Data Mining: Clustering
|
|
- Poppy Sims
- 6 years ago
- Views:
Transcription
1 Bi-Clustering COMP Seminar Spring 011 Data Mining: Clustering k t 1 K-means clustering minimizes Where ist ( x, c i t i c t ) ist ( x m j 1 ( x ij i, c c t ) tj )
2 Clustering by Pattern Similarity (p-clustering) The micro-array raw ata shows 3 genes an their values in a multi-imensional space Parallel lcoorinates Plots Difficult to fin their patterns non-traitional clustering 3 Clusters Are Clear After Projection 4
3 Motivation E-Commerce: collaborative filtering Viewer Viewer Viewer Viewer Viewer Motivation rating viewer 1 viewer viewer 3 viewer 4 viewer 5 movie e 1 movie e movie e 3 movie e44 movie e 5 movie e 6 movie e 7 6
4 Motivation Viewer Viewer Viewer Viewer Viewer Motivation 8 ra ating 6 4 viewer 1 viewer 3 viewer 4 0 movie 1 movie movie 4 movie 6 8
5 9 Motivation DNA microarray analysis CH1I CH1B CH1D CHI CHB CTFC VPS EFB SSA FUN SP MDM CYS DEP NTG Motivation stre ength CH1I CH1D CHB conition 10
6 Motivation Strong coherence exhibits by the selecte objects on the selecte attributes. They are not necessarily close to each other but rather bear a constant shift. Object/attribute bias bi-cluster 11 Challenges The set of objects an the set of attributes are usually unknown. Different objects/attributes may possess ifferent biases an such biases may be local to the set of selecte objects/attributes are usually unknown in avance May have many unspecifie entries 1
7 Previous Work Subspace clustering Ientifying a set of objects an a set of attributes such that the set of objects are physically close to each other on the subspace forme by the set of attributes. Collaborative filtering: i Pearson R Only consiers global offset of each object/attribute. ( o1 o1 )( o o) ( o o1 ) ( o ( o 1 ) 13 bi-cluster Consists of a (sub)set of objects an a (sub)set of attributes Correspons to a submatrix Occupancy threshol Each object/attribute has to be fille by a certain percentage. Volume: number of specifie entries in the submatrix Base: average value of each object/attribute (in the bi-cluster) 14
8 bi-cluster 15 CH1I CH1B CH1D CHI CHB Obj base CTFC3 VPS EFB SSA1 FUN14 SP07 MDM10 CYS DEP1 NTG1 Attr base bi-cluster 16 Perfect -cluster ij ij ij ij Ij Ij ij Imperfect -cluster Resiue: r ij ij 0, ij ij Ij Ij IJ IJ IJ IJ, ij ij ij IJ Ij ij is specifie is unspecifie
9 bi-cluster The smaller the average resiue, the stronger the coherence. Objective: ientify -clusters with resiue smaller than a given threshol 17 Cheng-Church h h Algorithm Fin one bi-cluster. Replace the ata in the first bi-cluster with ranom ata Fin the secon bi-cluster, an go on. The quality of the bi-cluster egraes (smaller volume, higher resiue) ue to the insertion of ranom ata. 18
10 The FLOC algorithm Generating initial clusters Determine the best action for each row an each column Perform the best action of each row an column sequentially Improve? Y N 19 The FLOC algorithm Action: the change of membership of a row(or column) with respect to a cluster N=3 row column M= M+N actions are Performe at each iteration
11 The FLOC algorithm Gain of an action: the resiue reuction incurre by performing the action Orer of action: Fixe orer Ranom orer Weighte ranom orer g j gi p ( i, j ) 0.5 R Complexity: O((M+N)MNkp) ) 1 The FLOC algorithm Aitional features Maximum allowe overlap among clusters Minimum coverage of clusters Minimum volume of each cluster Can be enforce by temporarily blocking certain action uring the mining process if such action woul violate some constraint.
