Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem
|
|
- Lewis Bates
- 6 years ago
- Views:
Transcription
1 Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, Introdution The vertex-over problem is one of a olletion of NP-omplete problems studied atively in the siene ommunity. The problem s solving time is in the worst ase exponential, but the running time varies for different vertex-over realizations. From experimental data, different phases an be identified for the running time and the analysis of vertex-over algorithms bak the observed results up. Interestingly the worst-ase typial average solutions are loated at the x () phase boundary, whih is studied analytially in the book [2] and in the paper [3]. This summary is based on these two douments. We start by giving a short desription of the vertex-over problem and introduing symbols related to the problem. We proeed and introdue a branh-and-bound algorithm for finding vertex overs of a given size for a graph. Experimental results are displayed in order to show the running time landsape we are dealing with. The experimental results show different phases, whih an be studied analytially further. The vertex-over algorithm s traversal of the onfiguration tree is explained. The relationship between different kinds of onfiguration tree traversals and the phases shown in the experimental results is desribed. The analysis of the vertex-over algorithm is started by introduing the first-moment method. The method provides us with a lower bound for the x () phase boundary for large values. It also shows a general way of using the average as a bound that an be exploited in similar situations. We start the analysis of the typial running time by examining the behaviour of the algorithm during the first desent into the onfiguration tree. This produes results that an be used to find the nodes in the onfiguration tree, where a solution is unreoverable and a subtree must be baktraked. In the baktraking analysis the typial running time for the largest subtree is approximated. This yields an analytial solution for the typial running time in the baktraking phase. The analytial results are ompared to the experimental results presented before. As the last step in this paper, a summary of the most important results is given. 2 A branh-and-bound algorithm for the vertex-over problem In this setion we will quikly desribe the vertex-over problem and outline a branh-and-bound algorithm for finding a vertex-over of a maximum size for a graph. Typial running time experimental data for the branh-and-bound algorithm from simulation runs is presented and the relationship of the onfiguration tree traversal to the typial running time of the algorithm is disussed. 1
2 2.1 Vertex-over problem A graph is denoted by G = (V, E). V is the set of verties and E is the set of edges. Graphs an be sampled randomly from either a fixed number N of verties and fixed amount of edges M ensemble G(N, M), where eah possible edge has the same probability of appearane, or from an ensemble G(N, p), where N is the fixed amount of verties and p the edge probability. A graph sampled from the ensemble G(N, p) does not have a fixed number of edges. A valid vertex over overs verties so that all edges onnet to at least one overed vertex: V v V : i V v j V v, (i, j) E. The minimum vertex-over is then arg min V v V v. The size of the largest allowed vertex-over is xn, where x [0, 1] and N = V. x is used here in the vertex-over size, beause it is independent of graph size. 2.2 A branh-and-bound vertex-over algorithm The branh-and-bound vertex-over algorithm goes through different partial vertex overs by marking verties as either overed or unovered at eah step. It baktraks if it reahes a state, where all the available overing marks xn have been used. The goal is to find a vertex-over of size at most xn. The algorithm terminates, when it has found a valid vertex-over or if it has gone through all possible onfigurations. The proess of the algorithm is desribed by an onfiguration tree. In the onfiguration tree a node speifies the urrent state of all the verties of the graph. All verties are marked as free at the start of the algorithm. The algorithm proeeds by marking a random free vertie as overed if the vertex has free or unovered neighbours. If the xn overing marks are not all used, the algorithm an go on with the tree traversal, otherwise it has to baktrak. If the algorithm returns to the node by baktraking, then the vertex is unovered and the other branh in the onfiguration tree is taken. If a node s all neighbours are overed, it is first marked as unovered. A simple bound is used to prune the onfiguration tree: don t mark a vertex unovered, if it has unovered neighbours. In the example figure 1 marking a vertex overed is equal to a left branh in the onfiguration tree and as unovered is equal to a right branh. 