Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem

Size: px
Start display at page:

Download "Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem"

Transcription

1 Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) Bernard Fortz Université ibre de Bruxees, Département d informatique, (Begique) bernard.fortz@ub.ac.be Keywords: Survivabiity, Network Design Probem, Hop-constraints. Abstract This paper considers the K-edge-disjoint hop-constrained Network Design Probem (HCNDP) which consists in finding a minimum cost subgraph such that there exists at east K-edge-disjoint paths between origins and destinations of demands, and such that the ength of these paths is at most equa to a given parameter L. This probem was considered in the past using ony design variabes. Here, we consider an extended node-arc formuation, introducing fow variabes to mode the paths. We conjecture that our formuation eads to the compete description of the associated poyhedron and we provide an agorithm eading to good performances in terms of computing times. 1. Introduction Our society is increasingy dependent on arge-scae, networked information systems of remarkabe scope and compexity. This dependency magnifies the far-reaching consequences of system damage from attacks and intrusions. Yet no amount of security can guarantee that systems wi not be damaged. Incorporating survivabiity capabiities into a network can mitigate the risks. Here, survivabiity is the capabiity of a system to fufi its mission in a timey manner despite intrusions, faiures, or accidents. This concept of survivabiity aows networks to remain functiona when inks are severed or nodes fai, that is, network service can be restrored in the event of catastrophic faiures. Consider an undirected graph G = (V, E), where V represents the node (vertex) set, and E the set of edges or potentia inks. To express the survivabiity conditions, we need to introduce the foowing graph-theoretic concepts. Given two distinct nodes o (the origin node of demand) and d (the destination node of demand) of V, an st-path is a sequence P = (v 0, (v s, v 1 ), v 1,..., (v 1, v ), v ), where 1, v 0, v 1,..., v are distinct nodes, v 0 = o, v = d, and (v i 1, v i ) is an edge connecting v i 1 and v i (for i = 1,..., ). A coection P 1, P 2,..., P of st-paths is caed edge-disjoint (respectivey node-disjoint) if any edge (respectivey, any node except for o and d) appears in at most one path. A subgraph H of G is caed (K-)edge-survivabe (respectivey, (K-)node-survivabe) if for any o, d V, H contains at east a prespecified number K of edge-disjoint (respectivey, node-disjoint) st-paths. Suppose that each edge e E has an instaation cost c(e) R +, then the edge-survivabe network design probem, denoted by ESNDP, consists of finding a edge-survivabe subgraph of G with minimum tota cost, where the cost of a subgraph is the sum of the costs of its edges. Simiary, the node-survivabe network-design probem, denoted by NSNDP, consists in finding a minimum-cost node-survivabe subgraph of G In genera, the survivabiity requirement is not sufficient to guarantee a cost effective routing. Indeed, the aternative routing paths may be too ong and then too much expensive to be suitabe. In consequence, in order to guarantee a eve quaity of service, further technica constraints have to be added; in particuar, one can impose a imit on the enght of the routing paths, so that if one of the paths fais, the traffic may be rerouted on the second one with a quaity of service guaranteed in terms of deay. In many works on the

