A Note on Competitive Diffusion Through Social Networks

Size: px
Start display at page:

Download "A Note on Competitive Diffusion Through Social Networks"

Transcription

1 A Note on Compettve Dffuson Through Socal Networks Noga Alon Mchal Feldman Arel D. Procacca Moshe Tennenholtz Abstract We ntroduce a game-theoretc model of dffuson of technologes, advertsements, or nfluence through a socal network. The novelty n our model s that the players are nterested partes outsde the network. We study the relaton between the dameter of the network and the exstence of pure Nash equlbra n the game. In partcular, we show that f the dameter s at most two then an equlbrum exsts and can be found n polynomal tme, whereas f the dameter s greater than two then an equlbrum s not guaranteed to exst. Introducton Socal networks such as Facebook and Twtter are modern focal ponts of human nteracton. The pursut of nsghts nto the nature of ths nteracton calls for a game-theoretc analyss. Indeed, a number of papers (see, e.g., [5]) nvestgate varatons on the followng settng. The socal network s represented by an undrected graph, where the vertces are users and edges connect users who are n a socal relatonshp. Suppose, for example, that there are several competng applcatons, e.g., voce over IP systems, that are not nteroperable. The users play a coordnaton game, where f two neghbors adopt the same system they get some reward that s based on the nherent qualty of the system. The goal s to study the dffuson of technologes through the socal network. The pont of vew here s completely decentralzed, and the players n the game are the users of the socal network. We propose a dfferent, global pont of vew regardng the ncentves that govern the dffuson process. Suppose we have several frms that would lke to advertse competng products va vral marketng. Each frm ntally targets a small subset of users, n the hope that the rumor about ts product would spread throughout the network. However, a user that adopts one product s reluctant to adopt another, hence the campagn of one frm negatvely affects the success of another frm s campagn. To the best of our knowledge our model s the frst game-theoretc model to deal wth Mcrosoft Israel R&D Center, 3 Shenkar Street, Herzelya 46725, Israel, and Schools of Mathematcs and Computer Scence, Tel Avv Unversty, Tel Avv, 69978, Israel, Emal: nogaa@tau.ac.l. Research supported n part by a USA Israel BSF grant, by a grant from the Israel Scence Foundaton, by an ERC advanced grant and by the Hermann Mnkowsk Mnerva Center for Geometry at Tel Avv Unversty. Mcrosoft Israel R&D Center, 3 Shenkar Street, Herzelya 46725, Israel, and School of Busness Admnstraton and Center for the Study of Ratonalty, The Hebrew Unversty of Jerusalem, Jerusalem 9904, Israel. Emal: mfeldman@huj.ac.l School of Engneerng and Appled Scences, Harvard Unversty, 33 Oxford Street, Cambrdge, MA 0238, Unted States. Emal: arelpro@seas.harvard.edu. Ths work was done whle the author was at Mcrosoft Israel R&D Center. Mcrosoft Israel R&D Center, 3 Shenkar Street, Herzelya 46725, Israel, and Technon, IIT, Hafa 32000, Israel. Emal: moshet@mcrosoft.com

