The Randomized Shortest Path model in a nutshell

Size: px
Start display at page:

Download "The Randomized Shortest Path model in a nutshell"

Transcription

1 Panzacchi M, Van Moorter B, Strand O, Saerens M, Kivimäki I, Cassady St.Clair C., Herfindal I, Boitani L. (2015) Predicting the continuum between corridors and barriers to animal movements using Step Selection Functions and Randomized Shortest Paths. Journal of Animal Ecology Appendix I The Randomized Shortest Path model in a nutshell 1. Introduction This section briefly introduces the Randomized Shortest Path (RSP) model, which was developed in Saerens et al. (2009), Yen et al (2008), and Kivimäki, Shimbo & Saerens (2014), and can be described as follows. The section is based on this material, as well as (Devooght et al 2014) presenting an application of the framework. Suppose an animal has to move from some starting place to a destination on a geographic area. This problem is usually solved in the following way. First, the problem is discretized and a sufficiently dense grid is defined based on the map of the area, providing a graph or network on which the animal can move from node to node by following edges or links. Two important properties are associated to the edges of the graph, (i) a cost quantifying the difficulty of following the link as well as the real distance it represents and (ii) a weight representing the added value of following this edge the affinity of the neighboring node from the point of view of the animal. These two quantities can be set independently or can be related by setting, e.g.,. Second, the animal has to choose a strategy for reaching node from node. Two such common strategies are the shortest path, or geodesic, strategy (choosing the least cost path, see, e.g. Cormen et al 2009) and the pure random walk strategy (walking completely at random until arriving at the destination, see, e.g. Doyle & Snell 1984). However, animals seldom follow such extreme strategies. Instead, they follow suboptimal trajectories, with a balance between exploitation (minimizing total cost along the trajectory) and exploration (exploring 1

2 neighboring nodes looking appealing). This is exactly what the RSP does: it defines a trade-off between following the shortest path and performing a random tour. Technically, the RSP tackles the problem by minimizing an objective function taking into account both the total cost of the path, or trajectory, and the tendency of the animal to examine its neighborhood. Concretely, the model minimizes the expected cost for reaching node (exploitation) while fixing the Kullback-Leibler divergence, also called relative entropy (see, e.g. Cover & Thomas 2006), between the desired strategy and the random walk strategy. The good news is that the model is easily tractable: the main quantities of interest (number of visits to each node before reaching the destination node, expected cost, etc) can be computed in closed form by solving two systems of linear equations. The resulting strategy balancing both goals (exploitation and exploration) actually defines a biased random walk in which the animal is attracted by the destination node. 2. Some notations We assume that the grid defines a weighted directed graph G containing n nodes. Without loss of generality, the starting position A is indexed as node 1 while destination B is node n. We then consider absorbing paths from node 1 to node n, meaning a sequence of adjacent nodes that may contain cycles, except for the destination node. Once the destination node n is reached, the path does not continue. We denote the (usually infinite but countable) set of all absorbing paths starting at 1 and ending in n as. Each individual path is associated with a total cost, given by the sum of the individual costs of each edge along the path. We first introduce and and then define paths and the cost of a path. The cost matrix contains the individual costs as elements. When there is no edge from node to node we consider the cost to be infinite. The graph is also associated to an adjacency matrix containing local affinities between nodes. When there is no link between two nodes,. Matrices and are given by the problem at hand. Also, for the pure random walk strategy, we define the probability that the animal takes the outgoing link in node as. The are gathered in the transition matrix. This 2

3 defines a standard finite Markov chain (see, e.g. Doyle & Snell 1984, Grinstead &. Snell 1997, Kemeny & Snell 1976). Once the animal has reached the destination node, it remains there and the process stops immediately. This implies that and that for each. In this case, we say that node is absorbing. Finally, the likelihood of a path, i.e. the product of the transition probabilities along the path, is denoted by. 3. Probability distribution on paths The RSP model defines a biased random walk on the graph whose moving strategy the probability that the animal chooses a particular path from to consists of minimizing the expected extra-cost of the paths in comparison with the least cost (i.e. favoring shorter paths or exploitation) while in the meantime trying to explore the graph, to a given extent. This tradeoff may be formalized in the following way (Devooght et al 2014; Kivimäki et al. 2014; Saerens et al. 2009): eq. 1 where is the least cost provided by the shortest path (with respect to the costs) between node 1 and node. The first equation expresses the exploitation strategy minimizing the expected extra-cost. The second ensures exploration of the graph by constraining the divergence ( ) from the prior distribution which defines a pure random walk strategy where the animal always chooses his next step according to the unbiased transition probabilities. This tradeoff problem is very common in statistical physics (Jaynes 1957) and has a closed form solution which is provided by the Gibbs-Boltzmann probability density: 3

4 [ ] [ ] [ ] [ ] eq. 2 with controlling the exploration exploitation tradeoff. The solution can be found using Lagrange multipliers, and the resolution is detailed in, e.g., Mantrach et al. (2010). In statistical physics, the denominator is called the partition function: [ ] eq. 3 We immediately see that implies (pure random walk), and when the probability distribution is concentrated on the path(s) with the lowest cost. In other words, the model interpolates from a random walk strategy to a shortest path strategy. 3.1 Computing the expected number of visits to each node Let us give a quick summary of how to compute the values of interest. First, we define the matrix as [ ] [ ] eq. 4 where is the elementwise (Hadamard) matrix product, and the exponential and logarithm are taken elementwise. In fact, the partition function of Equation 6 (Devooght et al. 2014) can be computed from the matrix in the following way: [ ] [ ] [ ] eq. 5 which enumerates all possible paths and sums up their total costs (see Saerens et al 2009). We defined so that is element of this matrix. From statistical physics fundamentals (e.g. Jaynes 1957; Reichl 1998), it is well-known that many interesting quantities can be computed from the partition function. For instance, using Equations 2 and 3, the expected number of passages through a given edge is given by: 4

