arxiv: v1 [math.co] 10 Aug 2016
|
|
- Kerry Floyd
- 6 years ago
- Views:
Transcription
1 LOWER BOUNDS FOR ON-LINE INTERVAL COLORING WITH VECTOR AND CARDINALITY CONSTRAINTS GRZEGORZ GUTOWSKI AND PATRYK MIKOS arxiv: v1 [ath.co] 10 Aug 2016 Abstract. We propose two strategies for Presenter in the on-line interval graph coloring gaes. Specifically, we consier a setting in which each interval is associate with a -iensional vector of weights an the coloring nees to satisfy the -iensional banwith constraint, an the k-carinality constraint. Such a variant was first introuce by Epstein an Levy an it is a natural oel for resource-aware task scheuling with ifferent share resources where at ost k tasks can be scheule siultaneously on a single achine. The first strategy forces any on-line interval coloring algorith to use at least (5 3) log+3 ifferent colors on an ( k +log+3) -colorable set of intervals. The secon strategy forces any on-line interval coloring algorith to use at least 5 2 log+3 ifferentcolorsonan( k +log+3) -colorablesetofunitintervals. 1. Introuction A proper coloring of a graph G is an assignent of colors to the vertices of the graph such that ajacent vertices receive istinct colors. A k-boune coloring of G is a proper coloring of G such that the nuber of vertices that receive any single color is at ost k. For a graph G, let χ(g) enote the chroatic nuber of G, that is the iniu nuber of colors in a proper coloring of G, an let ω(g) enote the clique nuber of G, that is, the axiu size of a subset of vertices such that any two vertices in the subset are ajacent. An on-line graph coloring gae is a two-person gae, playe by Presenter an Algorith. In each roun Presenter introuces a new vertex of a graph with its ajacency status to all vertices presente earlier. Algorith assigns a color to the incoing vertex in such a way that the coloring of the presente graph is proper. The color of the new vertex is assigne before Presenter introuces the next vertex an the assignent is irrevocable. The goal of Algorith is to iniize the nuber of ifferent colors use uring the gae. In the k-boune variant of the gae, the coloring constructe by Algorith nees to be a k-boune coloring of the presente graph. For an interval I = [l,r] on the real line, we say that l is the left enpoint, an r is the right enpoint of I. The length of interval I is the ifference between its right enpoint an its left enpoint. A set of intervals on the real line represents a graph in the following way. Each interval represents a vertex an any two vertices 1
2 are joine by an ege whenever the corresponing intervals intersect. A graph which aits such a representation is an interval graph. An on-line interval coloring gae is a two-person gae, again playe by Presenter an Algorith. In each roun Presenter introuces a new interval on the real line. Algorith assigns a color to the incoing interval in such a way that the coloring of the presente interval graph is proper, i.e. all intervals of the sae color are pairwise isjoint. The color of the new interval is assigne before Presenter introuces the next interval an the assignent is irrevocable. The goal of Algorith is to iniize the nuber of ifferent colors use uring the gae. We consier a few variants of the on-line interval coloring gae. In the unit variant of the gae, all intervals presente by Presenter are of length exactly 1. In the -iensional variant of the gae, Presenter associates a -iensional vector of weights fro [0, 1] with each presente interval. Moreover, the coloring constructe by Algorith nees to satisfy a ifferent conition. The conition is that for each color γ an any point p on the real line, the su of weights of intervals containing p an colore γ oes not excee 1 in any of the coorinates. In the k-carinality variant of the gae, the coloring constructe by Algorith nees to satisfy that for each color γ an any point p on the real line, the nuber of intervals containing p an colore γ oes not excee k. We are ost intereste in the on-line (k,) interval coloring, a variant in which each interval has a -iensional vector of weights an the coloring ust satisfy constraints of both -iensional an k-carinality variant. That is, for each color γ an any point p, the nuber of intervals containing p an colore γ oes not excee k, an the su of weights of those intervals oes not excee 1 in any coorinate. In the context of various on-line coloring gaes, the easure of the quality of a strategy for Algorith is given by copetitive analysis. A coloring strategy for Algorith is r-copetitive if it uses at ost r c colors for any c-colorable graph, or set of intervals, presente by Presenter. The copetitive ratio for a proble is the infiu of all values r such that there exists an r-copetitive strategy for Algorith for this proble. In this paper we give lower bouns on copetitive ratios for ifferent probles. We obtain these results by presenting explicit strategies for Presenter that force any Algorith strategy to use any colors while the presente graph, or set of intervals, is colorable with a saller nuber of colors. We say that a strategy for Presenter in an on-line coloring proble is transparent if after each tie Algorith assigns a color to a vertex, or interval, Presenter colors the vertex with his own color an reveals that color to Algorith. The coloring constructe by Presenter ust satisfy the sae conitions as the coloring constructe by Algorith. The nuber of colors use by a transparent strategy for Presenter gives an upper boun on the iniu nuber of colors that can be use in a coloring. 2
