Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem

Size: px
Start display at page:

Download "Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem"

Transcription

1 Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, Introdution The vertex-over problem is one of a olletion of NP-omplete problems studied atively in the siene ommunity. The problem s solving time is in the worst ase exponential, but the running time varies for different vertex-over realizations. From experimental data, different phases an be identified for the running time and the analysis of vertex-over algorithms bak the observed results up. Interestingly the worst-ase typial average solutions are loated at the x () phase boundary, whih is studied analytially in the book [2] and in the paper [3]. This summary is based on these two douments. We start by giving a short desription of the vertex-over problem and introduing symbols related to the problem. We proeed and introdue a branh-and-bound algorithm for finding vertex overs of a given size for a graph. Experimental results are displayed in order to show the running time landsape we are dealing with. The experimental results show different phases, whih an be studied analytially further. The vertex-over algorithm s traversal of the onfiguration tree is explained. The relationship between different kinds of onfiguration tree traversals and the phases shown in the experimental results is desribed. The analysis of the vertex-over algorithm is started by introduing the first-moment method. The method provides us with a lower bound for the x () phase boundary for large values. It also shows a general way of using the average as a bound that an be exploited in similar situations. We start the analysis of the typial running time by examining the behaviour of the algorithm during the first desent into the onfiguration tree. This produes results that an be used to find the nodes in the onfiguration tree, where a solution is unreoverable and a subtree must be baktraked. In the baktraking analysis the typial running time for the largest subtree is approximated. This yields an analytial solution for the typial running time in the baktraking phase. The analytial results are ompared to the experimental results presented before. As the last step in this paper, a summary of the most important results is given. 2 A branh-and-bound algorithm for the vertex-over problem In this setion we will quikly desribe the vertex-over problem and outline a branh-and-bound algorithm for finding a vertex-over of a maximum size for a graph. Typial running time experimental data for the branh-and-bound algorithm from simulation runs is presented and the relationship of the onfiguration tree traversal to the typial running time of the algorithm is disussed. 1

2 2.1 Vertex-over problem A graph is denoted by G = (V, E). V is the set of verties and E is the set of edges. Graphs an be sampled randomly from either a fixed number N of verties and fixed amount of edges M ensemble G(N, M), where eah possible edge has the same probability of appearane, or from an ensemble G(N, p), where N is the fixed amount of verties and p the edge probability. A graph sampled from the ensemble G(N, p) does not have a fixed number of edges. A valid vertex over overs verties so that all edges onnet to at least one overed vertex: V v V : i V v j V v, (i, j) E. The minimum vertex-over is then arg min V v V v. The size of the largest allowed vertex-over is xn, where x [0, 1] and N = V. x is used here in the vertex-over size, beause it is independent of graph size. 2.2 A branh-and-bound vertex-over algorithm The branh-and-bound vertex-over algorithm goes through different partial vertex overs by marking verties as either overed or unovered at eah step. It baktraks if it reahes a state, where all the available overing marks xn have been used. The goal is to find a vertex-over of size at most xn. The algorithm terminates, when it has found a valid vertex-over or if it has gone through all possible onfigurations. The proess of the algorithm is desribed by an onfiguration tree. In the onfiguration tree a node speifies the urrent state of all the verties of the graph. All verties are marked as free at the start of the algorithm. The algorithm proeeds by marking a random free vertie as overed if the vertex has free or unovered neighbours. If the xn overing marks are not all used, the algorithm an go on with the tree traversal, otherwise it has to baktrak. If the algorithm returns to the node by baktraking, then the vertex is unovered and the other branh in the onfiguration tree is taken. If a node s all neighbours are overed, it is first marked as unovered. A simple bound is used to prune the onfiguration tree: don t mark a vertex unovered, if it has unovered neighbours. In the example figure 1 marking a vertex overed is equal to a left branh in the onfiguration tree and as unovered is equal to a right branh. 2.3 Experimental results, traversal of the onfiguration tree Figure 2 displays experimental results from running the branh-and-bound algorithm on the vertex-over problem. The simulations were performed by sampling graphs from the ensemble G(N, N ). Here N is the number of verties, the average vertex degree and p = N the edge probability. For eah x value graphs were sampled from the ensemble and the algorithm run on eah graph. The typial running time was alulated as the normalized and averaged logarithm of the number of onfiguration tree nodes, that the algorithm had to proess. In the figure two exponential phases (C, B) and one linear phase (A) are learly to be seen. The exponential phases C and B are separated by the stati phase boundary x (). x () is the phase boundary value, below whih a random graph almost surely has no vertex over of size xn and above whih a random graph almost surely has a vertex over of size xn, in the thermodynami limit N. The exponential phase B and the linear phase A are separated by the dynamial phase boundary x b (). The worst ase typial running time is observable at the stati phase boundary x (). Figure 1 shows example onfiguration trees for the branh-and-bound algorithm in the three different phases. In the sub figure A, the example solution (blak irle) is found during the first desent into the onfiguration tree. Here we don t have to baktrak at all and the solution time 2

