ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega

Size: px
Start display at page:

Download "ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega"

Transcription

1 ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES Eya En Gad, Akshay Gadde, A. Saman Avestimehr and Antonio Ortega Department of Eectrica Engineering University of Southern Caifornia, Los Angees ABSTRACT This paper studies graph-based active earning, where the goa is to reconstruct a binary signa defined on the nodes of a weighted graph, by samping it on a sma subset of the nodes. A new samping agorithm is proposed, which sequentiay seects the graph nodes to be samped, based on an aggressive search for the boundary of the signa over the graph. The agorithm generaizes a recent method for samping nodes in unweighted graphs. The generaization improves the samping performance using the information gained from the avaiabe graph weights. An anaysis of the number of sampes required by the proposed agorithm is provided, and the gain over the unweighted method is further demonstrated in simuations. Additionay, the proposed method is compared with an aternative stateof-the-art method, which is based on the graph s spectra properties. It is shown that the proposed method significanty outperforms the spectra samping method, if the signa needs to be predicted with high accuracy. On the other hand, if a higher eve of inaccuracy is toerabe, then the spectra method outperforms the proposed aggressive search method. Consequenty, we propose a hybrid method, which is shown to combine the advantages of both approaches. Index Terms active earning on graphs, adaptive and nonadaptive samping of graph signas, samping compexity 1. INTRODUCTION This paper studies the probem of binary abe prediction on a graph. In this probem, we are given a graph G = (V, E), where the edges E (which can be weighted) capture the simiarity reationship between the objects represented by the nodes V. Each node has an initiay unknown abe associated with it, given by a signa f : V { 1, +1}. The goa is to reconstruct the entire signa by samping its vaues on a sma subset of the nodes. This is achievabe when the signa bears some degree of smoothness over the graph, which means that simiar objects are more ikey to have the same abe. Active earning aims to minimize the number of sampes needed by seecting the most informative nodes. This probem arises in many machine earning appications, where there is an abundance of unabeed data but abeed data is scarce and expensive to obtain, for exampe, requiring human expertise or eaborate experiments. Active earning is an effective way to minimize the cost of abeing in such scenarios [1]. A graph based approach to this probem starts by creating a graph where the nodes correspond to the data points X = {x 1,..., x n} and the edges capture the simiarity between them. Typicay, a sparse graph which connects each data point to few of its most simiar neighbors is used. This work is supported in part by NSF under grants CCF-1419 and CCF The unknown abes f i { 1, +1} associated with the data points define a binary function on the nodes. In datasets of interest, the signa is often notaby smooth on the graph. There are two approaches to active earning on graphs. The first approach focuses on identifying the nodes near the boundary region, where the signa changes from +1 to 1. The methods with this approach [2, 3] sampe nodes sequentiay, i.e., the nodes to be samped next are chosen based on the graph structure as we as previousy observed signa vaues. The second approach [4, 5, 6], in contrast, utiizes goba properties of the graph in order to identify the most informative nodes, and sampe them a at once. Such goba approaches usuay focus on providing a good approximation of the signa, rather than exact recovery. It is aso possibe to combine the two approaches, for exampe, as in [7]. The first contribution of this paper is a new samping agorithm, caed weighted S 2 which takes the boundary samping approach. The weighted S 2 agorithm is a generaization of a recenty proposed agorithm caed S 2 [2], which is defined ony for the case of unweighted edges. The purpose of the generaized agorithm is to take advantage of the additiona information avaiabe in the form of the edge weights, in order to reduce the samping compexity. We characterize the samping budget required for signa recovery by the weighted S 2 agorithm, as a function of the compexity of the signa with respect to the graph. We expain how this generaization can be usefu in reducing samping compexity, and demonstrate a significant reduction (neary 25% in one dataset), when neighboring nodes of opposite abes are consideraby ess simiar to each other than identicay abeed neighbors. We further compare the samping compexity of the weighted S 2 agorithm with an aternative state-of-the-art method caed the cutoff maximization method [4]. Unike the S 2 methods, which aim for a compete recovery of the signa by aggressivey searching for the boundary nodes, the cutoff maximization method is focused ony on providing a good approximation of the signa by ensuring that the unsamped nodes are we-connected to the samped nodes [8]. This method finds a samping set by optimizing a spectra function defined using the graph Lapacian. We perform the comparison on three reaistic data sets, and observe two interesting resuts: 1. The cutoff maximization method does not discover the entire boundary (i.e, nodes with oppositey abeed neighbors) uness the samping set contains amost a the nodes. In contrast, the number of nodes required by the S 2 methods to discover the boundary is not consideraby arger than the number of boundary nodes. 2. When the samping budget is quite imited, the cutoff maximization method provides a much better approximation of the signa. There exists a threshod in terms of the samping budget that determines which method offers better accuracy. Conversey, the toerabe degree of inaccuracy determines which of the methods offer ower samping compexity.

