the last one o elements {n 2, n 1, n}. At such partitioning one o the groups o each column belongs to a block and all the rest belong to section region. Let us introduce the ollowing notations. Numbers o lines and columns o matrix-pattern are denoted by indices i and j: j is the number o column or line moved into block; i is the number o column or line excluded o the block. Block numbers o matrix-pattern are denoted by indices and q: q is the number o block into which column j is relocated; is the number o block rom which column j is excluded; J q is the set o line numbers o block q; J is the set o line numbers o block. Preerence judgments are calculated relative to the groups o elements situated in section region. Sum o weights o elements in group J q o column j which is transerred into block q is denoted by value α ~ qj, α = r, α = α ξ. (1) qj ij qji qj qji i Jq Here ξ qji is the weight r ij o element (i,j) o group J q which at transer o column j into block q on the place o column i, alls on its diagonal element; α qji is the sum o weights o elements in column j ater its relocation into block q on the place o column i. Similarly or column i which moves into block on the place o column j, the values ~ α i and α ij are calculated: α = r, α = α ξ. (2) i ij ij i ij i J Decrease o element weight sums which occurs in blocks q and excluding appropriate columns i and j rom them is determined by values β qi and β j : β = r, β = r. (3) qi ij j ij i Jq i J The diagram o reciprocal transer o columns j and i and determination o proper estimates in agreed notations is given in Fig. 2. Diagonal elements o columns i and j in blocks q and are hatched. Elements o columns i and j which all on diagonal elements in blocks being transerred are marked out as well. Beore column transer the elements marked out in them move in the column to the place o diagonal element that is shown by arrows in Fig. 2. The places o marked out elements are taken as diagonal elements ater column transer. Fig. 2. Diagram o column reciprocal transer Estimates introduced in (1) (3) allow obtaining sum preerence judgments μ ij or pairs o columns i and j relative to their reciprocal transer, μij = αqji βj + αij βqi. (4) Estimates μ ij >0 show how much element sum weight increases in blocks ater reciprocal transer o columns j and i or, respectively, how much element sum weight decreases in section region. Estimates μ ij are calculated only or elements o pattern section region as element move in blocks does not change the sum o their weights. I matrix R is symmetrical in this case then estimates μ ij are calculated or one part o section region top or bottom. Matrix algorithm and example o its application Ater presentation o graph by adjacency matrix R algorithm operation includes ulillment o the ollowing stages. 1. Pattern ormation and its overlap on matrix R. Pattern is ormed on the basis o inormation about a number o cutting blocks, dimension o each o them and their place in the pattern. Places o block situation in the pattern are determined in a random sequence regardless o block dimension. As a result o pattern overlapping on the matrix R the initial variant o cutting in which J =J * ; J q =J q* ;,q=1,2,...,f is obtained. 2. Calculation o estimates μ ij. Estimates are calculated by the expressions (1) (4). I matrix R is symmetrical then calculation is carried out or one part o section region symmetrical relative to matrix diagonal top (over diagonal) and bottom (under diagonal). Among estimates μ ij >0 a maximal one is selected and appropriate columns i and j are preerred or their reciprocal transer. In this case the conversion to ulilling stage 3 is carried out. Without estimates μ ij >0 algorithm stops operating and ixes the obtained variant o cutting. 3. Reciprocal transer o columns i and j. Columns and proper lines are transerred by the rules given above and the diagram given in Fig. 2. Reciprocal transer o lines and columns is attended by updating o index sets J * and J q*. Ater that the conversion to ulilling the second stage o algorithm is carried out. 86

4 Control, computer engineering and inormation science Let us show algorithm operation by the example o weighted ordinary graph containing 10 vertices. The graph should be divided into 3 subgraphs one o which contains 4 vertices and two other ones contain 3 vertices. Matrix R o the given graph and matrix pattern constructed or the given cutting conditions matched with it are given in Fig. 3, a. The initial variant o cutting obtained in this case is characterized by element weight sums in blocks (numerator) and in section region (denominator) equal 15/50. To improve the ratio 15/50 the estimates μ ij are calculated; the estimate with maximal value is selected among them. In this case it is estimates μ 5,3 =μ 9,3 =9. Let us select any o them, or example μ 5,3 that assumes relocation o element (2,5) with weight r 2,5 =2 into block J 1 and element (4,3) with weight r 4,3 =7 into block J 2. To relocate these elements the reciprocal transer o columns j=5 and i=3 and appropriate lines is carried out. The result o transer is given in Fig. 3, б. The ratio o weight sum is equal to 24/41. μ 9,1 =14 is maximal estimate μ ij or the given variant o cutting. Ater reciprocal transer o column j=9 and i=1 the cutting variant given in Fig. 3, в, with weight sum ratio 38/27 turns out. μ 8,6 =3 is maximal estimate μ ij in this case. As a result o reciprocal transer o columns j=8 and i=6 we obtain cutting given in Fig. 3, г, or which there are no estimates μ ij >0. Thereore, algorithm completes its operation with variant o cutting J 1* ={0,9,2,5}, J 2* ={4,3,8}, J 3* ={7,6,1} and ratio o weight sum 41/24. I the graph used as an example is interpreted as a graph o data transer [4] the vertices o which are stations o local network s i, i=0,1,2,...,9, and arc weights r ij correspond to volumes o data transerred between stations s i and s j then as a result o solving cutting problem we obtain three subsets o stations {s 0,s 9,s 2,s 5 }, {s 4,s 3,s 8 }, {s 7,s 6,s 1 }, each o that is connected to one o three network backbones. At such variant o network construction the majority o data, in this example it is 41 units, is Fig. 3. Example o solving the problem o graph cutting 87

