Characterizing Decoding Robustness under Parametric Channel Uncertainty

Size: px
Start display at page:

Download "Characterizing Decoding Robustness under Parametric Channel Uncertainty"

Transcription

1 Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric channel uncertainty. We consier iscrete channel moels escribe by probabilistic graphical moels, such as finite state channels. Using recent avances from the fiel of tropical geometry, we are able to partition the channel parameter space into cells corresponing to all channels that ientically ecoe a given output coewor. The partition, base on a combinatorial object calle the Newton polytope of the graphical moel, can be efficiently compute in polynomial time (in terms of the number of parameters in the channel moel). This partitioning of the channel parameter space provies two key results: 1) Given a nominal (vector) channel parameter, one can easily gauge the robustness of the ecoing as a function of eviations from this nominal parameter; 2) Rather than obtaining one ecoing for a single parametrization, one can obtain a list of ecoings for a family of channel parametrizations at the ecoer. I. INTRODUCTION Success of a communication system lies in how well it can encoe an ecoe ata. While many of toay s commonly employe channel ecoing techniques are built on the premise that the ecoer has knowlege of the true channel parameters, this is almost never the case in reality. In this paper, we attempt to characterize the robustness of ecoing uner parametric uncertainties in iscrete channels escribe by probabilistic graphical moels. The focus of the paper is not on moeling the uncertainties themselves, but rather on examining the relationship between ecoing outputs an variations in the channel parametrization. Recent avances in the fiel of tropical geometry [1] enable us to partition the channel parameter space into cells consisting of equivalent channels. By equivalent we mean that for a given output coewor, all the channels escribe by the parameters in a given cell will prouce the ientical maximum a posteriori (MAP) ecoing. This partitioning of the channel parameter space, which is a function of the family of graphical moels an the output coewor, can be compute in time that is polynomial in the imension of the channel parametrization an provies tremenous insight into the robustness of a given ecoing. For example, suppose we have a nominal (vector) channel parameter an fin that an ientical ecoing results from a large ball of channels about this nominal setting. In such a case, we may This work was partially supporte by the NSF uner grant nos. CNS , ECS , an CCF JDW, WUB, NB, an JDN are with the Department of Electrical an Computer Engineering, University of Wisconsin-Maison, Maison, WI 5376, USA. NB is also with the Department of Mathematics, University of Wisconsin-Maison ( s: jwierer@wisc.eu, bajwa@cae.wisc.eu, boston@math.wisc.eu, nowak@engr.wisc.eu). conclue that the ecoing is robust to possible eviations of the true parameter from the nominal parameter. On the other han, if the nominal parameter is near the bounary of a partition cell then a slight perturbation of the true parameter coul lea to a completely ifferent ecoing, inicating a non-robust conition. To motivate our investigation further, consier the simple example of a binary symmetric channel (BSC) with crossover probability p. Suppose that we employ block coing as a means of transmitting ata over this BSC. In this situation, it is obvious that the MAP ecoing rule is the nearestneighbor ecoing (in Hamming space) for p < 1/2, an the farthest-neighbor ecoing for p > 1/2. Thus, the parameter space of a BSC can be partitione into the intervals [, 1/2) an (1/2, 1]. If our nominal setting for p is close to 1/2, then we see that we are in a very non-robust situation. While this partitioning of the one-imensional parameter space of a BSC is trivial, the etermination of analogous partitions for iscrete channel moels with higher imensional parameter spaces is highly non-trivial. In the sequel, we present a unifie computational approach to solving this problem for iscrete channels escribe by graphical moels (e.g, finite state (Markov) channels [2]). II. CHANNEL PARAMETER SPACE PARTITIONING In this section, we formally efine the channel parameter space partitioning problem uner consieration. Consier a point-to-point igital communication system with finite input coebook X an finite output coebook Y. An input coewor x X is transmitte through a iscrete channel which prouces an output coewor y Y. It is further assume that the iscrete channel is represente by a irecte acyclic graphical moel an the joint probability of an inputoutput coewor pair can be written as a monomial in a -imensional parameter θ = (a 1,..., a ), that is, P(x, y; θ) = a ν1(x 1 a ν2(x 2 a ν (x, (1) where the powers ν j (x, y), j = 1,...,, are integer-value functions of the pair (x, y), an the parameter θ is an element of the parameter space Θ that efines all possible channels. Finite state channels (FSCs) [2] are one class of channel moels having this form an, for the sake of this exposition, we woul focus exclusively on them. In particular, as a special case of the general FSC, we will carefully investigate a two-state (binary input, quaternary output) intersymbol interference (ISI) channel moel in Section V. Note that in the case of an FSC, one also inclues epenence on the channel state, s, which takes value in the state space