2 Motivated by the second observation, we propose a hybrid approach (simiar in spirit to [7]) which sampes the first few nodes with the cutoff maximization method to approximate the boundary and then switches to the weighted S 2 method to refine the approximation. The experiments suggest that the hybrid approach combines the advantages of both methods. 2. S 2 ALGORITHM FOR WEIGHTED GRAPHS The S 2 agorithm was proposed in [2] for unweighted graphs. In this section we describe the principe of the agorithm, and then generaize the agorithm to weighted graphs. In the next section we anayze the query compexity of the generaized agorithm Origina S 2 Agorithm The goa of the agorithm is to find the signa f. To do this, the agorithm operates by finding the edges that connect oppositey abeed nodes. These edges are caed cut edges, and together the set of cut edges is caed the cut. The agorithm incrementay identifies the cut, with the rationae that once the entire cut is identified, the signa is competey recovered. To find the cut, the agorithm maintains a copy of the graph G, and each time it sampes a node that neighbors previousy samped nodes of opposite abe, it removes the newy discovered cut edges from the graph copy. This way, the remaining graph copy contains ony the undiscovered part of the cut, and the agorithm can more easiy focus on discovering these edges. The main idea of the agorithm is to ook for a pair of oppositey abeed nodes, and then to find the cut edge on the shortest path between the nodes, using a binary search procedure. The agorithm begins with a random samping phase. At this phase the agorithm queries a random node, according to the uniform distribution. After each sampe, the agorithm checks whether the samped node has any previousy samped neighbors of opposite abe. If such neighbors exist, then the connecting edges are newy discovered cut edges, and they are removed from the graph. After checking and potentiay removing newy discovered cut edges, the agorithm checks whether the remaining graph contains any pair of connected nodes of opposite abes. If no such pair exists, the agorithm proceeds with a random sampe. If pairs of connected, oppositey abeed nodes do exist, the agorithm ooks for the shortest path among a the paths connecting such pairs, and sampe the node in the midde of that path (breaking ties arbitrariy). After each samping operation, either a random sampe or a bisecting sampe, the agorithm again removes a newy discovered cut edges. The S 2 agorithm is described more formay in Agorithm 1. The agorithm is given a budget, which determines the number of queries to perform. Once the budget is exhausted, the agorithm cas a abe competion function, which predicts the abes of the unsamped nodes. Severa such abe competion agorithms are known, such as the POCS method in [9]. The S 2 agorithm uses a function caed Midde Shortest Path (MSP), which returns the node in the midde of the shortest path among a the paths connecting a pair of oppositey abes nodes in the remaining graph Generaization for Weighted Graphs The S 2 agorithm in [2] is defined ony for unweighted graphs. Since many earning scenarios provide a weighted graph, we extend the agorithm to expoit the additiona avaiabe information by modifying the MSP function in the agorithm. Our modification is based on the assumption that the signa is smooth, which means that high-weight edges connect mosty nodes of the same abe. Therefore, the weight of cut edges is generay ow. Agorithm 1 S 2 Agorithm Inputs: Graph G, BUDGET n. 1: L 2: whie 1 do 3: x Randomy chosen unabeed node. 4: do 5: Add (x, f(x)) to L. 6: Remove newy discovered cut edges from G. 7: if L = BUDGET then 8: return LabeCompetion(G, L) 9: end if 1: whie x MSP(G,L) exists 11: end whie Fig. 1: An iustration of advantage of weighted S 2 over unweighted S 2. In the unweighted S 2 agorithm, each MSP query reduces the number of nodes in the shortest of the paths between any two oppositey abeed nodes by approximatey one haf. The main idea in our generaization is to take advantage of the ow weights of cut edges in order to reduce this number by more than a haf with each query. To do this, we first switch our perspective, for convenience, from the edge weights to the distances associated with the edges, which are inversey proportiona to the weights. The distance between nonneighboring nodes is defined as the sum of the engths of the edges in the shortest path connecting the nodes. Since the weights are a decreasing function of the distances, it foows that cut edges are typicay onger than other edges. We take advantage of this fact by modifying the MSP function to sampe the node cosest to the midpoint of the path, where the midpoint is computed in terms of ength, rather than the number of edges in the path. With each query, the proposed samping rue can potentiay reduce the number of nodes aong the shortest of the paths between any two oppositey abeed nodes by more than haf if the cut edges contribute significanty more than the non-cut edges to the ength of the path. Thus, utimatey it requires ess sampes to discover a cut edge. This intuition is demonstrated in Figure 1. In this exampe, the nodes abeed +1 are connected with an edge of ength /2, the nodes abeed 1 are connected with an edge of ength and the cut edge is of ength 3. Given the abes of the end nodes of this path, the binary search phase of the unweighted S 2 agorithm needs to sampe abes of 3 extra nodes to discover the cut edge. The weighted S 2 agorithm, on the other hand, finds the cut edge with ony 2 sampes. This type of situation arises more prominenty in an unbaanced data set, where the number of nodes in one cass is much arger than the other. The advantage of weighted S 2 agorithm in such a case is experimentay verified in Section ANALYSIS OF THE WEIGHTED S 2 ALGORITHM 3.1. Notation Note that f partitions the vertices of G into a coection of connected components with identicay abeed vertices. Let V 1, V 2,..., V k be these k connected components. Notice that the first node that S 2 queries in each coection V i is often queried randomy, and not by a bisection query. Define V i β min 1 i k n.

