Partial DNA Assembly: A Rate-Distortion Perspective

Size: px
Start display at page:

Download "Partial DNA Assembly: A Rate-Distortion Perspective"

Transcription

1 Partial DN embly: Rate-Ditortion Perpective Ilan Shomorony 1, ovinda M. Kamath 2, Fei Xia 3, homa. Courtade 1, and David N. e 2 1 Univerity of California, Berkeley, US, 2 Stanford Univerity, Stanford, US, 3 inghua Univerity, China. ilan.homorony@berkeley.edu, gkamath@tanford.edu, f12@mail.tinghua.edu.cn, courtade@berkeley.edu, dnte@tanford.edu. btract Earlier formulation of the DN aembly problem were all in the contet of perfect aembly; i.e., given a et of read from a long genome equence, i it poible to perfectly recontruct the original equence? In practice, however, it i very often the cae that the read data i not ufficiently rich to permit unambiguou recontruction of the original equence. While a natural generalization of the perfect aembly formulation to thee cae would be to conider a rate-ditortion framework, partial aemblie are uually repreented in term of an aembly graph, making the definition of a ditortion meaure challenging. In thi work, we introduce a ditortion function for aembly graph that can be undertood a the logarithm of the number of Eulerian cycle in the aembly graph, each of which correpond to a candidate aembly that could have generated the oberved read. We alo introduce an algorithm for the contruction of an aembly graph and analyze it performance on real genome. I. INRODUCION he cot of DN equencing ha been falling at a rate eceeding Moore law. he dominant technology, called hotgun equencing involve obtaining a large number of fragment called read from random location on the DN equence. hi technology come in two flavor: Short-read technologie, which generate read typically horter than 2 bae pair (bp), with error rate around 1%, with ubtitution being the primary form of error. Long-read technologie, which generate read of length around, bp, with error rate around 15%, with inertion and deletion being the primary form of error. he read obtained from either technology are then merged to each other baed on region of overlap uing an aembly algorithm to obtain an etimate of the DN equence. During the lat decade, everal uch algorithm were developed firt aimed at hort-read equencing technologie and, more recently, focued on long-read technologie. While thee approache attained varied degree of ucce in the aembly of many genome, very few of them are known to provide any kind of performance guarantee. theoretical framework to ae the performance of variou algorithm relative to the fundamental limit for DN aembly wa propoed in [1]. However, thi framework focue on perfect aembly; i.e., when the goal i to recontruct the whole genome perfectly. In particular, a critical read length `crit, defined a a function of the repeat pattern of a given genome [1, 2], i proved to be a fundamental lower bound for perfect aembly, and hown to be achievable by their propoed algorithm. Nonethele, for real genome, `crit can be very large, and read data for many practical DN equencing project doe not meet the information-theoretic lower bound from [1, 2], rendering the tak of perfect aembly fundamentally impoible. hi make the derivation of a theoretic framework to compare algorithm in term of partial aembly of paramount importance. he firt tep in contructing a theoretical framework for partial aembly i to elect an appropriate meaure of the quality of a partial aembly. Meauring the quality of partial aemblie i a challenging problem. In practice, a metric that i often ued i the N5. o decribe N5, recall that a contig i an unambiguou equence in a genome that an aembly return. he N5 of an aembly i then defined a the larget length ` uch that the um of the length of contig at leat ` long account for at leat half of the um of the length of all contig returned. hi i practically a very popular metric, becaue it doe not require knowledge of the ground truth genome (which i uually not known in practice) to compute. However, the fact that N5 doe not depend upon the ground truth genome make it mathematically unatifying. For eample, an algorithm could jut output a random tring over ={, C,, } of length 1 trillion and obtain an N5 of 1 trillion, depite the fact that the output i unrelated to the target genome. nother dicouraging apect of N5 i that it cannot capture what i known about the relative poition between the contig. In particular, contig are typically etracted from an aembly graph, which i baically a graph with the contig a vertice, and an edge from contig u to contig v if contig v come after one copy of contig u. N5 doe not account for any of the tructural information contained in uch a graph. In thi manucript, we introduce a ditortion metric that attempt to capture how good an aembly graph i. Roughly peaking, thi meaure coincide with the logarithm of the number of Eulerian cycle in the aembly graph. Intuitively, every Eulerian cycle correpond to a ditinct aembly and all of them eplain the data equally well; a uch, the ditortion repreent the miing information till needed for perfect aembly. o the bet of our knowledge, thi i the firt work in thi direction. With the yardtick defined, we then eek an aembly algorithm whoe performance can be characterized in term of the propoed ditortion meaure. While de Bruijn graphbaed algorithm [3] are better undertood from a theoretical tandpoint [1, 3], and would contitute better candidate for the ditortion analyi, they are not very relevant in the contet of aembly from long-read technologie. hi i due to their high enitivity to read error, which prevent them from leveraging the potential of long-read technologie (all of which have error rate above % and will continue to have for the foreeeable future [4, Section 1, 3]). In contrat, overlap-baed aembly approache (e.g., tring graph [5]) are better uited to longread, high-error equencing. hi cla of algorithm relie on the identification of long overlap between read, which i inherently robut to error [4], and ha been recently hown to attain the ame theoretical performance a de Bruijn graphbaed approache in term of perfect aembly [6]. In thi /16/$ IEEE 1799

