Exploring Simple Grid Polygons

Size: px
Start display at page:

Download "Exploring Simple Grid Polygons"

Transcription

1 Exploring Simple Grid Polygon Chritian Icking 1, Tom Kamphan 2, Rolf Klein 2, and Elmar Langetepe 2 1 Univerity of Hagen, Praktiche Informatik VI, Hagen, Germany. 2 Univerity of Bonn, Computer Science I, Römertraße 164, Bonn, Germany. Abtract. We invetigate the online exploration problem of a hortighted mobile robot moving in an unknown cellular room without obtacle. The robot ha a very limited enor; it can determine only which of the four cell adjacent to it current poition are free and which are blocked, i. e., unacceible for the robot. Therefore, the robot mut enter a cell in order to explore it. The robot ha to viit each cell and to return to the tart. Our interet i in a hort exploration tour, i. e., in keeping the number of multiple cell viit mall. For abitrary environment without hole we provide a trategy producing tour of length S C + 1 E 3, where C denote the number of cell the area, and 2 E denote the number of boundary edge the perimeter of the given environment. Further, we how that our trategy i competitive with a factor of 4, and give a lower bound of 7 for our problem. Thi leave a 3 6 gap of only 1 between the lower and the upper bound. 6 Key word: Robot navigation, exploration, covering, online algorithm, competitive analyi, lower bound, grid polygon 1 Introduction Exploring an unknown environment and earching for a target in unknown poition are among the baic tak of autonomou mobile robot. Both problem have received a lot of attention in computational geometry and in robotic; ee e. g. [3, 5, 9, 12, 13, 17]. We ue a imple model for the robot and it environment: the robot i hortighted, and the urrounding i ubdivided by a rectangular integer grid, imilar to a cheboard. Eentially, there are two motivation for uing thi model intead of a robot with a full viion ytem: Firt, even a laer canner ha a reliable range of only a few meter. Hence, the robot ha to move toward more ditant area in order to explore them. Second, ervice robot like lawn mower or cleaner need to get cloe to their work area. The robot enor provide the information, which of the four neighbor of the currently occupied cell do not belong to the polygon and which one do. The robot can enter the latter cell. The robot tak i to viit every cell inide the polygon and to return to the tart cell. Sometime, thi tak in alo called covering. Even though our robot doe not know it environment in advance it i intereting to ak how hort a tour can be in the offline ituation, i. e., when the environment i already known. Thi amount to contructing a hortet traveling aleperon tour on the free cell.

2 If the polygonal environment contain obtacle, the problem of finding uch a minimum length tour i known to be NP-hard, ee Itai et al. [14]. There are 1 + ε approximation cheme by Grigni et al. [7], Arora [2], and Mitchell [16], and a 53 approximation by Arkin et al. [1]. 40 In a polygon without obtacle, the complexity of contructing offline a minimum length tour eem to be open. Ntafo [18] and Arkin et al. [1] have hown how to approximate the minimum length tour with factor of 4 3 and 6 5, repectively. Uman and Lenhart [19] have provided an O(C 4 ) algorithm for deciding if there exit a Hamiltonian cycle, i. e., a tour that viit each of the C cell of a polygon exactly once. For the related problem of Hamiltonian path, Everett [4] ha given a polynomial algorithm for certain grid graph. In thi paper our interet i in the online verion of the cell exploration problem. Exploring a grid polygon with hole wa conidered by Icking et al. [10, 11] and independently by Gabriely and Rimon [6]. Icking et al. howed a lower bound of 2 for thi problem and introduced an exploration trategy that need no more than C E+3H +W 2 tep,3 ee [15], where C denote the number of cell, E the number of boundary edge, H the number of hole and W i a meaure for the winding of the polygon. Gabriely and Rimon howed an upper bound of C + B, where B denote the number of boundary cell. We conider the exploration of polygon without hole. Although both problem eem to be cloely related there i an important difference: We have a lower bound of 2 for polygon with hole, but it turn out that we can do much better in imple polygon. An upper bound for our exploration trategy i given in term of the polygon area, C, and the perimeter, E. While C i the number of free cell, E i the number of edge between a free cell and a blocked cell, ee for example Fig. 1. We ue E to ditinguih between kinny and thick environment. For thick environment, E O( C) hold; thu, the number of additional cell viit i ubtantially maller than C. Only in polygon that do not contain any 2 2-quare of free cell, C = 24 E = 40 = 2(C+1) C = 24 E = 20 << 2C Fig. 1. The perimeter, E, to ditinguih between thin and thick environment. E achieve it maximum value of 2(C + 1), and our upper bound i equal to 2C 2, but in thi cae one cannot do better, ince even the optimal offline trategy need that number of tep. Our paper i organized a follow: in Sect. 2 we give more detailled decription of our robot and the environment. We give a lower bound for our problem in Sect. 3. In Sect. 4 we preent an exploration trategy, SmartDFS. The analyi how in Sect. 5 that thi trategy ue no more than C + 1 2E 3 tep and i in fact competitive with a factor of 4 3. SmartDFS wa implemented in a Java-Applet available in the internet, ee [8]. 3 We aume that the cell have unit ize, o the length of the path i equal to the number of tep from cell to cell.

