Growing Networks Through Random Walks Without Restarts

Size: px
Start display at page:

Download "Growing Networks Through Random Walks Without Restarts"

Transcription

1 Growing Network Through Random Walk Without Retart Bernardo Amorim, Daniel Figueiredo, Giulio Iacobelli, Giovanni Neglia To cite thi verion: Bernardo Amorim, Daniel Figueiredo, Giulio Iacobelli, Giovanni Neglia. Growing Network Through Random Walk Without Retart. Proceeding of the 7th Workhop on Complex Network (CompleNet 2016), Mar 2016, Dijon, France. <hal > HAL Id: hal Submitted on 13 Dec 2016 HAL i a multi-diciplinary open acce archive for the depoit and diemination of cientific reearch document, whether they are publihed or not. The document may come from teaching and reearch intitution in France or abroad, or from public or private reearch center. L archive ouverte pluridiciplinaire HAL, et detinée au dépôt et à la diffuion de document cientifique de niveau recherche, publié ou non, émanant de établiement d eneignement et de recherche françai ou étranger, de laboratoire public ou privé.

2 Growing Network Through Random Walk Without Retart Bernardo Amorim Daniel Figueiredo Giulio Iacobelli Giovanni Neglia March 2016 Abtract Network growth and evolution i a fundamental theme that ha puzzled cientit for the pat decade. A number of model have been propoed to capture important propertie of real network. In an attempt to better decribe reality, more recent growth model embody local rule of attachment, however they till require a primitive to randomly elect an exiting network node and then ome kind of global knowledge about the network (at leat the et of node and how to reach them). We propoe a purely local network growth model that make no ue of global ampling acro the node. The model i baed on a continuouly moving random walk that after tep connect a new node to it current location, but never retart. Through extenive imulation and theoretical argument, we analyze the behavior of the model finding a fundamental dependency on the parity of, where network with either exponential or a conditional power law degree ditribution can emerge. A increae parity dependency diminihe and the model recover the degree ditribution of Barabái-Albert preferential attachment model. The propoed purely local model indicate that network can grow to exhibit intereting propertie even in the abence of any global rule, uch a global node ampling. 1 Introduction The growth and evolution of network i a fundamental problem in Network Science pecially in the light that network are contantly changing over time. Explaining how and why different real network grow and evolve the way they do ha kept reearcher buy for the pat decade. Not urpriing, variou mathematical model for network growth and evolution have been propoed in the literature, either ad-hoc model tailored to pecific domain, or Publihed in the Proceeding of the 7th Workhop on Complex Network (CompleNet 2016), March 23-25, 2016, Dijon, France. Department of Computer and Sytem Engineering (PESC), Federal Univerity of Rio de Janeiro (UFRJ), Brazil, [bamorim,daniel,giulio]@land.ufrj.br MAESTRO Team, INRIA, Sophia-Antipoli, France, giovanni.neglia@inria.fr 1

3 general model aiming to capture general principle. A celebrated general network growth model i the Barabái-Albert (BA) model [1] which embodie the principle of preferential attachment found in variou real network. A recognized drawback of mot propoed network growth and evolution model i the aumption of global information about the network [2, 4, 5, 8]. For example, the BA model ha a primitive to randomly elect a node from the exiting network according to the degree ditribution. To relax uch aumption, model that attach new node and edge to the exiting network uing local attachment rule, uch a the Random Walk Model [9, 10], have been propoed. Clearly, random walk require knowledge of the current node degree and it neighbor, a much more localized information. Moreover, it eem more reaonable that new node connect to nearby node (through ome local proce) rather than electing new neighbor from the entire population (through ome global proce). However, the Random Walk Model tudied in [9, 10] and other [5, 8] till require a primitive to randomly elect a node from the network (for the purpoe of retarting the walker, for example) and are thu not purely local, becaue they need to know the number and the identity of all network node a well a a way to reach them. Such model have local attachment rule, but global entry point election. More recently, model that have no global primitive have tarted to be explored [6, 7]. A drawback of thee other model i that they rely on an initial network already containing all node uch a a lattice or a regular tree, that i then modified according to local rule, and thu are technically not growth model. In thi work we propoe and explore a network growth model that i purely local, requiring no global election over the node or any initial network. The model work a follow: 0. Start a network with a ingle node with a elf-loop and place a random walk on thi node. 1. Let the random walk take exactly tep. 2. Connect a new node to the node where the walker reide. 3. Stop if the number of node in the network i n, otherwie go to Step 1. Intuitively, the random walk move around continuouly and after every tep a new node i added and connected to it current location. The new node immediately become part of the network and the walker ee no difference between it and any other node. Note that the model ha two parameter and n and grow an undirected tree (apart from the elf-loop at the initial node) ince every new node tart with degree one. Moreover, the random walk i uniform on the neighbor and i never retarted, thu it name NRRW (No Retart Random Walk) model. Figure 1 illutrate a ample path of network growth with = 1 and = 2. Can uch purely local model give rie to intereting network tructure uch a network that exhibit a power-law degree ditribution? Interetingly, we uncover variou non-trivial feature of thi model uch a the fundamental dependency on the parity and magnitude of and it relationhip to the degree ditribution. If i odd and mall we find that network generated by the model tend to have very hort-tailed degree ditribution and 2