3 Figure 1: Example onfiguration trees. The three sub figures A, B and C show examples of onfiguration trees in the three different phases. In sub figure A the blak irle is an example solution in the easy reoverable phase, where only a straight or almost straight desent is neessary. The blak irle in sub figure B is an example solution in the hard reoverable phase, where we have to baktrak to the irle pointed to by the arrow. In sub figure C, in the hard unreoverable phase, we have to traverse the tree until we know a solution an t be found (to the long dashed line). is obviously linear. The probability for the algorithm to find a solution in linear time is larger, the larger the maximum vertex-over size xn is. This linear running time an be observed as phase A in figure 2. The example solution (blak irle) in the sub figure B had to be found by baktraking. The algorithm had to baktrak the whole left subtree of the node pointed to by the arrow. This is the exponential overable phase B shown in figure 2. The long dashed line in sub figure C shows the depth of the traversal of the onfiguration tree, when the maximum vertex-over size xn is so small that a solution an t be found from the graph. This ase an be seen in figure 2 as the unreoverable exponential phase C in terms of typial running time. 3 First-moment method In this setion we will show a method for alulating a lower bound on the stati phase boundary x (). We will use a graph ensemble G(N, M) with fixed vertex N and edge number M = 2 N. This should give a reasonable result, beause even if we would use the graph ensemble G(N, p), with the speified edge probability p = N, the edge number would onentrate around the edge average M = 2N in the thermodynami limit. An upper bound for the probability that graph G has a vertex-over an be obtained by using the average number of vertex-overs. This also explains the name of the method. P( V v (G), V v (G) = xn) N v (G, xn) This bound holds, beause a graph with a vertex-over ontributes 1 on the left hand side and its number of vertex-overs on the right hand side. Another way to look at it is, that the average is the probability weighted with the number of vertex-overs ( 1). 3

4 Figure 2: Experimental results for typial running time and the analytial solution. τ(x ) = lim N 1 N ln t bt( G, x) is the normalized and averaged logarithm of running time. C and B are the exponential phases and A is the linear phase. Dynami phase boundary x b () and the stati phase boundary x () are also shown. Original figure is from [3]. 4

5 ( N The number of potential vertex overs Vv is xn ), beause we try to over xn verties with the available overing marks from the total of N verties in the graph. In Vv the probability that both verties of an edge are unovered is (1 x) 2 and that at least one is overed is 1 (1 x) 2 = x(2 x). If we onsider that a potential vertex-over must over all edges, for it to be a valid vertex-over, then we get the average vertex-over number as This gives us ( ) N N v (G, xn) = xn N v (G, xn) = ( N xn [x(2 x)] }{{} P(edge overed) # edges {}}{ 2 N ) [x(2 x)] 2 N = N! [x(2 x)] 2 N (xn)! [(1 x) N]! e {N[ x ln x (1 x)ln(1 x)+ 2 ln{x(2 x)}]} (1) Now we have in the exponent a value, whih determines in the thermodynami limit (N ), whether the average is zero or above zero. The exponent hanges sign at x an () < x (). x an () is a lower bound on x (), beause for values smaller than x an () the average N v (G, xn) goes in the thermodynami limit to 0 and there is no vertex-over. 0 = x an ()lnx an () (1 x an ())ln (1 x an ()) + 2 ln {x an ()(2 x an ())} (2) The asymptoti for x an () for large average degree is given by x an () = 1 2 ln() ( ) ln {ln()} + O and the preise asymptoti is alulated in [1]: x () = 1 2 (ln() ln {ln()} ln(2) + 1) + o( 1 ) x an () [0, 0.5] plotted using the equation 2 is shown in figure 3. Comparing x an () with x () shown in figure 4 hints that x an () really is a lower bound for x (). = e {ln(n!)+ 2 N ln[x(2 x)] ln[(xn)!] ln[{(1 x)n}!]} Stirling s approximation ln(n!) N lnn N 4 Typial running time analysis 4.1 Analysis of first desent into the onfiguration tree This subsetion deals with analysing the first desent into the onfiguration tree, i.e. the linear phase, where no baktraking ours. When searhing for a vertex-over in the graph G G(N, N ), we onsider overed verties and edges as removed from the graph. Thus at time step T, the urrent graph is G G(N T, N ). The graph at time step T remains a random graph, beause the order of vertex removal is random. For some heuristis this is not true. In eah step exatly one vertex is removed from the graph and at time step T the average edge degree is 5

6 0.5 x an () x an () Figure 3: x an() [0,0.5] plotted using equation 0 = x an () ln x an () (1 x an ()) ln (1 x an ()) + ln {xan () (2 xan ())} 2 (T) (N T) N = (1 T N ), beause the edge probability p = N remains the same over time. We use resaled time t = T N, whih is ontinuous in the thermodynami limit. Using a resaled time simplifies the alulations. The urrent graph is then G G((1 t)n, N ). Beause overing marks are put on all verties exept isolated ones, we are interested in the probability that a vertex is not isolated. This an be alulated with the stati edge probability and with the number of possible edge endpoints at time t. For a single vertex at time t: ( P(vertex is not isolated) = 1 1 ) }{{ N } P(no edge) # possible edge endpoints {}}{ (1 t)n 1 = 1 e {((1 t)n 1)ln(1 N )} 1 e {(1 t) lim N N ln(1 N )} = 1 e {(1 t) lim N N N } = 1 e { (1 t)} With the probability that a vertex is not isolated, i.e. that a vertex is overed, we an alulate the amount of available overing marks by subtrating from the original overing mark amount the amount used at time t: X(t) = xn N t 0 P(vertex is not isolated)dt 6