2 subject, the enght of the routing path is considered as the number of inks, (aso caed hops) used in the path, and then we tak about a hop-constrained path. Survivabiity probems are generay tacked by two different rerouting techniques. The first one caed oca rerouting consists in rerouting the traffic between the extremities of the faied ink. In this study we focus on the second technique caed end-to-end rerouting. This technique considers a the demands affected by the faiure and reroute these demands from their respective origins to their respective destinations. Here we focus on end-to-end rerouting with hop constraints. Three major probems of this kind have been studied before. The hop-constrainded spanning tree probem consists in finding the minimum spanning tree such that the path between the root and any other node has no more than L hops. This probem has been argey studied by Gouveia [8], [9] in which the author proposes a muticommodity network fow formuation and discuss the use of agragian reaxation to improve the ower bound. In [10], Gouveia and Requejo proposed the hopindexed formuation using the ayered representation of the graph. In [3] Dah gives a poyhedra study of the probem when the number of hops is imited to 2. The hop-constrained path probem consists on finding between two distinguished nodes s and t a minimum cost path with no more than L hops with L fixed. In [9], Gouveia proposed vaid inequaities for the L-path poytope probem and caed these inequaities st-cut inequaities. In [4], Dah and in [6], Dah and Gouveia give a compete description of the poytope when L 3 using their jump-inequaities for which the separation probem can be soved in poynomia time. In [7], Dah, Gouveia et a. extend the previous work when L = 4. The third probem is the hop-constrained network design probem. This probem focuses on finding a minimum cost subgraph such that there are at east K edge-disjoint paths between each pair of terminas. Moreover, each path must use at most L hops. In [1], Baakrishnan et a. give a mixed integer formuation for the probem when K = 1, they derive a Lagrangean reaxation to improve the ower bound. In [12], Pirku et a. propose muticommodity network fow modes and some heuristics based on inear reaxation. In [5], Dah et a. study the probem where there are for each pair of terminas K edge-disjoint paths of maximum enght L. They prove that this probem is NP-hard even when K = 1 and L = 2. In [11], Huygens et a. study the same probem but when there is ony one commodity, or one pair of terminas. They formuate an IP mode when K = 2 and L = 3 in the space of the design variabes. Bey [2] shows that the singe demand node-disjoint enght-restricted paths is NP-compete. In this paper, we propose an extended formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem in the singe commodity case. We conjecture that our formuations give a compete description of the poytope when K = 2 and we propose a poynomia time agorithm for this case. 2. Extended Formuations In order to propose a mode for the K-Edge-Disjoint Hop-Constrained Network Design Probem in the singe commodity case, we use the ayered representation proposed by Gouveia in [10]. This representation transforms the origina graph by taking into account the hop-constraints. The idea is to dupicate a the nodes L 1 times when L is the maximum number of hops. This process creates exacty L different ayers as it is iustrated in Figure 1. From the origina non-directed graph G = (V, E) we create a directed ayered graph G = (V, A ) where V represents the set of nodes and where A is the set of directed arcs in the ayered graph. V = {V 1 V 2... V L+1 } where V 1 = {o}, V L+1 = {d} and V = V \{o}, = 2,..., L 1. The set of arcs is defined by A = {{(i, j) ij E and i V and j V +1, = 1,..., L} {(i, j) ji E and i V and j, = 1,..., L}}. Note that each path between o and d in the ayered graph is made of a maximum of L V +1 2

3 Figure 1: Basic Network and its ayered representation when L = 4 arcs (hops). Linked to this ayered representation we have the foowing mode: min c ij Uij (1) L subject to j:(j,i) A U ji j: U +1 ij = K if (i = o) and ( = 0) K if (i = d) and ( = L) 0 ese, i N, L, (2) U ij {0, 1}, (i, j) A, L. (3) In this mode Uij represents the quantity of information send on arc (i, j) when arc (i, j) is the th hop in the path. The parameter c ij represents the cost to send one unit of information on arc (i, j). (1) represents the objective fonction which minimizes the tota cost when (2) are simpy the fow conservation constraints. To mode the disjoint paths we send from the origin node o a quantity equa to the number of disjoint paths K and we add the constraint (3) which is an upper bound on the fow variabes. When K = 1 this formuation is simiar to the one proposed by Dah et a. in [7]. Note that this formuation has an integra inear reaxation as it is a network fow probem. When K > 1, a fow of vaue K in the ayered graph corresponds to a soution of our probem if and ony if the transposition of the soution in the origina graph uses each arc at most once. This remark eads to add a new constraint in our mode: Uij 1, (i, j) A (4) L Our numerica experiments ead us to conjecture that the addition of (4) does not break integraity of the formuation, as the inear reaxation was integra for a the instances we tested. As a first step towards a proof, we propose a Lagrangean reaxation approach to sove the probem. We are currenty working on a proof that this agorithm converges in poynomia time to a feasibe soution of the probem whith a Lagrangean cost equa to the origina cost, therefore proving the integraity of our formuation. 3

4 3. Agorithm Our agorithm is based on a Lagrangean reaxation (caed here LR mode) based on the reaxation of constraints (4) with mutipiers β ij. The Lagrangean subprobem can be written as: min (c ij + β ij )Uij β ij (5) L subject to j:(j,i) A U ji j: U +1 ij = K if (i = o) and ( = 0) K if (i = d) and ( = L) 0 ese, i N, L, (6) U ij 1, (i, j) A, L, (7) U ij 0, (i, j) A, L. (8) The Lagrangean subprobem computes K-edge disjoint shortest paths in the ayered network. This work can be done by using e.g. the agorithm of Suurbae [13]. The Lagrangean mutipiers β are increased when an arc in the origina network is used more than once. If for some (i, j) A, (4) is not satisfied, we compute the ength of the shortest path with at most L hops not using this arc, and we increase β ij by the difference between this ength and the ength of the shortest path in the current soution. For K = 2, we conjecture that this approach converges in poynomia time to an optima soution of our probem. 4. Future work We are currenty working on the proof of convergence of our agotithm for K = 2 and for any vaue of L, and the proof of the integraity of the extended formuations. We wi aso extend this work to the muticommodity case. Because the size of the mode grows rapidy when the number of commodities increases, we wi experiment Benders decomposition on this mode. References [1] Baakrishnan, A., K. Atinkemer, Using a hop-constrained mode to generate aternative communication network design, ORSA J Comput, vo. 4, pp , [2] Bey, A., Node-disjoint enght-restricted paths, PhD TU Berin, [3] Dah, G., The 2-hop spanning tree probem, Oper Res Lett, vo. 23, pp , [4] Dah, G., Notes on poyhedra associated with hop-constrained wak poytopes, Oper Res Lett, vo. 25, pp , [5] Dah, G., B. Johannessen, The 2-path network design, Networks, vo. 43(3), pp , [6] Dah, G., L. Gouveia, On the directed hop-constrained shortest path probem, Oper Res Lett, vo. 32, pp , [7] Dah, G., N. Fodnes, L. Gouveia, A note on hop-constrained wak poytopes, Oper Res Lett, vo. 32, pp , [8] Gouveia, L., Muticommodity fow modes for spanning trees with hop constraints, European Journa of Operationa Research, vo. 95, pp ,