4 Figure 1: Example of ample path for network growth for = 1 (top) and = 2 (bottom). The red quare denote the walker poition. The naphot repreent the growing network jut after the new node i connected. very long ditance. On the contrary, if i even and mall, network exhibit a pecial kind of power law degree ditribution (to be formalized later) and very hort ditance! A increae the effect of parity decreae and network exhibit a heavy-tailed degree ditribution. Interetingly, with large enough, the oberved degree ditribution follow a power law with exponent identical to the network generated by the BA model, recovering the effect of preferential attachment. We alo rigorouly prove that for = 1 the random walk i tranient and the degree of every node i bounded from above by a geometric ditribution. Other intereting feature will be highlighted in what follow. The model here propoed i very related to the Random Walk Model [9] which alo allow a random walk to take tep before connecting a new node. The key difference i that in [9], after a new node i attached to the network, the random walk i retarted uniformly at random acro all exiting node in the network. Our random walk never retart, and i therefore a purely local model. Interetingly, the author of [9] how (through imulation and approximation) that their model i cloely related to the BA model and yield a power law degree ditribution independently of. However, recently thi finding ha been quetioned and for = 1 it wa mathematically proven that thi i not the cae [3]. Our model and finding contribute to thi debate and poibly hed light on how both reult could be reconciled (more on thi on Section 6). The remainder of thi paper i organized a follow. Section 2 dicue the model and it intuitive behavior, a well a the connection with prior work. Section 3 preent the evolution of node degree induced by the model. Section 4 analyze the depth of the tree generated by the model. Section 5 preent our theoretical finding for the cae = 1, howing the tranient nature of the model in thi cae. Finally, we ummarize our finding and preent a brief dicuion in Section 6. 3

5 2 Network Growth Model A preented in Section 1, NRRW (No Retart Random Walk) model can be interpreted a a imple random walk that attache a new node to it current location every tep. Similar propoed random walk model for growing network aume that the random walk retart either after connecting a new node or adding ome number of edge to the new node [9, 10]. A retart conit of randomly electing a node from the exiting network (uually uniformly) and placing the random walk on that node. Depite the imilaritie, the lack of retart make NRRW fundamentally different from model with retart. In particular, the retart ignificantly reduce the correlation between conecutive node addition ince it i very unlikely that the random walk will viit the previou new node when walking to add a new node. Intuitively, the random walk loe memory at every retart. Moreover, retart have the drawback of auming knowledge of all network node and random acce to any uch node, and i thu not a purely local growth model. What i intuitively the behavior of NRRW? In a ene, when i large the random walk will have little memory between node addition. However, thi behavior i different from retart ince the random walk will not find itelf on a node choen uniformly at random but on a node choen randomly proportional to it degree. 1 Thu, when i large the NRRW eem imilar to the BA model ince new node connect to random node choen proportionally to their degree. However, ince i fixed and the network grow, will NRRW indeed exhibit a behavior imilar to BA model when << n and then will finally become mall in comparion to the network ize? What about mall value for? Intuitively, the random walk will frequently tumble over the newly created node. Interetingly, thi local behavior depend fundamentally on the parity of. If = 1 then the random walk can alway walk to the newly created node and add a new node to it. Such behavior i jut not poible if = 2 and the walker i not on the root. Thi qualitative difference i not limited to = 1 and = 2. When i odd the walker can alway land to the mot recently added node after tep and then add a new node. For even, thi i impoible unle the walker doe not travere the loop at the initial node. The above obervation jutifie why in the NRRW model we conider a ingle node with a elf-loop a a tarting point. If thi wa not the cae, for any even the random walk would only add node to the original node, trivially contructing a tar ince it can never tep on a newly created node. The loop allow a change of parity with repect to the level of the tree where new node can be added. In fact if the random walk i at level k of the tree and i even, the random walk can only add new edge at the level k +2h for h = 2 k,..., 1,0,1,2,... until it doe not travere the loop. For odd thi i not neceary a the walker can tep on a newly created node to be able to add to node in any level of the tree without returning to the root. Thu, yet another fundamental difference between even and odd. Will thee difference between mall and large and even and odd manifet themelve in tructural propertie of the tree generated by the model? 1 Recall that the teady tate ditribution of a random walk on a fixed network i given by d i / j d j, where d i i the degree of node i. 4

6 In particular, will the degree ditribution fundamentally depend on? In what follow we explore the degree and other propertie of the tree generated by the model howing in fact, that play a key role. 2.1 Simulation In order to tudy the model we deigned and implemented an efficient imulator (in C++) for the NRRW model which ha a parameter, n and r, with r denoting the number of independent run. For each run, we tart with a ingle node with a elf loop, move the random walk tep, connect a new node to it current location, and repeat. We collect tatitic for the variou propertie merging the reult acro the r imulation run, uch a degree ditribution (fraction of node with degree k acro all run). The wort cae time complexity of a imulation run i O(nlogn) but the amortized time complexity i O(n), a we ue a growing vector to repreent the neighbor of a node that double it capacity when needed. Thu, a walker tep require Θ(1) time and a node addition take O(1) amortized time. 3 Degree Behavior In thi ection we tudy the degree ditribution of NRRW through extenive imulation illutrating it behavior and dependencie. Figure 2 how the Complementary Cumulative Ditribution Function (CCDF) of node for variou value for. Surpriingly, when i mall (between 1 and 8) the repective degree ditribution are fundamentally different, exhibiting a kind of power law for even and an exponential tail for odd. Note that when = 1 we do not oberve node with degree larger than 40 while for = 2 a nonnegligible fraction of node have degree greater than We alo oberve oppoite trend in the degree ditribution a increae. For odd, increaing yield a ditribution with heavier tail, while for even increaing yield a ditribution with a lighter tail. A increae into a medium range (between 15 and 64) the trend continue and the two ditribution approach each other. For even larger (between 127 and 256) the degree ditribution become very cloe, being almot inditinguihable. Interetingly, with large the degree follow a power law ditribution, uggeting that the effect of even value dominate the dynamic. Moreover, for large the CCDF exhibit a power law with exponent approximately 2 a it i alo the cae for the BA model which i baed on linear preferential attachment. 2 Thi upport our initial intuition that when i large, the random walk ample node (adding a new node and connecting to it) with probability proportional to their degree, behaving imilarly to the BA model. Figure 3 how the degree ditribution for = 2 but over different value for n. Interetingly, note that independent of n the degree ditribution exhibit the ame power law exponent. However, a n increae the fraction of node greater than k become maller for any fixed k > 0 (with the exception of the 2 Recall that if D follow a power law ditribution, then P(D = k) k α where α > 1 i the power law exponent, and it follow that P(D k) k (α 1). Thu, the CCDF ha an exponent that i one unit le than the PDF. 5

