Gray Codes for Reflectable Languages
|
|
- Elijah Ball
- 5 years ago
- Views:
Transcription
1 Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings of length n for any refletable language in Gray ode order. The algorithm generalizes Gray ode algorithms developed independently for k-ary strings, restrited growth strings, and k-ary trees, as eah of these objets an be represented by a refletable language. Finally, we apply the algorithm to open meanderi systems whih an also be represented by a refletable language. Introdution The term Gray ode originally referred to a speifi ordering of length n binary strings, patented by Frank Gray [4], where onseutive bitstrings differ by a single bit. The following is an example of this listing for n = 3 where the bit that differs with the previous element is underlined: 000, 00, 0, 00, 0,, 0, 00. Today, the term Gray ode refers more generally to an exhaustive listing of any ombinatorial objet where eah suessive objet differs by some onstant amount. In 997, Savage [9] surveyed many of these Gray ode algorithms and sine then many more have been developed for various ombinatorial objets. For a signifiant number of these algorithms, a ommon strategy of refleting subtrees is applied - a tehnique that is similar in spirit to the original binary refleted Gray ode [4]. To illustrate this notion of refleting subtrees we onsider the set S 3 of all length 3 strings over the alphabet {a, b, } with no bb substring. A straight forward reursive algorithm an be used to generate suh strings in lexiographi order by following a omputation tree like the one in Figure. In the omputation tree, eah leaf represents a unique string that is Computing and Information Siene, University of Guelph, Canada. yli04@uoguelph.a Computing and Information Siene, University of Guelph, Canada. Researh supported by NSERC. jsawada@uoguelph.a
2 a b a b a a b a b a a b a b a b a b a a b Figure : Computation tree to generate S 3 in lexiographi order. a b a b a a b a b a a b b a a b b a a b a Figure 2: Computation tree to generate S 3 in Gray ode order. obtained by traing the path from the root to the leaf. Observe that the resulting listing is not a Gray ode sine in some ases suessive strings may differ in all positions. However, by refleting (reversing) the order of the hildren at partiular nodes, as illustrated in Figure 2, we an obtain an ordering of S 3 that is a Gray ode. Some objets for whih this strategy has been applied to inlude: binary [4] and k-ary strings [5, 3], restrited growth funtions [3, 7] and tails [8], and binary [] and k-ary trees [2, 4]. In this paper we generalize what various representations for these objets have in ommon by introduing the notion of refletable languages. We then provide a generi algorithm that an generate all length n words for any refletable language in Gray ode order. As a new appliation, we apply the algorithm to open meandri systems. 2
3 2 Refletable Languages Definition 2.. A language L over the alphabet Σ is said to be refletable if for every i > there exists two haraters x i and y i in Σ suh that if w w 2 w i is a prefix of a word in L then both w w 2 w i x i and w w i y i are also prefixes of words in L. Reall the language S 3 defined in the previous setion as the set of all length 3 strings over {a, b, } with no bb substring. It is refletable by onsidering x i = a and y i =. As another example, onsider the language L = {a, aa, a, aaa, aab, aa, aa, ab, ad} over Σ = {a, b,, d}. Observe that this language is also refletable by onsidering x 2 = a, y 2 = and x 3 = a, y 3 = b. On the other hand, the language L = {a, aa, a, aaa, aab, aa, ab, aa, ab} is not refletable sine ab L, but no matter what we use for x 3 and y 3 the strings abx 3 and aby 3 an not both be in L. It turns out that many ommon ombinatorial objets an be represented by refletable languages. In the following subsetions we give examples of suh refletable languages by demonstrating their x i and y i values. 2. Binary strings, k-ary strings, and variants Letting Σ = {0,, 2,..., k }, the set of all k-ary strings for k 2 trivially form a refletable language by onsidering x i = 0 and y i =. A generalization of k-ary strings is to onsider elements of the produt spae S = S S 2 S n where eah S i = {0,,..., r i } for i =, 2,..., n. If eah r i 2, then suh a spae will again orrespond to a refletable language by onsidering x i = 0 and y i =. Strings with a forbidden substring α are a variation on k-ary strings that have been studied in [0]. If the forbidden substring α is omposed from a subset of k 2 haraters in the alphabet, then the language of strings with forbidden substring α is refletable. This follows from the definition by assigning any two haraters from the alphabet that do not appear in α to x i and y i respetively. As an example, reall that S 3 orresponds to a refletable language. 2.2 Restrited growth strings Restrited growth strings are strings of non-negative integers w w n satisfying w = 0 and w i + max{w, w 2,..., w i }. There is a well known bijetion between restrited growth strings and set partitions [9]. By letting x i = 0 and y i = for eah i, observe that restrited growth strings of length n are refletable. A slight generalization of restrited growth strings are restrited growth tails [8], whih are strings of non-negative integers w w n satisfying w k and w i + max{w, w 2,..., w i, k }. Observe that this generalization also orresponds to a refletable language by letting x i = 0 and y i =. 3