5 [9] Gouveia, L., Using variabe redefinition for computing ower bounds for minimum spanning and steiner trees with hop constraints, INFORMS J Comput, vo. 10, pp , [10] Gouveia, L., C. Requejo, A new agrangian reaxation approach for the hop-constrained minimum spanning tree probem, European Journa of Operationa Research, vo. 132, pp , [11] Huygens, D., A. R. Mahjoub, P. Pesneau, Two edge-disjoint hop-constrained paths and poyhedra, SIAM J. Discrete Math., vo. 18(2), pp , [12] Pirku, H., S. Soni, New formuations and soution procedures for the hop constrained network design probem, European Journa of Operationa Research, vo. 148, pp , [13] Suurbae, J. W., Disjoint paths in a network, Networks, vo. 4, pp ,

DISTANCE TRANSFORMATION FOR NETWORK DESIGN PROBLEMS

DISTANCE TRANSFORMATION FOR NETWORK DESIGN PROBLEMS DISTANCE TRANSFORMATION FOR NETWORK DESIGN PROBLEMS A Ridha Mahjoub, Michae Poss, Luidi Simonetti, Eduardo Uchoa To cite this version: A Ridha Mahjoub, Michae Poss, Luidi Simonetti, Eduardo Uchoa. DISTANCE

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

On Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture

On Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture On inding the est Partia Muticast Protection Tree under ua-homing rchitecture Mei Yang, Jianping Wang, Xiangtong Qi, Yingtao Jiang epartment of ectrica and omputer ngineering, University of Nevada Las

More information

PAPER Delay Constrained Routing and Link Capacity Assignment in Virtual Circuit Networks

PAPER Delay Constrained Routing and Link Capacity Assignment in Virtual Circuit Networks 2004 PAPER Deay Constrained Routing and Link Capacity Assignment in Virtua Circuit Networks Hong-Hsu YEN a), Member and FrankYeong-Sung LIN b), Nonmember SUMMARY An essentia issue in designing, operating

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

Timing-Driven Hierarchical Global Routing with Wire-Sizing and Buffer-Insertion for VLSI with Multi-Routing-Layer

Timing-Driven Hierarchical Global Routing with Wire-Sizing and Buffer-Insertion for VLSI with Multi-Routing-Layer Timing-Driven Hierarchica Goba Routing with Wire-Sizing and Buffer-Insertion for VLSI with Muti-Routing-Layer Takahiro DEGUCHI y Tetsushi KOIDE z Shin ichi WAKABAYASHI y yfacuty of Engineering, Hiroshima

More information

Path-Based Protection for Surviving Double-Link Failures in Mesh-Restorable Optical Networks

Path-Based Protection for Surviving Double-Link Failures in Mesh-Restorable Optical Networks Path-Based Protection for Surviving Doube-Link Faiures in Mesh-Restorabe Optica Networks Wensheng He and Arun K. Somani Dependabe Computing and Networking Laboratory Department of Eectrica and Computer

More information

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models On Upper Bounds for Assortment Optimization under the Mixture of Mutinomia Logit Modes Sumit Kunnumka September 30, 2014 Abstract The assortment optimization probem under the mixture of mutinomia ogit

More information

Design of IP Networks with End-to. to- End Performance Guarantees

Design of IP Networks with End-to. to- End Performance Guarantees Design of IP Networks with End-to to- End Performance Guarantees Irena Atov and Richard J. Harris* ( Swinburne University of Technoogy & *Massey University) Presentation Outine Introduction Mutiservice