7 Degree ditribution for mall, n=10^6, r=10^ P(D>d) P(D>d) 10 2 Degree ditribution for medium, n=10^6, r=10^ d d Degree ditribution for large, n=10^6, r=10^ P(D>d) d Figure 2: Empirical degree Complementary Cumulative Ditribution Function (CCDF) for variou value of in log log cale (n = 106, r = 103 ). cut-off regime which occur when k i near n). Thi implie that the fraction of node with k = 1, the minimum degree, i increaing with n. Thi i clear by oberving d = 1 (leftmot point in x-axi) and noting that the fraction of node with degree greater than 1 i decreaing with n. Note that uch behavior doe not occur for = 1 which maintain it degree ditribution a n increae (the dot for different n value are barely ditinguihable in plot). If for = 2 the fraction of node with degree 1 increae and converge to 1 a n goe to infinity, then we cannot claim that the degree ditribution follow a power law. However, we can conider the degree ditribution of the node that do not have degree 1. In particular, the conditional degree ditribution, conditioned on D > 1, i hown in Figure 3. Note that the conditional degree ditribution doe not how dependance on n and moreover eem to follow a power law. Thi finding i quite intereting ince the fraction of node with degree 1 can converge to 1 (a n ) while the remainder of node can till follow a power law. Thi may hed new light on the contrating reult in [9] and [3]. We return to thi dicuion in Section 6. Figure 3 alo how the fraction of node with degree greater than 1, P(D > 1), a a function of n for different even value (for odd, it doe not depend ignificantly on n a hown in the top right part of Figure 3 for = 1). Note that for mall the fraction goe to zero reaonably fat (and thu, the fraction of node with degree 1 goe to one). A increae the rate at which P(D > 1) decreae alo decreae. Note that for large (128 or 256) thi decreae i barely noticeable, depite being preent. Interetingly, a odd increae, P(D > 1) decreae but without howing any dependency on n. When = 257, P(D > 1) approache the value hown in Figure 3 for = 256 (reult not hown due to pace contraint). 6

8 P(D>d) Degree ditribution for =2, r=10^9/n n P(D>d) Degree ditribution for =1, r=10^9/n n d d Conditional degree ditribution for =2, r=10^9/n 10 0 Denity of non leave for each N; even P(D>d D>1) n P(D>1) D N Figure 3: Empirical degree CCDF for variou value of n in log log cale (top plot). Empirical degree CCDF conditioned on the degree being greater than 1; fraction of node with degree greater than 1 (bottom plot). A hown, the NRRW model ha a very particular behavior with repect to the degree ditribution. In Section 6 we provide a further dicuion with a few conjecture for it aymptotic behavior with n. 4 Level Behavior We now invetigate the level of the node on the tree generated by the NRRW model. 3 A we have hown above, the model dynamic ha a fundamental dependence on the parity of, pecially when i mall. Indeed, thi dependence alo manifet itelf on the level of the node. Figure 4 how the level ditribution (fraction of node at level larger than l) for a few mall value of eparated into odd and even, repectively. The level ditribution for even decreae very fat. Note that although n = 10 6, when = 2, 90% of node are at level 4 or le and no node i at level 7 or higher. A even increae the level ditribution decreae relatively lower, with 90% of node found at level greater than 4 when = 8. Still, no node i found at level greater than 10. The behavior i completely different for odd, and the level ditribution eem to be uniform (traight line on a linear-linear plot). For = 1 the ditribution ha the heaviet tail with about 4 node per level, giving rie to different level. For = 7 there are about 40 node per level, giving rie to different level. Interetingly, a even increae 3 Recall that the level of node on a tree i given by it ditance to the root, and thu the root i at level zero. 7

9 the level ditribution become heavier while a odd increae the level ditribution become lighter. Figure 4 alo how the level ditribution for large. Indeed, a increae the level ditribution for even and odd become more imilar and the dependency on the parity diminihe. Thi behavior i imilar to what oberved for the degree ditribution, illutrated in Section 3. Note that from the level ditribution we can infer the kind of tree that NRRW generate. When i mall and even, the tree generated are fat and hort, with mot node near the root and a few with very large degree. When i mall and odd, the tree are thin and long with few node pread acro many level and no node with large degree. A increae, the two kind of tree move in each other direction, becoming more and more imilar Depth level ditribution for even, n=10^ Depth level ditribution for odd, n=10^ P(L>l) P(L>l) l l 1.00 Depth level ditribution for large, n=10^6 P(L>l) l Figure 4: Empirical CCDF of the node level for different value (n = 10 6, r = 10 3 ). 5 Theoretical finding for = 1 The numerical imulation with odd and in particular with = 1 ugget that tree grow in depth a the number of node increae. In particular, the growth in depth eem linear on the number of node. Thi i an indication that the random walk i continuouly puhing the tree to lower depth jut never to return to it origin. In a nuthell, the random walk i tranient and viit each node in the tree only a relative mall number of time, with high probability. The following Theorem rigorouly formalize thi intuition. Theorem 1. In the NRRW model with = 1, the number of viit to a node i tochatically dominated by 1 plu a geometric random variable with upport on Z >0. 8