2 (a) Tme. (b) Tme 2. (c) Tme 3, the process termnates. Fgure : An llustraton of the dffuson process, wth N = {, 2}. the ncentves of nterested partes outsde the socal network. Note that some prevous papers dd consder the problem of choosng an nfluental set of users as an optmzaton problem (see, e.g., [6]), but not n a compettve game-theoretc settng. Other papers, whch deal wth Vorono games on graphs, provde a game-theoretc study of a faclty locaton problem that does not nvolve a dffuson process, where rather each vertex s assgned to the closest agent and the utlty of an agent s the number of vertces assgned to t (see, e.g., [3, 7]). The model. Let G = V, E be an undrected graph. Furthermore, let N = {,..., n} be the set of agents (the nterested partes). The dffuson process unfolds as follows. There are n + 2 colors: a color for each agent N, as well as two addtonal colors: whte and gray. Intally, at tme, some of the vertces are colored n the colors of N, whle the others are whte. At tme t + each whte vertex that has neghbors colored n color, but does not have neghbors colored n color j for any j N \ {}, s colored n color. A whte vertex that has two neghbors colored by two dstnct colors, j N s colored gray. In other words, we assume that f two agents compete for a user at the same tme they cancel out and the user s removed from the game. The process contnues untl t reaches a fxed pont, that s, all the remanng whte vertces are unreachable due to gray vertces. See Fgure for an llustraton of the dffuson process. A game Γ = G, N s nduced by a graph G, representng the underlyng socal network, and the set of agents N. The strategy space of each agent s the set of vertces V n the graph, that s, each agent selects a sngle node that s colored n color at tme. Note that f two or more agents select the same vertex at tme then that vertex becomes gray. A strategy profle s a vector x = x,..., x n V n, where x V s the ntal vertex selected by agent. We also denote x = x,..., x, x +,..., x n. Gven a strategy profle x V n, the utlty of agent N, denoted U (x), s the number of nodes that are colored n color when the dffuson process termnates. For nstance, n the example gven n Fgure the utlty of each of the agents s two. A strategy profle x s a (pure strategy) Nash equlbrum of the game Γ f an agent cannot beneft from unlaterally devatng to a dfferent strategy,.e., for every N and x V t holds that U (x, x ) U (x). Our results. Gven a graph G and u, v V, let d(u, v) be the length of the shortest path between u and v (n terms of the number of edges). The dameter of the graph, denoted D(G), s the maxmum dstance between a par of vertces, that s, D(G) = max u,v V d(u, v). Our nvestgaton focuses on the relaton between the dameter of the graph and the exstence of Nash equlbra n the nduced dffuson game. Indeed, f we can fnd a Nash equlbrum then we can often predct the behavor of the agents and the outcome of ths compettve dffuson process, or, alternatvely, advse the agents how to play. Our frst theorem s the followng. 2

3 Theorem 2.. Every game Γ = G, N where D(G) 2 admts a Nash equlbrum. Furthermore, an equlbrum can be found n polynomal tme. Note that a random graph on n labeled vertces where each edge appears wth probablty p, usually denoted G(n, p), has dameter at most two wth hgh probablty whenever p (c ln n)/n for c > 2 (see, e.g., [2] for more detals about the dameter of random graphs). In partcular (by takng p = /2) almost all graphs over n vertces have dameter at most two. Fnally, socal networks typcally have a very small dameter. Therefore, t can be argued that assumng a dameter of two s not very restrctve. It s now natural to ask whether the exstence of Nash equlbra can also be guaranteed for dameters larger than two. It s not too dffcult to construct a graph wth dameter four that does not admt an equlbrum. Our second theorem gves a negatve answer even wth respect to dameter three. Theorem 2.2. Let N = {, 2}. There exsts a graph G wth D(G) = 3 such that the game Γ = G, N does not admt a Nash equlbrum. The constructon n the proof of Theorem 2.2 can easly be extended to a larger number of agents or to any (fnte or nfnte) dameter greater than three. Dscusson. In order to facltate the game-theoretc analyss we consder a very smple model of dffuson. In partcular, conflcts are determnstcally resolved by ntroducng gray vertces, and each agent ntally selects just one vertex. Rcher (probablstc) models of dffuson through a socal network exst n the lterature, e.g., [6, 4]. On the other hand, the assumpton of dscrete tme steps s qute common. Theorem 2. mples that wth hgh probablty a random graph (even a relatvely sparse one) nduces a game that admts a Nash equlbrum. However, socal networks are normally not completely random, but rather often exhbt structure. Ideally one would be able to extend our result by showng that under a convncng random graph model of socal networks (see, e.g., [, 9]) the nduced game admts a Nash equlbrum wth hgh probablty. 2 Proofs We begn by provng Theorem 2.; we subsequently dscuss some mplcatons of the proof. Theorem 2.. Every game Γ = G, N where D(G) 2 admts a Nash equlbrum. Furthermore, an equlbrum can be found n polynomal tme. Proof. If D(G) then the graph s a clque and the theorem follows trvally. Therefore, we may assume that D(G) = 2. Gven a profle x V N, let P (x) = {, j : d(x, x j ) = }, that s, the number of pars wth dstance one from each other. Furthermore, denote the neghborhood of vertex u V by N u = {v : d(u, v) }, and let N(x) = n = N x. Consder the potental functon Φ(x) = N(x) n + P (x). It s suffcent to show that for every x V n, N, and x V, U (x, x ) > U (x) Φ(x, x ) > Φ(x). () 3