7 = xn N t 0 ( 1 e { (1 t)}) dt = xn Nt + N e (1 t) e x(t) is the amount of available overing marks at time t divided by the amount of verties at time t. The average vertex degree dereases linearly with time. Putting this together gives us the trajetory for the first desent: (t) = (1 t) x(t) = X(t) N(t) = x t 1 t + e (1 t) e (1 t) Figure 4 displays trajetories in the (x, ) plane. Phase boundary x b (), displayed in the figure, an be alulated by setting x(t ) = 1 and then t = 1: x(t ) = 1 1 = x b() t 1 t + e (1 t ) e (1 t ) 1 t = x b () t + e (1 t ) e t = 1 0 = x b () e x b () = 1 + e 1 If x starts below this boundary, an exponential running time is to be expeted, beause the first desent does not find a solution. 4.2 Baktraking analysis The overable exponential running time phase B is shown in figure 2. In this phase baktraking ours, when there are not enough overing marks available to over the remaining random subgraph. Baktraking analysis an be diffiult, beause of onfiguration tree node dependenies. The problem is approahed level by level of the onfiguration tree and the number of nodes at eah level is taken into aount. This is feasible, beause the omputation time depends on the number of nodes, but not on the order they are gone through. At time t the remaining overing marks xñ of the first desent are not enough. From the point of view of the onfiguration tree, the onfiguration tree node at time t is pointed to by the blue arrow in the example figure 1. x () and the first desent ross at time t at ( x, ). At time t there are xñ overing marks remaining. As disussed in the previous setion, we always have a random graph, when first desending the onfiguration tree and removing randomly seleted verties and edges. The subgraph at time t is G G(Ñ, ) and it must be baktraked in Ñ exponential time, beause it has no solution. The subgraph G dominates the running time, whih an be approximated with the amount of nodes in the subgraph. 7

8 Figure 4: First desent into the onfiguration tree. Dotted line is x b () and long dashed line is x (). The lines start at = 2.0. The symbols are numerial results from a random graph with 10 6 verties. Figure is from [3]. 8

9 From the experimental data we know that exponential solution times( are log-normal ) distributed for large N. The typial solution time is e Nτ(x,). Denote with t bt GÑ,, x the baktraking time of the unoverable GÑ,. The normalized averaged logarithmi running time is Ñ Ñ [ ( )] 1 the quenhed average τ(x, ) = lim N N ln t bt GÑ,, x. Here the logarithm enfores that Ñ we obtain the typial running time, beause the solution times are log-normal distributed. The baktraking time is upper bounded by the number of leaves of the subtree times the number of verties in the subgraph t bt ÑN l. The linear Ñ O(N) ontribution an be disarded and we just use the number of leaves to approximate the exponential subgraph running time: 1 [ ( )] τ(x, ) lim N N ln N l GÑ,, x Ñ The number of leaves ( is upper ) bounded by the distribution of remaining overing marks on Ñ the remaining verties. Similar to the alulations done in equation 1 we get for the xñ unbounded version of the algorithm τ(x, ) { xln x + (1 x)ln (1 x)} For the bounded version of the branh-and-bound algorithm, we have to take into aount the level at whih the bound stops the traversing of the onfiguration tree. We mark with κñ the level in the subtree, where the bound beomes effetive. Omitting a lot of alulations the result for the bounded version is presented here: τ(x, ) max κ= x,...,1 [ κs an ( )] x κ, κ s an (x, ) = x lnx (1 x )ln(1 x ) + 2 ln(x [2 x ]) The typial running time is approximated with the largest subtree by finding the saddle point 3 on the κ value. Figure 2 shows also this analytial result. It is worth noting that the analytial results seem to fit well with the experimental data. 5 Summary A simple branh-and-bound algorithm was introdued for the vertex-over problem. Experimental data of typial running times for the algorithm was shown. Two exponential dynamial phases and one linear phase were disernible from the data. The first-moment method was explained and a lower bound on x () was onstruted by using the average vertex-over amount as an upper bound for the vertex-over probability of a graph. Analysis of the first desent vertex-over algorithm was done and (x, )-trajetories of first desent runs were analysed and experimental data of them displayed. The dynami phase boundary x b (), whih shows where exponential solution times start ourring, was alulated. In the analysis, important steps were the onsidering of the urrent graph with overed verties and edges removed, alulating the probability for a not-isolated vertex and alulating the amount of available overing marks at a time step, using a ontinuous (in the thermodynami limit) resaled time. In the baktraking analysis the typial running time was alulated for the unbounded version of the algorithm using the amount of leaves in the baktraking subtree. For the bounded version (3) 9

10 the typial running time was found by onsidering the largest subgraph that was possible with the bound effetive. Referenes [1] A. M. Frieze. Disr. Math., 81(171), [2] Alexander K. Hartmann and Martin Weigt. Phase Transitions in Combinatorial Optimization Problems. WILEY-VCH, [3] Martin Weigt and Alexander K. Hartmann. Typial solution time for a vertex-overing algorithm on finite-onnetivity random graphs. Physial Review Letters, 86(8), February

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive

More information

The Implementation of RRTs for a Remote-Controlled Mobile Robot

The Implementation of RRTs for a Remote-Controlled Mobile Robot ICCAS5 June -5, KINEX, Gyeonggi-Do, Korea he Implementation of RRs for a Remote-Controlled Mobile Robot Chi-Won Roh*, Woo-Sub Lee **, Sung-Chul Kang *** and Kwang-Won Lee **** * Intelligent Robotis Researh