2 a C(x 2 C(x 4 sizeable ball of θ will also ecoe y to x 1. Thus, we can say (loosely) that the ecoing of y base on θ is robust. On the other han, parameter θ 1 is near the bounary of a cell an so the ecoing of y base on θ 1 is not robust. It may be esirable in such cases to provie the ecoer with a list ecoing. In this specific case, the orere list might be (x 1, x 3, x 4, x 2 ) base on the proximity of cell bounaries to θ 1, which is immeiately available from the partition. 1.5 θ θ 1 C(x 1 C(x a 1 Fig. 1. Partitioning of the channel parameter space Θ for a given output coewor y. S [2]. That is, the channel is characterize by the joint probability istribution of the input an output coewors, an the channel state as follows P(x, y, s; θ) = a ν1(x,y,s) 1 a ν2(x,y,s) 2 a ν (x,y,s), (2) where again the powers ν j (x, y, s), j = 1,...,, are integervalue functions. Finally, note that the MAP ecoing rule for a fixe channel parameter θ is given by x(θ ) = argmax x X { max s S P(x, y, s; θ ) or, alternatively, if the state of the channel is known to be s () through some sie information then the MAP ecoing is taken to be } (3) x(θ ) = argmax x X P(x, y, s() ; θ ). (4) Our main interest here concerns the subset Θ Θ such that x(θ) = x(θ ) for every θ Θ. Thus, Θ efines the collection of channel parameters that are equivalent to θ for the output coewor y. More generally, we are intereste in a partition of Θ into subsets/cells corresponing to channel parameters that prouce ientical MAP ecoings for the output coewor y. Partitions of this form allow us to assess the robustness of a given ecoing an simultaneously recover a list ecoing that is orere relative to the proximity of cell bounaries to a nominal parameter setting. To illustrate this iea further, consier the partition of a two-imensional channel parameter space given by Θ = {(a 1, a 2 ) : a 1, a 2 }, as shown in Fig. 1. The partition of Θ is etermine by the output coewor y (an the unerlying graphical moel) an the partition cells can be enumerate in terms of the input coewors. For example, C(x 4, y) Θ is the set of all channel parameters that ecoe y to the input coewor x 4. To illustrate the notion of ecoing robustness, consier the parameter θ. As can be seen from the figure, θ is well containe within the interior of cell C(x 1, y) an hence, all channel parameters within a III. NEWTON POLYTOPES OF FINITE STATE CHANNELS In this section, we introuce concepts from tropical geometry that enable the polynomial-time construction of the partition of the channel parameter space. For channels with joint probability istributions of the form given in (2), we can write the (marginal) probability istribution of y as f y := P(y; θ) = P(x, y, s; θ) = a ν1(x,y,s) 1 a ν2(x,y,s) 2 a ν (x,y,s). (5) Now consier the tropicalization of f y, enote by g y, which is obtaine by replacing the operators (+, ) with the operators (min, +) an a i with log(a i ) [1], [3]. This gives us g y = min min i=1 min = min ( ν i (x, y, s)log(a i )) ν(x, y, s), log(θ), (6) where, is use to enote an inner prouct, ν(x, y, s) = (ν 1 (x, y, s),..., ν (x, y, s)) an log(θ) = ( log(a 1 ),..., log(a )). The interesting thing to observe here is that g y coincies with the negative-log joint probability evaluate at the MAP values of x an s. The Newton polytope of f y, enote by NP(f y ), is simply the convex hull of ν(x, y, s) for all x X an s S, namely, NP(f y ) = conv {ν(x, y, s) : x X, s S}. (7) A nice consequence of tropicalizing f y by g y is that the function g y is piecewise linear on the cones in the normal fan of NP(f y ). Note that the normal cone to a close, convex set K R at the point v K is traitionally efine to be the set NC(v, K) R such that NC(v, K) = {b R : v u, b u K}. (8) However, in this context, we efine the normal cone of a vertex v NP(f y ) to be the set of (log) parameters NC(v, f y ) such that v minimizes v, b for all b NC(v, f y ) an all u NP(f y ), namely, NC(v, f y ) = {b R : v u, b u NP(f y )}. (9) The usefulness of these Newton polytopes lies in the fact that, given the nominal channel parameter θ, they can be use to ecoe a given output coewor y to the optimal