3 Fig. 2: The interva of interest is at east haved after two queries. If β is sma, more random queries are required by S 2. Let C be the set of cut edges in G. The ength of the shortest cut edge in G is denoted by cut. Let C be the set of nodes which share an edge with at east one oppositey abeed node. The nodes in C are caed boundary nodes. For 1 i < j k, et C i,j be the subset of C for which each edge {x, y} C i,j satisfies x V i and y V j. If C i,j is not empty for some 1 i < j k, then it is caed a cut component. The number of cut components is denoted by m. For a pair of nodes v 1 and v 2, et d(v 1, v 2) denote the ength of the shortest path between v 1 and v 2. Define n = max v1,v 2 V d(v 1, v 2) Cut Custering For nodes x, y V, et d G (x, y) be the ength of the shortest path connecting x and y in G. Let e 1 = {x 1, y 1} and e 2 = {x 2, y 2} be a pair of cut edges in G such that f(x 1) = f(x 2) and f(y 1) = f(y 2). Define δ(e 1, e 2) = d G C (x 1, x 2) + d G C (y 1, y 2) + max{ e1, e2 }, where G C is the graph G with a the cut edges removed. Let H r = (C, E) be the meta graph whose nodes are the cut edges of G, and {e, e } E iff δ(e, e ) r. Let κ be the smaest number for which H κ has m connected components. The motivation for the definition of κ is demonstrated in the foowing emma. Lemma 1. Consider a case in which after the remova of an edge e by the weighted S 2 agorithm, there exist an undiscovered cut edge e in the same cut component of e. Then the ength of the shortest path between two oppositey abeed nodes in the remaining graph is at most κ. Proof. Consider the connected component of the meta graph H κ that contains the removed cut edge (as a meta node). By the assumptions of the emma, there must be at east one meta edge in this connected component that connects a discovered cut edge to an undiscovered cut edge. This meta edge corresponds to a path ength at most κ in the remaining graph, proving the emma Query Compexity Theorem 1. Suppose that a graph G = (V, E) and a signa f are such that the induced cut set C has m components with cut custering κ. Then for any ɛ >, the weighted S 2 wi recover C with probabiity at east 1 ɛ if the BUDGET is at east m 2 og 2 ( n cut +( C m) 2 og 2 ( κ cut + og(1/(βɛ)) og(1/(1 β)). The proof of Theorem 1 uses the fact that after a pair of connected and oppositey abeed nodes is found, the number of queries unti a boundary node is samped is at most ogarithmic in (/ cut), where is the ength of the path between the nodes. We show this fact in the foowing emma. Lemma 2. The ( cut-edge of ength cut is found after no more than r = 2 og 2 aggressive steps. cut Proof. In Figure 2, et C and D denote the queried nodes, such that C is samped first. Let E denote the midpoint of the interva between A and B, where there may not be a node. By considering a the cases based on abes of C and D and their positions reative to E, it can be shown that after two queries, the ength of the interva of interest (i.e., the interva containing the cut-edge) is at east haved. The detais are omitted in the interest of space. After i (where i is even) queries, the ength of the interva of interest is at most. Note that the cut-edge is found when the 2 ength of the interva i/2 of interest is ess than or equa to cut. If r is the maximum number of queries required to ocate the cut-edge, then = cut r = 2r/2 2 og 2 ( cut Proof of Theorem 1. The random samping phase foows the same argument as in [2], which gives the term og(1/(βɛ)). og(1/(1 β)) A sequence of bisection queries that commences after a random query or an edge remova, and terminates with an edge remova, is ca a run. In each run, at east one boundary node is being queried. Therefore, the number of runs is no greater than C. In each cut component, after the first cut edge and boundary node are discovered, ( the rest of the boundary nodes are discovered in 2 og κ 2 cut queries each, according to Lemmas 1 and 2. For discovering the first cut edge in each cut ( components, we triviay bound the number of queries by 2 og n 2 cut. Since there are m cut components, we bound the tota number of bisection queries by ( ( n κ m 2 og 2 + ( C m) 2 og 2. cut cut 4. EXPERIMENTS We consider the foowing graph based cassification probems: 1. USPS handwritten digit recognition [1]: For our experiments, we consider two binary cassification sub-probems, namey, 7 vs. 9 and 2 vs. 4, consisting of 2 randomy seected images of each cass represented as vectors of dimension 256. The distance between two data points is d(i, j) = x i x j. An unweighted graph G is constructed by connecting a pair of nodes (i, j) if j is a k-nearest neighbor (k-nn with k = 4) 1 of i or vice versa. A weighted dissimiarity graph G d is defined to have the same topoogy as G but the weight associated with edge (i, j) is set to d(i, j). A weighted simiarity graph G w is defined to have the same topoogy as G but the weight associated with edge (i, j) is set to w(i, j) = exp ( d(i, j) 2 /2σ 2). The parameter σ is set to be 1/3-rd of the average distance to the k-th nearest neighbor for a datapoints. 2. Newsgroups text cassification [11]: For our experiments, we consider a binary cassification sub-probem Baseba vs. Hockey, where each cass contains 2 randomy seected documents. Each document i is represented by a 3 dimensiona vector x i whose eements are the tf-idf statistics of the 3 most frequent words in the dataset [8]. The cosine simiarity between a pair data points (i, j) is given by w(i, j) = x i,x j x i x j. The distance between them is defined as d(i, j) = 1 w(i, j) 2. The k-nn unweighted graph G (with k = 4), the dissimiarity graph G d and the simiarity graph G w are constructed using these distance and simiarity measures as in the previous exampe. 1 Due to ack of space, we do not study the effect of k in detai. (1)

