cell 1 cell 2 cell 3 cell 4 a a

Size: px
Start display at page:

Download "cell 1 cell 2 cell 3 cell 4 a a"

Transcription

1 Frequency Assignment for Cellulr Mobile Systems Using Constrint Stisfction Techniques Mkoto Yokooy nd Ktsutoshi Hirymz y NTT Communiction Science Lbortories -4 Hikridi, Seik-cho, Sorku-gun, Kyoto Jpn e-mil: yokoo@cslb.kecl.ntt.co.jp, z Kobe University of Mercntile Mrine 5-- Fuke-minmi-mchi, Higshind-ku, Kobe , Jpn e-mil: hirym@ti.kshosen.c.jp, Abstrct - This pper presents new lgorithm for solving frequency ssignment problems in cellulr mobile systems using constrint stisfction techniques. The chrcteristics of this lgorithm re s follows: ) insted of representing ech cll in cell ( unit re in providing communiction services) s vrible, we represent cell (which hs multiple clls) s vrible tht hs very lrge domin, nd determine vrible vlue step by step, ) powerful cell-ordering heuristic is introduced, 3) brnch-nd-bound serch tht incorportes forwrdchecking is performed, nd 4) the limited discrepncy serch isintroduced to improve the chnce of nding solution in limited mount of serch. Experimentl evlutions using stndrd benchmrk problems show tht this lgorithm cn nd optiml or semi-optiml solutions for these problems, nd most of the obtined solutions re better thn or equivlent to those of existing methods using simulted nneling, tbu serch, or neurl networks. These results show tht stte-of-the-rt constrint stisfction/optimiztion techniques re cpble of solving relistic ppliction problems when equipped with n pproprite problem representtion nd heuristics. I. Introduction With growth in the demnd of mobile telephone services, the ecient use of vilble spectrums is becoming incresingly importnt. The studies of frequency ssignment problem (lso clled chnnel ssignment problem) in cellulr mobile systems hve long history [], [6], [7], [4], [5]. Vrious AI techniques, including constrint stisfction, simulted nneling, neurl networks, tbu serch, nd GA, hve been pplied to this problem [], [4], [5], [8], []{[3], [6]. An overview of frequency ssignment problem is s follows. There exists set of geogrphiclly divided, typiclly hexgonl regions clled cells. Frequencies (chnnels) must be ssigned to ech cell ccording to the number of cll requests. There exist following three types of electro-mgnetic seprtion constrints. co-chnnel constrint: the sme frequency cnnot be ssigned to pirs of the cells tht re geogrphiclly close to ech other. djcent chnnel constrint: similr frequencies cnnot be simultneously ssigned to djcent cells. co-site constrint: ny pir of frequencies ssigned to the sme cell must hve certin seprtion. The gol is to nd frequency ssignment tht stis- es the bove constrints using minimum number of frequencies (more precisely, using the minimum spn of the frequencies). It must be noted tht there exist severl vritions of frequency ssignment problems. The benchmrk problems provided by the EUCLID-project Combintoril ALgorithms for Militry Applictions (CALMA) project re well-known in the constrint stisfction/optimiztion reserch community. This type of problem rises from militry ppliction, nd geogrphicl informtion including cells is not described in the problem speciction. Constrint stisfction/optimiztion techniques cn solve thistype of problem quite eciently. On the other hnd, ccording to [6], constrint stisfction techniques re not very eective for solving frequency ssignment problems discussed in this pper. The most strightforwrd wy for solving such problems using constrint stisfction techniques would be to represent ech cll s vrible (whose domin is vilble frequencies), then to solve the problem s generlized grph-coloring problem. However, solving rel-life, lrge-scle problems using this simple formultion seems rther dicult without voiding the symmetries between clls within one cell. In our new lgorithm, insted of representing ech cllsvrible, we represent cell s vrible tht hs very lrge domin. Furthermore, we determine the vrible vlue step by step insted of determining vrible vlue t one time. A stndrd method for solving constrintoptimiztion problems, such s prtil constrint stisfction problems [3], is depth-rst brnch-nd-bound The benchmrk problems nd technicl reports re vilble from ftp://ftp.win.tue.nl/pub/techreports/calma/

2 serch lgorithm. In brnch-nd-bound serch, we usully ssume the existence of heuristic function tht evlutes node in serch tree. This function estimtes the qulity ofthe solutions tht exist under the node in the serch tree. However, creting good heuristic function (i.e., estimting the number of required frequencies) is rther dicult in frequency ssignment problems. To solve problems eciently without good heuristic function, we use limited discrepncy serch techniques [0], [7] so tht the lgorithm cn limit the serch eorts to only the prt of the serch tree where solution is likely to exist. In this pper, we show the forml denition of the problem in Section II, then describe the lgorithm tht utilizes constrint stisfction techniques in Section III. Furthermore, we show experimentl evlutions using stndrd benchmrk problems in Section IV, nd discuss the reltion to other reserch in Section V. II. Frequency Assignment Problem A frequency ssignment problem is formlized s follows. We follow the formliztion used in [5], [6], [], [3], [5], [6]. Frequencies re represented by positive integers ; ; 3;:::. Given: Find: N: the number of cells d i, i N: the number of requested clls (demnds) in cell i c ij, i; j N: the frequency seprtion required between cll in cell i nd cll in cell j f ik, i N, k d i : the frequency ssigned to the kth cll in cell i. such tht, subject to the seprtion constrints, j f ik 0 f jl j c ij, for ll i; j; k; l except for i = j nd k = l, minimize mxf ik for ll i; k. These constrints cn be represented s n N N symmetric comptibility mtrix C. In ddition, set of requested clls cn be represented by n N-element demnd vector D. Exmple. The number of cells is N =4, C = 0 B@ CA B@ ; D = 3 CA : Positive integers (frequencies) must be ssigned to f ik,such tht their mximum is minimum, subject to the seprtion constrints C. In this exmple, there exist constrints between cell nd cell, cell nd cell 4, cell 3 nd cell 4, nmely, the required minimum seprtions re 3,, nd, respectively. In ddition, frequency ssignment problem cn be represented using grph. Figure shows grph representing problem in Exmple (co-site constrints re not described in the grph). In this grph, vertex represents cell, nd n edge represents constrint between cells. The number in the vertex represents the number of cll requests of the cell (d i ), nd the weight of n edge represents required seprtion (c ij ). This grph representtion is clled mcro-grph [4]. III. Algorithm A. Bsic Algorithm cell cell 3 3 cell 3 cell 4 Fig.. Exmple of Mcro-grph We re going to describe the bsic lgorithm developed in this pper. In this lgorithm, we rst x the number of vilble frequencies M to certin upper-bound, then nd n ssignment tht stises given seprtion constrints nd set of constrints f ik M for ll i; k using bcktrcking lgorithm. When solution is found, we setm to mxf ik 0, where f ik re frequencies used in the obtined solution, nd continue the serch process. This lgorithm cn be considered s depth-rst brnch-nd-bound lgorithm. In this lgorithm, there exists n M-element vector for ech cell. An element of this vector represents one frequency, where vlue cn be \ssigned" (the frequency is used t the cell) or \not-ssigned" (the frequency is not used). Figure shows n exmple of these vectors for the problem described in Exmple. A blnk element is \not-ssigned", nd \" mens \ssigned". This is n optiml ssignment for this problem. By using this representtion, the domin size of vrible becomes M. Since this size will be very lrge, determining the vector vlue of cell t one time is not prcticl. Therefore, we determine the vector vlue step by step. We introduce tenttive vlues used during the serch process for ech vector Such n upper-bound cn be obtined using the heuristic sequentil methods described in [5].