3 2 Definition We conider a imple model for the environment of the robot: the robot move in a urrounding with a grid tructure. More preciely, a cell i a baic block in our environment, defined by a pair (x, y) IN 2. A cell i either free and can be viited by the robot, or blocked, i. e., unacceible for the robot. We call two cell adjacent, if they hare a common edge, and touching, if they hare a common edge or corner. A grid polygon, P, i a connected et of free cell. A polygon without blocked cell inide it boundary i called imple. From it current poition, the robot can find out which of the adjacent cell are free and which are blocked, and it can move in one tep to an adjacent free cell, ee Fig. 1. The robot ha enough memory to tore a map of known cell. 3 A Lower Bound Theorem 1. Every trategy for the exploration of a imple grid polygon with C cell need at leat 7 6 C tep. Proof. We aume that the robot tart in a corner of the polygon, ee Fig. 2(i). W. l. o. g. we aume that the trategy decide to walk one tep to the eat. For the econd tep, the trategy ha two poibilitie: either it leave the wall with a tep to the outh, ee Fig. 2(ii), or it continue to follow the wall with a further tep to the eat, ee Fig. 2(iii). In the firt cae, we cloe the polygon a hown in Fig. 2(iv). The robot need at leat 8 tep to explore thi polygon, but the optimal trategy need only 6 tep yielding a factor of 8 6. In the econd cae we proceed a follow. If the robot leave the boundary, we cloe the polygon a hown in Fig. 2(v) and (vi). The robot need 12 tep, but 10 tep are ufficient. In the mot intereting cae, the robot till follow the wall, ee Fig. 2(vii). In thi cae, the robot need at leat 28 tep to explore thi polygon, wherea an optimal trategy need only 24 tep. Thu, we achieve a factor of 7 6. We can eaily extend thi pattern to polygon of arbitrary ize by repeating the contruction uing the entry and exit cell denoted by the arrow in Fig. 2(iv) (vii). Thi contruction cannot lead to overlapping polygon or polygon with hole, ince the polygon alway extend to the ame direction. (ii) (i) (iv) (v) (vi) (iii) (vii) Fig.2. A lower bound for the exploration of imple polygon. The dahed line how the optimal olution, denote the robot poition.

4 4 An Exploration Strategy A a firt approach, we can apply a imple depth-firt earch algorithm (DFS): The polygon i explored following the left-hand rule, i. e., for every entered cell the robot trie to continue it path to an adjacent and unexplored cell, preferring a tep to the left over a traight tep over a tep to the right. Thi reult in a complete exploration, but take 2C 2 tep. Since the hortet tour need at leat C tep, DFS turn out to be 2-competitive. However, there i no reaon to viit each cell twice jut becaue thi i required in ome pecial ituation like dead end of width 1. In the following, we introduce two improvement to DFS. (i) c 2 (ii) DFS improved DFS c 1 c 1 c 2 Fig.3. Improvement to DFS: (i) optimize return path, (ii) detect polygon plit. The firt improvement i to return directly to thoe cell that have unexplored neighbor. See e. g. Fig. 3(i): DFS walk from c 1 to c 2 through the completely explored corridor. A more efficient trategy walk on a hortet path on cell that are already known from c 1 to c 2. Now, oberve the polygon hown in Fig. 3(ii). With DFS, the robot walk four time through the narrow corridor. A more clever olution explore the right part immediately after the firt viit of c 1, and continue with the left part, reulting in only two viit. The cell c 1 ha the property that the graph of unviited cell plit into two component after c 1 i explored. We call cell like thi plit cell. The econd improvement i to recognize and handle plit cell, ee Sect. 5. The following decription of our trategy, SmartDFS, reume both improvement to DFS, ee Fig. 5 for an example. SmartDFS(P, tart): Chooe direction dir, uch that revere(dir) i a blocked cell; ExploreCell(dir); Walk on the hortet path to tart; ExploreStep(bae, dir): if unexplored(bae, dir) then Walk on hortet path to bae; move(dir); ExploreCell(dir); end if ExploreCell(dir): bae := current poition; if not isplitcell(bae) then ExploreStep(bae, ccw(dir)); ExploreStep(bae, dir); ExploreStep(bae, cw(dir)); ele Chooe different order, ee Sect. 5. end if

5 5 The Analyi of SmartDFS SmartDFS explore the polygon in layer, beginning with the cell along the boundary of P and proceeding toward the interior of P. Definition 2. Let P be a grid polygon. The boundary cell of P uniquely define the firt layer of P. The polygon P without it firt layer i called the 1-offet of P. The l-th layer and the l-offet of P are defined ucceively, ee Fig. 4(i). Lemma 3. The l-offet of a imple grid polygon, P, ha at leat 8l edge le than P. Proof. Firt, we cut off blind alley narrower than 2l, ince thoe part of P do not affect the l-offet. We walk clockwie around the boundary cell of the remaining polygon, ee Fig. 4(i). For every left turn the offet gain at mot 2l edge and for every right turn the offet looe at leat 2l edge. Since, there are four more right turn than left turn, we looe at leat 8l edge. (i) Π cut off l 2l edge gained l 2l edge lot P 1 (iii) Q P 1 (ii) c c P 2 c P 2 P 1 Q c c (iv) P 2 Fig. 4. (i) The 2-offet (haded) of a grid polygon; three example for plit cell, (ii) type (II), (iii) and (iv) type (I). Definition 2 allow u to pecify the handling of a plit cell in SmartDFS. Let u conider the ituation hown in Fig. 5(i): SmartDFS ha jut met the firt plit cell, c, in the fourth layer of P. P divide into three part: P = K 1 K2 { viited cell of P }, where K 1 and K 2 denote the connected component of the unviited cell. In thi cae it i reaonable to explore the component K 2 firt ince the tart cell i cloer to K 1. We ue the layer number to decide which component we have to viit at lat. Whenever a plit cell occur in layer l, every component i one of the following type, ee Fig. 4(ii) (iv): (I) K i i completely urrounded by layer l, 4 (II) K i i not urrounded by layer l, or (III) K i i partially urrounded by layer l. In any cae, it i the bet choice to explore the component of type (III) at lat. Note that it may occur that three component arie at a plit cell, but we can handle thi cae a two ucceive plit occuring at the ame plit cell. 4 More preciely, the part of layer l that urround K i i completely viited. For convenience, we will ue lightly loppy, but horter form.