3 Fig. 2. An example of a Newton polytope. input coewor x an optimal state vector ŝ. To observe this, note that x(θ ), ŝ(θ ) = arg max x X,s S P(x, y, s; θ ) = arg min log(p(x, y, s; θ )) x X,s S = arg min ( ν i (x, y, s)log(a i )) x X,s S i=1 = arg min x X,s S ν(x, y, s), log(θ ) (1) an thus, by a simple convexity argument, the point ν( x(θ ), y, ŝ(θ )) is a vertex of NP(f y ); hence, the point b = log(θ ) lies in NC(ν( x(θ ), y, ŝ(θ )), f y ). If the optimal channel state vector is eeme to be unimportant, we may simply ecoe y to x(θ ) as given in (3). Aitionally, if the channel state vector is known, we may use (4) to ecoe the output coewor y. Finally, note that typically one woul expect the number of possible ecoings to be on the orer of X S, that

4 1 b 2 C(x 3 C(x 1 C(x 4 C(x 2 b Fig. 3. space. Decoing regions for example 1 in the tropical channel parameter Fig. 4. A two-state binary input, quaternary output pure intersymbol interference channel moel. Specifically, let Vx be the vertices of NP(f y ) that o not correspon to x, then v u, b δ = min, (14) u V x v u where v is the vertex of NP(f y ) corresponing to the MAP solution. Example 1 (Continue): We return to the example of Section III. Again, we assume that the channel has only one state. With Newton polytope NP(f y ) as given in Fig. 2, we can also etermine the tropical ecoing regions C(x, y) an the regular ecoing regions C(x, y) for x corresponing to the vertices of the Newton polytope. Let b 1 = log a 1 an b 2 = loga 2. Then, the tropical ecoing regions are given by the normal cones of the vertices of the Newton polytope an are escribe by C(x 1, y) = {(b 1, b 2 ) : b 2 >, b 1 + b 2 > } C(x 2, y) = {(b 1, b 2 ) : b 2 <, b 1 + b 2 > } C(x 3, y) = {(b 1, b 2 ) : b 2 >, b 1 + b 2 < } C(x 4, y) = {(b 1, b 2 ) : b 2 <, b 1 + b 2 < } (15) A plot of these tropical ecoing regions is given in Fig. 3. Similarly, the ecoing regions C(x, y) in the regular channel parameter space can be written as C(x 1, y) = {(a 1, a 2 ) : a 2 < 1, a 1 a 2 < 1} C(x 2, y) = {(a 1, a 2 ) : a 2 > 1, a 1 a 2 < 1} C(x 3, y) = {(a 1, a 2 ) : a 2 < 1, a 1 a 2 > 1} C(x 4, y) = {(a 1, a 2 ) : a 2 > 1, a 1 a 2 > 1} (16) The reaer shoul be remine that a 1, a 2 are not probabilities an hence, they nee not be containe within the unit square. These regular ecoing regions are plotte in Fig. 1. V. APPLICATION TO A SYMMETRIC ISI CHANNEL An intersymbol interference (ISI) channel is a special case of the general FSC in which the channel state vector s epens statistically on the input coewor x [2, pp. 97-1]. A pure ISI channel is the one in which the channel state vector epens eterministically on the input coewor. In this section, we apply the channel partitioning techniques evelope so far to ecoe the output of a two-state binary input, quaternary output pure ISI channel. The channel in Fig. 4 is a simple moel of such an ISI channel. The channel has input coewors x = (x 1,..., x N ) X {, 1} N an output coewors y = (y 1,..., y N ) Y = {a, b, c, } N. Further, as can be seen from the figure, the channel state at any time instant is the same as the channel input at the previous time instant. Without loss of generality, it is also assume that the channel starts from rest in the sense that s = x 1. Thus, the probability assignment on the current output y n conitione on the input coewor x is simply given by p(y n x) = p(y n x n 1 x n ) = p yn x n 1x n (17) for n {2,...,N}, an p(y n x) = p(y n x n ) = p yn x nx n for the specific case of n = 1. Aitionally, it is assume that we have a uniform prior over the input coebook, that is, p(x) = 1/ X, an that the channel outputs are statistically inepenent conitione on the input coewor, that is, N p(y x) = p y1 x 1x 1 p yn x n 1x n. (18) n=2 Finally, we assume that the ISI channel is symmetric in the sense that p a = p 11, p a 1 = p 1, p b = p c 11, p b 1 = p c 1, p c = p b 11, p c 1 = p b 1, p = p a 11, p 1 = p a 1. Note that in this specific case of a symmetric ISI channel, the channel parameter space is 6-imensional in the general case of a non-symmetric ISI channel, however, it can be as large as 14-imensional.