10 Proof. We conider here that the initial network conit of a ingle node with no elf-loop. Thi implifie the notation and doe not compromie the main argument. Let r denote the initial node of the growing network hereafter referred to a the root of the tree (at any tep the growing network i a tree) where the walker reide at time zero. Note that r i the only node at level zero. Let X n be the level (i.e. the ditance from the root) of the node viited by the NRRW at tep n. We call the proce {X n,n Z 0 } the level proce. Note that the random walk viit r the ame number of time that the level proce viit level zero. At tep n > 0 the NRRW i in a node v n with at leat two edge: the one the NRRW ha arrived from and the new one added a a conequence of the NRRW arrival. Let d n 2 denote the degree of node v n. If v n r, the NRRW jump from v n to a node with larger level with probability d n 1 d n 1 2 and with the complementary probability d 1 n 1 2 to a node with maller level. If v n = r, then the level can obviouly only increae. Note that, due to the fact that degree keep changing becaue of the arrival of new edge, the level proce i non-homogeneou (both in time and in pace). We now tudy the evolution of the level proce every two tep, i.e. we conider the proce Y n X 2n. Given that the network i a tree and X 0 = 0, the two-tep level proce can be een a a non-homogeneou reflecting lazy random walk on 2Z 0 = {0,2,4,...}. We denote by p k,h (n) the probability that the level at tep n + 1 i h conditioned on the fact that it i k at tep n. Although the notation hide it, we oberve that the probabilitie p k,h (n) depend on the whole hitory of the NRRW until tep n. The reaon to conider the two-tep level proce i that we can get bound on the tranition probabilitie p k,h (n) that allow a imple comparion with a (biaed) homogeneou random walk. The bound derived above for X n lead immediately to conclude that p k,k+2 (n) = 4 1 for any level k 0 and p k,k 2(n) = 1 4 for k 2, but we can get a tighter bound for p k,k 2 (n). If the NRRW i at level k, all the node on the path between it current poition and the root r have degree at leat 2. If it then move to node v at level k 1, a new edge i attached to v, whoe degree i now at leat 3. The probability to move from v further cloer to the root to a node with level k 2, i then at mot 3 1. It follow then that p k,k 2 (n) = 1 6 for k 2. We conider now a homogeneou biaed lazy random walk (Yn ) n 0 on 2Z 0 tarting from 0 with tranition probabilitie p k,k+2 = 1 4 for all k 2Z 0 and p k,k 2 = 1 6 for k 2Z 0 and k 0. We how that if (Yn ) n 0 alo tart in 0 (Y0 = 0), it i tochatically dominated by (Y n) n 0. We prove it by coupling the two procee a follow. Let (ω n ) n 0 be a equence of independent uniform random variable over [0, 1]. We ue them to generate ample path for both procee (Y n ) n 0 and (Yn ) n 0 a follow: Y n 2, if ω n [0, p k,k 2 (n)) Yn 2, if ω n [0, p Y n+1 = Y n + 2, if ω n [1 p k,k+2 (n),1] Yn+1 k,k 2 ) = Yn + 2, if ω n [1 p k,k+2,1] otherwie otherwie Y n where p k,k 2 (n) and p k,k 2 are 0 if k = 2. We tart oberving that if Y n and Y n have the ame value k, then every time Y n increae alo Y n increae becaue p k,k+2 = 1 4 p k,k 2(n). On the contrary if Y n decreae (a it can happen only Y n 9

11 for k 2), then Y n may decreae or not becaue p k,k 2 (n) 1 6 = p k,k 2. It follow that if Y n and Yn are at the ame level, then Yn+1 Y n+1. We are going to prove by induction on n that Yn+1 Y n+1 for every n. With a light abue of terminology we ay that Y n increae (rep. decreae) if Y n+1 > Y n (rep. Y n+1 < Y n ). We tart oberving that indeed Y0 Y 0, becaue both procee tart in 0. Let u aume that Yn = h k = Y n. For all value of h, every time Yn increae alo Y n increae becaue p k,k+2 = 1 4 p k,k+2(n) and then Yn+1 = h + 1 k + 1 = Y n+1. If h 2, then p h,h 2 = 1 6 p k,k 2 (n) and if Y n decreae then Yn mut alo decreae (Yn+1 = h 1 k 1 = Y n+1 ). It follow that for h 2 then Yn+1 Y n+1. The only cae when Y n may decreae without Yn decreaing i when h = 0 and k 0, but in thi cae Yn+1 = 0 and Y n+1 0. Thi prove that Yn+1 Y n+1 for every n. Given that Yn Y n and both procee tart at level zero, the number of viit of (Y n ) n 0 to level zero i bounded by the number of viit of (Yn ) n 0 to level zero. The homogeneou biaed lazy random walk (Yn ) n 0 i tranient ince p k,k+2 = 1/4 > p k,k 2 = 1/6. Thu, the probability of the firt return time to level 0 i f 0 < 1. By the trong Markov property, the number of viit to level 0 i geometrically ditributed on the et Z >0 with parameter equal to 1 f 0. Since a viit to level zero in (X n ) n 0 (one level proce) implie a viit to level zero in (Y n ) n 0 (two level proce), then it follow that the number of viit of (X n ) n 0 to level zero i bounded by a geometric random variable and then even more o by 1 plu the ame geometric random variable. Now let u conider any node v in the growing network. If the NRWW never viit v, then the degree of b i 1 and the thei follow immediately. Otherwie, let conider the firt time the NRWW viit v to be time t = 0 and let conider v to be the root of the current tree. We can retrace the ame reaoning and conclude that the number of viit to v for t > 0 i bounded by a geometric random variable on Z >0 with parameter equal to 1 f 0. Then the total number of viit to v i bounded by 1 plu uch random variable. Thi conclude the proof. Corollary 1. In the NRRW model with = 1, the degree ditribution of any node i bounded by a geometric ditribution. Thi follow ince the degree of every node equal the number of viit of the random walk to the node plu 1 (the plu 1 account for the fact that any node joining the network, although not yet viited by the walker, ha degree 1). 6 Dicuion and Concluion A we have hown, the NRRW model exhibit intereting feature that fundamentally impact the network it generate. For = 1 the random walk i tranient and node degree i bounded by a geometric ditribution (Theorem 1). For = 2, the fraction of node with degree 1 eem to converge to 1 a n. However, the conditional degree ditribution eem to follow a power law. Can uch reult be made mathematically rigorou? Other intereting quetion alo emerge from our analyi of the NRRW model. In particular, our numerical imulation eem to indicate that for any even, the 10

