On the Computation and Application of Prototype Point Patterns
|
|
- Henry Goodman
- 6 years ago
- Views:
Transcription
1 On the Coputation and Application of Prototype Point Patterns Katherine E. Tranbarger Freier 1 and Frederic Paik Schoenberg 2 Abstract This work addresses coputational probles related to the ipleentation of Victor and Purpura s spike- tie distance etric for teporal point process data. Three coputational algoriths are presented that facilitate the calculation of spike-tie distance. In addition, recoendations for penalty paraeters are provided, and several properties and extensions of the spike-tie etric, and of point pattern distance etrics ore generally, are discussed. Applications include the foration of prototype point patterns that can be used for describing a typical point pattern in a collection of point patterns, and various clustering algoriths that can be odified for application to point process data through the use of spiketie distance and prototype patterns. Extensions of these techniques to u ltidiensional p o int p atterns are also addressed. Key words: distance etric, point process, prototype pattern. 1 Babson College Math and Science Division, 231 Forrest Street, Babson Park, MA Departent of Statistics, 8125 Math-Science Building, University of California, Los Angeles,
2 1 INTRODUCTION Teporal point process data arise naturally in the analysis of a wide variety of phenoena, including incidence of disease, sightings or births of a species, firings or neurons, or the occurrences of environental disasters such as earthquakes, tsunais, wildfires, and volcanic eruptions [1-4]. Often one obtains ultiple realizations of a point process, and probles that arise frequently in applications include characterizing particular realizations of the point process as outliers, suarizing a collection of point patterns by indicating the behavior of a typical realization, and organizing groups of point process realizations into clusters of siilar patterns of observations. All of these probles require the definition and coputation of the distance between two point process realizations. For instance, Victor and Purpura [5] analyzed collections of neuronal firings using the spike-tie distance etric between point patterns, and Schoenberg and Tranbarger [6] analyzed the behavior of typical aftershock sequences following a large earthquake using prototypes based on this spike-tie etric. Unfortunately, the spike-tie etric is extreely cubersoe to copute using present ethods, and this renders such applications for collections of large point process datasets infeasible. The central purpose of this paper is to develop coputational algoriths for the efficient coputation of spike-tie distances between teporal point patterns, to enable coputation of useful suaries such as the prototype of a collection of point process realizations as well as clustering, classification, and other applications of point process distance etrics. The spike-tie distance etric proposed by Victor and Purpura [5] involves the realignent, addition, and deletion of points in point pattern X to atch those in point pattern Y. The etric is soewhat analogous to several c l a s s i c a l a n d w e l l - u n d e r s t o o d distance etrics coonly used in coputer iaging and other areas. For instance, Earth Movier s Distance (EMD) introduced by Rubner, Toasi, and Guibas [7-8] evolved fro the Hitchcock solution [9] to the original transportation proble first discussed by Monge in 1781[10]. EMD easures the aount of work required to transfor a histogra of the values in one iage into that of the values in another iage using basic operations [8], and was shown by Levina and Bickel [11] to be equivalent to Mallows
3 distance on probability distributions when the two iage signatures in question are appropriately weighted by their sizes. In contrast to EMD, the spike-tie distance of Victor and Purpura [5] focuses on atching the points of two point processes rather than the suary histogras of an iage process, and thus requires soe fundaentally different algoriths for its coputation. In Section 2, we review soe of the atheatical history behind point pattern distance etrics and explore various properties of the spike-tie etric that c a n aid in its coputation. The priary focus of this section is dedicated to presenting three different algoriths that ay be used to copute spike-tie distance given repeated observations of a teporal point process. Section 3 describes point pattern prototypes along with issues relevant to their coputation and approxiation. Section 4 presents algoriths for clustering collections of observed point patterns based on their spiketie distances and prototype point patterns. A discussion and suggestions for further research are presented in Section 5. 2 SPIKE-TIME DISTANCE Let X and Y be teporal point patterns, i.e. each is a collection of points on the real line, and corresponds to a σ-finite non-negative integer-valued easure on R [1]. (We refer to such a collection of points as a point pattern, as distinguished fro a point process, which is a rando variable whose outcoes are point patterns.) The spike-tie distance between X and Y is defined as the total cost of transforing X into Y using a series of basic o v e e n t, a d d i t i o n, a n d d e l e t i o n operations [5]. Specifically, points fro X can be deleted at a cost p d, added at a cost of p a, or oved a distance at a cost of p. The iniu su of costs for the deletion, addition, and oving operations necessary to transfor point pattern X into point pattern Y is the spike-tie distance between X and Y. Note that in order for this to be a distance etric, it ust be syetric and thus the constraint p a = p d is typically iposed. While in soe applications it ight be desirable for p a and p d to take on different values, this paper focuses on the case where the spike-tie distance is a syetric distance etric.