12 Performance Microarray ata: 884 genes, 17 conitions 100 bi-clusters with smallest resiue were returne. Average resiue = The average resiue of clusters foun via the state of the art metho in computational biology fiel is 1.54 The average volume is 5% bigger The response time is an orer of magnitue faster 3 Conclusion Remark The moel of bi-cluster is propose to capture coherent objects with incomplete ata set. base resiue Many aitional features can be accommoate (nearly for free). 4
13 Coherent Cluster Want to accommoate noise but not outliers 5 Coherent Cluster Coherent cluster Subspace clustering pair-wise isparity For a (sub)matrix consisting of objects {x, y} an attributes {a, b} 6 D xa ya xb yb ( xa ya ) ( xb yb) mutual bias of attribute a mutual bias of attribute b x z y xa ya a b attribute xb yb
14 Coherent Cluster A (sub)matrix is a -coherent cluster if its D value is less than or equal to. An mn matrix X is a -coherent cluster if every submatrix of X is -coherent cluster. A -coherent cluster is a maximum -coherent cluster if it is not a submatrix of any other -coherent cluster. Objective: given a ata matrix an a threshol, fin all maximum -coherent e e clusters. s 7 Coherent Cluster Challenges: Fining subspace clustering base on istance itself is alreay a ifficult task ue to the curse of imensionality. The (sub)set of objects an the (sub)set of attributes that form a cluster are unknown in avance an may not be ajacent to each other in the ata matrix. The actual values of the objects in a coherent cluster may be far apart from each other. Each object or attribute in a coherent cluster may bear some relative bias (that are unknown in avance) an such bias may be local to the coherent cluster. 8
15 Coherent Cluster Compute the maximum coherent attribute sets for each pair of objects Two-way Pruning Construct the lexicographical tree Post-orer traverse the tree to fin maximum coherent clusters 9 Coherent Cluster Observation: Given a pair of objects {o 1, o } an a (sub)set of attributes {a 1, a,, a k }, the k submatrix is a -coherent cluster iff, for every attribute a i, the mutual bias ( o1ai oai ) oes not iffer from each other by more than a 1 a a 3 a 4 a [, 3.5] If = , o then {a 1 1,a,a 3,a 4,a 5 } is a coherent attribute set (CAS) o of (o 1,o ). 30
16 Coherent Cluster Observation: given a subset of objects {o 1, o,, o l } an a subset of attributes {a 1, a,, a k }, the lk submatrix is a -coherent cluster iff {a 1, a,,a a k }is a coherent attribute set for every pair of objects (o i,o j ) where 1 i, j l. a 1 a a 3 a 4 a 5 a 6 a 7 o 1 o o 3 o 4 o 5 o 6 31 Coherent Cluster Strategy:finthemaximum the coherent attribute sets for each pair of objects with respect to the given threshol r 1 5 r r r a 1 a a 3 a 4 a 5 a a 4 a 5 a 1 a 3 = The maximum coherent attribute sets efine the search space for maximum coherent clusters.