2 work, we propoe a new overlap-baed aembly algorithm and introduce technique to provide theoretical guarantee in term of the new ditortion meaure. II. PROBLEM SEIN Let be a tring of ` ymbol from the alphabet = {, C,, }. We let = n be the length of the tring, and [i] be it ith ymbol. ubtring of i a contiguou interval of the ymbol in, and i denoted a [i : j], ([i], [i + 1],...,[j]). ubtring of the form [1 : `] i called a prefi (or an `-prefi) of. Similarly, a ubtring of the form [ ` +1: ] i a uffi (or an `-uffi) of. We ay that tring and y have an overlap of length ` if the `-uffi of and the `-prefi of y are equal. We let y denote the concatenation of and y. We aume that there eit an unknown target DN equence of length = which we wih to aemble from a et of N read R. hroughout the paper, we will make two implifying aumption about the et of read: (1) ll read in R have length L. (2) he read in R are error-free. he firt aumption i made to implify the epoition of the reult. he econd aumption i motivated by the eitence of overlapping tool (uch a Dligner [4]), which can efficiently identify ignificant matche between read at error rate of over 15%. he algorithm decribed in thi manucript can be adapted to work with the approimate matche found by uch tool, eentially by treating them a eact matche. For eae of epoition, we will aume that i a circular equence of length ; i.e., [t + ] =[t] for any t. hi way we will avoid edge effect and a read 2Rcan correpond to any ubtring [t : t + L 1], for t =1,...,. We will ue the tandard Poion ampling model for hotgun equencing. hi mean that each of the N read i drawn independently and uniformly at random from the et of length-l ubtring of, {[t : t + L 1] : t =1,...,}.. Repeat and Bridging repeat of length ` in i a ubtring 2 ` appearing at ditinct poition t 1 and t 2 in ; i.e., [t 1 : t 1 + ` 1] = [t 2 : t 2 + ` 1] =, that i maimal; i.e., [t 1 1] 6= [t 2 1] and [t 1 + `] 6= [t 2 + `]. repeat i bridged if there i a read that etend beyond one copy of the repeat in both direction, a hown in Fig. 1. repeat i doubly-bridged if both copie are bridged. Similarly, a triple repeat of length ` i a r 1 r 2 r 3 Fig. 1. Illutration of a bridged repeat in ; Illutration of a triple repeat all-bridged by read r 1, r 2 and r 3. ubtring that appear at three ditinct location in (poibly overlapping); i.e., [t 1 : t 1 + ` 1] = [t 2 : t 2 + ` 1] = [t 3 : t 3 + ` 1] = for ditinct t 1, t 2 and t 3 (modulo, given the circular DN aumption), and i maimal (that i, all three copie can not be etended in a direction). triple repeat i aid to be bridged if at leat one of it copie i bridged. It i aid to be all-bridged if all of it copie are bridged, a r illutrated in Fig. 1, and all-unbridged if none of it copie are bridged. III. DISORION MERIC FOR SSEMBLY RPHS o motivate our notion of ditortion for aembly graph, let u firt conider an idealized etting in which all read of length L from are given. We call thi enemble of read the L-mer compoition of, defined a the multiet C L () ={[i : i + L 1] : 1 apple i apple }. (1) We will let C L () repreent the upport of C L (); i.e., C L () without the copy count. he L-mer compoition C L () doe not, in general, determine unambiguouly. In particular, any equence with C L () =C L () i inditinguihable from when only C L () i oberved. hu, one require at leat log { : C L () =C L ()} (2) additional bit to determine unambiguouly from all other equence having the ame L-mer compoition. hi uncertainty characterization can be tranlated to the language of equence graph through the notion of a k-mer graph 1 of, B k () [3]. Definition 1. he multigraph B k () ha C k 1 () a it node et and, for, y 2 C k 1 (), we place m edge from to y if the k-mer y[k 1] ha multiplicity m in C k (). It i eay to ee that B k () i an Eulerian graph for any k, and every with C k () =C k () correpond to a ditinct Eulerian cycle in B k (). Furthermore, two Eulerian cycle that are ditinct up to edge multiplicitie correpond to ditinct equence. herefore, a natural meaure of the ditortion of B k () a an aembly graph of would be D k (), log ec(b k ()), (3) where ec() i the number of Eulerian cycle in, ditinct up to edge multiplicity. We point out that the number of Eulerian cycle in a k-mer graph ha been previouly ued in the related contet of DN-baed torage channel [7]. illutrated in Fig. 2, D k () can be computed for real Dk() lcrit k Fig. 2. D k () a a function of k, when i the genome of E. coli 536. Notice that D k () reache zero when k = `crit () [1]. genome, and can be interpreted a a lower bound on how good an aembly from read of length k can be. In the actual etting for the aembly problem, however, one doe not have acce to the entire L-mer compoition of, nor can be epected to perfectly contruct B k () for ome k < L (other than for mall value of k). Hence, when defining a ditortion metric for aembly graph, one mut conider a larger cla of graph than B k (). In thi work, we will conider the following: 1 In the aembly literature, uch graph are ometime referred to a de Bruijn graph. However, ince our propoed algorithm i not a de Bruijn graph baed algorithm in the uual ene of [3], we avoid the terminology. 18

