Cohesive Subgraph Mining on Attributed Graph

Size: px
Start display at page:

Download "Cohesive Subgraph Mining on Attributed Graph"

Transcription

1 Cohesive Sbgraph Mining on Attribted Graph Fan Zhang, Ying Zhang, L Qin, Wenjie Zhang, Xemin Lin QCIS, University of Technology, Sydney, University of New Soth Wales fanzhang.cs@gmail.com, {Ying.Zhang, L.Qin}@ts.ed.a, {zhangw, lxe}@cse.nsw.ed.a Abstract Finding cohesive sbgraphs is a fndamental graph problem with a wide spectrm of applications. In this paper, we investigate this problem in the context of attribted graph, where each vertex is associated with content (e.g., geo-locations, tags and eywords). To properly captre the cohesiveness of the vertices in a sbgraph from both graph strctre and vertices attribte perspectives, we advocate a novel cohesive sbgraph model, namely (,r)-core. In particlar, we adopt the poplar concept of -core as the strctral constraint sch that each vertex in a (,r)-core connects to at least other vertices. Meanwhile, there is a ser defined similarity threshold (i.e., similarity constraint) to ensre that the contents of the vertices in the same (,r)-core are similar to each other. We aim to devise efficient algorithms to enmerate all maximal (,r)-cores and find the maximm (,r)- core, where both problems are shown to be NP-hard. Effective end efficient prning techniqes are proposed to significantly redce the search space of two algorithms. Novel doble -core based pper bond comptation method is also devised to enhance the performance of the maximm (,r)-core comptation algorithm. According to the different natre of two mining algorithms, we devise effective search orders. Or comprehensive experiments on real-life data demonstrate that the maximal/maximm (,r)- cores enable s to find interesting cohesive sbgraphs, and the performance of two mining algorithms is significantly improved by or effective prning techniqes and smart search orders. I. INTRODUCTION Graph as an expressive data strctre is poplarly sed in a wide spectrm of applications. In many real-life graphs, besides the topological strctre of the graph, the attribte is associated with vertices to present their properties. For instance, the geo-locations of the sers are recorded in geosocial networs, and a set of eywords can be employed to describe ser s personal interests. Sch extension of the graph is nown as attribted graph. In recent years, there is a srge of interest to stdy a variety of graph problems sch as clstering and patten matching in the context of attribted graph where both graph strctre and vertex attribte are considered. In this paper, we stdy the problem of mining cohesive sbgraphs, namely (,r)-cores, on attribted graph. In general, we aim to identify sbgraphs whose vertices are closely related from both strctre and attribte perspectives. Regarding graph strctre, we adopt the -core model [] where each vertex connects to at least other vertices in the sbgraph (strctral constraint). The concept of -core has strong theoretical fondation in social stdy [2], [], and has been widely sed in many applications. From the attribte perspective, a set of vertices is cohesive if their pair-wise similarities are not smaller than a given threshold r (similarity constraint). Ths, given a nmber and a similarity threshold r, we say a connected sbgraph is a (,r)-core if and only if it satisfies both strctral and similarity constraints. To avoid the redndant reslts, we aim to enmerate the maximal (,r)-cores where a (,r)-core Fig.. Motivating Example is maximal if none of its spergraphs is a (,r)-core. Moreover, we are also interested in the maximm (,r)-core which has the largest size among all (,r)-cores. We motivate or wor with the following example. Example (Geo-social Graph): Sppose an organization or company wants to sponsor a nmber of grops to be continosly involved in a particlar activity sch as grop stdy and team collaboration, sally there are two ey criteria to evalate the goodness of the grop: ser engagement and ser similarity. In general, we hope each ser in a grop is liely to remain engaged and is similar to each other. As illstrated in Fig., we can model the IEEE members as a geo-social graph where the location of each individal is represented by a 2 dimensional point and there is a lin between two members if they are friends. According to the social stdy (e.g., [2], []), the incentive of a ser to remain in the grop can be natrally measred by the nmber of friends within the same grop. Moreover, grop members shold be physically close to each other sch that they can reglarly visit each other and do the face-to-face stdy together. Conseqently, two possible grops G 4 and G are not good candidate grops. Althogh the people in G 4 live in the same area, they hardly now each other and hence may be discoraged to be engaged. On the other hand, it is difficlt for people in G to meet each other althogh they are happy to see many friends in the same grop. The maximal (,r)-cores (i.e., G and G 2 in the example) can effectively provide nice candidate grops becase each people has at least friends in the same grop and their mtal distances are bonded. Note that althogh G is also a (,r)-core, it is less interesting becase it is flly contained by a larger grop G. Moreover, it is also desirable to now the largest possible nmber of people engaged in the same candidate grop (i.e., the size of the maximm (,r)-core). With similar argment, (,r)-core mining problem stdied in this paper can also help

2 to identify potential grops for some activities (e.g., grop based prodct promotion) in online social networ based on their friendships and personal interests. The above examples imply an essential need to efficiently enmerate the maximal (,r)-cores and find the maximm (,r)-core. As a matter of fact, sch a demand stems from many real applications sch as social networ, collaboration networ, and genetic interaction networ. In this paper, we formlate the problem of cohesive sbgraph mining and develop efficient and effective algorithms. Note that althogh there are many other cohesive/dense sbgraph models sch as cliqe [4], qasi-cliqe [], - trss [6] and densest sbgraph [7], [8], we find that the - core has been widely adopted as a poplar model to captre the cohesiveness of the sbgraph in graph analysis, which is theoretically nderpinned (e.g., game theory [2], []). Conseqently, we consider these cohesive/dense sbgraph models as a ftre extension of this wor. Challenges and Contribtions A straightforward soltion to or two mining problems is to first compte the -core of the graph and chec the strctral and similarity constraints for each possible sbgraph of the connected -core component. Althogh the linear algorithm for -core comptation [9] is readily available, it is costprohibitive to enmerate the possible sbgraphs. In this paper, we show that the problems of enmerating maximal (,r)-cores and finding maximm (,r)-core are both NP-hard becase of the two constraints involved. Conseqently, it is critical to devise efficient heristics to solve the problems on large scale attribted graph. Since or search process is essentially a bactracing algorithm following the branch and bond paradigm, we develop efficient techniqes to redce the search space of two mining problems. Following is the smmary of or principle contribtions. We advocate a novel cohesive sbgraph model for attribted graph, namely (,r)-core, to captre the cohesiveness of the sbgraph from both graph strctre and vertices attribte perspectives. We show the problems of enmerating maximal (,r)-cores and finding maximm (,r)-core are both NP-hard. (Section II) We develop efficient algorithm to enmerate maximal (,r)- cores with novel candidate prning, early termination and maximal checing techniqes. (Section IV) We also develop efficient algorithm to find the maximm (,r)-core. Particlarly, a novel doble -core based approach is proposed to derive tight pper bond for the size of the candidate soltion. (Section V) Based on some ey observations, we propose three search orders for enmerating maximal (,r)-cores, checing maximal (,r)-cores, and finding maximm (,r)-core algorithms. (Section VI) Or empirical stdies on real-life data demonstrate that interesting cohesive sbgraphs can be identified by maximal (,r)-cores and maximm (,r)-core. The extensive performance evalation shows that the techniqes proposed in this paper can significantly improve the performance of two mining algorithms. (Section VII) Section III presents a naive soltion for the two problems. Notation Definition G a simple attribted graph S,J,R indced sbgraph or corresponding vertices, v vertices in the attribted graph sim(, v) similarity between and v deg(, S) nmber of adjacent vertex of in S deg min(s) minimal degree of the vertices in S DP (, S) nmber of dissimilar vertexes of w.r.t S DP (S) nmber of dissimilar pairs of S SP (, S) nmber of similar vertexes of w.r.t S C candidate vertices set in the search M vertices chosen so far in the search E relevant exclsive vertices set in the search R(M,C) maximal (,r)-cores derived from M C TABLE I. THE SUMMARY OF NOTATIONS Section VIII reviews the related wor and Section IX concldes the paper. II. PRELIMINARIES In this section, we first formally introdce the concept of (,r)-core. Then we show the two problems are NPhard. Table I smmarizes the mathematical notations sed throghot this paper. A. Problem Definition We consider an ndirected, nweighted, and simple attribted graph G = (V, E, A), where V (G) (resp. E(G)) represents the set of vertices (resp. edges) in G, and A(G) denotes the attribte of the vertices. By sim(, v), we denote the similarity/distance of two vertices, v in V (G) which is derived based on their corresponding attribte vales (e.g., sers geo-locations and interests) sch as Jaccard similarity and Eclidean distance. For a given similarity threshold r, we say two vertices are dissimilar (resp. similar) if sim(, v) < r (resp. sim(, v) r). For a vertex and a set S of vertices, DP (, S) (resp. SP (, S)) denotes the nmber of other vertices in S which are dissimilar (resp. similar) to regarding the given similarity threshold r. Meanwhile, we se DP (S) denote the nmber of dissimilar pairs in S. We se S G to denote that S is an indced (attribted) sbgraph of G where E(S) E(G) and A(S) A(G). By deg(, S), we denote the nmber of adjacent vertices of in V (S). Then, deg min (S) is the minimal degree of the vertices in V (S). In this paper, we may se S to denote a set of vertices V (S) when the context is clear. Now we formally introdce two constraints, namely strctral constraint and similarity constraint, which describe the cohesiveness of the vertices of an attribted sbgraph from graph strctre and vertices attribte perspectives, respectively. Definition : Strctral Constraint. Given an integer, a sbgraph S satisfies the strctral constraint if deg(, S) for every vertex V (S),i.e., deg min (S). Definition 2: Similarity Constraint. Given a similarity threshold r, a sbgraph S satisfies the similarity constraint if DP (, S) = 0 for every vertex V (S); that is, there is no dissimilar pair of vertices among V (S) (i.e., DP (S) = 0). Following the convention, when the distance metric (e.g., Eclidean distance) is employed, we say two vertices are similar if their distance is smaller than the given distance threshold.