17 Two Way Pruning a0 a1 a o0 1 4 o1 5 5 o o (o0,o) o) (a0,a1,a) (a0a1a) (a0,a1) a1) (o0,o1,o) (o0o1o) (o1,o) (a0,a1,a) (a0,a) (o1,o,o3) (a1,a) (o1,o,o4) (a1,a) (o0,o,o4) o (o0,o) (a0,a1,a) (o1,o) (a0,a1,a) elta=1 nc =3 nr = 3 (a0,a1) (o0,o1,o) (a0,a) (o1,o,o3) (a1,a) (o1,o,o4) (a1,a) (o0,o,o4) MCAS MCOS 33 Coherent Cluster Strategy: grouping object pairs by their CAS an, for each group, fin the maximum clique(s). Implementation: using s a lexicographical tree to organize the object pairs an to generate all maximum coherent clusters with a single post-orer orer traversal of the tree. objects attributes 34
18 a 0 a 1 a a 3 o o o o o assume = 1 (o 0,o 1 ) : {a 0,a 1 }, {a,a 3 } (o 0,o ) : {a 0,a 1 1,,a,,a 3 3} (o 0,o 4 ) : {a 1,a } (o 1,o ) : {a 0,a 1,a }, {a,a 3 } (o 1,oo 3 ) :{a 0,aa } (o 1,o 4 ) : {a 1,a } (o 1,o ) (o,o 3 ) : {a 0,a } a 3 35 (o,o 4 ) : {a 1,a } 3 {a 0,a 1 } : (o 0,o 1 ) (o 1,o ) (o 0,o ) {a 0,a } : (o 1,o 3 ),(o,o 3 ) (o 1,o ) (o 0,o ) {a 1,aa }:(o 0,oo 4 )(o ),(o 1,oo 4 )(o ),(o,oo 4 ) (o 1,oo ) (o 0,oo ) {a,a 3 } : (o 0,o 1 ),(o 1,o ) (o 0,o ) {a 0,a 1,a } : (o 1,o ) (o 0,o ) {a 0,a 1,a,a 3 }:(o 0,o ) a 0 a 1 a a 1 a a a 3 a (o,o 3 ) (o 0,o 1 ) (o 1,o 3 ) (o 0,o ) (o 0,o 4 ) (o 1,o 4 ) (o,o 4 4) (o 0,o 1 ) (o 1,o ) {o 0,o } {a 0,a 1,a,a 3 } {o 1,oo } {a 0,aa 1,aa } {o 0,o 1,o } {a 0,a 1 } {o 1,o,o 3 } {a 0,a } {o 0,o,o 4 } {a 1,a } {o 1,o,o 4 } {a 1,a } {o 0,o 1,o } {a,a 3 } a 0 a 1 a a 3 a 1 a a a 3 a 3 36 (o 0,o ) (o 0,o 1 ) (o 1,o 3 ) (o 0,o 4 ) (o 0,o 1 ) a (o 1,o ) (o,o 3 ) (o 1,o 4 ) (o 1,o ) (o 0,o ) (o 1,o ) (o,o 4 ) (o 0,o ) (o (o 1,o ) a a 0,o ) (o 3 a 1,o ) 3 3 (o 0,o ) (o 0,o ) a (o 0,o ) 3 (o 0,o ) (o 0,o ) (o 0,o ) (o 0,o )
19 Coherent Cluster High expressive power The coherent cluster can capture many interesting an meaningful patterns overlooke by previous clustering methos Efficient an highly scalable 4000 Wie applications Gene expression analysis Collaborative filtering (se c ) sponse tim e a v e r a g e r e s subspace cluster coherent cluster number of conitions 37 Remark Comparing to Bicluster Can well separate noises an outliers No ranom ata insertion an replacement Prouce optimal solution 38
Shift-map Image Registration
Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.