More information

Gray Codes for Reflectable Languages

Gray Codes for Reflectable Languages Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings

More information

The Happy Ending Problem

The Happy Ending Problem The Happy Ending Problem Neeldhara Misra STATUTORY WARNING This doument is a draft version 1 Introdution The Happy Ending problem first manifested itself on a typial wintery evening in 1933 These evenings

More information

1 The Knuth-Morris-Pratt Algorithm

1 The Knuth-Morris-Pratt Algorithm 5-45/65: Design & Analysis of Algorithms September 26, 26 Leture #9: String Mathing last hanged: September 26, 27 There s an entire field dediated to solving problems on strings. The book Algorithms on

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based

More information

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient

More information

8 Instruction Selection

8 Instruction Selection 8 Instrution Seletion The IR ode instrutions were designed to do exatly one operation: load/store, add, subtrat, jump, et. The mahine instrutions of a real CPU often perform several of these primitive

More information

Chapter 2: Introduction to Maple V

Chapter 2: Introduction to Maple V Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard

More information

Detection and Recognition of Non-Occluded Objects using Signature Map

Detection and Recognition of Non-Occluded Objects using Signature Map 6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,

More information

Finding the Equation of a Straight Line

Finding the Equation of a Straight Line Finding the Equation of a Straight Line You should have, before now, ome aross the equation of a straight line, perhaps at shool. Engineers use this equation to help determine how one quantity is related

More information

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer

More information

Data Structures in Java

Data Structures in Java Data Strutures in Java Leture 8: Trees and Tree Traversals. 10/5/2015 Daniel Bauer 1 Trees in Computer Siene A lot of data omes in a hierarhial/nested struture. Mathematial expressions. Program struture.

More information

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr

More information

Directed Rectangle-Visibility Graphs have. Abstract. Visibility representations of graphs map vertices to sets in Euclidean space and

Directed Rectangle-Visibility Graphs have. Abstract. Visibility representations of graphs map vertices to sets in Euclidean space and Direted Retangle-Visibility Graphs have Unbounded Dimension Kathleen Romanik DIMACS Center for Disrete Mathematis and Theoretial Computer Siene Rutgers, The State University of New Jersey P.O. Box 1179,

More information

13.1 Numerical Evaluation of Integrals Over One Dimension

13.1 Numerical Evaluation of Integrals Over One Dimension 13.1 Numerial Evaluation of Integrals Over One Dimension A. Purpose This olletion of subprograms estimates the value of the integral b a f(x) dx where the integrand f(x) and the limits a and b are supplied

More information

Incremental Mining of Partial Periodic Patterns in Time-series Databases

Incremental Mining of Partial Periodic Patterns in Time-series Databases CERIAS Teh Report 2000-03 Inremental Mining of Partial Periodi Patterns in Time-series Dataases Mohamed G. Elfeky Center for Eduation and Researh in Information Assurane and Seurity Purdue University,

More information

Graphs in L A TEX. Robert A. Beeler. January 8, 2017

Graphs in L A TEX. Robert A. Beeler. January 8, 2017 Graphs in L A TEX Robert A. Beeler January 8, 2017 1 Introdution This doument is to provide a quik and dirty guide for building graphs in L A TEX. Muh of the doument is devoted to examples of things that

More information

Numerical simulation of hemolysis: a comparison of Lagrangian and Eulerian modelling

Numerical simulation of hemolysis: a comparison of Lagrangian and Eulerian modelling Modelling in Mediine and Biology VI 361 Numerial simulation of hemolysis: a omparison of Lagrangian and Eulerian modelling S. Pirker 1, H. Shima 2 & M. Stoiber 2 1 Johannes Kepler University, 4040 Linz,

More information

Boosted Random Forest

Boosted Random Forest Boosted Random Forest Yohei Mishina, Masamitsu suhiya and Hironobu Fujiyoshi Department of Computer Siene, Chubu University, 1200 Matsumoto-ho, Kasugai, Aihi, Japan {mishi, mtdoll}@vision.s.hubu.a.jp,

More information

Dynamic Programming. Lecture #8 of Algorithms, Data structures and Complexity. Joost-Pieter Katoen Formal Methods and Tools Group

Dynamic Programming. Lecture #8 of Algorithms, Data structures and Complexity. Joost-Pieter Katoen Formal Methods and Tools Group Dynami Programming Leture #8 of Algorithms, Data strutures and Complexity Joost-Pieter Katoen Formal Methods and Tools Group E-mail: katoen@s.utwente.nl Otober 29, 2002 JPK #8: Dynami Programming ADC (214020)

More information

Sparse Certificates for 2-Connectivity in Directed Graphs

Sparse Certificates for 2-Connectivity in Directed Graphs Sparse Certifiates for 2-Connetivity in Direted Graphs Loukas Georgiadis Giuseppe F. Italiano Aikaterini Karanasiou Charis Papadopoulos Nikos Parotsidis Abstrat Motivated by the emergene of large-sale

More information

This fact makes it difficult to evaluate the cost function to be minimized

This fact makes it difficult to evaluate the cost function to be minimized RSOURC LLOCTION N SSINMNT In the resoure alloation step the amount of resoures required to exeute the different types of proesses is determined. We will refer to the time interval during whih a proess