3 Besides the strctral and similarity constraints, we also enforce that the cohesive sbgraph is a connected graph. Below is the formal definition of (,r)-core. Definition : (,r)-core. Given a connected sbgraph S G, S is a (,r)-core if S satisfies both strctral and similarity constraints. In this paper, we aim to find all maximal (,r)-cores and following is the formal definition. Definition 4: Maximal (,r)-core. Given a connected sbgraph S G, S is a maximal (,r)-core if S is a (,r)-core of G and there exists no (,r)-core S of G sch that S S. We also investigate the problem of finding maximm (,r)- core, which is defined as follows. Definition : Maximm (,r)-core. Let R denote all (,r)-cores of the attribted graph G, a (,r)-core S G is maximm if V (S) V (S ) for every S R. Problem Statement. Given an attribted graph G, an integer and a similarity threshold r, we aim to develop efficient algorithms for the following two fndamental problems: (i) enmerate all maximal (,r)-cores in G; (ii) find the maximm (,r)-core in G. Example 2: In Fig., all vertices are from the -core with =. When we set the distance threshold r to 2 m, G, G 2 and G are three (,r)-cores. Besides, G and G 2 are maximal (,r)-cores while G is flly contained by G. Moreover, G is also the maximm (,r)-core. B. Problem Complexity We can compte -core in linear time by recrsively removing the vertices with degree less than [9]. Nevertheless, two problems stdied in this paper are NP-hard de to the additional similarity constraint. Theorem : The problems of enmerating all maximal (,r)-cores and finding maximm (,r)-core are NP-hard. Proof: Given a graph G(V, E), we constrct an attribted graph G (V, E, A) as follows. We have V (G ) = V (G) and G is a complete graph. More specifically, A() = {e} for each V (G ) where e is the adjacent edges of in G. Sppose the Jaccard similarity is employed and we set sim(, v) = A() A(v) A() A(v) for vertices and v in V (G ). Let similarity threshold r = ɛ where ɛ is an infinite small positive nmber, we have sim(, v) r if the edge (, v) E(G), and otherwise sim(, v) = 0 < r. Since G is a complete graph, i.e., every sbgraph S G with S satisfies the strctral constraint, the problem of deciding whether there is a -cliqe on G can be redced to the problem of finding a (,r)-core on G with r = ɛ, and hence can be solved by the problem of enmerating all maximal (,r)-cores or finding maximm (,r)-core. Conseqently, Theorem holds de to the NP-hardness of the -cliqe problem [4]. A. Naive Soltion III. WARM UP For the ease of nderstanding, we start with a straightforward set enmeration approach where the psedo-code Algorithm : EnmerateMKRC(G,, r) Inpt : G : attribted graph, : degree threshold, r : similarity threshold Otpt : M : Maximal (,r)-cores for each edge (, v) in E(G) do 2 Remove edge (, v) from G If sim(, v) < r; S -core(g); 4 R := ; for each connected sbgraph S in S do 6 NaiveEnm(, S); 7 for each R in R do 8 if there is a R R s.t. R R then 9 R := R \ R; 0 retrn R Algorithm 2: NaiveEnm(M, C) Inpt : M : chosen vertices, C : candidate vertices Otpt : R : (,r)-cores if C = and deg min(m) and DP (M) = 0 then 2 R := R R If R is a connected graph; else 4 choose a vertex in C; NaiveEnm(M, C \ ); /* Expand */; 6 NaiveEnm(M, C \ ); /* Shrin */; is given in Algorithm. At initial stage (Line -2), we remove the edges in E(G) whose corresponding vertices are dissimilar, and then compte the -core of the graph G which reslts in a set S of connected sbgraphs. For each connected sbgraph S S, Procedre NaiveEnm (Line 6) identifies all possible (,r)-cores by enmerating and validating all indced sbgraphs of S. Lines 7-9 eliminate the non-maximal (, r)- cores by checing all (,r)-cores. In NaiveEmn procedre (Algorithm 2), two vertices sets M and C are incrementally maintained to eep the chosen vertices and candidate vertices dring the search, respectively. As shown in Fig. 2, the enmeration process corresponds to a binary search tree with 2 S leaf nodes where each leaf node represents a sbset of S. In each non-leaf node, there are two branches where the chosen vertex will be extended to M (expand branch) and be exclded from M (shrin branch), respectively. Fig. 2. Example of the Search Tree Algorithm Correctness. We can safely remove the dissimilar edges (i.e., their corresponding vertices are dissimilar) since they will not be considered in the (,r)-core comptation de to the similarity constraint. Becase of the strctral constraint and the fact that the sbgraphs S obtained at Line are disjoint, for any (,r)-core R in G, there is one and only one connected sbgraph S from S with R S. Conseqently, we

4 can identify all (,r)-cores by enmerating and validating all possible sbsets of each S in Algorithm 2. Since all possible sbsets of S (i.e., 2 S leaf nodes) are enmerated in the corresponding search tree, any (,r)-core R from the sbgraph S will be accessed exactly once dring the search. Together with the strctral/similarity constraints and maximal property validation, we can otpt with all maximal (,r)-cores. Algorithm can immediately find the maximm (,r)-core by retrning the maximal (,r)-core with the largest size. B. Analysis It is cost-prohibitive to enmerate all sbsets of each - core sbgraph S in Algorithm. Since the search process is essentially a bactracing tree search, we need to develop new techniqes to redce the search space. Below, we briefly discss how to improve the performance of two mining algorithms from the following five perspectives. Redcing candidate size. In Algorithm, each vertex chosen from the candidate C leads to two branches which will explicitly inclde and exclde from the corresponding sb-tree searches. In this paper, we aim to redce the candidate size by explicitly/implicitly exclde vertices in C. Early termination. In Algorithm, we chec the maximal property after the candidate set C is empty. Nevertheless, if we can predicate that all possible (,r)-cores derived in the sbtree are not maximal, the crrent search can be terminated. For instance, sppose we find that an vertex is exclded regarding the crrent search node, bt it can still contribte to every possible (,r)-core obtained from the sbtrees. This implies that we cannot come p with the maximal (,r)-core. In this paper, we careflly maintain some exclded vertices, especially the ones being explicitly exclded at the shrin branch, sch that the search may be terminated early. Efficient maximal chec. The performance of the maximal chec in Algorithm (Lines 7-9) may significantly drop when the nmber of possible (,r)-cores increases. Similar to the above early termination techniqe, we shold chec the maximal property by extending the crrent soltion R based on the exclded vertices. Tight pper bond for the core size. Regarding the problem of maximm (,r)-core, we shold tilize the largest size of the (,r)-cores seen so far to terminate search of some nonpromising sbtrees. To this end, it is critical to estimate the maximal size of the candidate soltion. Good Search Order. In Algorithm, we do not consider the visiting order of the vertices chosen from C as well as the order of two branches. Or empirical stdy shows that an improper search order may reslt in very poor performance, even if all of other advanced techniqes are employed. Considering the different natre of the problems, we shold devise effective search orders for enmeration, finding maximm, and checing maximal algorithms. IV. ENUMERATE MAXIMAL (K,R)-CORES In this Section, we propose the prning techniqes for enmeration algorithm. Specifically, Section IV-A, Section IV-B, and Section IV-C introdce the candidate redcing, early termination, and maximal chec techniqes, respectively. Then the advanced enmeration procedre is presented in Section IV-D. Section IV-E pts the above techniqes together to enmerate all maximal (,r)-cores. Note that we defer the discssion of the search orders of the algorithms to Section VI. A. Redcing Candidate Size In this Sbsection, we present prning techniqes to explicitly/implicitly exclde some vertices from C. () Eliminate Candidates. Intitively, when a vertex in C is assigned (i.e., expand branch) to M or discarded (i.e., shrin branch), we shall recrsively remove some non-promising vertices from C de to the strctral and similarity constraints. Formally speaing, let R(M, C) denote the set of maximal (,r)-cores derived based on M C, we say a vertex C is non-promising if R(M, C) = R(M, C \ ); that is, will contribte to none of the maximal (,r)-cores in the sbtree of the search. Following two prning rles are immediate based on the definition of (,r)-core. Theorem 2: Strctral based prning. We can discard a vertex in C if deg(, M C) <. Theorem : Similarity based prning. We can discard a vertex in C if DP (, M) > 0. Candidate Prning Algorithm. If the chosen vertex is extended to M (i.e., from the expand branch), we first apply the similarity prning rle (Theorem ) to exclde vertices in C which are dissimilar to. Otherwise, none of the vertices will be discarded by similarity constraint when we follow the shrin branch. De to the removal of vertices from C (expand branch) or (shrin branch), we condct the strctral based prning by compting -core for vertices in C M. Note that the search terminates if any vertex in M is discarded. It taes O( C ) time to find dissimilar vertices of from C. De to the -core comptation, the strctral based prning taes linear time to the nmber of edges in the indced graph of M C. Example : In Fig., we have M = { 0 } and C = {,..., 9 }. Sppose is chosen from C. Following the expand branch, will be extended to M and then 9 will be prned de to the similarity constraint. The we need remove 8 as deg( 8, M C) <. Regarding the shrin branch, is explicitly discarded, which in trn leads to the deletion of de to strctral constraint. After applying the candidate prning, following two important invariants always hold at each search node nless the search is terminated. Similarity Invariant. We have DP (, M C) = 0 for every vertex M () That is, M satisfies the similarity constraint regarding M C. Degree Invariant. We have deg min (M C) (2) That is, M and C together satisfy the strctral constraint.