5 transerred between stations inside sets loading appropriate backbone. In this case data may be transerred simultaneously (parallel) in all backbones. Other data at the rate o 24 units are transerred between stations connected to dierent backbones. At such transers two or three backbones are loaded simultaneously that results in increasing network load and, respectively, time or data transer. Conclusion Advantages o suggested algorithm in comparison with the known ones operating with arc list are stipulated by graph presentation in matrix orm at which section region is speciied in explicit orm. It allows easily observing («seeing») the changes occurring in section region at matrix conversion and calculating preerence judgments or ulilling regular transormation on the basis o analysis o current state o the whole section region. The simplest scheme o element relocation rom section region into block region based on reciprocal transer o columns and appropriate lines is implemented in algorithm. Other more complicated schemes connected, or example, with the ormation o relocation close circuits are the subject o urther investigations and they are not considered in the given article. Matrix algorithm is applicable or graphs with asymmetrical matrix including an unweighted one. It is obvious that use o this algorithm turns out to be more preerable or graphs with high degree o vertices connectivity as the volume o calculations carried out by algorithm does not depend on coeicient o matrix illing with nonzero elements. Along with achieving the main goal ormalization o matrix algorithm o solving cutting problem the matrix technique has another no less important value. It consists in the act that matrix orm o cutting problem presentation creates possibilities or deeper understanding o its nature, improving analysis techniques o section region at optimization, studying algorithm dependence on various strategies o determining estimates or making decision. Matrix method may be taken as a basis o algorithm development or various types o graphs and cutting conditions. In particular, bipartite graphs are o interest; their matrix presentations, in comparison with the examined ones, assume more eicient operations o matrix conversion when solving cutting problem. REFERENCES 1. Shtein M.E., Shtein B.E. Methods o computer-aided design o digital equipment. Moscow: Sovetskoe Radio, p. 2. Kornienko A.V., Pogrebnoy V.K. Model and algorithm or cutting digital computing devices into unctional blocks // Upravlyayushie Systemy i Mashiny P Kristoides N. Graph theory. Algorithm approach. Moscow: Mir, p. 4. Pogrebnoy A.V. Determining data transer volumes in computer system network or the speciied model o program load // Bulletin o the Tomsk Polytechnic University V P Received on

9.8 Graphing Rational Functions

9.8 Graphing Rational Functions 9. Graphing Rational Functions Lets begin with a deinition. Deinition: Rational Function A rational unction is a unction o the orm P where P and Q are polynomials. Q An eample o a simple rational unction

More information

An Introduction to Graph Theory

An Introduction to Graph Theory An Introduction to Graph Theory CIS008-2 Logic and Foundations of Mathematics David Goodwin david.goodwin@perisic.com 12:00, Friday 17 th February 2012 Outline 1 Graphs 2 Paths and cycles 3 Graphs and

More information

A new approach for ranking trapezoidal vague numbers by using SAW method

A new approach for ranking trapezoidal vague numbers by using SAW method Science Road Publishing Corporation Trends in Advanced Science and Engineering ISSN: 225-6557 TASE 2() 57-64, 20 Journal homepage: http://www.sciroad.com/ntase.html A new approach or ranking trapezoidal

More information

Reflection and Refraction

Reflection and Refraction Relection and Reraction Object To determine ocal lengths o lenses and mirrors and to determine the index o reraction o glass. Apparatus Lenses, optical bench, mirrors, light source, screen, plastic or

More information

10. SOPC Builder Component Development Walkthrough

10. SOPC Builder Component Development Walkthrough 10. SOPC Builder Component Development Walkthrough QII54007-9.0.0 Introduction This chapter describes the parts o a custom SOPC Builder component and guides you through the process o creating an example

More information

Measuring the Vulnerability of Interconnection. Networks in Embedded Systems. University of Massachusetts, Amherst, MA 01003

Measuring the Vulnerability of Interconnection. Networks in Embedded Systems. University of Massachusetts, Amherst, MA 01003 Measuring the Vulnerability o Interconnection Networks in Embedded Systems V. Lakamraju, Z. Koren, I. Koren, and C. M. Krishna Department o Electrical and Computer Engineering University o Massachusetts,

More information

Automated Planning for Feature Model Configuration based on Functional and Non-Functional Requirements

Automated Planning for Feature Model Configuration based on Functional and Non-Functional Requirements Automated Planning or Feature Model Coniguration based on Functional and Non-Functional Requirements Samaneh Soltani 1, Mohsen Asadi 1, Dragan Gašević 2, Marek Hatala 1, Ebrahim Bagheri 2 1 Simon Fraser

More information

Neighbourhood Operations

Neighbourhood Operations Neighbourhood Operations Neighbourhood operations simply operate on a larger neighbourhood o piels than point operations Origin Neighbourhoods are mostly a rectangle around a central piel Any size rectangle

More information

What is Clustering? Clustering. Characterizing Cluster Methods. Clusters. Cluster Validity. Basic Clustering Methodology

What is Clustering? Clustering. Characterizing Cluster Methods. Clusters. Cluster Validity. Basic Clustering Methodology Clustering Unsupervised learning Generating classes Distance/similarity measures Agglomerative methods Divisive methods Data Clustering 1 What is Clustering? Form o unsupervised learning - no inormation