3 cell cell cell 3 cell Fig.. Exmple of Cell Representtion element. Avector element cn be one of the following three vlues, \ssigned", \free", or \forbidden". The vlue \ssigned" mens the frequency is used t the cell, \forbidden" mens the frequency cnnot be used t the cell due to seprtion constrints, nd \free" mens the frequency is vilble t the cell. We show the outline of the bsic lgorithm in Figure 3. In the initil stte, ll vector elements of cell re free, nd stck is empty. This lgorithm is bsiclly depth-rst brnch-nd-bound lgorithm tht incorportes forwrd-checking [9]. Therefore, s long s the cell-ordering heuristic nd the frequencyordering heuristic re exhustive, this lgorithm cn eventully nd n optiml solution. The worst-cse time complexity iso(m S ), where M init init is P the initil upper-bound of frequencies, nd S = i= d N i. B. Cell-ordering Heuristic Now, we re going to describe the cell-ordering heuristic used in Step 3 of the min procedure. A commonly used rule of thumb for selecting vrible in constrint stisfction problems is to select the vrible tht is most strongly constrined. For exmple, we cn select the vrible with the smllest domin fter constrint propgtion. A simple extension of this heuristic clcultes the verge number of free frequencies per one cll for ech cell. More speciclly, let us represent the number of vector elements tht re \ssigned" for cell i s ssign i, nd the number of vector elements tht re \free" s free i. We clculte the vlue free i =(d i 0 ssign i ) for ech celli (we cll this vlue verge vilble frequencies, AAF), nd select the cell with the smllest AAF. For exmple, when selecting cell in Exmple, AAF is / for cell nd cell 3, for cell, /3 for cell 4. As result, cell 4 is selected rst. However, we found tht using only the AAF heuristic is not very eective. This is becuse it tends to select cell tht simply hs mny demnds in the shllow serch nodes in the serch tree, nd does not ppropritely consider the strength of the constrints mong cells. For exmple, let us consider the sitution fter ssigning frequencies of three clls of cell 4 (Figure 4). In the gure, \x" mens vector element tht becomes \forbidden". In this cse, the AAF for min procedure. If the demnds re fully stised for ll cells, then solution is found, cll procedure reduce-frequency. Go to Step of this procedure.. If demnd cnnot be stised for cell, cll procedure bcktrck, go to Step of this procedure. 3. Select cell whose demnds re not fully stised using cell-ordering heuristic. 4. Select frequency for ssigning one cll of cell using frequency-ordering heuristic, nd set the vector element of the cell corresponding to frequency to \ssigned". Push (\choice", cell, frequency) tostck. Propgte constrints, i.e., set the vectorelements tht interfere with frequency of cell to \forbidden". Go to Step of this procedure. procedure bcktrck. If stck is empty, then there is no solution. Finish the lgorithm nd return bestsolution.. Pop n element (g, cell, frequency) from stck. 3. If g=\choice", then set the vector element of the cell corresponding to frequency to \forbidden", unpropgte constrints. Push (\forbidden", cell, frequency) to stck, nd nish this procedure. 4. If g=\forbidden", set the vector element of the cell corresponding to frequency to \free". Go to Step of this procedure. procedure reduce-frequency. Record the current ssignment s bestsolution.. Set mx-frequency to the mximl frequency used in the current ssignment. 3. If no cell uses mx-frequency, for ech cell, set ech vector element lrger thn or equl to mx-frequency to \forbidden", set M to mx-frequency0, nish this procedure. 4. Pop n element (g, cell, frequency) from stck. 5. If g=\choice", then set the vector element of the cell corresponding to frequency to \free", unpropgte constrints. Go to Step 3 of this procedure. 6. If g=\forbidden", set the vector element of the cell corresponding to frequency to \free". Go to Step 3 of this procedure. Fig. 3. Bsic Algorithm

4 both cell nd cell 3 is 4. However, selecting cell 3 does not help to reduce the serch spce, since it does not hve ny constrints between other cells except cell 4, which is lredy fully ssigned. To tke into ccount the strength of constrints mong cells, we inventednevlution vlue for cell i clled generlized weighted degree (GWD) dened s follows. X c ij (ssign j +) j In this formul, ssign j is the number of ssigned frequencies of nother cell j, ndc ij is the weight of the edge 3. We select the cell tht hs the mximl GWD vlue. For exmple, in Figure 4, the GWD for cell is, while the GWD for cell 3 is 4. Therefore, we prefer cell to cell 3. However, we found tht using only the GWD heuristic is lso not very eective since it does not tke into ccount the demnds, nd it tends to mke poor decisions in the deep serch nodes in the serch tree. Thus, we decided to combine these two heuristics. Since we prefer cell with smller AAF nd lrger GWD, we use the evlution vlue obtined by AAF/GWD, nd select the cell with miniml AAF/GWD. cell cell cell 3 cell x x x x x x x x x x x xxx xxxx Fig. 4. Cell Sttus during Serch Process C. Frequency-ordering Heuristic We re going to describe the frequency-ordering heuristic used in Step 4 in the min procedure. The simplest wy would be to select the rst (smllest) free frequency (rst-free). A more sophisticted method would be to consider the impct of selecting frequency for other cells. Nmely, for ech frequency, we clculte the number of vector elements of other cells tht turn from \free" to \forbidden" by selecting the frequency, nd select the one tht minimizes this vlue (lest-impct). If the number of frequencies is lrge, this clcultion cn be very costly. However, we cn reduce the number of possibilities using co-site constrints. For exmple, let us ssume we re selecting the rst frequency for cell 4 in Exmple, nd the number of possible frequencies is. Since there re three demnds for cell 4, we cnnot ssign frequencies lrger 3 We dd one to ssignj, otherwise this vlue becomes 0 for ll cells in the initil stte. thn 6 for the second cll, otherwise there is no free frequency for the third cll. Then, if we ssign 6 to the second cll, we hve only one possibility, i.e., for the rst cll. We found tht the lest-impct heuristic is more powerful thn the rst-free heuristic in nding solution. On the other hnd, the rst-free heuristic cn nd better solution ( solution with smller mximl frequency) if it cn nd solution. Therefore, in our lgorithm, we rst use the rst-free heuristic in the 0-discrepncy serch described in the next subsection. When the 0-discrepncy serch fils to nd solution, we switch to the lest-impct heuristic. D. Limiting Serch Eorts Although this method uses constrint propgtion (forwrd-checking) to reduce the serch spce, the serch tree of rel-life, lrge-scle problem is still too lrge to perform n exhustive serch. We need to limit the serch eorts to only the prt of the serch tree where solution is likely to exist. One method for limiting the serch eorts is the limited discrepncy serch [0]. In the limited discrepncy serch, the serch process initilly chooses only the best nodes ccording to given heuristic t ech decision point in serch tree (this is clled 0- discrepncy serch). If solution cnnot be obtined by the 0-discrepncy serch, the serch process is llowed to select sub-optiml node only once t decision point (-discrepncy serch). If solution cnnot be obtined, then the serch process is llowed to select sub-optiml nodes twice (-discrepncy serch). The number of llowed discrepncies is incresed one by one. In our lgorithm, we limit the number of discrepncies for the frequency selection (in Step 4 of the min procedure). More speciclly, if solution cnnot be found by selecting the best frequencies ccording to the frequency-ordering heuristic, the serch process is llowed to choose the second-best or the thirdbest frequencies. The originl limited discrepncy serch lgorithm is developed for serching binry tree, i.e., the brnching fctor is two. As shown in [0], there re severl lterntives for modifying the limited discrepncy serch lgorithm to non-binry serch tree. In our lgorithm, we weight discrepncies depending on the order in the heuristic, i.e., the second-best vlue is counted s -discrepncy, nd the third-best vlue is counted s -discrepncy. If the current limit of discrepncies is, the lgorithm is llowed to choose third-best vlue once, or choose the second-best vlue twice 4. Furthermore, since the lest-impct heuristic is less informtive in shllow nodes in the serch tree, we use 4 Another wy istocountllvlues except the best s - discrepncy. This is not prcticl in our frequency ssignment problems since the brnching fctor of tree node cn be very lrge.