4 (a) (b) () Figure 3: (a) Zaks representation n = 6, k = 3. (b) Right distane sequene n = 6, k = 3. () Weight sequene for a binary tree with n = Binary and k-ary trees A k-ary tree is a tree where eah internal node has k ordered subtrees. A ommon bitsequene representation for k-ary trees is obtained by visiting a tree in pre-order where a is assigned to eah internal node and a 0 is assigned to eah leaf. This representation is often attributed to Zaks [5]. Using this pre-order traversal, a unique bit-sequene of length kn+ is obtained for eah k-ary tree with n internal nodes. Sine there are so many zeros in the bit sequene representation, it is often useful to use an alternate representation where only the positions of the ones are reorded. For example, a tree and its bit sequene representation is given in Figure 3(a). Using this representation a sequene a a 2 a n will orrespond to a k-ary tree if a = and for eah i > 0 we have a i < a i k(i ) + [2]. Observe that suh a set suh strings orresponds to a refletable language where x i = k(i ) and y i = k(i ) +. Another representation is presented in [4] where the nodes in a k-ary tree are defined reursively as follows: the root node is assigned 0, then for eah hild i =,..., k from left to right we assign the value k i plus the value of its parent. A pre-order traversal yields what is alled the right-distane sequene for a k-ary tree. An example is illustrated in Figure 3(b). Using this representation, any sequene orresponding to a tree with n nodes an be extended to a tree with n + nodes by appending any value between 0 and k [4]. Thus, the set of all right distane sequenes is a refletable language where x i = 0 and y i =. In the speial ase of binary trees (k = 2), we an assign a weight to eah vertex orresponding to the number of leaves in its left subtree. The sequene that results by reording these weights via an in-order traversal is the weight sequene introdued by Pallo [6]. An example is illustrated in Figure 3(). Pallo also shows a sequene w w 2... w n will orrespond uniquely to the weight sequene for a binary tree with n nodes if for eah i we have w i i, and for eah i w i + j i we have i w i j w j. Notie that this set of weight sequenes orresponds to a refletable language where x i = and y i = i. 4
5 proedure GrayCode (t) if (t > n) then Proess(w) else r := w t //w t will be either x t or y t GrayCode(t+) for eah z Σ {x t, y t } suh that w w t z is a prefix of some word in L n w t := z GrayCode(t+) end if (r = x t ) then w t := y t else w t := x t GrayCode(t+) Figure 4: Algorithm, GrayCode(t), to list all words of length n from a refletable language L in Gray ode order. 2.4 Open meandri systems We demonstrate that open meandri systems an be represented by a refletable language in Setion 4. 3 A Simple Gray Code Algorithm In this setion, we present a simple reursive algorithm to list L n (words of length n for some refletable language L) in Gray ode order. This algorithm generalizes independently developed algorithms for: binary strings [4], k-ary strings and ross produts [5, 3], restrited growth strings [3, 7], restrited growth tails [8], and binary [] and k-ary trees [2, 4]. These individual algorithms are still of interest, however, sine they often inlude extra effiieny onsiderations that are speifi to eah objet. For instane, adding data strutures to make the algorithm run in onstant amortized time or demonstrating a loop-free implementation. The basi idea behind the generi reursive algorithm is to apply the simple idea of refleting partiular subtrees that was disussed earlier. To do this, we use the speial haraters x i and y i as the first and last hildren of eah node at level i. The order of the other haraters (hildren) does not matter. This way, at the start of eah reursive all we an be sure that that the previous word generated had either the harater x i or y i at position i. Pseudoode is shown in Figure 4. The word being generated is stored in w = w w 2 w n. The urrent position is given by the parameter t and the variables x i and y i are speifi to the refletable language under onsideration as desribed in Definition 2.. To run the algorithm w 2 w n is initialized to x 2 x 3 x n, then for eah z Σ that starts a word in L n we assign w := z and all GrayCode(2). 5
6 To illustrate the algorithm, again reall the language S 3 whih onsists of all length 3 strings over the alphabet {a, b, } with no bb substring. By applying x i = a and y i =, the omputation tree that results from applying algorithm GrayCode(t) is given in Figure 2. Theorem 3.. For any refletable language L and given integer n, the algorithm GrayCode(t) will produe a list of all words L n in Gray ode order. Proof: First, it should be lear that every word in L n is generated exatly one by the algorithm. Thus, we need only show that suessive words in the resulting listing differ in exatly one position. Consider any two suh suessive words α = a a n and β = b b n. Suppose that their first ommon anestor in the omputation tree is at level i. Then a a i = b b i and a i+ b i+. Now sine the first reursive all in GrayCode(t) does not hange the value for urrent position t and sine the last