5 M : C : E: Fig.. Prning Candidates Fig. 4. Retaining Candidates Fig.. Early Termination Fig. 6. Maximal Chec (2) Retain Candidates. In addition to explicitly prning some non-promising vertices, we may implicitly redce the candidate size by not choosing some vertices from C. In this paper, we say a vertex is similarity free w.r.t C if is similar to all vertices in C, i.e., DP (, C) = 0. By SF (C) we denote the set of similarity free vertices in C. Intitively, similarity free vertices are welcomed in the sense that they never violate the similarity constraint in the following sbtree search. The theorem below indicates that we do not need to explicitly choose vertices in SF (C) dring the search. Theorem 4: Given that the prning techniqes are applied in each search step, we only need to consider to choose vertices from SF (C). Moreover, M C is a (,r)-core if we have C = SF (C). Proof: For every vertex SF (C), we have DP (, M C) = 0 de to the similarity invariant of M (Eqation ) and the definition of SF (C). Let M and C denote the corresponding chosen set and candidate after is chosen for expansion. Similarly, we have M 2 and C 2 if goes to the shrin branch. We have M 2 M and C 2 C, becase there is no discarded vertices when is extended to M while some vertices may be eliminated de to the removal of in the shrin branch. This implies that R(M 2, C 2 ) R(M, C ). Conseqently, we do not need to explicitly discard as shrin branch of is seless, and hence we can simply retain in C in the following comptation. On the other hand, C = SF (C) implies every vertex in M C satisfies the similarity constraint. Moreover, also satisfies the strctral constraint de to the degree invariant (Eqation 2) of M C. Conseqently, M C is a (,r)-core. Note that a vertex SF (C) may be discarded in the following search de to the strtral constraint. Otherwise, it is moved to M when the condition SF (C) = C holds. For each vertex in C, we can pdate DP (, C) in a passive way when its dissimilar vertices is eliminated from the comptation. Ths it taes O(n d ) time in the worst case where n d denote the nmber of dissimilar pairs in C. Remar : With similar rationale, we can move a vertex directly from C to M if it is similarity free (i.e., SF (C)) and is adjacent to at least vertex in M. As this validation rle is trivial, it will be sed in this paper withot frther mentioning. Example 4: In Fig. 4, sppose we have M = { 0, 2,, 7 }, C = {,, 4, 6, 8, 9 }. In or following rnning examples, and 9 are only dissimilar pairs in the example, and we have SF (C) = {, 4, 6, 8 }. Note that we may directly move { 4, 6 } to M since deg( 4, M) and deg( 6, M). B. Early Termination Trivial Early Termination. There are two trivial early termination rles. As discssed in Section IV-A, we immediately terminate the search if any vertex in M is discarded de to the strctral constraint. On the other hand, the search is terminated if M is disconnected to C. They will be applied in this paper withot frther mentioning. In addition to identifying the sbtree which cannot come p with (,r)-core, we frther redce the search space by identifying the sbtrees which cannot lead to maximal (,r)- core. Intitively, we aim to find some discarded vertices sch that they can immediately integrate to every (,r)-core derived from this search node and hence lead to a larger (,r)-core. In this way, we may safely ct-off the sbtree. By E, we denote the related exclded vertices set for a search tree node where the discarded vertices dring the search are ept if they are similar to M, i.e., DP (v, M) = 0 for every v E and E (M C) =. Moreover, We se SF C (E) denote the similarity free vertices in E w.r.t the set C; that is, DP (, C) = 0 for every SF C (E). Similarly, by SF C E (E) we denote the similarity free vertex in E w.r.t the set E C. Theorem : Early Termination Rle. We terminate the crrent search if one of the following two conditions hold: (i) there is a vertex SF C (E) with deg(, M) ; (ii) there is a set U SF C E (E), sch that deg(, M U) for every vertex U. Proof: (i) We show that every (,r)-core derived from crrent M and C (i.e., R(M, C)) can come p with a larger (,r)-core by attaching the vertex. For any R R, we have deg(, R) becase deg(, M) and M V (R). also satisfies the similarity constraint based on the facts that SF C (E) and R M C. Conseqently, V (R) {} is a (,r)-core. (ii) We have the correctness of condition (ii) with the similar rationale. The ey idea is that for every U, satisfies the strctral constraint becase deg(, M U) ; and also satisfies the similarity constraint becase U SF E C (E) implies that DP (, U R) = 0. Early termination chec. It taes O( E ) time to chec the condition (i) of Theorem by one scan of the vertices in SF C (E) 2. Regarding the condition (ii), we may condct - core comptation on M SF C E (E) to see if a sbset of SF C E (E) are inclded in the -core. The time complexity is O(n e ) where n e is the nmber of edges in the indced graph of A where A = M C E. 2 Note that, instead of one vertex, we may achieve better prning effect by trying a sbset of vertices. Bt this is not cost-effective.

6 Example : In Fig., sppose we have M = { 0,, 7 }, C = {, 8 } and E = {, 2, 4, 6, 9 }. Recall that and 9 are the only dissimilar pair in this rnning example. Therefore, we have SF C (E) = {, 2, 4, 6, 9 } and SF C E (E) = { 2, 4, 6 }. According to Theorem (i), the search is terminated becase there is a vertex 4 SF C (E) with deg( 4, M). We may also terminate the search according to Theorem (ii) becase we have U = { 2, 6 } SF C E (E) sch that deg( 2, M U) and deg( 6, M U). C. Maximal Chec In Algorithm (Lines 7-9), we need validate the maximal property based on all (,r)-cores of G. The cost significantly increases with the nmber and the average size of the (,r)- cores. Similar to the early termination techniqe, we have the following rle to chec maximal property. Theorem 6: Checing Maximal. Given a (,r)-core R, we claim that R is a maximal (,r)-core if there doesn t exist a non-empty set U E sch that R U is a (,r)-core, where E is the exclded vertices set when R is generated. Proof: According to the definition of the exclded vertices set E, it contains all discarded vertices which are similar to M. For any (,r)-core R which flly contains R, we have R E R becase R = M and C = ; that is, the vertices otside of E R cannot contribte to R. Therefore, we can safely claim that R is maximal if we cannot find R among E R. Example 6: In Fig. 6, we have C =, M = { 0, 2, 4,, 6, 7 } and E = {,, 8, 9 }. Here M is a (,r)- core, bt we can frther extend and to M, and come p with a larger (,r)-core. Hence, M is not a maximal (,r)-core. Since the maximal chec algorithm is similar to or advanced enmeration algorithm, we delay the details of the algorithm to Section IV-D. Remar 2: As a matter of fact, the early termination techniqe can be regarded as a lightweight version of maximal chec, which attempts to terminate the search before a (,r)- core is constrcted. D. Advanced Enmeration Method Algorithm : AdvancedEnm(M, C, E) Inpt : M : chosen vertices set, C : candidate vertices set, E : relevant exclded vertices set Otpt : R : maximal (,r)-cores Update C and E based on candidate prning techniqes (Theorem and Theorem 2); 2 Retrn If crrent search can be terminated (Theorem ); if C = SF (C) (Theorem 4) then 4 M := M C; R := R M If ChecMaximal(M, E ) (Theorem 6); 6 else 7 a vertex in C \ SF (C) (Theorem 4); 8 AdvancedEnm(M, C \, E); 9 AdvancedEnm(M, C \, E ); Note that we cannot confirm the maximal property based on the (,r)-cores seen so far. In Algorithm, we present the psedo code of or advanced enmeration algorithm which integrates the techniqes proposed in previos Sbsections. We first apply the candidate prning algorithm in Section IV-A to eliminate some vertices based on strctral/similarity constraints. Note that the search immediately terminates if any vertex in M is eliminated. Besides C, we also pdate E by inclding discarded vertices and removing the ones which are not similar to M. Then Line 2 may terminate the search based on or early termination rle. If the condition C = SF (C) holds, M C is a (,r)-core according to Theorem 4, and we can condct maximal chec (Lines -). Otherwise, Lines 7-9 choose one vertex from C \ SF (C) and contine the search following two branches, where three set M, C and E are pdated accordingly. Algorithm 4: ChecMaximal(M, C) Inpt : M : chosen vertices, C : candidate vertices Otpt : ismax : tre if M is a maximal (,r)-core Update C based on similarity and strctral constraint; 2 if M is a (,r)-core then Exit the algorithm with ismax = false If M < M ; 4 else if C > 0 then a vertex in C; 6 ChecMaximal(M, C \ ); 7 ChecMaximal(M, C \ ); Chec Maximal Algorithm. According to Theorem 6, we need to chec if some vertices in E can be inclded into crrent (,r)-core, denoted by M, and lead to a larger (,r)-core. This can be regarded as the process of frther exploring the search tree by treating E as candidate C (Line of Algorithm ). Algorithm 4 presents the psedo code of or maximal chec algorithm. Similar to the enmeration algorithm, we need to pdate C according to strctral and similarity constraints. Once M is a (,r)-core with size larger than M, we can claim M is not a maximal (,r)-core. Otherwise, we need to explore two possible sbtrees and confirm M is a maximal (,r)-core if we eventally cannot find a larger (,r)-core. E. Enmerate All Maximal (,r)-cores To enmerate all maximal (,r)-cores of G, we need to replace the NaiveEnm procedre (Line 2) in Algorithm by or advanced enmeration method (Algorithm ). Moreover, the naive maximal chec process (Line 7-9) is not necessary since maximal chec is already condcted by or enmeration procedre (Algorithm ). Algorithm Correctness. Section III-A shows the correctness of the Algorithm where none of or prning techniqes is applied. Section IV-A confirms that or candidate size redcing and early termination techniqes can safely exclde some vertices from frther comptation; that is, we can reach all maximal (,r)-cores on the prned search tree. Each nonmaximal (,r)-cores will be discarded by either maximal chec techniqe or early termination techniqe. Moreover, the search order of the algorithms will not affect their correctness. Ths, the correctness of or enmeration algorithm follows. Time Complexity. Let n e and n d denote the total nmber of edges and dissimilar pairs in M C E. According to analysis of candidate size redcing and early termination techniqes, it