12 fraction of node with degree 1 will converge to 1 a n. On the other hand, our imulation alo indicate that thi i not the cae for any odd. So will there be a fundamental difference between a fixed but arbitrarily large even and odd? It i hard to imagine that = 2 10 and = would have fundamentally different behavior, ince in both cae the random walk move quite a lot before adding a new node. Of coure, any fixed will be mall a n. Thu, we make the following conjecture: Conjecture 1. For any fixed even, the fraction of node with degree one converge to 1, a n. For any fixed odd, the fraction of node with degree one converge to a number trictly le than 1, a n. If true, uch conjecture would imply that the degree ditribution are alo never identical, for any fixed even or odd. However, our numerical reult indicate that the conditional degree ditribution (conditioned on degree being greater than one) for even, eem to converge to a power law a n. On the other hand, for = 1 we have proved that the random walk i tranient and degree ditribution i bounded by a geometric ditribution (Theorem 1). Can fixed odd value really generate power law? If thi i the cae, then there would be a phae tranition on, from inducing a network with degree ditribution with an exponential tail ( = 1) to a power law tail. Depite the numerical reult indicating the heavy tail degree for = {127, 255}, we make the following conjecture: Conjecture 2. For any fixed even, the conditional degree ditribution i bounded from below by a power law, a n. For any fixed odd, degree ditribution i bounded from above by an exponential, a n. Such conjecture conider that n diverge. In practice n mut be finite when generating a network with NRRW model. Thu, for a fixed n, the difference induced by an even or odd may diminih a increae. In particular, the degree ditribution generated by even and odd value may become arbitrarily cloe a increae, a we have oberved in numerical imulation for a fixed n (Figure 2). Lat, we return to the recent dipute if the Random Walk model with retart generate a power law degree ditribution, independently of [3, 9]. It ha been mathematically proved that when = 1 the fraction of node with degree one converge to 1, a n [3]. At the ame time, imulation reult ugget that the degree ditribution follow a kind of power law [9]. We can attempt to reconcile uch finding by leveraging our own finding on NRRW model. When = 1 the new node i connected to a given exiting node u if i) a neighbor of u i elected at the retart and then ii) the random walk move to u. A node whoe neighbor are all leave would be elected with a probability proportional to it degree. Now it ha been hown that when n the fraction of node that are leave converge to 1, then mot of the neighbor of a non-leaf node are leave and thi node i eentially elected proportionally to it degree, imilarly to the BA model embodying preferential attachment. Thu, the conditional degree ditribution, leaving out degree 1 node, will follow a power law ditribution with the ame exponent a in the BA model. In ome ene, thi reconcile the finding of the two prior work [3, 9]. To conclude, a exemplified above, a fundamental undertanding of NRRW model add to our undertanding of purely local network growth model. In 11

13 particular, beide requiring a le trict aumption to operate, model that do not rely on any global primitive can alo generate network with rich and divere tructural propertie. 7 Acknowledgement Reearch conducted within the context of the THANES Aociate Team, jointly upported by Inria (France) and FAPERJ (Brazil). Thi work ha alo been partially funded through reearch grant from CNPq and CAPES (Brazil). Reference [1] Barabái, A.L., Albert, R.: Emergence of caling in random network. cience 286(5439), (1999) [2] Blanchard, P., Krueger, T., Ruchhaupt, A.: Small world graph by iterated local edge formation. Phy. Rev. E 71, 046,139 (2005) [3] Canning, C., Jordan, J.: Random walk attachment graph. Electronic Communication in Probability 18, 1 5 (2013) [4] Colman, E.R., Rodger, G.J.: Local rewiring rule for evolving complex network. Phyica A: Statitical Mechanic and it Application 416, (2014) [5] Gabel, A., Redner, S.: Sublinear but never uperlinear preferential attachment by local network growth. Journal of Statitical Mechanic: Theory and Experiment 2013(02), P02,043 (2013) [6] Ikeda, N.: Network formation determined by the diffuion proce of random walker. Journal of Phyic A: Mathematical and Theoretical 41(23), 235,005 (2008) [7] Ikeda, N.: Network formed by movement of random walker on a bethe lattice. In: Journal of Phyic: Conference Serie, vol. 490, p IOP Publihing (2014) [8] Li, M., Gao, L., Fan, Y., Wu, J., Di, Z.: Emergence of global preferential attachment from local interaction. New Journal of Phyic 12(4), 043,029 (2010) [9] Saramäki, J., Kaki, K.: Scale-free network generated by random walker. Phyica A: Statitical Mechanic and it Application 341, (2004) [10] Vázquez, A.: Growing network with local rule: Preferential attachment, clutering hierarchy, and degree correlation. Phyical Review E 67(5), 056,104 (2003) 12

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

Delaunay Triangulation: Incremental Construction

Delaunay Triangulation: Incremental Construction Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )

More information

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline Generic Travere CS 62, Lecture 9 Jared Saia Univerity of New Mexico Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v) from the bag if (v i unmarked) mark v; parent(v) = p;

More information

A note on degenerate and spectrally degenerate graphs

A note on degenerate and spectrally degenerate graphs A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove

More information

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two

More information

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

arxiv: v1 [cs.ds] 27 Feb 2018

arxiv: v1 [cs.ds] 27 Feb 2018 Incremental Strong Connectivity and 2-Connectivity in Directed Graph Louka Georgiadi 1, Giueppe F. Italiano 2, and Niko Parotidi 2 arxiv:1802.10189v1 [c.ds] 27 Feb 2018 1 Univerity of Ioannina, Greece.