6 K 1 c Q P 1 Q K 1 Q c c P 2 P K 2 K 2 (i) (ii) Fig.5. A decompoition of P at the plit cell c and it handling in martdfs. For the analyi we conider two polygon, P 1 { and P 2, a follow. Let Q be l, if K2 i of type (I) the quare of width 2q + 1 around c with q := l 1, if K 2 i of type (II), where K 2 denote the component that i explored firt, and l denote the layer in which the plit cell wa found. We chooe P 2 P Q, uch that K 2 {c} i the q-offet of P 2, and P 1 := ((P \P 2 ) Q) P, ee Fig. 5. The interection with P i neceary, ince Q may exceed the boundary of P. The choice of P 1, P 2 and Q enure that the robot path in P 1 \Q and in P 2 \Q do not change compared to the path in P. The part of the robot path that lead from P 1 to P 2 and from P 2 to P 1 are fully contained in the quare Q. Jut the part inide Q are bended to connect the appropriate path inide P 1 and P 2, ee Fig. 5. We want to viit every cell in the polygon and to return to. Every trategy need at leat C(P) tep to fulfill thi tak. Thu, we can plit the overall length of the exploration path Π into two part, C(P) and exce(p), with Π = C(P) + exce(p). Since SmartDFS recurively explore K 2 {c}, we want to apply the upper bound inductively to the component K 2 {c}. The following lemma give u the relation between the path length in P and the path length in the two component. Lemma 4. Let P be a imple grid polygon. Let the robot viit the firt plit cell, c, which plit the unviited cell of P into two component K 1 and K 2, where K 2 i of type (I) or (II). With the preceding notion we have exce(p) exce(p 1 ) + exce(k 2 {c}) + 1. Proof. Since c i the firt plit cell, there i no exce in P 2 \(K 2 {c}) and it uffice to conider exce(k 2 {c}) for thi part. After K 2 {c} i finihed, the robot tart at c and explore K 1. For thi part we take exce(p 1 ) into account. Finally, we add one ingle tep, becaue the plit cell c i viitited twice:

7 once, when SmartDFS detect the plit and once more after the exploration of exce(k 2 {c}) i finihed. Altogether, the given bound i achieved. The following lemma can eaily be hown and allow u to charge the number of edge in P 1 and P 2 againt the number of edge in P and Q. Lemma 5. Let P be a imple grid polygon, and let P 1, P 2 and Q be defined a above. The number of edge atify E(P 1 ) + E(P 2 ) = E(P) + E(Q). Lemma 6. Let Π be the hortet path between two cell in a grid polygon P. The length of Π i bounded by Π 1 2E(P) 2. Proof. The maximal ditance i achieved between two cell in the firt layer, and 1 the hortet path between them i never longer than 2 #(cell in the firt layer). Analogouly to Lemma 3, thi layer ha at mot E(P) 4 cell. Now, we can give an upper bound for the number of tep ued to explore a imple polygon. Theorem 7. Let P be a imple grid polygon with C cell and E edge. P can be explored with S C + 1 2E 3 tep. Thi bound i tight. Proof. C i the number of cell and thu a lower bound on the number of tep that are needed to explore the polygon P. We will how by induction on the number of component that exce(p) 1 2E(P) 3 hold. For the induction bae we conider a polygon without any plit cell, i. e., SmartDFS viit all cell and return on the hortet path to the tart cell. Since there i no polygon plit, all cell of P can be viited by a path of length C 1. By Lemma 6 the hortet path back to the tart cell i not longer than 1 2 E 2 and exce(p) 1 2E(P) 3 hold. Now, we aume that there i more than one component during the application of SmartDFS. Let c be the firt plit cell detected in P. When SmartDFS reache c, two new component, K 1 and K 2, occur. We conider the two polygon P 1 and P 2 defined a above uing the quare Q around c. W. l. o.g. we aume that K 2 i recurively explored firt. After K 2 i completely explored, SmartDFS proceed with the remaining polygon. A hown in Lemma 4 we have exce(p) exce(p 1 )+exce(k 2 {c})+1. Now, we apply the induction hypothei to P 1 and K 2 {c} and get exce(p) 1 2 E(P 1) E(K 2 {c}) By applying Lemma 3 to the q-offet K 2 {c} of P 2 we achieve exce(p) 1 2 E(P 1) (E(P 2) 8q) = 1 2 (E(P 1) + E(P 2 )) 4q 5. From Lemma 5 we conclude E(P 1 ) + E(P 2 ) E(P) + 4(2q + 1). Thu, we get exce(p) 1 2E(P) 3. Thi bound i achieved exactly in polygon that do not contain any 2 2-quare of free cell. So far we have hown an upper bound for the number of tep needed to explore a polygon that depend on the number of cell and edge in the polygon. Now we want to analyze SmartDFS in the competitive framework.