4 Indeed, gven Equaton () t clearly holds that any strategy profle x V n that maxmzes Φ(x) must be a Nash equlbrum. Moreover, n order to fnd one such profle we may start from some preference profle, and n each step attempt to fnd a proftable devaton for one of the agents. We termnate f there s no such devaton (whch, by defnton, means that we have found a Nash equlbrum). Ths algorthm termnates after a polynomal number of steps snce Φ(x) s bounded from above by n V + n 2 for every x, and by Equaton () every proftable devaton by an agent ncreases the value of the potental functon by at least one. We turn to provng Equaton (). If the dameter of the graph s two then vertces can only be colored by an agent N at tme or 2. Specfcally, the vertces colored by agent are roughly the vertces n the neghborhood of x that are not neghbors of x j for some j N \ {} (snce these vertces are ether gray or colored by j). Formally, defne A = {x : j N \ {} s.t. d(x, x j ) = }. Assumng that x x j for all j, the utlty of agent under the strategy profle x V n s U (x) = N x j (N x N xj ) + χ A (x), where χ A s the ndcator functon that returns f x A and 0 otherwse. The rghtmost term s requred snce even f x s a neghbor of some x j, t s stll colored by agent at tme, but s nevertheless ncluded n the mddle term. Now, suppose U (x, x ) > U (x). It follows that N x (N x N xj ) + χ A (x, x ) > N x x N xj ) + χ A (x). (2) j j (N Snce χ A s a Boolean functon, ths mples that N x (N x N xj ) N x x N xj ). (3) j j (N We dstngush between two cases. If Equaton (3) holds as a strct nequalty then N xj N x = N xj + N x (N x N xj ) > N xj + N x x N xj ) j j j j j (N = j N xj N x, whch mples that N(x, x ) N(x) +. In addton, a devaton of a sngle agent can decrease the number of adjacent pars of agents by at most n,.e., P (x, x ) > P (x) n. We conclude that Φ(x, x ) = N(x, x ) n+p (x, x ) N(x) n+n+p (x, x ) > N(x) n+n+p (x) n = Φ(x). Otherwse, Equaton (3) holds as an equalty, and hence N(x, x ) = N(x). It then follows from Equaton (2) that χ A (x, x ) > χ A (x). That s, agent has no neghbors among x under x but has at least one neghbor under x. Thus the number of neghbors of agent ncreases and 4

5 the number of neghbors of agents j N \ {} does not decrease,.e., P (x, x ) > P (x). We conclude that Φ(x, x ) = N(x, x ) n + P (x, x ) = N(x) n + P (x, x ) > N(x) n + P (x) = Φ(x). Ths establshes Equaton (), and hence completes the proof of the theorem. What the proof of Theorem 2. essentally shows s that when the dameter of the graph s two the dffuson game s a potental game [8]; specfcally, a functon that satsfes () s known as a generalzed ordnal potental functon. Potental games have the property that better response dynamcs converge to a Nash equlbrum; n other words, f at every stage the agents smply behave myopcally, that s, some agent devates to a more proftable strategy, then they wll eventually reach an equlbrum. We are now ready to prove our second theorem. Theorem 2.2. Let N = {, 2}. There exsts a graph G wth D(G) = 3 such that the game Γ = G, N does not admt a Nash equlbrum. Proof. We frst gve our constructon, then establsh that t has dameter three and that t does not admt a Nash equlbrum. The constructon. Let G = V, E be defned as follows. The vertces of the graph are V = {v,..., v 6 } C C 2 C 3, where for =, 2, 3, C = C C 5. Each C j contans ten vertces, that s, V = 56. The edges of the graph are defned as follows. Each C, for =, 2, 3, s a clque. There s an edge v, u for every u C C 2 C 3 C 2 C 22 C 23 ; an edge v 2, u for every u C C 4 C 5 C 2 C 24 C 25 ; an edge v 3, u for every u C C 2 C 4 C 3 C 32 C 33 ; an edge v 4, u for every u C C 3 C 5 C 3 C 34 C 35 ; an edge v 5, u for every u C 2 C 22 C 24 C 3 C 32 C 34 ; an edge v 6, u for every u C 2 C 23 C 25 C 3 C 33 C 35. An llustraton of the graph G s gven as Fgure 2. We refer to the vertces v,..., v 6 as hubs; we say that v and v 2 are parallel hubs, and so are v 3 and v 4, v 5 and v 6. If the hub v s connected by an edge to some of the vertces of clque C j, we say that v s adjacent to C j ; for nstance, v and C are adjacent, whereas v and C 3 are not. The constructon possesses the followng mportant propertes:. Let v and v j be two parallel hubs that are adjacent to a clque C k. Then (N v \ N vj ) C k contans exactly two of the sets C kl, l =,..., Let v and v j be two nonparallel hubs that are adjacent to a clque C k. Then (N v \ N vj ) C k contans exactly one of the sets C kl, l =,..., 5. Note that the constructon s essentally symmetrc wth respect to the hubs. G has dameter 3. Usng Fgure 2, t s easy to verfy that G has dameter 3. For example, a path from v to u C 32 s gven by v w v 3 u, where w C. A path from u C 3 to w C 24 s gven by u v x w, where x C 2. G does not admt a Nash equlbrum. We consder strategy profles x, x 2 V 2 for the two agents. The symmetres of our constructon allow us to restrct our attenton to sx cases. 5