5 TABLE I COMPLEXITY OF MAP DECODINGS BASED ON NEWTON POLYTOPES N X = 2 N 3 # of NP(f y) Vertices A. Experiment 1: Complexity of Newton Polytopes As note earlier, a particularly exciting consequence of using Netwon polytopes for MAP etection is that the number of vertices of these Netwon polytopes grows only polynomially in the number of parameters of the graphical moel [3]. In the context of this symmetric ISI channel, therefore, it means that the number of MAP ecoings can be no larger than O(N 6 ), since the Newton polytope of an output coewor y of this channel can have imensions no larger than six. On the other han, since any reasonable input coebook will have carinality exponential in N, one woul expect the number of possible MAP ecoings to be exponential in the block length N. In this experiment, we numerically emonstrate the polynomial (or subexponential) complexity of MAP ecoings base on Newton polytopes. The input coebook X in this experiment is given by a ranom coebook of carinality 2 N 3, where N is the block length. Note that given an output coewor y, the corresponing Newton polytope NP(f y ) can be calculate by applying (7) to (18). However, these Newton polytopes can also be more easily calculate using the polytope propagation algorithm escribe in [3]. 1 The outcome of this experiment is summarize in Table 1. B. Experiment 2: Perturbation bouns uner parametric variation In this experiment, we consier the effect of varying channel parameters on the perturbation boun δ as escribe in Section IV. The input coebook X in this experiment is also given by a ranom coebook of carinality 2 N 3, where the block length is given by N = 5. In orer to visualize the outcome of this experiment, we reuce the imensionality of the channel parameter space to two by assigning the conitional probabilities as follows p a = p 11 = α A, p a 1 = p 1 = β4 p b = p c 11 = α2 A, p b 1 = p c 1 = β3 p c = p b 11 = α3 A, p c 1 = p b 1 = β2 p = p a 11 = α4 A, p 1 = p a 1 = β where α, β 1 are the two (variable) channel parameters, an A an B are the normalization constants given by A = α + α 2 + α 3 + α 4 an B = β + β 2 + β Ch. 6 an 7 in [4] also contain a etaile escription of this algorithm. log 1 (δ) x* = log 1 (β) Perturbation boun vs. ISI parameters log 1 (α) 4 x* = 111 Fig. 5. Perturbation boun δ in the tropical channel parameter space as a function of the ISI channel parameters α an β. β 4, respectively. Note that these geometrically progressing probability assignments are rather natural in the sense that, for example, if was transmitte then one is more likely to receive an a at the receiver than a b, a c or a. For the sake of this experiment, we fix the output coewor to be y = bcac while the input coebook is given by X = {111, 11, 1111, 1111}. We vary α an β from 1 1 to 1, an calculate the corresponing perturbation boun δ in the tropical channel parameter space as well as the optimal (MAP) input coewor. The results of this experiment are plotte in Fig. 5. The suen rop in the perturbation boun δ in the figure is an inication of the fact that the channel parameter θ = (α, β) is very close to the bounary separating two ecoing regions on one sie of this bounary is the ecoing region for x(θ) = 1111, while on the other sie is the ecoing region for x(θ) = 111. VI. CONCLUSION Base on recent avances in the fiel of tropical geometry, this work provies a new methoology for partitioning the parameter space of finite state channels into separate ecoing regions. The approach is base on a polynomial-time polytope propagation algorithm [3], [4], an the partitioning process is highly efficient an scalable. Furthermore, we have provie a framework for characterizing the robustness of ecoing uner uncertainties in the channel parameters. REFERENCES [1] J. Richter-Gebert, B. Sturmfels, an T. Theobal, First steps in tropical geometry, in Proc. Iempotent Mathematics an Mathematical Physics, ser. Contemporary Mathematics, vol Vienna, Austria: American Mathematical Society, Feb. 23, pp [2] R. G. Gallager, Information Theory an Reliable Communication. New York: John Wiley an Sons, Inc., [3] L. Pachter an B. Sturmfels, Tropical geometry of statistical moels, Proc. Natl. Aca. Sci., vol. 11, pp , 24. [4] L. Pachter an B. Sturmfels, Es., Algebraic Statistics for Computational Biology. Cambrige University Press, 25. [5] F. Kschischang, B. Frey, an H.-A. Loeliger, Factor graphs an the sum-prouct algorithm, IEEE Transactions on Information Theory, vol. 47, pp , 21. 2

Learning convex bodies is hard

Learning convex bodies is hard Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

arxiv: v1 [math.co] 15 Dec 2017

arxiv: v1 [math.co] 15 Dec 2017 Rectilinear Crossings in Complete Balance -Partite -Uniform Hypergraphs Rahul Gangopahyay Saswata Shannigrahi arxiv:171.05539v1 [math.co] 15 Dec 017 December 18, 017 Abstract In this paper, we stuy the

More information

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural

More information

EXACT SIMULATION OF A BOOLEAN MODEL

EXACT SIMULATION OF A BOOLEAN MODEL Original Research Paper oi:10.5566/ias.v32.p101-105 EXACT SIMULATION OF A BOOLEAN MODEL CHRISTIAN LANTUÉJOULB MinesParisTech 35 rue Saint-Honoré 77305 Fontainebleau France e-mail: christian.lantuejoul@mines-paristech.fr