5 modied version of the depth-bounded limited discrepncy serch described in [7]. In our lgorithm, discrepncy is llowed only in the nodes whose depth is shllower thn or equl to given depthlimit. In ddition, we introduce modied version of the bounded bcktrcking described in [7] to llow quick recovery from mistkes deep in the tree. In the originl version of the bounded bcktrcking, the lgorithm is llowed to perform bcktrcking up to xed level. However, in the frequency ssignment problems, the brnching fctor of node my vry signicntly. Therefore, llowing xed level of bcktrcking is inpproprite, since the serched subtree cn be too lrge or too smll. Therefore, we set the limit to the totl number of bcktrcking in the subtree. The lgorithm is llowed to perform certin number of bcktrcking in subtree. If the number of bcktrcking exceeds the limit, the subtree is discrded. In Figure 5, we show n exmple of the nodes visited in serch tree. We ssume tht the heuristic prefers left brnches, nd there exists no solution in this serch tree. Furthermore, we ssume the depthlimit is two nd the limit of the totl number ofbck- trcking is one. In the 0-discrepncy serch, the lgorithm follows the left brnches nd reches node, which is ded-end. Since the lgorithm is llowed to perform bcktrcking once, it goes to node, which is nother ded-end. Since the lgorithm reches the limit of bcktrcking, it discrds the subtree nd increses the number of llowed discrepncies. In the -discrepncy serch, the lgorithm rst follows the left, then the right brnch, nd visits node 3 nd node 4. Note tht discrepncies re llowed only t the nodes within the depth-limit. The lgorithm discrds the subtree, nd visits node 5 nd node 6. In the -discrepncy serch, the lgorithm visits node 7 nd node 8. serches including [4]{[6], [], [5], [6]. These problems re formulted bsed on n re in Phildelphi, Pennsylvni. The network consists of cells s shown in Figure 6. There re mny vritions for setting constrints nd demnds. The prmeter settings used in our evlutions re described in Tble I. In the tble, \Nc" mens the squre of required distnce for cochnnel constrints, ssuming tht the distnce between djcent cells is. For exmple, if Nc=, while cell nd cell 5 cn use the sme frequency (the distnce is 4), cell nd cell 4 cnnot (the distnce is 3). \cc" represents the seprtion required for djcent chnnel constrints, nd \c ii " represents co-site constrints. The demnd vectors used in the tble re s follows (cse 3 nd cse 4 re obtined bymultiplying nd 4 to cse, respectively): cse : ( ) cse : ( ) cse 3: ( ) cse 4: ( ) Fig. 6. Cellulr Geometry of Phildelphi Problems depth-limit Fig. 5. Limited Discrepncy Serch with Bounded Bcktrcking IV. Evlutions We use benchmrk problems clled Phildelphi problems, which hve been used widely in previous re- TABLE I Specictions for Phildelphi Problems Instnce Nc cc cii Demnd Vector P 5 cse P 7 5 cse P3 7 cse P4 7 7 cse P5 5 cse P6 7 5 cse P7 7 cse P8 7 7 cse P9 5 cse 3 P0 5 cse 4 Tble II shows the theoreticl lower-bounds reported in [], [5] nd the results obtined with our constrint stisfction method (CS). In this method,

6 to nish the lgorithm execution within resonble mount of time, we set the limit of the visited nodes to 0,000. We terminte the execution when the lgorithm exceeds this limit, nd use the best solution obtined so fr. Also, we set the depth-limit where the discrepncy is llowed to 0, nd the number of llowed bcktrcking to 00. To the extent oftheuthors' knowledge, the best published results for these problems hve been obtined by FASoft [], [6] nd [4]. FASoft is n integrted pckge of vrious methods for solving frequency ssignment problems, such s heuristic sequentil methods, methods using constrint stisfction techniques, Simulted Anneling, GA, tbu serch, etc. We show the results obtined with Simulted Anneling (SA) nd tbu serch (TS) reported in []. These two methods re the most ecient mong the vrious components of FASoft. Furthermore, we show the best results obtined with set of heuristic sequentil methods (SE) reported in [5], nd the results obtined with neurl networks (NN) reported in [4] (\..." in the tble mens tht the result is not reported). As shown in the tble, our lgorithm obtins optiml solutions for the instnces of P, P, P3, P4, P7, P8, P0, nd obtins semi-optiml solutions tht re very close to the optiml for other problem instnces. Moreover, this method cn obtin better or equivlent solutions compred with existing methods for ll problem instnces except P5 (where NN is better), TABLE II Comprison of Solution Qulity (Phildelphi Problems) Instnce Lower CS TS SA SE NN Bound P P P P P P P P P P Furthermore, to exmine the eciency of the proposed lgorithm in lrger-scle problems, we show the evlution results for the benchmrk problems presented in [4], []. There re 7 7 symmetriclly plced cells (49 cells in ll) in these problems. Problem prmeters re described in Tble III, where \c ij " is the miniml frequency seprtion between ny pir of cells whose distnce is less thn p N c, except for djcent cells. The demnd vector is: ( ). This vector is rndomly generted from uniform distribution between 0 nd 30. There re 976 clls in totl. TABLE III Specictions for Kim's Benchmrk Problems Instnce Nc cij cc cii K 7 3 K K TABLE IV Comprison of Solution Qulity (Kim's Benchmrk Problems) Instnce CS NN SE K K K Tble IV shows the results obtined with our new method (CS). The prmeter settings of the lgorithm re identicl to those of the Phildelphi Problems. For comprison, we show the results described in [4], i.e., the results obtined using neurl networks (NN), nd the best results obtined with set of heuristic sequentil methods (SE). Our method obtins much better solutions thn those of NN for K nd K3. Tble V shows the totl execution time of this lgorithm. Although the execution time is obtined by nive LISP implementtion on Sun Ultr 30 Model 300 (Ultr SPARC-II 96MHz), we cn see tht very high-qulity solutions re obtined within resonbly short running time. Since the optimlity of the obtined solution is gurnteed before reching the limit of the visited nodes in P3 nd P4, the execution time for these instnces is very short. It must be noted the primry evlution criterion in these benchmrk problems is the solution qulity. The execution time of the lgorithms seems less importnt nd not often reported in the literture. One reson for this is tht most lgorithms (including our lgorithm) show rpid improvements in the erly stge of the serch process, then the improvements sturte very quickly, nd the solution qulity cnnot be signicntly improved even fter very long execution time (e.g., dy). V. Discussion In [], [6], it is reported tht optiml solutions for the Phildelphi problems cn be obtined using cliques. In this method, mximl or some lrge clique in micro-grph (where ech cll is represented s vertex) is identied rst, then frequencies re ssigned to the clls in the clique. Subsequently, this prtil solution is itertively extended by dding clls to the prtil solution until it becomes complete solution. One drwbck to this method is tht nding the mximl clique is nother NP-complete problem nd time-consuming (note tht micro-grph is much lrger thn mcro-grph). Furthermore, this clique