6 v v 2 C C 2 C 3 C 4 C 5 C 2 C 22 C 23 C 24 C 25 v 3 v 4 v 5 v 6 C 3 C 32 C 33 C 34 C 35 Fgure 2: The constructon of the proof of Theorem 2.2. The clques C, C 2, C 3 are outlned by dashed ellpses, and the edges nsde the clques are not shown. An edge between v and C jk mples that v s connected to all the vertces u C jk. Case : x = v, x 2 C (hub and adjacent clque). Agent colors some of the vertces of C 2 and some hubs, that s, U (x, x 2 ) < 60. By devatng to x = v 5, agent colors C 2, C 22, C 24, C 3, C 32, C 34,.e., U (x, x 2) 60. Case 2: x = v, x 2 C 3 (hub and nonadjacent clque). Agent 2 colors the vertces of C 3 and some hubs, hence U 2 (x, x 2 ) < 60. By devatng to x 2 C, agent 2 colors C 4, C 5, and C 3, thus U 2 (x, x 2 ) 70. Case 3: x = v, x 2 = v 3 (nonparallel hubs). Agent colors C 3, C 2, and some hubs, therefore U (x, x 2 ) < 70. By devatng to x C, agent colors C 3, C 5, C 2, so U (x, x 2) 70. Case 4: x = v, x 2 = v 2 (parallel hubs). Agent colors C 2, C 3, C 22, C 23, and some hubs (v 3,..., v 6 are gray and C 3 remans whte), hence U (x, x 2 ) < 50. By devatng to x C 3, agent can guarantee a utlty of at least 50 (snce t colors C 3 ). Case 5: x C, x 2 C 3 (dfferent clques). If x / C, x 2 / C 3, then agent can beneft by devatng to x C, snce then t colors both v and v 2 at tme 2 (rather than just one of them), and colors twenty vertces of C 2 at tme 3 (rather than ten). Hence we can assume wthout loss of generalty that x C. In that case, agent 2 colors C 3 and some hubs, therefore U 2 (x, x 2 ) < 60. By devatng to x 2 = v 5, agent 2 colors at least C 2, C 22, C 24, C 3, C 32, C 34, hence U 2 (x, x 2 ) 60. Case 6: x C, x 2 C (same clque). Snce C \ {x, x 2 } s gray, there are at most 08 vertces that are not gray, therefore t must hold that ether U (x, x 2 ) < 60 or U 2 (x, x 2 ) < 60. By devatng to v 5 an agent can guarantee a utlty of at least 60. References [] A. L. Barabás and R. Albert. Emergence of scalng n random networks. Scence, 286:509 52, 999. [2] B. Bollobás. Random Graphs. Cambrdge Unversty Press, 2nd edton, 200. [3] C. Dürr and N. K. Thang. Nash equlbra n Vorono games on graphs. In Proceedngs of the 5th Annual European Symposum on Algorthms (ESA), pages 7 28,

7 [4] R. Durrett. Random Graph Dynamcs. Cambrdge Unversty Press, [5] N. Immorlca, J. M. Klenberg, M. Mahdan, and T. Wexler. The role of compatblty n the dffuson of technologes through socal networks. In Proceedngs of the 8th ACM Conference on Electronc Commerce (EC), pages 75 83, [6] D. Kempe, J. M. Klenberg, and É. Tardos. Maxmzng the spread of nfluence through a socal network. In Proceedngs of the 9th Internatonal Conference on Knowledge Dscovery and Data Mnng (KDD), pages 37 46, [7] M. Mavroncolas, B. Monen, V. G. Papadopoulou, and F. Schoppmann. Vorono games on cycle graphs. In Proceedngs of the 33rd Internatonal Symposum on Mathematcal Foundatons of Computer Scence (MFCS), pages , [8] D. Monderer and L. S. Shapley. Potental games. Games and Economc Behavor, 4:24 43, 996. [9] M. E. J. Newman, D. J. Watts, and S. H. Strogatz. Random graph models of socal networks. Proceedngs of the Natonal Academy of Scences, 99: ,

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

F Geometric Mean Graphs

F Geometric Mean Graphs Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 2 (December 2015), pp. 937-952 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) F Geometrc Mean Graphs A.