3 1.1. Previous work. There is a siple strategy for Presenter in on-line graph coloring gae that forces Algorith to use any nuber of colors while the constructe graph is 2-colorable. Thus, the copetitive ratio for this proble is unboune. Nevertheless, it is an interesting question what is the copetitive ratio when the on-line gae is playe only for at ost n rouns. Hallórsson an Szegey [4] presente a transparent strategy for Presenter that forces Algorith to use at least 2 n (1+o(1)) ifferent colors in n rouns of the gae while the constructe logn ( graph is logn(1+o(1))-colorable. The best known upper boun of O n log n the copetitive ratio for the n-roun on-line graph coloring proble was given by Lovasz, Saks an Trotter [6]. The copetitive ratio for the on-line interval coloring proble was establishe by Kierstea an Trotter [5]. They constructe a strategy for Algorith that uses at ost 3ω 2 colors while the clique size of the constructe graph is ω. They also presente a atching lower boun a strategy for Presenter that forces Algorith to use at least 3ω 2 colors. Unit variant of the on-line interval coloring proble was stuie by Epstein an Levy [2]. They presente a strategy for Presenter that forces Algorith to use at least 3ω 2 colors while the clique size of the constructe graph is ω. Moreover, they showe that First-Fit algorith uses at ost 2ω 1 colors. Epstein an Levy [3] introuce any variants of the on-line interval coloring proble. The best known lower boun on the copetitive ratio for the on-line (k,) interval coloring is 3 for sall k an 24 for large k. For unit 7 variant of this proble the best known lower boun is 3. 2 Hallórsson an Szegey ieas were aopte by Azar et al. [1] to show lower bouns on copetitive ratio for on-line -vector bin packing. This proble is equivalent to a variant of -iensional on-line interval coloring where all presente intervals are the interval [0, 1] with ifferent vectors of weights. Their strategy for Presenter shows that the copetitive ratio for the on-line -iensional unit interval coloring proble is at least 2 (1+o(1)). log Our results. We generalize Hallórsson an Szegey [4] strategy into the setting of the k-boune coloring, an using the technique siilar to the one by Azar et al. [1] we aopt it to the on-line (k,) interval coloring proble. We present how to cobine this technique with classical results by Kierstea an Trotter [5], an by Epstein an Levy [2, 3] to obtain a new lower boun of 5 log( +log)(1+o(1)) on the copetitive ratio for the on-line (k,) interval coloring, an a lower boun of 5 k 2 +log)(1+o(1)) for unit variant of this proble. log( k 2. Graph coloring Theore 1. For every n 2 an k N +, there is a transparent strategy for n Presenter that forces Algorith to use at least 2 ifferent colors in the n- logn+3 roun, k-boune on-line graph coloring gae an uses n +logn+3 colors. k 3 ) on
4 Proof. Let b = logn +3. The state of a k-boune on-line graph coloring gae is represente by a progress atrix M. Each cell M[i,j] is either epty or it contains exactly one vertex. At the beginning of the gae, all cells are epty. A vertex in M[i,j] is colore by Algorith with color j an by Presenter with color i. Each player can use a single color γ to color at ost k vertices, so there are at ost k vertices in any colun, an in any row of the progress atrix. We say that a row with k vertices is eplete. Presenter can no longer use colors corresponing to eplete rows. Presenter aintains a set of exactly b active rows, enote A, that contains all nonepty non-eplete rows an aitionally soe epty rows ({i : 1 j M[i,j] < k} A an A = b). At the beginning of the gae there are no eplete rows an A = {1,...,b}. When soe row becoes eplete then it is reove fro A an a new epty row is ae to A. A pattern is a subset of rows. We say that a pattern p represents a colun j if i : i p M[i,j]. A pattern p is active if it is a nonepty subset of A such that p b 2. An active pattern p is present in M if at least one colun of M is represente by p v 1 v 3 v 5 v 7 2 v 2 v 10 v 12 3 v 15 v 4 v 9 v 13 4 v 6 v 11 5 v 8 v Table 1. Exaple of a progress atrix after 15 rouns Table 1 shows a possible state of the progress atrix M after 15 rouns of the 4-boune on-line graph coloring gae with n = 4 an b = 4. In this exaple, the last introuce vertex v 15 is colore by Algorith with color 2 an by Presenter withcolor3. Rows1an3areepleteanthesetofactiverowsisA = {2,4,5,6}. There are10 ifferent active patterns, but only2of the arepresent inm: pattern {2,5} in colun 6, an pattern {5} in colun 9. The transparent strategy for Presenter for roun t is as follows: (1) Choose an active pattern p t that is not present in M. (2) Introuceanewvertexv t thatisajacenttoallverticescolorebypresenter with colors not in p t. (3) Algorith colors v t with color γ. (4) Color v t with any color such that p t an M[,γ] =. We clai that Presenter can follow this strategy as long as there is an active pattern not present in the progress atrix. To prove that, we nee to show that in 4
5 step (4) Presenter always can choose an appropriate color, an that the coloring constructe by Presenter is a k-boune coloring of the constructe graph. Let q be a pattern that represents colun M[,γ] of the progress atrix before roun t. We clai that q p t. Assue to the contrary that i q p t. It follows, that there is a vertex v in cell M[i,γ] an by rule (2) v is ajacent to v t. Thus, Algorith cannot color vertex v t with color γ. Pattern q is present in M before roun t an by rule (1) pattern p t is not present in M before roun t. It follows that q is a strict subset of p t an Presenter has at least one choice for color in step (4). When Presenter assigns color to vertex v t, we have that p t ; p t is an active pattern; is an active row, an there are less than k vertices colore by Presenter with. Rule (2) asserts that none of the vertices ajacent to v t is colore with any of the colors in p t. Thus, we have that