5 ( ) [ ] [ ] eq. 6 where is the number of times edge appears on path. Furthermore, the expected number of visits to node is given by its total input. Computing the partial derivative of Equation 6 from Equation 5 provides the expected number of passages (see Saerens et al for details) [ ] eq. 7 and the expected number of visits to node is (Saerens et al. 2009) eq. 8 Interestingly, this model defines a new biased random walk with transition probabilities [ ] eq. 9 which does not depend on the starting node 1 (again, see Saerens et al for details). Consequently, in order to determine the expected number of visits to a node, the only quantities that need to be computed are and, that is, the first row and the last column of matrix. This can be done by solving two systems of linear equations, and. Here, is a basis column vector containing s everywhere, except at position where it contains a. The quantities of interest can then be computed from and. Various other quantities, such as the expected extra-cost according to Equation 4 can be computed using similar techniques as above (Saerens et al. 2009). 5

6 References T. Cormen, C. Leiserson, R. Rivest, and C. Stein. Introduction to algorithms, 3 rd Edition. The MIT Press, T. M. Cover and J. A. Thomas. Elements of Information Theory, 2nd edition. JohnWiley & Sons, R. Devooght, A. Mantrach, I. Kivimaki, H. Bersini, A. Jaimes, and M. Saerens. Random walks based modularity: application to semisupervised learning. Proceedings of the 23rd International World Wide Web Conference (WWW 2014), pages , P. G. Doyle and J. L. Snell. Random walks and electric networks. The Mathematical Association of America, C. Grinstead and J. L. Snell. Introduction to probability, 2nd ed. The Mathematical Association of America, E. T. Jaynes. Information theory and statistical mechanics. Physical Review, 106: , J. G. Kemeny and J. L. Snell. Finite Markov chains. Springer-Verlag, I. Kivimäki, M. Shimbo, and M. Saerens. Developments in the theory of randomized shortest paths with a comparison of graph node distances. Physica A: Statistical Mechanics and its Applications, 393: , A. Mantrach, L. Yen, J. Callut, K. Francoise, M. Shimbo, and M. Saerens. The sum-over-paths covariance kernel: a novel covariance between nodes of a directed graph. IEEE Transactions on Pattern Analysis and Machine Intelligence, 32(6): , L. Reichl. A modern course in statistical physics, 2nd ed. Wiley, M. Saerens, Y. Achbany, F. Fouss, and L. Yen. Randomized shortest-path problems: Two related models. Neural Computation, 21(8): , L. Yen, A. Mantrach, M. Shimbo, and M. Saerens. A family of dissimilarity measures between nodes generalizing both the shortest-path and the commute-time distances. In Proceedings of the 14th SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2008), pages ,

Collaborative filtering based on a random walk model on a graph

Collaborative filtering based on a random walk model on a graph Collaborative filtering based on a random walk model on a graph Marco Saerens, Francois Fouss, Alain Pirotte, Luh Yen, Pierre Dupont (UCL) Jean-Michel Renders (Xerox Research Europe) Some recent methods:

More information

Lecture 22 Tuesday, April 10

Lecture 22 Tuesday, April 10 CIS 160 - Spring 2018 (instructor Val Tannen) Lecture 22 Tuesday, April 10 GRAPH THEORY Directed Graphs Directed graphs (a.k.a. digraphs) are an important mathematical modeling tool in Computer Science,

More information

arxiv: v2 [stat.ml] 3 Oct 2013

arxiv: v2 [stat.ml] 3 Oct 2013 Developments in the theory of randomized shortest paths with a comparison of graph node distances Ilkka Kivimäki ICTEAM institute, Université catholique de Louvain, Louvain-la-Neuve, Belgium arxiv:1212.1666v2

More information

Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method

Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.5, May 2017 265 Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method Mohammad Pashaei, Hossein Ghiasy

More information

Semi-Supervised Clustering with Partial Background Information

Semi-Supervised Clustering with Partial Background Information Semi-Supervised Clustering with Partial Background Information Jing Gao Pang-Ning Tan Haibin Cheng Abstract Incorporating background knowledge into unsupervised clustering algorithms has been the subject

More information

Learning Graph Grammars

Learning Graph Grammars Learning Graph Grammars 1 Aly El Gamal ECE Department and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Abstract Discovery of patterns in a given graph - in the form of repeated

More information

STA 4273H: Statistical Machine Learning

STA 4273H: Statistical Machine Learning STA 4273H: Statistical Machine Learning Russ Salakhutdinov Department of Statistics! rsalakhu@utstat.toronto.edu! http://www.utstat.utoronto.ca/~rsalakhu/ Sidney Smith Hall, Room 6002 Lecture 5 Inference

More information

DENSITY BASED AND PARTITION BASED CLUSTERING OF UNCERTAIN DATA BASED ON KL-DIVERGENCE SIMILARITY MEASURE

DENSITY BASED AND PARTITION BASED CLUSTERING OF UNCERTAIN DATA BASED ON KL-DIVERGENCE SIMILARITY MEASURE DENSITY BASED AND PARTITION BASED CLUSTERING OF UNCERTAIN DATA BASED ON KL-DIVERGENCE SIMILARITY MEASURE Sinu T S 1, Mr.Joseph George 1,2 Computer Science and Engineering, Adi Shankara Institute of Engineering

More information

Distributed minimum spanning tree problem

Distributed minimum spanning tree problem Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with

More information

CENTRALITIES. Carlo PICCARDI. DEIB - Department of Electronics, Information and Bioengineering Politecnico di Milano, Italy

CENTRALITIES. Carlo PICCARDI. DEIB - Department of Electronics, Information and Bioengineering Politecnico di Milano, Italy CENTRALITIES Carlo PICCARDI DEIB - Department of Electronics, Information and Bioengineering Politecnico di Milano, Italy email carlo.piccardi@polimi.it http://home.deib.polimi.it/piccardi Carlo Piccardi

More information

Chapter 18 out of 37 from Discrete Mathematics for Neophytes: Number Theory, Probability, Algorithms, and Other Stuff by J. M. Cargal.