4 Hence in what follows we assue p a = p d. One algorith for deterining the inial sequence of deletion, addition and oveent operations needed for transforing one point pattern into another is the Single-Unit (SU) algorith discussed in Aronov [12]. We will briefly review the SU algorith based on dynaic prograing algoriths introduced by Sellers [13] and show a odification on this approach that reduces coputation run tie fro O(n 2 ) to O(n 4/3 ). Also presented here is the Mutual Best Match (MBM) algorith that is useful for deterining distances between patterns of shorter lengths and which extends readily to ultiple diensions as discussed in Section Single-Unit algorith In general, the inial sequence of operations required to transfor point pattern X into point pattern Y can be difficult to deterine. In the special case where no points of X or Y are added or deleted, however, the coputation is quite trivial in view of the following result that is critical in the application of all three algoriths discussed. Theore 1. Suppose that teporal point patterns X and Y each consist of exactly n points and that p << p a = p d, so that in effect addition and deletion of points are not peritted. Then d(x,y) = p n x i y i where x 1, x 2,..., x n and y 1, y 2,..., y n are the sorted points of X and Y, respectively. Proof. The stateent is trivial for n = 1. Suppose n = 2, and without loss of generality assue x 1 y 1. If also x 2 y 2, then x 1 y 2 + x 2 y 1 x 1 y 1 + x 2 y 2 = x 1 y 1 + x 2 y 2, since both (x 1 y 1 ) and (x 2 y 2 ) a r e n o n - n e g a t i v e. Alternatively, if x 2 < y 2, then y 2 x 1 y 2 x 2 > 0, since x 1 x 2 < y 2. Siilarly, 0 y 1 x 1 y 1 x 2. Therefore, y 1 x 1 y 1 x 2 and y 2 x 2 y 2 x 1, so y 1 x 1 + y 2 x 2 y 1 x 2 + y 2 x 1. Hence
5 the basic operations that ove the point x 1 to y 2 and ove the point x 2 to y 1 have a total penalty that is at least as large as the penalties for oving x 1 to y 1 and oving x 2 to y 2. Now suppose n = k + 1 and that the result in Theore 1 holds for n = k. Consider any sequence of eleentary operations that includes oving x k+1 to y i and oving x j to y k+1, where i, j < k + 1. By the n = 2 case proven above, x k+1 y i + x j y k+1 x j y i + x k+1 y k+1. That is, the eleentary operations considered have cost at least as large as those obtained by oving x k +1 to y k +1 and oving x j to y i. Hence the inial total cost in aligning X and Y is obtained by the eleentary operations that involve oving x k+1 to y k+1 ; the cost of aligning the other k points of X with the other k points of Y is given by (1) with n = k. The result follows by induction. Using this result, an inductive approach to spike-tie distance calculation is possible. The SU algorith of Aronov [12] deterines the inial distance between i = 1, 2..., n points of pattern X and j = 1, 2..., points of pattern Y by building on the distance result for points i = 1, 2..., n 1 of X and points j = 1, 2..., 1 of Y. Let D i,j denote the spike-tie distance between the first i points of pattern X and first j points of pattern Y. To deterine the inial distance between patterns X and Y siple calculations to coplete an n by atrix of D i,j values are necessary. At each step D i,j is the iniu of D i 1,j + p d, D i,j 1 + p d, and D i 1,j 1 + (p x i y j ) (corresponding to the options of deletion of x i, deletion of y j, and the pairing of x i to y j, respectively). In the trivial cases of i = 0 or j = 0, D i,j = p d ax(i, j). 2.2 Modified Single-Unit algorith In spike-tie distance calculations, no ove greater than (p a + p d )/p ay take place since such a ove would be greater in cost than reoval and re-insertion of one of the points involved. With this fact in ind, the patterns X and Y can each be broken into patterns of shorter lengths whenever a gap of greater than (p a + p d )/p is present. In this odified SU (MSU) approach, coputations involve the sorting of points x 1, x 2,...x n and points y 1, y 2,...y cobined to for one pattern, Z, of
6 length n +. Instances in which z k -z k 1 is greater than (p a + p d )/p are easily identified to deterine how X and Y can be partitioned into patterns with fewer points. For exaple, if such a gap was present at z k =3, pattern X 1 would consist of all points in X less than 3 just as pattern Y 1 would consist of all points in Y less than 3. The SU algorith as earlier described is then applied to each pair of X i, Y i patterns fored in the partitioning process and the final distances for each pair are sued. Advantages of this odification are discussed in g r e a t e r d e t a i l i n Section Mutual Best Match algorith In light of Theore 1, the proble of deterining the best sequence of operations to transfor teporal (i.e. one diensional) point pattern X into point pattern Y reduces to the proble of deterining whether each point in the point patterns will be reoved (i.e. deleted fro one string or equivalently added to the other), or whether it will be kept, i.e. paired to a point in the other string. Once the points to be kept are deterined, the best approach for atching the kept points in X to those in Y is siply sequential, based on Theore 1. Evaluation of each potential set of kept points is thus rearkably straightforward. In fact, each potential distance is siply the nuber of points reoved sued with the integrated difference between the cuulative functions associated with the reaining points in the two point patterns [6]. Given two point patterns whose spike-tie distance is sought, the following results are useful in deterining which points will be kept and which will be reoved. Lea 2. Any point that is ore than (pa + pd )/p = 2pd /p away fro its nearest neighbor in the alternate point pattern will be reoved. Proof. The proof is iediate: for such a point x in X, it is ore costly to ove x to a point y in Y than to delete x and add to X a point at y. Theore 3. Any pair of points x i and y j satisfying the following condition will be kept: x i y i < in{ x k y j } < k i in{ x i y k } < 2p d k j p
7 Proof. There are three possible outcoes for points x i and y j satisfying the condition above. Either both points are reoved, one point is kept while the other is reoved, or both points are kept. We will show that the first two of these outcoes are excluded. Suppose that both points are reoved. Then the distance penalty function includes the penalty 2p d associated with those deletions. Since xi yj < 2p d /p, the penalty could be reduced by keeping both points and oving the to each other, at a cost of xi yj p. Therefore, reoving both x i and y j cannot yield the iniu penalty. Suppose that one point is kept while the other is reoved. Assue without loss of generality that x i is kept while y j is reoved. Then xi is paired with soe point y k such that y k = y j and the spike-tie distance includes both penalty p d for reoval of y j and x i y k p for the ove of point x i to y k. Since x i y k > x i y j the total spiketie distance penalty could be reduced by reoving point y k rather than point y j and oving x i to y j. Therefore, reoving one point while keeping the other cannot yield iniu penalty. The only option that reains is that both x i and y j are kept in the sequence of oves yielding inial total cost. The Mutual Best Match (MBM) algorith, naed for the property shown in Theore 3, uses the three discussed properties of the optial sequence of operations in the spike-tie distance etric to deterine the distance between point patterns X and Y. With these properties, the proble of deterining the distance between point pattern X and point pattern Y is siplified to identifying points known to be kept or deleted, then checking the total cost associated with each possible cobination of potentially kept points. Calculating the total cost associated with each potential cobination of kept points in the two point patterns is not coputationally tie prohibitive, as the sequential ordering prescribed by Theore 1 akes this calculation extreely straight-forward. 2.4 Application and penalty selection