2.3 Experimental results, traversal of the onfiguration tree Figure 2 displays experimental results from running the branh-and-bound algorithm on the vertex-over problem. The simulations were performed by sampling graphs from the ensemble G(N, N ). Here N is the number of verties, the average vertex degree and p = N the edge probability. For eah x value graphs were sampled from the ensemble and the algorithm run on eah graph. The typial running time was alulated as the normalized and averaged logarithm of the number of onfiguration tree nodes, that the algorithm had to proess. In the figure two exponential phases (C, B) and one linear phase (A) are learly to be seen. The exponential phases C and B are separated by the stati phase boundary x (). x () is the phase boundary value, below whih a random graph almost surely has no vertex over of size xn and above whih a random graph almost surely has a vertex over of size xn, in the thermodynami limit N. The exponential phase B and the linear phase A are separated by the dynamial phase boundary x b (). The worst ase typial running time is observable at the stati phase boundary x (). Figure 1 shows example onfiguration trees for the branh-and-bound algorithm in the three different phases. In the sub figure A, the example solution (blak irle) is found during the first desent into the onfiguration tree. Here we don t have to baktrak at all and the solution time 2
3 Figure 1: Example onfiguration trees. The three sub figures A, B and C show examples of onfiguration trees in the three different phases. In sub figure A the blak irle is an example solution in the easy reoverable phase, where only a straight or almost straight desent is neessary. The blak irle in sub figure B is an example solution in the hard reoverable phase, where we have to baktrak to the irle pointed to by the arrow. In sub figure C, in the hard unreoverable phase, we have to traverse the tree until we know a solution an t be found (to the long dashed line). is obviously linear. The probability for the algorithm to find a solution in linear time is larger, the larger the maximum vertex-over size xn is. This linear running time an be observed as phase A in figure 2. The example solution (blak irle) in the sub figure B had to be found by baktraking. The algorithm had to baktrak the whole left subtree of the node pointed to by the arrow. This is the exponential overable phase B shown in figure 2. The long dashed line in sub figure C shows the depth of the traversal of the onfiguration tree, when the maximum vertex-over size xn is so small that a solution an t be found from the graph. This ase an be seen in figure 2 as the unreoverable exponential phase C in terms of typial running time. 3 First-moment method In this setion we will show a method for alulating a lower bound on the stati phase boundary x (). We will use a graph ensemble G(N, M) with fixed vertex N and edge number M = 2 N. This should give a reasonable result, beause even if we would use the graph ensemble G(N, p), with the speified edge probability p = N, the edge number would onentrate around the edge average M = 2N in the thermodynami limit. An upper bound for the probability that graph G has a vertex-over an be obtained by using the average number of vertex-overs. This also explains the name of the method. P( V v (G), V v (G) = xn) N v (G, xn) This bound holds, beause a graph with a vertex-over ontributes 1 on the left hand side and its number of vertex-overs on the right hand side. Another way to look at it is, that the average is the probability weighted with the number of vertex-overs ( 1). 3
4 Figure 2: Experimental results for typial running time and the analytial solution. τ(x ) = lim N 1 N ln t bt( G, x) is the normalized and averaged logarithm of running time. C and B are the exponential phases and A is the linear phase. Dynami phase boundary x b () and the stati phase boundary x () are also shown. Original figure is from [3]. 4
5 ( N The number of potential vertex overs Vv is xn ), beause we try to over xn verties with the available overing marks from the total of N verties in the graph. In Vv the probability that both verties of an edge are unovered is (1 x) 2 and that at least one is overed is 1 (1 x) 2 = x(2 x). If we onsider that a potential vertex-over must over all edges, for it to be a valid vertex-over, then we get the average vertex-over number as This gives us ( ) N N v (G, xn) = xn N v (G, xn) = ( N xn [x(2 x)] }{{} P(edge overed) # edges {}}{ 2 N ) [x(2 x)] 2 N = N! [x(2 x)] 2 N (xn)! [(1 x) N]! e {N[ x ln x (1 x)ln(1 x)+ 2 ln{x(2 x)}]} (1) Now we have in the exponent a value, whih determines in the thermodynami limit (N ), whether the average is zero or above zero. The exponent hanges sign at x an () < x (). x an () is a lower bound on x (), beause for values smaller than x an () the average N v (G, xn) goes in the thermodynami limit to 0 and there is no vertex-over. 0 = x an ()lnx an () (1 x an ())ln (1 x an ()) + 2 ln {x an ()(2 x an ())} (2) The asymptoti for x an () for large average degree is given by x an () = 1 2 ln() ( ) ln {ln()} + O and the preise asymptoti is alulated in [1]: x () = 1 2 (ln() ln {ln()} ln(2) + 1) + o( 1 ) x an () [0, 0.5] plotted using the equation 2 is shown in figure 3. Comparing x an () with x () shown in figure 4 hints that x an () really is a lower bound for x (). = e {ln(n!)+ 2 N ln[x(2 x)] ln[(xn)!] ln[{(1 x)n}!]} Stirling s approximation ln(n!) N lnn N 4 Typial running time analysis 4.1 Analysis of first desent into the onfiguration tree This subsetion deals with analysing the first desent into the onfiguration tree, i.e. the linear phase, where no baktraking ours. When searhing for a vertex-over in the graph G G(N, N ), we onsider overed verties and edges as removed from the graph. Thus at time step T, the urrent graph is G G(N T, N ). The graph at time step T remains a random graph, beause the order of vertex removal is random. For some heuristis this is not true. In eah step exatly one vertex is removed from the graph and at time step T the average edge degree is 5