More information

Kinematic Analysis of a Family of 3R Manipulators

Kinematic Analysis of a Family of 3R Manipulators Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,

More information

Analytical approximation of transient joint queue-length distributions of a finite capacity queueing network

Analytical approximation of transient joint queue-length distributions of a finite capacity queueing network Analytical approximation of transient joint queue-length istributions of a finite capacity queueing network Gunnar Flötterö Carolina Osorio March 29, 2013 Problem statements This work contributes to the

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Linear First-Order PDEs

Linear First-Order PDEs MODULE 2: FIRST-ORDER PARTIAL DIFFERENTIAL EQUATIONS 9 Lecture 2 Linear First-Orer PDEs The most general first-orer linear PDE has the form a(x, y)z x + b(x, y)z y + c(x, y)z = (x, y), (1) where a, b,

More information

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

1 Surprises in high dimensions

1 Surprises in high dimensions 1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

Secure Network Coding for Distributed Secret Sharing with Low Communication Cost

Secure Network Coding for Distributed Secret Sharing with Low Communication Cost Secure Network Coing for Distribute Secret Sharing with Low Communication Cost Nihar B. Shah, K. V. Rashmi an Kannan Ramchanran, Fellow, IEEE Abstract Shamir s (n,k) threshol secret sharing is an important

More information

2-connected graphs with small 2-connected dominating sets

2-connected graphs with small 2-connected dominating sets 2-connecte graphs with small 2-connecte ominating sets Yair Caro, Raphael Yuster 1 Department of Mathematics, University of Haifa at Oranim, Tivon 36006, Israel Abstract Let G be a 2-connecte graph. A

More information

Design of Policy-Aware Differentially Private Algorithms

Design of Policy-Aware Differentially Private Algorithms Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft

More information

Figure 1: Schematic of an SEM [source: ]

Figure 1: Schematic of an SEM [source:   ] EECI Course: -9 May 1 by R. Sanfelice Hybri Control Systems Eelco van Horssen E.P.v.Horssen@tue.nl Project: Scanning Electron Microscopy Introuction In Scanning Electron Microscopy (SEM) a (bunle) beam

More information

PERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING

PERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING PERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING PAMELA RUSSELL ADVISOR: PAUL CULL OREGON STATE UNIVERSITY ABSTRACT. Birchall an Teor prove that

More information

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

Evolutionary Optimisation Methods for Template Based Image Registration

Evolutionary Optimisation Methods for Template Based Image Registration Evolutionary Optimisation Methos for Template Base Image Registration Lukasz A Machowski, Tshilizi Marwala School of Electrical an Information Engineering University of Witwatersran, Johannesburg, South

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Fast Fractal Image Compression using PSO Based Optimization Techniques

Fast Fractal Image Compression using PSO Based Optimization Techniques Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting

More information

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis

More information

Optimal Oblivious Path Selection on the Mesh

Optimal Oblivious Path Selection on the Mesh Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract

More information

A Convex Clustering-based Regularizer for Image Segmentation

A Convex Clustering-based Regularizer for Image Segmentation Vision, Moeling, an Visualization (2015) D. Bommes, T. Ritschel an T. Schultz (Es.) A Convex Clustering-base Regularizer for Image Segmentation Benjamin Hell (TU Braunschweig), Marcus Magnor (TU Braunschweig)

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Module13:Interference-I Lecture 13: Interference-I

Module13:Interference-I Lecture 13: Interference-I Moule3:Interference-I Lecture 3: Interference-I Consier a situation where we superpose two waves. Naively, we woul expect the intensity (energy ensity or flux) of the resultant to be the sum of the iniviual

More information

6 Gradient Descent. 6.1 Functions

6 Gradient Descent. 6.1 Functions 6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output

More information

Fast Window Based Stereo Matching for 3D Scene Reconstruction

Fast Window Based Stereo Matching for 3D Scene Reconstruction The International Arab Journal of Information Technology, Vol. 0, No. 3, May 203 209 Fast Winow Base Stereo Matching for 3D Scene Reconstruction Mohamma Mozammel Chowhury an Mohamma AL-Amin Bhuiyan Department

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative

More information

Image compression predicated on recurrent iterated function systems

Image compression predicated on recurrent iterated function systems 2n International Conference on Mathematics & Statistics 16-19 June, 2008, Athens, Greece Image compression preicate on recurrent iterate function systems Chol-Hui Yun *, Metzler W. a an Barski M. a * Faculty

More information

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

FINDING OPTICAL DISPERSION OF A PRISM WITH APPLICATION OF MINIMUM DEVIATION ANGLE MEASUREMENT METHOD

FINDING OPTICAL DISPERSION OF A PRISM WITH APPLICATION OF MINIMUM DEVIATION ANGLE MEASUREMENT METHOD Warsaw University of Technology Faculty of Physics Physics Laboratory I P Joanna Konwerska-Hrabowska 6 FINDING OPTICAL DISPERSION OF A PRISM WITH APPLICATION OF MINIMUM DEVIATION ANGLE MEASUREMENT METHOD.