7 TABLE V Algorithm Execution Time Instnce Execution Time (sec) P 49.3 P 59.4 P3 0. P4 0. P P P P P9.9 P K 79.4 K 33.0 K method is not fully utomted, i.e., it requires humn tril-nd-error selections of cliques nd extension methods. Our method nd this clique method re not mutully exclusive, nmely, our method cn be used for nding prtil solution for the clique nd extending the prtil solution. A mcro-grph is introduced in [4] to solve frequency ssignment problems. However, this method uses mcro-grph not to directly solve problem, but to obtin upper-bounds of the problem. A similr problem representtion used in this pper is introduced in [4], [5] for solving the problem using neurl networks. VI. Conclusion nd Future Issues We hve developed new lgorithm for solving frequency ssignment problems in cellulr mobile systems. This lgorithm is bsiclly depth- rst brnch-nd-bound procedure tht incorportes forwrd-checking. In this lgorithm, we represent cell s vrible with very lrge domin, nd determine the vrible vlue step by step. Furthermore, we hve developed powerful cell-ordering heuristic nd introduced the limited discrepncy serch to cope with lrge-scle problems. Experimentl evlutions using stndrd benchmrk problems showed tht for most of the problem instnces, this lgorithm cn nd better or equivlent solutions compred with existing optimiztion methods. These results imply tht stte-of-the-rt constrint stisfction/optimiztion techniques re cpble of solving relistic ppliction problems, if we choose the pproprite problem representtion nd heuristics. There is plenty of room for improvement in this lgorithm. Currently, vrious lgorithm prmeters (e.g., the depth-limit, the limit of the number of bcktrcking) re djusted by hnd. It would be desirble if these prmeters cn be dynmiclly tuned ccording to the chrcteristics of the solved problem instnces. Our future works lso include introducing locl-consistency lgorithms tht re stronger thn forwrd-checking, introducing the limited discrepncy serch to the cell-ordering heuristic, nd using hybrid type lgorithms of bcktrcking nd itertive improvement (e.g., [8]). References [] Box, F.: A Heuristic Technique for Assignment Frequencies to Mobile Rdio Nets, IEEE Trnsctions on Vehiculr Technology, Vol. 7, No., (978) 57{64 [] Crlsson, M. nd Grindl, M.: Automtic Frequency Assignment for Cellulr Telephones Using Constrint Stisfction Techniques, Proceedings of the Tenth Interntionl Conference on Logic Progrmming (993) 647{663 [3] Freuder, E. C. nd Wllce, R. J.: Prtil Constrint Stisfction, Articil Intelligence, Vol. 58, No. {3, (99) {70 [4] Funbiki, N., Okutni, N., nd Nishikw, S.: A Threestge Heuristic Combined Neurl Network Algorithm for Chnnel Assignment in Cellulr Mobile Systems, IEEE Trnsctions on Vehiculr Technology (000): (to pper) [5] Funbiki, N. nd Tkefuji, Y.: A Neurl Network Prllel Algorithm for Chnnel Assignment Problems in Cellulr Rdio Networks, IEEE Trnsctions on Vehiculr Technology, Vol. 4, No. 4, (99) 430{437 [6] Gmst, A.: Some Lower Bounds for Clss of Frequency Assignment Problems, IEEE Trnsctions on Vehiculr Technology, Vol. 35, No., (986) 8{4 [7] Hle, W. K.: Frequency Assignment: Theory nd Appliction, Proceedings of the IEEE, Vol. 68, No., (980) 497{53 [8] Ho, J. K., Dorne, R., nd Glinier, P.: Tbu Serch for Frequency Assignment in Mobile Rdio Networks, Journl of Heuristics, Vol. 4, (998) 47{6 [9] Hrlick, R. nd Elliot, G. L.: Incresing Tree Serch Eciency for Constrint Stisfction Problems, Articil Intelligence, Vol. 4, (980) 63{33 [0] Hrvey, W. D. nd Ginsberg, M. L.: Limited discrepncy serch, Proceedings of the Fourteenth Interntionl Joint Conference on Articil Intelligence (995) 607{63 [] Hurley, S., Smith, D. H., nd Thiel, S. U.: FASoft: A system for discrete chnnel frequency ssignment, Rdio Science, Vol. 3, No. 5, (997) 9{939 [] Kim, S. nd Kim, S. L.: A Two-Phse Algorithm for Frequency Assignment in Cellulr Mobile Systems, IEEE Trnsctions on Vehiculr Technology, Vol. 43, No. 3, (994) 54{548 [3] Kunz, D.: Chnnel Assignment for Cellulr Rdio Using Neurl Networks, IEEE Trnsctions on Vehiculr Technology, Vol. 40, No., (99) 88{93 [4] Pennotti, R. J. nd Boorstyn, R. R.: Chnnel Assignments for Cellulr Mobile Telecommunictions Systems, Proceedings of Ntionl Telecommunictions Conference (976) 6:5{{6:5{5 [5] Sivrjn, K. N., McEliece, R. J., nd Ketchum, J. W.: Chnnel Assignment in Cellulr Rdio, Proceedings of 39th IEEE Vehiculr Technology Society Conference (989) 846{850 [6] Smith, D. H., Hurley, S., nd Thiel, S. U.: Improving Heuristics for the Frequency Assignment Problem, Europen Journl of Opertionl Reserch, Vol. 07, (998) 76{86 [7] Wlsh, T.: Depth-bounded Discrepncy Serch, Proceedings of the Fifteenth Interntionl Joint Conference on Articil Intelligence (997) 388{393 [8] Yokoo, M.: Wek-commitment Serch for Solving Constrint Stisfction Problems, Proceedings of the Twelfth Ntionl Conference on Articil Intelligence (994) 33{38

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li 2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min

More information

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization An Efficient Divide nd Conquer Algorithm for Exct Hzrd Free Logic Minimiztion J.W.J.M. Rutten, M.R.C.M. Berkelr, C.A.J. vn Eijk, M.A.J. Kolsteren Eindhoven University of Technology Informtion nd Communiction

More information

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric

More information

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,

More information

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search Uninformed Serch [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.] Tody Serch Problems Uninformed Serch Methods

More information

UNIT 11. Query Optimization

UNIT 11. Query Optimization UNIT Query Optimiztion Contents Introduction to Query Optimiztion 2 The Optimiztion Process: An Overview 3 Optimiztion in System R 4 Optimiztion in INGRES 5 Implementing the Join Opertors Wei-Png Yng,

More information

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1.