4 Tabe 1: Number of sampes needed to discover a the cut edges. S 2 methods invove random samping. Average over 3 trias is reported. mean( Data n C C cut) mean( non-cut) n switch Two circes v v Baseba v Hockey Cassification error Cassification error Cassification error Number of sampes (a) 7 v Number of sampes (b) 2 v. 4 Fig. 3: Cassification error against the number of samped nodes Number of sampes (c) Baseba v. Hockey Fig. 4: A synthetic two circes dataset In addition to the above datasets, we generate a synthetic two circes dataset, shown in Figure 4, in order to demonstrate the advantage of weighted S 2 over unweighted S 2. It contains 9 points in one cass (marked red) eveny distributed on the inner circe of mean radius 1 and variance.5 and 1 points in the second cass (marked bue) on the outer circe of mean radius 1.1 and variance.45. A 4-nn graph is constructed using the Eucidean distance between the coordinates of the points. We compare the performance of the foowing active earning methods: (1) unweighted S 2 method [2] with graph G, (2) weighted S 2 method with dissimiarity graph G d, (3) cutoff maximization method [8] with simiarity graph G w and (4) a hybrid approach combining cutoff maximization and weighted S 2 method. After the nodes seected by each method have been samped, we reconstruct the unknown abe signa using the approximate POCS based bandimited reconstruction scheme [8] to get the soft abes. We threshod these soft abes to get the fina abe predictions. The hybrid approach uses the non-adaptive cutoff maximization approach in the beginning and switches to the weighted S 2 method after samping a certain number of nodes n switch. In order to determine n switch, after samping the i-th node with the cutoff method, we compute 1 ˆf i,ˆf i 1, where ˆf i denotes the vector of predicted soft abes. Once this vaue fas beow beow.1, indicating that ˆf i ˆf i 1 the e newy added abe ony marginay changed the predictions, hybrid approach switches to weighted S 2. Tabe 1 ists the number of sampes required by each of the samping methods to discover a the cut edges using the observed abes. It shows that weighted S 2 can reduce the sampe compexity significanty (by 25%) compared to unweighted S 2 if the ratio of mean ength of cut edges and mean ength of non-cut edges is high as is the case in the unbaanced two circes dataset. In rest of the datasets, the gain offered by weighted S 2 is negigibe since the cut edges are ony sighty onger than non-cut edges and as a resut, taking engths into account in the bisection phase does not offer much advantage. We aso observe that the number of sampes required by the weighted S 2 method is cose to the size of the cut C in most of the datasets. Tabe 1 aso shows that the adaptive methods S 2 and weighted S 2 are very efficient at recovering the entire cut exacty, compared to the non-adaptive cutoff maximization method. In practice, it is not necessary to reconstruct the signa exacty and some reconstruction error is aowed. Figure 3 pots the cassification error against the number of samped nodes. It shows that the cassification error of the cutoff maximization method decreases rapidy in the eary stages of samping when very few sampes are observed. However, the decrease is sow in ater stages of samping. S 2 methods, on the other hand, are good at reducing the error in the ater stages, but performs poory with ony a few sampes. The figure aso shows that the hybrid method performs as we as the better method in each region. 5. CONCLUSIONS The paper generaizes the S 2 agorithm for the case of weighted graphs. The samping compexity of the generaized agorithm is anayzed, and the gain over the unweighted version is demonstrated by simuation. Additiona experiments identify the region of toerabe reconstruction error in which the S 2 agorithms outperforms a graph frequency based goba approach. A hybrid approach is proposed with the advantages of both methods. It remains open to anayticay characterize of the gain of the weighted S 2 method over the unweighted version. Another interesting avenue for future work is to provide a performance anaysis for the spectra samping method which can suggest an optima switching criterion for the hybrid method.

5 6. REFERENCES [1] Burr Settes, Active earning iterature survey, Computer Sciences Technica Report 1648, University of Wisconsin Madison, 21. [2] Gautam Dasarathy, Robert Nowak, and Xiaojin Zhu, S 2 : An efficient graph based active earning agorithm with appication to nonparametric cassification, Journa of Machine Learning Research, vo. 4, pp. 1 2, 215. [3] Xiaojin Zhu, John Lafferty, and Zoubin Ghahramani, Combining active earning and semi-supervised earning using gaussian fieds and harmonic functions, in ICML 23 workshop on the continuum from abeed to unabeed data in machine earning and data mining, 23, pp [4] A. Anis, A. Gadde, and A. Ortega, Towards a samping theorem for signas on arbitrary graphs, in Acoustics, Speech and Signa Processing (ICASSP), IEEE Internationa Conference on, 214. [5] M. Ji and J. Han, A variance minimization criterion to active earning on graphs, in Internationa Conference on Artificia Inteigence and Statistics (AISTATS), 212, vo. 22, pp [6] Andrew Guiory and Jeff Bimes, Active semi-supervised earning using submoduar functions, in Proceedings of 27th Conference on Uncertainty in Artificia Inteigence, 211, pp [7] Thomas Osugi, Deng Kim, and Stephen Scott, Baancing exporation and expoitation: A new agorithm for active machine earning, in Data Mining, Fifth IEEE Internationa Conference on. IEEE, 25, pp. 8 pp. [8] A. Gadde, A. Anis, and A. Ortega, Active semi-supervised earning using samping theory for graph signas, in ACM SIGKDD Internationa Conference on Knowedge Discovery and Data Mining, 214, pp [9] S. K. Narang, A. Gadde, E. Sanou, and A. Ortega, Locaized iterative methods for interpoation in graph structured data, in Signa and Information Processing (GobaSIP), IEEE Goba Conference on, 213. [1] USPS handwritten digits data, edu/ roweis/data.htm. [11] 2 newsgroups data, jason/ 2Newsgroups/.

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions 2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing

More information

Image Segmentation Using Semi-Supervised k-means

Image Segmentation Using Semi-Supervised k-means I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging

More information

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

Automatic Grouping for Social Networks CS229 Project Report

Automatic Grouping for Social Networks CS229 Project Report Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct

More information

Alpha labelings of straight simple polyominal caterpillars

Alpha labelings of straight simple polyominal caterpillars Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.