Chapter 18 out of 37 from Discrete Mathematics for Neophytes: Number Theory, Probability, Algorithms, and Other Stuff by J. M. Cargal. Chapter 8 out of 7 from Discrete Mathematics for Neophytes: Number Theory, Probability, Algorithms, and Other Stuff by J. M. Cargal 8 Matrices Definitions and Basic Operations Matrix algebra is also known

More information

REGULAR GRAPHS OF GIVEN GIRTH. Contents

REGULAR GRAPHS OF GIVEN GIRTH. Contents REGULAR GRAPHS OF GIVEN GIRTH BROOKE ULLERY Contents 1. Introduction This paper gives an introduction to the area of graph theory dealing with properties of regular graphs of given girth. A large portion

More information

DENSITY is an important concept in graph analysis

DENSITY is an important concept in graph analysis The Sum-over-Forests density index: identifying dense regions in a graph Mathieu Senelle, Silvia Garcia-Diez, Amin Mantrach, Masashi Shimbo, Marco Saerens & François Fouss Abstract This work introduces

More information

Advanced Algorithms and Data Structures

Advanced Algorithms and Data Structures Advanced Algorithms and Data Structures Prof. Tapio Elomaa tapio.elomaa@tut.fi Course Prerequisites A seven credit unit course Replaced OHJ-2156 Analysis of Algorithms We take things a bit further than

More information

NEW MODIFIED LEFT-TO-RIGHT RADIX-R REPRESENTATION FOR INTEGERS. Arash Eghdamian 1*, Azman Samsudin 1

NEW MODIFIED LEFT-TO-RIGHT RADIX-R REPRESENTATION FOR INTEGERS. Arash Eghdamian 1*, Azman Samsudin 1 International Journal of Technology (2017) 3: 519-527 ISSN 2086-9614 IJTech 2017 NEW MODIFIED LEFT-TO-RIGHT RADIX-R REPRESENTATION FOR INTEGERS Arash Eghdamian 1*, Azman Samsudin 1 1 School of Computer

More information

Probabilistic Graphical Models

Probabilistic Graphical Models Overview of Part Two Probabilistic Graphical Models Part Two: Inference and Learning Christopher M. Bishop Exact inference and the junction tree MCMC Variational methods and EM Example General variational

More information

MULTIVARIATE TEXTURE DISCRIMINATION USING A PRINCIPAL GEODESIC CLASSIFIER

MULTIVARIATE TEXTURE DISCRIMINATION USING A PRINCIPAL GEODESIC CLASSIFIER MULTIVARIATE TEXTURE DISCRIMINATION USING A PRINCIPAL GEODESIC CLASSIFIER A.Shabbir 1, 2 and G.Verdoolaege 1, 3 1 Department of Applied Physics, Ghent University, B-9000 Ghent, Belgium 2 Max Planck Institute

More information

Hidden Markov Models. Slides adapted from Joyce Ho, David Sontag, Geoffrey Hinton, Eric Xing, and Nicholas Ruozzi

Hidden Markov Models. Slides adapted from Joyce Ho, David Sontag, Geoffrey Hinton, Eric Xing, and Nicholas Ruozzi Hidden Markov Models Slides adapted from Joyce Ho, David Sontag, Geoffrey Hinton, Eric Xing, and Nicholas Ruozzi Sequential Data Time-series: Stock market, weather, speech, video Ordered: Text, genes Sequential

More information

The Un-normalized Graph p-laplacian based Semi-supervised Learning Method and Speech Recognition Problem

The Un-normalized Graph p-laplacian based Semi-supervised Learning Method and Speech Recognition Problem Int. J. Advance Soft Compu. Appl, Vol. 9, No. 1, March 2017 ISSN 2074-8523 The Un-normalized Graph p-laplacian based Semi-supervised Learning Method and Speech Recognition Problem Loc Tran 1 and Linh Tran

More information

An algorithm for Performance Analysis of Single-Source Acyclic graphs

An algorithm for Performance Analysis of Single-Source Acyclic graphs An algorithm for Performance Analysis of Single-Source Acyclic graphs Gabriele Mencagli September 26, 2011 In this document we face with the problem of exploiting the performance analysis of acyclic graphs

More information

Estimation of Bilateral Connections in a Network: Copula vs. Maximum Entropy

Estimation of Bilateral Connections in a Network: Copula vs. Maximum Entropy Estimation of Bilateral Connections in a Network: Copula vs. Maximum Entropy Pallavi Baral and Jose Pedro Fique Department of Economics Indiana University at Bloomington 1st Annual CIRANO Workshop on Networks

More information

Computer Project #2 (Matrix Operations)

Computer Project #2 (Matrix Operations) Math 0280 Introduction to Matrices and Linear Algebra Fall 2006 Computer Project #2 (Matrix Operations) SCHEDULE: This assignment is due in class on Monday, October 23, 2006. One submission per group is

More information

Using Templates to Introduce Time Efficiency Analysis in an Algorithms Course

Using Templates to Introduce Time Efficiency Analysis in an Algorithms Course Using Templates to Introduce Time Efficiency Analysis in an Algorithms Course Irena Pevac Department of Computer Science Central Connecticut State University, New Britain, CT, USA Abstract: We propose