3 C (c) C C (d) C where ec() i the number of Eulerian cycle in that are ditinct up to edge multiplicitie, and D 1 () i the ditortion achieved by the 1-mer graph of, B 1 (). We note that if contain all of {, C,, }, then D 1 () would be the ditortion achieved by the graph, hown in Figure 3. It i not difficult to ee that the ditortion of any ufficient equence graph i at mot D 1 (). Fig. 3 how the computation of thi ditortion in a toy eample. Fig. 3. he trivial equence graph i alway ufficient. (b,c,d) n eample of the ditortion computed for the aembly of a cyclic equence = C i hown. If the graph in i returned by an aembly algorithm, then a the graph i not a ufficient h equence i graph with repect to, the ditortion i computed to be log = If the 7 2,1,2,2 equence graph of order k =1in (c) i returned, then [] i a hown in (d). he ditortion i D(, ) =a there i eactly one Eulerian cycle in [] (modulo difference in travering edge between the ame two vertice). Definition 2. equence graph =(V,E, ) of order k i a directed multigraph where each edge e 2 E i labeled with a k-mer (e) 2 k, and each node v 2 V i labeled with a (k 1)-mer (v) 2 k 1 atifying the property that if (u, v) =, then (u) =[1 : k 1] and (v) =[2 : k]. Notice that any path p =(v 1,...,v`) on a equence graph of order k naturally define a length-(` 2+k) tring t(p), (v 1,v 2 )[1]... (v` 2,v` 1 )[1] (v` 1,v`). If a path p =(v 1,...,v`) end in a node with out-degree zero, it will be called a graph uffi, and if it tart in a node with in-degree zero, it will be called a graph prefi. Definition 3. Chinee Potman cycle in a equence graph, i a cycle that travere every edge at leat once. natural formulation for the genome aembly problem i to identify a Chinee Potman cycle in the contructed equence graph which correpond to the true equence [8, 9]. Definition 4. equence graph i aid to be ufficient (for the aembly of ) if it contain a Chinee Potman cycle c uch that t(c )= (up to cyclic hift). While it i natural to define the goal of the partial aembly problem to be the contruction of a ufficient equence graph, it i typically unreaonable to epect the aembly algorithm to correctly etimate the multiplicitie of all the edge; i.e., the number of time c travere each edge. he reaon i that the length of the genome i not known in advance, and hence neithe the coverage depth (i.e., the average number of read covering a given poition). Other practical iue like uneven coverage and equence pecific biae only add to the difficulty there. hu our ditortion metric hould not penalize incorrect multiplicitie, and thu not require the produced graph to be Eulerian. o define our ditortion metric, we will conider an Eulerian verion of the contructed equence graph. More preciely, if =(V,E, ) i a ufficient equence graph and c i a Chinee Potman cycle in correponding to the equence, we will let [] be the multigraph obtained by etting the multiplicity of edge e to be the number of time c travere e. Definition 5. he ditortion of a equence graph i 8 < log ec([]) if i a ufficient D(, ), equence graph for : D 1 ()+1 otherwie (4) IV. REEDY LORIHM FOR PRIL SSEMBLY In thi ection we decribe an algorithm to aemble a equence graph. We then analyze it performance in term of it ability to produce a ufficient equence graph and the reulting ditortion. he algorithm can be een a a generalization of the greedy algorithm for equence aembly []. In the tandard greedy algorithm, prefie and uffie of read are iteratively merged in order to produce a ingle equence. However, when an incorrect merging occur, it ha no way of detecting and fiing it at lateteration. Our algorithm overcome thi iue by allowing a read prefi/uffi to be merged to the interior of another read, or to a previouly merged prefi/uffi, a illutrated in Fig. 4. we will how, thi additional fleibility i helpful in contructing a ufficient equence graph in the ene of Definition 4, making the algorithm robut from the point of view of partial aembly. Fig. 4. In the greedy merging algorithm, we allow matche between a prefi/uffi of a read and the interior of another read, producing a graph that i not a line, a i the cae with the tandard greedy algorithm []; Initial equence graph for read CC, C, and C for k =3. Notice that a match of ` ymbol correpond to a path of ` k +1edge. Our algorithm will maintain at all time a equence graph in the ene of Definition 2, where each read 2Rcorrepond to a path p i with L k +2 node and L k +1 edge, which correpond to the L k +1 conecutive k-mer of. Initially, all N path will be dijoint component of the graph, a illutrated in Fig. 4.he algorithm then proceed by finding matche between a previouly unued prefi or uffi and any part of another read, and merging the correponding path. he algorithm i termed greedy ince it earche for matche in decreaing order of length. lgorithm 1 reedy merging algorithm 1: Input: Initial equence graph (Fig. 4), and parameter k 2: for ` = L, L 1,L 2,...,k do 3: X { 2 ` : i a current graph prefi or uffi that appean more than one read} 4: for 2 X do 5: Merge the path correponding to from all read that contain the ubtring 6: Output: Reulting equence graph of order k 181