Presenter can follow the strategy as long as there is a choice of an appropriate pattern in step (1). ( b ) clai that the gae can be playe for at least n rouns. Inee, there are xwe ifferent patterns of size x an each one of the ust represent a colun of the progress atrix with exactly x vertices. Thus, when all active patterns represent soe colun of the progress atrix, the gae has been playe for at least 1 x 2 x( b x) n rouns. b After n rouns, Presenter use colors corresponing to eplete an active rows. There are at ost n k eplete rows an exactly logn + 3 active rows. Thus, Presenter uses at ost n +logn+3 colors in the first n rouns. k Let q j be a pattern representing colun M[,j] after n rouns. Let t be the last roun when a vertex was ae to colun j. We have that q j is a subset of pattern p t which was an active pattern before roun t, an the size of q j is at ost b 2. Thus, there are at least 2 n nonepty coluns after n rouns. logn+3 For fixe paraeters n an k, enote a generalize Hallórsson an Szegey strategy by HS k,n. Note that for k = +, there are no eplete rows in atrix M an k-boune coloring is siply a proper coloring. In this case we get the original Hallórsson an Szegey result for the on-line graph coloring proble. Theore 2 (Hallórsson, Szegey [4]). For every integer n 2, there is a transparent strategy for Presenter that forces Algorith to use at least 2 colors in n logn+3 the n-roun on-line graph coloring gae an uses logn+3 colors. 3. Interval coloring In the proof of the following theore, we use strategy HS k, to show a lower boun on the copetitive ratio for the on-line (k, ) interval coloring proble. Theore 3. For every 2 an k, N +, there is a strategy for Presenter that forces Algorith to use at least (5 3) ifferent colors in the on-line (k,) log+3 5
6 interval coloring gae while the constructe set of intervals is ( k +log+3) - colorable. Proof. For any fixe paraeters k N +, 2, L < R, ε (0, 1 ) we escribe an auxiliary strategy HS k, (ε,l,r). Let α = 1 1ε, δ = 1 ε. In the t-th roun of the 2 2 on-line (k,) interval coloring gae, Presenter uses HS k, strategy to get a new vertexv t. Then, presentsaninterval[l,r]withweightsw t,wherew t = (x 1,...,x ) is a -iensional vector with x t = α, x i = ε for all i < t such that v i is ajacent to v t, an x i = δ in every other coorinate. Figure 1 shows an exaple of w 6 for a vertex v 6 that is ajacent to v 2 an v 5. α ε ε δ δ δ δ δ δ Figure 1. Encoing of v 6 in a -iensional vector of weights ([L,R],w t ) is colore by Algorith with color γ t. Then, γ t is forware to HS k, as the color of v t. HS k, colors v t with t, but Presenter iscars that inforation. See Figure 2 for a iagra of the strategy HS k, (ε,l,r), an Figure 3 for an exaple encoing of a graph. Algorith [L,R],w t encoe γ t v t t HS k, Figure 2. Encoing of HS k, strategy We clai that the encoing strategy ensures that any intervals I i an I j can get the sae color iff vertices v i an v j are not ajacent. First, assue that i < j an v i is ajacent to v j. Vector w i has α in the i-th coorinate, vector w j has ε in the i-th coorinate, an α + ε > 1. Thus, intervals I i an I j ust be colore with ifferent colors. Let J {I 1,...,I t 1 } be the set of intervals colore with γ before roun t. Assue that v t is not ajacent to any of the vertices in J. Denote the l-th coorinate of the su of vectors of weights of intervals in J by W l. For any 1 l, if I l J then W l = α+δ( J 1) < 1 δ. In this case we have that v t is not ajacent to v l, an that the l-th coorinate of the vector of weights 6
7 of v t is δ. If I l / J then W l ε J < 1 ε. For l = t, we have W l δ J 1 α. Thus, the su of vector of weights of the intervals in the set J {I t } oes not excee 1 in any coorinate an I t can be colore with γ. w 1 α δ δ δ δ δ v 4 w 2 ε α δ δ δ δ w v 1 v 3 v 3 δ ε α δ δ δ 6 w 4 ε δ ε α δ δ v 2 v w 5 δ ε ε δ α δ 5 w 6 δ δ δ ε ε α Figure 3. Exaple of a graph an vectors of weights corresponing to the vertices Consier a sequence of paraeters {ε i } i N+ efine as ε i := ( 1 2) i. See that for every i N + we have ε i (0, 1 ) an we can use HS k,(ε i,l,r) strategy. Let α i = ε i an δ i = 1 2 ε i = ε i+1. Let J i be a set of intervals constructe by HS k, (ε i,l i,r i ) strategy an J j be a set of intervals constructe by HS k, (ε j,l j,r j ) strategy. Assue that i < j, [L i,r i ] [L j,r j ] an that the construction of J i is finishe before the construction of J j starts. Any interval I J j has weight α j in one of the coorinates an every interval in J i has weight either α i,ε i or δ i in that coorinate. In any case, su of those weights excees 1 an no two intervals, one in J i, other in J j can be colore with the sae color. The rest of the proof uses a technique siilar to the one by Kierstea an Trotter [5]. For N +, let c = (5 3) log+3, an o = ( k +log+3). By inuction on, we show a strategy S for Presenter such that: all introuce intervals are containe in a fixe region [A, B]; all intervals coe fro calls of strategies HS k, (ε,l,r) with ε in {ε 1,...,ε 3 }; Algorith uses at least c ifferent colors; constructe set ofintervals iso -colorable. For = 1anafixe region [A,B], Presenter uses strategy HS k, (ε 1,A,B). This strategy forces Algorith to use at least c 1 ifferent colors, an the constructe set of intervals is o 1 -colorable. Thus, in this case we are one. Let c = 3 ( c +1 c ) + 1. Presenter splits the fixe region [A,B] into c isjoint regions [l 1,r 1 ],...,[l c,r c ]. By inuction, in each region Presenter can use strategy S inepenently. As a result, in each region [l i,r i ], we get a set of intervals J i. If uring the construction Algorith uses at least c +1 colors, we are one. Otherwise, let C i be a c -eleent subset of colors use by Algorith to color J i. Soe c -eleent set of colors C appears on the list (C 1,...,C c ) at least 4 ties. Let a,b,c, {1,..., c}, a < b < c < be inices such that C a = C b = C c = C = C. Define p i = 1 2 (r i +l i+1 ) for i = a,b,c. Presenter uses strategy HS k, (ε 3+1,l a,p a ) to get a set of intervals K 1 an then strategy HS k, (ε 3+1, rc+pc 2,r ) to get a set of intervals K 2. Let D 1 be a c 1 -eleent 7