More information

Alternative Decompositions for Distributed Maximization of Network Utility: Framework and Applications

Alternative Decompositions for Distributed Maximization of Network Utility: Framework and Applications Aternative Decompositions for Distributed Maximization of Network Utiity: Framework and Appications Danie P. Paomar and Mung Chiang Eectrica Engineering Department, Princeton University, NJ 08544, USA

More information

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah Journa of Lightwave Technoogy Page of CFP: Cooperative Fast Protection Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapocai and Hussein T. Mouftah Abstract We introduce a nove protection scheme, caed Cooperative

More information

Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters

Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters Crossing Minimiation Probems o Drawing Bipartite Graphs in Two Custers Lanbo Zheng, Le Song, and Peter Eades Nationa ICT Austraia, and Schoo o Inormation Technoogies, University o Sydney,Austraia Emai:

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

A Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks

A Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks Sensors 2013, 13, 16424-16450; doi:10.3390/s131216424 Artice OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journa/sensors A Near-Optima Distributed QoS Constrained Routing Agorithm for Mutichanne Wireess

More information

An Exponential Time 2-Approximation Algorithm for Bandwidth

An Exponential Time 2-Approximation Algorithm for Bandwidth An Exponentia Time 2-Approximation Agorithm for Bandwidth Martin Fürer 1, Serge Gaspers 2, Shiva Prasad Kasiviswanathan 3 1 Computer Science and Engineering, Pennsyvania State University, furer@cse.psu.edu

More information

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction

More information

Split Restoration with Wavelength Conversion in WDM Networks*

Split Restoration with Wavelength Conversion in WDM Networks* Spit Reoration with aveength Conversion in DM Networks* Yuanqiu Luo and Nirwan Ansari Advanced Networking Laborator Department of Eectrica and Computer Engineering New Jerse Initute of Technoog Universit

More information

Optimized Base-Station Cache Allocation for Cloud Radio Access Network with Multicast Backhaul

Optimized Base-Station Cache Allocation for Cloud Radio Access Network with Multicast Backhaul Optimized Base-Station Cache Aocation for Coud Radio Access Network with Muticast Backhau Binbin Dai, Student Member, IEEE, Ya-Feng Liu, Member, IEEE, and Wei Yu, Feow, IEEE arxiv:804.0730v [cs.it] 28

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

International Journal of Electronics and Communications (AEÜ)

International Journal of Electronics and Communications (AEÜ) Int. J. Eectron. Commun. (AEÜ) 67 (2013) 470 478 Contents ists avaiabe at SciVerse ScienceDirect Internationa Journa of Eectronics and Communications (AEÜ) journa h o me pa ge: www.esevier.com/ocate/aeue

More information

Alpha labelings of straight simple polyominal caterpillars

Alpha labelings of straight simple polyominal caterpillars Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.

More information

QoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization

QoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization QoS-Aware Data Transmission and Wireess Energy Transfer: Performance Modeing and Optimization Dusit Niyato, Ping Wang, Yeow Wai Leong, and Tan Hwee Pink Schoo of Computer Engineering, Nanyang Technoogica

More information

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae

More information

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network Service Chain (SC) Mapping with Mutipe SC Instances in a Wide Area Network This is a preprint eectronic version of the artice submitted to IEEE GobeCom 2017 Abhishek Gupta, Brigitte Jaumard, Massimo Tornatore,

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

An Alternative Approach for Solving Bi-Level Programming Problems

An Alternative Approach for Solving Bi-Level Programming Problems American Journa of Operations Research, 07, 7, 9-7 http://www.scirp.org/ourna/aor ISSN Onine: 60-889 ISSN rint: 60-880 An Aternative Approach for Soving Bi-Leve rogramming robems Rashmi Bira, Viay K. Agarwa,

More information

ABSTRACT WU, KEHANG. Flow Aggregation based Lagrangian Relaxation with. (Under the direction of Professor Douglas S. Reeves)

ABSTRACT WU, KEHANG. Flow Aggregation based Lagrangian Relaxation with. (Under the direction of Professor Douglas S. Reeves) ABSTRACT WU, KEHANG Fow Aggregation based Lagrangian Reaxation with Appications to Capacity Panning of IP Networks with Mutipe Casses of Service (Under the direction of Professor Dougas S. Reeves) Noninear

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

Solutions to the Final Exam

Solutions to the Final Exam CS/Math 24: Intro to Discrete Math 5//2 Instructor: Dieter van Mekebeek Soutions to the Fina Exam Probem Let D be the set of a peope. From the definition of R we see that (x, y) R if and ony if x is a

More information

Space-Time Trade-offs.