reursive all never leads to a dead end, we must have a i+2 a n = b i+2 b n. Thus, every pair of suessive words generated will differ in exatly one position, i.e., the listing is a Gray ode. 3. Analyzing the generi Gray ode algorithm To analyze the generi Gray ode algorithm GrayCode(t), we perform an amortized analysis omparing the running time to the number of objets generated. For this analysis, the best we an hope for is an algorithm that runs in onstant amortized time. One assumption made in this analysis is that the time taken by the funtion Proess(w) is onstant, sine for many appliations this may be the ase. Now, fousing on the algorithm itself, observe that every non-leaf node in the omputation tree has at least two hildren sine reursive alls must be made for both x t and y t. Also, observe from the prefix test in the for loop that there will be no dead-ends, whih means that every leaf will be at level n of the omputation tree and will orrespond to a word in L n. Thus, if the time taken at eah internal node of omputation is proportional to the number of hildren (reursive alls made), then the overall running time will be proportional to the number of nodes in the omputation tree. Sine the branhing fator of eah internal node is at least 2, the number of leaves (words generated) will be greater than the number of internal nodes in whih ase the algorithm will run in onstant amortized time. Theorem 3.2. The algorithm GrayCode(t) runs in onstant amortized time if the following two onditions hold:. heking whether or not w w t z is a prefix of some word in L n takes O() time and 2. eah internal node in the omputation tree has Ω( Σ ) hildren. In several of the examples of refletable languages seen so for, the alphabet symbols that are possible at ertain positions in eah word may vary. Thus, in an analysis it may be more appropriate to onsider an alphabet Σ i for eah level i n of the omputation tree. The size of these alphabets ould then be applied to Theorem 3.2 rather than the more general alphabet Σ. 6
7 o d u d u o d u u (a) (b) Figure 5: (a) An open meander of order 6. (b) An open meandri system of order 6 with 3 urves. 4 A New Appliation: Open Meandri Systems An open meander an be thought of as an infinite meandering river whih passes beneath a series of bridges of an infinite straight road going from west to east. For example, Figure 5(a) illustrates an open meander with 6 bridges. Using a urve to represent the river and a line to represent the road, we an generalize the notion of an open meander by allowing multiple non-interseting urves to ross the line. Suh a onfiguration is alled an open meandri system (OMS). The order of an OMS is defined to be the number of times the urves ross the line. An example of an open meandri system of order 6 with 3 urves is shown in Figure 5(b). Enumeration sequenes for open meandri systems were studied by Baher [] and a fast algorithm for generating open meandri systems appears in [2]. The latter paper uses the alphabet Σ = {u,d,o,} to represent the four different types of rossings: u=up, d=down, o=open, =lose. Using this representation, eah OMS of order n an be represented uniquely by a word of length n over Σ as illustrated in Figure 5. Observe that any OMS of order n an always be extended into an OMS of order n + by appending either an o, d, or u. Only when adding a to an existing OMS is it possible that that a previously open urve an beome losed [2]. Thus, the language of all OMSs is refletable by setting x i =d and y i =u. The algorithm in [2] to generate all OMSs runs in onstant amortized time due to the introdution of data strutures that an test when it is possible to append a to an existing OMS in onstant time. Therefore, it is possible to diretly apply our generi Gray ode algorithm to onvert their lexiographi algorithm into a Gray ode algorithm. By applying the same data strutures the resulting Gray ode algorithm will ahieve the same asymptoti running time as the original algorithm. The result also follows from Theorem 3.2. Corollary 4.. A Gray ode for open meandri systems of order n an be generated in onstant amortized time. As an illustration of the resulting Gray ode algorithm, we show a partial omputation tree for n = 4 in Figure 6. The dead ends are shown by the dotted edges. For example, the words o, uo and oud are all invalid OMSs beause they inlude a losed urve. 7
8 d o u d o u u o d d o u u o d do uuoddo u uod do u uod do u uoddo uuod do uuoddo uuod do u do u uod do u uod do u Figure 6: The partial tree for OMS of order 4 that results from applying the generi Gray ode algorithm with x i =d and y i =u. Referenes [] R. Baher. Meander algebras. Prepubliation de l Institut Fourier, 478, 999. [2] B. Bobier and J. Sawada. A fast algorithm to generate open meandri systems. Manusript [3] G. Ehrlih. Loopless algoirthms for generating permutations, ombinations, and other ombinatorial onfigurations. Journal of the ACM, 20:500 53, 973. [4] F. Gray. Pulse ode ommuniation. U.S. Patent, , 953. [5] G. Manku and J. Sawada. A loopless Gray ode for minimal signed-binary representations. In Pro. 3th Annual European Symposium on Algorithms (ESA 2005) LNCS, pages , Ot [6] J. M. Pallo. Enumerating, ranking and unranking binary trees. The Computer Journal, 29(2):7 75, 986. [7] F. Ruskey. Combinatorial Generation. Manusript, 200. [8] F. Ruskey and C. Savage. Gray odes for set partitions and restrited growth tails. Australasian Journal of Combinatoris, 0:85 96, 994. [9] C. Savage. A survey of ombinatorial Gray odes. SIAM Review, 39(4): , 997. [0] M. Squire. Gray odes for a-free strings. Eletroni Journal of Combinatoris, 3(), 996. [] V. Vajnovszki. On the loopless generation of binary tree sequenes. Information Proessing Letters, 68:3 7,