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1. Answer on Question #5692, Physics, Optics Stte slient fetures of single slit Frunhofer diffrction pttern. The slit is verticl nd illuminted by point source. Also, obtin n expression for intensity distribution

More information

Dynamic Programming. Andreas Klappenecker. [partially based on slides by Prof. Welch] Monday, September 24, 2012

Dynamic Programming. Andreas Klappenecker. [partially based on slides by Prof. Welch] Monday, September 24, 2012 Dynmic Progrmming Andres Klppenecker [prtilly bsed on slides by Prof. Welch] 1 Dynmic Progrmming Optiml substructure An optiml solution to the problem contins within it optiml solutions to subproblems.

More information

CSCI 446: Artificial Intelligence

CSCI 446: Artificial Intelligence CSCI 446: Artificil Intelligence Serch Instructor: Michele Vn Dyne [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.]

More information

Efficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc

Efficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc 4th Ntionl Conference on Electricl, Electronics nd Computer Engineering (NCEECE 2015) Efficient Regulr Expression Grouping Algorithm Bsed on Lbel Propgtion Xi Chen, Shuqio Chenb nd Ming Moc Ntionl Digitl

More information

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016 Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence Winter 2016 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl

More information

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers Mth Modeling Lecture 4: Lgrnge Multipliers Pge 4452 Mthemticl Modeling Lecture 4: Lgrnge Multipliers Lgrnge multipliers re high powered mthemticl technique to find the mximum nd minimum of multidimensionl

More information

Approximation by NURBS with free knots

Approximation by NURBS with free knots pproximtion by NURBS with free knots M Rndrinrivony G Brunnett echnicl University of Chemnitz Fculty of Computer Science Computer Grphics nd Visuliztion Strße der Ntionen 6 97 Chemnitz Germny Emil: mhrvo@informtiktu-chemnitzde

More information

The Distributed Data Access Schemes in Lambda Grid Networks

The Distributed Data Access Schemes in Lambda Grid Networks The Distributed Dt Access Schemes in Lmbd Grid Networks Ryot Usui, Hiroyuki Miygi, Yutk Arkw, Storu Okmoto, nd Noki Ymnk Grdute School of Science for Open nd Environmentl Systems, Keio University, Jpn

More information

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

Alignment of Long Sequences. BMI/CS Spring 2012 Colin Dewey

Alignment of Long Sequences. BMI/CS Spring 2012 Colin Dewey Alignment of Long Sequences BMI/CS 776 www.biostt.wisc.edu/bmi776/ Spring 2012 Colin Dewey cdewey@biostt.wisc.edu Gols for Lecture the key concepts to understnd re the following how lrge-scle lignment

More information

12-B FRACTIONS AND DECIMALS

12-B FRACTIONS AND DECIMALS -B Frctions nd Decimls. () If ll four integers were negtive, their product would be positive, nd so could not equl one of them. If ll four integers were positive, their product would be much greter thn

More information

2 Computing all Intersections of a Set of Segments Line Segment Intersection

2 Computing all Intersections of a Set of Segments Line Segment Intersection 15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design

More information

Computing offsets of freeform curves using quadratic trigonometric splines

Computing offsets of freeform curves using quadratic trigonometric splines Computing offsets of freeform curves using qudrtic trigonometric splines JIULONG GU, JAE-DEUK YUN, YOONG-HO JUNG*, TAE-GYEONG KIM,JEONG-WOON LEE, BONG-JUN KIM School of Mechnicl Engineering Pusn Ntionl

More information

Determining Single Connectivity in Directed Graphs

Determining Single Connectivity in Directed Graphs Determining Single Connectivity in Directed Grphs Adm L. Buchsbum 1 Mrtin C. Crlisle 2 Reserch Report CS-TR-390-92 September 1992 Abstrct In this pper, we consider the problem of determining whether or

More information

Stained Glass Design. Teaching Goals:

Stained Glass Design. Teaching Goals: Stined Glss Design Time required 45-90 minutes Teching Gols: 1. Students pply grphic methods to design vrious shpes on the plne.. Students pply geometric trnsformtions of grphs of functions in order to

More information

10.5 Graphing Quadratic Functions

10.5 Graphing Quadratic Functions 0.5 Grphing Qudrtic Functions Now tht we cn solve qudrtic equtions, we wnt to lern how to grph the function ssocited with the qudrtic eqution. We cll this the qudrtic function. Grphs of Qudrtic Functions

More information

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants A Heuristic Approch for Discovering Reference Models by Mining Process Model Vrints Chen Li 1, Mnfred Reichert 2, nd Andres Wombcher 3 1 Informtion System Group, University of Twente, The Netherlnds lic@cs.utwente.nl

More information

LECT-10, S-1 FP2P08, Javed I.

LECT-10, S-1 FP2P08, Javed I. A Course on Foundtions of Peer-to-Peer Systems & Applictions LECT-10, S-1 CS /799 Foundtion of Peer-to-Peer Applictions & Systems Kent Stte University Dept. of Computer Science www.cs.kent.edu/~jved/clss-p2p08

More information

Elena Baralis, Silvia Chiusano Politecnico di Torino. Pag. 1. Query optimization. DBMS Architecture. Query optimizer. Query optimizer.

Elena Baralis, Silvia Chiusano Politecnico di Torino. Pag. 1. Query optimization. DBMS Architecture. Query optimizer. Query optimizer. DBMS Architecture SQL INSTRUCTION OPTIMIZER Dtbse Mngement Systems MANAGEMENT OF ACCESS METHODS BUFFER MANAGER CONCURRENCY CONTROL RELIABILITY MANAGEMENT Index Files Dt Files System Ctlog DATABASE 2 Query

More information

Vulnerability Analysis of Electric Power Communication Network. Yucong Wu

Vulnerability Analysis of Electric Power Communication Network. Yucong Wu 2nd Interntionl Conference on Advnces in Mechnicl Engineering nd Industril Informtics (AMEII 2016 Vulnerbility Anlysis of Electric Power Communiction Network Yucong Wu Deprtment of Telecommunictions Engineering,

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-169 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

CSEP 573 Artificial Intelligence Winter 2016

CSEP 573 Artificial Intelligence Winter 2016 CSEP 573 Artificil Intelligence Winter 2016 Luke Zettlemoyer Problem Spces nd Serch slides from Dn Klein, Sturt Russell, Andrew Moore, Dn Weld, Pieter Abbeel, Ali Frhdi Outline Agents tht Pln Ahed Serch

More information

Misrepresentation of Preferences

Misrepresentation of Preferences Misrepresenttion of Preferences Gicomo Bonnno Deprtment of Economics, University of Cliforni, Dvis, USA gfbonnno@ucdvis.edu Socil choice functions Arrow s theorem sys tht it is not possible to extrct from

More information

Parallel Square and Cube Computations

Parallel Square and Cube Computations Prllel Squre nd Cube Computtions Albert A. Liddicot nd Michel J. Flynn Computer Systems Lbortory, Deprtment of Electricl Engineering Stnford University Gtes Building 5 Serr Mll, Stnford, CA 945, USA liddicot@stnford.edu

More information

Midterm 2 Sample solution

Midterm 2 Sample solution Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the

More information

Chapter 2 Sensitivity Analysis: Differential Calculus of Models

Chapter 2 Sensitivity Analysis: Differential Calculus of Models Chpter 2 Sensitivity Anlysis: Differentil Clculus of Models Abstrct Models in remote sensing nd in science nd engineering, in generl re, essentilly, functions of discrete model input prmeters, nd/or functionls

More information

A Transportation Problem Analysed by a New Ranking Method

A Transportation Problem Analysed by a New Ranking Method (IJIRSE) Interntionl Journl of Innovtive Reserch in Science & Engineering ISSN (Online) 7-07 A Trnsporttion Problem Anlysed by New Rnking Method Dr. A. Shy Sudh P. Chinthiy Associte Professor PG Scholr

More information

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis On the Detection of Step Edges in Algorithms Bsed on Grdient Vector Anlysis A. Lrr6, E. Montseny Computer Engineering Dept. Universitt Rovir i Virgili Crreter de Slou sin 43006 Trrgon, Spin Emil: lrre@etse.urv.es

More information

Pointwise convergence need not behave well with respect to standard properties such as continuity.