More information

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of

More information

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

Exploring the Commonality in Feature Modeling Notations

Exploring the Commonality in Feature Modeling Notations Exploring the Commonality in Feature Modeling Notations Miloslav ŠÍPKA Slovak University of Tehnology Faulty of Informatis and Information Tehnologies Ilkovičova 3, 842 16 Bratislava, Slovakia miloslav.sipka@gmail.om

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless

More information

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis

More information

Definitions Homework. Quine McCluskey Optimal solutions are possible for some large functions Espresso heuristic. Definitions Homework

Definitions Homework. Quine McCluskey Optimal solutions are possible for some large functions Espresso heuristic. Definitions Homework EECS 33 There be Dragons here http://ziyang.ees.northwestern.edu/ees33/ Teaher: Offie: Email: Phone: L477 Teh dikrp@northwestern.edu 847 467 2298 Today s material might at first appear diffiult Perhaps

More information

Introduction to Seismology Spring 2008

Introduction to Seismology Spring 2008 MIT OpenCourseWare http://ow.mit.edu 1.510 Introdution to Seismology Spring 008 For information about iting these materials or our Terms of Use, visit: http://ow.mit.edu/terms. 1.510 Leture Notes 3.3.007

More information

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

Parametric Abstract Domains for Shape Analysis

Parametric Abstract Domains for Shape Analysis Parametri Abstrat Domains for Shape Analysis Xavier RIVAL (INRIA & Éole Normale Supérieure) Joint work with Bor-Yuh Evan CHANG (University of Maryland U University of Colorado) and George NECULA (University

More information

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification erformane Improvement of TC on Wireless Cellular Networks by Adaptive Combined with Expliit Loss tifiation Masahiro Miyoshi, Masashi Sugano, Masayuki Murata Department of Infomatis and Mathematial Siene,

More information

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks A Dual-Hamiltonian-Path-Based Multiasting Strategy for Wormhole-Routed Star Graph Interonnetion Networks Nen-Chung Wang Department of Information and Communiation Engineering Chaoyang University of Tehnology,

More information

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communiations 1 RAC 2 E: Novel Rendezvous Protool for Asynhronous Cognitive Radios in Cooperative Environments Valentina Pavlovska,

More information

An Efficient and Scalable Approach to CNN Queries in a Road Network

An Efficient and Scalable Approach to CNN Queries in a Road Network An Effiient and Salable Approah to CNN Queries in a Road Network Hyung-Ju Cho Chin-Wan Chung Dept. of Eletrial Engineering & Computer Siene Korea Advaned Institute of Siene and Tehnology 373- Kusong-dong,

More information

Chemical, Biological and Radiological Hazard Assessment: A New Model of a Plume in a Complex Urban Environment

Chemical, Biological and Radiological Hazard Assessment: A New Model of a Plume in a Complex Urban Environment hemial, Biologial and Radiologial Haard Assessment: A New Model of a Plume in a omplex Urban Environment Skvortsov, A.T., P.D. Dawson, M.D. Roberts and R.M. Gailis HPP Division, Defene Siene and Tehnology

More information

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

Recommendation Subgraphs for Web Discovery

Recommendation Subgraphs for Web Discovery Reommation Subgraphs for Web Disovery Arda Antikaioglu Department of Mathematis Carnegie Mellon University aantika@andrew.mu.edu R. Ravi Tepper Shool of Business Carnegie Mellon University ravi@mu.edu

More information

1. The collection of the vowels in the word probability. 2. The collection of real numbers that satisfy the equation x 9 = 0.

1. The collection of the vowels in the word probability. 2. The collection of real numbers that satisfy the equation x 9 = 0. C HPTER 1 SETS I. DEFINITION OF SET We begin our study of probability with the disussion of the basi onept of set. We assume that there is a ommon understanding of what is meant by the notion of a olletion

More information

Introductory Programming, IMM, DTU Systematic Software Test. Software test (afprøvning) Motivation. Structural test and functional test

Introductory Programming, IMM, DTU Systematic Software Test. Software test (afprøvning) Motivation. Structural test and functional test Introdutory Programming, IMM, DTU Systemati Software Test Peter Sestoft a Programs often ontain unintended errors how do you find them? Strutural test Funtional test Notes: Systemati Software Test, http://www.dina.kvl.dk/

More information

Multi-Channel Wireless Networks: Capacity and Protocols

Multi-Channel Wireless Networks: Capacity and Protocols Multi-Channel Wireless Networks: Capaity and Protools Tehnial Report April 2005 Pradeep Kyasanur Dept. of Computer Siene, and Coordinated Siene Laboratory, University of Illinois at Urbana-Champaign Email:

More information

From indoor GIS maps to path planning for autonomous wheelchairs

From indoor GIS maps to path planning for autonomous wheelchairs From indoor GIS maps to path planning for autonomous wheelhairs Jérôme Guzzi and Gianni A. Di Caro Abstrat This work fouses on how to ompute trajetories for an autonomous wheelhair based on indoor GIS

More information

Scheduling Multiple Independent Hard-Real-Time Jobs on a Heterogeneous Multiprocessor

Scheduling Multiple Independent Hard-Real-Time Jobs on a Heterogeneous Multiprocessor Sheduling Multiple Independent Hard-Real-Time Jobs on a Heterogeneous Multiproessor Orlando Moreira NXP Semiondutors Researh Eindhoven, Netherlands orlando.moreira@nxp.om Frederio Valente Universidade