4 # of triple repeat c = N L= riple repeat length ditribution for S. aureu riple repeat length Required coverage depth `crit Read length Fig. 5. Ditribution of triple repeat length on S. aureu, and coverage depth required for the condition in heorem 1 to be achieved with probability.99. he parameter k hould be choen a the minimum overlap we epect adjacent read to have, and can be made large for equencing eperiment with high coverage depth. Fontance, when aembling long read (, bp) with high error rate, a typical choice for the minimum match length k i [4]. We proceed to analyze the ditortion achieved by the equence graph that lgorithm 1 output in two tep. We firt obtain condition for the equence graph to be ufficient, and then characterize condition under which the reulting ditortion can be upper bounded by D k () for ome k>1. Definition 6. We ay that R k-cover the equence if there i a read tarting in every k-length ubtring of. heorem 1. lgorithm 1 contruct a ufficient equence graph of order k if the et of read R k-cover the equence and every triple repeat i either unbridged or all-bridged. decribed in Section V, given the condition in heorem 1, one can bound the probability that the graph produced by lgorithm 1 i not ufficient. hi bound can then be tranlated into a value of coverage depth c = N L/ for which the reulting equence graph i ufficient with a deired probability 1. hi i illutrated in Fig. 5 for the S. aureu genome from the E dataet [11]. We notice that for value of L that are far from the length of ome triple repeat, a mall coverage depth uffice. We remark that an intereting open quetion i to determine if the non-monotonicity caued by the peak in required coverage near triple repeat length (a hown in Fig. 5) repreent a fundamental barrier or a limitation of the algorithm. Mot eiting algorithm face challenge when there are triple repeat of length that are cloe to the read length. In fact, overlapbaed algorithm alo uffer from imilar problem when there are double repeat of length cloe to L. In addition to the ufficiency property guaranteed by heorem 1, we need a way to characterize the ditortion achieved by the reulting graph. o do o, we will bound the ditortion achieved by aembling read of length L by the quantity D q (), defined in (3), for ome q < L. We begin with a definition. Definition 7. wo repeat [a 1 : a 1 + `], [a 2 : a 2 + `] and [b 1 : b 1 + m], [b 2 : b 2 + m] are aid to be linked if a 2 <b 1 apple a 2 + ` +1. We call a 2 + ` +1 b 1 the link length. illutrated in Fig. 6, linked repeat are potential caue of ambiguity in the equence graph. heorem 2. Suppoe that the et of read R from the equence atifie the following condition: each triple repeat i either all-bridged or all-unbridged, [b 1 : b 1 + m] [a 1 : a 1 + `] [a 2 : a 2 + `] [b 2 : b 2 + m] Fig. 6. Illutration of linked repeat with link length a 2 + ` +1 b 1. If we merge both repeat in the equence graph, the link (red egment) create a path that i not in the true equence. all repeat of length apple q are doubly-bridged, (c) for all pair of linked repeat with link length ` atifying k 1 apple ` apple q, at leat one i doubly-bridged. hen the ufficient equence graph produced by lgorithm 1 ha a ditortion atifying D(, ) apple D q (). Notice that if all repeat in are doubly bridged, the condition in heorem 2 are atified for any q, implying that D(, ) =. he tandard greedy algorithm [], on the other hand, achieve perfect aembly when all repeat are bridged, not necearily doubly bridged [1]. Intuitively, the more tringent requirement of double bridging i the price paid to obtain guarantee in a range of L where the genome i much more repetitive. V. DISORION ON REL ENOME Clearly in practice we cannot verify whether the condition in heorem 1 and 2 are atified, a we do not have acce to the genome being equenced. he purpoe of thee reult i to allow u to compute the rate-ditortion tradeoff achieved by lgorithm 1 on previouly aembled genome. hi provide a framework to analyze the algorithm performance and compare it to the fundamental lower bound (or to other algorithm). For an organim whoe whole genome i known, we can compute repeat tatitic, which can then be ued to numerically compute the number of read N required to guarantee that the condition in heorem 1 hold with probability at leat 1, for ome target error probability > (ee [12] for detail). hi yield the curve in Fig. 5. Similarly, by identifying the ditribution of repeat length and characterizing which pair of repeat are linked, one can compute the probability that condition and (c) in heorem 2 are not atified for a given q. By computing D q () Ditortion Lower bound c=2 c= c=5 l crit Read length L Fig. 7. Ditortion achieved by lgorithm 1 with k =3on S. aureu with probability.99 for different coverage depth c = NL/, compared to the lower bound D L (). ap indicate that the probability of the condition of heorem 2 not being atified i at leat