Pointwise convergence need not behave well with respect to standard properties such as continuity. Chpter 3 Uniform Convergence Lecture 9 Sequences of functions re of gret importnce in mny res of pure nd pplied mthemtics, nd their properties cn often be studied in the context of metric spces, s in Exmples

More information

Memory-Optimized Software Synthesis from Dataflow Program Graphs withlargesizedatasamples

Memory-Optimized Software Synthesis from Dataflow Program Graphs withlargesizedatasamples EURSIP Journl on pplied Signl Processing 2003:6, 54 529 c 2003 Hindwi Publishing orportion Memory-Optimized Softwre Synthesis from tflow Progrm Grphs withlrgesizetsmples Hyunok Oh The School of Electricl

More information

A Progressive Register Allocator for Irregular Architectures

A Progressive Register Allocator for Irregular Architectures A Progressive Register Alloctor for Irulr Architectures Dvid Koes nd Seth Copen Goldstein Computer Science Deprtment Crnegie Mellon University {dkoes,seth}@cs.cmu.edu Abstrct Register lloction is one of

More information

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using

More information

A Fast Imaging Algorithm for Near Field SAR

A Fast Imaging Algorithm for Near Field SAR Journl of Computing nd Electronic Informtion Mngement ISSN: 2413-1660 A Fst Imging Algorithm for Ner Field SAR Guoping Chen, Lin Zhng, * College of Optoelectronic Engineering, Chongqing University of Posts

More information

Math 142, Exam 1 Information.

Math 142, Exam 1 Information. Mth 14, Exm 1 Informtion. 9/14/10, LC 41, 9:30-10:45. Exm 1 will be bsed on: Sections 7.1-7.5. The corresponding ssigned homework problems (see http://www.mth.sc.edu/ boyln/sccourses/14f10/14.html) At

More information

On Computation and Resource Management in Networked Embedded Systems

On Computation and Resource Management in Networked Embedded Systems On Computtion nd Resource Mngement in Networed Embedded Systems Soheil Ghisi Krlene Nguyen Elheh Bozorgzdeh Mjid Srrfzdeh Computer Science Deprtment University of Cliforni, Los Angeles, CA 90095 soheil,

More information

Step-Voltage Regulator Model Test System

Step-Voltage Regulator Model Test System IEEE PES GENERAL MEETING, JULY 5 Step-Voltge Regultor Model Test System Md Rejwnur Rshid Mojumdr, Pblo Arboley, Senior Member, IEEE nd Cristin González-Morán, Member, IEEE Abstrct In this pper, 4-node

More information

CSCI1950 Z Computa4onal Methods for Biology Lecture 2. Ben Raphael January 26, hhp://cs.brown.edu/courses/csci1950 z/ Outline

CSCI1950 Z Computa4onal Methods for Biology Lecture 2. Ben Raphael January 26, hhp://cs.brown.edu/courses/csci1950 z/ Outline CSCI1950 Z Comput4onl Methods for Biology Lecture 2 Ben Rphel Jnury 26, 2009 hhp://cs.brown.edu/courses/csci1950 z/ Outline Review of trees. Coun4ng fetures. Chrcter bsed phylogeny Mximum prsimony Mximum

More information

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl component

More information

Digital Design. Chapter 6: Optimizations and Tradeoffs

Digital Design. Chapter 6: Optimizations and Tradeoffs Digitl Design Chpter 6: Optimiztions nd Trdeoffs Slides to ccompny the tetbook Digitl Design, with RTL Design, VHDL, nd Verilog, 2nd Edition, by Frnk Vhid, John Wiley nd Sons Publishers, 2. http://www.ddvhid.com

More information

A Comparison of the Discretization Approach for CST and Discretization Approach for VDM

A Comparison of the Discretization Approach for CST and Discretization Approach for VDM Interntionl Journl of Innovtive Reserch in Advnced Engineering (IJIRAE) Volume1 Issue1 (Mrch 2014) A Comprison of the Discretiztion Approch for CST nd Discretiztion Approch for VDM Omr A. A. Shib Fculty

More information

Improving the Connectivity of Heterogeneous Multi-Hop Wireless Networks

Improving the Connectivity of Heterogeneous Multi-Hop Wireless Networks 1569363897 1 Improving the Connectivity of Heterogeneous Multi-Hop Wireless Networks Te-Hoon Kim, Dvid Tipper, nd Prshnt Krishnmurthy Grdute Networking nd Telecommunictions Progrm University of Pittsburgh,

More information

Abstract. 1 Introduction /04 $20.00 (c) 2004 IEEE

Abstract. 1 Introduction /04 $20.00 (c) 2004 IEEE rithmetic resoning in DPLL-bsed T solving Mrkus Wedler, Dominik toffel, Wolfgng Kunz Dept. of Electricl & Computer Eng., University of Kiserslutern/Germny emil: wedler@eit.uni-kl.de bstrct We propose new

More information

Better Hill-Climbing Searches for Parsimony

Better Hill-Climbing Searches for Parsimony Better Hill-Climbing Serches for Prsimony Gneshkumr Gnpthy, Vijy Rmchndrn, nd Tndy Wrnow Deprtment of Computer Sciences, University of Texs, Austin, TX 78712; gsgk, vlr, tndy @cs.utexs.edu Abstrct. The

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully

More information

ISG: Itemset based Subgraph Mining

ISG: Itemset based Subgraph Mining ISG: Itemset bsed Subgrph Mining by Lini Thoms, Stynryn R Vlluri, Kmlkr Krlplem Report No: IIIT/TR/2009/179 Centre for Dt Engineering Interntionl Institute of Informtion Technology Hyderbd - 500 032, INDIA

More information

A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS

A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS Ji-Eun Roh (), Te-Eog Lee (b) (),(b) Deprtment of Industril nd Systems Engineering, Kore Advnced Institute

More information

A dynamic multicast tree based routing scheme without replication in delay tolerant networks

A dynamic multicast tree based routing scheme without replication in delay tolerant networks Accepted Mnuscript A dynmic multicst tree bsed routing scheme without repliction in dely tolernt networks Yunsheng Wng, Jie Wu PII: S0-()00- DOI: 0.0/j.jpdc.0..00 Reference: YJPDC To pper in: J. Prllel

More information

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork MA1008 Clculus nd Liner Algebr for Engineers Course Notes for Section B Stephen Wills Deprtment of Mthemtics University College Cork s.wills@ucc.ie http://euclid.ucc.ie/pges/stff/wills/teching/m1008/ma1008.html

More information

What are suffix trees?