7 taes O(n e + n d ) times at each search node 4 in the worst case. Another isse is the comptation of the dissimilar pairs. To spport general similarity metric, we do not consider the indexing of the vertices attribte (e.g., R-tree and M-tree). Ths, we need to materialize the dissimilar pairs based on pair-wise comptation. In or implementation, we compte the pair-wise similarity of the vertices for the following search when the first vertex is inserted into M (i.e., M = ) with time complexity O(n v + n 2 p) where n v is the nmber of vertices in S (Line of Algorithm ) and n p is the nmber of similar pairs of in S. V. FIND MAXIMUM (K,R)-CORE In this Section, we first introdce the pper bond based algorithm to find maximm (,r)-core. Then a novel doble -core approach is proposed to derive tight pper bond of the (,r)-core size. Algorithm : FindMaximm(M, C, E) Inpt : M : chosen vertices set, C : candidate vertices set, E : relevant exclded vertices set Otpt : R : the largest (,r)-core seen so far Update C and E; Early terminate if possible; 2 if KRCoreSizeUB(M, C) R then if C = SF (C) then 4 R := M C; A. Algorithm else choose a vertex in C \ SF (C); if Expansion is preferred then FindMaximm(M, C \, E); FindMaximm(M, C \, E ); else FindMaximm(M, C \, E ); FindMaximm(M, C \, E); Algorithm presents the psedo code of finding the maximm (,r)-core, where R denote the largest (,r)-core seen so far. Compared with the enmeration algorithm (Algorithm ), there are three main differences. (i) Line 2 terminates the search if we find the crrent search is non-promising based on the pper bond of the core size, denoted by KRCore- SizeUB(M,C). (ii) We do not need to validate the maximal property. (iii) Besides the order of vertex visiting, the order of the two branches also matters for qicly identifying the large (,r)-core (Lines 6-2). We delay the discssion to Section VI. To find the maximm (,r)-core in G, we need to replace the NaiveEnm procedre (Line 2) in Algorithm by the above method (Algorithm ), and remove the naive maximal chec part (Line 7-9) of Algorithm. Moreover, in order to qicly find a (,r)-core with large size, we start the algorithm from the sbgraph S which has the vertex with highest degree. The maximm (,r)-core is identified when Algorithm terminates. 4 We can regard the maximal chec processing as the contine of the search by attaching vertices of E to C. Algorithm Correctness. Since Algorithm is essentially an enmeration algorithm with an pper bond based prning techniqe, the correctness of this algorithm is immediate if KRCoreSizeU B(M, C) at Line 2 is calclated correctly. Time Complexity. As shown in the Section V-B, we can efficiently compte the core size pper bond in O(n e + n s ) time where n s is the nmber of similar pairs w.r.t M C E. Conseqently, for each search node the time complexity of the maximm algorithm is same to that of enmeration algorithm. On the other hand, the nmber of search nodes of the maximm algorithm is mch less than that of enmeration algorithm in practice. This is becase the former can not only frther prne sbtrees by core size pper bond bt also avoid the checing maximal process. B. Size Upper Bond of (,r)-core We se R to denote the (,r)-core derived from M C. Then, M + C is obviosly an pper bond of R. However, it is very loose becase it does not consider the similarity constraint. Let G denote a new graph which connects the similar vertices of V (G), namely similarity graph. By J and J, we denote the indced sbgraph of vertices M C from graph G and similarity graph G, respectively. Clearly, we have V (J) = V (J ). Becase J is a cliqe if M is a (,r)-core, we can apply the maximm cliqe size estimation techniqes on J to derive the pper bond of R. K-core and color based methods [0] are two state-of-the-art techniqes for maximm cliqe size estimation. Below, we tae -core based method as an example. -core based pper bond. Let max denote the maximal vale sch that -core of J is not empty. Since a cliqe is also a ( )-core, this implies that we have R max +. Therefore, we may apply the existing -core decomposition approach [9] to compte the maximal core nmber (i.e., max ) on the similarity sbgraph J. At the first glance, both strctral and similarity constraints are sed in the above method becase J itself is a -core (strctral constraint) and we consider the max -core of J (similarity constraint). Nevertheless, we observe that the bond can be tighter if we enforce that two cores on J and J share the same set of vertices. Doble -core based pper bond. We first introdce the concept of doble -core, denoted by (, )-core. Definition 6: (, )-core. Given a graph G and a set of vertices U with U V (G), we say U is a (, )-core of G if deg(, U) and SP (, U) for every U. Based on the fact that a (,r)-core R is also a (, )-core with = R according to the definition of (,r)-core, we have the following theorem. Theorem 7: Let J denote the indced sbgraph based on M and C. If there is a (,r)-core R in J, then there exists a (, )-core with R. Theorem 7 shows that we can derive the pper bond for any possible (,r)-core R in J based on the largest possible vale, denoted by max, for (, )-core of R. Ths, we need to

8 Fig (a) Graph (J) Upper Bond Examples (b) Similarity Graph (J ) develop an efficient algorithm to chec if there is a (, )-core with R. Algorithm 6 shows the details of pper bond (i.e., max) comptation. We se deg[] and deg sim [] to denote the degree and similarity degree (i.e., the nmber of similar pairs from ) of w.r.t M C, respectively. Meanwhile, NB[] (resp. NB sim []) denote the set of adjacent (resp. similar) vertices of. The ey idea is to recrsively mar the r max vale of the vertices ntil we reach the maximal possible vale. Line sorts all vertices based on the increasing order of their similarity degrees. In each iteration, the vertex with the lowest similarity degree already reaches its maximal possible (Line ). Then Line 4 invoes the procedre DobleKcore- Update to remove and decrease the degree (resp. similarity degree) of its neighbors (resp. similarity neighbors) at Lines 9- (resp. Lines 2-). Note that we need to recrsively remove vertices with degree smaller than (Line ) in the procedre. At Line, we need to reorder the vertices in H since their similarity degree vales may be pdated. According to Theorem 7, + is retrned at Line 6 as the core size pper bond. Example 7: In Fig. 7, we have C = {, 2,, 4, } and M = { 0 }. Fig. 7(a) shows edges in J (i.e., indced sbgraph from M C) and Fig. 7(b) shows edges (i.e., similarity pairs) in the similarity graph J. Initially, we have deg sim [ 0 ] =, deg sim [ ] = 4, deg sim [ 2 ] =, deg sim [ ] =, deg sim [ 4 ] = and deg sim [ ] = 4 in similarity graph. Applying -core decomposition on similarity graph J, we get a pper bond since max = 4. Regarding the doble -core techniqe (Algorithm 6), we can find a (,)- core in J with for vertices { 0, 2,, 4 }, and there is no (,4)-core. Ths, we come p with the pper bond 4, which is tighter than. Time Complexity. Let n e and n s denote the nmber of edges in the graph J and similarity graph J, respectively. In Algorithm 6, each edge in J or J will be visited at most once for the pdate of degrees and similarity degrees. Moreover, we can se an array H to maintain vertex where H[i] eep the vertices with similarity degree i. Then the sorting of the vertices can be done in O( J ) time. Conseqently, the time complexity of the algorithm is O(n e + n s ). Algorithm Correctness. Let max() denote the largest vale can contribte to (, )-core of J. By H j, we represent the vertices {} with max() j according to the definition of (, )-core. Then we have H j H i for any i < j. This implies that a vertex on H i with max() = i will not contribte to H j with i < j. Ths, we can prove the correctness by indction. Algorithm 6: DobleKcoreBond(M, C) Inpt : M : vertices chosen, C : candidate vertices Otpt : max : the pper bond for M C H := vertices in M C with increasing order of their similarity degrees; 2 for each H do := deg sim(); 4 DobleKcoreUpdate(,, H); reorder H accordingly; 6 retrn + 7 DobleKcoreUpdate(,, H); 8 Remove from H; 9 for each v NB sim[] H do 0 if deg sim[v] > then deg sim[v] := deg sim[v] ; 2 for each v NB[] H do deg[v] := deg[v] ; 4 if deg[v] < then DobleKcoreUpdate(v,, H); VI. A. Important Measrements SEARCH ORDER In this paper, we need to consider two inds of search orders: (i) vertex visiting order: the order of which vertex is chosen from candidate set C and (ii) branch visiting order: the order of which search branch (expansion or shrining branch) goes first. It is difficlt to find simple heristics or cost fnctions for two problems stdied in this paper becase, generally speaing, finding a maximal/maximm (,r)-core can be regarded as an optimization problem with two constraints. On one side, we need to diminish the dissimilar pairs to satisfy the similarity constraint. This implies that we need to eliminate a considerable nmber of vertices from C. On the flip side, the strctral constraint and the maximal/maximm property is in favor of larger nmber of edges (vertices) in M C; that is, we prefer to eliminate less nmber of vertices from C. To accommodate the above observations, we propose three measrements where M and C denote the pdated M and C after a chosen vertex is extended to M or discarded. : the change of the nmber of dissimilar pairs, where = DP (C) DP (C ) DP (C) Note that we have DP (, M C) = 0 for every M according to the similarity invariant (Eqation ). 2 : the change of the nmber of edges, where 2 = E(M C) E(M C ) E(M C) Recall that E(V ) denote the nmber of edges in the indced graph from the vertices set V. deg(, M C): Degree. We also consider the degree of the vertex as it may reflect its importance. In or implementation, we choose the vertex with highest degree at the initial stage (i.e., M = ). () (4)