More information

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425) Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University

More information

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method 3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr

More information

HEXA: Compact Data Structures for Faster Packet Processing

HEXA: Compact Data Structures for Faster Packet Processing Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,

More information

CleanUp: Improving Quadrilateral Finite Element Meshes

CleanUp: Improving Quadrilateral Finite Element Meshes CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)

More information

8 : Learning Fully Observed Undirected Graphical Models

8 : Learning Fully Observed Undirected Graphical Models 10-708: Probabilisti Graphial Models 10-708, Spring 2018 8 : Learning Fully Observed Undireted Graphial Models Leturer: Kayhan Batmanghelih Sribes: Chenghui Zhou, Cheng Ran (Harvey) Zhang When learning

More information

A {k, n}-secret Sharing Scheme for Color Images

A {k, n}-secret Sharing Scheme for Color Images A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University

More information

And, the (low-pass) Butterworth filter of order m is given in the frequency domain by

And, the (low-pass) Butterworth filter of order m is given in the frequency domain by Problem Set no.3.a) The ideal low-pass filter is given in the frequeny domain by B ideal ( f ), f f; =, f > f. () And, the (low-pass) Butterworth filter of order m is given in the frequeny domain by B

More information

Taming Decentralized POMDPs: Towards Efficient Policy Computation for Multiagent Settings

Taming Decentralized POMDPs: Towards Efficient Policy Computation for Multiagent Settings Taming Deentralized PMDPs: Towards ffiient Poliy omputation for Multiagent Settings. Nair and M. Tambe omputer Siene Dept. University of Southern alifornia Los Angeles A 90089 nair,tambe @us.edu M. Yokoo

More information

Graph-Based vs Depth-Based Data Representation for Multiview Images

Graph-Based vs Depth-Based Data Representation for Multiview Images Graph-Based vs Depth-Based Data Representation for Multiview Images Thomas Maugey, Antonio Ortega, Pasal Frossard Signal Proessing Laboratory (LTS), Eole Polytehnique Fédérale de Lausanne (EPFL) Email:

More information

COMBINATION OF INTERSECTION- AND SWEPT-BASED METHODS FOR SINGLE-MATERIAL REMAP

COMBINATION OF INTERSECTION- AND SWEPT-BASED METHODS FOR SINGLE-MATERIAL REMAP Combination of intersetion- and swept-based methods for single-material remap 11th World Congress on Computational Mehanis WCCM XI) 5th European Conferene on Computational Mehanis ECCM V) 6th European

More information

Performance Benchmarks for an Interactive Video-on-Demand System

Performance Benchmarks for an Interactive Video-on-Demand System Performane Benhmarks for an Interative Video-on-Demand System. Guo,P.G.Taylor,E.W.M.Wong,S.Chan,M.Zukerman andk.s.tang ARC Speial Researh Centre for Ultra-Broadband Information Networks (CUBIN) Department

More information

Video Data and Sonar Data: Real World Data Fusion Example

Video Data and Sonar Data: Real World Data Fusion Example 14th International Conferene on Information Fusion Chiago, Illinois, USA, July 5-8, 2011 Video Data and Sonar Data: Real World Data Fusion Example David W. Krout Applied Physis Lab dkrout@apl.washington.edu

More information

Wide-baseline Multiple-view Correspondences

Wide-baseline Multiple-view Correspondences Wide-baseline Multiple-view Correspondenes Vittorio Ferrari, Tinne Tuytelaars, Lu Van Gool, Computer Vision Group (BIWI), ETH Zuerih, Switzerland ESAT-PSI, University of Leuven, Belgium {ferrari,vangool}@vision.ee.ethz.h,

More information

Plumber: a method for a multi-scale decomposition of 3D shapes into tubular primitives and bodies

Plumber: a method for a multi-scale decomposition of 3D shapes into tubular primitives and bodies ACM Symposium on Solid Modeling and Appliations (2004) P. Brunet, N. Patrikalakis (Editors) Plumber: a method for a multi-sale deomposition of 3D shapes into tubular primitives and bodies M. Mortara G.

More information

Approximate logic synthesis for error tolerant applications

Approximate logic synthesis for error tolerant applications Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu

More information

Dynamic Algorithms Multiple Choice Test

Dynamic Algorithms Multiple Choice Test 3226 Dynami Algorithms Multiple Choie Test Sample test: only 8 questions 32 minutes (Real test has 30 questions 120 minutes) Årskort Name Eah of the following 8 questions has 4 possible answers of whih

More information

Review (Law of sines and cosine) cosines)

Review (Law of sines and cosine) cosines) Date:03/7,8/01 Review 6.1-6. Objetive: Apply the onept to use the law of the sines and osines to solve oblique triangles Apply the onept to find areas using the law of sines and osines Agenda: Bell ringer

More information

Mining effective design solutions based on a model-driven approach

Mining effective design solutions based on a model-driven approach ata Mining VI 463 Mining effetive design solutions based on a model-driven approah T. Katsimpa 2, S. Sirmakessis 1,. Tsakalidis 1,2 & G. Tzimas 1,2 1 Researh ademi omputer Tehnology Institute, Hellas 2

More information

Modeling of Wire Electrochemical Machining

Modeling of Wire Electrochemical Machining A publiation of 91 CHEMICAL ENGINEERING TRANSACTIONS VOL. 41, 214 Guest Editors: Simonetta Palmas, Mihele Masia, Annalisa Vaa Copyright 214, AIDIC Servizi S.r.l., ISBN 978-88-9568-32-7; ISSN 2283-9216