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

All-Pairs Shortest Paths. Approximate All-Pairs shortest paths Approximate distance oracles Spanners and Emulators. Uri Zwick Tel Aviv University

All-Pairs Shortest Paths. Approximate All-Pairs shortest paths Approximate distance oracles Spanners and Emulators. Uri Zwick Tel Aviv University Approxmate All-Pars shortest paths Approxmate dstance oracles Spanners and Emulators Ur Zwck Tel Avv Unversty Summer School on Shortest Paths (PATH05 DIKU, Unversty of Copenhagen All-Pars Shortest Paths

More information

Cordial and 3-Equitable Labeling for Some Star Related Graphs

Cordial and 3-Equitable Labeling for Some Star Related Graphs Internatonal Mathematcal Forum, 4, 009, no. 31, 1543-1553 Cordal and 3-Equtable Labelng for Some Star Related Graphs S. K. Vadya Department of Mathematcs, Saurashtra Unversty Rajkot - 360005, Gujarat,

More information

Improving the Efficiency of Load Balancing Games through Taxes

Improving the Efficiency of Load Balancing Games through Taxes Improvng the Effcency of Load Balancng Games through Taxes Ioanns Caraganns, Chrstos Kaklamans, and Panagots Kanellopoulos Research Academc Computer Technology Insttute and Dept. of Computer Engneerng

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 5, May ISSN Some Polygonal Sum Labeling of Bistar

International Journal of Scientific & Engineering Research, Volume 7, Issue 5, May ISSN Some Polygonal Sum Labeling of Bistar Internatonal Journal of Scentfc & Engneerng Research Volume 7 Issue 5 May-6 34 Some Polygonal Sum Labelng of Bstar DrKAmuthavall SDneshkumar ABSTRACT- A (p q) graph G s sad to admt a polygonal sum labelng

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

CHAPTER 2 DECOMPOSITION OF GRAPHS

CHAPTER 2 DECOMPOSITION OF GRAPHS CHAPTER DECOMPOSITION OF GRAPHS. INTRODUCTION A graph H s called a Supersubdvson of a graph G f H s obtaned from G by replacng every edge uv of G by a bpartte graph,m (m may vary for each edge by dentfyng

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

On Embedding and NP-Complete Problems of Equitable Labelings

On Embedding and NP-Complete Problems of Equitable Labelings IOSR Journal o Mathematcs (IOSR-JM) e-issn: 78-578, p-issn: 39-765X Volume, Issue Ver III (Jan - Feb 5), PP 8-85 wwwosrjournalsorg Ombeddng and NP-Complete Problems o Equtable Labelngs S K Vadya, C M Barasara

More information

CS 534: Computer Vision Model Fitting

CS 534: Computer Vision Model Fitting CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust

More information

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

K-means and Hierarchical Clustering

K-means and Hierarchical Clustering Note to other teachers and users of these sldes. Andrew would be delghted f you found ths source materal useful n gvng your own lectures. Feel free to use these sldes verbatm, or to modfy them to ft your

More information

Weighted Congestion Games With Separable Preferences

Weighted Congestion Games With Separable Preferences Weghted Congeston Games Wth Separable Preferences Igal Mlchtach, Bar-Ilan Unversty, Ramat Gan 52900, Israel mlcht@mal.bu.ac.l January 2009 Players n a congeston game may dffer from one another n ther ntrnsc

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Report on On-line Graph Coloring

Report on On-line Graph Coloring 2003 Fall Semester Comp 670K Onlne Algorthm Report on LO Yuet Me (00086365) cndylo@ust.hk Abstract Onlne algorthm deals wth data that has no future nformaton. Lots of examples demonstrate that onlne algorthm

More information

Network Topologies: Analysis And Simulations

Network Topologies: Analysis And Simulations Networ Topologes: Analyss And Smulatons MARJAN STERJEV and LJUPCO KOCAREV Insttute for Nonlnear Scence Unversty of Calforna San Dego, 95 Glman Drve, La Jolla, CA 993-4 USA Abstract:-In ths paper we present

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications 14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