More information

Automatic Hidden Web Database Classification

Automatic Hidden Web Database Classification Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

Chapter Multidimensional Direct Search Method

Chapter Multidimensional Direct Search Method Chapter 09.03 Mutidimensiona Direct Search Method After reading this chapter, you shoud be abe to:. Understand the fundamentas of the mutidimensiona direct search methods. Understand how the coordinate

More information

MACHINE learning techniques can, automatically,

MACHINE learning techniques can, automatically, Proceedings of Internationa Joint Conference on Neura Networks, Daas, Texas, USA, August 4-9, 203 High Leve Data Cassification Based on Network Entropy Fiipe Aves Neto and Liang Zhao Abstract Traditiona

More information

Semi-Supervised Learning with Sparse Distributed Representations

Semi-Supervised Learning with Sparse Distributed Representations Semi-Supervised Learning with Sparse Distributed Representations David Zieger dzieger@stanford.edu CS 229 Fina Project 1 Introduction For many machine earning appications, abeed data may be very difficut

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

Searching, Sorting & Analysis

Searching, Sorting & Analysis Searching, Sorting & Anaysis Unit 2 Chapter 8 CS 2308 Fa 2018 Ji Seaman 1 Definitions of Search and Sort Search: find a given item in an array, return the index of the item, or -1 if not found. Sort: rearrange

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University Arithmetic Coding Prof. Ja-Ling Wu Department of Computer Science and Information Engineering Nationa Taiwan University F(X) Shannon-Fano-Eias Coding W..o.g. we can take X={,,,m}. Assume p()>0 for a. The

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study

More information

Performance of data networks with random links

Performance of data networks with random links Performance of data networks with random inks arxiv:adap-org/9909006 v2 4 Jan 2001 Henryk Fukś and Anna T. Lawniczak Department of Mathematics and Statistics, University of Gueph, Gueph, Ontario N1G 2W1,

More information

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

Forgot to compute the new centroids (-1); error in centroid computations (-1); incorrect clustering results (-2 points); more than 2 errors: 0 points.

Forgot to compute the new centroids (-1); error in centroid computations (-1); incorrect clustering results (-2 points); more than 2 errors: 0 points. Probem 1 a. K means is ony capabe of discovering shapes that are convex poygons [1] Cannot discover X shape because X is not convex. [1] DBSCAN can discover X shape. [1] b. K-means is prototype based and

More information

Layer-Specific Adaptive Learning Rates for Deep Networks

Layer-Specific Adaptive Learning Rates for Deep Networks Layer-Specific Adaptive Learning Rates for Deep Networks arxiv:1510.04609v1 [cs.cv] 15 Oct 2015 Bharat Singh, Soham De, Yangmuzi Zhang, Thomas Godstein, and Gavin Tayor Department of Computer Science Department

More information

A Robust Sign Language Recognition System with Sparsely Labeled Instances Using Wi-Fi Signals

A Robust Sign Language Recognition System with Sparsely Labeled Instances Using Wi-Fi Signals A Robust Sign Language Recognition System with Sparsey Labeed Instances Using Wi-Fi Signas Jiacheng Shang, Jie Wu Center for Networked Computing Dept. of Computer and Info. Sciences Tempe University Motivation

More information

Priority Queueing for Packets with Two Characteristics

Priority Queueing for Packets with Two Characteristics 1 Priority Queueing for Packets with Two Characteristics Pave Chuprikov, Sergey I. Nikoenko, Aex Davydow, Kiri Kogan Abstract Modern network eements are increasingy required to dea with heterogeneous traffic.

More information

An Exponential Time 2-Approximation Algorithm for Bandwidth

An Exponential Time 2-Approximation Algorithm for Bandwidth An Exponentia Time 2-Approximation Agorithm for Bandwidth Martin Fürer 1, Serge Gaspers 2, Shiva Prasad Kasiviswanathan 3 1 Computer Science and Engineering, Pennsyvania State University, furer@cse.psu.edu

More information

Coupling Web Usage Mining with Content Mining for Recommendation Systems

Coupling Web Usage Mining with Content Mining for Recommendation Systems Couping Web Usage Mining with Content Mining for Recommendation Systems Rehab Duwairi Department of Computer Science and Engineering Qatar Uniersity Qatar Rehab.Duwairi@qu.edu.qa Ebraheem Ehaddad Department

More information

Space-Time Trade-offs.

Space-Time Trade-offs. Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe

More information

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM 17th European Signa Processing Conference (EUSIPCO 2009) Gasgow, Scotand, August 24-28, 2009 THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM P. Murray 1, S. Marsha 1, and E.Buinger 2 1 Dept. of Eectronic

More information

Sparse Representation based Face Recognition with Limited Labeled Samples

Sparse Representation based Face Recognition with Limited Labeled Samples Sparse Representation based Face Recognition with Limited Labeed Sampes Vijay Kumar, Anoop Namboodiri, C.V. Jawahar Center for Visua Information Technoogy, IIIT Hyderabad, India Abstract Sparse representations

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

Transformation Invariance in Pattern Recognition: Tangent Distance and Propagation

Transformation Invariance in Pattern Recognition: Tangent Distance and Propagation Transformation Invariance in Pattern Recognition: Tangent Distance and Propagation Patrice Y. Simard, 1 Yann A. Le Cun, 2 John S. Denker, 2 Bernard Victorri 3 1 Microsoft Research, 1 Microsoft Way, Redmond,

More information

M. Badent 1, E. Di Giacomo 2, G. Liotta 2

M. Badent 1, E. Di Giacomo 2, G. Liotta 2 DIEI Dipartimento di Ingegneria Eettronica e de informazione RT 005-06 Drawing Coored Graphs on Coored Points M. Badent 1, E. Di Giacomo 2, G. Liotta 2 1 University of Konstanz 2 Università di Perugia

More information

Fastest-Path Computation

Fastest-Path Computation Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) botton@poms.uc.ac.be Bernard

More information

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER!