8 It is not uncoon in point process applications to observe a collection of independent point patterns resulting fro a coon point process of interest. An exaple discussed in [6] is the collection of observed aftershock sequences following strong earthquakes in distinct regions, occurring within a fixed period of tie and space of each ain shock. Throughout this work, we refer to such a collection of point processes siply as a point process dataset. The nuber and proxiity of points in each point pattern observed in a point process dataset are iportant to consider when deterining the penalties used in the spike-tie distance etric. When selecting these penalties, it is the ratio of the deletion (addition) penalty p d to p that governs the setting p a = p d = 1 and deterining p by exaining the spread of the points in the data. If p is too large, then little oveent of points will take place in the coputation of distances between point patterns, as the cost of deletion and addition will be less than ost potential oves. Alternatively, if p is too sall, then oves will be ade between points that are not very close at all. With either extree, the resulting spike-tie distance will easure little ore than the su of, or difference between, the nuber of points in the two observed point patterns. Specifically, the spike-tie distances will approach the su of the two point pattern lengths for very large values of p, and will approach the absolute difference between these lengths for very sall p values. With these extrees in ind, one option is to set p to a value such that points closer than the typical inter-point distance are paired, and points further than this are reoved and t h e n reintroduced in the spike-tie distance calculations. This leads to selecting penalties such that: (T/M )p 2p d, (3) where M is the edian nuber of points per observed point pattern and T is the size of the range over which the points are observed. In siulation studies on point patterns generated fro a Poisson process, the precise value of the penalties selected were shown to have little influence on the overall distribution of pattern distances. Figure 1 shows the results fro calculating the 4,950 possible pair-wise distances between
9 100 siulated Poisson point patterns. The results are shown for three different values of p : the value as deterined by (3), 75% of the penalty recoended in (3), and 125% of the penalty found by (3). In each case, though the ean and standard deviation of the distances has changed (as would be expected), the distribution of distances is approxiately noral for all three. Noral Q-Q plots are provided below each histogra of distances to further illustrate how closely each follows the noral distribution. Since spike-tie distance is useful only for coparisons rather than as a raw easureent tool (where specific distance values have eaning out of the coparison context) the fact that the distribution of distances reains virtually unchanged in the face of rather substantial alterations to the penalty values suggests that investigations of differences and siilarities of point patterns within a dataset ay not be overly sensitive to the choice of penalty values, provided the penalties are within soe reasonable range, at least in so far as the shape of the distribution of the distances is concerned. Calculation tie is of course a key consideration in selection of which algorith to use with a particular data set. The ain advantage of the MSU approach is that it will often require significantly less tie to calculate the spike-tie distance of interest. This advantage over the standard SU algorith can be clearly seen in Figure 2. Here, for lengths n = 2, 3, 4..., 29, 30, 40, 50, 75, 100, 150, 200, distances were calculated between 1000 pairs of two randoly generated patterns of n points each using both the SU and MSU algoriths prograed in R. For the odified version, additional results for n = 300, 400, 500 are also shown. The patterns used t o c r e a t e F i g u r e 2 were generated by taking a rando saple of size n fro a unifor[0,10] distribution. Points in black are the resulting ean CPU ties using the standard SU algorith. The black line included is the best fit least-squared odel using n 2 as the only predictor, deonstrating the O(n 2 ) run tie achieved by the SU algorith. Points in red are fit with a linear odel and are the result fro using the MSU algorith. Though the MSU algorith should run O(n 4/3 ) due to the sorting calculation [14], up to n = 500 a linear odel fits the siulation results quite well as the sorting represents such a sall part of all coputations involved. In all cases, the penalties were fit as recoended above in (3). The ease of atrix anipulation in R is
10 the ain reason R was selected for ipleentation of the SU and MSU algoriths. The run tie for calculation of the spike-tie distance using the MBM algorith is approxiately O(2 n 1 +n 2), where n1 and n 2 are the lengths of the two point patterns. This is because there are on the order of O(2 n 1 +n 2) cobinations of points which ight be kept, and each of these is exained individually. Green points in Figure 3 illustrate this for the case n = n 1 = n 2, in which case the run tie increases approxiately as O(4 n ). In Figure 3, tiing siulations using the MBM approach prograed in C are included with a subset of the sae results shown in Figure 2. The overlaid green line corresponds to the best 4 n fit. C was selected for the MBM algorith because of the looping that takes place in the MBM distance calculation. All of these coputations were perfored using a 1.33GHz PowerPC G4. 3 PROTOTYPE POINT PATTERNS With a distance etric clearly defined, it becoes possible to identify a prototype point pattern that can be used for describing a typical observation within a point process dataset. We define this prototype to be the point pattern Y such that the su n d(x i,y) (4) is iniized, where X i, i = 1...n, are the n observed point patterns in the dataset. 3.1 Basic properties of prototype points A convenient feature aking prototypes easy to identify is described in Theore 4. Before stating this stating a proving this theore, we first turn to the definition of the edian of a sorted list of nubers z = {z 1, z 2,..., z }, whose length is even. Many texts define the edian of such a list as the ean of the two entries z /2 and z /2+1. Instead, let us refer to any value M such that z /2 M z /2+1 as a edian of z. With this convention in ind, we return to the proble of deterining prototypes. Suppose that Y is the prototype of a point process dataset consisting of n point patterns X 1,..., X n. For any point p in the prototype, consider the collection of points in the point process dataset z p = {z 1, z 2,..., z } to which
11 p is paired. That is, each eleent of z p is associated with a different X i point pattern within the coplete dataset and specifically, each point z i is the point to which point p is oved to when the spike-tie distance between Y and X i is deterined. Note that n, since p ight not be kept in the spike-tie distance between the prototype and soe of the point patterns in the dataset. Theore 4. Any point p in the prototype is a edian of z p. Proof. Fix any prototype point p and the list z p = {z 1,..., z } of points in the dataset to which p is paired. Note that, in order for p to be a point of the prototype, the su of distances fro z i to p ust be less than or equal to the su of distances fro z i to any other point q. Let q be a edian of z p, and suppose that p is not a edian of z p. We will show that the su of distances fro z i to q is less than the su of distances fro fro z i to p, contradicting the assuption that p is a point of the prototype. First suppose that the length of z p is odd, and without loss of generality assue p < q. The su of all distances fro z i to q is: ( 1)/ 2 = z i q + z i q i=( +3)/ 2 z i q = z i z ( / 2) + q z / 2 (5) since z (+1)/2 q = 0. The su of the distances fro z i to p is: z i p = ( z i q (q p) ) + z i q + (q p) ( 1)/ 2 i=( +3)/ 2 = z i q 1 ( q p) + 1 q p 2 2 = z i q + ( z ( +1)/ 2 p) ( ) + ( z ( +1)/ 2 p) ( ) ( ) + z ( +1)/ 2 p Therefore, the su of distances fro z i to p in (6) is greater than the su of distances to q, which is a contradiction. If is even, then without loss of generality assue that p < z /2. The su of all distances fro z i to q is: ( / 2) 1 + z i z ( / 2)+1 + z ( / 2)+1 q ( / 2)+1 ( ( )) + z i q ( ( )) i=( / 2)+2 i=( / 2) ( ) (6)
12 ( / 2) 1 ( ) + z ( / 2)+1 z / 2 = z i z ( / 2) + z 2 ( / 2)+1 z / 2 ( ) and the su of distances fro z to p is: ( / 2) 1 ( ) ( ) + z i z ( / 2)+1 z i p = z i z ( / 2) z / 2 p + z i z ( / 2)+1 + z ( / 2)+1 p i=( / 2)+2 ( / 2)+1 ( ( )) + z i p ( ( )) i=( / 2)+2 ( / 2) 1 ( ) + z ( / 2)+1 z / 2 = z i z ( / 2) ( ) z i z ( / 2)+1 i=( / 2)+2 ( ) + z / 2 p i=( / 2) ( ) z ( / 2)+1 z / 2 ( ) ( ) (7) = z i q + ( z / 2 p) which again contradicts the assuption that p is a point of the prototype. (8) A consequence of Theore 4 is that, for any point process dataset, there exists a prototype coprised entirely of points observed in the dataset. That is, in searching for a prototype, one ay liit one s search to all possible cobinations of entries in the dataset. 3.2 Prototype deterination In addition to the result shown in Theore 4, note that each point of the prototype ust be within (p a + p d )/p of a fraction p a /(p a + p d ) of the dataset s point patterns, as discussed in [6]. Let n be the nuber of point patterns in the dataset. Then each point z for which at least np a /[2(p a + p d )] other points fro distinct point patterns in the dataset are in the range [z (p a + p d )/p, z] and at least np a /[2(p a + p d )] other points fro distinct point patterns in the dataset fall in the range [z, z + (p a + p d )/p ] is a candidate for inclusion in the prototype. For the case where p a = p d, this is siply n/4 points fro distinct point patterns in the dataset occurring on either side of z, within a distance 2 p d /p. In practice, this observation will likely significantly decrease the nuber of candidates to be considered as potential points in the prototype.