9 [2] D. Roelants van Baronaigien. A loopless Gray-ode algorithm for listing k-ary trees. Journal of Algorithms, 35:00 07, [3] S. Williamson. Combinatorial for Computer Siene. Computer Siene Press, 985. [4] R. Wu, J. Chang, and Y. Wang. Ranking, unranking and loopless Gray-odes generation of t-ary trees. Manusript, [5] S. Zaks. Generation and ranking or k-ary trees. Information Proessing Letters, 4():44 48,
1. The collection of the vowels in the word probability. 2. The collection of real numbers that satisfy the equation x 9 = 0.
C HPTER 1 SETS I. DEFINITION OF SET We begin our study of probability with the disussion of the basi onept of set. We assume that there is a ommon understanding of what is meant by the notion of a olletion
More informationA DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR
Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and
More informationLearning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract
CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and
More informationExtracting Partition Statistics from Semistructured Data
Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk
More informationData Structures in Java
Data Strutures in Java Leture 8: Trees and Tree Traversals. 10/5/2015 Daniel Bauer 1 Trees in Computer Siene A lot of data omes in a hierarhial/nested struture. Mathematial expressions. Program struture.
More information1 The Knuth-Morris-Pratt Algorithm
5-45/65: Design & Analysis of Algorithms September 26, 26 Leture #9: String Mathing last hanged: September 26, 27 There s an entire field dediated to solving problems on strings. The book Algorithms on
More informationDrawing lines. Naïve line drawing algorithm. drawpixel(x, round(y)); double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx; double y = y0;
Naïve line drawing algorithm // Connet to grid points(x0,y0) and // (x1,y1) by a line. void drawline(int x0, int y0, int x1, int y1) { int x; double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx;
More informationApproximate logic synthesis for error tolerant applications
Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu
More informationThe Happy Ending Problem
The Happy Ending Problem Neeldhara Misra STATUTORY WARNING This doument is a draft version 1 Introdution The Happy Ending problem first manifested itself on a typial wintery evening in 1933 These evenings
More informationSystem-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications
System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis
More informationA Novel Validity Index for Determination of the Optimal Number of Clusters
IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers
More informationA Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering
A Novel Bit Level Time Series Representation with Impliation of Similarity Searh and lustering hotirat Ratanamahatana, Eamonn Keogh, Anthony J. Bagnall 2, and Stefano Lonardi Dept. of omputer Siene & Engineering,
More informationAlgorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking
Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient
More informationAutomatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)
Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University
More informationParallelizing Frequent Web Access Pattern Mining with Partial Enumeration for High Speedup
Parallelizing Frequent Web Aess Pattern Mining with Partial Enumeration for High Peiyi Tang Markus P. Turkia Department of Computer Siene Department of Computer Siene University of Arkansas at Little Rok
More informationLecture Notes of Möbuis Transformation in Hyperbolic Plane
Applied Mathematis, 04, 5, 6-5 Published Online August 04 in SiRes http://wwwsirporg/journal/am http://dxdoiorg/0436/am04555 Leture Notes of Möbuis Transformation in Hyperboli Plane Rania B M Amer Department
More informationPipelined Multipliers for Reconfigurable Hardware
Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,
More informationAn Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index
IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive
More informationA {k, n}-secret Sharing Scheme for Color Images
A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University
More informationAnalysis of input and output configurations for use in four-valued CCD programmable logic arrays
nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,
More informationCalculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem
Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion
More informationOn - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2
On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,
More informationHEXA: Compact Data Structures for Faster Packet Processing
Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for
More informationColouring contact graphs of squares and rectilinear polygons de Berg, M.T.; Markovic, A.; Woeginger, G.