6 0.5 x an () x an () Figure 3: x an() [0,0.5] plotted using equation 0 = x an () ln x an () (1 x an ()) ln (1 x an ()) + ln {xan () (2 xan ())} 2 (T) (N T) N = (1 T N ), beause the edge probability p = N remains the same over time. We use resaled time t = T N, whih is ontinuous in the thermodynami limit. Using a resaled time simplifies the alulations. The urrent graph is then G G((1 t)n, N ). Beause overing marks are put on all verties exept isolated ones, we are interested in the probability that a vertex is not isolated. This an be alulated with the stati edge probability and with the number of possible edge endpoints at time t. For a single vertex at time t: ( P(vertex is not isolated) = 1 1 ) }{{ N } P(no edge) # possible edge endpoints {}}{ (1 t)n 1 = 1 e {((1 t)n 1)ln(1 N )} 1 e {(1 t) lim N N ln(1 N )} = 1 e {(1 t) lim N N N } = 1 e { (1 t)} With the probability that a vertex is not isolated, i.e. that a vertex is overed, we an alulate the amount of available overing marks by subtrating from the original overing mark amount the amount used at time t: X(t) = xn N t 0 P(vertex is not isolated)dt 6
7 = xn N t 0 ( 1 e { (1 t)}) dt = xn Nt + N e (1 t) e x(t) is the amount of available overing marks at time t divided by the amount of verties at time t. The average vertex degree dereases linearly with time. Putting this together gives us the trajetory for the first desent: (t) = (1 t) x(t) = X(t) N(t) = x t 1 t + e (1 t) e (1 t) Figure 4 displays trajetories in the (x, ) plane. Phase boundary x b (), displayed in the figure, an be alulated by setting x(t ) = 1 and then t = 1: x(t ) = 1 1 = x b() t 1 t + e (1 t ) e (1 t ) 1 t = x b () t + e (1 t ) e t = 1 0 = x b () e x b () = 1 + e 1 If x starts below this boundary, an exponential running time is to be expeted, beause the first desent does not find a solution. 4.2 Baktraking analysis The overable exponential running time phase B is shown in figure 2. In this phase baktraking ours, when there are not enough overing marks available to over the remaining random subgraph. Baktraking analysis an be diffiult, beause of onfiguration tree node dependenies. The problem is approahed level by level of the onfiguration tree and the number of nodes at eah level is taken into aount. This is feasible, beause the omputation time depends on the number of nodes, but not on the order they are gone through. At time t the remaining overing marks xñ of the first desent are not enough. From the point of view of the onfiguration tree, the onfiguration tree node at time t is pointed to by the blue arrow in the example figure 1. x () and the first desent ross at time t at ( x, ). At time t there are xñ overing marks remaining. As disussed in the previous setion, we always have a random graph, when first desending the onfiguration tree and removing randomly seleted verties and edges. The subgraph at time t is G G(Ñ, ) and it must be baktraked in Ñ exponential time, beause it has no solution. The subgraph G dominates the running time, whih an be approximated with the amount of nodes in the subgraph. 7
8 Figure 4: First desent into the onfiguration tree. Dotted line is x b () and long dashed line is x (). The lines start at = 2.0. The symbols are numerial results from a random graph with 10 6 verties. Figure is from [3]. 8
9 From the experimental data we know that exponential solution times( are log-normal ) distributed for large N. The typial solution time is e Nτ(x,). Denote with t bt GÑ,, x the baktraking time of the unoverable GÑ,. The normalized averaged logarithmi running time is Ñ Ñ [ ( )] 1 the quenhed average τ(x, ) = lim N N ln t bt GÑ,, x. Here the logarithm enfores that Ñ we obtain the typial running time, beause the solution times are log-normal distributed. The baktraking time is upper bounded by the number of leaves of the subtree times the number of verties in the subgraph t bt ÑN l. The linear Ñ O(N) ontribution an be disarded and we just use the number of leaves to approximate the exponential subgraph running time: 1 [ ( )] τ(x, ) lim N N ln N l GÑ,, x Ñ The number of leaves ( is upper ) bounded by the distribution of remaining overing marks on Ñ the remaining verties. Similar to the alulations done in equation 1 we get for the xñ unbounded version of the algorithm τ(x, ) { xln x + (1 x)ln (1 x)} For the bounded version of the branh-and-bound algorithm, we have to take into aount the level at whih the bound stops the traversing of the onfiguration tree. We mark with κñ the level in the subtree, where the bound beomes effetive. Omitting a lot of alulations the result for the bounded version is presented here: τ(x, ) max κ= x,...,1 [ κs an ( )] x κ, κ s an (x, ) = x lnx (1 x )ln(1 x ) + 2 ln(x [2 x ]) The typial running time is approximated with the largest subtree by finding the saddle point 3 on the κ value. Figure 2 shows also this analytial result. It is worth noting that the analytial results seem to fit well with the experimental data. 5 Summary A simple branh-and-bound algorithm was introdued for the vertex-over problem. Experimental data of typial running times for the algorithm was shown. Two exponential dynamial phases and one linear phase were disernible from the data. The first-moment method was explained and a lower bound on x () was onstruted by using the average vertex-over amount as an upper bound for the vertex-over probability of a graph. Analysis of the first desent vertex-over algorithm was done and (x, )-trajetories of first desent runs were analysed and experimental data of them displayed. The dynami phase boundary x b (), whih shows where exponential solution times start ourring, was alulated. In the analysis, important steps were the onsidering of the urrent graph with overed verties and edges removed, alulating the probability for a not-isolated vertex and alulating the amount of available overing marks at a time step, using a ontinuous (in the thermodynami limit) resaled time. In the baktraking analysis the typial running time was alulated for the unbounded version of the algorithm using the amount of leaves in the baktraking subtree. For the bounded version (3) 9