More information

MATH STUDENT BOOK. 12th Grade Unit 6

MATH STUDENT BOOK. 12th Grade Unit 6 MATH STUDENT BOOK 12th Grade Unit 6 Unit 6 TRIGONOMETRIC APPLICATIONS MATH 1206 TRIGONOMETRIC APPLICATIONS INTRODUCTION 3 1. TRIGONOMETRY OF OBLIQUE TRIANGLES 5 LAW OF SINES 5 AMBIGUITY AND AREA OF A TRIANGLE

More information

Partial Character Decoding for Improved Regular Expression Matching in FPGAs

Partial Character Decoding for Improved Regular Expression Matching in FPGAs Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia

More information

XML Data Streams. XML Stream Processing. XML Stream Processing. Yanlei Diao. University of Massachusetts Amherst

XML Data Streams. XML Stream Processing. XML Stream Processing. Yanlei Diao. University of Massachusetts Amherst XML Stream Proessing Yanlei Diao University of Massahusetts Amherst XML Data Streams XML is the wire format for data exhanged online. Purhase orders http://www.oasis-open.org/ommittees/t_home.php?wg_abbrev=ubl

More information

An Alternative Approach to the Fuzzifier in Fuzzy Clustering to Obtain Better Clustering Results

An Alternative Approach to the Fuzzifier in Fuzzy Clustering to Obtain Better Clustering Results An Alternative Approah to the Fuzziier in Fuzzy Clustering to Obtain Better Clustering Results Frank Klawonn Department o Computer Siene University o Applied Sienes BS/WF Salzdahlumer Str. 46/48 D-38302

More information

Sequential Incremental-Value Auctions

Sequential Incremental-Value Auctions Sequential Inremental-Value Autions Xiaoming Zheng and Sven Koenig Department of Computer Siene University of Southern California Los Angeles, CA 90089-0781 {xiaominz,skoenig}@us.edu Abstrat We study the

More information

Drawing lines. Naïve line drawing algorithm. drawpixel(x, round(y)); double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx; double y = y0;

Drawing lines. Naïve line drawing algorithm. drawpixel(x, round(y)); double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx; double y = y0; Naïve line drawing algorithm // Connet to grid points(x0,y0) and // (x1,y1) by a line. void drawline(int x0, int y0, int x1, int y1) { int x; double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx;

More information

Creating Adaptive Web Sites Through Usage-Based Clustering of URLs

Creating Adaptive Web Sites Through Usage-Based Clustering of URLs Creating Adaptive Web Sites Through Usage-Based Clustering of URLs Bamshad Mobasher Dept. of Computer Siene, DePaul University, Chiago, IL mobasher@s.depaul.edu Robert Cooley, Jaideep Srivastava Dept.

More information

MPhys Final Year Project Dissertation by Andrew Jackson

MPhys Final Year Project Dissertation by Andrew Jackson Development of software for the omputation of the properties of eletrostati eletro-optial devies via both the diret ray traing and paraxial approximation tehniques. MPhys Final Year Projet Dissertation

More information

FUZZY WATERSHED FOR IMAGE SEGMENTATION

FUZZY WATERSHED FOR IMAGE SEGMENTATION FUZZY WATERSHED FOR IMAGE SEGMENTATION Ramón Moreno, Manuel Graña Computational Intelligene Group, Universidad del País Vaso, Spain http://www.ehu.es/winto; {ramon.moreno,manuel.grana}@ehu.es Abstrat The

More information

Visualization of patent analysis for emerging technology

Visualization of patent analysis for emerging technology Available online at www.sienediret.om Expert Systems with Appliations Expert Systems with Appliations 34 (28) 84 82 www.elsevier.om/loate/eswa Visualization of patent analysis for emerging tehnology Young

More information

Plot-to-track correlation in A-SMGCS using the target images from a Surface Movement Radar

Plot-to-track correlation in A-SMGCS using the target images from a Surface Movement Radar Plot-to-trak orrelation in A-SMGCS using the target images from a Surfae Movement Radar G. Golino Radar & ehnology Division AMS, Italy ggolino@amsjv.it Abstrat he main topi of this paper is the formulation

More information

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of

More information

Outline. CS38 Introduction to Algorithms. Administrative Stuff. Administrative Stuff. Motivation/Overview. Administrative Stuff

Outline. CS38 Introduction to Algorithms. Administrative Stuff. Administrative Stuff. Motivation/Overview. Administrative Stuff Outline CS38 Introdution to Algorithms Leture 1 April 1, 2014 administrative stuff motivation and overview of the ourse stale mathings example graphs, representing graphs graph traversals (BFS, DFS) onnetivity,

More information

Accommodations of QoS DiffServ Over IP and MPLS Networks

Accommodations of QoS DiffServ Over IP and MPLS Networks Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering

More information

Connection Guide. Installing the printer locally (Windows) What is local printing? Installing the printer using the Software and Documentation CD

Connection Guide. Installing the printer locally (Windows) What is local printing? Installing the printer using the Software and Documentation CD Page 1 of 7 Connetion Guide Installing the printer loally (Windows) Note: When installing a loally attahed printer, if the operating system is not supported y the Software and Doumentation CD, then the