13 3.2.1 Direct algoriths for prototype deterination With a finite nuber of candidate prototype points (n cp ) to consider, one ay copute the su in equation (4) for each possible prototype, i.e. each possible collection of points that are potentially in the prototype. For sufficiently sall oveent penalties, the prototype will generally have length equal to the edian length M of the n point patterns, so one ay liit one s search the n cp M collections of length M as candidates for the prototype. Depending on the size of the dataset of interest, this ay be a reasonable task to undertake. Alternatively, if p is not sall enough to allow for a prototype of length M, then the best prototype of length k can be iteratively sought for k = 1, 2,..., M. In this case, the prototype ay be found by considering the optial prototype candidate of length k = 1 and progressively increasing k, ending the search once the su in (4) for length k + 1 is greater than the su (4) for the best prototype of length k Forward and reverse stepwise approxiation Finding the prototype of a set of point patterns as prescribed in Section ay prove to be prohibitively tedious for datasets with a large nuber of point patterns, or for point patterns with a large edian nuber of points. In this case, stepwise ethods can be ipleented to attain an approxiate prototype solution. A reverse stepwise approach can be ipleented by first finding the optial prototype of edian length M. Possible prototypes of shorter length can then be found by eliinating points fro the length M prototype one at a tie. This strategy continues until the optial prototype of length k 1 has a larger su of distances (4) than the best prototype candidate of length k. While the reverse stepwise approach will entail fewer coputations than finding the prototype directly, even the reverse stepwise approxiation can prove prohibitively cubersoe due to the long length of the prototype coputed in the first stage. An alternative is to use a forward stepwise approach, which can further reduce coputation tie by beginning with a short prototype candidate and
14 progressively expanding it by one point at each step. In each iteration, the su of pattern-prototype distances (4) for the prototype candidate of length k is copared with the su for the prototype candidate of length k 1. Figure 4 illustrates the speed of the forward stepwise prototype approxiation approach using the MBM algorith for distance calculations, again using a 1.33GHz PowerPC G4 processor. Here, N = 5, 10,..., 50 Poisson processes of ean length n = 1, 2,...10 were siulated and the prototypes of the N patterns were deterined using the forward stepwise algorith. Mean CPU ties were recorded after 100 repetitions at each level of N and n. As seen in Figure 4, the nuber of point patterns in a dataset and the average length of those patterns have quite different effects on the calculation tie required for prototype deterination. While the large perspective plot of Figure 4 shows these two factors together, the two saller plots to the right illustrate the factors effects on tie separately by averaging the results first over the N levels of nuber of point patterns and secondly for the n levels of pattern ean length. These arginal plots show that while the ean pattern length has a relationship to run tie very siilar to that seen in Figure 3 for the tie required for MBM distance calculations, the relationship between the nuber of point patterns and run tie is nearly linear. This result is not surprising in light of the fact that collections of longer point patterns will have a prototype longer in length than collections of shorter point patterns. Longer prototypes require additional steps in the stepwise algorith and the CPU tie required for each step increases rapidly as the algorith continues. 3.3 Penalty selection considerations Penalties selected for p, p a, and p d play a significant role in prototype deterination. As stated in section 3.2, a point at tie t can only be part of the prototype if at least p a /(p a + p d ) of the point patterns in the dataset contain a point within the interval [t 2p a /p, t + 2p a /p ]. Selection of oving penalties that are too large will lead to prototypes that see unusually short, since the range t ± 2p a /p will be quite sall. When the priary purpose of the prototype pattern is to serve as an exaple of a typical point pattern, it is useful to set p to be quite sall copared to what ight be advisable for distance calculations. Setting p to a sall positive value when p a = p d enables the prototype to take on the edian nuber of points in the dataset. Because each prototype point ust be atched to points within at least p a
15 /(p a + p d ) of the observed point patterns, it is typically not possible to achieve a prototype of greater than edian length while aintaining the p a = p d restriction. Figure 5 illustrates how the length of the prototype is related to the relative size of the selected p and p a = p d values. For the first plot on the left, prototypes were calculated for 100 siulated datasets, each consisting of 20 stationary Poisson processes of rate 1 on [0, T ], using the forward stepwise algorith and 100 different p values ranging fro to 2.0. In all cases, p a = p d = 1. The ean prototype length for each penalty value is seen along the y-axis and is plotted against the corresponding oveent penalty value. As expected, saller values of p correspond to longer prototype lengths, with a leveling off across very sall p values where the axiu prototype length (the edian) has been achieved. The plot on the right of Figure 5 shows the 100 prototypes calculated for one randoly selected siulated dataset used for the illustration on the left. Of particular interest is the observation that while the nuber of points in the prototype decreases with increases in p, the actual location of any of the prototype points reains essentially constant across a wide range of penalty values. This suggests that for any particular dataset, the locations of the points in the prototype will be rather robust to choices of p and p a = p d. Sall changes in the ratio p /p a appear to have surprisingly little effect on either the prototype pattern or the overall distribution of distances as seen earlier in Figure 1. 4 CLASSIFICATION THROUGH CLUSTERING Using the spike-tie distance etric and prototype, various clustering algoriths established for standard ultivariate data can be odified for use in point process applications. This section describes how three such ethods can be adapted and discusses issues in the selection of addition, deletion, and oveent penalties when these clustering algoriths are used. 4.1 HMEANS, KMEANS and Aggloerative clustering HMEANS and KMEANS clustering are two closely related iterative techniques useful for clustering ulti-variate data. Both HMEANS and KMEANS clustering begin by randoly assigning each observation to one of c clusters and finding the center of each cluster. While cluster centers are conventionally defined as centroids in standard HMEANS and KMEANS clustering of ultivariate data