More information

Chapter 13 Non Sampling Errors

Chapter 13 Non Sampling Errors Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption

More information

CENTER-POINT MODEL OF DEFORMABLE SURFACE

CENTER-POINT MODEL OF DEFORMABLE SURFACE CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D

More information

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation

More information

xy-monotone path existence queries in a rectilinear environment

xy-monotone path existence queries in a rectilinear environment CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

USING ARTIFICIAL NEURAL NETWORKS TO APPROXIMATE A DISCRETE EVENT STOCHASTIC SIMULATION MODEL

USING ARTIFICIAL NEURAL NETWORKS TO APPROXIMATE A DISCRETE EVENT STOCHASTIC SIMULATION MODEL USING ARTIFICIAL NEURAL NETWORKS TO APPROXIMATE A DISCRETE EVENT STOCHASTIC SIMULATION MODEL Robert A. Kilmer Department of Sytem Engineering Unite State Military Acaemy Wet Point, NY 1996 Alice E. Smith

More information

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt

More information

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds * Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

Markov Random Fields in Image Segmentation

Markov Random Fields in Image Segmentation Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image

More information

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov

More information

Shortest Paths with Single-Point Visibility Constraint

Shortest Paths with Single-Point Visibility Constraint Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet

More information

A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED

A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED Jutin Domke and Yianni Aloimono Computational Viion Laboratory, Center for Automation Reearch Univerity of Maryland College Park,

More information

A Novel Feature Line Segment Approach for Pattern Classification

A Novel Feature Line Segment Approach for Pattern Classification 12th International Conference on Information Fuion Seattle, WA, USA, July 6-9, 2009 A Novel Feature Line Segment Approach for Pattern Claification Yi Yang Intitute of Integrated Automation Xi an Jiaotong

More information

Trainable Context Model for Multiscale Segmentation

Trainable Context Model for Multiscale Segmentation Trainable Context Model for Multicale Segmentation Hui Cheng and Charle A. Bouman School of Electrical and Computer Engineering Purdue Univerity Wet Lafayette, IN 47907-1285 {hui, bouman}@ ecn.purdue.edu

More information

Algorithmic Discrete Mathematics 4. Exercise Sheet

Algorithmic Discrete Mathematics 4. Exercise Sheet Algorithmic Dicrete Mathematic. Exercie Sheet Department of Mathematic SS 0 PD Dr. Ulf Lorenz 0. and. May 0 Dipl.-Math. David Meffert Verion of May, 0 Groupwork Exercie G (Shortet path I) (a) Calculate

More information

/06/$ IEEE 364

/06/$ IEEE 364 006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;

More information

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de

More information

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh

More information

Shortest Path Routing in Arbitrary Networks

Shortest Path Routing in Arbitrary Networks Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,

More information

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES MAKARA, TEKNOLOGI, VOL. 9, NO., APRIL 5: 3-35 3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES Mochammad Zulianyah Informatic Engineering, Faculty of Engineering, ARS International Univerity,

More information

How to Select Measurement Points in Access Point Localization

How to Select Measurement Points in Access Point Localization Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,

More information

else end while End References

else end while End References 621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized

More information

A Multi-objective Genetic Algorithm for Reliability Optimization Problem

A Multi-objective Genetic Algorithm for Reliability Optimization Problem International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR

More information

3D SMAP Algorithm. April 11, 2012

3D SMAP Algorithm. April 11, 2012 3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative

More information

Domain-Specific Modeling for Rapid System-Wide Energy Estimation of Reconfigurable Architectures

Domain-Specific Modeling for Rapid System-Wide Energy Estimation of Reconfigurable Architectures Domain-Specific Modeling for Rapid Sytem-Wide Energy Etimation of Reconfigurable Architecture Seonil Choi 1,Ju-wookJang 2, Sumit Mohanty 1, Viktor K. Praanna 1 1 Dept. of Electrical Engg. 2 Dept. of Electronic

More information

CSE 250B Assignment 4 Report

CSE 250B Assignment 4 Report CSE 250B Aignment 4 Report March 24, 2012 Yuncong Chen yuncong@c.ucd.edu Pengfei Chen pec008@ucd.edu Yang Liu yal060@c.ucd.edu Abtract In thi project, we implemented the recurive autoencoder (RAE) a decribed

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit

More information

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,

More information

New Structural Decomposition Techniques for Constraint Satisfaction Problems

New Structural Decomposition Techniques for Constraint Satisfaction Problems New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.