Space-Time Trade-offs. Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe

More information

Further Concepts in Geometry

Further Concepts in Geometry ppendix F Further oncepts in Geometry F. Exporing ongruence and Simiarity Identifying ongruent Figures Identifying Simiar Figures Reading and Using Definitions ongruent Trianges assifying Trianges Identifying

More information

Fastest-Path Computation

Fastest-Path Computation Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods

More information

Research on the overall optimization method of well pattern in water drive reservoirs

Research on the overall optimization method of well pattern in water drive reservoirs J Petro Expor Prod Techno (27) 7:465 47 DOI.7/s322-6-265-3 ORIGINAL PAPER - EXPLORATION ENGINEERING Research on the overa optimization method of we pattern in water drive reservoirs Zhibin Zhou Jiexiang

More information

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y. FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four

More information

Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering

Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering Kin-Hon Ho, Michae Howarth, Ning Wang, George Pavou and Styianos Georgouas Centre for Communication Systems Research, University

More information

Efficient Convex Optimization for Minimal Partition Problems with Volume Constraints

Efficient Convex Optimization for Minimal Partition Problems with Volume Constraints Efficient Convex Optimization for Minima Partition Probems with Voume Constraints Thomas Möenhoff, Caudia Nieuwenhuis, Eno Töppe, and Danie Cremers Department of Computer Science, Technica University of

More information

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162 oward Efficient Spatia Variation Decomposition via Sparse Regression Wangyang Zhang, Karthik Baakrishnan, Xin Li, Duane Boning and Rob Rutenbar 3 Carnegie Meon University, Pittsburgh, PA 53, wangyan@ece.cmu.edu,

More information

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department

More information

Chapter Multidimensional Direct Search Method

Chapter Multidimensional Direct Search Method Chapter 09.03 Mutidimensiona Direct Search Method After reading this chapter, you shoud be abe to:. Understand the fundamentas of the mutidimensiona direct search methods. Understand how the coordinate

More information

On the hop-constrained survivable network design problem with reliable edges

On the hop-constrained survivable network design problem with reliable edges 4OR manuscript No. (will be inserted by the editor) On the hop-constrained survivable network design problem with reliable edges Quentin Botton Bernard Fortz Luis Gouveia Received: date / Accepted: date

More information

NETWORK SURVIVABILITY AND POLYHEDRAL ANALYSIS

NETWORK SURVIVABILITY AND POLYHEDRAL ANALYSIS NETWORK SURVIVABILITY AND POLYHEDRAL ANALYSIS A. Ridha Mahjoub LAMSADE, Université Paris-Dauphine, Paris, France Seminar UF Rio de Janeiro, April 9, 204 . Polyhedral techniques Contents.. Polyhedral Approach.2.

More information

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line American J. of Engineering and Appied Sciences 3 (): 5-24, 200 ISSN 94-7020 200 Science Pubications Appication of Inteigence Based Genetic Agorithm for Job Sequencing Probem on Parae Mixed-Mode Assemby

More information

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Nattawut Thepayasuwan, Member, IEEE and Aex Doboi, Member, IEEE Abstract

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program? Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of

More information

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks Ad Hoc Networks (3) 683 698 Contents ists avaiabe at SciVerse ScienceDirect Ad Hoc Networks journa homepage: www.esevier.com/ocate/adhoc Dynamic agent-based hierarchica muticast for wireess mesh networks

More information

BGP-Based SPF IETF 96, Berlin. Keyur Patel, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopal, Cisco

BGP-Based SPF IETF 96, Berlin. Keyur Patel, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopal, Cisco BGP-Based SPF IETF 96, Berin Keyur Pate, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopa, Cisco 1 Data Center Routing Routing Probem Space Routing scaing for Massivey Scaabe

More information

FIRST BEZIER POINT (SS) R LE LE. φ LE FIRST BEZIER POINT (PS)

FIRST BEZIER POINT (SS) R LE LE. φ LE FIRST BEZIER POINT (PS) Singe- and Muti-Objective Airfoi Design Using Genetic Agorithms and Articia Inteigence A.P. Giotis K.C. Giannakogou y Nationa Technica University of Athens, Greece Abstract Transonic airfoi design probems

More information

Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, January 1997, pp. 777{ Partial Matching of Planar Polylines

Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, January 1997, pp. 777{ Partial Matching of Planar Polylines Eighth Annua ACM-SIAM Symposium on Discrete Agorithm January 997, pp. 777{786 Partia Matching of Panar Poyines Under Simiarity Transformations Scott D. Cohen Leonidas J. Guibas fscohen,guibasg@cs.stanford.edu