10 the typial running time was found by onsidering the largest subgraph that was possible with the bound effetive. Referenes [1] A. M. Frieze. Disr. Math., 81(171), [2] Alexander K. Hartmann and Martin Weigt. Phase Transitions in Combinatorial Optimization Problems. WILEY-VCH, [3] Martin Weigt and Alexander K. Hartmann. Typial solution time for a vertex-overing algorithm on finite-onnetivity random graphs. Physial Review Letters, 86(8), February
Extracting Partition Statistics from Semistructured Data
Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk
More informationOn - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2
On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,
More informationAn Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index
IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive
More informationThe Implementation of RRTs for a Remote-Controlled Mobile Robot
ICCAS5 June -5, KINEX, Gyeonggi-Do, Korea he Implementation of RRs for a Remote-Controlled Mobile Robot Chi-Won Roh*, Woo-Sub Lee **, Sung-Chul Kang *** and Kwang-Won Lee **** * Intelligent Robotis Researh
More informationGray Codes for Reflectable Languages
Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings
More informationThe Happy Ending Problem
The Happy Ending Problem Neeldhara Misra STATUTORY WARNING This doument is a draft version 1 Introdution The Happy Ending problem first manifested itself on a typial wintery evening in 1933 These evenings
More information1 The Knuth-Morris-Pratt Algorithm
5-45/65: Design & Analysis of Algorithms September 26, 26 Leture #9: String Mathing last hanged: September 26, 27 There s an entire field dediated to solving problems on strings. The book Algorithms on
More informationA Novel Validity Index for Determination of the Optimal Number of Clusters
IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers
More informationCross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer
Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based
More informationAlgorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking
Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient
More information8 Instruction Selection
8 Instrution Seletion The IR ode instrutions were designed to do exatly one operation: load/store, add, subtrat, jump, et. The mahine instrutions of a real CPU often perform several of these primitive
More informationChapter 2: Introduction to Maple V
Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard
More informationDetection and Recognition of Non-Occluded Objects using Signature Map
6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,
More informationFinding the Equation of a Straight Line
Finding the Equation of a Straight Line You should have, before now, ome aross the equation of a straight line, perhaps at shool. Engineers use this equation to help determine how one quantity is related
More informationThe Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines
The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer
More informationData Structures in Java
Data Strutures in Java Leture 8: Trees and Tree Traversals. 10/5/2015 Daniel Bauer 1 Trees in Computer Siene A lot of data omes in a hierarhial/nested struture. Mathematial expressions. Program struture.
More informationA Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks
A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr
More informationDirected Rectangle-Visibility Graphs have. Abstract. Visibility representations of graphs map vertices to sets in Euclidean space and
Direted Retangle-Visibility Graphs have Unbounded Dimension Kathleen Romanik DIMACS Center for Disrete Mathematis and Theoretial Computer Siene Rutgers, The State University of New Jersey P.O. Box 1179,
More information13.1 Numerical Evaluation of Integrals Over One Dimension
13.1 Numerial Evaluation of Integrals Over One Dimension A. Purpose This olletion of subprograms estimates the value of the integral b a f(x) dx where the integrand f(x) and the limits a and b are supplied
More informationIncremental Mining of Partial Periodic Patterns in Time-series Databases
CERIAS Teh Report 2000-03 Inremental Mining of Partial Periodi Patterns in Time-series Dataases Mohamed G. Elfeky Center for Eduation and Researh in Information Assurane and Seurity Purdue University,
More informationGraphs in L A TEX. Robert A. Beeler. January 8, 2017
Graphs in L A TEX Robert A. Beeler January 8, 2017 1 Introdution This doument is to provide a quik and dirty guide for building graphs in L A TEX. Muh of the doument is devoted to examples of things that
More informationNumerical simulation of hemolysis: a comparison of Lagrangian and Eulerian modelling