UNIT 2 : INEQUALITIES AND CONVEX SETS

UNIT 2 : INEQUALITIES AND CONVEX SETS UNT 2 : NEQUALTES AND CONVEX SETS ' Structure 2. ntroducton Objectves, nequaltes and ther Graphs Convex Sets and ther Geometry Noton of Convex Sets Extreme Ponts of Convex Set Hyper Planes and Half Spaces

More information

The Price of Stability for Network Design with Fair Cost Allocation

The Price of Stability for Network Design with Fair Cost Allocation The Prce of Stablty for Network Desgn wth Far Cost Allocaton Ellot Anshelevch Anrban Dasgupta Jon Klenberg Éva Tardos Tom Wexler June 17, 2004 Tm Roughgarden Abstract Network desgn s a fundamental problem

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

EECS 730 Introduction to Bioinformatics Sequence Alignment. Luke Huan Electrical Engineering and Computer Science

EECS 730 Introduction to Bioinformatics Sequence Alignment. Luke Huan Electrical Engineering and Computer Science EECS 730 Introducton to Bonformatcs Sequence Algnment Luke Huan Electrcal Engneerng and Computer Scence http://people.eecs.ku.edu/~huan/ HMM Π s a set of states Transton Probabltes a kl Pr( l 1 k Probablty

More information

Ramsey numbers of cubes versus cliques

Ramsey numbers of cubes versus cliques Ramsey numbers of cubes versus clques Davd Conlon Jacob Fox Choongbum Lee Benny Sudakov Abstract The cube graph Q n s the skeleton of the n-dmensonal cube. It s an n-regular graph on 2 n vertces. The Ramsey

More information

Math Homotopy Theory Additional notes

Math Homotopy Theory Additional notes Math 527 - Homotopy Theory Addtonal notes Martn Frankland February 4, 2013 The category Top s not Cartesan closed. problem. In these notes, we explan how to remedy that 1 Compactly generated spaces Ths

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Bridges and cut-vertices of Intuitionistic Fuzzy Graph Structure

Bridges and cut-vertices of Intuitionistic Fuzzy Graph Structure Internatonal Journal of Engneerng, Scence and Mathematcs (UGC Approved) Journal Homepage: http://www.jesm.co.n, Emal: jesmj@gmal.com Double-Blnd Peer Revewed Refereed Open Access Internatonal Journal -

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

the nber of vertces n the graph. spannng tree T beng part of a par of maxmally dstant trees s called extremal. Extremal trees are useful n the mxed an

the nber of vertces n the graph. spannng tree T beng part of a par of maxmally dstant trees s called extremal. Extremal trees are useful n the mxed an On Central Spannng Trees of a Graph S. Bezrukov Unverstat-GH Paderborn FB Mathematk/Informatk Furstenallee 11 D{33102 Paderborn F. Kaderal, W. Poguntke FernUnverstat Hagen LG Kommunkatonssysteme Bergscher

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

NETWORKS of dynamical systems appear in a variety of

NETWORKS of dynamical systems appear in a variety of Necessary and Suffcent Topologcal Condtons for Identfablty of Dynamcal Networks Henk J. van Waarde, Petro Tes, and M. Kanat Camlbel arxv:807.09v [math.oc] 2 Jul 208 Abstract Ths paper deals wth dynamcal

More information

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like:

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like: Self-Organzng Maps (SOM) Turgay İBRİKÇİ, PhD. Outlne Introducton Structures of SOM SOM Archtecture Neghborhoods SOM Algorthm Examples Summary 1 2 Unsupervsed Hebban Learnng US Hebban Learnng, Cntd 3 A

More information

Solitary and Traveling Wave Solutions to a Model. of Long Range Diffusion Involving Flux with. Stability Analysis

Solitary and Traveling Wave Solutions to a Model. of Long Range Diffusion Involving Flux with. Stability Analysis Internatonal Mathematcal Forum, Vol. 6,, no. 7, 8 Soltary and Travelng Wave Solutons to a Model of Long Range ffuson Involvng Flux wth Stablty Analyss Manar A. Al-Qudah Math epartment, Rabgh Faculty of

More information

Active Contours/Snakes

Active Contours/Snakes Actve Contours/Snakes Erkut Erdem Acknowledgement: The sldes are adapted from the sldes prepared by K. Grauman of Unversty of Texas at Austn Fttng: Edges vs. boundares Edges useful sgnal to ndcate occludng

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

b * -Open Sets in Bispaces

b * -Open Sets in Bispaces Internatonal Journal of Mathematcs and Statstcs Inventon (IJMSI) E-ISSN: 2321 4767 P-ISSN: 2321-4759 wwwjmsorg Volume 4 Issue 6 August 2016 PP- 39-43 b * -Open Sets n Bspaces Amar Kumar Banerjee 1 and