More information

KS3 Maths Assessment Objectives

KS3 Maths Assessment Objectives KS3 Math Aement Objective Tranition Stage 9 Ratio & Proportion Probabilit y & Statitic Appreciate the infinite nature of the et of integer, real and rational number Can interpret fraction and percentage

More information

Application of Social Relation Graphs for Early Detection of Transient Spammers

Application of Social Relation Graphs for Early Detection of Transient Spammers Radolaw rendel and Henryk Krawczyk Application of Social Relation raph for Early Detection of Tranient Spammer RADOSLAW RENDEL and HENRYK KRAWCZYK Electronic, Telecommunication and Informatic Department

More information

Efficient Data Forwarding in Mobile Social Networks with Diverse Connectivity Characteristics

Efficient Data Forwarding in Mobile Social Networks with Diverse Connectivity Characteristics Efficient Data Forwarding in Mobile Social Network with Divere Connectivity Characteritic Xiaomei Zhang and Guohong Cao Department of Computer Science and Engineering The Pennylvania State Univerity, Univerity

More information

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput Modeling the Effect of Mobile Handoff on TCP and TFRC Throughput Antonio Argyriou and Vijay Madietti School of Electrical and Computer Engineering Georgia Intitute of Technology Atlanta, Georgia 3332 25,

More information

Focused Video Estimation from Defocused Video Sequences

Focused Video Estimation from Defocused Video Sequences Focued Video Etimation from Defocued Video Sequence Junlan Yang a, Dan Schonfeld a and Magdi Mohamed b a Multimedia Communication Lab, ECE Dept., Univerity of Illinoi, Chicago, IL b Phyical Realization

More information

An Approach to a Test Oracle for XML Query Testing

An Approach to a Test Oracle for XML Query Testing An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,

More information

Drawing Lines in 2 Dimensions

Drawing Lines in 2 Dimensions Drawing Line in 2 Dimenion Drawing a traight line (or an arc) between two end point when one i limited to dicrete pixel require a bit of thought. Conider the following line uperimpoed on a 2 dimenional

More information

UC Berkeley International Conference on GIScience Short Paper Proceedings

UC Berkeley International Conference on GIScience Short Paper Proceedings UC Berkeley International Conference on GIScience Short Paper Proceeding Title A novel method for probabilitic coverage etimation of enor network baed on 3D vector repreentation in complex urban environment

More information

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.

More information

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,

More information

Representations and Transformations. Objectives

Representations and Transformations. Objectives Repreentation and Tranformation Objective Derive homogeneou coordinate tranformation matrice Introduce tandard tranformation - Rotation - Tranlation - Scaling - Shear Scalar, Point, Vector Three baic element

More information

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks Nearly Contant Approximation for Data Aggregation Scheduling in Wirele Senor Network Scott C.-H. Huang, Peng-Jun Wan, Chinh T. Vu, Yinghu Li and France Yao Computer Science Department, City Univerity of

More information

SECTOR BASED MULTICAST ROUTING ALGORITHM FOR MOBILE AD-HOC NETWORKS

SECTOR BASED MULTICAST ROUTING ALGORITHM FOR MOBILE AD-HOC NETWORKS SECTOR BASED MULTICAST ROUTING ALGORITHM OR MOBILE AD-HOC NETWORKS Murali Paramewaran 1 and Chittaranjan Hota 2 1 Department of Computer Science & Information Sytem, BITS-Pilani, Pilani, India 2 Department

More information

Minimum Energy Reliable Paths Using Unreliable Wireless Links

Minimum Energy Reliable Paths Using Unreliable Wireless Links Minimum Energy Reliable Path Uing Unreliable Wirele Link Qunfeng Dong Department of Computer Science Univerity of Wiconin-Madion Madion, Wiconin 53706 qunfeng@c.wic.edu Micah Adler Department of Computer

More information

Development of an atmospheric climate model with self-adapting grid and physics

Development of an atmospheric climate model with self-adapting grid and physics Intitute of Phyic Publihing Journal of Phyic: Conference Serie 16 (2005) 353 357 doi:10.1088/1742-6596/16/1/049 SciDAC 2005 Development of an atmopheric climate model with elf-adapting grid and phyic Joyce

More information

Multiclass Road Sign Detection using Multiplicative Kernel

Multiclass Road Sign Detection using Multiplicative Kernel Proceeding of the Croatian Computer Viion Workhop, Year 1 Multicla Road Sign Detection uing Multiplicative Kernel Valentina Zadrija Mireo d. d. Zagreb, Croatia valentina.zadrija@mireo.hr Siniša Šegvić

More information

Comparison of Methods for Horizon Line Detection in Sea Images

Comparison of Methods for Horizon Line Detection in Sea Images Comparion of Method for Horizon Line Detection in Sea Image Tzvika Libe Evgeny Gerhikov and Samuel Koolapov Department of Electrical Engineering Braude Academic College of Engineering Karmiel 2982 Irael

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck. Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization

More information

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal

More information

Today s Outline. CS 362, Lecture 19. DFS and BFS. Generic Traverse. BFS and DFS Wrapup Shortest Paths. Jared Saia University of New Mexico

Today s Outline. CS 362, Lecture 19. DFS and BFS. Generic Traverse. BFS and DFS Wrapup Shortest Paths. Jared Saia University of New Mexico Today Outline CS 362, Lecture 9 Jared Saia Univerity of New Mexico BFS and DFS Wrapup Shortet Path Generic Travere DFS and BFS Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v)

More information

Chapter S:II (continued)

Chapter S:II (continued) Chapter S:II (continued) II. Baic Search Algorithm Sytematic Search Graph Theory Baic State Space Search Depth-Firt Search Backtracking Breadth-Firt Search Uniform-Cot Search AND-OR Graph Baic Depth-Firt

More information

A User-Attention Based Focus Detection Framework and Its Applications

A User-Attention Based Focus Detection Framework and Its Applications A Uer-Attention Baed Focu Detection Framework and It Application Chia-Chiang Ho, Wen-Huang Cheng, Ting-Jian Pan, Ja-Ling Wu Communication and Multimedia Laboratory, Department of Computer Science and Information