More informationBiclustering with δ-pcluster John Tantalo. 1. Introduction
Biclustering with δ-pcluster John Tantalo 1. Introduction The subject of biclustering is chiefly concerned with locating submatrices of gene expression data that exhibit shared trends between genes. That
More informationClassifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means
Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu
More informationShift-map Image Registration
Shift-map Image Registration Linus Svärm Petter Stranmark Centre for Mathematical Sciences, Lun University {linus,petter}@maths.lth.se Abstract Shift-map image processing is a new framework base on energy
More informationMultilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis
Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT
More informationCS Introduction to Data Mining Instructor: Abdullah Mueen
CS 591.03 Introduction to Data Mining Instructor: Abdullah Mueen LECTURE 8: ADVANCED CLUSTERING (FUZZY AND CO -CLUSTERING) Review: Basic Cluster Analysis Methods (Chap. 10) Cluster Analysis: Basic Concepts
More informationAlmost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control
Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract
More information1 Surprises in high dimensions
1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic
More informationOnline Appendix to: Generalizing Database Forensics
Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that
More informationObject Recognition Using Colour, Shape and Affine Invariant Ratios
Object Recognition Using Colour, Shape an Affine Invariant Ratios Paul A. Walcott Centre for Information Engineering City University, Lonon EC1V 0HB, Englan P.A.Walcott@city.ac.uk Abstract This paper escribes
More informationPolitehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques
Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose
More informationParticle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base
More informationA Fast Algorithm for Subspace Clustering by Pattern Similarity
A Fast Algorithm for Subspace Clustering by Pattern Similarity Haixun Wang Fang Chu 1 Wei Fan Philip S Yu Jian Pei 2 IBM T J Watson Research Center, {haixun,weifan,psyu}@usibmcom 1 Dept of Computer Science,
More informationControl of Scalable Wet SMA Actuator Arrays
Proceeings of the 2005 IEEE International Conference on Robotics an Automation Barcelona, Spain, April 2005 Control of Scalable Wet SMA Actuator Arrays eslie Flemming orth Dakota State University Mechanical
More informationExercises of PIV. incomplete draft, version 0.0. October 2009
Exercises of PIV incomplete raft, version 0.0 October 2009 1 Images Images are signals efine in 2D or 3D omains. They can be vector value (e.g., color images), real (monocromatic images), complex or binary
More informationSkyline Community Search in Multi-valued Networks
Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science
More informationRandom Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation
DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,
More informationfiltering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember
107 IEICE TRANS INF & SYST, VOLE88 D, NO5 MAY 005 LETTER An Improve Neighbor Selection Algorithm in Collaborative Filtering Taek-Hun KIM a), Stuent Member an Sung-Bong YANG b), Nonmember SUMMARY Nowaays,
More informationMulti-camera tracking algorithm study based on information fusion
International Conference on Avance Electronic Science an Technolog (AEST 016) Multi-camera tracking algorithm stu base on information fusion a Guoqiang Wang, Shangfu Li an Xue Wen School of Electronic
More informationSolution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation
Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University
More informationAnyTraffic Labeled Routing
AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,
More information6.823 Computer System Architecture. Problem Set #3 Spring 2002
6.823 Computer System Architecture Problem Set #3 Spring 2002 Stuents are strongly encourage to collaborate in groups of up to three people. A group shoul han in only one copy of the solution to the problem
More informationEstimation of large-amplitude motion and disparity fields: Application to intermediate view reconstruction
c 2000 SPIE. Personal use of this material is permitte. However, permission to reprint/republish this material for avertising or promotional purposes or for creating new collective works for resale or
More informationNon-homogeneous Generalization in Privacy Preserving Data Publishing
Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h
More informationBiclustering for Microarray Data: A Short and Comprehensive Tutorial
Biclustering for Microarray Data: A Short and Comprehensive Tutorial 1 Arabinda Panda, 2 Satchidananda Dehuri 1 Department of Computer Science, Modern Engineering & Management Studies, Balasore 2 Department
More informationClustering Expression Data. Clustering Expression Data
www.cs.washington.eu/ Subscribe if you Din t get msg last night Clustering Exression Data Why cluster gene exression ata? Tissue classification Fin biologically relate genes First ste in inferring regulatory
More informationTHE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM
International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao
More informationCoupling the User Interfaces of a Multiuser Program
Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces
More informationLearning convex bodies is hard
Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples
More informationDual Arm Robot Research Report
Dual Arm Robot Research Report Analytical Inverse Kinematics Solution for Moularize Dual-Arm Robot With offset at shouler an wrist Motivation an Abstract Generally, an inustrial manipulator such as PUMA
More informationCS350 - Exam 4 (100 Points)
Fall 0 Name CS0 - Exam (00 Points).(0 points) Re-Black Trees For the Re-Black tree below, inicate where insert() woul initially occur before rebalancing/recoloring. Sketch the tree at ALL intermeiate steps
More informationImproving Performance of Sparse Matrix-Vector Multiplication
Improving Performance of Sparse Matrix-Vector Multiplication Ali Pınar Michael T. Heath Department of Computer Science an Center of Simulation of Avance Rockets University of Illinois at Urbana-Champaign
More informationEvolutionary Optimisation Methods for Template Based Image Registration
Evolutionary Optimisation Methos for Template Base Image Registration Lukasz A Machowski, Tshilizi Marwala School of Electrical an Information Engineering University of Witwatersran, Johannesburg, South
More informationFrequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises
verview Frequent Pattern Mining comprises Frequent Pattern Mining hristian Borgelt School of omputer Science University of Konstanz Universitätsstraße, Konstanz, Germany christian.borgelt@uni-konstanz.e
More informationUnknown Radial Distortion Centers in Multiple View Geometry Problems
Unknown Raial Distortion Centers in Multiple View Geometry Problems José Henrique Brito 1,2, Rolan Angst 3, Kevin Köser 3, Christopher Zach 4, Pero Branco 2, Manuel João Ferreira 2, Marc Pollefeys 3 1
More informationBends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways
Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis
More informationEFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER
FFICINT ON-LIN TSTING MTHOD FOR A FLOATING-POINT ADDR A. Droz, M. Lobachev Department of Computer Systems, Oessa State Polytechnic University, Oessa, Ukraine Droz@ukr.net, Lobachev@ukr.net Abstract In
More informationData Mining: Concepts and Techniques. Chapter 7. Cluster Analysis. Examples of Clustering Applications. What is Cluster Analysis?
Data Mining: Concepts an Techniques Chapter Jiawei Han Department of Computer Science University of Illinois at Urbana-Champaign www.cs.uiuc.eu/~hanj Jiawei Han an Micheline Kamber, All rights reserve
More informationUninformed search methods
CS 1571 Introuction to AI Lecture 4 Uninforme search methos Milos Hauskrecht milos@cs.pitt.eu 539 Sennott Square Announcements Homework assignment 1 is out Due on Thursay, September 11, 014 before the
More informationFrequency Domain Parameter Estimation of a Synchronous Generator Using Bi-objective Genetic Algorithms
Proceeings of the 7th WSEAS International Conference on Simulation, Moelling an Optimization, Beijing, China, September 15-17, 2007 429 Frequenc Domain Parameter Estimation of a Snchronous Generator Using
More informationFigure 1: 2D arm. Figure 2: 2D arm with labelled angles
2D Kinematics Consier a robotic arm. We can sen it commans like, move that joint so it bens at an angle θ. Once we ve set each joint, that s all well an goo. More interesting, though, is the question of
More informationUsing the disparity space to compute occupancy grids from stereo-vision
The 2010 IEEE/RSJ International Conference on Intelligent Robots an Systems October 18-22, 2010, Taipei, Taiwan Using the isparity space to compute occupancy gris from stereo-vision Mathias Perrollaz,