More information

A linear algebra processor using Monte Carlo methods

A linear algebra processor using Monte Carlo methods A linear algebra processor using Monte Carlo methods Conference or Workshop Item Accepted Version Plaks, T. P., Megson, G. M., Cadenas Medina, J. O. and Alexandrov, V. N. (2003) A linear algebra processor

More information

GraphBLAS Mathematics - Provisional Release 1.0 -

GraphBLAS Mathematics - Provisional Release 1.0 - GraphBLAS Mathematics - Provisional Release 1.0 - Jeremy Kepner Generated on April 26, 2017 Contents 1 Introduction: Graphs as Matrices........................... 1 1.1 Adjacency Matrix: Undirected Graphs,

More information

surface but these local maxima may not be optimal to the objective function. In this paper, we propose a combination of heuristic methods: first, addi

surface but these local maxima may not be optimal to the objective function. In this paper, we propose a combination of heuristic methods: first, addi MetaHeuristics for a Non-Linear Spatial Sampling Problem Eric M. Delmelle Department of Geography and Earth Sciences University of North Carolina at Charlotte eric.delmelle@uncc.edu 1 Introduction In spatial

More information

Shortest Path Algorithm

Shortest Path Algorithm Shortest Path Algorithm Shivani Sanan* 1, Leena jain 2, Bharti Kappor 3 *1 Assistant Professor, Faculty of Mathematics, Department of Applied Sciences 2 Associate Professor & Head- MCA 3 Assistant Professor,

More information

Bipartite Perfect Matching in O(n log n) Randomized Time. Nikhil Bhargava and Elliot Marx

Bipartite Perfect Matching in O(n log n) Randomized Time. Nikhil Bhargava and Elliot Marx Bipartite Perfect Matching in O(n log n) Randomized Time Nikhil Bhargava and Elliot Marx Background Matching in bipartite graphs is a problem that has many distinct applications. Many problems can be reduced

More information

Faster Algorithms for Computing Distances between One-Dimensional Point Sets

Faster Algorithms for Computing Distances between One-Dimensional Point Sets Faster Algorithms for Computing Distances between One-Dimensional Point Sets Justin Colannino School of Computer Science McGill University Montréal, Québec, Canada July 8, 25 Godfried Toussaint Abstract

More information

An Information Theory Approach to Identify Sets of Key Players

An Information Theory Approach to Identify Sets of Key Players An Information Theory Approach to Identify Sets of Key Players Daniel Ortiz-Arroyo and Akbar Hussain Electronics Department Aalborg University Niels Bohrs Vej 8, 6700 Esbjerg Denmark do@cs.aaue.dk, akbar@cs.aaue.dk

More information

2.7 Cloth Animation. Jacobs University Visualization and Computer Graphics Lab : Advanced Graphics - Chapter 2 123

2.7 Cloth Animation. Jacobs University Visualization and Computer Graphics Lab : Advanced Graphics - Chapter 2 123 2.7 Cloth Animation 320491: Advanced Graphics - Chapter 2 123 Example: Cloth draping Image Michael Kass 320491: Advanced Graphics - Chapter 2 124 Cloth using mass-spring model Network of masses and springs

More information

A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION

A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS Kyoungjin Park Alper Yilmaz Photogrammetric and Computer Vision Lab Ohio State University park.764@osu.edu yilmaz.15@osu.edu ABSTRACT Depending

More information

Department of Computer Science & Engineering Indian Institute of Technology Patna CS701 DISTRIBUTED SYSTEMS AND ALGORITHMS

Department of Computer Science & Engineering Indian Institute of Technology Patna CS701 DISTRIBUTED SYSTEMS AND ALGORITHMS CS701 DISTRIBUTED SYSTEMS AND ALGORITHMS 3-0-0-6 Basic concepts. Models of computation: shared memory and message passing systems, synchronous and asynchronous systems. Logical time and event ordering.

More information

Clustering Algorithms for Data Stream

Clustering Algorithms for Data Stream Clustering Algorithms for Data Stream Karishma Nadhe 1, Prof. P. M. Chawan 2 1Student, Dept of CS & IT, VJTI Mumbai, Maharashtra, India 2Professor, Dept of CS & IT, VJTI Mumbai, Maharashtra, India Abstract:

More information

Graph Data Processing with MapReduce

Graph Data Processing with MapReduce Distributed data processing on the Cloud Lecture 5 Graph Data Processing with MapReduce Satish Srirama Some material adapted from slides by Jimmy Lin, 2015 (licensed under Creation Commons Attribution

More information

Announcements. Image Matching! Source & Destination Images. Image Transformation 2/ 3/ 16. Compare a big image to a small image

Announcements. Image Matching! Source & Destination Images. Image Transformation 2/ 3/ 16. Compare a big image to a small image 2/3/ Announcements PA is due in week Image atching! Leave time to learn OpenCV Think of & implement something creative CS 50 Lecture #5 February 3 rd, 20 2/ 3/ 2 Compare a big image to a small image So

More information

A Comparison of Pattern-Based Spectral Clustering Algorithms in Directed Weighted Network

A Comparison of Pattern-Based Spectral Clustering Algorithms in Directed Weighted Network A Comparison of Pattern-Based Spectral Clustering Algorithms in Directed Weighted Network Sumuya Borjigin 1. School of Economics and Management, Inner Mongolia University, No.235 West College Road, Hohhot,

More information

THE RECURSIVE LOGIT MODEL TUTORIAL

THE RECURSIVE LOGIT MODEL TUTORIAL THE RECURSIVE LOGIT MODEL TUTORIAL CIRRELT SEMINAR August 2017 MAELLE ZIMMERMANN, TIEN MAI, EMMA FREJINGER CIRRELT and Université de Montréal, Canada Ecole Polytechnique de Montréal, Canada TUTORIAL GOALS

More information

1 Random Walks on Graphs

1 Random Walks on Graphs Lecture 7 Com S 633: Randomness in Computation Scribe: Ankit Agrawal In the last lecture, we looked at random walks on line and used them to devise randomized algorithms for 2-SAT and 3-SAT For 2-SAT we

More information

Probabilistic Double-Distance Algorithm of Search after Static or Moving Target by Autonomous Mobile Agent

Probabilistic Double-Distance Algorithm of Search after Static or Moving Target by Autonomous Mobile Agent 2010 IEEE 26-th Convention of Electrical and Electronics Engineers in Israel Probabilistic Double-Distance Algorithm of Search after Static or Moving Target by Autonomous Mobile Agent Eugene Kagan Dept.