Modelling in Mediine and Biology VI 361 Numerial simulation of hemolysis: a omparison of Lagrangian and Eulerian modelling S. Pirker 1, H. Shima 2 & M. Stoiber 2 1 Johannes Kepler University, 4040 Linz,
More informationBoosted Random Forest
Boosted Random Forest Yohei Mishina, Masamitsu suhiya and Hironobu Fujiyoshi Department of Computer Siene, Chubu University, 1200 Matsumoto-ho, Kasugai, Aihi, Japan {mishi, mtdoll}@vision.s.hubu.a.jp,
More informationDynamic Programming. Lecture #8 of Algorithms, Data structures and Complexity. Joost-Pieter Katoen Formal Methods and Tools Group
Dynami Programming Leture #8 of Algorithms, Data strutures and Complexity Joost-Pieter Katoen Formal Methods and Tools Group E-mail: katoen@s.utwente.nl Otober 29, 2002 JPK #8: Dynami Programming ADC (214020)
More informationSparse Certificates for 2-Connectivity in Directed Graphs
Sparse Certifiates for 2-Connetivity in Direted Graphs Loukas Georgiadis Giuseppe F. Italiano Aikaterini Karanasiou Charis Papadopoulos Nikos Parotsidis Abstrat Motivated by the emergene of large-sale
More informationThis fact makes it difficult to evaluate the cost function to be minimized
RSOURC LLOCTION N SSINMNT In the resoure alloation step the amount of resoures required to exeute the different types of proesses is determined. We will refer to the time interval during whih a proess
More informationSmooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints
Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of
More informationVolume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm
More informationOutline: Software Design
Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling
More informationExploring the Commonality in Feature Modeling Notations
Exploring the Commonality in Feature Modeling Notations Miloslav ŠÍPKA Slovak University of Tehnology Faulty of Informatis and Information Tehnologies Ilkovičova 3, 842 16 Bratislava, Slovakia miloslav.sipka@gmail.om
More informationWhat are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study
What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The
More informationFlow Demands Oriented Node Placement in Multi-Hop Wireless Networks
Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless
More informationSystem-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications
System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis
More informationDefinitions Homework. Quine McCluskey Optimal solutions are possible for some large functions Espresso heuristic. Definitions Homework
EECS 33 There be Dragons here http://ziyang.ees.northwestern.edu/ees33/ Teaher: Offie: Email: Phone: L477 Teh dikrp@northwestern.edu 847 467 2298 Today s material might at first appear diffiult Perhaps
More informationIntroduction to Seismology Spring 2008
MIT OpenCourseWare http://ow.mit.edu 1.510 Introdution to Seismology Spring 008 For information about iting these materials or our Terms of Use, visit: http://ow.mit.edu/terms. 1.510 Leture Notes 3.3.007
More informationLearning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract
CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and
More informationParametric Abstract Domains for Shape Analysis
Parametri Abstrat Domains for Shape Analysis Xavier RIVAL (INRIA & Éole Normale Supérieure) Joint work with Bor-Yuh Evan CHANG (University of Maryland U University of Colorado) and George NECULA (University
More informationPerformance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification
erformane Improvement of TC on Wireless Cellular Networks by Adaptive Combined with Expliit Loss tifiation Masahiro Miyoshi, Masashi Sugano, Masayuki Murata Department of Infomatis and Mathematial Siene,
More informationA Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks
A Dual-Hamiltonian-Path-Based Multiasting Strategy for Wormhole-Routed Star Graph Interonnetion Networks Nen-Chung Wang Department of Information and Communiation Engineering Chaoyang University of Tehnology,
More informationRAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments
21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communiations 1 RAC 2 E: Novel Rendezvous Protool for Asynhronous Cognitive Radios in Cooperative Environments Valentina Pavlovska,
More informationAn Efficient and Scalable Approach to CNN Queries in a Road Network
An Effiient and Salable Approah to CNN Queries in a Road Network Hyung-Ju Cho Chin-Wan Chung Dept. of Eletrial Engineering & Computer Siene Korea Advaned Institute of Siene and Tehnology 373- Kusong-dong,
More informationChemical, Biological and Radiological Hazard Assessment: A New Model of a Plume in a Complex Urban Environment
hemial, Biologial and Radiologial Haard Assessment: A New Model of a Plume in a omplex Urban Environment Skvortsov, A.T., P.D. Dawson, M.D. Roberts and R.M. Gailis HPP Division, Defene Siene and Tehnology
More informationPipelined Multipliers for Reconfigurable Hardware
Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,
More informationRecommendation Subgraphs for Web Discovery
Reommation Subgraphs for Web Disovery Arda Antikaioglu Department of Mathematis Carnegie Mellon University aantika@andrew.mu.edu R. Ravi Tepper Shool of Business Carnegie Mellon University ravi@mu.edu
More information1. The collection of the vowels in the word probability. 2. The collection of real numbers that satisfy the equation x 9 = 0.