8 Corridor of width 1 or 2 play a crucial role in the following, o we refer to them a narrow paage. 5 It i eay to ee that narrow paage are explored optimally. In paage of width 1 both SmartDFS and the optimal trategy viit every cell twice, and in the other cae both trategie viit every cell exactly once. We need two lemmata to how a competitive factor for SmartDFS. The firt one give u a relation between the number of cell and the number of edge for a pecial cla of polygon. Lemma 8. For a imple grid polygon, P, without any narrow paage or plit cell in the firt layer, E(P) 2 3 C(P) + 6 hold. Proof. Conider uch a polygon, P, ee Fig. 6(i). We ucceively remove an outer row or column of at leat three boundary cell, maintaining our aumption on P. Thee aumption enure that we can alway find uch a row or column. Thu, we remove at leat three cell and at mot two edge. Thi decompoition end with a 3 3 block of cell that fulfill E = 2 3C(P)+6. Now, we revere our decompoition, i. e., we ucceively add all row and column until we end up with P. In every tep, we add at leat three cell and at mot two edge. Thu, E 2 3C(P) + 6 i fulfilled in every tep. P Π c SmartDFS (i) (ii) optimal trategy Fig.6. (i) For polygon without narrow paage or plit cell in the firt layer, E(P) 2 C(P) + 6 hold, and the lat explored cell, 3 c, lie in the 1-offet, P (haded), (ii) In a corridor of width 3 and even length, S(P) = 4 SOpt(P) 2 hold. 3 For the ame cla of polygon, we can how that SmartDFS behave lightly better than the bound in Theorem 7. Lemma 9. A polygon of the ame type a in Lemma 8 can be explored uing no more than S(P) C(P) + 1 2E(P) 5 tep. Proof. We have hown S(P) C(P) + 1 2E(P) 3 in Theorem 7. In the proof, we ued Lemma 6 to bound the return path, but thi lemma bound the path between two cell in the firt layer. By our aumption on P, we can completely explore the firt layer of P before viiting another layer, and the return path, 5 More preciely, a cell, c, belong to a narrow paage, if c can be removed without changing the layer number of any other cell.

9 Π, tart in a cell, c, in the 1-offet, P, ee Fig. 6(i). Let denote the firt viited cell in P. Remark that and are at leat touching each other. Now, Π i bounded by a hortet path, Π, from c to in P and a hortet path from to, i. e., Π Π + 2. Π, in turn, i bounded uing Lemma 6 by Π 1 2 E(P ) 2. With Lemma 3, E(P ) E(P) 8 hold, and altogether we get Π 1 2E(P) 4, which i two tep horter than tated in Lemma 6. Theorem 10. The trategy SmartDFS i 4 3 -competitive. Proof. Let P be a imple grid polygon. Firt, we remove all narrow paage from P and get a equence of (ub-)polygon P i, i = 1,...,k, without narrow paage. For every P i, i = 1,...,k 1, the optimal trategy in P explore the part of P that correpond to P i up to the narrow paage that connect P i with P i+1, enter P i+1, and fully explore every P j with j i. Then it return to P i and continue with the exploration of P i. Further, we already know that narrow paage are explored optimally. Thi allow u to conider every P i eparately without changing the competitive factor of P. Now, we oberve a (ub-)polygon P i. We how by induction on the number of plit cell in the firt layer that S(P i ) 4 3 C(P i) 2 hold. Note that thi i exactly achieved in polygon of ize 3 m with m even, ee Fig. 6(ii). If P i ha no plit cell in the firt layer, we can apply Lemma 9 and Lemma 8: S(P i ) C(P i ) E(P ( i) 5 C(P i ) C(P i) + 6 ) 5 = 4 3 C(P i) 2. Two cae occur if we meet a plit cell, c, in the firt layer, ee Fig. 4(ii) (iv). In the firt cae, the new component wa never viited before (type (II)). Here, we define Q := {c}. The econd cae occur, becaue the robot meet a cell, c, that i in the firt layer and touche the current cell, c, ee for example Fig. 4(iii) and (iv). Let Q be the mallet rectangle that contain both c and c. Similar to the proof of Theorem 7, we plit the polygon P i into two part, both including Q. Let P denote the part that include the component of type (II) or (III), P the other part. For Q = 1, ee Fig. 4(ii), we conclude S(P i ) = S(P )+ S(P ) and C(P i ) = C(P ) + C(P ) 1. Applying the induction hypothei to P and P yield S(P i ) = S(P ) + S(P ) 4 3 C(P i) < 4 3 C(P i) 2. For Q { 2, 4 } we gain ome tep by merging the polygon. If we conider P and P eparately, we count the tep from c to c or vice vera in both polygon, but in P i the path from c to c i replaced by the exploration path in P. Thu, we have S(P i ) = S(P )+S(P ) Q and C(P i ) = C(P )+C(P )+ Q. Thi yield S(P i ) = S(P )+S(P ) Q = 4 3 C(P i)+ 1 3 ( Q 6) 2 < 4 3 C(P i) 2. An optimal trategy need C tep, which, altogether, yield a competitive factor of Summary It turned out that the exploration of imple polygon i eaier than the exploration of polygon with hole in term of competitivity. In contrary to the lower bound of 2 for polygon with hole, we have hown a lower bound of 7 6 and an upper bound of 4 3 for imple polygon, leaving a gap of only 1 6. Additionally, we can alo bound the length of an exploration path by C + 1 2E 3 which i tight.