Colouring ontat graphs of squares and retilinear polygons de Berg, M.T.; Markovi, A.; Woeginger, G. Published in: nd European Workshop on Computational Geometry (EuroCG 06), 0 Marh - April, Lugano, Switzerland
More informationDepartment of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY Fall Test I Solutions
Department of Eletrial Engineering and Computer iene MAACHUETT INTITUTE OF TECHNOLOGY 6.035 Fall 2016 Test I olutions 1 I Regular Expressions and Finite-tate Automata For Questions 1, 2, and 3, let the
More informationSAND Unlimited Release Printed November 1995 Updated November 29, :26 PM EXODUS II: A Finite Element Data Model
SAND92-2137 Unlimited Release Printed November 1995 Updated November 29, 2006 12:26 PM EXODUS II: A Finite Element Data Model Gregory D. Sjaardema (updated version) Larry A. Shoof, Vitor R. Yarberry Computational
More informationAbstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.
Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,
More informationOutline: Software Design
Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling
More informationA Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks
International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali
More informationBoosted Random Forest
Boosted Random Forest Yohei Mishina, Masamitsu suhiya and Hironobu Fujiyoshi Department of Computer Siene, Chubu University, 1200 Matsumoto-ho, Kasugai, Aihi, Japan {mishi, mtdoll}@vision.s.hubu.a.jp,
More informationC 2 C 3 C 1 M S. f e. e f (3,0) (0,1) (2,0) (-1,1) (1,0) (-1,0) (1,-1) (0,-1) (-2,0) (-3,0) (0,-2)
SPECIAL ISSUE OF IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION: MULTI-ROBOT SSTEMS, 00 Distributed reonfiguration of hexagonal metamorphi robots Jennifer E. Walter, Jennifer L. Welh, and Nany M. Amato Abstrat
More informationUnsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks
Unsupervised Stereosopi Video Objet Segmentation Based on Ative Contours and Retrainable Neural Networks KLIMIS NTALIANIS, ANASTASIOS DOULAMIS, and NIKOLAOS DOULAMIS National Tehnial University of Athens
More informationZ Combinatorial Filters: Sensor Beams, Obstacles, and Possible Paths
Z Combinatorial Filters: Sensor Beams, Obstales, and Possible Paths BENJAMIN TOVAR, Northwestern University FRED COHEN, University of Rohester LEONARDO BOBADILLA, University of Illinois JUSTIN CZARNOWSKI,
More informationDivide-and-conquer algorithms 1
* 1 Multipliation Divide-and-onquer algorithms 1 The mathematiian Gauss one notied that although the produt of two omplex numbers seems to! involve four real-number multipliations it an in fat be done
More informationAn Efficient Ranking Algorithm of t-ary Trees in Gray-code Order
The 9th Workshop on Combinatorial Mathematics and Computation Theory An Efficient Ranking Algorithm of t-ary Trees in Gray-code Order Ro Yu Wu Jou Ming Chang, An Hang Chen Chun Liang Liu Department of
More informationImplementing Load-Balanced Switches With Fat-Tree Networks
Implementing Load-Balaned Swithes With Fat-Tree Networks Hung-Shih Chueh, Ching-Min Lien, Cheng-Shang Chang, Jay Cheng, and Duan-Shin Lee Department of Eletrial Engineering & Institute of Communiations
More informationDynamic Algorithms Multiple Choice Test
3226 Dynami Algorithms Multiple Choie Test Sample test: only 8 questions 32 minutes (Real test has 30 questions 120 minutes) Årskort Name Eah of the following 8 questions has 4 possible answers of whih
More informationA radiometric analysis of projected sinusoidal illumination for opaque surfaces
University of Virginia tehnial report CS-21-7 aompanying A Coaxial Optial Sanner for Synhronous Aquisition of 3D Geometry and Surfae Refletane A radiometri analysis of projeted sinusoidal illumination
More informationParticle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating
Original Artile Partile Swarm Optimization for the Design of High Diffration Effiient Holographi Grating A.K. Tripathy 1, S.K. Das, M. Sundaray 3 and S.K. Tripathy* 4 1, Department of Computer Siene, Berhampur
More informationAlgorithms, Mechanisms and Procedures for the Computer-aided Project Generation System
Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department
More informationDetection and Recognition of Non-Occluded Objects using Signature Map
6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,
More informationEXODUS II: A Finite Element Data Model
SAND92-2137 Unlimited Release Printed November 1995 Distribution Category UC-705 EXODUS II: A Finite Element Data Model Larry A. Shoof, Vitor R. Yarberry Computational Mehanis and Visualization Department
More information特集 Road Border Recognition Using FIR Images and LIDAR Signal Processing
デンソーテクニカルレビュー Vol. 15 2010 特集 Road Border Reognition Using FIR Images and LIDAR Signal Proessing 高木聖和 バーゼル ファルディ Kiyokazu TAKAGI Basel Fardi ヘンドリック ヴァイゲル Hendrik Weigel ゲルド ヴァニーリック Gerd Wanielik This paper
More informationChromaticity-matched Superimposition of Foreground Objects in Different Environments
FCV216, the 22nd Korea-Japan Joint Workshop on Frontiers of Computer Vision Chromatiity-mathed Superimposition of Foreground Objets in Different Environments Yohei Ogura Graduate Shool of Siene and Tehnology
More informationNaïve Bayesian Rough Sets Under Fuzziness
IJMSA: Vol. 6, No. 1-2, January-June 2012, pp. 19 25 Serials Publiations ISSN: 0973-6786 Naïve ayesian Rough Sets Under Fuzziness G. GANSAN 1,. KRISHNAVNI 2 T. HYMAVATHI 3 1,2,3 Department of Mathematis,
More informationA Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks
A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr
More informationPerformance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application
World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah
More informationAccommodations of QoS DiffServ Over IP and MPLS Networks
Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering
More informationAdaptive Implicit Surface Polygonization using Marching Triangles
Volume 20 (2001), Number 2 pp. 67 80 Adaptive Impliit Surfae Polygonization using Marhing Triangles Samir Akkouhe Eri Galin L.I.G.I.M L.I.G.I.M Eole Centrale de Lyon Université Claude Bernard Lyon 1 B.P.