More information

A Local Optimal Method on DSA Guiding Template Assignment with Redundant/Dummy Via Insertion

A Local Optimal Method on DSA Guiding Template Assignment with Redundant/Dummy Via Insertion A Loca Optima Method on DSA Guiding Tempate Assignment with Redundant/Dummy Via Insertion Xingquan Li 1, Bei Yu 2, Jiani Chen 1, Wenxing Zhu 1, 24th Asia and South Pacific Design T h e p i c Automation

More information

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs Repication of Virtua Network Functions: Optimizing Link Utiization and Resource Costs Francisco Carpio, Wogang Bziuk and Admea Jukan Technische Universität Braunschweig, Germany Emai:{f.carpio, w.bziuk,

More information

Privacy Preserving Subgraph Matching on Large Graphs in Cloud

Privacy Preserving Subgraph Matching on Large Graphs in Cloud Privacy Preserving Subgraph Matching on Large Graphs in Coud Zhao Chang,#, Lei Zou, Feifei Li # Peing University, China; # University of Utah, USA; {changzhao,zouei}@pu.edu.cn; {zchang,ifeifei}@cs.utah.edu

More information

Response Surface Model Updating for Nonlinear Structures

Response Surface Model Updating for Nonlinear Structures Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,

More information

l Tree: set of nodes and directed edges l Parent: source node of directed edge l Child: terminal node of directed edge

l Tree: set of nodes and directed edges l Parent: source node of directed edge l Child: terminal node of directed edge Trees & Heaps Week 12 Gaddis: 20 Weiss: 21.1-3 CS 5301 Fa 2016 Ji Seaman 1 Tree: non-recursive definition Tree: set of nodes and directed edges - root: one node is distinguished as the root - Every node

More information

A Scalable Approach for Service Chain (SC) Mapping with Multiple SC Instances in a Wide-Area Network

A Scalable Approach for Service Chain (SC) Mapping with Multiple SC Instances in a Wide-Area Network JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 A Scaabe Approach for Service Chain (SC) Mapping with Mutipe SC Instances in a Wide-Area Network This is a preprint eectronic version of the

More information

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 7, SEPTEMBER

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 7, SEPTEMBER IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 7, SEPTEMBER 2012 3191 Anaytica Modeing of Muti-hop IEEE 802.15.4 Networks Piergiuseppe Di Marco, Student Member, IEEE, Pangun Park, Member, IEEE,

More information

Discrete elastica model for shape design of grid shells

Discrete elastica model for shape design of grid shells Abstracts for IASS Annua Symposium 017 5 8th September, 017, Hamburg, Germany Annette Böge, Manfred Grohmann (eds.) Discrete eastica mode for shape design of grid shes Yusuke SAKAI* and Makoto OHSAKI a

More information

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints *

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG

More information

Minimizing Resource Cost for Camera Stream Scheduling in Video Data Center

Minimizing Resource Cost for Camera Stream Scheduling in Video Data Center Gao YH, Ma HD, Liu W. Minimizing resource cost for camera stream scheduing in video data center. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 555 570 May 2017. DOI 10.1007/s11390-017-1743-x Minimizing

More information

No connection establishment Do not perform Flow control Error control Retransmission Suitable for small request/response scenario E.g.

No connection establishment Do not perform Flow control Error control Retransmission Suitable for small request/response scenario E.g. UDP & TCP 2018/3/26 UDP Header Characteristics of UDP No connection estabishment Do not perform Fow contro Error contro Retransmission Suitabe for sma request/response scenario E.g., DNS Remote Procedure

More information

On-Chip CNN Accelerator for Image Super-Resolution

On-Chip CNN Accelerator for Image Super-Resolution On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement

More information

Priority Queueing for Packets with Two Characteristics

Priority Queueing for Packets with Two Characteristics 1 Priority Queueing for Packets with Two Characteristics Pave Chuprikov, Sergey I. Nikoenko, Aex Davydow, Kiri Kogan Abstract Modern network eements are increasingy required to dea with heterogeneous traffic.

More information

BGP ingress-to-egress route configuration in a capacityconstrained Asia-Pacific Conference On Communications, 2005, v. 2005, p.