8 subset of colors use by Algorith to color K 1, an D 2 be a c 1 -eleent subset of colors use to color K 2. The construction of J a an J is finishe before the construction [ of K 1 an K 2 starte an region [l a,p a ] covers [l a,r a ], an region rc+p c ],r 2 covers [l,r ]. Thus, none of the colors in C can be use to color any interval in K 1 or K 2. Now, the strategy splits into two cases: we either have D 1 D 2 1c 2 1 or D 1 D 2 > 1c 2 1. Case 1. D 1 D 2 1c 2 1. Presenter uses strategy HS k, (ε 3+2, ra+pa,p 2 c ) to get a set of intervals K 3. Let D 3 be the set of colors use to color K 3. See Figure 4 for a iagra of the construction. Region [ r a+p a ],p 2 c covers [lb,r b ] an we get C D 3 =. Moreover, any interval in K 3 intersects any interval in K 1, an any interval in K 2. Thus, D 3 D 1 =, D 3 D 2 =, an Algorith uses at least C D 1 D 2 D 3 c + c c c 1 = c +1 colors. Each set of intervals J 1,...,J c intersects with intervals in at ost one of the sets K 1, K 2, or K 3. Thus, all presente intervals can be colore with ax{2, + 1}( + log + 3) = o k +1 colors an in this case we are one. l a r a p a p b C a C b C c C l b r b l c r c l r D 1 D 2 D 3 p c Figure 4. Construction in case D 1 D c 1 Case 2. D 1 D 2 > 1 c 2 1. Presenter uses strategy HS k, (ε 3+2, r b+p b,p 2 c ) to get a set of intervals K 4 an then strategy HS k, (ε 3+3, ra+pa,p 2 b ) to get K 5. Let D 4 be a c 1 -eleent subset of colors use by Algorith to color K 4, an D 5 be the set of colors use to color K 5. See Figure 5 for a iagra of the construction. Siilar arguent as in the previous case gives C D 4 =, C D 5 =, D 2 D 4 =, D 1 D 5 =,and 4 D 5 =. SetD 2 containsatleast 1c 2 1 eleentsfrothesetd 1. Thus, we have D 4 D 1 1c 2 1. Algorith uses at least C D 1 D 4 D 5 c +c c c 1 = c +1 colors. Each set of intervals J 1,...,J c intersects with intervals in at ost one of the sets K 1, K 2, K 4, or K 5. Thus, all intervals can be colore with ax{2,+1}( +log+3) = o k +1 colors. l a r a p a p b C a C b C c C l b r b l c r c l r D 1 D 2 D 5 D 4 p c Figure 5. Construction in case D 1 D c 1 8
9 4. Unit interval coloring Theore 4. For every 2 an k, N +, there is a strategy for Presenter that forces Algorith to use at least 5 ifferent colors in the on-line (k,) unit 2 log+3 interval coloring gae while the constructe set of intervals is ( +log+3) - k colorable. Proof. The proof cobines strategy HS k, (ε,l,r) introuce in the proof of Theore 3 with technique siilar to the one by Epstein an Levy [2, 3]. Assue that the sequence of encoing paraeters {ε i } i N+ is efine the sae way as in the proof of Theore 3. The strategy consists of 3 phases. In the initial phase Presenter uses strategy HS k, (ε i,0,1) for i = 1,..., 2 sequentially. There is a coloring of all intervals introuce in the initial phase using ( +log+3) colors, but Algorith uses 2 k at least 2 colors. Let C 2 log+3 init be a 2 -eleent subset of colors use 2 log+3 by Algorith in the initial phase. For L < R < L + 1, let Sep(L,R) be the separation strategy that introuces unit intervals in the following way. Initialize l = L, an r = R. To get next interval, calculate p = 1 (l +r) an introuce interval I = [p,p+1]. If Algorith 2 colors I with color in C init, then upate r = p. Otherwise, ark interval I an upate l = p. Observe that to the left of p there are only left enpoints of arke intervals. Moreover, all introuce intervals have nonepty intersection. The separation phase consists of 2 2 subphases. We fix L1 = 3 an R 2 1 = 2. For i = 2,...,2 2, points Li an R i are establishe after the (i 1)-th subphase. Denote by Sub i, the strategy for the i-th subphase being a cobination of the HS k, (ε i,0,1) strategy an the Sep(L i,r i ) strategy. Strategy Sub i introuces intervals. The position of each interval is eterine using Sep(L i,r i ) strategy, an the -iensional vector of weights associate with each interval is eterine accoring to HS k, (ε i,0,1). See Figure 6 for a iagra of the strategy Sub i. At the en of each subphase, Presenter ecies whether the subphase is arke or not. The set of arke subphases is enote by M. Let C i be the set of colors use by Algorith in the i-th subphase an not present in the set C init. Subphase i is arke if an only if one of the following conitions hols: (1) the nuber of reaining subphases incluing the i-th is 2 M. (2) C i an M < log+3 2, Observe that at the en of the separation phase we have exactly 2 arke subphases. 9
10 Algorith I t,w t γt cobine I t γ t [0,1],w t Sep(Li, Ri) HSk,(εi, 0, 1) Figure 6. Strategy Sub i for a single subphase Let L be the left enpoint of the leftost interval introuce in the i-th subphase. Let L be the left enpoint of the rightost interval introuce in the i-th subphase an colore by Algorith with a color c / C init. Set L = L i if such an interval oes not exist. Let R be the left enpoint of the leftost interval introuce in the i-th subphase an colore by Algorith with a color c C init. Set R = R i if such an interval oes not exist. If subphase i is arke then L i+1 = L an R i+1 = R. Otherwise, L i+1 = L i an R i+1 = L. This copletes the efinition of the separation phase. Let = 2 2 an P = 1 (L R +1). Observe that every interval introuce in the separation phase with the left enpoint to the left of P belongs to a arke subphase an is colore with a color c / C init. Let C sep be the set of colors use in the separation phase to color intervals with the