More informationIncremental Mining of Partial Periodic Patterns in Time-series Databases
CERIAS Teh Report 2000-03 Inremental Mining of Partial Periodi Patterns in Time-series Dataases Mohamed G. Elfeky Center for Eduation and Researh in Information Assurane and Seurity Purdue University,
More informationSequential Incremental-Value Auctions
Sequential Inremental-Value Autions Xiaoming Zheng and Sven Koenig Department of Computer Siene University of Southern California Los Angeles, CA 90089-0781 {xiaominz,skoenig}@us.edu Abstrat We study the
More informationA Unified Subdivision Scheme for Polygonal Modeling
EUROGRAPHICS 2 / A. Chalmers and T.-M. Rhyne (Guest Editors) Volume 2 (2), Number 3 A Unified Subdivision Sheme for Polygonal Modeling Jérôme Maillot Jos Stam Alias Wavefront Alias Wavefront 2 King St.
More informationTrajectory Tracking Control for A Wheeled Mobile Robot Using Fuzzy Logic Controller
Trajetory Traking Control for A Wheeled Mobile Robot Using Fuzzy Logi Controller K N FARESS 1 M T EL HAGRY 1 A A EL KOSY 2 1 Eletronis researh institute, Cairo, Egypt 2 Faulty of Engineering, Cairo University,
More informationZ Combinatorial Filters: Sensor Beams, Obstacles, and Possible Paths
Z Combinatorial Filters: Sensor Beams, Obstales, and Possible Paths BENJAMIN TOVAR, Northwestern University FRED COHEN, University of Rohester LEONARDO BOBADILLA, University of Illinois JUSTIN CZARNOWSKI,
More informationImproved Circuit-to-CNF Transformation for SAT-based ATPG
Improved Ciruit-to-CNF Transformation for SAT-based ATPG Daniel Tille 1 René Krenz-Bååth 2 Juergen Shloeffel 2 Rolf Drehsler 1 1 Institute of Computer Siene, University of Bremen, 28359 Bremen, Germany
More informationMulti-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality
INTERNATIONAL CONFERENCE ON MANUFACTURING AUTOMATION (ICMA200) Multi-Piee Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality Stephen Stoyan, Yong Chen* Epstein Department of
More informationDiffusion Kernels on Graphs and Other Discrete Structures
Diffusion Kernels on Graphs and Other Disrete Strutures Risi Imre Kondor ohn Lafferty Shool of Computer Siene Carnegie Mellon University Pittsburgh P 523 US KONDOR@CMUEDU LFFERTY@CSCMUEDU bstrat The appliation
More informationThe Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines
The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer
More informationSparse Certificates for 2-Connectivity in Directed Graphs
Sparse Certifiates for 2-Connetivity in Direted Graphs Loukas Georgiadis Giuseppe F. Italiano Aikaterini Karanasiou Charis Papadopoulos Nikos Parotsidis Abstrat Motivated by the emergene of large-sale
More information3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT?