16 [15], one ay instead use the prototype as the definition of the center of a cluster of point patterns when analyzing a point process dataset. A third option is an aggloerative approach that assigns each observed point pattern to its own cluster and then systeatically cobines clusters. This approach is especially useful in cases where HMEANS and KMEANS fail to converge after nuerous iterations. With each observed point pattern assigned to a cluster of its own, each cluster s prototype is siply the eber pattern. The pair-wise distances between each cluster prototype can be found and the nearest two clusters joined to for one larger two-pattern cluster. Fro here, the new cluster prototype is deterined, and the new pair-wise distances between prototypes are calculated. The process repeats until only c desired clusters reain. If the aount of data akes coputing all pair-wise distances unfeasible, a siilar approach is to consider pair-wise distances for only one point pattern at a tie in either a randoly assigned order, or in order of length fro the longest pattern to the shortest. Our investigations suggest that this procedure of ordering the point patterns fro longest to shortest and then progressively erging the point patterns iniizes probles that can occur if the p a, p d, and p penalties are set such that pattern length overshadows other features in the distance easures. 4.2 Penalty choice considerations While setting p to a sall value is useful in deterining prototypes, very sall p values are not desirable in clustering applications. As discussed in Section 2.4, sall penalties for oveent of points will lead to distances that approach the absolute difference in pattern lengths, while large oveent penalties lead to distance calculations that approach the su of point pattern lengths. In clustering, either extree will lead to clusters assigned by grouping patterns of siilar lengths rather than patterns with siilarly placed points. For the siulation presented in Figure 6, ten point patterns were created for each of two different ethods. Ten realizations of a rate 1 Poisson process on [0,6], and another ten point patterns were each created by sapling n points independently fro a noral rando variable with ean 3.0 and standard deviation 0.25, where n is a Poisson rando variable with ean 6.0. Patterns of length zero were excluded. Plotted in Figure 6 is the ean failure rate for HMEANS in correctly identifying the two different types of patterns over 125 siulations. The ean rate of failure is shown for twenty different p values ranging fro 5% to 200% of the penalty recoended in (3) for distance calculations. It is clear in
17 these results that extreely sall values of p are less successful at clustering than values siilar to that advised in (3) for distance easureents. 5 MULTI-DIMENSIONAL EXTENSIONS AND DISCUSSION The spike-tie distance etric as exained in this work, and as originally proposed by Victor and Purpura [5], has thus far been applied priarily to teporal point patterns as defined in Section 2. This is just the beginning of ways prototypes and the spike-tie etric can be used though as the spike-tie etric, the related prototype pattern technique, and related clustering algoriths can all be extended to point process data with points occurring in R d. In the extension of the definition of the spike-tie distance etric to R d, points can be added with penalty p a, deleted with penalty p d, or oved along the i th axis a distance of at a cost of p (i). Moving penalties p (1), p (2) (d ),...p ay be set independently for oveent along each of the d axes as in (3) for distance calculations and clustering application settings. As with the one-diensional case, saller values for oveent penalties are again useful for prototype deterination to enable longer length prototype point patterns. While the ratio of p a and p d to oving penalty p was of priary iportance for teporal point process work, the relative values of the d oveent penalties ust also be considered when ultiple diensions are involved. These ratios ust be considered so as to avoid (or allow) inter-point distances along one or ore diensions being ore heavily weighted in distance calculations. As ight be expected, spike-tie distance calculations are far ore cubersoe in R d, as the result of Theore 1 does not hold in ore than one diension. Without the result of Theore 1, neither the SU nor MSU approaches can be ipleented. Also, using MBM, ultiple pairing arrangeents ust be considered for each possible set of kept points. The process to deterine which points will be kept and which will be reoved under the MBM algorith reains unchanged as Lea 2 and Theore 3 extend iediately to ultiple diensions. For prototype pattern deterination, a odified version of Theore 4 applies to the ultidiensional setting. With ore than one diension, rather than each prototype point p being a edian of the points (z 1, z 2,..., z ) it is paired with, each coordinate of prototype point p will be a edian of the
18 corresponding coordinate of the points (z 1, z 2,..., z ). Therefore, while the prototype ay not contain points in the dataset, there exists a prototype ade entirely of points such that each coordinate of each prototype point is a coordinate of one of the points observed in the dataset. Clustering algoriths discussed in Section 4 can be applied to ulti-diensional point pattern data without odification. For soe datasets, the coputation tie involved in prototype deterination ipedes the use of the clustering algoriths as described in Section 4 and slight odifications can be ade, such as considering only one of the d diensions at a tie in each step of the prototype and/or distance calculation. Such a onothetic approach is used in [6] for clustering earthquake aftershock activity considering the tie, agnitude, and location of each aftershock one at a tie. While the spike-tie distance etric is only one of countless distance etrics for point pattern data [5], the concept of a prototype sequence is one that exists independently of distance etric specifics. Therefore, though any of the results presented here apply solely to the spike-tie etric, the approaches to deterining prototypes and clusters derived fro the ability to easure distances between point patterns should reain useful in conjunction with other point pattern distance etrics.
19 6 FIGURES
20 Figure 2
21 Figure 3
22 Figure 4
23 Figure 5
24 Figure 6
25 7 ACKNOWLEDGEMENTS We thank Chuck Woody for introducing us to the work of Victor and Purpura, and we thank Pepe Segundo for introducing us to Chuck Woody. This aterial is based upon work supported by the National Science Foundation under Grant No Any opinions, findings, and conclusions or recoendations expressed in this aterial are those of the authors and do not necessarily reflect the views of the National Science Foundation. This research was also supported by the Southern California Earthquake Center. SCEC is funded by NSF Cooperative Agreeent EAR and USGS Cooperative Agreeent 07HQAG0008. The SCEC contribution nuber for this paper is 1283.
26 8 REFERENCES [1] D. Daley and D. Vere-Jones, An Introduction to the Theory of Point Processes, Volue 1: Eleentary Theory and Methods, 2nd ed. Springer-Verlag, New York, [2] F.P. Schoenberg, D.R. Brillinger, and P.M. Guttorp, Point processes, spatial-teporal in Encyclopedia of Environetrics, Abdel El-Shaarawi and Walter Piegorsch, editors. Wiley, NY, vol. 3, pp , [3] P. Guttorp and M. Thopson, Nonparaetric estiation of intensities for sapled counting processes, Journal of the Royal Statistical Society, Series B 52, , [4] D.L. Synder and M.I. Miller, Rando Point Processes in Tie and Space, Wiley, New York, [5] J. Victor and K. Purpura, Metric-space analysis of spike trains: theory, algoriths and application, Network: Coputation in Neural Systes vol. 8, pp , [6] F.P. Schoenberg, and K.E. Tranbarger, Description of earthquake aftershock sequences using prototype point processes, Environetrics vol. 19, pp , [7] Y. Rubner, C. Toasi, and L. Guibas, A Metric for Distributions with Applications to Iage Databases, in IEEE International Conference on Coputer Vision, pp , [8] Y. Rubner, C. Toasi, and L. Guibas, The Earth Mover s Distance as a Metric for Iage Retrieval, International Journal of Coputer Vision vol. 40(2), pp , [9] F. L. Hitchcock, The distribution of a product fro several sources to nuerous localities, Journal of Matheatical Physics, vol. 20, pp , [10] G. Monge, Méoire sur la Théorie des Déblais et des Reblais, Histoire de l Acadéie Royale des Sciences, Paris, [11] E. Levina and P.J. Bickel, The Earth Mover s Distance is the Mallows Distance: Soe Insights fro Statistics, in Proceedings of ICCV Vancouver, Canada, 2001, pp [12] D. Aronov, Fast algorith for the etric-space analysis of siultaneous responses of ultiple single neurons Journal of Neuroscience Methods vol. 124, pp , [13] P.H. Sellers, On the theory and coputation of evolutionary distances SIAM J. Appl. Math. vol. 26, pp , [14] R. Sedgewick, A new upper bound for Shell sort, Journal of Algoriths vol. 7, pp , [15] H. Spath, Cluster Analysis Algoriths for Data Reduction and Classification of Objects, E. Horwood, Chichester and Halsted Press, New York, [16] D. Reich, F. Mechler, K. Purpura, and J. Victor, Interspike intervals, receptive fields and inforation encoding in priary visual cortex,journal of Neuroscience vol. 20 (5), pp , 2000.
Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering
Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into
More informationEvaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds
Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles
More informationλ-harmonious Graph Colouring Lauren DeDieu
λ-haronious Graph Colouring Lauren DeDieu June 12, 2012 ABSTRACT In 198, Hopcroft and Krishnaoorthy defined a new type of graph colouring called haronious colouring. Haronious colouring is a proper vertex
More informationA Novel Fast Constructive Algorithm for Neural Classifier
A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore
More informationThe optimization design of microphone array layout for wideband noise sources
PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun
More informationGromov-Hausdorff Distance Between Metric Graphs
Groov-Hausdorff Distance Between Metric Graphs Jiwon Choi St Mark s School January, 019 Abstract In this paper we study the Groov-Hausdorff distance between two etric graphs We copute the precise value
More informationGeometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem.
Noveber 13, 2016 Geoetry. The Method of the enter of Mass (ass points): Solving probles using the Law of Lever (ass points). Menelaus theore. Pappus theore. M d Theore (Law of Lever). Masses (weights)
More informationThe Internal Conflict of a Belief Function
The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of
More informationDifferent criteria of dynamic routing
Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich
More informationA Trajectory Splitting Model for Efficient Spatio-Temporal Indexing
A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada
More informationIdentifying Converging Pairs of Nodes on a Budget
Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering
More informationImage Filter Using with Gaussian Curvature and Total Variation Model
IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.
More informationStructural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.
Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable
More information3 Conference on Inforation Sciences and Systes, The Johns Hopkins University, March, 3 Sensitivity Characteristics of Cross-Correlation Distance Metric and Model Function F. Porikli Mitsubishi Electric
More informationA simplified approach to merging partial plane images
A siplified approach to erging partial plane iages Mária Kruláková 1 This paper introduces a ethod of iage recognition based on the gradual generating and analysis of data structure consisting of the 2D
More informationOblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands
Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu
More informationDetection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm
Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,
More informationTensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3
2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition
More informationDistributed Multicast Tree Construction in Wireless Sensor Networks
Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,
More informationSmarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math
Sarter Balanced Assessent Consortiu s, s, Stard Alignent for Math The Sarter Balanced Assessent Consortiu (SBAC) has created a hierarchy coprised of clais targets that together can be used to ake stateents
More informationShortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm
International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University
More informationTheoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem
Theoretical Analysis of Local Search and Siple Evolutionary Algoriths for the Generalized Travelling Salesperson Proble Mojgan Pourhassan ojgan.pourhassan@adelaide.edu.au Optiisation and Logistics, The
More informationTALLINN UNIVERSITY OF TECHNOLOGY, INSTITUTE OF PHYSICS 17. FRESNEL DIFFRACTION ON A ROUND APERTURE
7. FRESNEL DIFFRACTION ON A ROUND APERTURE. Objective Exaining diffraction pattern on a round aperture, deterining wavelength of light source.. Equipent needed Optical workbench, light source, color filters,
More informationEE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011
EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction
More informationI ve Seen Enough : Incrementally Improving Visualizations to Support Rapid Decision Making
I ve Seen Enough : Increentally Iproving Visualizations to Support Rapid Decision Making Sajjadur Rahan Marya Aliakbarpour 2 Ha Kyung Kong Eric Blais 3 Karrie Karahalios,4 Aditya Paraeswaran Ronitt Rubinfield
More informationOptimal Route Queries with Arbitrary Order Constraints
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL.?, NO.?,? 20?? 1 Optial Route Queries with Arbitrary Order Constraints Jing Li, Yin Yang, Nikos Maoulis Abstract Given a set of spatial points DS,
More informationDerivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router
Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of
More informationHomework 1. An Introduction to Neural Networks
Hoework An Introduction to Neural Networks -785: Introduction to Deep Learning Spring 09 OUT: January 4, 09 DUE: February 6, 09, :59 PM Start Here Collaboration policy: You are expected to coply with the
More informationA Learning Framework for Nearest Neighbor Search
A Learning Fraework for Nearest Neighbor Search Lawrence Cayton Departent of Coputer Science University of California, San Diego lcayton@cs.ucsd.edu Sanjoy Dasgupta Departent of Coputer Science University
More informationComputer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13
Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical
More informationAscending order sort Descending order sort
Scalable Binary Sorting Architecture Based on Rank Ordering With Linear Area-Tie Coplexity. Hatrnaz and Y. Leblebici Departent of Electrical and Coputer Engineering Worcester Polytechnic Institute Abstract
More informationCOMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S
COPUTER GEERATED HOLOGRAS Optical Sciences 67 W.J. Dallas (onday, August 3, 004, 1:38 P) PART III: CHAPTER OE DIFFUSERS FOR CGH S Part III: Chapter One Page 1 of 8 Introduction Hologras for display purposes
More informationEfficient Learning of Generalized Linear and Single Index Models with Isotonic Regression
Efficient Learning of Generalized Linear and Single Index Models with Isotonic Regression Sha M. Kakade Microsoft Research and Wharton, U Penn skakade@icrosoft.co Varun Kanade SEAS, Harvard University
More informationCS 361 Meeting 8 9/24/18
CS 36 Meeting 8 9/4/8 Announceents. Hoework 3 due Friday. Review. The closure properties of regular languages provide a way to describe regular languages by building the out of sipler regular languages
More informationELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH
ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH Kulapraote Prathuchai Geoinforatics Center, Asian Institute of Technology, 58 Moo9, Klong Luang, Pathuthani, Thailand.