More informationA shortest path algorithm in multimodal networks: a case study with time varying costs
A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via
More informationEstimating Velocity Fields on a Freeway from Low Resolution Video
Estimating Velocity Fiels on a Freeway from Low Resolution Vieo Young Cho Department of Statistics University of California, Berkeley Berkeley, CA 94720-3860 Email: young@stat.berkeley.eu John Rice Department
More informationDisjoint Multipath Routing in Dual Homing Networks using Colored Trees
Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,
More informationFeature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory
Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative
More informationRobust Camera Calibration for an Autonomous Underwater Vehicle
obust Camera Calibration for an Autonomous Unerwater Vehicle Matthew Bryant, Davi Wettergreen *, Samer Aballah, Alexaner Zelinsky obotic Systems Laboratory Department of Engineering, FEIT Department of
More informationRough Set Approach for Classification of Breast Cancer Mammogram Images
Rough Set Approach for Classification of Breast Cancer Mammogram Images Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative Methos an Information Systems
More informationProblem Paper Atoms Tree. atoms.pas. atoms.cpp. atoms.c. atoms.java. Time limit per test 1 second 1 second 2 seconds. Number of tests
! " # %$ & Overview Problem Paper Atoms Tree Shen Tian Harry Wiggins Carl Hultquist Program name paper.exe atoms.exe tree.exe Source name paper.pas atoms.pas tree.pas paper.cpp atoms.cpp tree.cpp paper.c
More informationFast Window Based Stereo Matching for 3D Scene Reconstruction
The International Arab Journal of Information Technology, Vol. 0, No. 3, May 203 209 Fast Winow Base Stereo Matching for 3D Scene Reconstruction Mohamma Mozammel Chowhury an Mohamma AL-Amin Bhuiyan Department
More informationYet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien
Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,
More informationBiclustering Algorithms for Gene Expression Analysis
Biclustering Algorithms for Gene Expression Analysis T. M. Murali August 19, 2008 Problems with Hierarchical Clustering It is a global clustering algorithm. Considers all genes to be equally important
More informationCalculation on diffraction aperture of cube corner retroreflector
November 10, 008 / Vol., No. 11 / CHINESE OPTICS LETTERS 8 Calculation on iffraction aperture of cube corner retroreflector Song Li (Ó Ø, Bei Tang (», an Hui Zhou ( ï School of Electronic Information,
More information2. Department of Electronic Engineering and Computer Science, Case Western Reserve University
Chapter MINING HIGH-DIMENSIONAL DATA Wei Wang 1 and Jiong Yang 2 1. Department of Computer Science, University of North Carolina at Chapel Hill 2. Department of Electronic Engineering and Computer Science,
More informationParts Assembly by Throwing Manipulation with a One-Joint Arm
21 IEEE/RSJ International Conference on Intelligent Robots an Systems, Taipei, Taiwan, October, 21. Parts Assembly by Throwing Manipulation with a One-Joint Arm Hieyuki Miyashita, Tasuku Yamawaki an Masahito
More informationImage Segmentation using K-means clustering and Thresholding
Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,
More informationTransient analysis of wave propagation in 3D soil by using the scaled boundary finite element method
Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite
More informationAn Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources
An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract
More informationMORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks
: a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications
More informationBiclustering Bioinformatics Data Sets. A Possibilistic Approach
Possibilistic algorithm Bioinformatics Data Sets: A Possibilistic Approach Dept Computer and Information Sciences, University of Genova ITALY EMFCSC Erice 20/4/2007 Bioinformatics Data Sets Outline Introduction
More informationA Cost Model For Nearest Neighbor Search. High-Dimensional Data Space
A Cost Moel For Nearest Neighbor Search in High-Dimensional Data Space Stefan Berchtol University of Munich Germany berchtol@informatikuni-muenchene Daniel A Keim University of Munich Germany keim@informatikuni-muenchene
More informationA New Search Algorithm for Solving Symmetric Traveling Salesman Problem Based on Gravity