10 Reference [1] E. M. Arkin, S. P. Fekete, and J. S. B. Mitchell. Approximation algorithm for lawn mowing and milling. Technical report, Mathematiche Intitut, Univerität zu Köln, [2] S. Arora. Polynomial time approximation cheme for Euclidean TSP and other geometric problem. In Proc. 37th Annu. IEEE Sympo. Found. Comput. Sci., page 2 11, [3] X. Deng, T. Kameda, and C. Papadimitriou. How to learn an unknown environment I: The rectilinear cae. J. ACM, 45(2): , [4] H. Everett. Hamiltonian path in non-rectangular grid graph. Report 86-1, Dept. Comput. Sci., Univ. Toronto, Toronto, ON, [5] A. Fiat and G. Woeginger, editor. On-line Algorithm: The State of the Art, volume 1442 of Lecture Note Comput. Sci. Springer-Verlag, [6] Y. Gabriely and E. Rimon. Competitive on-line coverage of grid environment by a mobile robot. Comput. Geom. Theory Appl., 24: , [7] M. Grigni, E. Koutoupia, and C. H. Papadimitriou. An approximation cheme for planar graph TSP. In Proc. 36th Annu. IEEE Sympo. Found. Comput. Sci., page , [8] U. Handel, C. Icking, T. Kamphan, E. Langetepe, and W. Meiwinkel. Gridrobot an environment for imulating exploration trategie in unknown cellular area. Java Applet, [9] F. Hoffmann, C. Icking, R. Klein, and K. Kriegel. The polygon exploration problem. SIAM J. Comput., 31: , [10] C. Icking, T. Kamphan, R. Klein, and E. Langetepe. Exploring an unknown cellular environment. In Abtract 16th European Workhop Comput. Geom., page Ben-Gurion Univerity of the Negev, [11] C. Icking, T. Kamphan, R. Klein, and E. Langetepe. On the competitive complexity of navigation tak. In H. Bunke, H. I. Chritenen, G. D. Hager, and R. Klein, editor, Senor Baed Intelligent Robot, volume 2238 of Lecture Note Comput. Sci., page , Berlin, Springer. [12] C. Icking, R. Klein, and E. Langetepe. Searching for the kernel of a polygon: A competitive trategy uing elf-approaching curve. Technical Report 211, Department of Computer Science, FernUniverität Hagen, Germany, [13] C. Icking, R. Klein, E. Langetepe, S. Schuierer, and I. Semrau. An optimal competitive trategy for walking in treet. SIAM J. Comput., 33: , [14] A. Itai, C. H. Papadimitriou, and J. L. Szwarcfiter. Hamilton path in grid graph. SIAM J. Comput., 11: , [15] T. Kamphan. Model and Algorithm for Online Exploration and Search. PhD thei, Univerity of Bonn, to appear. [16] J. S. B. Mitchell. Guillotine ubdiviion approximate polygonal ubdiviion: A imple polynomial-time approximation cheme for geometric TSP, k-mst, and related problem. SIAM J. Comput., 28: , [17] J. S. B. Mitchell. Geometric hortet path and network optimization. In J.-R. Sack and J. Urrutia, editor, Handbook of Computational Geometry, page Elevier Science Publiher B.V. North-Holland, Amterdam, [18] S. Ntafo. Watchman route under limited viibility. Comput. Geom. Theory Appl., 1(3): , [19] C. Uman and W. Lenhart. Hamiltonian cycle in olid grid graph. In Proc. 38th Annu. IEEE Sympo. Found. Comput. Sci., page , 1997.

Online Motion Planning

Online Motion Planning RHEINISCHE FRIEDRICH-WILHELMS-UNIVERSITÄT BONN INSTITUT FÜR INFORMATIK I Elmar Langetepe Online Motion Planning MA INF 1314 Summeremeter 017 Manucript: c Elmar Langetepe CONTENTS Content 1 Labyrinth,

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

else end while End References

else end while End References 621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized

More information

Touring a Sequence of Polygons

Touring a Sequence of Polygons Touring a Sequence of Polygon Mohe Dror (1) Alon Efrat (1) Anna Lubiw (2) Joe Mitchell (3) (1) Univerity of Arizona (2) Univerity of Waterloo (3) Stony Brook Univerity Problem: Given a equence of k polygon

More information

xy-monotone path existence queries in a rectilinear environment

xy-monotone path existence queries in a rectilinear environment CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of

More information

Shortest Paths with Single-Point Visibility Constraint

Shortest Paths with Single-Point Visibility Constraint Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet

More information

Touring a Sequence of Polygons

Touring a Sequence of Polygons Touring a Sequence of Polygon Mohe Dror (1) Alon Efrat (1) Anna Lubiw (2) Joe Mitchell (3) (1) Univerity of Arizona (2) Univerity of Waterloo (3) Stony Brook Univerity Problem: Given a equence of k polygon

More information

Competitive Online Searching for a Ray in the Plane

Competitive Online Searching for a Ray in the Plane Competitive Online Searching for a Ray in the Plane Andrea Eubeler, Rudolf Fleicher 1, Tom Kamphan, Rolf Klein, Elmar Langetepe, and Gerhard Trippen 3 1 Fudan Univerity, Shanghai Key Laboratory of Intelligent

More information

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline Generic Travere CS 62, Lecture 9 Jared Saia Univerity of New Mexico Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v) from the bag if (v i unmarked) mark v; parent(v) = p;

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

A note on degenerate and spectrally degenerate graphs

A note on degenerate and spectrally degenerate graphs A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove

More information

Delaunay Triangulation: Incremental Construction

Delaunay Triangulation: Incremental Construction Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )

More information

Planning of scooping position and approach path for loading operation by wheel loader

Planning of scooping position and approach path for loading operation by wheel loader 22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader

More information

Lemma 1. A 3-connected maximal generalized outerplanar graph is a wheel.

Lemma 1. A 3-connected maximal generalized outerplanar graph is a wheel. 122 (1997) MATHEMATICA BOHEMICA No. 3, 225{230 A LINEAR ALGORITHM TO RECOGNIZE MAXIMAL GENERALIZED OUTERPLANAR GRAPHS Jo C cere, Almer a, Alberto M rquez, Sevilla (Received November 16, 1994, revied May

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two

More information

Algorithmic Discrete Mathematics 4. Exercise Sheet

Algorithmic Discrete Mathematics 4. Exercise Sheet Algorithmic Dicrete Mathematic. Exercie Sheet Department of Mathematic SS 0 PD Dr. Ulf Lorenz 0. and. May 0 Dipl.-Math. David Meffert Verion of May, 0 Groupwork Exercie G (Shortet path I) (a) Calculate

More information

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -

More information

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds * Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

Quadrilaterals. Learning Objectives. Pre-Activity

Quadrilaterals. Learning Objectives. Pre-Activity Section 3.4 Pre-Activity Preparation Quadrilateral Intereting geometric hape and pattern are all around u when we tart looking for them. Examine a row of fencing or the tiling deign at the wimming pool.