More informationReconstruction of Time Series using Optimal Ordering of ICA Components
Reconstruction of Tie Series using Optial Ordering of ICA Coponents Ar Goneid and Abear Kael Departent of Coputer Science & Engineering, The Aerican University in Cairo, Cairo, Egypt e-ail: goneid@aucegypt.edu
More informationSurvivability Function A Measure of Disaster-Based Routing Performance
Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected
More informationEnergy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks
Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr
More informationSummary. Reconstruction of data from non-uniformly spaced samples
Is there always extra bandwidth in non-unifor spatial sapling? Ralf Ferber* and Massiiliano Vassallo, WesternGeco London Technology Center; Jon-Fredrik Hopperstad and Ali Özbek, Schluberger Cabridge Research
More informationBoosted Detection of Objects and Attributes
L M M Boosted Detection of Objects and Attributes Abstract We present a new fraework for detection of object and attributes in iages based on boosted cobination of priitive classifiers. The fraework directly
More informationA Learning Framework for Nearest Neighbor Search
A Learning Fraework for Nearest Neighbor Search Lawrence Cayton Departent of Coputer Science University of California, San Diego lcayton@cs.ucsd.edu Sanjoy Dasgupta Departent of Coputer Science University
More informationA Measurement-Based Model for Parallel Real-Time Tasks
A Measureent-Based Model for Parallel Real-Tie Tasks Kunal Agrawal 1 Washington University in St. Louis St. Louis, MO, USA kunal@wustl.edu https://orcid.org/0000-0001-5882-6647 Sanjoy Baruah 2 Washington
More informationMapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues
Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu
More informationOPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS
Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented
More informationMinimax Sensor Location to Monitor a Piecewise Linear Curve
NSF GRANT #040040 NSF PROGRAM NAME: Operations Research Miniax Sensor Location to Monitor a Piecewise Linear Curve To M. Cavalier The Pennsylvania State University University Par, PA 680 Whitney A. Conner
More informationA Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem
IE Vol. 7, No. 2, pp. 84-92, Septeber 2008. A Coparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Proble Ji Ung Sun School of Industrial and Managent Engineering Hankuk University
More informationBrian Noguchi CS 229 (Fall 05) Project Final Writeup A Hierarchical Application of ICA-based Feature Extraction to Image Classification Brian Noguchi
A Hierarchical Application of ICA-based Feature Etraction to Iage Classification Introduction Iage classification poses one of the greatest challenges in the achine vision and achine learning counities.
More informationNON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH
NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH V. Atienza; J.M. Valiente and G. Andreu Departaento de Ingeniería de Sisteas, Coputadores y Autoática Universidad Politécnica de Valencia.
More informationA Hybrid Network Architecture for File Transfers
JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,
More informationDefining and Surveying Wireless Link Virtualization and Wireless Network Virtualization
1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,
More informationAutomatic Graph Drawing Algorithms
Autoatic Graph Drawing Algoriths Susan Si sisuz@turing.utoronto.ca Deceber 7, 996. Ebeddings of graphs have been of interest to theoreticians for soe tie, in particular those of planar graphs and graphs
More informationFeature Based Registration for Panoramic Image Generation
IJCSI International Journal of Coputer Science Issues, Vol. 10, Issue 6, No, Noveber 013 www.ijcsi.org 13 Feature Based Registration for Panoraic Iage Generation Kawther Abbas Sallal 1, Abdul-Mone Saleh
More informationEffective Tracking of the Players and Ball in Indoor Soccer Games in the Presence of Occlusion
Effective Tracking of the Players and Ball in Indoor Soccer Gaes in the Presence of Occlusion Soudeh Kasiri-Bidhendi and Reza Safabakhsh Airkabir Univerisity of Technology, Tehran, Iran {kasiri, safa}@aut.ac.ir
More informationFair Resource Allocation for Heterogeneous Tasks
Fair Resource Allocation for Heterogeneous Tasks Koyel Mukherjee, Partha utta, Gurulingesh Raravi, Thangaraj Balasubraania, Koustuv asgupta, Atul Singh Xerox Research Center India, Bangalore, India 560105
More informationTHE rounding operation is performed in almost all arithmetic
This is the author's version of an article that has been published in this journal. Changes were ade to this version by the publisher prior to publication. The final version of record is available at http://dx.doi.org/.9/tvlsi.5.538
More informationJoint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points
Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University
More informationCarving Differential Unit Test Cases from System Test Cases
Carving Differential Unit Test Cases fro Syste Test Cases Sebastian Elbau, Hui Nee Chin, Matthew B. Dwyer, Jonathan Dokulil Departent of Coputer Science and Engineering University of Nebraska - Lincoln
More informationData Caching for Enhancing Anonymity
Data Caching for Enhancing Anonyity Rajiv Bagai and Bin Tang Departent of Electrical Engineering and Coputer Science Wichita State University Wichita, Kansas 67260 0083, USA Eail: {rajiv.bagai, bin.tang}@wichita.edu
More informationCollaborative Web Caching Based on Proxy Affinities
Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA
More informationSmarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math
Sarter Balanced Assessent Consortiu s, s, Stard Alignent for Math The Sarter Balanced Assessent Consortiu (SBAC) has created a hierarchy coprised of clais targets that together can be used to ake stateents
More informationGeo-activity Recommendations by using Improved Feature Combination
Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,
More informationScheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We
More informationDesigning High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN
International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI
More informationData pre-processing framework in SPM. Bogdan Draganski
Data pre-processing fraework in SPM Bogdan Draganski Outline Why do we need pre-processing? Overview Structural MRI pre-processing fmri pre-processing Why do we need pre-processing? What do we want? Reason
More informationAGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM
International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.5, Septeber 205 AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM Xie Yang and Cheng Wushan College of Mechanical Engineering,
More informationPredicting x86 Program Runtime for Intel Processor
Predicting x86 Progra Runtie for Intel Processor Behra Mistree, Haidreza Haki Javadi, Oid Mashayekhi Stanford University bistree,hrhaki,oid@stanford.edu 1 Introduction Progras can be equivalent: given
More informationPOSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang
IEEE International Conference on ultiedia and Expo POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION Junjun Jiang, Ruiin Hu, Zhen Han, Tao Lu, and Kebin Huang National Engineering
More informationCassia County School District #151. Expected Performance Assessment Students will: Instructional Strategies. Performance Standards
Unit 1 Congruence, Proof, and Constructions Doain: Congruence (CO) Essential Question: How do properties of congruence help define and prove geoetric relationships? Matheatical Practices: 1. Make sense
More informationEfficient Estimation of Inclusion Coefficient using HyperLogLog Sketches
Efficient Estiation of Inclusion Coefficient using HyperLogLog Sketches Azade Nazi, Bolin Ding, Vivek Narasayya, Surajit Chaudhuri Microsoft Research {aznazi, bolind, viveknar, surajitc}@icrosoft.co ABSTRACT
More information1 Extended Boolean Model
1 EXTENDED BOOLEAN MODEL It has been well-known that the Boolean odel is too inflexible, requiring skilful use of Boolean operators to obtain good results. On the other hand, the vector space odel is flexible
More informationVerdict Accuracy of Quick Reduct Algorithm using Clustering, Classification Techniques for Gene Expression Data
Verdict Accuracy of Quick Reduct Algorith using Clustering, Classification Techniques for Gene Expression Data T.Chandrasekhar 1, K.Thangavel 2 and E.N.Sathishkuar 3 1 Departent of Coputer Science, eriyar
More informationImage Processing for fmri John Ashburner. Wellcome Trust Centre for Neuroimaging, 12 Queen Square, London, UK.