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER! [1,2] have, in theory, revoutionized cryptography. Unfortunatey, athough offer many advantages over conventiona and authentication), such cock synchronization in this appication due to the arge operand

More information

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER Internationa Journa on Technica and Physica Probems of Engineering (IJTPE) Pubished by Internationa Organization of IOTPE ISSN 077-358 IJTPE Journa www.iotpe.com ijtpe@iotpe.com September 014 Issue 0 Voume

More information

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism Backing-up Fuzzy Contro of a Truck-traier Equipped with a Kingpin Siding Mechanism G. Siamantas and S. Manesis Eectrica & Computer Engineering Dept., University of Patras, Patras, Greece gsiama@upatras.gr;stam.manesis@ece.upatras.gr

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints *

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG

More information

Multi-level Shape Recognition based on Wavelet-Transform. Modulus Maxima

Multi-level Shape Recognition based on Wavelet-Transform. Modulus Maxima uti-eve Shape Recognition based on Waveet-Transform oduus axima Faouzi Aaya Cheikh, Azhar Quddus and oncef Gabbouj Tampere University of Technoogy (TUT), Signa Processing aboratory, P.O. Box 553, FIN-33101

More information

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong

More information

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models On Upper Bounds for Assortment Optimization under the Mixture of Mutinomia Logit Modes Sumit Kunnumka September 30, 2014 Abstract The assortment optimization probem under the mixture of mutinomia ogit

More information

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014 5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 014 Topoogy-Transparent Scheduing in Mobie Ad Hoc Networks With Mutipe Packet Reception Capabiity Yiming Liu, Member, IEEE,

More information

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed

More information

GPU Implementation of Parallel SVM as Applied to Intrusion Detection System

GPU Implementation of Parallel SVM as Applied to Intrusion Detection System GPU Impementation of Parae SVM as Appied to Intrusion Detection System Sudarshan Hiray Research Schoar, Department of Computer Engineering, Vishwakarma Institute of Technoogy, Pune, India sdhiray7@gmai.com

More information

l Tree: set of nodes and directed edges l Parent: source node of directed edge l Child: terminal node of directed edge

l Tree: set of nodes and directed edges l Parent: source node of directed edge l Child: terminal node of directed edge Trees & Heaps Week 12 Gaddis: 20 Weiss: 21.1-3 CS 5301 Fa 2016 Ji Seaman 1 Tree: non-recursive definition Tree: set of nodes and directed edges - root: one node is distinguished as the root - Every node

More information

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters Optimization and Appication of Support Vector Machine Based on SVM Agorithm Parameters YAN Hui-feng 1, WANG Wei-feng 1, LIU Jie 2 1 ChongQing University of Posts and Teecom 400065, China 2 Schoo Of Civi

More information

A Petrel Plugin for Surface Modeling

A Petrel Plugin for Surface Modeling A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica

More information

Quality of Service Evaluations of Multicast Streaming Protocols *

Quality of Service Evaluations of Multicast Streaming Protocols * Quaity of Service Evauations of Muticast Streaming Protocos Haonan Tan Derek L. Eager Mary. Vernon Hongfei Guo omputer Sciences Department University of Wisconsin-Madison, USA {haonan, vernon, guo}@cs.wisc.edu

More information

Distinct Sampling on Streaming Data with Near-Duplicates*

Distinct Sampling on Streaming Data with Near-Duplicates* Distinct Samping on Streaming Data with Near-Dupicates* ABSTRACT Jiecao Chen Indiana University Boomington Boomington, IN, USA jiecchen@umai.iu.edu In this paper we study how to perform distinct samping

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Scheduing Announcement Homework 2 due on October 25th Project 1 due on October 26th 2 CSE 120 Scheduing and Deadock Scheduing Overview In discussing

More information

A probabilistic fuzzy method for emitter identification based on genetic algorithm

A probabilistic fuzzy method for emitter identification based on genetic algorithm A probabitic fuzzy method for emitter identification based on genetic agorithm Xia Chen, Weidong Hu, Hongwen Yang, Min Tang ATR Key Lab, Coege of Eectronic Science and Engineering Nationa University of

More information

Outline. Introduce yourself!! What is Machine Learning? What is CAP-5610 about? Class information and logistics

Outline. Introduce yourself!! What is Machine Learning? What is CAP-5610 about? Class information and logistics Outine Introduce yoursef!! What is Machine Learning? What is CAP-5610 about? Cass information and ogistics Lecture Notes for E Apaydın 2010 Introduction to Machine Learning 2e The MIT Press (V1.0) About

More information

On-Chip CNN Accelerator for Image Super-Resolution

On-Chip CNN Accelerator for Image Super-Resolution On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement

More information

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Nattawut Thepayasuwan, Member, IEEE and Aex Doboi, Member, IEEE Abstract

More information

Community-Aware Opportunistic Routing in Mobile Social Networks

Community-Aware Opportunistic Routing in Mobile Social Networks IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract

More information

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages Fuzzy Equivaence Reation Based Custering and Its Use to Restructuring Websites Hyperinks and Web Pages Dimitris K. Kardaras,*, Xenia J. Mamakou, and Bi Karakostas 2 Business Informatics Laboratory, Dept.