More information

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,

More information

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de

More information

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov

More information

New Structural Decomposition Techniques for Constraint Satisfaction Problems

New Structural Decomposition Techniques for Constraint Satisfaction Problems New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.

More information

IMPLEMENTATION OF AREA, VOLUME AND LINE SOURCES

IMPLEMENTATION OF AREA, VOLUME AND LINE SOURCES December 01 ADMS 5 P503I1 IMPEMENTATION OF AREA, VOUME AND INE SOURCES The Met. Office (D J Thomon) and CERC 1. INTRODUCTION ADMS model line ource, and area and volume ource with conve polgon bae area.

More information

Parallel MATLAB at FSU: Task Computing

Parallel MATLAB at FSU: Task Computing Parallel MATLAB at FSU: Tak John Burkardt Department of Scientific Florida State Univerity... 1:30-2:30 Thurday, 07 April 2011 499 Dirac Science Library... http://people.c.fu.edu/ jburkardt/preentation/...

More information

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term

More information

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt

More information

Shortest Path Routing in Arbitrary Networks

Shortest Path Routing in Arbitrary Networks Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,

More information

Lecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization

Lecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization Lecture Outline Global flow analyi Global Optimization Global contant propagation Livene analyi Adapted from Lecture by Prof. Alex Aiken and George Necula (UCB) CS781(Praad) L27OP 1 CS781(Praad) L27OP

More information

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

arxiv: v1 [cs.ds] 27 Feb 2018

arxiv: v1 [cs.ds] 27 Feb 2018 Incremental Strong Connectivity and 2-Connectivity in Directed Graph Louka Georgiadi 1, Giueppe F. Italiano 2, and Niko Parotidi 2 arxiv:1802.10189v1 [c.ds] 27 Feb 2018 1 Univerity of Ioannina, Greece.

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck. Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization

More information

Modeling of underwater vehicle s dynamics

Modeling of underwater vehicle s dynamics Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

An Intro to LP and the Simplex Algorithm. Primal Simplex

An Intro to LP and the Simplex Algorithm. Primal Simplex An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

arxiv: v3 [cs.cg] 1 Oct 2018

arxiv: v3 [cs.cg] 1 Oct 2018 Improved Time-Space Trade-off for Computing Voronoi Diagram Bahareh Banyaady Matia Korman Wolfgang Mulzer André van Renen Marcel Roeloffzen Paul Seiferth Yannik Stein arxiv:1708.00814v3 [c.cg] 1 Oct 2018

More information

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique 202 International Conference on Frontier in Handwriting Recognition Building a Compact On-line MRF Recognizer for Large Character Set uing Structured Dictionary Repreentation and Vector Quantization Technique

More information

Chapter S:II (continued)

Chapter S:II (continued) Chapter S:II (continued) II. Baic Search Algorithm Sytematic Search Graph Theory Baic State Space Search Depth-Firt Search Backtracking Breadth-Firt Search Uniform-Cot Search AND-OR Graph Baic Depth-Firt

More information

Drawing Lines in 2 Dimensions

Drawing Lines in 2 Dimensions Drawing Line in 2 Dimenion Drawing a traight line (or an arc) between two end point when one i limited to dicrete pixel require a bit of thought. Conider the following line uperimpoed on a 2 dimenional

More information

Chapter 13 Non Sampling Errors

Chapter 13 Non Sampling Errors Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption

More information

Brief Announcement: Distributed 3/2-Approximation of the Diameter

Brief Announcement: Distributed 3/2-Approximation of the Diameter Brief Announcement: Ditributed /2-Approximation of the Diameter Preliminary verion of a brief announcement to appear at DISC 14 Stephan Holzer MIT holzer@mit.edu David Peleg Weizmann Intitute david.peleg@weizmann.ac.il

More information

Parity-constrained Triangulations with Steiner points

Parity-constrained Triangulations with Steiner points Parity-contrained Triangulation with Steiner point Victor Alarez October 31, 2012 Abtract Let P R 2 be a et of n point, of which k lie in the interior of the conex hull CH(P) of P. Let u call a triangulation

More information

Representations and Transformations. Objectives

Representations and Transformations. Objectives Repreentation and Tranformation Objective Derive homogeneou coordinate tranformation matrice Introduce tandard tranformation - Rotation - Tranlation - Scaling - Shear Scalar, Point, Vector Three baic element

More information

Today s Outline. CS 362, Lecture 19. DFS and BFS. Generic Traverse. BFS and DFS Wrapup Shortest Paths. Jared Saia University of New Mexico

Today s Outline. CS 362, Lecture 19. DFS and BFS. Generic Traverse. BFS and DFS Wrapup Shortest Paths. Jared Saia University of New Mexico Today Outline CS 362, Lecture 9 Jared Saia Univerity of New Mexico BFS and DFS Wrapup Shortet Path Generic Travere DFS and BFS Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v)

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

Contents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course:

Contents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course: Content Shortet path Algorithm and Network 21/211 The hortet path problem: Statement Verion Application Algorithm (for ingle ource p problem) Reminder: relaxation, Dijktra, Variant of Dijktra, Bellman-Ford,

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and Thi article appeared in a journal publihed by Elevier. The attached copy i furnihed to the author for internal non-commercial reearch and education ue, including for intruction at the author intitution

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and

More information

Shortest-Path Routing in Arbitrary Networks

Shortest-Path Routing in Arbitrary Networks Ž. Journal of Algorithm 31, 105131 1999 Article ID jagm.1998.0980, available online at http:www.idealibrary.com on Shortet-Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vocking