5 y y Fig. 8. Subtring of and mapping to: ame egment in ; ditinct egment in correponding to an unbridged repeat. (c) If at iteration L ` the `-uffi of and the `-prefi of are not merged, they mut have been merged to ome read t i and t j in previou iteration. for a range of value of q, which can be done uing the wellknown BES heorem, we can upper bound the ditortion achieved by lgorithm 1 with a deired probability 1. Notice that D L () i alo the minimum ditortion that can be achieved with read of length L, which provide a lower bound to the ditortion that can be achieved by any algorithm. In Fig. 7 we how thee curve computed for S. aureu for different value of the coverage depth c = NL/. We notice that the upper bound curve follow the lower bound cloely but have gap in them, repreenting the range of L where the condition of heorem 1 are not atified with the deired probability, and the achieved ditortion jump to D 1 (). VI. PROOFS OF MIN RESULS Here, we provide proof ketche for the main reult in the paper. he longer verion of thi manucript [12] ha full proof.. Sufficiency of equence graph (heorem 1) Note that each r 2Rinduce a mapping between it ymbol and a egment of length L in, from where r wa ampled. Lemma 1. Suppoe that read and hare ubtring that (i) map to the ame tring in, a in Fig. 8, or (ii) map to two different tring in, which are part of an unbridged repeat, a hown in Fig. 8. t the end of iteration L ` of lgorithm 1, the path correponding to in and are merged. iven Lemma 1, heorem 1 follow immediately becaue, at the end of the algorithm, the overlapping part of any two conecutive read and +1 (which mut be of length at leat k when R k-cover ) mut be merged in the equence graph. Lemma 1 i proved by induction on = L 1,L 2,...,k. he bae cae follow ince, if read and have a matching ubtring of ize L 1, they mut correpond to a graph uffi or prefi in the beginning of the algorithm and will thu be merged, o aume the lemma hold up to = `+1. Suppoe and hare a ubtring with = ` and we are in cae (i). If lgorithm 1 doe not merge the path correponding to in and at iteration L `, it mut be the cae that a longer uffi of and a longer prefi of were merged to other read, ay t i and t j in previou iteration, a illutrated in Fig. 8(c). Now if the ubtring in t i (or t j ) map to the ame egment of a and, it ha an overlap greater than ` with both and and, by the induction hypothei, it i merged to both, cauing the path in and to be merged. Similarly, if the ubtring in t i and t j map to the ame egment of, by the induction hypothei, they have been previouly merged, cauing and to be merged a well. Finally, if the ubtring (c) t i t j in t i and t j map to two other egment in, i a triple repeat. Since i unbridged at the interection of and, by the aumption in heorem 1, it mut be all-unbridged. Hence, t i and t j are part of an unbridged repeat, and by the induction hypothei have been previouly merged to each other. Cae (ii) follow imilarly. B. Ditortion Bound (heorem 2) Firt we how that when the condition in heorem 2 are atified, lgorithm 1 can only merge two path if they either correpond to the ame egment in, or they correpond to an unbridged repeat (or a ubtring of it) in. imple proof by contradiction i ued to how thi. Fig. 9. Cycle equence graph (of order k = 1) for the equence CCCC; Contracted graph U(R) where U(R) correpond to the two pair of repeat hown in red and blue. We then conider the et of repeat in that are not doubly bridged by R, U(R), and define a ufficient equence graph U(R) by taking a cycle graph repreentation of and merging the repeat in U(R), a illutrated in Fig. 9. Uing the previou reult, we how that, the graph returned by lgorithm 1, can be converted to U(R) via node contraction. hi implie that there i a urjection between the et of Eulerian cycle in U(R) [] to the et of Eulerian cycle in []. hi thu give u that, D(, ) apple D( U(R), ). Finally we how that, when the condition of heorem 2 are met, any path of q k edge in U(R) correpond to a q-mer from C q (), the q-mer compoition of. hi directly give u that the equence correponding to any Eulerian cycle in U(R) [] ha q-mer compoition C q (). hi implie that D( U(R), ) apple D q (), which i the deired reult. REFERENCES [1]. Breler, M. Breler, and D. e, Optimal embly for High hroughput Shotgun Sequencing, BMC Bioinformatic, 213. [2] E. Ukkonen, pproimate String Matching with q-gram and maimal matche, heoretical Computer Science, vol. 92, no. 1, [3] P.. Pevzner, H. ang, and M. S. Waterman, n Eulerian path approach to DN fragment aembly, Proceeding of the National cademy of Science, vol. 98, no. 17, pp , 21. [4] E. W. Myer, Efficient local alignment dicovery amongt noiy long read, in lgorithm in Bioinformatic. Springer, 214, pp [5], he fragment aembly tring graph, Bioinformatic, vol. 21, pp , 25. [6] I. Shomorony, S. Kim,. Courtade, and D. e. Optimal embly via Spare Read-Overlap raph. [Online]. vailable: [7] H. M. Kiah,. J. Puleo, and O. Milenkovic, Code for DN equence profile, arxiv: , 215. [8] N. Nagarajan and M. Pop, Parametric compleity of equence aembly: theory and application to net generation equencing, Journal of computational biology, vol. 16, no. 7, pp , 29. [9] P. Medvedev, K. eorgiou,. Myer, and M. Brudno, Computability of model for equence aembly, in lgorithm in Bioinformatic. Springer, 27, pp [] J. arhio and E. Ukkonen, greedy approimation algorithm for contructing hortet common upertring, heoret. Comput. Science, vol. 57, pp , [11] [Online]. vailable: [12] I. Shomorony,. M. Kamath, F. Xia,. Courtade, and D. N. C. e, Partial DN embly: Rate-Ditortion Perpective, arxiv: , 216. C 183

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

A note on degenerate and spectrally degenerate graphs

A note on degenerate and spectrally degenerate graphs A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial

More information

Delaunay Triangulation: Incremental Construction

Delaunay Triangulation: Incremental Construction Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

xy-monotone path existence queries in a rectilinear environment

xy-monotone path existence queries in a rectilinear environment CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

Trainable Context Model for Multiscale Segmentation

Trainable Context Model for Multiscale Segmentation Trainable Context Model for Multicale Segmentation Hui Cheng and Charle A. Bouman School of Electrical and Computer Engineering Purdue Univerity Wet Lafayette, IN 47907-1285 {hui, bouman}@ ecn.purdue.edu

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

Quadrilaterals. Learning Objectives. Pre-Activity

Quadrilaterals. Learning Objectives. Pre-Activity Section 3.4 Pre-Activity Preparation Quadrilateral Intereting geometric hape and pattern are all around u when we tart looking for them. Examine a row of fencing or the tiling deign at the wimming pool.