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Bayesian localization microscopy reveals nanoscale podosome dynamics

Bayesian localization microscopy reveals nanoscale podosome dynamics Nature Methos Bayesian localization microscopy reveals nanoscale poosome ynamics Susan Cox, Ewar Rosten, James Monypenny, Tijana Jovanovic-Talisman, Dylan T Burnette, Jennifer Lippincott-Schwartz, Gareth

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing Inexing the Eges A simple an yet efficient approach to high-imensional inexing Beng Chin Ooi Kian-Lee Tan Cui Yu Stephane Bressan Department of Computer Science National University of Singapore 3 Science

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

Considering bounds for approximation of 2 M to 3 N

Considering bounds for approximation of 2 M to 3 N Consiering bouns for approximation of to (version. Abstract: Estimating bouns of best approximations of to is iscusse. In the first part I evelop a powerseries, which shoul give practicable limits for

More information

Learning Polynomial Functions. by Feature Construction

Learning Polynomial Functions. by Feature Construction I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

Exercises of PIV. incomplete draft, version 0.0. October 2009

Exercises of PIV. incomplete draft, version 0.0. October 2009 Exercises of PIV incomplete raft, version 0.0 October 2009 1 Images Images are signals efine in 2D or 3D omains. They can be vector value (e.g., color images), real (monocromatic images), complex or binary

More information

Rough Set Approach for Classification of Breast Cancer Mammogram Images

Rough Set Approach for Classification of Breast Cancer Mammogram Images Rough Set Approach for Classification of Breast Cancer Mammogram Images Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative Methos an Information Systems

More information

arxiv: v2 [cond-mat.dis-nn] 30 Mar 2018

arxiv: v2 [cond-mat.dis-nn] 30 Mar 2018 Noname manuscript No. (will be inserte by the eitor) Daan Muler Ginestra Bianconi Networ Geometry an Complexity arxiv:1711.06290v2 [con-mat.is-nn] 30 Mar 2018 Receive: ate / Accepte: ate Abstract Higher

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

Modifying ROC Curves to Incorporate Predicted Probabilities

Modifying ROC Curves to Incorporate Predicted Probabilities Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,

More information

Blind Data Classification using Hyper-Dimensional Convex Polytopes

Blind Data Classification using Hyper-Dimensional Convex Polytopes Blin Data Classification using Hyper-Dimensional Convex Polytopes Brent T. McBrie an Gilbert L. Peterson Department of Electrical an Computer Engineering Air Force Institute of Technology 9 Hobson Way

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus

More information

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science

More information

Open Access Adaptive Image Enhancement Algorithm with Complex Background

Open Access Adaptive Image Enhancement Algorithm with Complex Background Sen Orers for Reprints to reprints@benthamscience.ae 594 The Open Cybernetics & Systemics Journal, 205, 9, 594-600 Open Access Aaptive Image Enhancement Algorithm with Complex Bacgroun Zhang Pai * epartment

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

PDE-BASED INTERPOLATION METHOD FOR OPTICALLY VISUALIZED SOUND FIELD. Kohei Yatabe and Yasuhiro Oikawa

PDE-BASED INTERPOLATION METHOD FOR OPTICALLY VISUALIZED SOUND FIELD. Kohei Yatabe and Yasuhiro Oikawa 4 IEEE International Conference on Acoustic, Speech an Signal Processing (ICASSP) PDE-BASED INTERPOLATION METHOD FOR OPTICALLY VISUALIZED SOUND FIELD Kohei Yatabe an Yasuhiro Oikawa Department of Intermeia

More information

Polygon Simplification by Minimizing Convex Corners

Polygon Simplification by Minimizing Convex Corners Polygon Simplification by Minimizing Convex Corners Yeganeh Bahoo 1, Stephane Durocher 1, J. Mark Keil 2, Saee Mehrabi 3, Sahar Mehrpour 1, an Debajyoti Monal 1 1 Department of Computer Science, University

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Handling missing values in kernel methods with application to microbiology data

Handling missing values in kernel methods with application to microbiology data an Machine Learning. Bruges (Belgium), 24-26 April 2013, i6oc.com publ., ISBN 978-2-87419-081-0. Available from http://www.i6oc.com/en/livre/?gcoi=28001100131010. Hanling missing values in kernel methos