9 B. Finding Maximm (,r)-core Since the size of the largest (,r)-core seen so far is critical to redce the search space, we aim to qicly identify the (,r)- core with larger size. One may lie to careflly discard vertices sch that the nmber of edges in M will be redced slowly (i.e., only prefer smaller 2 vale). However, as shown in or empirical stdy, this may reslt in poor performance becase it sally taes many search steps to satisfy the strctral constraint. On the contrary, we may easily fall into the pitfall of finding (,r)-cores with small size if we are only een on removing dissimilar pairs (i.e., only favor larger vale). In or implementation, we se a catios greedy strategy where a parameter λ is sed to mae a trade-off. In particlar, we se λ 2 to measre the goodness of a branch for each vertex in C \ SF (C). In this way, each candidate has two scores. Then the vertex with the highest score will be chosen and its branch with higher score will be explored first (Line 6-2 in Algorithm ). For time efficiency, we only explore vertices within two hops from the candidate vertex when we compte its and 2 vales. It taes O(n c (d 2 + d 2 2)) time where n c denote the nmber of vertices in C\SF (C), and d (resp. d 2 ) stands for the average degree of the vertices in J (resp. J ). C. Enmerating (,r)-cores The ordering strategy of this Sbsection is different than that of finding maximm in two perspectives. (i) We observe that has mch higher impact than 2 in the enmeration problem, so we adopt the -then- 2 strategy; that is, we prefer the larger, and the smaller 2 is considered if there is a tie. This is becase the enmeration algorithm is not een on (,r)-core with very large size since it eventally needs to enmerate all maximal (,r)-cores. Moreover, thans to the early termination techniqe proposed in Section IV-B, we can avoid exploring many non-promising sbtrees misled by the greedy heristic. (ii) We do not need to consider the order of two branches becase we need to explore both branches eventally. Ths, we se the score smmation of two branches to evalate the goodness of a vertex. The complexity of this ordering strategy is the same as the one in Section VI-B. D. Checing Maximal The search order of checing maximal is rather different than that of enmeration and maximm algorithms in the sense that it is more cost-effective for checing maximal algorithm to find a smaller (,r)-core which flly contains the candidate (,r)-core. To this end, we adopt a short-sighted greedy heristic. In particlar, we choose the vertex with the largest degree and the expand branch is always prefered as shown in Algorithm 4. By continosly maintaining a priority qee, we can fetch the vertex with the highest degree in O(log C ) time. VII. PERFORMANCE EVALUATION This Section evalates effectiveness and efficiency of or algorithms throgh comprehensive experiments. Dataset Nodes Edges Avg.Degree Brightite 8,227 88,80. DBLP,66,98 2,922, Gowalla 96,9 90, Poec,62,80 0,622,64 7. TABLE II. STATISTICS OF DATASETS A. Experimental Setting Algorithms. To the best of or nowledge, there is no existing wor investigating maximal (,r)-core enmeration and finding maximm (,r)-core problems. In this paper, we implement and evalate following algorithms. AdvEnm. The advanced enmeration algorithm proposed in Section IV-E which applies all advanced prning techniqes inclding candidate size redcing techniqes (Theorem 2, and 4 in Section IV-A), early termination techniqe (Theorem in Section IV-B) and checing maximal techniqe (Theorem 6 in Section IV-C). Moreover, its best search order ( -then- 2, in Section VI-C) is sed. BasicEnm The basic enmeration algorithm proposed in Algorithm with strctral and similarity constraints based prning techniqes (Theorem 2 and in Section IV-A). The best search order is also applied. AdvMax. The advanced finding maximm (,r)-core algorithm proposed in Section V-A with doble -core pper bond techniqe (Algorithm 6). Its best search order (λ 2, in Section VI-B) is applied. BasicMax. The AdvMax algorithm with the naive core size pper bond: M + C. Datasets. For real datasets are deployed in or experiments. The original data of DBLP is downloaded from ni-trier.de/ and the others are downloaded from stanford.ed/. In DBLP, we consider each athor as a vertex with attribte of attended conferences and pblished jornals list. There is an edge for a pair of athors if they have at least one co-athored paper. We tae Weighted Jaccard Similarity of the corresponding attribtes to measre the similarity between two athors. In Poec, we consider each ser as a vertex with personal interests. We tae Weighted Jaccard Similarity as similarity metric. And there is an edges between two sers if they are friends. share similar personal interests. In Gowalla and Brightite, we consider each ser as a vertex with location information. The graph is constrcted based on the friendship information. We se Eclidean Distance of two locations to measre the similarity of two sers. Table II shows statistics of for datasets. Parameters. We condct experiments in different settings inclding strctral constraint and similarity threshold r. We set reasonable positive integers to, which varies from to. Regarding Gowalla and Brightite, we se Eclidean distance as the distance threshold r, ranging from m to 00 m. It is difficlt for sers to set a proper similarity threshold r over DBLP and Poec becase their pair-wise similarity distribtions are highly sewed. Therefore, we se the thosandth of the pair-wise similarity distribtion with decreasing order which grows from to (i.e., the similarity threshold vale drops). Regarding the search orders of the AdvMax and BasicMax algorithms, we set λ to by defalt. We do not specifically evalate the strctral/similarity based candidate prning techniqes becase they are indispensable for the baseline algorithm.

10 (a) Enmeration Fig. 9. Case Stdy on Gowalla (=0, r=0m) Fig. 8. (b) Maximm Case Stdy on DBLP (=, r= ) All programs are implemented in standard C++ and compiled with G++ in Linx. All experiments are performed on a machine with Intel Xeon 2.GHz CPU and Redhat Linx System. We evalate the performance of an algorithm by the rnning time. To better evalate the difference of the algorithms, we set the time cost to if an algorithm cannot terminate within one hor. We also report the nmber of (,r)- cores and their average and maximm sizes. B. Effectiveness We condct two case stdies on DBLP and Gowalla to demonstrate the effectiveness of or (,r)-core model. We observe that, compared with -core, (,r)-core enables s to find more valable information with the additional similarity constraint on the vertices attribte. DBLP. Fig. 8(a) and (b) show two examples of DBLP with = and r= 6. In Fig. 8(a), all athors come from the same -core based on their co-athorship information (strctral constraint) alone. While there are two (,r)-cores with one common athor named Steven P. Wilder, if we also consider their research bacgrond (similarity constraint). After searching internet, we find that a large nmber of athors in the left (,r)-core are bioinformatician from the Eropean Bioinformatics Institte (EBI) while many of the athors in the right (,r)-core are from the Wellcome Trst Centre. Moreover, It trns ot that Dr. Wilder got his Ph.D. from the Wellcome Trst Centre for Hman Genetics, University of Oxford in 2007, and then has been wored at EBI ever since. Crrently he is a bioinformatician with research focs on genome analysis. Fig. 8(b) depicts the maximm (,r)-core of DBLP with 49 athors. We find that they have intensively co-athored many papers related to a project named Ensembl ( which is one of the well 6 To avoid the noise, we enforce that there are at least three co-athored papers between two connected athors in the case stdy. nown genome browsers. It is very interesting that, althogh the size of maximm (,r)-core changes when we vary and r vales, the athors remaining in the maximm (,r)-core are closely related to the project. Gowalla. Fig. 9 illstrates a set of Gowalla sers who are from the same -core with = 0. By setting r to 0 m, there are two grops of sers each of which is a maximal (,r)-core. We cannot identify them by strctral constraint or similarity constraint alone. We observe that the maximm (,r)-core in Gowalla always appears at Astin when 6. The we realize that this is becase the headqarter of Gowalla is located at Astin. We also report the nmber of (,r)-cores, the average size and maximm size of (,r)-cores on Gowalla and DBLP. Fig. 0(a) and (b) show that both maximm size of (,r)-cores and the nmber of (,r)-cores are mch more sensitive to the change of r or on two datasets, compared with the average size. #(,r)-cores Maximm Size Average Size Size 2K.6K.2K 0.8K 0.4K Fig. 0. 2K r (m) C. Efficiency (a) Gowalla, = (,r)-core Statistics.6K.2K 0.8K 0.4K Nmber of (,r)-cores Size 0.6K 0.K 0.4K 0.K 0.2K 0.K 0 2K 0K 8K 6K 4K 2K (b) DBLP, r= In this Sbsection, we evalate the efficiency of the techniqes proposed in this paper, where time costs of the algorithms are reported Fig.. BasicEnm BE+CR BE+CR+ET AdvEnm r (m) (a) Gowalla, = Evalate Prning Techniqes Nmber of (,r)-cores (b) DBLP, r=

Subgraph Matching with Set Similarity in a Large Graph Database

Subgraph Matching with Set Similarity in a Large Graph Database 1 Sbgraph Matching with Set Similarity in a Large Graph Database Liang Hong, Lei Zo, Xiang Lian, Philip S. Y Abstract In real-world graphs sch as social networks, Semantic Web and biological networks,

More information

COMPOSITION OF STABLE SET POLYHEDRA

COMPOSITION OF STABLE SET POLYHEDRA COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining

More information

Alliances and Bisection Width for Planar Graphs

Alliances and Bisection Width for Planar Graphs Alliances and Bisection Width for Planar Graphs Martin Olsen 1 and Morten Revsbæk 1 AU Herning Aarhs University, Denmark. martino@hih.a.dk MADAGO, Department of Compter Science Aarhs University, Denmark.