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier a a The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each b c circuit will be decribed in Verilog

More information

Edits in Xylia Validity Preserving Editing of XML Documents

Edits in Xylia Validity Preserving Editing of XML Documents dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,

More information

How to Select Measurement Points in Access Point Localization

How to Select Measurement Points in Access Point Localization Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,

More information

An Intro to LP and the Simplex Algorithm. Primal Simplex

An Intro to LP and the Simplex Algorithm. Primal Simplex An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

3D SMAP Algorithm. April 11, 2012

3D SMAP Algorithm. April 11, 2012 3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative

More information

Shortest Path Routing in Arbitrary Networks

Shortest Path Routing in Arbitrary Networks Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

Algorithmic Discrete Mathematics 4. Exercise Sheet

Algorithmic Discrete Mathematics 4. Exercise Sheet Algorithmic Dicrete Mathematic. Exercie Sheet Department of Mathematic SS 0 PD Dr. Ulf Lorenz 0. and. May 0 Dipl.-Math. David Meffert Verion of May, 0 Groupwork Exercie G (Shortet path I) (a) Calculate

More information

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity

More information

Chapter S:II (continued)

Chapter S:II (continued) Chapter S:II (continued) II. Baic Search Algorithm Sytematic Search Graph Theory Baic State Space Search Depth-Firt Search Backtracking Breadth-Firt Search Uniform-Cot Search AND-OR Graph Baic Depth-Firt

More information

Lecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization

Lecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization Lecture Outline Global flow analyi Global Optimization Global contant propagation Livene analyi Adapted from Lecture by Prof. Alex Aiken and George Necula (UCB) CS781(Praad) L27OP 1 CS781(Praad) L27OP

More information

Planning of scooping position and approach path for loading operation by wheel loader

Planning of scooping position and approach path for loading operation by wheel loader 22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

Drawing Lines in 2 Dimensions

Drawing Lines in 2 Dimensions Drawing Line in 2 Dimenion Drawing a traight line (or an arc) between two end point when one i limited to dicrete pixel require a bit of thought. Conider the following line uperimpoed on a 2 dimenional

More information

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline Generic Travere CS 62, Lecture 9 Jared Saia Univerity of New Mexico Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v) from the bag if (v i unmarked) mark v; parent(v) = p;

More information

Bottom Up parsing. Bottom-up parsing. Steps in a shift-reduce parse. 1. s. 2. np. john. john. john. walks. walks.

Bottom Up parsing. Bottom-up parsing. Steps in a shift-reduce parse. 1. s. 2. np. john. john. john. walks. walks. Paring Technologie Outline Paring Technologie Outline Bottom Up paring Paring Technologie Paring Technologie Bottom-up paring Step in a hift-reduce pare top-down: try to grow a tree down from a category

More information

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt

More information

Contents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course:

Contents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course: Content Shortet path Algorithm and Network 21/211 The hortet path problem: Statement Verion Application Algorithm (for ingle ource p problem) Reminder: relaxation, Dijktra, Variant of Dijktra, Bellman-Ford,

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

arxiv: v1 [cs.ds] 27 Feb 2018

arxiv: v1 [cs.ds] 27 Feb 2018 Incremental Strong Connectivity and 2-Connectivity in Directed Graph Louka Georgiadi 1, Giueppe F. Italiano 2, and Niko Parotidi 2 arxiv:1802.10189v1 [c.ds] 27 Feb 2018 1 Univerity of Ioannina, Greece.

More information

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented

More information

Laboratory Exercise 2

Laboratory Exercise 2 Laoratory Exercie Numer and Diplay Thi i an exercie in deigning cominational circuit that can perform inary-to-decimal numer converion and inary-coded-decimal (BCD) addition. Part I We wih to diplay on

More information

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -

More information

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation

More information

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh

More information

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

Course Project: Adders, Subtractors, and Multipliers a

Course Project: Adders, Subtractors, and Multipliers a In the name Allah Department of Computer Engineering 215 Spring emeter Computer Architecture Coure Intructor: Dr. Mahdi Abbai Coure Project: Adder, Subtractor, and Multiplier a a The purpoe of thi p roject

More information

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II IEEE INFOCO 2002 1 Ditributed Partial Information anagement (DPI) Scheme for Survivable Network - Part II Dahai Xu Chunming Qiao Department of Computer Science and Engineering State Univerity of New York

More information

Chapter 13 Non Sampling Errors

Chapter 13 Non Sampling Errors Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption

More information

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT

More information

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique 202 International Conference on Frontier in Handwriting Recognition Building a Compact On-line MRF Recognizer for Large Character Set uing Structured Dictionary Repreentation and Vector Quantization Technique

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and Thi article appeared in a journal publihed by Elevier. The attached copy i furnihed to the author for internal non-commercial reearch and education ue, including for intruction at the author intitution

More information

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in VHL and implemented

More information

An Approach to a Test Oracle for XML Query Testing

An Approach to a Test Oracle for XML Query Testing An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

Multi-Target Tracking In Clutter

Multi-Target Tracking In Clutter Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and