More information

A Proposed Approach for Solving Rough Bi-Level. Programming Problems by Genetic Algorithm

A Proposed Approach for Solving Rough Bi-Level. Programming Problems by Genetic Algorithm Int J Contemp Math Sciences, Vol 6, 0, no 0, 45 465 A Proposed Approach or Solving Rough Bi-Level Programming Problems by Genetic Algorithm M S Osman Department o Basic Science, Higher Technological Institute

More information

Pentagon contact representations

Pentagon contact representations Pentagon contact representations Stean Felsner Institut ür Mathematik Technische Universität Berlin Hendrik Schrezenmaier Institut ür Mathematik Technische Universität Berlin August, 017 Raphael Steiner

More information

ECE 6560 Multirate Signal Processing Chapter 8

ECE 6560 Multirate Signal Processing Chapter 8 Multirate Signal Processing Chapter 8 Dr. Bradley J. Bazuin Western Michigan University College o Engineering and Applied Sciences Department o Electrical and Computer Engineering 903 W. Michigan Ave.

More information

Formalizing Cardinality-based Feature Models and their Staged Configuration

Formalizing Cardinality-based Feature Models and their Staged Configuration Formalizing Cardinality-based Feature Models and their Staged Coniguration Krzyszto Czarnecki, Simon Helsen, and Ulrich Eisenecker 2 University o Waterloo, Canada 2 University o Applied Sciences Kaiserslautern,

More information

2. Getting Started with the Graphical User Interface

2. Getting Started with the Graphical User Interface February 2011 NII52017-10.1.0 2. Getting Started with the Graphical User Interace NII52017-10.1.0 The Nios II Sotware Build Tools (SBT) or Eclipse is a set o plugins based on the popular Eclipse ramework

More information

Chapter 3 Image Enhancement in the Spatial Domain

Chapter 3 Image Enhancement in the Spatial Domain Chapter 3 Image Enhancement in the Spatial Domain Yinghua He School o Computer Science and Technology Tianjin University Image enhancement approaches Spatial domain image plane itsel Spatial domain methods

More information

Graph Theory S 1 I 2 I 1 S 2 I 1 I 2

Graph Theory S 1 I 2 I 1 S 2 I 1 I 2 Graph Theory S I I S S I I S Graphs Definition A graph G is a pair consisting of a vertex set V (G), and an edge set E(G) ( ) V (G). x and y are the endpoints of edge e = {x, y}. They are called adjacent

More information

Defects Detection of Billet Surface Using Optimized Gabor Filters

Defects Detection of Billet Surface Using Optimized Gabor Filters Proceedings o the 7th World Congress The International Federation o Automatic Control Deects Detection o Billet Surace Using Optimized Gabor Filters Jong Pil Yun* SungHoo Choi* Boyeul Seo* Chang Hyun Park*

More information

Piecewise polynomial interpolation

Piecewise polynomial interpolation Chapter 2 Piecewise polynomial interpolation In ection.6., and in Lab, we learned that it is not a good idea to interpolate unctions by a highorder polynomials at equally spaced points. However, it transpires

More information

Compressed Sensing Image Reconstruction Based on Discrete Shearlet Transform

Compressed Sensing Image Reconstruction Based on Discrete Shearlet Transform Sensors & Transducers 04 by IFSA Publishing, S. L. http://www.sensorsportal.com Compressed Sensing Image Reconstruction Based on Discrete Shearlet Transorm Shanshan Peng School o Inormation Science and

More information

Travaux Dirigés n 2 Modèles des langages de programmation Master Parisien de Recherche en Informatique Paul-André Melliès

Travaux Dirigés n 2 Modèles des langages de programmation Master Parisien de Recherche en Informatique Paul-André Melliès Travaux Dirigés n 2 Modèles des langages de programmation Master Parisien de Recherche en Inormatique Paul-André Melliès Problem. We saw in the course that every coherence space A induces a partial order

More information

The Graph of an Equation Graph the following by using a table of values and plotting points.

The Graph of an Equation Graph the following by using a table of values and plotting points. Calculus Preparation - Section 1 Graphs and Models Success in math as well as Calculus is to use a multiple perspective -- graphical, analytical, and numerical. Thanks to Rene Descartes we can represent

More information

Study and Analysis of Edge Detection and Implementation of Fuzzy Set. Theory Based Edge Detection Technique in Digital Images

Study and Analysis of Edge Detection and Implementation of Fuzzy Set. Theory Based Edge Detection Technique in Digital Images Study and Analysis o Edge Detection and Implementation o Fuzzy Set Theory Based Edge Detection Technique in Digital Images Anju K S Assistant Proessor, Department o Computer Science Baselios Mathews II

More information

Graph Theory. ICT Theory Excerpt from various sources by Robert Pergl

Graph Theory. ICT Theory Excerpt from various sources by Robert Pergl Graph Theory ICT Theory Excerpt from various sources by Robert Pergl What can graphs model? Cost of wiring electronic components together. Shortest route between two cities. Finding the shortest distance

More information

Lecture 5: Graphs. Rajat Mittal. IIT Kanpur

Lecture 5: Graphs. Rajat Mittal. IIT Kanpur Lecture : Graphs Rajat Mittal IIT Kanpur Combinatorial graphs provide a natural way to model connections between different objects. They are very useful in depicting communication networks, social networks