More information

Exercise 4: Markov Processes, Cellular Automata and Fuzzy Logic

Exercise 4: Markov Processes, Cellular Automata and Fuzzy Logic Exercie 4: Marko rocee, Cellular Automata and Fuzzy Logic Formal Method II, Fall Semeter 203 Solution Sheet Marko rocee Theoretical Exercie. (a) ( point) 0.2 0.7 0.3 tanding 0.25 lying 0.5 0.4 0.2 0.05

More information

/06/$ IEEE 364

/06/$ IEEE 364 006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

CENTER-POINT MODEL OF DEFORMABLE SURFACE

CENTER-POINT MODEL OF DEFORMABLE SURFACE CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D

More information

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks Nearly Contant Approximation for Data Aggregation Scheduling in Wirele Senor Network Scott C.-H. Huang, Peng-Jun Wan, Chinh T. Vu, Yinghu Li and France Yao Computer Science Department, City Univerity of

More information

On the Use of Shadows in Stance Recovery

On the Use of Shadows in Stance Recovery On the Ue of Shadow in Stance Recovery Alfred M. Brucktein, 1 Robert J. Holt, 1 Yve D. Jean, 2 Arun N. Netravali 1 1 Bell Laboratorie, Lucent Technologie, Murray Hill, NJ 094 2 Avaya Communication, Murray

More information

Uninformed Search Complexity. Informed Search. Search Revisited. Day 2/3 of Search

Uninformed Search Complexity. Informed Search. Search Revisited. Day 2/3 of Search Informed Search ay 2/3 of Search hap. 4, Ruel & Norvig FS IFS US PFS MEM FS IS Uninformed Search omplexity N = Total number of tate = verage number of ucceor (branching factor) L = Length for tart to goal

More information

A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED

A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED Jutin Domke and Yianni Aloimono Computational Viion Laboratory, Center for Automation Reearch Univerity of Maryland College Park,

More information

SIMIT 7. Profinet IO Gateway. User Manual

SIMIT 7. Profinet IO Gateway. User Manual SIMIT 7 Profinet IO Gateway Uer Manual Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult are only non-binding uggetion

More information

Edits in Xylia Validity Preserving Editing of XML Documents

Edits in Xylia Validity Preserving Editing of XML Documents dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,

More information

Computing C-space Entropy for View Planning

Computing C-space Entropy for View Planning Computing C-pace Entropy for View Planning for a Generic Range Senor Model Pengpeng Wang (pwangf@c.fu.ca) Kamal Gupta (kamal@c.fu.ca) Robotic Lab School of Engineering Science Simon Fraer Univerity Burnaby,

More information

Trainable Context Model for Multiscale Segmentation

Trainable Context Model for Multiscale Segmentation Trainable Context Model for Multicale Segmentation Hui Cheng and Charle A. Bouman School of Electrical and Computer Engineering Purdue Univerity Wet Lafayette, IN 47907-1285 {hui, bouman}@ ecn.purdue.edu

More information

A Boyer-Moore Approach for. Two-Dimensional Matching. Jorma Tarhio. University of California. Berkeley, CA Abstract

A Boyer-Moore Approach for. Two-Dimensional Matching. Jorma Tarhio. University of California. Berkeley, CA Abstract A Boyer-Moore Approach for Two-Dimenional Matching Jorma Tarhio Computer Science Diviion Univerity of California Berkeley, CA 94720 Abtract An imple ublinear algorithm i preented for two-dimenional tring

More information

UC Berkeley International Conference on GIScience Short Paper Proceedings

UC Berkeley International Conference on GIScience Short Paper Proceedings UC Berkeley International Conference on GIScience Short Paper Proceeding Title A novel method for probabilitic coverage etimation of enor network baed on 3D vector repreentation in complex urban environment

More information

Interface Tracking in Eulerian and MMALE Calculations

Interface Tracking in Eulerian and MMALE Calculations Interface Tracking in Eulerian and MMALE Calculation Gabi Luttwak Rafael P.O.Box 2250, Haifa 31021,Irael Interface Tracking in Eulerian and MMALE Calculation 3D Volume of Fluid (VOF) baed recontruction

More information

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt

More information

Distance Optimal Formation Control on Graphs with a Tight Convergence Time Guarantee

Distance Optimal Formation Control on Graphs with a Tight Convergence Time Guarantee Ditance Optimal Formation Control on Graph with a Tight Convergence Time Guarantee Jingjin Yu Steven M. LaValle Abtract For the tak of moving a et of inditinguihable agent on a connected graph with unit

More information

An Active Stereo Vision System Based on Neural Pathways of Human Binocular Motor System

An Active Stereo Vision System Based on Neural Pathways of Human Binocular Motor System Journal of Bionic Engineering 4 (2007) 185 192 An Active Stereo Viion Sytem Baed on Neural Pathway of Human Binocular Motor Sytem Yu-zhang Gu 1, Makoto Sato 2, Xiao-lin Zhang 2 1. Department of Advanced

More information

SIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial

SIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial SIMIT 7 Component Type Editor (CTE) Uer manual Siemen Indutrial Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult

More information

3D SMAP Algorithm. April 11, 2012

3D SMAP Algorithm. April 11, 2012 3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative

More information

Development of an atmospheric climate model with self-adapting grid and physics

Development of an atmospheric climate model with self-adapting grid and physics Intitute of Phyic Publihing Journal of Phyic: Conference Serie 16 (2005) 353 357 doi:10.1088/1742-6596/16/1/049 SciDAC 2005 Development of an atmopheric climate model with elf-adapting grid and phyic Joyce

More information

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES MAKARA, TEKNOLOGI, VOL. 9, NO., APRIL 5: 3-35 3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES Mochammad Zulianyah Informatic Engineering, Faculty of Engineering, ARS International Univerity,