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpenCourseWare http://ocw.mit.eu 6.854J / 18.415J Avance Algorithms Fall 2008 For inormation about citing these materials or our Terms o Use, visit: http://ocw.mit.eu/terms. 18.415/6.854 Avance Algorithms

More information

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body International Engineering Mathematics Volume 04, Article ID 46593, 7 pages http://x.oi.org/0.55/04/46593 Research Article Invisci Uniform Shear Flow past a Smooth Concave Boy Abullah Mura Department of

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

Department of Computer Science, POSTECH, Pohang , Korea. (x 0 (t); y 0 (t)) 6= (0; 0) and N(t) is well dened on the

Department of Computer Science, POSTECH, Pohang , Korea. (x 0 (t); y 0 (t)) 6= (0; 0) and N(t) is well dened on the Comparing Oset Curve Approximation Methos Gershon er +, In-Kwon, an Myung-Soo Kim + Department of Computer Science, Technion, IIT, Haifa 32000, Israel Department of Computer Science, POSTECH, Pohang 790-784,

More information

THE increasingly digitized power system offers more data,

THE increasingly digitized power system offers more data, 1 Cyber Risk Analysis of Combine Data Attacks Against Power System State Estimation Kaikai Pan, Stuent Member, IEEE, Anré Teixeira, Member, IEEE, Milos Cvetkovic, Member, IEEE, an Peter Palensky, Senior

More information

A Versatile Model-Based Visibility Measure for Geometric Primitives

A Versatile Model-Based Visibility Measure for Geometric Primitives A Versatile Moel-Base Visibility Measure for Geometric Primitives Marc M. Ellenrieer 1,LarsKrüger 1, Dirk Stößel 2, an Marc Hanheie 2 1 DaimlerChrysler AG, Research & Technology, 89013 Ulm, Germany 2 Faculty

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Local Path Planning with Proximity Sensing for Robot Arm Manipulators. 1. Introduction

Local Path Planning with Proximity Sensing for Robot Arm Manipulators. 1. Introduction Local Path Planning with Proximity Sensing for Robot Arm Manipulators Ewar Cheung an Vlaimir Lumelsky Yale University, Center for Systems Science Department of Electrical Engineering New Haven, Connecticut

More information

Comparative Study of Projection/Back-projection Schemes in Cryo-EM Tomography

Comparative Study of Projection/Back-projection Schemes in Cryo-EM Tomography Comparative Stuy of Projection/Back-projection Schemes in Cryo-EM Tomography Yu Liu an Jong Chul Ye Department of BioSystems Korea Avance Institute of Science an Technology, Daejeon, Korea ABSTRACT In

More information

Comparison of Wireless Network Simulators with Multihop Wireless Network Testbed in Corridor Environment

Comparison of Wireless Network Simulators with Multihop Wireless Network Testbed in Corridor Environment Comparison of Wireless Network Simulators with Multihop Wireless Network Testbe in Corrior Environment Rabiullah Khattak, Anna Chaltseva, Laurynas Riliskis, Ulf Boin, an Evgeny Osipov Department of Computer

More information

Interior Permanent Magnet Synchronous Motor (IPMSM) Adaptive Genetic Parameter Estimation

Interior Permanent Magnet Synchronous Motor (IPMSM) Adaptive Genetic Parameter Estimation Interior Permanent Magnet Synchronous Motor (IPMSM) Aaptive Genetic Parameter Estimation Java Rezaie, Mehi Gholami, Reza Firouzi, Tohi Alizaeh, Karim Salashoor Abstract - Interior permanent magnet synchronous

More information

Analysis of half-space range search using the k-d search skip list. Here we analyse the expected time for half-space

Analysis of half-space range search using the k-d search skip list. Here we analyse the expected time for half-space Analysis of half-space range search using the k- search skip list Mario A. Lopez Brafor G. Nickerson y 1 Abstract We analyse the average cost of half-space range reporting for the k- search skip list.

More information

A Formal Model and Efficient Traversal Algorithm for Generating Testbenches for Verification of IEEE Standard Floating Point Division

A Formal Model and Efficient Traversal Algorithm for Generating Testbenches for Verification of IEEE Standard Floating Point Division A Formal Moel an Efficient Traversal Algorithm for Generating Testbenches for Verification of IEEE Stanar Floating Point Division Davi W. Matula, Lee D. McFearin Department of Computer Science an Engineering

More information

Robust Camera Calibration for an Autonomous Underwater Vehicle

Robust Camera Calibration for an Autonomous Underwater Vehicle obust Camera Calibration for an Autonomous Unerwater Vehicle Matthew Bryant, Davi Wettergreen *, Samer Aballah, Alexaner Zelinsky obotic Systems Laboratory Department of Engineering, FEIT Department of