More information

Minimal Edge Addition for Network Controllability

Minimal Edge Addition for Network Controllability This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,

More information

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity

More information

Minimum Spanning Trees Outline: MST

Minimum Spanning Trees Outline: MST Minimm Spanning Trees Otline: MST Minimm Spanning Tree Generic MST Algorithm Krskal s Algorithm (Edge Based) Prim s Algorithm (Vertex Based) Spanning Tree A spanning tree of G is a sbgraph which is tree

More information

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,

More information

Evaluating Influence Diagrams

Evaluating Influence Diagrams Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will

More information

Constructing and Comparing User Mobility Profiles for Location-based Services

Constructing and Comparing User Mobility Profiles for Location-based Services Constrcting and Comparing User Mobility Profiles for Location-based Services Xihi Chen Interdisciplinary Centre for Secrity, Reliability and Trst, University of Lxemborg Jn Pang Compter Science and Commnications,

More information

h-vectors of PS ear-decomposable graphs

h-vectors of PS ear-decomposable graphs h-vectors of PS ear-decomposable graphs Nima Imani 2, Lee Johnson 1, Mckenzie Keeling-Garcia 1, Steven Klee 1 and Casey Pinckney 1 1 Seattle University Department of Mathematics, 901 12th Avene, Seattle,

More information

Maximum Weight Independent Sets in an Infinite Plane

Maximum Weight Independent Sets in an Infinite Plane Maximm Weight Independent Sets in an Infinite Plane Jarno Nosiainen, Jorma Virtamo, Pasi Lassila jarno.nosiainen@tkk.fi, jorma.virtamo@tkk.fi, pasi.lassila@tkk.fi Department of Commnications and Networking

More information

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003 From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information

More information

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands

More information

(2, 4) Tree Example (2, 4) Tree: Insertion

(2, 4) Tree Example (2, 4) Tree: Insertion Presentation for se with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 B-Trees and External Memory (2, 4) Trees Each internal node has 2 to 4 children:

More information

Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks

Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks 1 Efficient Schedling for Periodic Aggregation Qeries in Mltihop Sensor Networks XiaoHa X, Shaojie Tang, Member, IEEE, XiangYang Li, Senior Member, IEEE Abstract In this work, we stdy periodic qery schedling

More information

Factors Influencing Performance of Firefly and Particle Swarm Optimization Algorithms

Factors Influencing Performance of Firefly and Particle Swarm Optimization Algorithms Factors Inflencing Performance of Firefly and Particle Swarm Optimization Algorithms Damanjeet Kar, UIET, Panjab University, Chandigarh Abstract In this paper, two natre inspired meta heristic approaches

More information

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING International Jornal of Modern Engineering Research (IJMER) www.imer.com Vol.1, Isse1, pp-134-139 ISSN: 2249-6645 IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING

More information

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation Maximal Cliqes in Unit Disk Graphs: Polynomial Approximation Rajarshi Gpta, Jean Walrand, Oliier Goldschmidt 2 Department of Electrical Engineering and Compter Science Uniersity of California, Berkeley,

More information

Representing a Cubic Graph as the Intersection Graph of Axis-parallel Boxes in Three Dimensions

Representing a Cubic Graph as the Intersection Graph of Axis-parallel Boxes in Three Dimensions Representing a Cbic Graph as the Intersection Graph of Axis-parallel Boxes in Three Dimensions ABSTRACT Abhijin Adiga Network Dynamics and Simlation Science Laboratory Virginia Bioinformatics Institte,

More information

This chapter is based on the following sources, which are all recommended reading:

This chapter is based on the following sources, which are all recommended reading: Bioinformatics I, WS 09-10, D. Hson, December 7, 2009 105 6 Fast String Matching This chapter is based on the following sorces, which are all recommended reading: 1. An earlier version of this chapter

More information

Fault Tolerance in Hypercubes

Fault Tolerance in Hypercubes Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different

More information

A sufficient condition for spiral cone beam long object imaging via backprojection

A sufficient condition for spiral cone beam long object imaging via backprojection A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral

More information

Optimal Sampling in Compressed Sensing

Optimal Sampling in Compressed Sensing Optimal Sampling in Compressed Sensing Joyita Dtta Introdction Compressed sensing allows s to recover objects reasonably well from highly ndersampled data, in spite of violating the Nyqist criterion. In

More information

Adaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model

Adaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model International Jornal of Knowledge Engineering, Vol. 1, No. 2, September 215 Adaptie Inflence Maximization in Microblog nder the Competitie Independent Cascade Model Zheng Ding, Kai Ni, and Zhiqiang He

More information

Finite Domain Cuts for Minimum Bandwidth

Finite Domain Cuts for Minimum Bandwidth Finite Domain Cts for Minimm Bandwidth J. N. Hooker Carnegie Mellon University, USA Joint work with Alexandre Friere, Cid de Soza State University of Campinas, Brazil INFORMS 2013 Two Related Problems

More information

THE Unit Commitment problem (UCP) is the problem of

THE Unit Commitment problem (UCP) is the problem of IEEE TRANS IN POWER SYSTEMS 1 A new MILP-based approach for Unit Commitment in power prodction planning. Ana Viana and João Pedro Pedroso Abstract This paper presents a novel, iterative optimisation algorithm

More information

Constructing Multiple Light Multicast Trees in WDM Optical Networks

Constructing Multiple Light Multicast Trees in WDM Optical Networks Constrcting Mltiple Light Mlticast Trees in WDM Optical Networks Weifa Liang Department of Compter Science Astralian National University Canberra ACT 0200 Astralia wliang@csaneda Abstract Mlticast roting

More information

Page 1. CSCE 310J Data Structures & Algorithms. CSCE 310J Data Structures & Algorithms. Greedy Algorithms and Graph Optimization Problems

Page 1. CSCE 310J Data Structures & Algorithms. CSCE 310J Data Structures & Algorithms. Greedy Algorithms and Graph Optimization Problems CSCE J Data Strctres & Algorithms Greedy Algorithms and Graph Optimization Problems Dr. Steve Goddard goddard@cse.nl.ed http://www.cse.nl.ed/~goddard/corses/cscej CSCE J Data Strctres & Algorithms Giving

More information

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un Dynamic Maintenance of Majority Information in Constant Time per Update? Gdmnd S. Frandsen and Sven Skym BRICS 1 Department of Compter Science, University of arhs, Ny Mnkegade, DK-8000 arhs C, Denmark

More information

A choice relation framework for supporting category-partition test case generation

A choice relation framework for supporting category-partition test case generation Title A choice relation framework for spporting category-partition test case generation Athor(s) Chen, TY; Poon, PL; Tse, TH Citation Ieee Transactions On Software Engineering, 2003, v. 29 n. 7, p. 577-593

More information

Efficient and Accurate Delaunay Triangulation Protocols under Churn

Efficient and Accurate Delaunay Triangulation Protocols under Churn Efficient and Accrate Delanay Trianglation Protocols nder Chrn Dong-Yong Lee and Simon S. Lam Department of Compter Sciences The University of Texas at Astin {dylee, lam}@cs.texas.ed November 9, 2007 Technical

More information

Improving Network Connectivity Using Trusted Nodes and Edges

Improving Network Connectivity Using Trusted Nodes and Edges Improing Network Connectiity Using Trsted Nodes and Edges Waseem Abbas, Aron Laszka, Yegeniy Vorobeychik, and Xenofon Kotsokos Abstract Network connectiity is a primary attribte and a characteristic phenomenon

More information

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,

More information

arxiv: v1 [cs.cg] 27 Nov 2015

arxiv: v1 [cs.cg] 27 Nov 2015 On Visibility Representations of Non-planar Graphs Therese Biedl 1, Giseppe Liotta 2, Fabrizio Montecchiani 2 David R. Cheriton School of Compter Science, University of Waterloo, Canada biedl@waterloo.ca

More information

Topic Continuity for Web Document Categorization and Ranking

Topic Continuity for Web Document Categorization and Ranking Topic Continity for Web ocment Categorization and Ranking B. L. Narayan, C. A. Mrthy and Sankar. Pal Machine Intelligence Unit, Indian Statistical Institte, 03, B. T. Road, olkata - 70008, India. E-mail:

More information

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna

More information

Tdb: A Source-level Debugger for Dynamically Translated Programs

Tdb: A Source-level Debugger for Dynamically Translated Programs Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,

More information

CS224W Final Report. 1 Introduction. 3 Data Collection and Visualization. 2 Prior Work. Cyprien de Lichy, Renke Pan, Zheng Wu.