What are suffix trees? Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl

More information

Eliminating left recursion grammar transformation. The transformed expression grammar

Eliminating left recursion grammar transformation. The transformed expression grammar Eliminting left recursion grmmr trnsformtion Originl! rnsformed! 0 0! 0 α β α α α α α α α α β he two grmmrs generte the sme lnguge, but the one on the right genertes the rst, nd then string of s, using

More information

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. General Tree Search. Uniform Cost. Lecture 3: A* Search 9/4/2007

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. General Tree Search. Uniform Cost. Lecture 3: A* Search 9/4/2007 CS 88: Artificil Intelligence Fll 2007 Lecture : A* Serch 9/4/2007 Dn Klein UC Berkeley Mny slides over the course dpted from either Sturt Russell or Andrew Moore Announcements Sections: New section 06:

More information

2014 Haskell January Test Regular Expressions and Finite Automata

2014 Haskell January Test Regular Expressions and Finite Automata 0 Hskell Jnury Test Regulr Expressions nd Finite Automt This test comprises four prts nd the mximum mrk is 5. Prts I, II nd III re worth 3 of the 5 mrks vilble. The 0 Hskell Progrmming Prize will be wrded

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES GENEATING OTHOIMAGES FO CLOSE-ANGE OBJECTS BY AUTOMATICALLY DETECTING BEAKLINES Efstrtios Stylinidis 1, Lzros Sechidis 1, Petros Ptis 1, Spiros Sptls 2 Aristotle University of Thessloniki 1 Deprtment of

More information

Ma/CS 6b Class 1: Graph Recap

Ma/CS 6b Class 1: Graph Recap M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Adm Sheffer. Office hour: Tuesdys 4pm. dmsh@cltech.edu TA: Victor Kstkin. Office hour: Tuesdys 7pm. 1:00 Mondy, Wednesdy, nd Fridy. http://www.mth.cltech.edu/~2014-15/2term/m006/

More information

II. THE ALGORITHM. A. Depth Map Processing

II. THE ALGORITHM. A. Depth Map Processing Lerning Plnr Geometric Scene Context Using Stereo Vision Pul G. Bumstrck, Bryn D. Brudevold, nd Pul D. Reynolds {pbumstrck,brynb,pulr2}@stnford.edu CS229 Finl Project Report December 15, 2006 Abstrct A

More information

From Dependencies to Evaluation Strategies

From Dependencies to Evaluation Strategies From Dependencies to Evlution Strtegies Possile strtegies: 1 let the user define the evlution order 2 utomtic strtegy sed on the dependencies: use locl dependencies to determine which ttriutes to compute

More information

Intermediate Information Structures

Intermediate Information Structures CPSC 335 Intermedite Informtion Structures LECTURE 13 Suffix Trees Jon Rokne Computer Science University of Clgry Cnd Modified from CMSC 423 - Todd Trengen UMD upd Preprocessing Strings We will look t

More information

Unit 5 Vocabulary. A function is a special relationship where each input has a single output.

Unit 5 Vocabulary. A function is a special relationship where each input has a single output. MODULE 3 Terms Definition Picture/Exmple/Nottion 1 Function Nottion Function nottion is n efficient nd effective wy to write functions of ll types. This nottion llows you to identify the input vlue with

More information

Performance analysis of QoS mechanisms in IP networks

Performance analysis of QoS mechanisms in IP networks University of Wollongong Reserch Online Fculty of Informtics - Ppers (Archive) Fculty of Engineering nd Informtion Sciences 2000 Performnce nlysis of QoS mechnisms in IP networks D. Ji University of Wollongong

More information

9 Graph Cutting Procedures

9 Graph Cutting Procedures 9 Grph Cutting Procedures Lst clss we begn looking t how to embed rbitrry metrics into distributions of trees, nd proved the following theorem due to Brtl (1996): Theorem 9.1 (Brtl (1996)) Given metric

More information

Text mining: bag of words representation and beyond it

Text mining: bag of words representation and beyond it Text mining: bg of words representtion nd beyond it Jsmink Dobš Fculty of Orgniztion nd Informtics University of Zgreb 1 Outline Definition of text mining Vector spce model or Bg of words representtion

More information

Section 3.1: Sequences and Series

Section 3.1: Sequences and Series Section.: Sequences d Series Sequences Let s strt out with the definition of sequence: sequence: ordered list of numbers, often with definite pttern Recll tht in set, order doesn t mtter so this is one

More information

An introduction to model checking

An introduction to model checking An introduction to model checking Slide 1 University of Albert Edmonton July 3rd, 2002 Guy Trembly Dépt d informtique UQAM Outline Wht re forml specifiction nd verifiction methods? Slide 2 Wht is model

More information

L. Yaroslavsky. Fundamentals of Digital Image Processing. Course

L. Yaroslavsky. Fundamentals of Digital Image Processing. Course L. Yroslvsky. Fundmentls of Digitl Imge Processing. Course 0555.330 Lecture. Imge enhncement.. Imge enhncement s n imge processing tsk. Clssifiction of imge enhncement methods Imge enhncement is processing

More information

Introduction to Computer Engineering EECS 203 dickrp/eecs203/ CMOS transmission gate (TG) TG example

Introduction to Computer Engineering EECS 203  dickrp/eecs203/ CMOS transmission gate (TG) TG example Introduction to Computer Engineering EECS 23 http://ziyng.eecs.northwestern.edu/ dickrp/eecs23/ CMOS trnsmission gte TG Instructor: Robert Dick Office: L477 Tech Emil: dickrp@northwestern.edu Phone: 847

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-295 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

Tree Structured Symmetrical Systems of Linear Equations and their Graphical Solution

Tree Structured Symmetrical Systems of Linear Equations and their Graphical Solution Proceedings of the World Congress on Engineering nd Computer Science 4 Vol I WCECS 4, -4 October, 4, Sn Frncisco, USA Tree Structured Symmetricl Systems of Liner Equtions nd their Grphicl Solution Jime

More information

Approximation of Two-Dimensional Rectangle Packing

Approximation of Two-Dimensional Rectangle Packing pproximtion of Two-imensionl Rectngle Pcking Pinhong hen, Yn hen, Mudit Goel, Freddy Mng S70 Project Report, Spring 1999. My 18, 1999 1 Introduction 1-d in pcking nd -d in pcking re clssic NP-complete

More information

Efficient Rerouting Algorithms for Congestion Mitigation

Efficient Rerouting Algorithms for Congestion Mitigation 2009 IEEE Computer Society Annul Symposium on VLSI Efficient Rerouting Algorithms for Congestion Mitigtion M. A. R. Chudhry*, Z. Asd, A. Sprintson, nd J. Hu Deprtment of Electricl nd Computer Engineering

More information

Statistical classification of spatial relationships among mathematical symbols

Statistical classification of spatial relationships among mathematical symbols 2009 10th Interntionl Conference on Document Anlysis nd Recognition Sttisticl clssifiction of sptil reltionships mong mthemticl symbols Wl Aly, Seiichi Uchid Deprtment of Intelligent Systems, Kyushu University