Worl Applie Sciences Journal 16 (10): 1387-1392, 2012 ISSN 1818-4952 IDOSI Publications, 2012 A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Base on Gravity Aliasghar Rahmani Hosseinabai,
More informationA Formal Model and Efficient Traversal Algorithm for Generating Testbenches for Verification of IEEE Standard Floating Point Division
A Formal Moel an Efficient Traversal Algorithm for Generating Testbenches for Verification of IEEE Stanar Floating Point Division Davi W. Matula, Lee D. McFearin Department of Computer Science an Engineering
More informationTriclustering in Gene Expression Data Analysis: A Selected Survey
Triclustering in Gene Expression Data Analysis: A Selected Survey P. Mahanta, H. A. Ahmed Dept of Comp Sc and Engg Tezpur University Napaam -784028, India Email: priyakshi@tezu.ernet.in, hasin@tezu.ernet.in
More informationInuence of Cross-Interferences on Blocked Loops: to know the precise gain brought by blocking. It is even dicult to determine for which problem
Inuence of Cross-Interferences on Blocke Loops A Case Stuy with Matrix-Vector Multiply CHRISTINE FRICKER INRIA, France an OLIVIER TEMAM an WILLIAM JALBY University of Versailles, France State-of-the art
More informationAn Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique
International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech
More informationImage compression predicated on recurrent iterated function systems
2n International Conference on Mathematics & Statistics 16-19 June, 2008, Athens, Greece Image compression preicate on recurrent iterate function systems Chol-Hui Yun *, Metzler W. a an Barski M. a * Faculty
More informationPreamble. Singly linked lists. Collaboration policy and academic integrity. Getting help
CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure
More informationA Convex Clustering-based Regularizer for Image Segmentation
Vision, Moeling, an Visualization (2015) D. Bommes, T. Ritschel an T. Schultz (Es.) A Convex Clustering-base Regularizer for Image Segmentation Benjamin Hell (TU Braunschweig), Marcus Magnor (TU Braunschweig)
More informationResearch Article Inviscid Uniform Shear Flow past a Smooth Concave Body
International Engineering Mathematics Volume 04, Article ID 46593, 7 pages http://x.oi.org/0.55/04/46593 Research Article Invisci Uniform Shear Flow past a Smooth Concave Boy Abullah Mura Department of
More informationDesign of Policy-Aware Differentially Private Algorithms
Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft
More informationIntensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2
This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar
More informationBayesian localization microscopy reveals nanoscale podosome dynamics
Nature Methos Bayesian localization microscopy reveals nanoscale poosome ynamics Susan Cox, Ewar Rosten, James Monypenny, Tijana Jovanovic-Talisman, Dylan T Burnette, Jennifer Lippincott-Schwartz, Gareth
More informationDistance-based Methods: Drawbacks
Distance-based Methods: Drawbacks Hard to find clusters with irregular shapes Hard to specify the number of clusters Heuristic: a cluster must be dense Jian Pei: CMPT 459/741 Clustering (3) 1 How to Find
More informationAn Investigation in the Use of Vehicle Reidentification for Deriving Travel Time and Travel Time Distributions
An Investigation in the Use of Vehicle Reientification for Deriving Travel Time an Travel Time Distributions Carlos Sun Department of Civil an Environmental Engineering, University of Missouri-Columbia,
More informationDifferential Synthetic Aperture Radar Interferometry (DINSAR) for 3D Coastal Geomorphology Reconstruction
IJCSNS International Journal of Computer Science an Network Security, VOL.9 No.5, May 2009 59 Differential Synthetic Aperture Raar Interferometry (DINSAR) for 3D Coastal Geomorphology Reconstruction Mage
More informationArchitecture Design of Mobile Access Coordinated Wireless Sensor Networks
Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,
More informationMICROARRAY IMAGE GRIDDING USING GRID LINE REFINEMENT TECHNIQUE
DOI: 10.21917/ijivp.2015.0148 MICROARRAY IMAGE GRIDDING USING GRID LINE REFINEMENT TECHNIQUE V.G. Biju 1 an P. Mythili 2 School of Engineering, Cochin University of Science an Technology, Inia E-mail:
More informationAdjacency Matrix Based Full-Text Indexing Models
1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,
More informatione-ccc-biclustering: Related work on biclustering algorithms for time series gene expression data