left enpoint to the left of P. 2 In each subphase Algorith uses at least ifferent colors, so in the separation phase Algorith uses at least 2 log+3 2 colors in total. Because C 2 log+3 init = 2, Algorith, in the separation phase, uses at least 2 colors not 2 log+3 2 log+3 in C init. The set of arke subphases M contains x subphases in which Algorith use at least such colors an log+3 2 x last subphases. Fro the first 2 +x subphases only x subphases are arke. By the efinition, in an unarke subphase i for i 2 +x, Algorith uses less than colors not in C log+3 init. Thus, at ost such colors fro subphases 1 up to 2 log+3 2 +x are not in the set C sep. All colors not in C init use in the subphase i for i > 2 +x are in the set C sep. Thus, C sep. 2 log+3 In the final phase, Presenter uses strategy HS k, (ε i,p 1,P) for i = + 1,...,+ 2 sequentially. Every interval introuce in the final phase intersects with every interval fro the initial phase an every interval fro the separation phase with the left enpoint to the left of P. Thus, each color use in the final phase belongs neither to C init nor to C sep. In the final phase, Algorith uses at least 2 2 log+3 colors. 10
11 In total, Algorith uses at least ( ) = 5 ifferent colors. On the other han, the presente set of intervals can be easily colore 2 log+3 2 log+3 using ( 2 + )( ) ( 2 k +log+3 = ) k +log+3 colors. Notethatfork = +, thestrategyhs, becoes inepenent ofk-carinality constraint. This gives two new bouns on the copetitive ratio for on-line - iensional interval coloring probles. Theore 5. For every 2 an n N +, there is a strategy for Presenter that forces Algorith to use at least (5 3) ifferent colors in the online -iensional interval coloring gae while the constructe set of intervals is log+3 (log+3)-colorable. Theore 6. For every 2 an n N +, there is a strategy for Presenter that forces Algorith to use at least 5 ifferent colors in the on-line - 2 log+3 iensional unit interval coloring gae while the constructe set of intervals is (log+3)-colorable. References [1] Yossi Azar, Ilan Reuven Cohen, Seny Kaara, an Bruce Shepher. Tight bouns for online vector bin packing. In STOC 2013: 45th Annual ACM Syposiu on Theory of Coputing, Palo Alto, CA, USA, June Proceeings, pages , [2] Leah Epstein an Meital Levy. Online interval coloring an variants. In ICALP 2005: 32n International Colloqui on Autoata, Languages an Prograing, Lisbon, Portugal, July Proceeings, volue 3580 of Lecture Notes in Coputer Science, pages , [3] Leah Epstein an Meital Levy. Online interval coloring with packing constraints. In MFCS 2005: 30th International Syposiu on Matheatical Founations of Coputer Science, Gańsk, Polan, August Proceeings, volue 3618 of Lecture Notes in Coputer Science, pages , [4] Magnús M. Hallórsson an Mario Szegey. Lower bouns for on-line graph coloring. Theoretical Coputer Science, 130(1): , [5] Henry A. Kierstea an Willia T. Trotter. An extreal proble in recursive cobinatorics. In 12th Southeastern Conference on Cobinatorics, Graph Theory an Coputing, Baton Rouge, LA, USA, March Proceeings, vol. II, volue 33 of Congressus Nuerantiu, pages , [6] Laszlo Lovasz, Michael Saks, an W.T. Trotter. An on-line graph coloring algorith with sublinear perforance ratio. Discrete Matheatics, 75(1): , Theoretical Coputer Science Departent,, Faculty of Matheatics an Coputer Science,, Jagiellonian University, Kraków, Polan E-ail aress: {gutowski,ikos}@tcs.uj.eu.pl 11
λ-harmonious Graph Colouring Lauren DeDieu
λ-haronious Graph Colouring Lauren DeDieu June 12, 2012 ABSTRACT In 198, Hopcroft and Krishnaoorthy defined a new type of graph colouring called haronious colouring. Haronious colouring is a proper vertex
More informationGromov-Hausdorff Distance Between Metric Graphs
Groov-Hausdorff Distance Between Metric Graphs Jiwon Choi St Mark s School January, 019 Abstract In this paper we study the Groov-Hausdorff distance between two etric graphs We copute the precise value
More informationFair Resource Allocation for Heterogeneous Tasks
Fair Resource Allocation for Heterogeneous Tasks Koyel Mukherjee, Partha utta, Gurulingesh Raravi, Thangaraj Balasubraania, Koustuv asgupta, Atul Singh Xerox Research Center India, Bangalore, India 560105
More informationWAVE OPTICS. Conceptual Questions Because ym
WAVE OPTICS Conceptual Questions.. The initial light pattern is a ouble-slit interference pattern. It is centere behin the ipoint of the slits. The slight ecrease in intensity going outwar fro the ile
More informationOblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands
Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu
More informationGeometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem.
Noveber 13, 2016 Geoetry. The Method of the enter of Mass (ass points): Solving probles using the Law of Lever (ass points). Menelaus theore. Pappus theore. M d Theore (Law of Lever). Masses (weights)
More informationCS 361 Meeting 8 9/24/18
CS 36 Meeting 8 9/4/8 Announceents. Hoework 3 due Friday. Review. The closure properties of regular languages provide a way to describe regular languages by building the out of sipler regular languages
More informationTheoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem
Theoretical Analysis of Local Search and Siple Evolutionary Algoriths for the Generalized Travelling Salesperson Proble Mojgan Pourhassan ojgan.pourhassan@adelaide.edu.au Optiisation and Logistics, The
More informationL Destructive interference:
SPH3UW/SPH4UI Unit 9.3 Interference of Light in Two Diensions Page 1 of 11 Notes Physics Tool box A pair of ientical point sources operating in phase prouces a syetrical pattern of constructive an estructive
More informationStructural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.
Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable
More informationThe Internal Conflict of a Belief Function
The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of
More informationArtifacts Reduction in Image Rendering of the Focused Plenoptic Camera Peng Liu 1, Rumin Zhang 2
International Conference on Intelligent Systes Research an Mechatronics Engineering (ISRME 2015) Artifacts Reuction in Iage Renering of the Focuse Plenoptic Caera Peng Liu 1, Ruin Zhang 2 School of Electronic
More informationThe Unit Bar Visibility Number of a Graph
The Unit Bar Visibility Nuber of a Graph Eily Gaub 1,4, Michelle Rose 2,4, and Paul S. Wenger,4 August 20, 2015 Abstract A t-unit-bar representation of a graph G is an assignent of sets of at ost t horizontal
More informationEfficient Estimation of Inclusion Coefficient using HyperLogLog Sketches
Efficient Estiation of Inclusion Coefficient using HyperLogLog Sketches Azade Nazi, Bolin Ding, Vivek Narasayya, Surajit Chaudhuri Microsoft Research {aznazi, bolind, viveknar, surajitc}@icrosoft.co ABSTRACT
More informationarxiv: v1 [math.co] 15 Dec 2017
Rectilinear Crossings in Complete Balance -Partite -Uniform Hypergraphs Rahul Gangopahyay Saswata Shannigrahi arxiv:171.05539v1 [math.co] 15 Dec 017 December 18, 017 Abstract In this paper, we stuy the
More informationShortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm
International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University
More informationABC: Analyzing Loop Bounds and Complexities
ABC: Analyzing Loop Bouns an Coplexities Régis Blanc, Thoas A. Henzinger, Thibau Hottelier, an Laura Kovács EPFL, Switzerlan Abstract. We present ABC, a software tool for autoatically coputing sybolic
More informationComputer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13
Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical
More informationConstruction of a regular hendecagon by two-fold origami
J. C. LUCERO /207 Construction of a regular hendecagon by two-fold origai Jorge C. Lucero 1 Introduction Single-fold origai refers to geoetric constructions on a sheet of paper by perforing a sequence
More informationAN ATTRIBUTE DRIVEN APPROACH FOR IMAGE REGISTRATION USING ROAD NETWORKS
AN ATTRIBUTE DRIVEN APPROACH FOR IMAGE REGISTRATION USING ROAD NETWORKS Caixia Wang, Peggy Agouris, Anthony Stefaniis Center for Earth Observing an Space Research Departent of Earth Systes an Geoinforation
More informationA Novel Fast Constructive Algorithm for Neural Classifier
A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore
More informationClustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering
Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into
More informationP NP. Approximation Algorithms. Computational hardness. Vertex cover. Vertex cover. Vertex cover. Plan: Vertex Cover Metric TSP 3SAT
Great Theoretical Ideas In Coputer Science Victor Adachi CS - Carnegie Mellon University Approxiation Algoriths P NP Plan: Vertex Cover 3SAT Coputational hardness Suppose we are given an NP-coplete proble
More informationAnalysing Real-Time Communications: Controller Area Network (CAN) *
Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination
More informationRanking Spatial Data by Quality Preferences
1 Ranking Spatial Data by Quality Preferences Man Lung Yiu, Hua Lu, Nikos Maoulis, and Michail Vaitis Abstract A spatial preference query ranks objects based on the qualities of features in their spatial
More informationOptimal Oblivious Path Selection on the Mesh
Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract
More informationDesign and Implementation of an Acyclic Stable Matching Scheduler
Design and Ipleentation of an Acyclic Stable Matching Scheduler Enyue Lu Mei Yang Yi Zhang ands.q.zheng Dept. of Coputer Science Dept. of Coputer Science Dept. of Electrical Engineering University of Texas
More informationOptimal Route Queries with Arbitrary Order Constraints
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL.?, NO.?,? 20?? 1 Optial Route Queries with Arbitrary Order Constraints Jing Li, Yin Yang, Nikos Maoulis Abstract Given a set of spatial points DS,
More informationReconstruction of Time Series using Optimal Ordering of ICA Components
Reconstruction of Tie Series using Optial Ordering of ICA Coponents Ar Goneid and Abear Kael Departent of Coputer Science & Engineering, The Aerican University in Cairo, Cairo, Egypt e-ail: goneid@aucegypt.edu
More information1 Extended Boolean Model
1 EXTENDED BOOLEAN MODEL It has been well-known that the Boolean odel is too inflexible, requiring skilful use of Boolean operators to obtain good results. On the other hand, the vector space odel is flexible
More informationA Trajectory Splitting Model for Efficient Spatio-Temporal Indexing
A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada
More information3 Conference on Inforation Sciences and Systes, The Johns Hopkins University, March, 3 Sensitivity Characteristics of Cross-Correlation Distance Metric and Model Function F. Porikli Mitsubishi Electric
More informationOPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS
Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented
More informationGuillotine subdivisions approximate polygonal subdivisions: Part III { Faster polynomial-time approximation schemes for
Guillotine subdivisions approxiate polygonal subdivisions: Part III { Faster polynoial-tie approxiation schees for geoetric network optiization Joseph S. B. Mitchell y April 19, 1997; Last revision: May
More informationDetection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm
Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,
More informationLearning convex bodies is hard
Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples
More informationA simplified approach to merging partial plane images
A siplified approach to erging partial plane iages Mária Kruláková 1 This paper introduces a ethod of iage recognition based on the gradual generating and analysis of data structure consisting of the 2D
More informationThe optimization design of microphone array layout for wideband noise sources
PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun
More informationData Caching for Enhancing Anonymity
Data Caching for Enhancing Anonyity Rajiv Bagai and Bin Tang Departent of Electrical Engineering and Coputer Science Wichita State University Wichita, Kansas 67260 0083, USA Eail: {rajiv.bagai, bin.tang}@wichita.edu
More informationScheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We
More informationA Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network
A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University
More informationEE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011
EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction
More information6.1 Topological relations between two simple geometric objects
Chapter 5 proposed a spatial odel to represent the spatial extent of objects in urban areas. The purpose of the odel, as was clarified in Chapter 3, is ultifunctional, i.e. it has to be capable of supplying
More informationEfficient Learning of Generalized Linear and Single Index Models with Isotonic Regression
Efficient Learning of Generalized Linear and Single Index Models with Isotonic Regression Sha M. Kakade Microsoft Research and Wharton, U Penn skakade@icrosoft.co Varun Kanade SEAS, Harvard University
More informationVisual Analysis of Vehicle Voice Navigation with Parallel Coordinates