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

Estimating Velocity Fields on a Freeway from Low Resolution Video

Estimating Velocity Fields on a Freeway from Low Resolution Video Estimating Velocity Fiels on a Freeway from Low Resolution Vieo Young Cho Department of Statistics University of California, Berkeley Berkeley, CA 94720-3860 Email: young@stat.berkeley.eu John Rice Department

More information

Verifying performance-based design objectives using assemblybased vulnerability

Verifying performance-based design objectives using assemblybased vulnerability Verying performance-base esign objectives using assemblybase vulnerability K.A. Porter Calornia Institute of Technology, Pasaena, Calornia, USA A.S. Kiremijian Stanfor University, Stanfor, Calornia, USA

More information

Computer Graphics Chapter 7 Three-Dimensional Viewing Viewing

Computer Graphics Chapter 7 Three-Dimensional Viewing Viewing Computer Graphics Chapter 7 Three-Dimensional Viewing Outline Overview of Three-Dimensional Viewing Concepts The Three-Dimensional Viewing Pipeline Three-Dimensional Viewing-Coorinate Parameters Transformation

More information

EXTRACTION OF MAIN AND SECONDARY ROADS IN VHR IMAGES USING A HIGHER-ORDER PHASE FIELD MODEL

EXTRACTION OF MAIN AND SECONDARY ROADS IN VHR IMAGES USING A HIGHER-ORDER PHASE FIELD MODEL EXTRACTION OF MAIN AND SECONDARY ROADS IN VHR IMAGES USING A HIGHER-ORDER PHASE FIELD MODEL Ting Peng a,b, Ian H. Jermyn b, Véronique Prinet a, Josiane Zerubia b a LIAMA & PR, Institute of Automation,

More information

Tight Wavelet Frame Decomposition and Its Application in Image Processing

Tight Wavelet Frame Decomposition and Its Application in Image Processing ITB J. Sci. Vol. 40 A, No., 008, 151-165 151 Tight Wavelet Frame Decomposition an Its Application in Image Processing Mahmu Yunus 1, & Henra Gunawan 1 1 Analysis an Geometry Group, FMIPA ITB, Banung Department

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.

More information

Super-resolution Frame Reconstruction Using Subpixel Motion Estimation

Super-resolution Frame Reconstruction Using Subpixel Motion Estimation Super-resolution Frame Reconstruction Using Subpixel Motion Estimation ABSTRACT When vieo ata is use for forensic analysis, it may transpire that the level of etail available is insufficient. This is particularly

More information

Classification and clustering methods for documents. by probabilistic latent semantic indexing model

Classification and clustering methods for documents. by probabilistic latent semantic indexing model A Short Course at amang University aipei, aiwan, R.O.C., March 7-9, 2006 Classification an clustering methos for ocuments by probabilistic latent semantic inexing moel Shigeichi Hirasawa Department of

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

A Highly Scalable Parallel Boundary Element Method for Capacitance Extraction

A Highly Scalable Parallel Boundary Element Method for Capacitance Extraction A Highly Scalable Parallel Bounary Element Metho for Capacitance Extraction The MIT Faculty has mae this article openly available. Please share how this access benefits you. Your story matters. Citation

More information

Calculation on diffraction aperture of cube corner retroreflector

Calculation on diffraction aperture of cube corner retroreflector November 10, 008 / Vol., No. 11 / CHINESE OPTICS LETTERS 8 Calculation on iffraction aperture of cube corner retroreflector Song Li (Ó Ø, Bei Tang (», an Hui Zhou ( ï School of Electronic Information,

More information

Approximation with Active B-spline Curves and Surfaces

Approximation with Active B-spline Curves and Surfaces Approximation with Active B-spline Curves an Surfaces Helmut Pottmann, Stefan Leopolseer, Michael Hofer Institute of Geometry Vienna University of Technology Wiener Hauptstr. 8 10, Vienna, Austria pottmann,leopolseer,hofer

More information

Lecture 12 March 4th

Lecture 12 March 4th Math 239: Discrete Mathematics for the Life Sciences Spring 2008 Lecture 12 March 4th Lecturer: Lior Pachter Scribe/ Editor: Wenjing Zheng/ Shaowei Lin 12.1 Alignment Polytopes Recall that the alignment

More information

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,

More information

Optimizing the quality of scalable video streams on P2P Networks

Optimizing the quality of scalable video streams on P2P Networks Optimizing the quality of scalable vieo streams on PP Networks Paper #7 ASTRACT The volume of multimeia ata, incluing vieo, serve through Peer-to-Peer (PP) networks is growing rapily Unfortunately, high

More information