: Related work on biclustering algorithms for time series gene expression data Sara C. Madeira 1,2,3, Arlindo L. Oliveira 1,2 1 Knowledge Discovery and Bioinformatics (KDBIO) group, INESC-ID, Lisbon, Portugal
More informationDiscriminative Filters for Depth from Defocus
Discriminative Filters for Depth from Defocus Fahim Mannan an Michael S. Langer School of Computer Science, McGill University Montreal, Quebec HA 0E9, Canaa. {fmannan, langer}@cim.mcgill.ca Abstract Depth
More informationEECS730: Introduction to Bioinformatics
EECS730: Introduction to Bioinformatics Lecture 15: Microarray clustering http://compbio.pbworks.com/f/wood2.gif Some slides were adapted from Dr. Shaojie Zhang (University of Central Florida) Microarray
More informationAn Infrastructureless End-to-End High Performance Mobility Protocol
Proceeings of the 5 IEEE International Conference on Electro Information Technology, 5, Lincoln Nebraska, May 5 An Infrastructureless En-to-En High Performance Mobility Protocol Saneep Davu, Rai Y. Zaghal
More informationL Destructive interference:
SPH3UW/SPH4UI Unit 9.3 Interference of Light in Two Diensions Page 1 of 11 Notes Physics Tool box A pair of ientical point sources operating in phase prouces a syetrical pattern of constructive an estructive
More informationSecure Network Coding for Distributed Secret Sharing with Low Communication Cost
Secure Network Coing for Distribute Secret Sharing with Low Communication Cost Nihar B. Shah, K. V. Rashmi an Kannan Ramchanran, Fellow, IEEE Abstract Shamir s (n,k) threshol secret sharing is an important
More informationDNA chips and other techniques measure the expression level of a large number of genes, perhaps all
INESC-ID TECHNICAL REPORT 1/2004, JANUARY 2004 1 Biclustering Algorithms for Biological Data Analysis: A Survey* Sara C. Madeira and Arlindo L. Oliveira Abstract A large number of clustering approaches
More informationDivide-and-Conquer Algorithms
Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:
More informationShort-term prediction of photovoltaic power based on GWPA - BP neural network model
Short-term preiction of photovoltaic power base on GWPA - BP neural networ moel Jian Di an Shanshan Meng School of orth China Electric Power University, Baoing. China Abstract In recent years, ue to China's
More informationTop-k Frequent Itemsets via Differentially Private FP-trees
Top-k Frequent Itemsets via Differentially Private FP-trees Jaewoo Lee Dept. of Computer Science / CERIAS Purue University West Lafayette, IN USA jaewoo@cs.purue.eu Chris Clifton Dept. of Computer Science
More informationModifying ROC Curves to Incorporate Predicted Probabilities
Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,
More informationComputer Organization
Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.
More informationKeywords Data compression, image processing, NCD, Kolmogorov complexity, JPEG, ZIP
Volume 3, Issue 7, July 203 ISSN: 2277 28X International Journal of Avance Research in Computer Science an Software Engineering Research Paper Available online at: wwwijarcssecom Compression Techniques
More informationVariable Independence and Resolution Paths for Quantified Boolean Formulas
Variable Inepenence an Resolution Paths for Quantifie Boolean Formulas Allen Van Geler http://www.cse.ucsc.eu/ avg University of California, Santa Cruz Abstract. Variable inepenence in quantifie boolean
More informationFast Fractal Image Compression using PSO Based Optimization Techniques
Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting
More informationAdditional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication
Aitional Divie an Conquer Algorithms Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Divie an Conquer Closest Pair Let s revisit the closest pair problem. Last
More informationStudy of Network Optimization Method Based on ACL
Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department
More informationMessage Transport With The User Datagram Protocol
Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer
More informationEfficient Recovery from False State in Distributed Routing Algorithms
Efficient Recovery from False State in Distribute Routing Algorithms Daniel Gyllstrom, Suarshan Vasuevan, Jim Kurose, Gerome Milau Department of Computer Science University of Massachusetts Amherst {pg,
More informationMining Deterministic Biclusters in Gene Expression Data
Mining Deterministic Biclusters in Gene Expression Data Zonghong Zhang 1 Alvin Teo 1 BengChinOoi 1,2 Kian-Lee Tan 1,2 1 Department of Computer Science National University of Singapore 2 Singapore-MIT-Alliance
More information