More information

Mobile Robot Static Path Planning Based on Genetic Simulated Annealing Algorithm

Mobile Robot Static Path Planning Based on Genetic Simulated Annealing Algorithm Mobile Robot Static Path Planning Based on Genetic Simulated Annealing Algorithm Wang Yan-ping 1, Wubing 2 1. School o Electric and Electronic Engineering, Shandong University o Technology, Zibo 255049,

More information

Certificate Translation for Optimizing Compilers

Certificate Translation for Optimizing Compilers Certiicate Translation or Optimizing Compilers Gilles Barthe IMDEA Sotware and Benjamin Grégoire and César Kunz and Tamara Rezk INRIA Sophia Antipolis - Méditerranée Proo Carrying Code provides trust in

More information

Learning Implied Global Constraints

Learning Implied Global Constraints Learning Implied Global Constraints Christian Bessiere LIRMM-CNRS U. Montpellier, France bessiere@lirmm.r Remi Coletta LRD Montpellier, France coletta@l-rd.r Thierry Petit LINA-CNRS École des Mines de

More information

Message authentication

Message authentication Message authentication -- Reminder on hash unctions -- MAC unctions hash based block cipher based -- Digital signatures (c) Levente Buttyán (buttyan@crysys.hu) Hash unctions a hash unction is a unction

More information

arxiv: v1 [math.co] 11 Dec 2014

arxiv: v1 [math.co] 11 Dec 2014 MAXIMAL GREEN SEQUENCES FOR CLUSTER ALGEBRAS ASSOCIATED TO THE n-torus ERIC BUCHER arxiv:141.3713v1 [math.co] 11 Dec 014 Abstract. Given amarkedsurace(s,m) wecanaddarcstothe suracetocreateatriangulation,

More information

Regenerating Codes for Errors and Erasures in Distributed Storage

Regenerating Codes for Errors and Erasures in Distributed Storage Regenerating Codes or Errors and Erasures in Distributed Storage K V Rashmi, Nihar B Shah, Kannan Ramchandran, Fellow, IEEE, and P Vijay Kumar, Fellow, IEEE arxiv:0050v csit] 3 May 0 Abstract Regenerating

More information

Keysight Technologies Specifying Calibration Standards and Kits for Keysight Vector Network Analyzers. Application Note

Keysight Technologies Specifying Calibration Standards and Kits for Keysight Vector Network Analyzers. Application Note Keysight Technologies Speciying Calibration Standards and Kits or Keysight Vector Network Analyzers Application Note Introduction Measurement errors in network analysis can be separated into two categories:

More information

ITU - Telecommunication Standardization Sector. G.fast: Far-end crosstalk in twisted pair cabling; measurements and modelling ABSTRACT

ITU - Telecommunication Standardization Sector. G.fast: Far-end crosstalk in twisted pair cabling; measurements and modelling ABSTRACT ITU - Telecommunication Standardization Sector STUDY GROUP 15 Temporary Document 11RV-22 Original: English Richmond, VA. - 3-1 Nov. 211 Question: 4/15 SOURCE 1 : TNO TITLE: G.ast: Far-end crosstalk in

More information

Counting Interface Automata and their Application in Static Analysis of Actor Models

Counting Interface Automata and their Application in Static Analysis of Actor Models Counting Interace Automata and their Application in Static Analysis o Actor Models Ernesto Wandeler Jörn W. Janneck Edward A. Lee Lothar Thiele Abstract We present an interace theory based approach to

More information

Research Article Synthesis of Test Scenarios Using UML Sequence Diagrams

Research Article Synthesis of Test Scenarios Using UML Sequence Diagrams International Scholarly Research Network ISRN Sotware Engineering Volume 2012, Article ID 324054, 22 pages doi:10.5402/2012/324054 Research Article Synthesis o Test Scenarios Using UML Sequence Diagrams

More information

Method estimating reflection coefficients of adaptive lattice filter and its application to system identification

Method estimating reflection coefficients of adaptive lattice filter and its application to system identification Acoust. Sci. & Tech. 28, 2 (27) PAPER #27 The Acoustical Society o Japan Method estimating relection coeicients o adaptive lattice ilter and its application to system identiication Kensaku Fujii 1;, Masaaki

More information

Review for Exam I, EE552 2/2009

Review for Exam I, EE552 2/2009 Gonale & Woods Review or Eam I, EE55 /009 Elements o Visual Perception Image Formation in the Ee and relation to a photographic camera). Brightness Adaption and Discrimination. Light and the Electromagnetic

More information

A Requirement Specification Language for Configuration Dynamics of Multiagent Systems

A Requirement Specification Language for Configuration Dynamics of Multiagent Systems A Requirement Speciication Language or Coniguration Dynamics o Multiagent Systems Mehdi Dastani, Catholijn M. Jonker, Jan Treur* Vrije Universiteit Amsterdam, Department o Artiicial Intelligence, De Boelelaan

More information

Reducing the Bandwidth of a Sparse Matrix with Tabu Search

Reducing the Bandwidth of a Sparse Matrix with Tabu Search Reducing the Bandwidth o a Sparse Matrix with Tabu Search Raael Martí a, Manuel Laguna b, Fred Glover b and Vicente Campos a a b Dpto. de Estadística e Investigación Operativa, Facultad de Matemáticas,

More information

CS485/685 Computer Vision Spring 2012 Dr. George Bebis Programming Assignment 2 Due Date: 3/27/2012

CS485/685 Computer Vision Spring 2012 Dr. George Bebis Programming Assignment 2 Due Date: 3/27/2012 CS8/68 Computer Vision Spring 0 Dr. George Bebis Programming Assignment Due Date: /7/0 In this assignment, you will implement an algorithm or normalizing ace image using SVD. Face normalization is a required