More information

Recap: Gaussian (or Normal) Distribution. Recap: Minimizing the Expected Loss. Topics of This Lecture. Recap: Maximum Likelihood Approach

Recap: Gaussian (or Normal) Distribution. Recap: Minimizing the Expected Loss. Topics of This Lecture. Recap: Maximum Likelihood Approach Truth Course Outline Machine Learning Lecture 3 Fundamentals (2 weeks) Bayes Decision Theory Probability Density Estimation Probability Density Estimation II 2.04.205 Discriminative Approaches (5 weeks)

More information

Lecture 9 - Matrix Multiplication Equivalences and Spectral Graph Theory 1

Lecture 9 - Matrix Multiplication Equivalences and Spectral Graph Theory 1 CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanfordedu) February 6, 2018 Lecture 9 - Matrix Multiplication Equivalences and Spectral Graph Theory 1 In the

More information

Analysis of Biological Networks. 1. Clustering 2. Random Walks 3. Finding paths

Analysis of Biological Networks. 1. Clustering 2. Random Walks 3. Finding paths Analysis of Biological Networks 1. Clustering 2. Random Walks 3. Finding paths Problem 1: Graph Clustering Finding dense subgraphs Applications Identification of novel pathways, complexes, other modules?

More information

Lecture 1. Introduction

Lecture 1. Introduction Lecture 1 Introduction 1 Lecture Contents 1. What is an algorithm? 2. Fundamentals of Algorithmic Problem Solving 3. Important Problem Types 4. Fundamental Data Structures 2 1. What is an Algorithm? Algorithm

More information

MAT 280: Laplacian Eigenfunctions: Theory, Applications, and Computations Lecture 18: Introduction to Spectral Graph Theory I. Basics of Graph Theory

MAT 280: Laplacian Eigenfunctions: Theory, Applications, and Computations Lecture 18: Introduction to Spectral Graph Theory I. Basics of Graph Theory MAT 280: Laplacian Eigenfunctions: Theory, Applications, and Computations Lecture 18: Introduction to Spectral Graph Theory I. Basics of Graph Theory Lecturer: Naoki Saito Scribe: Adam Dobrin/Allen Xue

More information

Available online at ScienceDirect. Procedia Computer Science 20 (2013 )

Available online at  ScienceDirect. Procedia Computer Science 20 (2013 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 20 (2013 ) 522 527 Complex Adaptive Systems, Publication 3 Cihan H. Dagli, Editor in Chief Conference Organized by Missouri

More information

DynaTraffic Models and mathematical prognosis. Simulation of the distribution of traffic with the help of Markov chains

DynaTraffic Models and mathematical prognosis. Simulation of the distribution of traffic with the help of Markov chains DynaTraffic Models and mathematical prognosis Simulation of the distribution of traffic with the help of Markov chains What is this about? Models of traffic situations Graphs: Edges, Vertices Matrix representation

More information

Simplicial Complexes of Networks and Their Statistical Properties

Simplicial Complexes of Networks and Their Statistical Properties Simplicial Complexes of Networks and Their Statistical Properties Slobodan Maletić, Milan Rajković*, and Danijela Vasiljević Institute of Nuclear Sciences Vinča, elgrade, Serbia *milanr@vin.bg.ac.yu bstract.

More information

This chapter explains two techniques which are frequently used throughout

This chapter explains two techniques which are frequently used throughout Chapter 2 Basic Techniques This chapter explains two techniques which are frequently used throughout this thesis. First, we will introduce the concept of particle filters. A particle filter is a recursive

More information

Chapter 2 Graphs. 2.1 Definition of Graphs

Chapter 2 Graphs. 2.1 Definition of Graphs Chapter 2 Graphs Abstract Graphs are discrete structures that consist of vertices and edges connecting some of these vertices. Graphs have many applications in Mathematics, Computer Science, Engineering,

More information

Adaptive Metric Nearest Neighbor Classification

Adaptive Metric Nearest Neighbor Classification Adaptive Metric Nearest Neighbor Classification Carlotta Domeniconi Jing Peng Dimitrios Gunopulos Computer Science Department Computer Science Department Computer Science Department University of California

More information

Volume 2, Issue 11, November 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 11, November 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 11, November 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

Element Quality Metrics for Higher-Order Bernstein Bézier Elements

Element Quality Metrics for Higher-Order Bernstein Bézier Elements Element Quality Metrics for Higher-Order Bernstein Bézier Elements Luke Engvall and John A. Evans Abstract In this note, we review the interpolation theory for curvilinear finite elements originally derived

More information

Mathematics. 2.1 Introduction: Graphs as Matrices Adjacency Matrix: Undirected Graphs, Directed Graphs, Weighted Graphs CHAPTER 2