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

An Algorithm for Weighted Positive Influence Dominating Set Based on Learning Automata

An Algorithm for Weighted Positive Influence Dominating Set Based on Learning Automata 4 th Internatonal Conference on Knowledge-Based Engneerng and Innovaton (KBEI-2017) Dec. 22 th, 2017 (Iran Unversty of Scence and Technology) Tehran, Iran An Algorthm for Weghted Postve Influence Domnatng

More information

Clustering on antimatroids and convex geometries

Clustering on antimatroids and convex geometries Clusterng on antmatrods and convex geometres YULIA KEMPNER 1, ILYA MUCNIK 2 1 Department of Computer cence olon Academc Insttute of Technology 52 Golomb tr., P.O. Box 305, olon 58102 IRAEL 2 Department

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

Electrical analysis of light-weight, triangular weave reflector antennas

Electrical analysis of light-weight, triangular weave reflector antennas Electrcal analyss of lght-weght, trangular weave reflector antennas Knud Pontoppdan TICRA Laederstraede 34 DK-121 Copenhagen K Denmark Emal: kp@tcra.com INTRODUCTION The new lght-weght reflector antenna

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

A Topology-aware Random Walk

A Topology-aware Random Walk A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble

More information

Reading. 14. Subdivision curves. Recommended:

Reading. 14. Subdivision curves. Recommended: eadng ecommended: Stollntz, Deose, and Salesn. Wavelets for Computer Graphcs: heory and Applcatons, 996, secton 6.-6., A.5. 4. Subdvson curves Note: there s an error n Stollntz, et al., secton A.5. Equaton

More information

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 5 Luca Trevisan September 7, 2017

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 5 Luca Trevisan September 7, 2017 U.C. Bereley CS294: Beyond Worst-Case Analyss Handout 5 Luca Trevsan September 7, 207 Scrbed by Haars Khan Last modfed 0/3/207 Lecture 5 In whch we study the SDP relaxaton of Max Cut n random graphs. Quc

More information

CSE 326: Data Structures Quicksort Comparison Sorting Bound

CSE 326: Data Structures Quicksort Comparison Sorting Bound CSE 326: Data Structures Qucksort Comparson Sortng Bound Steve Setz Wnter 2009 Qucksort Qucksort uses a dvde and conquer strategy, but does not requre the O(N) extra space that MergeSort does. Here s the

More information

Transaction-Consistent Global Checkpoints in a Distributed Database System

Transaction-Consistent Global Checkpoints in a Distributed Database System Proceedngs of the World Congress on Engneerng 2008 Vol I Transacton-Consstent Global Checkponts n a Dstrbuted Database System Jang Wu, D. Manvannan and Bhavan Thurasngham Abstract Checkpontng and rollback

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

1 Introducton Effcent and speedy recovery of electrc power networks followng a major outage, caused by a dsaster such as extreme weather or equpment f

1 Introducton Effcent and speedy recovery of electrc power networks followng a major outage, caused by a dsaster such as extreme weather or equpment f Effcent Recovery from Power Outage (Extended Summary) Sudpto Guha Λ Anna Moss y Joseph (Seff) Naor z Baruch Scheber x Abstract We study problems that are motvated by the real-lfe problem of effcent recovery

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

Greedy Technique - Definition

Greedy Technique - Definition Greedy Technque Greedy Technque - Defnton The greedy method s a general algorthm desgn paradgm, bult on the follong elements: confguratons: dfferent choces, collectons, or values to fnd objectve functon:

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

A Facet Generation Procedure. for solving 0/1 integer programs

A Facet Generation Procedure. for solving 0/1 integer programs A Facet Generaton Procedure for solvng 0/ nteger programs by Gyana R. Parja IBM Corporaton, Poughkeepse, NY 260 Radu Gaddov Emery Worldwde Arlnes, Vandala, Oho 45377 and Wlbert E. Wlhelm Teas A&M Unversty,

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

AP PHYSICS B 2008 SCORING GUIDELINES

AP PHYSICS B 2008 SCORING GUIDELINES AP PHYSICS B 2008 SCORING GUIDELINES General Notes About 2008 AP Physcs Scorng Gudelnes 1. The solutons contan the most common method of solvng the free-response questons and the allocaton of ponts for