More information

COMS W4705, Spring 2015: Problem Set 2 Total points: 140

COMS W4705, Spring 2015: Problem Set 2 Total points: 140 COM W4705, pring 2015: Problem et 2 Total points: 140 Analytic Problems (due March 2nd) Question 1 (20 points) A probabilistic context-ree grammar G = (N, Σ, R,, q) in Chomsky Normal Form is deined as

More information

Xavier: A Robot Navigation Architecture Based on Partially Observable Markov Decision Process Models

Xavier: A Robot Navigation Architecture Based on Partially Observable Markov Decision Process Models Xavier: A Robot Navigation Architecture Based on Partially Observable Markov Decision Process Models Sven Koenig and Reid G. Simmons Carnegie Mellon University School o Computer Science Pittsburgh, PA

More information

MAPI Computer Vision. Multiple View Geometry

MAPI Computer Vision. Multiple View Geometry MAPI Computer Vision Multiple View Geometry Geometry o Multiple Views 2- and 3- view geometry p p Kpˆ [ K R t]p Geometry o Multiple Views 2- and 3- view geometry Epipolar Geometry The epipolar geometry

More information

Generell Topologi. Richard Williamson. May 6, 2013

Generell Topologi. Richard Williamson. May 6, 2013 Generell Topologi Richard Williamson May 6, Thursday 7th January. Basis o a topological space generating a topology with a speciied basis standard topology on R examples Deinition.. Let (, O) be a topological

More information

THE FINANCIAL CALCULATOR

THE FINANCIAL CALCULATOR Starter Kit CHAPTER 3 Stalla Seminars THE FINANCIAL CALCULATOR In accordance with the AIMR calculator policy in eect at the time o this writing, CFA candidates are permitted to use one o two approved calculators

More information

Computer Vision Group Prof. Daniel Cremers. 4. Probabilistic Graphical Models Directed Models

Computer Vision Group Prof. Daniel Cremers. 4. Probabilistic Graphical Models Directed Models Prof. Daniel Cremers 4. Probabilistic Graphical Models Directed Models The Bayes Filter (Rep.) (Bayes) (Markov) (Tot. prob.) (Markov) (Markov) 2 Graphical Representation (Rep.) We can describe the overall

More information

Joint Congestion Control and Scheduling in Wireless Networks with Network Coding

Joint Congestion Control and Scheduling in Wireless Networks with Network Coding Title Joint Congestion Control and Scheduling in Wireless Networks with Network Coding Authors Hou, R; Wong Lui, KS; Li, J Citation IEEE Transactions on Vehicular Technology, 2014, v. 63 n. 7, p. 3304-3317

More information

Graphs (MTAT , 6 EAP) Lectures: Mon 14-16, hall 404 Exercises: Wed 14-16, hall 402

Graphs (MTAT , 6 EAP) Lectures: Mon 14-16, hall 404 Exercises: Wed 14-16, hall 402 Graphs (MTAT.05.080, 6 EAP) Lectures: Mon 14-16, hall 404 Exercises: Wed 14-16, hall 402 homepage: http://courses.cs.ut.ee/2012/graafid (contains slides) For grade: Homework + three tests (during or after

More information

AN 608: HST Jitter and BER Estimator Tool for Stratix IV GX and GT Devices

AN 608: HST Jitter and BER Estimator Tool for Stratix IV GX and GT Devices AN 608: HST Jitter and BER Estimator Tool or Stratix IV GX and GT Devices July 2010 AN-608-1.0 The high-speed communication link design toolkit (HST) jitter and bit error rate (BER) estimator tool is a

More information

Modeling and Analysis of Workflow Based on TLA

Modeling and Analysis of Workflow Based on TLA JOURNAL OF COMPUTERS, VOL. 4, NO. 1, JANUARY 2009 27 Modeling and Analysis o Worklow Based on TLA CHEN Shu Wu Han University Computer Science Department, Wu Han China Email: Chenshu181@yahoo.com.cn WU

More information

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition. 18.433 Combinatorial Optimization Matching Algorithms September 9,14,16 Lecturer: Santosh Vempala Given a graph G = (V, E), a matching M is a set of edges with the property that no two of the edges have

More information

Structured Parallel Programming with Deterministic Patterns

Structured Parallel Programming with Deterministic Patterns Structured Parallel Programming with Deterministic Patterns May 14, 2010 USENIX HotPar 2010, Berkeley, Caliornia Michael McCool, Sotware Architect, Ct Technology Sotware and Services Group, Intel Corporation

More information

Decision Support Systems for E-Purchasing using Case-Based Reasoning and Rating Based Collaborative Filtering

Decision Support Systems for E-Purchasing using Case-Based Reasoning and Rating Based Collaborative Filtering Decision Support Systems or E-Purchasing using Case-Based Reasoning and Rating Based Collaborative Filtering ABSTRACT The amount o trade conducted electronically has grown dramatically since the wide introduction

More information

Constrained Coalitional Games and Networks of Autonomous Agents

Constrained Coalitional Games and Networks of Autonomous Agents 972 ISCCSP 2008, Malta, 12-14 March 2008 Constrained Coalitional Games and Networks o Autonomous Agents John S. Baras, Tao Jiang and Punyaslok Purkayastha Institute or Systems Research, Department o Electrical