Mathematics. 2.1 Introduction: Graphs as Matrices Adjacency Matrix: Undirected Graphs, Directed Graphs, Weighted Graphs CHAPTER 2 CHAPTER Mathematics 8 9 10 11 1 1 1 1 1 1 18 19 0 1.1 Introduction: Graphs as Matrices This chapter describes the mathematics in the GraphBLAS standard. The GraphBLAS define a narrow set of mathematical

More information

COMPUTER VISION > OPTICAL FLOW UTRECHT UNIVERSITY RONALD POPPE

COMPUTER VISION > OPTICAL FLOW UTRECHT UNIVERSITY RONALD POPPE COMPUTER VISION 2017-2018 > OPTICAL FLOW UTRECHT UNIVERSITY RONALD POPPE OUTLINE Optical flow Lucas-Kanade Horn-Schunck Applications of optical flow Optical flow tracking Histograms of oriented flow Assignment

More information

MCL. (and other clustering algorithms) 858L

MCL. (and other clustering algorithms) 858L MCL (and other clustering algorithms) 858L Comparing Clustering Algorithms Brohee and van Helden (2006) compared 4 graph clustering algorithms for the task of finding protein complexes: MCODE RNSC Restricted

More information

Bayesian Estimation for Skew Normal Distributions Using Data Augmentation

Bayesian Estimation for Skew Normal Distributions Using Data Augmentation The Korean Communications in Statistics Vol. 12 No. 2, 2005 pp. 323-333 Bayesian Estimation for Skew Normal Distributions Using Data Augmentation Hea-Jung Kim 1) Abstract In this paper, we develop a MCMC

More information

Subjective Randomness and Natural Scene Statistics

Subjective Randomness and Natural Scene Statistics Subjective Randomness and Natural Scene Statistics Ethan Schreiber (els@cs.brown.edu) Department of Computer Science, 115 Waterman St Providence, RI 02912 USA Thomas L. Griffiths (tom griffiths@berkeley.edu)

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introduction A Monte Carlo method is a compuational method that uses random numbers to compute (estimate) some quantity of interest. Very often the quantity we want to compute is the mean of

More information

Introduction III. Graphs. Motivations I. Introduction IV

Introduction III. Graphs. Motivations I. Introduction IV Introduction I Graphs Computer Science & Engineering 235: Discrete Mathematics Christopher M. Bourke cbourke@cse.unl.edu Graph theory was introduced in the 18th century by Leonhard Euler via the Königsberg

More information

Improving and Extending the Lim/Lee Exponentiation Algorithm

Improving and Extending the Lim/Lee Exponentiation Algorithm Improving and Extending the Lim/Lee Exponentiation Algorithm Biljana Cubaleska 1, Andreas Rieke 2, and Thomas Hermann 3 1 FernUniversität Hagen, Department of communication systems Feithstr. 142, 58084

More information

Where Next? Data Mining Techniques and Challenges for Trajectory Prediction. Slides credit: Layla Pournajaf

Where Next? Data Mining Techniques and Challenges for Trajectory Prediction. Slides credit: Layla Pournajaf Where Next? Data Mining Techniques and Challenges for Trajectory Prediction Slides credit: Layla Pournajaf o Navigational services. o Traffic management. o Location-based advertising. Source: A. Monreale,

More information

Samuel Coolidge, Dan Simon, Dennis Shasha, Technical Report NYU/CIMS/TR

Samuel Coolidge, Dan Simon, Dennis Shasha, Technical Report NYU/CIMS/TR Detecting Missing and Spurious Edges in Large, Dense Networks Using Parallel Computing Samuel Coolidge, sam.r.coolidge@gmail.com Dan Simon, des480@nyu.edu Dennis Shasha, shasha@cims.nyu.edu Technical Report

More information

Using Spam Farm to Boost PageRank p. 1/2

Using Spam Farm to Boost PageRank p. 1/2 Using Spam Farm to Boost PageRank Ye Du Joint Work with: Yaoyun Shi and Xin Zhao University of Michigan, Ann Arbor Using Spam Farm to Boost PageRank p. 1/2 Roadmap Introduction: Link Spam and PageRank

More information

node2vec: Scalable Feature Learning for Networks

node2vec: Scalable Feature Learning for Networks node2vec: Scalable Feature Learning for Networks A paper by Aditya Grover and Jure Leskovec, presented at Knowledge Discovery and Data Mining 16. 11/27/2018 Presented by: Dharvi Verma CS 848: Graph Database

More information

Using Queuing theory the performance measures of cloud with infinite servers

Using Queuing theory the performance measures of cloud with infinite servers Using Queuing theory the performance measures of cloud with infinite servers A.Anupama Department of Information Technology GMR Institute of Technology Rajam, India anupama.a@gmrit.org G.Satya Keerthi

More information

2.2 Set Operations. Introduction DEFINITION 1. EXAMPLE 1 The union of the sets {1, 3, 5} and {1, 2, 3} is the set {1, 2, 3, 5}; that is, EXAMPLE 2

2.2 Set Operations. Introduction DEFINITION 1. EXAMPLE 1 The union of the sets {1, 3, 5} and {1, 2, 3} is the set {1, 2, 3, 5}; that is, EXAMPLE 2 2.2 Set Operations 127 2.2 Set Operations Introduction Two, or more, sets can be combined in many different ways. For instance, starting with the set of mathematics majors at your school and the set of

More information

Nonlinear Programming

Nonlinear Programming Nonlinear Programming SECOND EDITION Dimitri P. Bertsekas Massachusetts Institute of Technology WWW site for book Information and Orders http://world.std.com/~athenasc/index.html Athena Scientific, Belmont,

More information

Dynamic scaling for efficient, low-cost control of high-precision movements in large environments

Dynamic scaling for efficient, low-cost control of high-precision movements in large environments Centre for Theoretical Neuroscience Technical Report TR name UW-CTN-TR-1278-1 October 7th, 1 Dynamic scaling for efficient, low-cost control of high-precision movements in large environments Travis DeWolf

More information

1 More configuration model

1 More configuration model 1 More configuration model In the last lecture, we explored the definition of the configuration model, a simple method for drawing networks from the ensemble, and derived some of its mathematical properties.