CS224W Final Report. 1 Introduction. 3 Data Collection and Visualization. 2 Prior Work. Cyprien de Lichy, Renke Pan, Zheng Wu. CS224W Final Report Cyprien de Lichy, Renke Pan, Zheng W 1 Introdction December 9, 2015 Recommender systems are information filtering systems that provide sers with personalized sggestions for prodcts

More information

Chapter 7 TOPOLOGY CONTROL

Chapter 7 TOPOLOGY CONTROL Chapter TOPOLOGY CONTROL Oeriew Topology Control Gabriel Graph et al. XTC Interference SINR & Schedling Complexity Distribted Compting Grop Mobile Compting Winter 00 / 00 Distribted Compting Grop MOBILE

More information

The Disciplined Flood Protocol in Sensor Networks

The Disciplined Flood Protocol in Sensor Networks The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab

More information

Multiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET

Multiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET Mltiple-Choice Test Chapter 09.0 Golden Section Search Method Optimization COMPLETE SOLUTION SET. Which o the ollowing statements is incorrect regarding the Eqal Interval Search and Golden Section Search

More information

Augmenting the edge connectivity of planar straight line graphs to three

Augmenting the edge connectivity of planar straight line graphs to three Agmenting the edge connectivity of planar straight line graphs to three Marwan Al-Jbeh Mashhood Ishaqe Kristóf Rédei Diane L. Sovaine Csaba D. Tóth Pavel Valtr Abstract We characterize the planar straight

More information

5 Performance Evaluation

5 Performance Evaluation 5 Performance Evalation his chapter evalates the performance of the compared to the MIP, and FMIP individal performances. We stdy the packet loss and the latency to restore the downstream and pstream of

More information

A personalized search using a semantic distance measure in a graph-based ranking model

A personalized search using a semantic distance measure in a graph-based ranking model Article A personalized search sing a semantic distance measre in a graph-based ranking model Jornal of Information Science XX (X) pp. 1-23 The Athor(s) 2011 Reprints and Permissions: sagepb.co.k/jornalspermissions.nav

More information

REDUCED-REFERENCE ASSESSMENT OF PERCEIVED QUALITY BY EXPLOITING COLOR INFORMATION

REDUCED-REFERENCE ASSESSMENT OF PERCEIVED QUALITY BY EXPLOITING COLOR INFORMATION REDUCED-REFERENCE ASSESSMENT OF PERCEIVED QUALITY BY EXPLOITING COLOR INFORMATION Jdith Redi, Paolo Gastaldo, Rodolfo Znino, and Ingrid Heyndericx (+) University of Genoa, DIBE, Via Opera Pia a - 645 Genova

More information

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment

More information

Real-time mean-shift based tracker for thermal vision systems

Real-time mean-shift based tracker for thermal vision systems 9 th International Conference on Qantitative InfraRed Thermography Jly -5, 008, Krakow - Poland Real-time mean-shift based tracker for thermal vision systems G. Bieszczad* T. Sosnowski** * Military University

More information

Image Compression Compression Fundamentals

Image Compression Compression Fundamentals Compression Fndamentals Data compression refers to the process of redcing the amont of data reqired to represent given qantity of information. Note that data and information are not the same. Data refers

More information

Fixed-Parameter Algorithms for Cluster Vertex Deletion

Fixed-Parameter Algorithms for Cluster Vertex Deletion Fixed-Parameter Algorithms for Clster Vertex Deletion Falk Hüffner Christian Komsieicz Hannes Moser Rolf Niedermeier Institt für Informatik, Friedrich-Schiller-Uniersität Jena, Ernst-Abbe-Platz 2, D-07743

More information

p-norm MINIMIZATION OVER INTERSECTIONS OF CONVEX SETS İlker Bayram

p-norm MINIMIZATION OVER INTERSECTIONS OF CONVEX SETS İlker Bayram p-norm MINIMIZATION OVER INTERSECTIONS OF CONVEX SETS İlker Bayram Istanbl Technical University, Department of Electronics and Telecommnications Engineering, Istanbl, Trkey ABSTRACT We consider the imization

More information

Hardware-Accelerated Free-Form Deformation

Hardware-Accelerated Free-Form Deformation Hardware-Accelerated Free-Form Deformation Clint Cha and Ulrich Nemann Compter Science Department Integrated Media Systems Center University of Sothern California Abstract Hardware-acceleration for geometric

More information

Date: December 5, 1999 Dist'n: T1E1.4

Date: December 5, 1999 Dist'n: T1E1.4 12/4/99 1 T1E14/99-559 Project: T1E14: VDSL Title: Vectored VDSL (99-559) Contact: J Cioffi, G Ginis, W Y Dept of EE, Stanford U, Stanford, CA 945 Cioffi@stanforded, 1-65-723-215, F: 1-65-724-3652 Date:

More information

Computer User s Guide 4.0

Computer User s Guide 4.0 Compter User s Gide 4.0 2001 Glenn A. Miller, All rights reserved 2 The SASSI Compter User s Gide 4.0 Table of Contents Chapter 1 Introdction...3 Chapter 2 Installation and Start Up...5 System Reqirements

More information

Triple Connected Complementary Tree Domination Number of a Graph

Triple Connected Complementary Tree Domination Number of a Graph International Mathematical Form, Vol. 8, 2013, no. 14, 659-670 HIKARI Ltd, www.m-hikari.com Triple Connected Complementar Tree Domination Nmber of a Graph G. Mahadevan 1, Selvam Avadaappan 2, N. Ramesh

More information

IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION

IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION ICAS 2 CONGRESS IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION Christophe Le Garrec, Marc Hmbert, Michel Lacabanne Aérospatiale Matra

More information

STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWORK DYNAMICS FOR STATIC OPTIMIZATION

STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWORK DYNAMICS FOR STATIC OPTIMIZATION STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWOR DYNAMICS FOR STATIC OPTIMIZATION Grsel Serpen and Yifeng X Electrical Engineering and Compter Science Department, The University of Toledo, Toledo, OH

More information

Introduction to Computational Manifolds and Applications

Introduction to Computational Manifolds and Applications IMPA - Institto de Matemática Pra e Aplicada, Rio de Janeiro, RJ, Brazil Introdction to Comptational Manifolds and Applications Part 1 - Constrctions Prof. Marcelo Ferreira Siqeira mfsiqeira@dimap.frn.br

More information

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY 2007 1 On the Analysis of the Bletooth Time Division Dplex Mechanism Gil Zssman Member, IEEE, Adrian Segall Fellow, IEEE, and Uri Yechiali

More information

Isilon InsightIQ. Version 2.5. User Guide

Isilon InsightIQ. Version 2.5. User Guide Isilon InsightIQ Version 2.5 User Gide Pblished March, 2014 Copyright 2010-2014 EMC Corporation. All rights reserved. EMC believes the information in this pblication is accrate as of its pblication date.

More information

AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING

AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING Mingsheng LIAO, Li ZHANG, Zxn ZHANG, Jiangqing ZHANG Whan Technical University of Srveying and Mapping, Natinal Lab. for Information Eng. in

More information

Data/Metadata Data and Data Transformations

Data/Metadata Data and Data Transformations A Framework for Classifying Scientic Metadata Helena Galhardas, Eric Simon and Anthony Tomasic INRIA Domaine de Volcea - Rocqencort 7853 Le Chesnay France email: First-Name.Last-Name@inria.fr Abstract

More information

EMC ViPR. User Guide. Version

EMC ViPR. User Guide. Version EMC ViPR Version 1.1.0 User Gide 302-000-481 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is accrate

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 53 Design of Operating Systems Spring 8 Lectre 2: Virtal Memory Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Recap: cache Well-written programs exhibit

More information

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods Annals of Operations Research 106, 19 46, 2001 2002 Klwer Academic Pblishers. Manfactred in The Netherlands. Discrete Cost Mlticommodity Network Optimization Problems and Exact Soltion Methods MICHEL MINOUX

More information

An Optimization of Granular Network by Evolutionary Methods

An Optimization of Granular Network by Evolutionary Methods An Optimization of Granlar Networ by Evoltionary Methods YUN-HEE HAN, KEUN-CHANG KWAK* Dept. of Control, Instrmentation, and Robot Engineering Chosn University 375 Seos-dong, Dong-g, Gwangj, 50-759 Soth

More information

Resolving Linkage Anomalies in Extracted Software System Models

Resolving Linkage Anomalies in Extracted Software System Models Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program

More information

Master for Co-Simulation Using FMI

Master for Co-Simulation Using FMI Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany

More information

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems Congestion-adaptive Data Collection with Accracy Garantee in Cyber-Physical Systems Nematollah Iri, Lei Y, Haiying Shen, Gregori Calfield Department of Electrical and Compter Engineering, Clemson University,

More information

The extra single-cycle adders

The extra single-cycle adders lticycle Datapath As an added bons, we can eliminate some of the etra hardware from the single-cycle path. We will restrict orselves to sing each fnctional nit once per cycle, jst like before. Bt since

More information

4.13 Advanced Topic: An Introduction to Digital Design Using a Hardware Design Language 345.e1

4.13 Advanced Topic: An Introduction to Digital Design Using a Hardware Design Language 345.e1 .3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage 35.e.3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage to Describe and odel a Pipeline

More information

Triangle-Free Planar Graphs as Segments Intersection Graphs

Triangle-Free Planar Graphs as Segments Intersection Graphs Triangle-ree Planar Graphs as Segments Intersection Graphs N. de Castro 1,.J.Cobos 1, J.C. Dana 1,A.Márqez 1, and M. Noy 2 1 Departamento de Matemática Aplicada I Universidad de Sevilla, Spain {natalia,cobos,dana,almar}@cica.es

More information

A GENERIC MODEL OF A BASE-ISOLATED BUILDING

A GENERIC MODEL OF A BASE-ISOLATED BUILDING Chapter 5 A GENERIC MODEL OF A BASE-ISOLATED BUILDING This chapter draws together the work o Chapters 3 and 4 and describes the assembly o a generic model o a base-isolated bilding. The irst section describes

More information

Nash Convergence of Gradient Dynamics in General-Sum Games. Michael Kearns.