More information

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov

More information

On the Use of Shadows in Stance Recovery

On the Use of Shadows in Stance Recovery On the Ue of Shadow in Stance Recovery Alfred M. Brucktein, 1 Robert J. Holt, 1 Yve D. Jean, 2 Arun N. Netravali 1 1 Bell Laboratorie, Lucent Technologie, Murray Hill, NJ 094 2 Avaya Communication, Murray

More information

Uninformed Search Complexity. Informed Search. Search Revisited. Day 2/3 of Search

Uninformed Search Complexity. Informed Search. Search Revisited. Day 2/3 of Search Informed Search ay 2/3 of Search hap. 4, Ruel & Norvig FS IFS US PFS MEM FS IS Uninformed Search omplexity N = Total number of tate = verage number of ucceor (branching factor) L = Length for tart to goal

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

Shortest-Path Routing in Arbitrary Networks

Shortest-Path Routing in Arbitrary Networks Ž. Journal of Algorithm 31, 105131 1999 Article ID jagm.1998.0980, available online at http:www.idealibrary.com on Shortet-Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vocking

More information

CS201: Data Structures and Algorithms. Assignment 2. Version 1d

CS201: Data Structures and Algorithms. Assignment 2. Version 1d CS201: Data Structure and Algorithm Aignment 2 Introduction Verion 1d You will compare the performance of green binary earch tree veru red-black tree by reading in a corpu of text, toring the word and

More information

Multicast with Network Coding in Application-Layer Overlay Networks

Multicast with Network Coding in Application-Layer Overlay Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 1, JANUARY 2004 1 Multicat with Network Coding in Application-Layer Overlay Network Ying Zhu, Baochun Li, Member, IEEE, and Jiang Guo Abtract

More information

Midterm 2 March 10, 2014 Name: NetID: # Total Score

Midterm 2 March 10, 2014 Name: NetID: # Total Score CS 3 : Algorithm and Model of Computation, Spring 0 Midterm March 0, 0 Name: NetID: # 3 Total Score Max 0 0 0 0 Grader Don t panic! Pleae print your name and your NetID in the boxe above. Thi i a cloed-book,

More information

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt

More information

A Practical Model for Minimizing Waiting Time in a Transit Network

A Practical Model for Minimizing Waiting Time in a Transit Network A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,

More information

arxiv: v3 [cs.cg] 1 Oct 2018

arxiv: v3 [cs.cg] 1 Oct 2018 Improved Time-Space Trade-off for Computing Voronoi Diagram Bahareh Banyaady Matia Korman Wolfgang Mulzer André van Renen Marcel Roeloffzen Paul Seiferth Yannik Stein arxiv:1708.00814v3 [c.cg] 1 Oct 2018

More information

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds * Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm

More information

SIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial

SIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial SIMIT 7 Component Type Editor (CTE) Uer manual Siemen Indutrial Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and

More information

Shortest Paths with Single-Point Visibility Constraint

Shortest Paths with Single-Point Visibility Constraint Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet

More information

A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED

A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED Jutin Domke and Yianni Aloimono Computational Viion Laboratory, Center for Automation Reearch Univerity of Maryland College Park,

More information

A Novel Feature Line Segment Approach for Pattern Classification

A Novel Feature Line Segment Approach for Pattern Classification 12th International Conference on Information Fuion Seattle, WA, USA, July 6-9, 2009 A Novel Feature Line Segment Approach for Pattern Claification Yi Yang Intitute of Integrated Automation Xi an Jiaotong

More information

The norm Package. November 15, Title Analysis of multivariate normal datasets with missing values

The norm Package. November 15, Title Analysis of multivariate normal datasets with missing values The norm Package November 15, 2003 Verion 1.0-9 Date 2002/05/06 Title Analyi of multivariate normal dataet with miing value Author Ported to R by Alvaro A. Novo . Original by Joeph

More information

IMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak

IMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak IMPROVED DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION Tak-Shing Wong, Charle A. Bouman, and Ilya Pollak School of Electrical and Computer Engineering Purdue Univerity ABSTRACT We propoe

More information

Representations and Transformations. Objectives

Representations and Transformations. Objectives Repreentation and Tranformation Objective Derive homogeneou coordinate tranformation matrice Introduce tandard tranformation - Rotation - Tranlation - Scaling - Shear Scalar, Point, Vector Three baic element

More information

else end while End References

else end while End References 621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized

More information

Exploring Simple Grid Polygons

Exploring Simple Grid Polygons Exploring Simple Grid Polygon Chritian Icking 1, Tom Kamphan 2, Rolf Klein 2, and Elmar Langetepe 2 1 Univerity of Hagen, Praktiche Informatik VI, 58084 Hagen, Germany. 2 Univerity of Bonn, Computer Science

More information

/06/$ IEEE 364

/06/$ IEEE 364 006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;

More information

UC Berkeley International Conference on GIScience Short Paper Proceedings

UC Berkeley International Conference on GIScience Short Paper Proceedings UC Berkeley International Conference on GIScience Short Paper Proceeding Title A novel method for probabilitic coverage etimation of enor network baed on 3D vector repreentation in complex urban environment

More information

Gray-level histogram. Intensity (grey-level) transformation, or mapping. Use of intensity transformations:

Gray-level histogram. Intensity (grey-level) transformation, or mapping. Use of intensity transformations: Faculty of Informatic Eötvö Loránd Univerity Budapet, Hungary Lecture : Intenity Tranformation Image enhancement by point proceing Spatial domain and frequency domain method Baic Algorithm for Digital