More information

A novel algorithm to determine the leaf (leaves) of a binary tree from its preorder and postorder traversals

A novel algorithm to determine the leaf (leaves) of a binary tree from its preorder and postorder traversals Journal of Algorithms and Computation journal homepage: http://jac.ut.ac.ir A novel algorithm to determine the leaf (leaves) of a binary tree from its preorder and postorder traversals N. Aghaieabiane

More information

INTERIOR POINT METHOD BASED CONTACT ALGORITHM FOR STRUCTURAL ANALYSIS OF ELECTRONIC DEVICE MODELS

INTERIOR POINT METHOD BASED CONTACT ALGORITHM FOR STRUCTURAL ANALYSIS OF ELECTRONIC DEVICE MODELS 11th World Congress on Computational Mechanics (WCCM XI) 5th European Conference on Computational Mechanics (ECCM V) 6th European Conference on Computational Fluid Dynamics (ECFD VI) E. Oñate, J. Oliver

More information

Heat Kernels and Diffusion Processes

Heat Kernels and Diffusion Processes Heat Kernels and Diffusion Processes Definition: University of Alicante (Spain) Matrix Computing (subject 3168 Degree in Maths) 30 hours (theory)) + 15 hours (practical assignment) Contents 1. Solving

More information

Combinatorics Summary Sheet for Exam 1 Material 2019

Combinatorics Summary Sheet for Exam 1 Material 2019 Combinatorics Summary Sheet for Exam 1 Material 2019 1 Graphs Graph An ordered three-tuple (V, E, F ) where V is a set representing the vertices, E is a set representing the edges, and F is a function

More information

Dijkstra's Algorithm

Dijkstra's Algorithm Shortest Path Algorithm Dijkstra's Algorithm To find the shortest path from the origin node to the destination node No matrix calculation Floyd s Algorithm To find all the shortest paths from the nodes

More information

A Simplified Correctness Proof for a Well-Known Algorithm Computing Strongly Connected Components

A Simplified Correctness Proof for a Well-Known Algorithm Computing Strongly Connected Components A Simplified Correctness Proof for a Well-Known Algorithm Computing Strongly Connected Components Ingo Wegener FB Informatik, LS2, Univ. Dortmund, 44221 Dortmund, Germany wegener@ls2.cs.uni-dortmund.de

More information

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1 Communication Networks I December, Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page Communication Networks I December, Notation G = (V,E) denotes a

More information

Spectral Methods for Network Community Detection and Graph Partitioning

Spectral Methods for Network Community Detection and Graph Partitioning Spectral Methods for Network Community Detection and Graph Partitioning M. E. J. Newman Department of Physics, University of Michigan Presenters: Yunqi Guo Xueyin Yu Yuanqi Li 1 Outline: Community Detection

More information

CS583 Lecture 01. Jana Kosecka. some materials here are based on Profs. E. Demaine, D. Luebke A.Shehu, J-M. Lien and Prof. Wang s past lecture notes

CS583 Lecture 01. Jana Kosecka. some materials here are based on Profs. E. Demaine, D. Luebke A.Shehu, J-M. Lien and Prof. Wang s past lecture notes CS583 Lecture 01 Jana Kosecka some materials here are based on Profs. E. Demaine, D. Luebke A.Shehu, J-M. Lien and Prof. Wang s past lecture notes Course Info course webpage: - from the syllabus on http://cs.gmu.edu/

More information

A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY

A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY KARL L. STRATOS Abstract. The conventional method of describing a graph as a pair (V, E), where V and E repectively denote the sets of vertices and edges,

More information

2. (a) Briefly discuss the forms of Data preprocessing with neat diagram. (b) Explain about concept hierarchy generation for categorical data.

2. (a) Briefly discuss the forms of Data preprocessing with neat diagram. (b) Explain about concept hierarchy generation for categorical data. Code No: M0502/R05 Set No. 1 1. (a) Explain data mining as a step in the process of knowledge discovery. (b) Differentiate operational database systems and data warehousing. [8+8] 2. (a) Briefly discuss

More information

CS 157: Assignment 5

CS 157: Assignment 5 Problem : Printing Neatly CS 157: Assignment 5 Douglas R. Lanman 4 April 006 In a word processor or in L A TEX, one routinely encounters the pretty printing problem. That is, how does one transform text

More information

The Further Mathematics Support Programme

The Further Mathematics Support Programme Degree Topics in Mathematics Groups A group is a mathematical structure that satisfies certain rules, which are known as axioms. Before we look at the axioms, we will consider some terminology. Elements

More information

From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols

From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols SIAM Journal on Computing to appear From Static to Dynamic Routing: Efficient Transformations of StoreandForward Protocols Christian Scheideler Berthold Vöcking Abstract We investigate how static storeandforward

More information

Determining Resource Needs of Autonomous Agents in Decoupled Plans

Determining Resource Needs of Autonomous Agents in Decoupled Plans Determining Resource Needs of Autonomous Agents in Decoupled Plans Jasper Oosterman a Remco Ravenhorst a Pim van Leeuwen b Cees Witteveen a a Delft University of Technology, Algorithmics group, Delft b

More information

Hybrid Feature Selection for Modeling Intrusion Detection Systems

Hybrid Feature Selection for Modeling Intrusion Detection Systems Hybrid Feature Selection for Modeling Intrusion Detection Systems Srilatha Chebrolu, Ajith Abraham and Johnson P Thomas Department of Computer Science, Oklahoma State University, USA ajith.abraham@ieee.org,