Iage Processing for fmri John Ashburner Wellcoe Trust Centre for Neuroiaging, 12 Queen Square, London, UK. Contents * Preliinaries * Rigid-Body and Affine Transforations * Optiisation and Objective Functions
More informationMedical Biophysics 302E/335G/ st1-07 page 1
Medical Biophysics 302E/335G/500 20070109 st1-07 page 1 STEREOLOGICAL METHODS - CONCEPTS Upon copletion of this lesson, the student should be able to: -define the ter stereology -distinguish between quantitative
More informationShort Papers. Location- and Density-Based Hierarchical Clustering Using Similarity Analysis 1 INTRODUCTION
IEEE TRASACTIOS O PATTER AALYSIS AD MACHIE ITELLIGECE, VOL. 20, O. 9, SEPTEMBER 1998 1011 Short Papers Location- and Density-Based Hierarchical Clustering Using Siilarity Analysis Peter Bacsy and arendra
More informationNovel Image Representation and Description Technique using Density Histogram of Feature Points
Novel Iage Representation and Description Technique using Density Histogra of Feature Points Keneilwe ZUVA Departent of Coputer Science, University of Botswana, P/Bag 00704 UB, Gaborone, Botswana and Tranos
More informationUsing Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses
International Journal of Industrial Engineering & Production Research Septeber 03, Volue 4, Nuber 3 pp. 9-35 ISSN: 008-4889 http://ijiepr.iust.ac.ir/ Using Iperialist Copetitive Algorith in Optiization
More informationKS3 Maths Progress Delta 2-year Scheme of Work
KS3 Maths Progress Delta 2-year Schee of Work See the spreadsheet for the detail. Essentially this is an express route through our higher-ability KS3 Maths Progress student books Delta 1, 2 and 3 as follows:
More informationData & Knowledge Engineering
Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID
More informationIN many interactive multimedia streaming applications, such
840 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 5, MAY 06 A Geoetric Approach to Server Selection for Interactive Video Streaing Yaochen Hu, Student Meber, IEEE, DiNiu, Meber, IEEE, and Zongpeng Li, Senior
More informationImprove Peer Cooperation using Social Networks
Iprove Peer Cooperation using Social Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Noveber 5, 2007 Corresponding
More informationInvestigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks
Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,
More informationNews Events Clustering Method Based on Staging Incremental Single-Pass Technique
News Events Clustering Method Based on Staging Increental Single-Pass Technique LI Yongyi 1,a *, Gao Yin 2 1 School of Electronics and Inforation Engineering QinZhou University 535099 Guangxi, China 2
More informationEFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B.
EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B. Girod1 1 Stanford University, USA 2 Qualco Inc., USA ABSTRACT We study
More informationSolving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification
Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural
More informationOptimized stereo reconstruction of free-form space curves based on a nonuniform rational B-spline model
1746 J. Opt. Soc. A. A/ Vol. 22, No. 9/ Septeber 2005 Y. J. Xiao and Y. F. Li Optiized stereo reconstruction of free-for space curves based on a nonunifor rational B-spline odel Yi Jun Xiao Departent of
More informationFair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones
Advance Access publication on 24 February 2017 The British Coputer Society 2017. All rights reserved. For Perissions, please eail: journals.perissions@oup.co doi:10.1093/cojnl/bxx015 Fair Energy-Efficient
More informationControl Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols
Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Navodaya Garepalli Kartik Gopalan Ping Yang Coputer Science, Binghaton University (State University of New York) Contact:
More informationPlanet Scale Software Updates
Planet Scale Software Updates Christos Gkantsidis 1, Thoas Karagiannis 2, Pablo Rodriguez 1, and Milan Vojnović 1 1 Microsoft Research 2 UC Riverside Cabridge, UK Riverside, CA, USA {chrisgk,pablo,ilanv}@icrosoft.co
More informationFlucs: Artificial Lighting & Daylighting. IES Virtual Environment
Flucs: Artificial Lighting & Daylighting IES Virtual Environent Contents 1. General Description of the FLUCS Interface... 6 1.1. Coon Controls... 6 1.2. Main Application Window... 6 1.3. Other Windows...
More informationA Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network
A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University
More informationError estimation of bathymetric grid models derived from historic and contemporary datasets 1 Introduction
Error estiation of bathyetric grid odels derived fro historic and conteporary datasets Martin Jakobsson, Brian Calder, Larry Mayer and Andy Arstrong Center for Coastal and Ocean Mapping, University of
More informationTHE rapid growth and continuous change of the real
IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa
More informationModeling Parallel Applications Performance on Heterogeneous Systems
Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln
More informationAnalysing Real-Time Communications: Controller Area Network (CAN) *
Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination
More informationApproximate String Matching with Reduced Alphabet
Approxiate String Matching with Reduced Alphabet Leena Salela 1 and Jora Tarhio 2 1 University of Helsinki, Departent of Coputer Science leena.salela@cs.helsinki.fi 2 Aalto University Deptartent of Coputer
More informationRelief shape inheritance and graphical editor for the landscape design
Relief shape inheritance and graphical editor for the landscape design Egor A. Yusov Vadi E. Turlapov Nizhny Novgorod State University after N. I. Lobachevsky Nizhny Novgorod Russia yusov_egor@ail.ru vadi.turlapov@cs.vk.unn.ru
More informationAn Integrated Processing Method for Multiple Large-scale Point-Clouds Captured from Different Viewpoints
519 An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured fro Different Viewpoints Yousuke Kawauchi 1, Shin Usuki, Kenjiro T. Miura 3, Hiroshi Masuda 4 and Ichiro Tanaka 5 1 Shizuoka
More informationMAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer
MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer Departent of Coputer Science and Engineering University of South Florida Tapa, FL 33620 Abstract -- The
More informationImplementation of fast motion estimation algorithms and comparison with full search method in H.264
IJCSNS International Journal of Coputer Science and Network Security, VOL.8 No.3, March 2008 139 Ipleentation of fast otion estiation algoriths and coparison with full search ethod in H.264 A.Ahadi, M.M.Azadfar
More information