More information

Torpedo Trajectory Visual Simulation Based on Nonlinear Backstepping Control

Torpedo Trajectory Visual Simulation Based on Nonlinear Backstepping Control orpedo rajetory Visual Simulation Based on Nonlinear Bakstepping Control Peng Hai-jun 1, Li Hui-zhou Chen Ye 1, 1. Depart. of Weaponry Eng, Naval Univ. of Engineering, Wuhan 400, China. Depart. of Aeronautial

More information

UCSB Math TI-85 Tutorials: Basics

UCSB Math TI-85 Tutorials: Basics 3 UCSB Math TI-85 Tutorials: Basis If your alulator sreen doesn t show anything, try adjusting the ontrast aording to the instrutions on page 3, or page I-3, of the alulator manual You should read the

More information

Test Case Generation from UML State Machines

Test Case Generation from UML State Machines Test Case Generation from UML State Mahines Dirk Seifert To ite this version: Dirk Seifert. Test Case Generation from UML State Mahines. [Researh Report] 2008. HAL Id: inria-00268864

More information

Adapting K-Medians to Generate Normalized Cluster Centers

Adapting K-Medians to Generate Normalized Cluster Centers Adapting -Medians to Generate Normalized Cluster Centers Benamin J. Anderson, Deborah S. Gross, David R. Musiant Anna M. Ritz, Thomas G. Smith, Leah E. Steinberg Carleton College andersbe@gmail.om, {dgross,

More information

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Ho Wireless Networks Giorgio Quer, Federio Librino, Lua Canzian, Leonardo Badia, Mihele Zorzi, University of California San Diego La

More information

Improving the Perceptual Uniformity of a Gloss Space

Improving the Perceptual Uniformity of a Gloss Space Improving the Pereptual Uniformity of a Gloss Spae Adria Fores, 1 Mark D. Fairhild, 1 Ingeborg Tastl 2 1 Munsell Color Siene Laboratory, Rohester Institute of Tehnology 2 Hewlett-Pakard Laboratories Abstrat

More information

Dubins Path Planning of Multiple UAVs for Tracking Contaminant Cloud

Dubins Path Planning of Multiple UAVs for Tracking Contaminant Cloud Proeedings of the 17th World Congress The International Federation of Automati Control Dubins Path Planning of Multiple UAVs for Traking Contaminant Cloud S. Subhan, B.A. White, A. Tsourdos M. Shanmugavel,

More information

Boundary Correct Real-Time Soft Shadows

Boundary Correct Real-Time Soft Shadows Boundary Corret Real-Time Soft Shadows Bjarke Jakobsen Niels J. Christensen Bent D. Larsen Kim S. Petersen Informatis and Mathematial Modelling Tehnial University of Denmark {bj, nj, bdl}@imm.dtu.dk, kim@deadline.dk

More information

A Fast Sub-pixel Motion Estimation Algorithm for. H.264/AVC Video Coding

A Fast Sub-pixel Motion Estimation Algorithm for. H.264/AVC Video Coding A Fast Sub-pixel Motion Estimation Algorithm or H.64/AVC Video Coding Weiyao Lin Krit Panusopone David M. Baylon Ming-Ting Sun 3 Zhenzhong Chen 4 and Hongxiang Li 5 Institute o Image Communiation and Inormation

More information

Space- and Time-Efficient BDD Construction via Working Set Control

Space- and Time-Efficient BDD Construction via Working Set Control Spae- and Time-Effiient BDD Constrution via Working Set Control Bwolen Yang Yirng-An Chen Randal E. Bryant David R. O Hallaron Computer Siene Department Carnegie Mellon University Pittsburgh, PA 15213.

More information

Divide-and-conquer algorithms 1

Divide-and-conquer algorithms 1 * 1 Multipliation Divide-and-onquer algorithms 1 The mathematiian Gauss one notied that although the produt of two omplex numbers seems to! involve four real-number multipliations it an in fat be done

More information

Dynamic Backlight Adaptation for Low Power Handheld Devices 1

Dynamic Backlight Adaptation for Low Power Handheld Devices 1 Dynami Baklight Adaptation for ow Power Handheld Devies 1 Sudeep Pasriha, Manev uthra, Shivajit Mohapatra, Nikil Dutt and Nalini Venkatasubramanian 444, Computer Siene Building, Shool of Information &

More information

represent = as a finite deimal" either in base 0 or in base. We an imagine that the omputer first omputes the mathematial = then rounds the result to

represent = as a finite deimal either in base 0 or in base. We an imagine that the omputer first omputes the mathematial = then rounds the result to Sientifi Computing Chapter I Computer Arithmeti Jonathan Goodman Courant Institute of Mathemaial Sienes Last revised January, 00 Introdution One of the many soures of error in sientifi omputing is inexat

More information

35 th Design Automation Conference Copyright 1998 ACM

35 th Design Automation Conference Copyright 1998 ACM Using Reongurable Computing Tehniques to Aelerate Problems in the CAD Domain: A Case Study with Boolean Satisability Peixin Zhong, Pranav Ashar, Sharad Malik and Margaret Martonosi Prineton University

More information

1. Introduction. 2. The Probable Stope Algorithm

1. Introduction. 2. The Probable Stope Algorithm 1. Introdution Optimization in underground mine design has reeived less attention than that in open pit mines. This is mostly due to the diversity o underground mining methods and omplexity o underground

More information