More information

5 The Primal-Dual Method

5 The Primal-Dual Method 5 The Prmal-Dual Method Orgnally desgned as a method for solvng lnear programs, where t reduces weghted optmzaton problems to smpler combnatoral ones, the prmal-dual method (PDM) has receved much attenton

More information

Unsupervised Learning

Unsupervised Learning Pattern Recognton Lecture 8 Outlne Introducton Unsupervsed Learnng Parametrc VS Non-Parametrc Approach Mxture of Denstes Maxmum-Lkelhood Estmates Clusterng Prof. Danel Yeung School of Computer Scence and

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

A New Graph Model with Random Edge Values: Connectivity and Diameter

A New Graph Model with Random Edge Values: Connectivity and Diameter A New Graph Model wth Random Edge Values: Connectvty and Dameter Rchard J. La and Maya Kabkab Abstract We ntroduce a new random graph model. In our model, n, n, vertces choose a subset of potental edges

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Decson surface s a hyperplane (lne n 2D) n feature space (smlar to the Perceptron) Arguably, the most mportant recent dscovery n machne learnng In a nutshell: map the data to a predetermned

More information

Agent Objective Function Design in Distributed Engineering Systems

Agent Objective Function Design in Distributed Engineering Systems Unversty of Colorado, Boulder CU Scholar Electrcal, Computer & Energy Engneerng Graduate Theses & Dssertatons Electrcal, Computer & Energy Engneerng Sprng 1-1-2015 Agent Objectve Functon Desgn n Dstrbuted

More information

A Five-Point Subdivision Scheme with Two Parameters and a Four-Point Shape-Preserving Scheme

A Five-Point Subdivision Scheme with Two Parameters and a Four-Point Shape-Preserving Scheme Mathematcal and Computatonal Applcatons Artcle A Fve-Pont Subdvson Scheme wth Two Parameters and a Four-Pont Shape-Preservng Scheme Jeqng Tan,2, Bo Wang, * and Jun Sh School of Mathematcs, Hefe Unversty

More information

Structure Formation of Social Network

Structure Formation of Social Network Structure Formaton of Socal Network DU Nan 1, FENG Hu 2, HUANG Zgang 3, Sally MAKI 4, WANG Ru(Ruby) 5, and ZHAO Hongxa (Melssa) 6 1 Bejng Unversty of Posts and Telecommuncatons, Chna 2 Fudan Unversty,

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

Lecture Note 08 EECS 4101/5101 Instructor: Andy Mirzaian. All Nearest Neighbors: The Lifting Method

Lecture Note 08 EECS 4101/5101 Instructor: Andy Mirzaian. All Nearest Neighbors: The Lifting Method Lecture Note 08 EECS 4101/5101 Instructor: Andy Mrzaan Introducton All Nearest Neghbors: The Lftng Method Suose we are gven aset P ={ 1, 2,..., n }of n onts n the lane. The gven coordnates of the -th ont

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Covering Pairs in Directed Acyclic Graphs

Covering Pairs in Directed Acyclic Graphs Advance Access publcaton on 5 November 2014 c The Brtsh Computer Socety 2014. All rghts reserved. For Permssons, please emal: ournals.permssons@oup.com do:10.1093/comnl/bxu116 Coverng Pars n Drected Acyclc

More information

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton

More information

O n processors in CRCW PRAM

O n processors in CRCW PRAM PARALLEL COMPLEXITY OF SINGLE SOURCE SHORTEST PATH ALGORITHMS Mshra, P. K. Department o Appled Mathematcs Brla Insttute o Technology, Mesra Ranch-8355 (Inda) & Dept. o Electroncs & Electrcal Communcaton

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

MOTION BLUR ESTIMATION AT CORNERS

MOTION BLUR ESTIMATION AT CORNERS Gacomo Boracch and Vncenzo Caglot Dpartmento d Elettronca e Informazone, Poltecnco d Mlano, Va Ponzo, 34/5-20133 MILANO boracch@elet.polm.t, caglot@elet.polm.t Keywords: Abstract: Pont Spread Functon Parameter

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

Cell Count Method on a Network with SANET

Cell Count Method on a Network with SANET CSIS Dscusson Paper No.59 Cell Count Method on a Network wth SANET Atsuyuk Okabe* and Shno Shode** Center for Spatal Informaton Scence, Unversty of Tokyo 7-3-1, Hongo, Bunkyo-ku, Tokyo 113-8656, Japan

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Smoothing Spline ANOVA for variable screening

Smoothing Spline ANOVA for variable screening Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information