More information

Modeling and Analysis of Slow CW Decrease for IEEE WLAN

Modeling and Analysis of Slow CW Decrease for IEEE WLAN Modeling and Analyi of Slow CW Decreae for IEEE 82. WLAN Qiang Ni, Imad Aad 2, Chadi Barakat, and Thierry Turletti Planete Group 2 Planete Group INRIA Sophia Antipoli INRIA Rhône-Alpe Sophia Antipoli,

More information

Multi-Target Tracking In Clutter

Multi-Target Tracking In Clutter Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and

More information

Modeling of underwater vehicle s dynamics

Modeling of underwater vehicle s dynamics Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation

More information

Uninformed Search Complexity. Informed Search. Search Revisited. Day 2/3 of Search

Uninformed Search Complexity. Informed Search. Search Revisited. Day 2/3 of Search Informed Search ay 2/3 of Search hap. 4, Ruel & Norvig FS IFS US PFS MEM FS IS Uninformed Search omplexity N = Total number of tate = verage number of ucceor (branching factor) L = Length for tart to goal

More information

Stress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling

Stress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Stre-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Menter F.R. ANSYS Germany GmbH Introduction It i oberved in many CFD imulation that RANS model how inherent technology limitation

More information

A Practical Model for Minimizing Waiting Time in a Transit Network

A Practical Model for Minimizing Waiting Time in a Transit Network A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

An Intro to LP and the Simplex Algorithm. Primal Simplex

An Intro to LP and the Simplex Algorithm. Primal Simplex An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

TAM 212 Worksheet 3. Solutions

TAM 212 Worksheet 3. Solutions Name: Group member: TAM 212 Workheet 3 Solution The workheet i concerned with the deign of the loop-the-loop for a roller coater ytem. Old loop deign: The firt generation of loop wa circular, a hown below.

More information

Planning of scooping position and approach path for loading operation by wheel loader

Planning of scooping position and approach path for loading operation by wheel loader 22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader

More information

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT

More information

IMPLEMENTATION OF CHORD LENGTH SAMPLING FOR TRANSPORT THROUGH A BINARY STOCHASTIC MIXTURE

IMPLEMENTATION OF CHORD LENGTH SAMPLING FOR TRANSPORT THROUGH A BINARY STOCHASTIC MIXTURE Nuclear Mathematical and Computational Science: A Century in Review, A Century Anew Gatlinburg, Tenneee, April 6-, 003, on CD-ROM, American Nuclear Society, LaGrange Park, IL (003) IMPLEMENTATION OF CHORD

More information

Kinematics Programming for Cooperating Robotic Systems

Kinematics Programming for Cooperating Robotic Systems Kinematic Programming for Cooperating Robotic Sytem Critiane P. Tonetto, Carlo R. Rocha, Henrique Sima, Altamir Dia Federal Univerity of Santa Catarina, Mechanical Engineering Department, P.O. Box 476,

More information

IMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak

IMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak IMPROVED DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION Tak-Shing Wong, Charle A. Bouman, and Ilya Pollak School of Electrical and Computer Engineering Purdue Univerity ABSTRACT We propoe

More information

Optimal Gossip with Direct Addressing

Optimal Gossip with Direct Addressing Optimal Goip with Direct Addreing Bernhard Haeupler Microoft Reearch 1065 La Avenida, Mountain View Mountain View, CA 94043 haeupler@c.cmu.edu Dahlia Malkhi Microoft Reearch 1065 La Avenida, Mountain View

More information

Edits in Xylia Validity Preserving Editing of XML Documents

Edits in Xylia Validity Preserving Editing of XML Documents dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,

More information

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity

More information

Brief Announcement: Distributed 3/2-Approximation of the Diameter

Brief Announcement: Distributed 3/2-Approximation of the Diameter Brief Announcement: Ditributed /2-Approximation of the Diameter Preliminary verion of a brief announcement to appear at DISC 14 Stephan Holzer MIT holzer@mit.edu David Peleg Weizmann Intitute david.peleg@weizmann.ac.il

More information

A New Approach to Pipeline FFT Processor

A New Approach to Pipeline FFT Processor A ew Approach to Pipeline FFT Proceor Shouheng He and Mat Torkelon Department of Applied Electronic, Lund Univerity S- Lund, SWEDE email: he@tde.lth.e; torkel@tde.lth.e Abtract A new VLSI architecture

More information

Gray-level histogram. Intensity (grey-level) transformation, or mapping. Use of intensity transformations:

Gray-level histogram. Intensity (grey-level) transformation, or mapping. Use of intensity transformations: Faculty of Informatic Eötvö Loránd Univerity Budapet, Hungary Lecture : Intenity Tranformation Image enhancement by point proceing Spatial domain and frequency domain method Baic Algorithm for Digital

More information

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online

More information

A NEW APPROACH IN MEASURING OF THE ROUGHNESS FOR SURFACE CONSTITUTED WITH MACHINING PROCESS BY MATERIAL REMOVAL

A NEW APPROACH IN MEASURING OF THE ROUGHNESS FOR SURFACE CONSTITUTED WITH MACHINING PROCESS BY MATERIAL REMOVAL International Journal of Mechanical and Production Engineering Reearch and Development (IJMPERD) ISSN 49-689 Vol. 3, Iue, Mar 3, 4-5 TJPRC Pvt. Ltd. A NEW APPROACH IN MEASURING OF THE ROUGHNESS FOR SURFACE

More information

3-D Visualization of a Gene Regulatory Network: Stochastic Search for Layouts

3-D Visualization of a Gene Regulatory Network: Stochastic Search for Layouts 3-D Viualization of a Gene Regulatory Network: Stochatic Search for Layout Naoki Hooyama Department of Electronic Engineering, Univerity of Tokyo, Japan hooyama@iba.k.u-tokyo.ac.jp Abtract- In recent year,

More information