More information

Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network

Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 Revisiting the notion of Origin-Destintion Trffic Mtrix of the Hosts tht re ttched to Switched Locl Are Network Mondy

More information

Ma/CS 6b Class 1: Graph Recap

Ma/CS 6b Class 1: Graph Recap M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Instructor: Adm Sheffer. TA: Cosmin Pohot. 1pm Mondys, Wednesdys, nd Fridys. http://mth.cltech.edu/~2015-16/2term/m006/ Min ook: Introduction to Grph

More information

Section 10.4 Hyperbolas

Section 10.4 Hyperbolas 66 Section 10.4 Hyperbols Objective : Definition of hyperbol & hyperbols centered t (0, 0). The third type of conic we will study is the hyperbol. It is defined in the sme mnner tht we defined the prbol

More information

9.1 apply the distance and midpoint formulas

9.1 apply the distance and midpoint formulas 9.1 pply the distnce nd midpoint formuls DISTANCE FORMULA MIDPOINT FORMULA To find the midpoint between two points x, y nd x y 1 1,, we Exmple 1: Find the distnce between the two points. Then, find the

More information

CHAPTER III IMAGE DEWARPING (CALIBRATION) PROCEDURE

CHAPTER III IMAGE DEWARPING (CALIBRATION) PROCEDURE CHAPTER III IMAGE DEWARPING (CALIBRATION) PROCEDURE 3.1 Scheimpflug Configurtion nd Perspective Distortion Scheimpflug criterion were found out to be the best lyout configurtion for Stereoscopic PIV, becuse

More information

MATH 25 CLASS 5 NOTES, SEP

MATH 25 CLASS 5 NOTES, SEP MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid

More information

Mobile IP route optimization method for a carrier-scale IP network

Mobile IP route optimization method for a carrier-scale IP network Moile IP route optimiztion method for crrier-scle IP network Tkeshi Ihr, Hiroyuki Ohnishi, nd Ysushi Tkgi NTT Network Service Systems Lortories 3-9-11 Midori-cho, Musshino-shi, Tokyo 180-8585, Jpn Phone:

More information

DIFFERENT POLICY OBJECTIVES OF THE ROAD AUTHORITY IN THE OPTIMAL TOLL DESIGN PROBLEM

DIFFERENT POLICY OBJECTIVES OF THE ROAD AUTHORITY IN THE OPTIMAL TOLL DESIGN PROBLEM DIFFERENT POLICY OBJECTIVES OF THE ROAD AUTHORITY IN THE OPTIMAL TOLL DESIGN PROBLEM Dusic Joksimovic*, Michiel Bliemer Delft University of Technology, The Netherlnds ARS Trnsport &Technology, The Netherlnds

More information

A Formalism for Functionality Preserving System Level Transformations

A Formalism for Functionality Preserving System Level Transformations A Formlism for Functionlity Preserving System Level Trnsformtions Smr Abdi Dniel Gjski Center for Embedded Computer Systems UC Irvine Center for Embedded Computer Systems UC Irvine Irvine, CA 92697 Irvine,

More information

Functor (1A) Young Won Lim 10/5/17

Functor (1A) Young Won Lim 10/5/17 Copyright (c) 2016-2017 Young W. Lim. Permission is grnted to copy, distribute nd/or modify this document under the terms of the GNU Free Documenttion License, Version 1.2 or ny lter version published

More information

Representation of Numbers. Number Representation. Representation of Numbers. 32-bit Unsigned Integers 3/24/2014. Fixed point Integer Representation

Representation of Numbers. Number Representation. Representation of Numbers. 32-bit Unsigned Integers 3/24/2014. Fixed point Integer Representation Representtion of Numbers Number Representtion Computer represent ll numbers, other thn integers nd some frctions with imprecision. Numbers re stored in some pproximtion which cn be represented by fixed

More information

ECE 468/573 Midterm 1 September 28, 2012

ECE 468/573 Midterm 1 September 28, 2012 ECE 468/573 Midterm 1 September 28, 2012 Nme:! Purdue emil:! Plese sign the following: I ffirm tht the nswers given on this test re mine nd mine lone. I did not receive help from ny person or mteril (other

More information

Functor (1A) Young Won Lim 8/2/17

Functor (1A) Young Won Lim 8/2/17 Copyright (c) 2016-2017 Young W. Lim. Permission is grnted to copy, distribute nd/or modify this document under the terms of the GNU Free Documenttion License, Version 1.2 or ny lter version published

More information

Data-Flow Prescheduling for Large Instruction Windows in Out-of-Order Processors

Data-Flow Prescheduling for Large Instruction Windows in Out-of-Order Processors Dt-Flow Prescheduling for Lrge Instruction Windows in Out-of-Order Processors Pierre Michud, André Seznec IRISA/INRIA Cmpus de Beulieu, 35 Rennes Cedex, Frnce {pmichud, seznec}@iris.fr Abstrct The performnce

More information

Control-Flow Analysis and Loop Detection

Control-Flow Analysis and Loop Detection ! Control-Flow Anlysis nd Loop Detection!Lst time! PRE!Tody! Control-flow nlysis! Loops! Identifying loops using domintors! Reducibility! Using loop identifiction to identify induction vribles CS553 Lecture

More information

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs. Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online

More information

COMP 423 lecture 11 Jan. 28, 2008

COMP 423 lecture 11 Jan. 28, 2008 COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring

More information

A Priority-based Distributed Call Admission Protocol for Multi-hop Wireless Ad hoc Networks

A Priority-based Distributed Call Admission Protocol for Multi-hop Wireless Ad hoc Networks A Priority-bsed Distributed Cll Admission Protocol for Multi-hop Wireless Ad hoc Networks un Sun Elizbeth M. Belding-Royer Deprtment of Computer Science University of Cliforni, Snt Brbr suny, ebelding

More information

CS 221: Artificial Intelligence Fall 2011

CS 221: Artificial Intelligence Fall 2011 CS 221: Artificil Intelligence Fll 2011 Lecture 2: Serch (Slides from Dn Klein, with help from Sturt Russell, Andrew Moore, Teg Grenger, Peter Norvig) Problem types! Fully observble, deterministic! single-belief-stte

More information

Semistructured Data Management Part 2 - Graph Databases

Semistructured Data Management Part 2 - Graph Databases Semistructured Dt Mngement Prt 2 - Grph Dtbses 2003/4, Krl Aberer, EPFL-SSC, Lbortoire de systèmes d'informtions réprtis Semi-structured Dt - 1 1 Tody's Questions 1. Schems for Semi-structured Dt 2. Grph

More information

resolution have largely concerned ecient clause indexing. One recent exception is

resolution have largely concerned ecient clause indexing. One recent exception is Optimizing Cluse Resolution: Beyond Uniction Fctoring Steven Dwson C.R. Rmkrishnn I.V. Rmkrishnn Terrnce Swift Deprtment of Computer Science Stte University of New ork t Stony Brook Stony Brook, N 11794-4400

More information

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment File Mnger Quick Reference Guide June 2018 Prepred for the Myo Clinic Enterprise Khu Deployment NVIGTION IN FILE MNGER To nvigte in File Mnger, users will mke use of the left pne to nvigte nd further pnes

More information