Nash Convergence of Gradient Dynamics in General-Sum Games. Michael Kearns. Convergence of Gradient Dynamics in General-Sm Games Satinder Singh AT&T Labs Florham Park, NJ 7932 bavejaresearch.att.com Michael Kearns AT&T Labs Florham Park, NJ 7932 mkearnsresearch.att.com Yishay

More information

New Architectures for Hierarchical Predictive Control

New Architectures for Hierarchical Predictive Control Preprint, 11th IFAC Symposim on Dynamics and Control of Process Systems, inclding Biosystems Jne 6-8, 216. NTNU, Trondheim, Norway New Architectres for Hierarchical Predictive Control Victor M. Zavala

More information

Faster Random Walks By Rewiring Online Social Networks On-The-Fly

Faster Random Walks By Rewiring Online Social Networks On-The-Fly 1 Faster Random Walks By Rewiring Online ocial Networks On-The-Fly Zhojie Zho 1, Nan Zhang 2, Zhigo Gong 3, Gatam Das 4 1,2 Compter cience Department, George Washington Uniersity 1 rexzho@gw.ed 2 nzhang10@gw.ed

More information

Uncertainty Determination for Dimensional Measurements with Computed Tomography

Uncertainty Determination for Dimensional Measurements with Computed Tomography Uncertainty Determination for Dimensional Measrements with Compted Tomography Kim Kiekens 1,, Tan Ye 1,, Frank Welkenhyzen, Jean-Pierre Krth, Wim Dewlf 1, 1 Grop T even University College, KU even Association

More information

Planarity-Preserving Clustering and Embedding for Large Planar Graphs

Planarity-Preserving Clustering and Embedding for Large Planar Graphs Planarity-Presering Clstering and Embedding for Large Planar Graphs Christian A. Dncan, Michael T. Goodrich, and Stephen G. Koboro Center for Geometric Compting The Johns Hopkins Uniersity Baltimore, MD

More information

arxiv: v1 [cs.cr] 3 Jun 2017

arxiv: v1 [cs.cr] 3 Jun 2017 Spectrm-based deep neral networks for frad detection arxiv:1706.00891v1 [cs.cr] 3 Jn 2017 ABSTRACT Shhan Yan Tongji University 4e66@tongji.ed.cn Jn Li University of Oregon lijn@cs.oregon.ed In this paper,

More information

History Slicing: Assisting Code-Evolution Tasks

History Slicing: Assisting Code-Evolution Tasks History Slicing: Assisting Code-Evoltion Tasks Francisco Servant Department of Informatics University of California, Irvine Irvine, CA, U.S.A. 92697-3440 fservant@ics.ci.ed James A. Jones Department of

More information

Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN:

Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: 1137-3601 revista@aepia.org Asociación Española para la Inteligencia Artificial España Zaballos, Lis J.; Henning, Gabriela

More information

TOWARD AN UNCERTAINTY PRINCIPLE FOR WEIGHTED GRAPHS

TOWARD AN UNCERTAINTY PRINCIPLE FOR WEIGHTED GRAPHS TOWARD AN UNCERTAINTY PRINCIPLE FOR WEIGHTED GRAPHS Bastien Pasdelop, Réda Alami, Vincent Gripon Telecom Bretagne UMR CNRS Lab-STICC name.srname@telecom-bretagne.e Michael Rabbat McGill University ECE

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 11: Semaphores Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Last time Worked throgh software implementation

More information

Improved Estimation of Transmission Distortion for Error-resilient Video Coding

Improved Estimation of Transmission Distortion for Error-resilient Video Coding 1 Improved Estimation of Transmission Distortion for Error-resilient Video Coding Zhifeng Chen 1, Peshala Pahalawatta 2, Alexis Michael Torapis 2, and Dapeng W 1,* 1 Department of Electrical and Compter

More information

arxiv: v1 [cs.cg] 26 Sep 2018

arxiv: v1 [cs.cg] 26 Sep 2018 Convex partial transversals of planar regions arxiv:1809.10078v1 [cs.cg] 26 Sep 2018 Vahideh Keikha Department of Mathematics and Compter Science, University of Sistan and Balchestan, Zahedan, Iran va.keikha@gmail.com

More information

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read. The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5

More information

v e v 1 C 2 b) Completely assigned T v a) Partially assigned Tv e T v 2 p k

v e v 1 C 2 b) Completely assigned T v a) Partially assigned Tv e T v 2 p k Approximation Algorithms for a Capacitated Network Design Problem R. Hassin 1? and R. Rai 2?? and F. S. Salman 3??? 1 Department of Statistics and Operations Research, Tel-Ai Uniersity, Tel Ai 69978, Israel.

More information

Partha Sarathi Mandal

Partha Sarathi Mandal MA 5: Data Strctres and Algorithms Lectre http://www.iitg.ernet.in/psm/indexing_ma5/y1/index.html Partha Sarathi Mandal Dept. of Mathematics, IIT Gwahati Idea of Prim s Algorithm Instead of growing the

More information

Blended Deformable Models

Blended Deformable Models Blended Deformable Models (In IEEE Trans. Pattern Analysis and Machine Intelligence, April 996, 8:4, pp. 443-448) Doglas DeCarlo and Dimitri Metaxas Department of Compter & Information Science University

More information

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code:

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code: EE8 Winter 25 Homework #2 Soltions De Thrsday, Feb 2, 5 P. ( points) Consider the following fragment of Java code: for (i=; i

More information

Topological Drawings of Complete Bipartite Graphs

Topological Drawings of Complete Bipartite Graphs Topological Drawings of Complete Bipartite Graphs Jean Cardinal Stefan Felsner y Febrary 017 Abstract Topological drawings are natral representations of graphs in the plane, where vertices are represented

More information

Appearance Based Tracking with Background Subtraction

Appearance Based Tracking with Background Subtraction The 8th International Conference on Compter Science & Edcation (ICCSE 213) April 26-28, 213. Colombo, Sri Lanka SD1.4 Appearance Based Tracking with Backgrond Sbtraction Dileepa Joseph Jayamanne Electronic

More information

Review Multicycle: What is Happening. Controlling The Multicycle Design

Review Multicycle: What is Happening. Controlling The Multicycle Design Review lticycle: What is Happening Reslt Zero Op SrcA SrcB Registers Reg Address emory em Data Sign etend Shift left Sorce A B Ot [-6] [5-] [-6] [5-] [5-] Instrction emory IR RegDst emtoreg IorD em em

More information

Method to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot

Method to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot Method to bild an initial adaptive Nero-Fzzy controller for joints control of a legged robot J-C Habmremyi, P. ool and Y. Badoin Royal Military Academy-Free University of Brssels 08 Hobbema str, box:mrm,

More information

Broadcasting XORs: On the Application of Network Coding in Access Point-to-Multipoint Networks

Broadcasting XORs: On the Application of Network Coding in Access Point-to-Multipoint Networks Broadcasting XORs: On the Application of Network Coding in Access Point-to-Mltipoint Networks The MIT Faclty has made this article openly available Please share how this access benefits yo Yor story matters

More information

Chapter 6: Pipelining

Chapter 6: Pipelining CSE 322 COPUTER ARCHITECTURE II Chapter 6: Pipelining Chapter 6: Pipelining Febrary 10, 2000 1 Clothes Washing CSE 322 COPUTER ARCHITECTURE II The Assembly Line Accmlate dirty clothes in hamper Place in

More information

Faster Random Walks By Rewiring Online Social Networks On-The-Fly

Faster Random Walks By Rewiring Online Social Networks On-The-Fly Faster Random Walks By Rewiring Online ocial Networks On-The-Fly Zhojie Zho 1, Nan Zhang 2, Zhigo Gong 3, Gatam Das 4 1,2 Compter cience Department, George Washington Uniersity 1 rexzho@gw.ed 2 nzhang10@gw.ed

More information

Statistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem

Statistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem Statistical Methods in fnctional MRI Lectre 7: Mltiple Comparisons 04/3/13 Martin Lindqist Department of Biostatistics Johns Hopkins University Data Processing Pipeline Standard Analysis Data Acqisition

More information

MultiView: Improving Trust in Group Video Conferencing Through Spatial Faithfulness David T. Nguyen, John F. Canny

MultiView: Improving Trust in Group Video Conferencing Through Spatial Faithfulness David T. Nguyen, John F. Canny MltiView: Improving Trst in Grop Video Conferencing Throgh Spatial Faithflness David T. Ngyen, John F. Canny CHI 2007, April 28 May 3, 2007, San Jose, California, USA Presented by: Stefan Stojanoski 1529445

More information

Networks An introduction to microcomputer networking concepts

Networks An introduction to microcomputer networking concepts Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES

More information