More information

Binarized support vector machines

Binarized support vector machines Universidad Caros III de Madrid Repositorio instituciona e-archivo Departamento de Estadística http://e-archivo.uc3m.es DES - Working Papers. Statistics and Econometrics. WS 2007-11 Binarized support vector

More information

A Novel Method for Early Software Quality Prediction Based on Support Vector Machine

A Novel Method for Early Software Quality Prediction Based on Support Vector Machine A Nove Method for Eary Software Quaity Prediction Based on Support Vector Machine Fei Xing 1,PingGuo 1;2, and Michae R. Lyu 2 1 Department of Computer Science Beijing Norma University, Beijing, 1875, China

More information

Understanding the Mixing Patterns of Social Networks: The Impact of Cores, Link Directions, and Dynamics

Understanding the Mixing Patterns of Social Networks: The Impact of Cores, Link Directions, and Dynamics Understanding the Mixing Patterns of Socia Networks: The Impact of Cores, Link Directions, and Dynamics [Last revised on May 22, 2011] Abedeaziz Mohaisen Huy Tran Nichoas Hopper Yongdae Kim University

More information

MCSE Training Guide: Windows Architecture and Memory

MCSE Training Guide: Windows Architecture and Memory MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the

More information

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs Repication of Virtua Network Functions: Optimizing Link Utiization and Resource Costs Francisco Carpio, Wogang Bziuk and Admea Jukan Technische Universität Braunschweig, Germany Emai:{f.carpio, w.bziuk,

More information

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:

More information

CERIAS Tech Report Replicated Parallel I/O without Additional Scheduling Costs by Mikhail J. Atallah Center for Education and Research

CERIAS Tech Report Replicated Parallel I/O without Additional Scheduling Costs by Mikhail J. Atallah Center for Education and Research CERIAS Tech Report 2003-50 Repicated Parae I/O without Additiona Scheduing Costs by Mikhai J. Ataah Center for Education and Research Information Assurance and Security Purdue University, West Lafayette,

More information

Stereo Matching with Energy Minimizing Snake Grid for 3D Face Modeling

Stereo Matching with Energy Minimizing Snake Grid for 3D Face Modeling Stereo Matching with Energy Minimizing Snake Grid for 3D Face Modeing Shafik Huq 1, Besma Abidi 1, Ardeshir Goshtasby 2, and Mongi Abidi 1 1 Imaging, Robotics, and Inteigent System (IRIS) Laboratory, Department

More information

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department

More information

Published in: Proc. IEEE International Conference on Acoustics, Speech and Signal Processing, April, 2003

Published in: Proc. IEEE International Conference on Acoustics, Speech and Signal Processing, April, 2003 Aaborg Universitet Compressed Domain Packet Loss Conceament of Sinusoiday Coded Speech Rødbro, Christoffer Asgaard; Christensen, Mads Græsbø; Andersen, Søren Vang; Jensen, Søren Hodt Pubished in: Proc.

More information

Sample of a training manual for a software tool

Sample of a training manual for a software tool Sampe of a training manua for a software too We use FogBugz for tracking bugs discovered in RAPPID. I wrote this manua as a training too for instructing the programmers and engineers in the use of FogBugz.

More information

OF SCIENTIFIC DATABASES

OF SCIENTIFIC DATABASES CHAR4mCS OF SCIENTIFIC DATABASES Arie Shoshani, Frank Oken, and Harry K.T. Wong Computer Science Research Department University of Caifornia, Lawrence Berkeey Laboratory Berkeey, Caifornia 94720 The purpose

More information

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction

More information

(0,l) (0,0) (l,0) (l,l)

(0,l) (0,0) (l,0) (l,l) Parae Domain Decomposition and Load Baancing Using Space-Fiing Curves Srinivas Auru Fatih E. Sevigen Dept. of CS Schoo of EECS New Mexico State University Syracuse University Las Cruces, NM 88003-8001

More information

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Y.LI AND B.BHANU CAMERA ASSIGNMENT: A GAME-THEORETIC

More information

Delay Budget Partitioning to Maximize Network Resource Usage Efficiency

Delay Budget Partitioning to Maximize Network Resource Usage Efficiency Deay Budget Partitioning to Maximize Network Resource Usage Efficiency Kartik Gopaan Tzi-cker Chiueh Yow-Jian Lin Forida State University Stony Brook University Tecordia Technoogies kartik@cs.fsu.edu chiueh@cs.sunysb.edu

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

Further Concepts in Geometry

Further Concepts in Geometry ppendix F Further oncepts in Geometry F. Exporing ongruence and Simiarity Identifying ongruent Figures Identifying Simiar Figures Reading and Using Definitions ongruent Trianges assifying Trianges Identifying

More information

Silhouette Partitioning for Height Field Ray Tracing

Silhouette Partitioning for Height Field Ray Tracing Sihouette Partitioning for Height Fied Ray Tracing Tomas Sakaauskas Vinius University Naugarduko 24, Lithuania,03225,Vinius tomas.sakaauskas@prewise.t ABSTRACT This paper presents parae agorithm to ray