More information

Network embedding. Cheng Zheng

Network embedding. Cheng Zheng Network embedding Cheng Zheng Outline Problem definition Factorization based algorithms --- Laplacian Eigenmaps(NIPS, 2001) Random walk based algorithms ---DeepWalk(KDD, 2014), node2vec(kdd, 2016) Deep

More information

A SIMPLE APPROXIMATION ALGORITHM FOR NONOVERLAPPING LOCAL ALIGNMENTS (WEIGHTED INDEPENDENT SETS OF AXIS PARALLEL RECTANGLES)

A SIMPLE APPROXIMATION ALGORITHM FOR NONOVERLAPPING LOCAL ALIGNMENTS (WEIGHTED INDEPENDENT SETS OF AXIS PARALLEL RECTANGLES) Chapter 1 A SIMPLE APPROXIMATION ALGORITHM FOR NONOVERLAPPING LOCAL ALIGNMENTS (WEIGHTED INDEPENDENT SETS OF AXIS PARALLEL RECTANGLES) Piotr Berman Department of Computer Science & Engineering Pennsylvania

More information

Hoffman-Singleton Graph

Hoffman-Singleton Graph Hoffman-Singleton Graph Elena Ortega Fall 2007 MATH 6023 Topics: Design and Graph Theory Graph Project Properties of the Hoffman-Singleton graph If we consider a specified vertex in a graph with order

More information

The Elliptic Curve Discrete Logarithm and Functional Graphs

The Elliptic Curve Discrete Logarithm and Functional Graphs Rose-Hulman Institute of Technology Rose-Hulman Scholar Mathematical Sciences Technical Reports (MSTR) Mathematics 7-9-0 The Elliptic Curve Discrete Logarithm and Functional Graphs Christopher J. Evans

More information

Chapter 18. Geometric Operations

Chapter 18. Geometric Operations Chapter 18 Geometric Operations To this point, the image processing operations have computed the gray value (digital count) of the output image pixel based on the gray values of one or more input pixels;

More information

QUALITATIVE MODELING FOR MAGNETIZATION CURVE

QUALITATIVE MODELING FOR MAGNETIZATION CURVE Journal of Marine Science and Technology, Vol. 8, No. 2, pp. 65-70 (2000) 65 QUALITATIVE MODELING FOR MAGNETIZATION CURVE Pei-Hwa Huang and Yu-Shuo Chang Keywords: Magnetization curve, Qualitative modeling,

More information

Tools and Primitives for High Performance Graph Computation

Tools and Primitives for High Performance Graph Computation Tools and Primitives for High Performance Graph Computation John R. Gilbert University of California, Santa Barbara Aydin Buluç (LBNL) Adam Lugowski (UCSB) SIAM Minisymposium on Analyzing Massive Real-World

More information

Data Analytics and Boolean Algebras

Data Analytics and Boolean Algebras Data Analytics and Boolean Algebras Hans van Thiel November 28, 2012 c Muitovar 2012 KvK Amsterdam 34350608 Passeerdersstraat 76 1016 XZ Amsterdam The Netherlands T: + 31 20 6247137 E: hthiel@muitovar.com

More information

Matrices. A Matrix (This one has 2 Rows and 3 Columns) To add two matrices: add the numbers in the matching positions:

Matrices. A Matrix (This one has 2 Rows and 3 Columns) To add two matrices: add the numbers in the matching positions: Matrices A Matrix is an array of numbers: We talk about one matrix, or several matrices. There are many things we can do with them... Adding A Matrix (This one has 2 Rows and 3 Columns) To add two matrices:

More information

COMPUTER EXERCISE: POPULATION DYNAMICS IN SPACE September 3, 2013

COMPUTER EXERCISE: POPULATION DYNAMICS IN SPACE September 3, 2013 COMPUTER EXERCISE: POPULATION DYNAMICS IN SPACE September 3, 2013 Objectives: Introduction to coupled maps lattice as a basis for spatial modeling Solve a spatial Ricker model to investigate how wave speed

More information

Data Communication and Parallel Computing on Twisted Hypercubes

Data Communication and Parallel Computing on Twisted Hypercubes Data Communication and Parallel Computing on Twisted Hypercubes E. Abuelrub, Department of Computer Science, Zarqa Private University, Jordan Abstract- Massively parallel distributed-memory architectures

More information

Undirected Graphical Models. Raul Queiroz Feitosa

Undirected Graphical Models. Raul Queiroz Feitosa Undirected Graphical Models Raul Queiroz Feitosa Pros and Cons Advantages of UGMs over DGMs UGMs are more natural for some domains (e.g. context-dependent entities) Discriminative UGMs (CRF) are better

More information

Chapter 10. Fundamental Network Algorithms. M. E. J. Newman. May 6, M. E. J. Newman Chapter 10 May 6, / 33

Chapter 10. Fundamental Network Algorithms. M. E. J. Newman. May 6, M. E. J. Newman Chapter 10 May 6, / 33 Chapter 10 Fundamental Network Algorithms M. E. J. Newman May 6, 2015 M. E. J. Newman Chapter 10 May 6, 2015 1 / 33 Table of Contents 1 Algorithms for Degrees and Degree Distributions Degree-Degree Correlation

More information

Homework # 2 Due: October 6. Programming Multiprocessors: Parallelism, Communication, and Synchronization

Homework # 2 Due: October 6. Programming Multiprocessors: Parallelism, Communication, and Synchronization ECE669: Parallel Computer Architecture Fall 2 Handout #2 Homework # 2 Due: October 6 Programming Multiprocessors: Parallelism, Communication, and Synchronization 1 Introduction When developing multiprocessor

More information