More information

1 Matchings in Graphs

1 Matchings in Graphs Matchings in Graphs J J 2 J 3 J 4 J 5 J J J 6 8 7 C C 2 C 3 C 4 C 5 C C 7 C 8 6 J J 2 J 3 J 4 J 5 J J J 6 8 7 C C 2 C 3 C 4 C 5 C C 7 C 8 6 Definition Two edges are called independent if they are not adjacent

More information

Lab 9 - GEOMETRICAL OPTICS

Lab 9 - GEOMETRICAL OPTICS 161 Name Date Partners Lab 9 - GEOMETRICAL OPTICS OBJECTIVES Optics, developed in us through study, teaches us to see - Paul Cezanne Image rom www.weidemyr.com To examine Snell s Law To observe total internal

More information

Lagrangian relaxations for multiple network alignment

Lagrangian relaxations for multiple network alignment Noname manuscript No. (will be inserted by the editor) Lagrangian relaxations or multiple network alignment Eric Malmi Sanjay Chawla Aristides Gionis Received: date / Accepted: date Abstract We propose

More information

Composite functions. [Type the document subtitle] Composite functions, working them out.

Composite functions. [Type the document subtitle] Composite functions, working them out. Composite unctions [Type the document subtitle] Composite unctions, workin them out. luxvis 11/19/01 Composite Functions What are they? In the real world, it is not uncommon or the output o one thin to

More information

Automatic Video Segmentation for Czech TV Broadcast Transcription

Automatic Video Segmentation for Czech TV Broadcast Transcription Automatic Video Segmentation or Czech TV Broadcast Transcription Jose Chaloupka Laboratory o Computer Speech Processing, Institute o Inormation Technology and Electronics Technical University o Liberec

More information

ScienceDirect. Using Search Algorithms for Modeling Economic Processes

ScienceDirect. Using Search Algorithms for Modeling Economic Processes vailable online at www.sciencedirect.com ScienceDirect Procedia Economics and Finance 6 ( 03 ) 73 737 International Economic onerence o Sibiu 03 Post risis Economy: hallenges and Opportunities, IES 03

More information

Skill Sets Chapter 5 Functions

Skill Sets Chapter 5 Functions Skill Sets Chapter 5 Functions No. Skills Examples o questions involving the skills. Sketch the graph o the (Lecture Notes Example (b)) unction according to the g : x x x, domain. x, x - Students tend

More information

Section III. Advanced Programming Topics

Section III. Advanced Programming Topics Section III. Advanced Programming Topics This section provides inormation about several advanced embedded programming topics. It includes the ollowing chapters: Chapter 8, Exception Handling Chapter 9,

More information

2 DETERMINING THE VANISHING POINT LOCA- TIONS

2 DETERMINING THE VANISHING POINT LOCA- TIONS IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL.??, NO.??, DATE 1 Equidistant Fish-Eye Calibration and Rectiication by Vanishing Point Extraction Abstract In this paper we describe

More information

GEOMETRICAL OPTICS OBJECTIVES

GEOMETRICAL OPTICS OBJECTIVES Geometrical Optics 207 Name Date Partners OBJECTIVES OVERVIEW GEOMETRICAL OPTICS To examine Snell s Law and observe total internal relection. To understand and use the lens equations. To ind the ocal length

More information

Graph and Digraph Glossary

Graph and Digraph Glossary 1 of 15 31.1.2004 14:45 Graph and Digraph Glossary A B C D E F G H I-J K L M N O P-Q R S T U V W-Z Acyclic Graph A graph is acyclic if it contains no cycles. Adjacency Matrix A 0-1 square matrix whose

More information

Research on Image Splicing Based on Weighted POISSON Fusion

Research on Image Splicing Based on Weighted POISSON Fusion Research on Image Splicing Based on Weighted POISSO Fusion Dan Li, Ling Yuan*, Song Hu, Zeqi Wang School o Computer Science & Technology HuaZhong University o Science & Technology Wuhan, 430074, China

More information

Abstract. I. Introduction

Abstract. I. Introduction 46th AIAA/ASME/ASCE/AHS/ASC Structures, Structural Dynamics & Materials Conerence 8 - April 005, Austin, Texas AIAA 005-83 M Intuitive Design Selection Using Visualized n-dimensional Pareto Frontier G.

More information

Module 7. Independent sets, coverings. and matchings. Contents

Module 7. Independent sets, coverings. and matchings. Contents Module 7 Independent sets, coverings Contents and matchings 7.1 Introduction.......................... 152 7.2 Independent sets and coverings: basic equations..... 152 7.3 Matchings in bipartite graphs................

More information

Balanced Multiresolution for Symmetric/Antisymmetric Filters

Balanced Multiresolution for Symmetric/Antisymmetric Filters Balanced Multiresolution or Symmetric/Antisymmetric Filters Mahmudul Hasan Faramarz F. Samavati Mario C. Sousa Department o Computer Science University o Calgary Alberta Canada {mhasan samavati smcosta}@ucalgary.ca

More information

Computer Vision Group Prof. Daniel Cremers. 4. Probabilistic Graphical Models Directed Models

Computer Vision Group Prof. Daniel Cremers. 4. Probabilistic Graphical Models Directed Models Prof. Daniel Cremers 4. Probabilistic Graphical Models Directed Models The Bayes Filter (Rep.) (Bayes) (Markov) (Tot. prob.) (Markov) (Markov) 2 Graphical Representation (Rep.) We can describe the overall

More information

Connecting Definition and Use? Tiger Semantic Analysis. Symbol Tables. Symbol Tables (cont d)

Connecting Definition and Use? Tiger Semantic Analysis. Symbol Tables. Symbol Tables (cont d) Tiger source program Tiger Semantic Analysis lexical analyzer report all lexical errors token get next token parser construct variable deinitions to their uses report all syntactic errors absyn checks

More information

Fig. 3.1: Interpolation schemes for forward mapping (left) and inverse mapping (right, Jähne, 1997).