More information

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network Service Chain (SC) Mapping with Mutipe SC Instances in a Wide Area Network This is a preprint eectronic version of the artice submitted to IEEE GobeCom 2017 Abhishek Gupta, Brigitte Jaumard, Massimo Tornatore,

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

Hour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model

Hour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model Hour 3: The Network Access Layer Page 1 of 10 Hour 3: The Network Access Layer At the base of the TCP/IP protoco stack is the Network Access ayer, the coection of services and specifications that provide

More information

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM JOINT IMAGE REGISTRATION AND AMPLE-BASED SUPER-RESOLUTION ALGORITHM Hyo-Song Kim, Jeyong Shin, and Rae-Hong Park Department of Eectronic Engineering, Schoo of Engineering, Sogang University 35 Baekbeom-ro,

More information

Cross-layer Design for Efficient Resource Utilization in WiMedia UWB-based WPANs

Cross-layer Design for Efficient Resource Utilization in WiMedia UWB-based WPANs Cross-ayer Design for Efficient Resource Utiization in WiMedia UWB-based WPANs RAED AL-ZUBI and MARWAN KRUNZ Department of Eectrica and Computer Engineering. University of Arizona. Utra-wideband (UWB)

More information

IJOART. Copyright 2013 SciResPub. Shri Venkateshwara University, Institute of Computer & Information Science. India. Uttar Pradesh, India

IJOART. Copyright 2013 SciResPub. Shri Venkateshwara University, Institute of Computer & Information Science. India. Uttar Pradesh, India Internationa Journa of Advancements in Research & Technoogy, Voume, Issue 6, June-04 ISSN 78-7763 89 Pattern assification for andwritten Marathi haracters using Gradient Descent of Distributed error with

More information

A Two-Step Approach to Hallucinating Faces: Global Parametric Model and Local Nonparametric Model

A Two-Step Approach to Hallucinating Faces: Global Parametric Model and Local Nonparametric Model A Two-Step Approach to aucinating Faces: Goba Parametric Mode and Loca Nonparametric Mode Ce Liu eung-yeung Shum Chang-Shui Zhang State Key Lab of nteigent Technoogy and Systems, Dept. of Automation, Tsinghua

More information

Pattern Matching. a b a c a a b. a b a c a b. a b a c a b

Pattern Matching. a b a c a a b. a b a c a b. a b a c a b Pattern Matching a b a c a a b 1 a b a c a b 4 3 2 a b a c a b Strings A string is a seuence of characters Exampes of strings: n Python program n HTML document n DNA seuence n Digitized image An aphabet

More information

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162 oward Efficient Spatia Variation Decomposition via Sparse Regression Wangyang Zhang, Karthik Baakrishnan, Xin Li, Duane Boning and Rob Rutenbar 3 Carnegie Meon University, Pittsburgh, PA 53, wangyan@ece.cmu.edu,

More information

Conflict graph-based Markovian model to estimate throughput in unsaturated IEEE networks

Conflict graph-based Markovian model to estimate throughput in unsaturated IEEE networks Confict graph-based Markovian mode to estimate throughput in unsaturated IEEE 802 networks Marija STOJANOVA Thomas BEGIN Anthony BUSSON marijastojanova@ens-yonfr thomasbegin@ens-yonfr anthonybusson@ens-yonfr

More information

Comparative Analysis of Relevance for SVM-Based Interactive Document Retrieval

Comparative Analysis of Relevance for SVM-Based Interactive Document Retrieval Comparative Anaysis for SVM-Based Interactive Document Retrieva Paper: Comparative Anaysis of Reevance for SVM-Based Interactive Document Retrieva Hiroshi Murata, Takashi Onoda, and Seiji Yamada Centra

More information

Incremental Discovery of Object Parts in Video Sequences

Incremental Discovery of Object Parts in Video Sequences Incrementa Discovery of Object Parts in Video Sequences Stéphane Drouin, Patrick Hébert and Marc Parizeau Computer Vision and Systems Laboratory, Department of Eectrica and Computer Engineering Lava University,

More information

Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering

Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering Kin-Hon Ho, Michae Howarth, Ning Wang, George Pavou and Styianos Georgouas Centre for Communication Systems Research, University

More information

Solutions to the Final Exam

Solutions to the Final Exam CS/Math 24: Intro to Discrete Math 5//2 Instructor: Dieter van Mekebeek Soutions to the Fina Exam Probem Let D be the set of a peope. From the definition of R we see that (x, y) R if and ony if x is a

More information

Fast b-matching via Sufficient Selection Belief Propagation

Fast b-matching via Sufficient Selection Belief Propagation Fast b-matching via Sufficient Seection Beief Propagation Bert Huang Computer Science Department Coumbia University New York, NY 127 bert@cs.coumbia.edu Tony Jebara Computer Science Department Coumbia

More information

Fast b-matching via Sufficient Selection Belief Propagation

Fast b-matching via Sufficient Selection Belief Propagation Bert Huang Computer Science Department Coumbia University New York, NY 127 bert@cs.coumbia.edu Tony Jebara Computer Science Department Coumbia University New York, NY 127 jebara@cs.coumbia.edu Abstract

More information

Multi-task hidden Markov modeling of spectrogram feature from radar high-resolution range profiles

Multi-task hidden Markov modeling of spectrogram feature from radar high-resolution range profiles http://asp.eurasipjournas.com/content/22//86 RESEARCH Open Access Muti-task hidden Markov modeing of spectrogram feature from radar high-resoution range profies Mian Pan, Lan Du *, Penghui Wang, Hongwei

More information