Visual Analysis of Vehicle Voice Navigation with Parallel Coorinates Miao Wang Nanyang Institute of Technology. Henan. China Corresponing E-ail:Wang@126.co Abstract - In the fiel of vehicle voice navigation,
More informationSolutions to Tutorial 1 (Week 8)
The University of Syney School of Mathematics an Statistics Solutions to Tutorial 1 (Week 8) MATH2069/2969: Discrete Mathematics an Graph Theory Semester 1, 2018 1. In each part, etermine whether the two
More informationData & Knowledge Engineering
Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID
More informationA 2-Chain Can Interlock With an Open 10-Chain
Sith ScholarWorks Coputer Science: Faculty Publications Coputer Science 8-19-2013 2-Chain Can Interlock With an Open 10-Chain in Lu California State University, Sacraento Joseph O'Rourke Sith College,
More informationMAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer
MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer Departent of Coputer Science and Engineering University of South Florida Tapa, FL 33620 Abstract -- The
More informationFair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones
Advance Access publication on 24 February 2017 The British Coputer Society 2017. All rights reserved. For Perissions, please eail: journals.perissions@oup.co doi:10.1093/cojnl/bxx015 Fair Energy-Efficient
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html
More informationGrid Minors in Damaged Grids
Grid Minors in Daaged Grids David Eppstein Departent of Coputer Science University of California, Irvine Irvine, California, U.S.A. eppstein@uci.edu Subitted: Nov 7, 2013; Accepted: Jul 24, 2014; Published:
More informationA Periodic Dynamic Load Balancing Method
2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation
More informationThe Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract
The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie
More informationA Study of the Relationship Between Support Vector Machine and Gabriel Graph
A Study of the Relationship Between Support Vector Machine and Gabriel Graph Wan Zhang and Irwin King {wzhang, king}@cse.cuhk.edu.hk Departent of Coputer Science & Engineering The Chinese University of
More informationAutomatic Graph Drawing Algorithms
Autoatic Graph Drawing Algoriths Susan Si sisuz@turing.utoronto.ca Deceber 7, 996. Ebeddings of graphs have been of interest to theoreticians for soe tie, in particular those of planar graphs and graphs
More informationRecognition and Rejection Performance in Wordspotting Systems Using Support Vector Machines
Recognition an Rejection Perforance in Worspotting Systes Using Support Vector Machines Yassine Ben Aye, Doinique Fohr, Jean Paul Haton, Gérar Chollet ENST, CNRS-LTCI, 46 rue Barrault, F75634 Paris ceex
More informationApproximate String Matching with Reduced Alphabet
Approxiate String Matching with Reduced Alphabet Leena Salela 1 and Jora Tarhio 2 1 University of Helsinki, Departent of Coputer Science leena.salela@cs.helsinki.fi 2 Aalto University Deptartent of Coputer
More informationMGS-SIFT: A New Illumination Invariant Feature Based on SIFT Descriptor
International Journal of Coputer Theory and Engineering, Vol 5, No, February 0 MGS-SIFT: A New Illuination Invariant Feature Based on SIFT Descriptor Reza Javanard Alitappeh and Fariborz Mahoudi Abstract
More informationGeo-activity Recommendations by using Improved Feature Combination
Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,
More informationarxiv: v2 [math.co] 5 Jun 2018
Some useful lemmas on the ege Szege inex arxiv:1805.06578v [math.co] 5 Jun 018 Shengjie He 1 1. Department of Mathematics, Beijing Jiaotong University, Beijing, 100044, China Abstract The ege Szege inex
More informationMATRIX CALCULATION BACKWARD CHAINING IN RULE BASED EXPERT SYSTEM
4 th Research/Expert Conference with International Participation QUAITY 5, Fojnica, B&H, Noveber 9 -, 5 ATRIX CACUATION BACKWARD CHAINING IN RUE BASED EXPERT SYSTE sc aro Hell Universit of Split, Facult
More informationThe Application of Bandwidth Optimization Technique in SLA Negotiation Process
The Application of Bandwidth Optiization Technique in SLA egotiation Process Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia
More informationA Learning Framework for Nearest Neighbor Search
A Learning Fraework for Nearest Neighbor Search Lawrence Cayton Departent of Coputer Science University of California, San Diego lcayton@cs.ucsd.edu Sanjoy Dasgupta Departent of Coputer Science University
More informationReal-Time Detection of Invisible Spreaders
Real-Tie Detection of Invisible Spreaders MyungKeun Yoon Shigang Chen Departent of Coputer & Inforation Science & Engineering University of Florida, Gainesville, FL 3, USA {yoon, sgchen}@cise.ufl.edu Abstract
More informationEvaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds
Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles
More informationInvestigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks
Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,
More informationPrivacy-preserving String-Matching With PRAM Algorithms
Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,
More informationRegular and Irreguar m-polar Fuzzy Graphs
Global Journal of Matheatical Sciences: Theory and Practical. ISSN 0974-300 Volue 9, Nuber 07, pp. 39-5 International Research Publication House http://www.irphouse.co Regular and Irreguar -polar Fuzzy
More informationPolynomial-Time Isomorphism of 1-L-Complete Sets
journal of coputer and syste sciences 53, 155160 (1996) article no. 0057 Polynoial-Tie Isoorphis of 1-L-Coplete Sets anindra Agrawal* and Soenath Biswas - epartent of Coputer Science and Engineering, Indian
More informationHomework 1. An Introduction to Neural Networks
Hoework An Introduction to Neural Networks -785: Introduction to Deep Learning Spring 09 OUT: January 4, 09 DUE: February 6, 09, :59 PM Start Here Collaboration policy: You are expected to coply with the
More informationKeyword Search in Spatial Databases: Towards Searching by Document
IEEE International Conference on Data Engineering Keyword Search in Spatial Databases: Towards Searching by Docuent Dongxiang Zhang #1, Yeow Meng Chee 2, Anirban Mondal 3, Anthony K. H. Tung #4, Masaru
More informationNON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH
NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH V. Atienza; J.M. Valiente and G. Andreu Departaento de Ingeniería de Sisteas, Coputadores y Autoática Universidad Politécnica de Valencia.
More informationA Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem
IE Vol. 7, No. 2, pp. 84-92, Septeber 2008. A Coparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Proble Ji Ung Sun School of Industrial and Managent Engineering Hankuk University
More informationSurvivability Function A Measure of Disaster-Based Routing Performance
Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected
More informationAn Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks
An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San
More informationINSERTION SORT is O(n log n)
INSERTION SORT is On log n) Michael A. Bender Martín Farach-Colton Miguel A. Mosteiro Abstract Traditional INSERTION SORT runs in On 2 ) tie because each insertion takes On) tie. When people run INSERTION
More informationColorado School of Mines. Computer Vision. Professor William Hoff Dept of Electrical Engineering &Computer Science.