C HPTER 1 SETS I. DEFINITION OF SET We begin our study of probability with the disussion of the basi onept of set. We assume that there is a ommon understanding of what is meant by the notion of a olletion
More informationIntroductory Programming, IMM, DTU Systematic Software Test. Software test (afprøvning) Motivation. Structural test and functional test
Introdutory Programming, IMM, DTU Systemati Software Test Peter Sestoft a Programs often ontain unintended errors how do you find them? Strutural test Funtional test Notes: Systemati Software Test, http://www.dina.kvl.dk/
More informationMulti-Channel Wireless Networks: Capacity and Protocols
Multi-Channel Wireless Networks: Capaity and Protools Tehnial Report April 2005 Pradeep Kyasanur Dept. of Computer Siene, and Coordinated Siene Laboratory, University of Illinois at Urbana-Champaign Email:
More informationFrom indoor GIS maps to path planning for autonomous wheelchairs
From indoor GIS maps to path planning for autonomous wheelhairs Jérôme Guzzi and Gianni A. Di Caro Abstrat This work fouses on how to ompute trajetories for an autonomous wheelhair based on indoor GIS
More informationScheduling Multiple Independent Hard-Real-Time Jobs on a Heterogeneous Multiprocessor
Sheduling Multiple Independent Hard-Real-Time Jobs on a Heterogeneous Multiproessor Orlando Moreira NXP Semiondutors Researh Eindhoven, Netherlands orlando.moreira@nxp.om Frederio Valente Universidade
More informationAutomatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)
Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University
More informationMultiple-Criteria Decision Analysis: A Novel Rank Aggregation Method
3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr
More informationHEXA: Compact Data Structures for Faster Packet Processing
Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for
More informationA Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks
International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali
More informationAnalysis of input and output configurations for use in four-valued CCD programmable logic arrays
nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,
More informationCleanUp: Improving Quadrilateral Finite Element Meshes
CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)
More information8 : Learning Fully Observed Undirected Graphical Models
10-708: Probabilisti Graphial Models 10-708, Spring 2018 8 : Learning Fully Observed Undireted Graphial Models Leturer: Kayhan Batmanghelih Sribes: Chenghui Zhou, Cheng Ran (Harvey) Zhang When learning
More informationA {k, n}-secret Sharing Scheme for Color Images
A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University
More informationAnd, the (low-pass) Butterworth filter of order m is given in the frequency domain by
Problem Set no.3.a) The ideal low-pass filter is given in the frequeny domain by B ideal ( f ), f f; =, f > f. () And, the (low-pass) Butterworth filter of order m is given in the frequeny domain by B
More informationTaming Decentralized POMDPs: Towards Efficient Policy Computation for Multiagent Settings
Taming Deentralized PMDPs: Towards ffiient Poliy omputation for Multiagent Settings. Nair and M. Tambe omputer Siene Dept. University of Southern alifornia Los Angeles A 90089 nair,tambe @us.edu M. Yokoo
More informationGraph-Based vs Depth-Based Data Representation for Multiview Images
Graph-Based vs Depth-Based Data Representation for Multiview Images Thomas Maugey, Antonio Ortega, Pasal Frossard Signal Proessing Laboratory (LTS), Eole Polytehnique Fédérale de Lausanne (EPFL) Email:
More informationCOMBINATION OF INTERSECTION- AND SWEPT-BASED METHODS FOR SINGLE-MATERIAL REMAP
Combination of intersetion- and swept-based methods for single-material remap 11th World Congress on Computational Mehanis WCCM XI) 5th European Conferene on Computational Mehanis ECCM V) 6th European
More informationPerformance Benchmarks for an Interactive Video-on-Demand System
Performane Benhmarks for an Interative Video-on-Demand System. Guo,P.G.Taylor,E.W.M.Wong,S.Chan,M.Zukerman andk.s.tang ARC Speial Researh Centre for Ultra-Broadband Information Networks (CUBIN) Department
More informationVideo Data and Sonar Data: Real World Data Fusion Example
14th International Conferene on Information Fusion Chiago, Illinois, USA, July 5-8, 2011 Video Data and Sonar Data: Real World Data Fusion Example David W. Krout Applied Physis Lab dkrout@apl.washington.edu
More informationWide-baseline Multiple-view Correspondences
Wide-baseline Multiple-view Correspondenes Vittorio Ferrari, Tinne Tuytelaars, Lu Van Gool, Computer Vision Group (BIWI), ETH Zuerih, Switzerland ESAT-PSI, University of Leuven, Belgium {ferrari,vangool}@vision.ee.ethz.h,
More informationPlumber: a method for a multi-scale decomposition of 3D shapes into tubular primitives and bodies
ACM Symposium on Solid Modeling and Appliations (2004) P. Brunet, N. Patrikalakis (Editors) Plumber: a method for a multi-sale deomposition of 3D shapes into tubular primitives and bodies M. Mortara G.