More information

A NEW APPROACH IN MEASURING OF THE ROUGHNESS FOR SURFACE CONSTITUTED WITH MACHINING PROCESS BY MATERIAL REMOVAL

A NEW APPROACH IN MEASURING OF THE ROUGHNESS FOR SURFACE CONSTITUTED WITH MACHINING PROCESS BY MATERIAL REMOVAL International Journal of Mechanical and Production Engineering Reearch and Development (IJMPERD) ISSN 49-689 Vol. 3, Iue, Mar 3, 4-5 TJPRC Pvt. Ltd. A NEW APPROACH IN MEASURING OF THE ROUGHNESS FOR SURFACE

More information

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks Nearly Contant Approximation for Data Aggregation Scheduling in Wirele Senor Network Scott C.-H. Huang, Peng-Jun Wan, Chinh T. Vu, Yinghu Li and France Yao Computer Science Department, City Univerity of

More information

The Data Locality of Work Stealing

The Data Locality of Work Stealing The Data Locality of Work Stealing Umut A. Acar School of Computer Science Carnegie Mellon Univerity umut@c.cmu.edu Guy E. Blelloch School of Computer Science Carnegie Mellon Univerity guyb@c.cmu.edu Robert

More information

A Boyer-Moore Approach for. Two-Dimensional Matching. Jorma Tarhio. University of California. Berkeley, CA Abstract

A Boyer-Moore Approach for. Two-Dimensional Matching. Jorma Tarhio. University of California. Berkeley, CA Abstract A Boyer-Moore Approach for Two-Dimenional Matching Jorma Tarhio Computer Science Diviion Univerity of California Berkeley, CA 94720 Abtract An imple ublinear algorithm i preented for two-dimenional tring

More information

np vp cost = 0 cost = c np vp cost = c I replacing term cost = c+c n cost = c * Error detection Error correction pron det pron det n gi

np vp cost = 0 cost = c np vp cost = c I replacing term cost = c+c n cost = c * Error detection Error correction pron det pron det n gi Spoken Language Paring with Robutne and ncrementality Yohihide Kato, Shigeki Matubara, Katuhiko Toyama and Yauyohi nagaki y Graduate School of Engineering, Nagoya Univerity y Faculty of Language and Culture,

More information

Growing Networks Through Random Walks Without Restarts

Growing Networks Through Random Walks Without Restarts Growing Network Through Random Walk Without Retart Bernardo Amorim, Daniel Figueiredo, Giulio Iacobelli, Giovanni Neglia To cite thi verion: Bernardo Amorim, Daniel Figueiredo, Giulio Iacobelli, Giovanni

More information

Distribution-based Microdata Anonymization

Distribution-based Microdata Anonymization Ditribution-baed Microdata Anonymization Nick Kouda niverity of Toronto kouda@c.toronto.edu Ting Yu North Carolina State niverity yu@cc.ncu.edu Diveh Srivatava AT&T Lab Reearch diveh@reearch.att.com Qing

More information

Web Science and additionality

Web Science and additionality Admin tuff... Lecture 1: EITN01 Web Intelligence and Information Retrieval Meage, lide, handout, lab manual and link: http://www.eit.lth.e/coure/eitn01 Contact: Ander Ardö, Ander.Ardo@eit.lth.e, room:

More information

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES MAKARA, TEKNOLOGI, VOL. 9, NO., APRIL 5: 3-35 3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES Mochammad Zulianyah Informatic Engineering, Faculty of Engineering, ARS International Univerity,

More information

Multiclass Road Sign Detection using Multiplicative Kernel

Multiclass Road Sign Detection using Multiplicative Kernel Proceeding of the Croatian Computer Viion Workhop, Year 1 Multicla Road Sign Detection uing Multiplicative Kernel Valentina Zadrija Mireo d. d. Zagreb, Croatia valentina.zadrija@mireo.hr Siniša Šegvić

More information

A CLUSTERING-BASED HYBRID REPLICA CONTROL PROTOCOL FOR HIGH AVAILABILITY IN GRID ENVIRONMENT

A CLUSTERING-BASED HYBRID REPLICA CONTROL PROTOCOL FOR HIGH AVAILABILITY IN GRID ENVIRONMENT Journal of Computer Science 10 (12): 2442-2449, 2014 ISSN: 1549-3636 2014 R. Latip et al., Thi open acce article i ditributed under a Creative Common Attribution (CC-BY) 3.0 licene doi:10.3844/jcp.2014.2442.2449

More information

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal

More information

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit

More information

arxiv: v1 [math.co] 18 Jan 2019

arxiv: v1 [math.co] 18 Jan 2019 Anti-Ramey number of path in hypergraph Ran Gu 1, Jiaao Li 2 and Yongtang Shi 3 1 College of Science, Hohai Univerity, Nanjing, Jiangu Province 210098, P.R. China 2 School of Mathematical Science and LPMC

More information

The Split Domination and Irredundant Number of a Graph

The Split Domination and Irredundant Number of a Graph The Split Domination and Irredundant Number of a Graph S. Delbin Prema 1, C. Jayaekaran 2 1 Department of Mathematic, RVS Technical Campu-Coimbatore, Coimbatore - 641402, Tamil Nadu, India 2 Department

More information

Markov Random Fields in Image Segmentation

Markov Random Fields in Image Segmentation Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image

More information