Professor Willia Hoff Dept of Electrical Engineering &Coputer Science http://inside.ines.edu/~whoff/ 1 Caera Calibration 2 Caera Calibration Needed for ost achine vision and photograetry tasks (object
More information@FMI c Kyung Moon Sa Co.
Annals of Fuzzy Matheatics and Inforatics Volue 1, No. 1, (January 2011), pp. 55-70 ISSN 2093-9310 http://www.afi.or.kr @FMI c Kyung Moon Sa Co. http://www.kyungoon.co Multi-granulation rough set: fro
More informationAscending order sort Descending order sort
Scalable Binary Sorting Architecture Based on Rank Ordering With Linear Area-Tie Coplexity. Hatrnaz and Y. Leblebici Departent of Electrical and Coputer Engineering Worcester Polytechnic Institute Abstract
More informationQoS and Sensible Routing Decisions
QoS and Sensible Routing Decisions Erol Gelenbe Dept. of Electrical & Electronic Engineering Iperial College London SW7 2BT e.gelenbe@iperial.ac.uk Abstract Network Quality of Service (QoS) criteria of
More informationA CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER
A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER VIOLETA TOMAŠEVIĆ, SLOBODAN BOJANIĆ 2 and OCTAVIO NIETO-TALADRIZ 2 The Mihajlo Pupin Institute, Volgina 5, 000 Belgrade, SERBIA AND MONTENEGRO 2 Technical University
More informationContour is the shape or format of an object and can be either bi- or multidimensional. In
Contour Algoriths Review arcos da Silva Sapaio Universidade Federal da Bahia (UFBA) arcos@sapaio.e Pedro Kroger Universidade Federal da Bahia (UFBA) kroger@pedrokroger.net Abstract: In this paper, we present
More informationAn Integrated Processing Method for Multiple Large-scale Point-Clouds Captured from Different Viewpoints
519 An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured fro Different Viewpoints Yousuke Kawauchi 1, Shin Usuki, Kenjiro T. Miura 3, Hiroshi Masuda 4 and Ichiro Tanaka 5 1 Shizuoka
More informationOn the Computation and Application of Prototype Point Patterns
On the Coputation and Application of Prototype Point Patterns Katherine E. Tranbarger Freier 1 and Frederic Paik Schoenberg 2 Abstract This work addresses coputational probles related to the ipleentation
More informationHKBU Institutional Repository
Hong Kong Baptist University HKBU Institutional Repository HKBU Staff Publication 18 Towards why-not spatial keyword top-k ueries: A direction-aware approach Lei Chen Hong Kong Baptist University, psuanle@gail.co
More informationThe Henryk Niewodniczański INSTITUTE OF NUCLEAR PHYSICS Polish Academy of Sciences ul. Radzikowskiego 152, Kraków
The Henryk Niewodniczański INSTITUT OF NUCLAR PHYSICS Polish Acadey of Sciences ul. Radzikowskiego 152, 31-342 Kraków www.ifj.edu.pl/reports/2005.htl Kraków, October 2005 Report No. 1968/D The theroluinescence
More informationA GRAPH-PLANARIZATION ALGORITHM AND ITS APPLICATION TO RANDOM GRAPHS
A GRAPH-PLANARIZATION ALGORITHM AND ITS APPLICATION TO RANDOM GRAPHS T. Ozawa and H. Takahashi Departent of Electrical Engineering Faculty of Engineering, Kyoto University Kyoto, Japan 606 Abstract. In
More information2-connected graphs with small 2-connected dominating sets
2-connecte graphs with small 2-connecte ominating sets Yair Caro, Raphael Yuster 1 Department of Mathematics, University of Haifa at Oranim, Tivon 36006, Israel Abstract Let G be a 2-connecte graph. A
More informationEfficient and Strategyproof Spectrum Allocations in Multi-Channel Wireless Networks
Efficient and Strategyproof Spectru Allocations in Multi-Channel Wireless Networks Ping Xu, Xiang-Yang Li, Senior Meber, IEEE, ShaoJie Tang, and JiZhong Zhao Abstract In this paper, we study the spectru
More informationModeling Parallel Applications Performance on Heterogeneous Systems
Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln
More informationMAC schemes - Fixed-assignment schemes
MAC schees - Fixed-assignent schees M. Veeraraghavan, April 6, 04 Mediu Access Control (MAC) schees are echaniss for sharing a single link. MAC schees are essentially ultiplexing schees. For exaple, on
More informationMAXIMUM MATCHINGS IN COMPLETE MULTIPARTITE GRAPHS
Fura Uiversity Electroic Joural of Udergraduate Matheatics Volue 00, 1996 6-16 MAXIMUM MATCHINGS IN COMPLETE MULTIPARTITE GRAPHS DAVID SITTON Abstract. How ay edges ca there be i a axiu atchig i a coplete
More informationImage compression predicated on recurrent iterated function systems
2n International Conference on Mathematics & Statistics 16-19 June, 2008, Athens, Greece Image compression preicate on recurrent iterate function systems Chol-Hui Yun *, Metzler W. a an Barski M. a * Faculty
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science
More informationAffine Invariant Texture Analysis Based on Structural Properties 1
ACCV: The 5th Asian Conference on Coputer Vision, --5 January, Melbourne, Australia Affine Invariant Texture Analysis Based on tructural Properties Jianguo Zhang, Tieniu Tan National Laboratory of Pattern
More informationDefining and Surveying Wireless Link Virtualization and Wireless Network Virtualization
1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,
More informationResearch on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm
roceedings of the 7th International Conference on Innovation & Manageent 893 Research on a Kind of QoS-Sensitive Seantic Web Services Coposition Method Based on Genetic Algorith Cao Hongjiang, Nie Guihua,
More informationTensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3
2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition
More informationUsing Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses
International Journal of Industrial Engineering & Production Research Septeber 03, Volue 4, Nuber 3 pp. 9-35 ISSN: 008-4889 http://ijiepr.iust.ac.ir/ Using Iperialist Copetitive Algorith in Optiization
More information