Fig. 3.1: Interpolation schemes for forward mapping (left) and inverse mapping (right, Jähne, 1997). Eicken, GEOS 69 - Geoscience Image Processing Applications, Lecture Notes - 17-3. Spatial transorms 3.1. Geometric operations (Reading: Castleman, 1996, pp. 115-138) - a geometric operation is deined as

More information

7. External Memory Interfaces in Cyclone IV Devices

7. External Memory Interfaces in Cyclone IV Devices March 2016 CYIV-51007-2.6 7. External Memory Interaces in Cyclone IV Devices CYIV-51007-2.6 This chapter describes the memory interace pin support and the external memory interace eatures o Cyclone IV

More information

Magical Least Squares - or When is One Least Squares Adjustment Better Than Another?

Magical Least Squares - or When is One Least Squares Adjustment Better Than Another? Magical Least Squares - or When is One Least Squares Adjustment Better Than Another? Earl F. Burkholder, PS, PE NMSU Dept o Sureying Engineering Las Cruces, NM 883 September 25 Introduction Least squares

More information

An Efficient Configuration Methodology for Time-Division Multiplexed Single Resources

An Efficient Configuration Methodology for Time-Division Multiplexed Single Resources An Eicient Coniguration Methodology or Time-Division Multiplexed Single Resources Benny Akesson 1, Anna Minaeva 1, Přemysl Šůcha 1, Andrew Nelson 2 and Zdeněk Hanzálek 1 1 Czech Technical University in

More information

Using VCS with the Quartus II Software

Using VCS with the Quartus II Software Using VCS with the Quartus II Sotware December 2002, ver. 1.0 Application Note 239 Introduction As the design complexity o FPGAs continues to rise, veriication engineers are inding it increasingly diicult

More information

Section II. Nios II Software Development

Section II. Nios II Software Development Section II. Nios II Sotware Development This section o the Embedded Design Handbook describes how to most eectively use the Altera tools or embedded system sotware development, and recommends design styles

More information

Computationally Light Multi-Speed Atomic Memory

Computationally Light Multi-Speed Atomic Memory Computationally Light Multi-Speed Atomic Memory Antonio Fernández Anta 1, Theophanis Hadjistasi 2, and Nicolas Nicolaou 1 1 IMDEA Networks Institute Madrid, Spain antonio.ernandez@imdea.org, nicolas.nicolaou@imdea.org

More information

13. Power Optimization

13. Power Optimization 13. Power Optimization May 2013 QII52016-13.0.0 QII52016-13.0.0 The Quartus II sotware oers power-driven compilation to ully optimize device power consumption. Power-driven compilation ocuses on reducing

More information

Winning Positions in Simplicial Nim

Winning Positions in Simplicial Nim Winning Positions in Simplicial Nim David Horrocks Department of Mathematics and Statistics University of Prince Edward Island Charlottetown, Prince Edward Island, Canada, C1A 4P3 dhorrocks@upei.ca Submitted:

More information

Global Constraints. Combinatorial Problem Solving (CPS) Enric Rodríguez-Carbonell (based on materials by Javier Larrosa) February 22, 2019

Global Constraints. Combinatorial Problem Solving (CPS) Enric Rodríguez-Carbonell (based on materials by Javier Larrosa) February 22, 2019 Global Constraints Combinatorial Problem Solving (CPS) Enric Rodríguez-Carbonell (based on materials by Javier Larrosa) February 22, 2019 Global Constraints Global constraints are classes o constraints

More information

D-Separation. b) the arrows meet head-to-head at the node, and neither the node, nor any of its descendants, are in the set C.

D-Separation. b) the arrows meet head-to-head at the node, and neither the node, nor any of its descendants, are in the set C. D-Separation Say: A, B, and C are non-intersecting subsets of nodes in a directed graph. A path from A to B is blocked by C if it contains a node such that either a) the arrows on the path meet either

More information

Objective Function Designing Led by User Preferences Acquisition

Objective Function Designing Led by User Preferences Acquisition Objective Function Designing Led by User Preerences Acquisition Patrick Taillandier and Julien Gauri Abstract Many real world problems can be deined as optimisation problems in which the aim is to maximise

More information

THIN LENSES: BASICS. There are at least three commonly used symbols for object and image distances:

THIN LENSES: BASICS. There are at least three commonly used symbols for object and image distances: THN LENSES: BASCS BJECTVE: To study and veriy some o the laws o optics applicable to thin lenses by determining the ocal lengths o three such lenses ( two convex, one concave) by several methods. THERY:

More information

A Fault Model Centered Modeling Framework for Self-healing Computing Systems

A Fault Model Centered Modeling Framework for Self-healing Computing Systems A Fault Model Centered Modeling Framework or Sel-healing Computing Systems Wei Lu 1, Yian Zhu 1, Chunyan Ma 1, and Longmei Zhang 2 1 Department o Sotware and Microelectronics, Northwestern Polytechnical

More information

Semantic-Driven Selection of Printer Color Rendering Intents

Semantic-Driven Selection of Printer Color Rendering Intents Semantic-Driven Selection o Printer Color Rendering Intents Kristyn Falkenstern 1,2, Albrecht Lindner 3, Sabine Süsstrunk 3, and Nicolas Bonnier 1. 1 Océ Print Logic Technologies S.A. (France). 2 Institut