More information

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT

More information

SECTOR BASED MULTICAST ROUTING ALGORITHM FOR MOBILE AD-HOC NETWORKS

SECTOR BASED MULTICAST ROUTING ALGORITHM FOR MOBILE AD-HOC NETWORKS SECTOR BASED MULTICAST ROUTING ALGORITHM OR MOBILE AD-HOC NETWORKS Murali Paramewaran 1 and Chittaranjan Hota 2 1 Department of Computer Science & Information Sytem, BITS-Pilani, Pilani, India 2 Department

More information

Certified Rational Parametric Approximation of Real Algebraic Space Curves with Local Generic Position Method

Certified Rational Parametric Approximation of Real Algebraic Space Curves with Local Generic Position Method Certified Rational Parametric Approximation of Real Algebraic Space Curve with Local Generic Poition Method Jin-San Cheng, Kai Jin KLMM, Intitute of Sytem Science, AMSS, CAS, Beijing 100190, China Daniel

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

CORRECTNESS ISSUES AND LOOP INVARIANTS

CORRECTNESS ISSUES AND LOOP INVARIANTS The next everal lecture 2 Study algorithm for earching and orting array. Invetigate their complexity how much time and pace they take Formalize the notion of average-cae and wort-cae complexity CORRECTNESS

More information

A New Approach to Pipeline FFT Processor

A New Approach to Pipeline FFT Processor A ew Approach to Pipeline FFT Proceor Shouheng He and Mat Torkelon Department of Applied Electronic, Lund Univerity S- Lund, SWEDE email: he@tde.lth.e; torkel@tde.lth.e Abtract A new VLSI architecture

More information

New Structural Decomposition Techniques for Constraint Satisfaction Problems

New Structural Decomposition Techniques for Constraint Satisfaction Problems 113 New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory, Univerity of Nebraka-Lincoln {yzheng,choueiry}@ce.unl.edu Abtract.

More information

Markov Random Fields in Image Segmentation

Markov Random Fields in Image Segmentation Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image

More information

Growing Networks Through Random Walks Without Restarts

Growing Networks Through Random Walks Without Restarts Growing Network Through Random Walk Without Retart Bernardo Amorim, Daniel Figueiredo, Giulio Iacobelli, Giovanni Neglia To cite thi verion: Bernardo Amorim, Daniel Figueiredo, Giulio Iacobelli, Giovanni

More information

Orienting Micro-Scale Parts with Squeeze and Roll Primitives

Orienting Micro-Scale Parts with Squeeze and Roll Primitives Orienting Micro-Scale Part with Squeeze and Roll Primitive Mark Moll Michael A. Erdmann Ron Fearing Ken Goldberg mmoll@c.cmu.edu me@c.cmu.edu ronf@eec.berkeley.edu goldberg@ieor.berkeley.edu Department

More information

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II IEEE INFOCO 2002 1 Ditributed Partial Information anagement (DPI) Scheme for Survivable Network - Part II Dahai Xu Chunming Qiao Department of Computer Science and Engineering State Univerity of New York

More information

Testing Structural Properties in Textual Data: Beyond Document Grammars

Testing Structural Properties in Textual Data: Beyond Document Grammars Teting Structural Propertie in Textual Data: Beyond Document Grammar Felix Saaki and Jen Pönninghau Univerity of Bielefeld, Germany Abtract Schema language concentrate on grammatical contraint on document

More information

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh

More information

A Sparse Shared-Memory Multifrontal Solver in SCAD Software

A Sparse Shared-Memory Multifrontal Solver in SCAD Software Proceeding of the International Multiconference on ISBN 978-83-6080--9 Computer Science and Information echnology, pp. 77 83 ISSN 896-709 A Spare Shared-Memory Multifrontal Solver in SCAD Software Sergiy

More information

Kinematics Programming for Cooperating Robotic Systems

Kinematics Programming for Cooperating Robotic Systems Kinematic Programming for Cooperating Robotic Sytem Critiane P. Tonetto, Carlo R. Rocha, Henrique Sima, Altamir Dia Federal Univerity of Santa Catarina, Mechanical Engineering Department, P.O. Box 476,

More information

Variable Resolution Discretization in the Joint Space

Variable Resolution Discretization in the Joint Space Variable Reolution Dicretization in the Joint Space Chritopher K. Monon, David Wingate, and Kevin D. Seppi {c,wingated,keppi}@c.byu.edu Computer Science, Brigham Young Univerity Todd S. Peteron peterto@uvc.edu

More information

Fast Address Sequence Generation for Data-Parallel Programs Using Integer Lattices

Fast Address Sequence Generation for Data-Parallel Programs Using Integer Lattices Fat Addre Sequence Generation for Data-Parallel Program Uing Integer Lattice Ahwath Thirumalai and J Ramanujam Dept of Electrical & Computer Engineering Louiiana State Univerity, Baton Rouge, LA 70803

More information

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit

More information

Optimal Multi-Robot Path Planning on Graphs: Complete Algorithms and Effective Heuristics

Optimal Multi-Robot Path Planning on Graphs: Complete Algorithms and Effective Heuristics Optimal Multi-Robot Path Planning on Graph: Complete Algorithm and Effective Heuritic Jingjin Yu Steven M. LaValle Abtract arxiv:507.0390v [c.ro] Jul 05 We tudy the problem of optimal multi-robot path

More information

Attack-Resilient Multitree Data Distribution Topologies

Attack-Resilient Multitree Data Distribution Topologies Attack-Reilient Multitree Data Ditribution Topologie Sacha Grau acha.grau@tu-ilmenau.de Techniche Univerität Ilmenau, Germany Abtract. We conider a cenario of information broadcat where a ource node ditribute

More information