BGP ingress-to-egress route configuration in a capacityconstrained Asia-Pacific Conference On Communications, 2005, v. 2005, p. Tite BGP -to- route configuration in a capacityconstrained AS Author(s) Chim, TW; Yeung, KL; Lu KS Citation 2005 Asia-Pacific Conference On Communications, 2005, v. 2005, p. 386-390 Issued Date 2005 URL

More information

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing An Adaptive Two-Copy Deayed SR-ARQ for Sateite Channes with Shadowing Jing Zhu, Sumit Roy zhuj@ee.washington.edu Department of Eectrica Engineering, University of Washington Abstract- The paper focuses

More information

Analysis of Random. Processes via And-Or Tree Evaluation. Michael Mitzenmachert M. Amin Shokrollahiz

Analysis of Random. Processes via And-Or Tree Evaluation. Michael Mitzenmachert M. Amin Shokrollahiz Anaysis of Random Processes via And-Or Tree Evauation Michae G. Luby* Michae Mitzenmachert M. Amin Shokroahiz Abstract distributions not considered by previous anayses. We introduce a new set of probabiistic

More information

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions 2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing

More information

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM 17th European Signa Processing Conference (EUSIPCO 2009) Gasgow, Scotand, August 24-28, 2009 THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM P. Murray 1, S. Marsha 1, and E.Buinger 2 1 Dept. of Eectronic

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Attention The materias beow are

More information

Interference Spins Popovski, Petar; Simeone, Osvaldo; Nielsen, Jimmy Jessen; Stefanovic, Cedomir

Interference Spins Popovski, Petar; Simeone, Osvaldo; Nielsen, Jimmy Jessen; Stefanovic, Cedomir Aaborg Universitet Interference Spins Popovski, Petar; Simeone, Osvado; Niesen, Jimmy Jessen; Stefanovic, Cedomir Pubished in: I E E E Communications Letters DOI (ink to pubication from Pubisher): 10.1109/LCOMM.2014.2387166

More information

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014 5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 014 Topoogy-Transparent Scheduing in Mobie Ad Hoc Networks With Mutipe Packet Reception Capabiity Yiming Liu, Member, IEEE,

More information

Modeling the Time Varying Behavior of Mobile Ad-Hoc Networks

Modeling the Time Varying Behavior of Mobile Ad-Hoc Networks Modeing the Time Varying Behavior of Mobie Ad-Hoc Networks David Tipper University of Pittsburgh 5 N. Beefied Avenue Pittsburgh, PA UA 560 (4) 64-94 tipper@tee.pitt.edu Yi Qian University of Puerto Rico

More information

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study

More information

On coding for reliable communication over packet networks

On coding for reliable communication over packet networks Physica Communication 1 (2008) 3 20 Fu ength artice www.esevier.com/ocate/phycom On coding for reiabe communication over packet networks Desmond S. Lun a,1, Murie Médard a,, Raf Koetter b,2, Michee Effros

More information

Research of Classification based on Deep Neural Network

Research of  Classification based on Deep Neural Network 2018 Internationa Conference on Sensor Network and Computer Engineering (ICSNCE 2018) Research of Emai Cassification based on Deep Neura Network Wang Yawen Schoo of Computer Science and Engineering Xi

More information

High-Quality Unstructured Volume Rendering on the PC Platform

High-Quality Unstructured Volume Rendering on the PC Platform High-Quaity Unstructured Voume Rendering on the PC Patorm Stean Guthe, Wogang Strasser WSI/GRIS University o Tuebingen Stean Röttger, Andreas Schieber, Thomas Ert II/VIS University o Stuttgart Hardware

More information

index.pdf March 17,

index.pdf March 17, index.pdf March 17, 2013 1 ITI 1121. Introduction to omputing II Marce Turcotte Schoo of Eectrica Engineering and omputer Science Linked List (Part 2) Tai pointer ouby inked ist ummy node Version of March

More information

Multiple Plane Phase Retrieval Based On Inverse Regularized Imaging and Discrete Diffraction Transform

Multiple Plane Phase Retrieval Based On Inverse Regularized Imaging and Discrete Diffraction Transform Mutipe Pane Phase Retrieva Based On Inverse Reguaried Imaging and Discrete Diffraction Transform Artem Migukin, Vadimir Katkovnik, and Jaakko Astoa Department of Signa Processing, Tampere University of

More information

An inexact optimization approach for river water-quality management

An inexact optimization approach for river water-quality management Journa of Environmenta Management 81 (2006) 233 248 www.esevier.com/ocate/jenvman An inexact optimization approach for river water-quaity management Subhankar Karmakar, P.P. Mujumdar Department of Civi

More information

Automatic Grouping for Social Networks CS229 Project Report

Automatic Grouping for Social Networks CS229 Project Report Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct

More information

TSR: Topology Reduction from Tree to Star Data Grids

TSR: Topology Reduction from Tree to Star Data Grids 03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen

More information

Chemical-Mechanical Polishing Aware Application-Specific 3D NoC Design

Chemical-Mechanical Polishing Aware Application-Specific 3D NoC Design Chemica-Mechanica oishing ware ppication-specific 3D NoC Design Wooyoung Jang, Ou He *, Jae-Seok Yang, and David Z. an SoC atform Deveopment Team, Samsung Eectronics, Yongin-City, South Korea * IBM System

More information

Alternate Paths for Multiple Fault Tolerance on Dynamic WDM Optical Networks

Alternate Paths for Multiple Fault Tolerance on Dynamic WDM Optical Networks Aternate Paths for Mutipe Faut Toerance on Dynamic WDM Optica Networks Nicoas Jara, Reinado Vaejos, Gerardo Rubino To cite this version: Nicoas Jara, Reinado Vaejos, Gerardo Rubino. Aternate Paths for

More information

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations Formuation of Loss minimization Probem Using Genetic Agorithm and Line-Fow-based Equations Sharanya Jaganathan, Student Member, IEEE, Arun Sekar, Senior Member, IEEE, and Wenzhong Gao, Senior member, IEEE

More information

Jacobian Range Space

Jacobian Range Space Kinematic Redundanc A manipuator ma have more DOFs than are necessar to contro a desired variabe What do ou do w/ the etra DOFs? However, even if the manipuator has enough DOFs, it ma sti be unabe to contro

More information

A Two-Step Approach to Hallucinating Faces: Global Parametric Model and Local Nonparametric Model

A Two-Step Approach to Hallucinating Faces: Global Parametric Model and Local Nonparametric Model A Two-Step Approach to aucinating Faces: Goba Parametric Mode and Loca Nonparametric Mode Ce Liu eung-yeung Shum Chang-Shui Zhang State Key Lab of nteigent Technoogy and Systems, Dept. of Automation, Tsinghua

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

PCT: Partial Co-Alignment of Social Networks

PCT: Partial Co-Alignment of Social Networks PCT: Partia Co-Aignment of Socia Networks Jiawei Zhang University of Iinois at Chicago Chicago, IL, USA jzhan9@uicedu Phiip S Yu University of Iinois at Chicago, IL, USA Institute for Data Science Tsinghua

More information

Linearity of Saturation for Berge Hypergraphs

Linearity of Saturation for Berge Hypergraphs Linearity of Saturation for Berge Hypergraphs Sean Engish Dánie Gerbner Abhishek Methuku Michae Tait Juy 18, 2018 Abstract For a graph F, we say a hypergraph H is Berge-F if it can be obtained from F be

More information

Massively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks.

Massively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks. assivey Parae Part of Speech Tagging Using in-ax oduar Neura Networks Bao-Liang Lu y, Qing a z, ichinori Ichikawa y, & Hitoshi Isahara z y Lab. for Brain-Operative Device, Brain Science Institute, RIEN

More information

Fuzzy Perceptual Watermarking For Ownership Verification

Fuzzy Perceptual Watermarking For Ownership Verification Fuzzy Perceptua Watermarking For Ownership Verification Mukesh Motwani 1 and Frederick C. Harris, Jr. 1 1 Computer Science & Engineering Department, University of Nevada, Reno, NV, USA Abstract - An adaptive

More information

Supply Chain Network Design Heuristics for Capacitated Facilities under Risk of Supply Disruptions

Supply Chain Network Design Heuristics for Capacitated Facilities under Risk of Supply Disruptions Suppy Chain Network Design Heuristics for Capacitated Faciities under Risk of Suppy Disruptions AiReza Madadi *, Mary E. Kurz, Scott J. Mason, Kevin M. Taaffe Department of Industria Engineering, Cemson

More information

MULTITASK MULTIVARIATE COMMON SPARSE REPRESENTATIONS FOR ROBUST MULTIMODAL BIOMETRICS RECOGNITION. Heng Zhang, Vishal M. Patel and Rama Chellappa

MULTITASK MULTIVARIATE COMMON SPARSE REPRESENTATIONS FOR ROBUST MULTIMODAL BIOMETRICS RECOGNITION. Heng Zhang, Vishal M. Patel and Rama Chellappa MULTITASK MULTIVARIATE COMMON SPARSE REPRESENTATIONS FOR ROBUST MULTIMODAL BIOMETRICS RECOGNITION Heng Zhang, Visha M. Pate and Rama Cheappa Center for Automation Research University of Maryand, Coage

More information

An improved distributed version of Han s method for distributed MPC of canal systems

An improved distributed version of Han s method for distributed MPC of canal systems Deft University of Technoogy Deft Center for Systems and Contro Technica report 10-013 An improved distributed version of Han s method for distributed MPC of cana systems M.D. Doan, T. Keviczky, and B.

More information