More informationApproximate logic synthesis for error tolerant applications
Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu
More informationDynamic Algorithms Multiple Choice Test
3226 Dynami Algorithms Multiple Choie Test Sample test: only 8 questions 32 minutes (Real test has 30 questions 120 minutes) Årskort Name Eah of the following 8 questions has 4 possible answers of whih
More informationReview (Law of sines and cosine) cosines)
Date:03/7,8/01 Review 6.1-6. Objetive: Apply the onept to use the law of the sines and osines to solve oblique triangles Apply the onept to find areas using the law of sines and osines Agenda: Bell ringer
More informationMining effective design solutions based on a model-driven approach
ata Mining VI 463 Mining effetive design solutions based on a model-driven approah T. Katsimpa 2, S. Sirmakessis 1,. Tsakalidis 1,2 & G. Tzimas 1,2 1 Researh ademi omputer Tehnology Institute, Hellas 2
More informationModeling of Wire Electrochemical Machining
A publiation of 91 CHEMICAL ENGINEERING TRANSACTIONS VOL. 41, 214 Guest Editors: Simonetta Palmas, Mihele Masia, Annalisa Vaa Copyright 214, AIDIC Servizi S.r.l., ISBN 978-88-9568-32-7; ISSN 2283-9216
More informationMATH STUDENT BOOK. 12th Grade Unit 6
MATH STUDENT BOOK 12th Grade Unit 6 Unit 6 TRIGONOMETRIC APPLICATIONS MATH 1206 TRIGONOMETRIC APPLICATIONS INTRODUCTION 3 1. TRIGONOMETRY OF OBLIQUE TRIANGLES 5 LAW OF SINES 5 AMBIGUITY AND AREA OF A TRIANGLE
More informationPartial Character Decoding for Improved Regular Expression Matching in FPGAs
Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia
More informationXML Data Streams. XML Stream Processing. XML Stream Processing. Yanlei Diao. University of Massachusetts Amherst
XML Stream Proessing Yanlei Diao University of Massahusetts Amherst XML Data Streams XML is the wire format for data exhanged online. Purhase orders http://www.oasis-open.org/ommittees/t_home.php?wg_abbrev=ubl
More informationAn Alternative Approach to the Fuzzifier in Fuzzy Clustering to Obtain Better Clustering Results
An Alternative Approah to the Fuzziier in Fuzzy Clustering to Obtain Better Clustering Results Frank Klawonn Department o Computer Siene University o Applied Sienes BS/WF Salzdahlumer Str. 46/48 D-38302
More informationSequential Incremental-Value Auctions
Sequential Inremental-Value Autions Xiaoming Zheng and Sven Koenig Department of Computer Siene University of Southern California Los Angeles, CA 90089-0781 {xiaominz,skoenig}@us.edu Abstrat We study the
More informationDrawing lines. Naïve line drawing algorithm. drawpixel(x, round(y)); double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx; double y = y0;
Naïve line drawing algorithm // Connet to grid points(x0,y0) and // (x1,y1) by a line. void drawline(int x0, int y0, int x1, int y1) { int x; double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx;
More informationCreating Adaptive Web Sites Through Usage-Based Clustering of URLs
Creating Adaptive Web Sites Through Usage-Based Clustering of URLs Bamshad Mobasher Dept. of Computer Siene, DePaul University, Chiago, IL mobasher@s.depaul.edu Robert Cooley, Jaideep Srivastava Dept.
More informationMPhys Final Year Project Dissertation by Andrew Jackson
Development of software for the omputation of the properties of eletrostati eletro-optial devies via both the diret ray traing and paraxial approximation tehniques. MPhys Final Year Projet Dissertation
More informationFUZZY WATERSHED FOR IMAGE SEGMENTATION
FUZZY WATERSHED FOR IMAGE SEGMENTATION Ramón Moreno, Manuel Graña Computational Intelligene Group, Universidad del País Vaso, Spain http://www.ehu.es/winto; {ramon.moreno,manuel.grana}@ehu.es Abstrat The
More informationVisualization of patent analysis for emerging technology
Available online at www.sienediret.om Expert Systems with Appliations Expert Systems with Appliations 34 (28) 84 82 www.elsevier.om/loate/eswa Visualization of patent analysis for emerging tehnology Young
More informationPlot-to-track correlation in A-SMGCS using the target images from a Surface Movement Radar
Plot-to-trak orrelation in A-SMGCS using the target images from a Surfae Movement Radar G. Golino Radar & ehnology Division AMS, Italy ggolino@amsjv.it Abstrat he main topi of this paper is the formulation
More informationNONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman
NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of
More informationOutline. CS38 Introduction to Algorithms. Administrative Stuff. Administrative Stuff. Motivation/Overview. Administrative Stuff
Outline CS38 Introdution to Algorithms Leture 1 April 1, 2014 administrative stuff motivation and overview of the ourse stale mathings example graphs, representing graphs graph traversals (BFS, DFS) onnetivity,