More information

W[1]-hardness. Dániel Marx. Recent Advances in Parameterized Complexity Tel Aviv, Israel, December 3, 2017

W[1]-hardness. Dániel Marx. Recent Advances in Parameterized Complexity Tel Aviv, Israel, December 3, 2017 1 W[1]-hardness Dániel Marx Recent Advances in Parameterized Complexity Tel Aviv, Israel, December 3, 2017 2 Lower bounds So far we have seen positive results: basic algorithmic techniques for fixed-parameter

More information

Lecture 9 - Matrix Multiplication Equivalences and Spectral Graph Theory 1

Lecture 9 - Matrix Multiplication Equivalences and Spectral Graph Theory 1 CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanfordedu) February 6, 2018 Lecture 9 - Matrix Multiplication Equivalences and Spectral Graph Theory 1 In the

More information

Understanding Signal to Noise Ratio and Noise Spectral Density in high speed data converters

Understanding Signal to Noise Ratio and Noise Spectral Density in high speed data converters Understanding Signal to Noise Ratio and Noise Spectral Density in high speed data converters TIPL 4703 Presented by Ken Chan Prepared by Ken Chan 1 Table o Contents What is SNR Deinition o SNR Components

More information

Figure 2.1: A bipartite graph.

Figure 2.1: A bipartite graph. Matching problems The dance-class problem. A group of boys and girls, with just as many boys as girls, want to dance together; hence, they have to be matched in couples. Each boy prefers to dance with

More information

Community Detection. Community

Community Detection. Community Community Detection Community In social sciences: Community is formed by individuals such that those within a group interact with each other more frequently than with those outside the group a.k.a. group,

More information

Discrete mathematics , Fall Instructor: prof. János Pach

Discrete mathematics , Fall Instructor: prof. János Pach Discrete mathematics 2016-2017, Fall Instructor: prof. János Pach - covered material - Lecture 1. Counting problems To read: [Lov]: 1.2. Sets, 1.3. Number of subsets, 1.5. Sequences, 1.6. Permutations,

More information

Alex Schaefer. April 9, 2017

Alex Schaefer. April 9, 2017 Department of Mathematics Binghamton University April 9, 2017 Outline 1 Introduction 2 Cycle Vector Space 3 Permutability 4 A Characterization Introduction Outline 1 Introduction 2 Cycle Vector Space 3

More information

A Series Lighting Controller Modbus Register Map

A Series Lighting Controller Modbus Register Map DEH41097 Rev. 3 g A Series Lighting Control Panelboards A Series Lighting Controller Modbus Register Map Table o Contents Introduction...1 RTU Transmission Mode...1 Message rame...1 RTU Mode Message Frames...1

More information

UNIT #2 TRANSFORMATIONS OF FUNCTIONS

UNIT #2 TRANSFORMATIONS OF FUNCTIONS Name: Date: UNIT # TRANSFORMATIONS OF FUNCTIONS Part I Questions. The quadratic unction ollowing does,, () has a turning point at have a turning point? 7, 3, 5 5, 8. I g 7 3, then at which o the The structure

More information

Intelligent knowledge-based system for the automated screwing process control

Intelligent knowledge-based system for the automated screwing process control Intelligent knowledge-based system or the automated screwing process control YULIYA LEBEDYNSKA yuliya.lebedynska@tu-cottbus.de ULRICH BERGER Chair o automation Brandenburg University o Technology Cottbus

More information

Projection Model, 3D Reconstruction and Rigid Motion Estimation from Non-central Catadioptric Images

Projection Model, 3D Reconstruction and Rigid Motion Estimation from Non-central Catadioptric Images Projection Model, 3D Reconstruction and Rigid Motion Estimation rom Non-central Catadioptric Images Nuno Gonçalves and Helder Araújo Institute o Systems and Robotics - Coimbra University o Coimbra Polo

More information

1. a graph G = (V (G), E(G)) consists of a set V (G) of vertices, and a set E(G) of edges (edges are pairs of elements of V (G))

1. a graph G = (V (G), E(G)) consists of a set V (G) of vertices, and a set E(G) of edges (edges are pairs of elements of V (G)) 10 Graphs 10.1 Graphs and Graph Models 1. a graph G = (V (G), E(G)) consists of a set V (G) of vertices, and a set E(G) of edges (edges are pairs of elements of V (G)) 2. an edge is present, say e = {u,

More information

2. Recommended Design Flow

2. Recommended Design Flow 2. Recommended Design Flow This chapter describes the Altera-recommended design low or successully implementing external memory interaces in Altera devices. Altera recommends that you create an example

More information

Scheduling in Multihop Wireless Networks without Back-pressure

Scheduling in Multihop Wireless Networks without Back-pressure Forty-Eighth Annual Allerton Conerence Allerton House, UIUC, Illinois, USA September 29 - October 1, 2010 Scheduling in Multihop Wireless Networks without Back-pressure Shihuan Liu, Eylem Ekici, and Lei

More information

Ad-hoc Workflow: Problems and Solutions

Ad-hoc Workflow: Problems and Solutions Ad-hoc Worklow: Problems and Solutions M. Voorhoeve and W. van der Aalst Dept. o Mathematics and Computing Science Eindhoven University o Technology Eindhoven, The Netherlands, 5600MB Abstract The paper

More information