3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? Bernd Girod, Peter Eisert, Marus Magnor, Ekehard Steinbah, Thomas Wiegand Te {girod eommuniations Laboratory, University of Erlangen-Nuremberg
More informationA Unique Common Fixed Point Theorem in Cone Metric Type Spaces
Universal Journal of Applied Mathematis (): 33-38, 03 DOI: 0.389/ujam.03.000 http://www.hrpub.org A Unique Common Fixed Point Theorem in Cone Metri Type Spaes K. P. R. Rao, G.N.V.Kishore,, P.R.Sobhana
More informationarxiv: v1 [cs.db] 13 Sep 2017
An effiient lustering algorithm from the measure of loal Gaussian distribution Yuan-Yen Tai (Dated: May 27, 2018) In this paper, I will introdue a fast and novel lustering algorithm based on Gaussian distribution
More informationQuery Evaluation Overview. Query Optimization: Chap. 15. Evaluation Example. Cost Estimation. Query Blocks. Query Blocks
Query Evaluation Overview Query Optimization: Chap. 15 CS634 Leture 12 SQL query first translated to relational algebra (RA) Atually, some additional operators needed for SQL Tree of RA operators, with
More informationMeasurement of the stereoscopic rangefinder beam angular velocity using the digital image processing method
Measurement of the stereosopi rangefinder beam angular veloity using the digital image proessing method ROMAN VÍTEK Department of weapons and ammunition University of defense Kouniova 65, 62 Brno CZECH
More informationVertex Unfoldings of Orthogonal Polyhedra: Positive, Negative, and Inconclusive Results
CCCG 2018, Winnipeg, Canada, August 8 10, 2018 Vertex Unfoldings of Orthogonal Polyhedra: Positive, Negative, and Inonlusive Results Luis A. Garia Andres Gutierrrez Isaa Ruiz Andrew Winslow Abstrat We
More informationFlow Demands Oriented Node Placement in Multi-Hop Wireless Networks
Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless
More informationDr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq
Volume 4 Issue 6 June 014 ISSN: 77 18X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om Medial Image Compression using
More informationImproved flooding of broadcast messages using extended multipoint relaying
Improved flooding of broadast messages using extended multipoint relaying Pere Montolio Aranda a, Joaquin Garia-Alfaro a,b, David Megías a a Universitat Oberta de Catalunya, Estudis d Informàtia, Mulimèdia
More informationMATH STUDENT BOOK. 12th Grade Unit 6
MATH STUDENT BOOK 12th Grade Unit 6 Unit 6 TRIGONOMETRIC APPLICATIONS MATH 1206 TRIGONOMETRIC APPLICATIONS INTRODUCTION 3 1. TRIGONOMETRY OF OBLIQUE TRIANGLES 5 LAW OF SINES 5 AMBIGUITY AND AREA OF A TRIANGLE
More informationRecommendation Subgraphs for Web Discovery
Reommation Subgraphs for Web Disovery Arda Antikaioglu Department of Mathematis Carnegie Mellon University aantika@andrew.mu.edu R. Ravi Tepper Shool of Business Carnegie Mellon University ravi@mu.edu
More informationUsing Augmented Measurements to Improve the Convergence of ICP
Using Augmented Measurements to Improve the onvergene of IP Jaopo Serafin, Giorgio Grisetti Dept. of omputer, ontrol and Management Engineering, Sapienza University of Rome, Via Ariosto 25, I-0085, Rome,
More informationContents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8
Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introdution... 1 1.1. Internet Information...2 1.2. Internet Information Retrieval...3 1.2.1. Doument Indexing...4 1.2.2. Doument Retrieval...4
More informationPERSISTENT NAMING FOR PARAMETRIC MODELS
PERSISTENT NAMING FOR PARAMETRIC MODELS Dago AGBODAN, David MARCHEIX and Guy PIERRA Laboratory of Applied Computer Siene (LISI) National Shool of Engineers in Mehanis and Aeronautis (ENSMA) Téléport 2
More informationNONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman
NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of
More informationPartial Character Decoding for Improved Regular Expression Matching in FPGAs
Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia
More informationCleanUp: Improving Quadrilateral Finite Element Meshes
CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)
More informationthe data. Structured Principal Component Analysis (SPCA)
Strutured Prinipal Component Analysis Kristin M. Branson and Sameer Agarwal Department of Computer Siene and Engineering University of California, San Diego La Jolla, CA 9193-114 Abstrat Many tasks involving
More informationVideo Data and Sonar Data: Real World Data Fusion Example
14th International Conferene on Information Fusion Chiago, Illinois, USA, July 5-8, 2011 Video Data and Sonar Data: Real World Data Fusion Example David W. Krout Applied Physis Lab dkrout@apl.washington.edu
More informationarxiv: v1 [cs.gr] 10 Apr 2015
REAL-TIME TOOL FOR AFFINE TRANSFORMATIONS OF TWO DIMENSIONAL IFS FRACTALS ELENA HADZIEVA AND MARIJA SHUMINOSKA arxiv:1504.02744v1 s.gr 10 Apr 2015 Abstrat. This work introdues a novel tool for interative,
More informationA Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks
A Dual-Hamiltonian-Path-Based Multiasting Strategy for Wormhole-Routed Star Graph Interonnetion Networks Nen-Chung Wang Department of Information and Communiation Engineering Chaoyang University of Tehnology,
More informationOptimization of Two-Stage Cylindrical Gear Reducer with Adaptive Boundary Constraints
5 JOURNAL OF SOFTWARE VOL. 8 NO. 8 AUGUST Optimization of Two-Stage Cylindrial Gear Reduer with Adaptive Boundary Constraints Xueyi Li College of Mehanial and Eletroni Engineering Shandong University of
More informationFacility Location: Distributed Approximation
Faility Loation: Distributed Approximation Thomas Mosibroda Roger Wattenhofer Distributed Computing Group PODC 2005 Where to plae ahes in the Internet? A distributed appliation that has to dynamially plae
More informationCapturing Large Intra-class Variations of Biometric Data by Template Co-updating
Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University
More informationAn Efficient and Scalable Approach to CNN Queries in a Road Network
An Effiient and Salable Approah to CNN Queries in a Road Network Hyung-Ju Cho Chin-Wan Chung Dept. of Eletrial Engineering & Computer Siene Korea Advaned Institute of Siene and Tehnology 373- Kusong-dong,
More informationWhat are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study
What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The
More informationCOST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY
COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY Dileep P, Bhondarkor Texas Instruments Inorporated Dallas, Texas ABSTRACT Charge oupled devies (CCD's) hove been mentioned as potential fast auxiliary
More information\A CENTRAL FACILITIES LOCATION PROBLEM INVOLVING TRAVELING SALESMAN TOURS AND EXPECTED DISTANCES/ MASTER OF SCIENCE
\A CENTRAL FACILITIES LOCATION PROBLEM INVOLVING TRAVELING SALESMAN TOURS AND EXPECTED DISTANCES/ by Thesis submitted to the Graduate Faulty of the Virginia Polytehni Institute and State University in
More informationVolume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm
More informationAustralian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message
ISSN:1991-8178 Australian Journal of Basi and Applied Sienes Journal home page: www.ajbasweb.om A new Divide and Shuffle Based algorithm of Enryption for Text Message Dr. S. Muthusundari R.M.D. Engineering
More information1. Introduction. 2. The Probable Stope Algorithm
1. Introdution Optimization in underground mine design has reeived less attention than that in open pit mines. This is mostly due to the diversity o underground mining methods and omplexity o underground
More informationTOWARD HYBRID VARIANT/GENERATIVE PROCESS PLANNING
Proeedings of DETC 97: 1997 ASME Design Engineering Tehnial Conferenes September 14-17,1997, Saramento, California DETC97/DFM-4333 TOWARD HYBRID VARIANT/GENERATIVE PROCESS PLANNING Alexei Elinson Dept.
More informationMultiple-Criteria Decision Analysis: A Novel Rank Aggregation Method
3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr
More informationOptimizing Correlated Path Queries in XML Languages. Technical Report CS November 2002
Optimizing Correlated Path Queries in XML Languages Ning Zhang and M. Tamer Özsu Tehnial Report CS-2002-36 November 2002 Shool Of Computer Siene, University of Waterloo, {nzhang,tozsu}@uwaterloo.a 1 Abstrat
More informationOn Optimal Total Cost and Optimal Order Quantity for Fuzzy Inventory Model without Shortage
International Journal of Fuzzy Mathemat and Systems. ISSN 48-9940 Volume 4, Numer (014, pp. 193-01 Researh India Puliations http://www.ripuliation.om On Optimal Total Cost and Optimal Order Quantity for
More informationExploring the Commonality in Feature Modeling Notations
Exploring the Commonality in Feature Modeling Notations Miloslav ŠÍPKA Slovak University of Tehnology Faulty of Informatis and Information Tehnologies Ilkovičova 3, 842 16 Bratislava, Slovakia miloslav.sipka@gmail.om
More informationINTERPOLATED AND WARPED 2-D DIGITAL WAVEGUIDE MESH ALGORITHMS
Proeedings of the COST G-6 Conferene on Digital Audio Effets (DAFX-), Verona, Italy, Deember 7-9, INTERPOLATED AND WARPED -D DIGITAL WAVEGUIDE MESH ALGORITHMS Vesa Välimäki Lab. of Aoustis and Audio Signal
More informationSmooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints
Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of
More informationCross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer
Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based
More information2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,
2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any urrent or future media, inluding reprinting/republishing this material for advertising
More informationIntra- and Inter-Stream Synchronisation for Stored Multimedia Streams
IEEE International Conferene on Multimedia Computing & Systems, June 17-23, 1996, in Hiroshima, Japan, p 372-381 Intra- and Inter-Stream Synhronisation for Stored Multimedia Streams Ernst Biersak, Werner
More information