More informationAccommodations of QoS DiffServ Over IP and MPLS Networks
Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering
More informationConnection Guide. Installing the printer locally (Windows) What is local printing? Installing the printer using the Software and Documentation CD
Page 1 of 7 Connetion Guide Installing the printer loally (Windows) Note: When installing a loally attahed printer, if the operating system is not supported y the Software and Doumentation CD, then the
More informationTorpedo Trajectory Visual Simulation Based on Nonlinear Backstepping Control
orpedo rajetory Visual Simulation Based on Nonlinear Bakstepping Control Peng Hai-jun 1, Li Hui-zhou Chen Ye 1, 1. Depart. of Weaponry Eng, Naval Univ. of Engineering, Wuhan 400, China. Depart. of Aeronautial
More informationUCSB Math TI-85 Tutorials: Basics
3 UCSB Math TI-85 Tutorials: Basis If your alulator sreen doesn t show anything, try adjusting the ontrast aording to the instrutions on page 3, or page I-3, of the alulator manual You should read the
More informationTest Case Generation from UML State Machines
Test Case Generation from UML State Mahines Dirk Seifert To ite this version: Dirk Seifert. Test Case Generation from UML State Mahines. [Researh Report] 2008. HAL Id: inria-00268864
More informationAdapting K-Medians to Generate Normalized Cluster Centers
Adapting -Medians to Generate Normalized Cluster Centers Benamin J. Anderson, Deborah S. Gross, David R. Musiant Anna M. Ritz, Thomas G. Smith, Leah E. Steinberg Carleton College andersbe@gmail.om, {dgross,
More informationUsing Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks
Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Ho Wireless Networks Giorgio Quer, Federio Librino, Lua Canzian, Leonardo Badia, Mihele Zorzi, University of California San Diego La
More informationImproving the Perceptual Uniformity of a Gloss Space
Improving the Pereptual Uniformity of a Gloss Spae Adria Fores, 1 Mark D. Fairhild, 1 Ingeborg Tastl 2 1 Munsell Color Siene Laboratory, Rohester Institute of Tehnology 2 Hewlett-Pakard Laboratories Abstrat
More informationDubins Path Planning of Multiple UAVs for Tracking Contaminant Cloud
Proeedings of the 17th World Congress The International Federation of Automati Control Dubins Path Planning of Multiple UAVs for Traking Contaminant Cloud S. Subhan, B.A. White, A. Tsourdos M. Shanmugavel,
More informationBoundary Correct Real-Time Soft Shadows
Boundary Corret Real-Time Soft Shadows Bjarke Jakobsen Niels J. Christensen Bent D. Larsen Kim S. Petersen Informatis and Mathematial Modelling Tehnial University of Denmark {bj, nj, bdl}@imm.dtu.dk, kim@deadline.dk
More informationA Fast Sub-pixel Motion Estimation Algorithm for. H.264/AVC Video Coding
A Fast Sub-pixel Motion Estimation Algorithm or H.64/AVC Video Coding Weiyao Lin Krit Panusopone David M. Baylon Ming-Ting Sun 3 Zhenzhong Chen 4 and Hongxiang Li 5 Institute o Image Communiation and Inormation
More informationSpace- and Time-Efficient BDD Construction via Working Set Control
Spae- and Time-Effiient BDD Constrution via Working Set Control Bwolen Yang Yirng-An Chen Randal E. Bryant David R. O Hallaron Computer Siene Department Carnegie Mellon University Pittsburgh, PA 15213.
More informationDivide-and-conquer algorithms 1
* 1 Multipliation Divide-and-onquer algorithms 1 The mathematiian Gauss one notied that although the produt of two omplex numbers seems to! involve four real-number multipliations it an in fat be done
More informationDynamic Backlight Adaptation for Low Power Handheld Devices 1
Dynami Baklight Adaptation for ow Power Handheld Devies 1 Sudeep Pasriha, Manev uthra, Shivajit Mohapatra, Nikil Dutt and Nalini Venkatasubramanian 444, Computer Siene Building, Shool of Information &
More informationrepresent = as a finite deimal" either in base 0 or in base. We an imagine that the omputer first omputes the mathematial = then rounds the result to
Sientifi Computing Chapter I Computer Arithmeti Jonathan Goodman Courant Institute of Mathemaial Sienes Last revised January, 00 Introdution One of the many soures of error in sientifi omputing is inexat
More information35 th Design Automation Conference Copyright 1998 ACM
Using Reongurable Computing Tehniques to Aelerate Problems in the CAD Domain: A Case Study with Boolean Satisability Peixin Zhong, Pranav Ashar, Sharad Malik and Margaret Martonosi Prineton University
More information1. Introduction. 2. The Probable Stope Algorithm
1. Introdution Optimization in underground mine design has reeived less attention than that in open pit mines. This is mostly due to the diversity o underground mining methods and omplexity o underground
More information