ETNA Kent State University

Size: px
Start display at page:

Download "ETNA Kent State University"

Transcription

1 Electronic Transactions on Numerical Analysis. Volume 2, pp , 25. Copyright 25,. ISSN CROUT VERSIONS OF ILU FACTORIZATION WITH PIVOTING FOR SPARSE SYMMETRIC MATRICES NA LI AND YOUSEF SAAD Abstract. The Crout variant of ILU preconitioner (ILUC) evelope recently has been shown to be generally avantageous over ILU with Threshol (ILUT), a conventional row-base ILU preconitioner. This paper explores pivoting strategies for sparse symmetric matrices to improve the robustness of ILUC. We integrate two symmetrypreserving pivoting strategies, the iagonal pivoting an the Bunch-Kaufman pivoting, into ILUC without significant overheas. The performances of the pivoting methos are compare with ILUC an ILUTP ([2]) on a set of problems, incluing a few arising from sale-point (KKT) problems. Key wors. incomplete LU factorization, ILU, ILUC, sparse Gaussian elimination, crout factorization, preconitioning, iagonal pivoting, Bunch-Kaufman pivoting, ILU with threshol, iterative methos, sparse symmetric matrices AMS subject classifications. 65F1, 65F5 1. Introuction. Incomplete LU (ILU) factorization base preconitioners combine with Krylov subspace projection processes are often consiere the best general purpose iterative solvers available. Such ILU factorizations normally perform a Gaussian elimination algorithm while ropping some fill-ins. However, some variants of the Gaussian elimination algorithm may be more suitable than others for solving a given problem. For example, when ealing with sparse matrices, the traitional KIJ version [12, p 99] is impractical since all remaining rows are moifie at each step. In this case, another variant of Gaussian elimination namely the IKJ version, which implements a elaye-upate version for the matrix elements, is preferre. Although the IKJ version of Gaussian elimination is wiely use for implementing ILU factorizations (see, e.g., ILUT in SPARSKIT [2]), it has an inherent isavantage: its requirement to access to the entries of a row of a matrix in a topological orer uring the factorization. Due to the fill-ins introuce uring the factorization of a sparse matrix, a search is neee at each step in orer to locate a pivot with the smallest inex [21]. These searches often result in high computational costs, especially when the number of nonzero entries in an/or the factors is large. A strategy to reuce the cost of these searches is to construct a binary tree for the current row an utilize binary searches [22]. Recently, a more efficient alternative, terme ILUC an base on the Crout version of Gaussian elimination, has been evelope [17]. In the Crout version of Gaussian elimination, the -th column of ( ) an the - th row of ( ) are calculate at the -th step. Unlike the IKJ version, all elements that will be use to upate an at the -th step in the Crout version have alreay been calculate, i.e., the fill-ins will not interfere with the row upates at the -th step. Therefore, searching for the next pivot in the Crout version is avoie. A special ( bi-inex ) ata structure was evelope for ILUC to aress two implementation ifficulties in sparse matrix operations (see Section 3 for etails), following earlier work by Eisenstat et al. [11] in the context of the Yale Sparse Matrix Package (YSMP), an Jones an Plassmann [16]. Besies efficiency, another avantage of ILUC is that it also enables some more rigorous ropping strategies (e.g. [3, 2]) which result in improve robustness. However, there are still Receive April 6, 24. Accepte for publication January 19, 25. Recommene by A. Frommer. This work was supporte by the National Science Founation uner grant ACI-3512, an by the Minnesota Supercomputer Institute. Department of Computer Science an Engineering, University of Minnesota, 2 Union Street S.E., Minneapolis, MN

2 76 N. LI AND Y. SAAD many situations where sparse linear systems are ifficult to solve by iterative methos with the ILUC preconitioning, especially when the coefficient matrices are very ill-conitione an/or highly inefinite. In such situations, pivoting techniques can be use to further improve robustness. Nevertheless, a pivoting metho that is both efficient an effective must be carefully esigne to fit within the ata structure use by the incomplete factorization algorithm, which may not be a trivial task. In this paper, symmetry-preserving pivoting strategies that are suitable for the ata structure use in ILUC are explore an implemente for symmetric matrices. We begin our iscussion with a review of relate pivoting techniques in Section 2. We then iscuss in etail ILUC with pivoting methos in Section 3. Finally, we compare the performances of the pivoting methos with ILUC an ILUTP ([2]) on some general symmetric matrices in Section 4 an some KKT matrices in Section Relate Pivoting Techniques. For many linear systems that arise from real applications, the ILU factorization may encounter either a zero or a small pivot. In case a zero pivot occurs, one strategy to avoi a break-own of the factorization process is to replace the zero pivot with a very small element, which leas to the secon case. However, this remey works only in very limite cases. Inee, small pivots can cause an exponential growth of the entries in the factors an the resulting ILU process can eventualy break own ue to an overflow or unerflow conition. Even when this oes not happen, the prouce L an U factors are generally of poor quality an will not lea to convergence in the iteration phase. A common solution to ensure a moerate growth in the factors is to use pivoting techniques. However, pivoting techniques are often in conflict with the unerlying ata structures of the factorizations. For example, for a symmetric matrix, a column partial pivoting metho such as the ILUTP algorithm of SPARSKIT [2], will estroy symmetry. Pivoting methos that preserve symmetry are esirable. The elimination in ILUC is symmetric, i.e., at step, the th row of an the th column of are compute. Moreover, the bi-inex ata structure use to implement ILUC is also symmetric. Thus, the symmetric elimination process an the symmetric ata structure are ieal to incorporate symmetry-preserving pivoting methos into ILUC. In this paper, we explore symmetry-preserving pivoting methos that can be integrate into the existing ILUC process without significant overheas. Our goal is to improve the robustness of ILUC for symmetric systems while preserving symmetry. For this reason, we use a revise version of ILUC (terme ILDUC) to compute the factorization instea of. In ILDUC, an are unit lower triangular matrices, an is iagonal. One simple pivoting metho that preserves symmetry is to select the largest iagonal entry as the next pivot an interchange the corresponing row an column simultaneously. This metho, referre to as iagonal pivoting in the rest of the paper, works well for many symmetric matrices accoring to our tests. However, it fails for a matrix as simple as!" In 1971, Bunch an Parlett propose a pivoting metho base on Kahan s generalize pivot to inclue &'(& principal submatrices [4]. They also prove that the boun of this metho, in terms of the growth of elements in the reuce matrices, is almost as goo as that of the Gaussian elimination with complete pivoting. However, this metho requires searching the entire reuce matrix at each step uring the factorization, which makes it impractical for large sparse matrices. In 1977, Bunch an Kaufman propose a partial pivoting metho, now known as the Bunch-Kaufman pivoting metho, where a )* or &+& pivot can be "#%$

3 " W W " " $ CROUT VERSIONS OF ILU FACTORIZATION WITH PIVOTING 77 etermine by searching at most two columns of the reuce matrix at each step [6]. In 1998, Ashcraft et al. propose two alternatives of the Bunch-Kaufman algorithm, proviing better accuracy by bouning the triangular factors [1]. In 2, Higham prove the stability of the Bunch-Kaufman pivoting metho [15]. Because of the efficiency an effectiveness of the Bunch-Kaufman pivoting metho, it has been use in LINPACK an LAPACK to solve ense symmetric inefinite linear systems. In contrast to these methos, which ynamically select pivots, strategies such as weighte matching have been introuce to approximate a static pivoting orer in irect solvers [9, 1], an have been recently also explore for iterative methos [13]. In this paper, we show that the Bunch-Kaufman pivoting metho can be integrate into ILDUC to solve sparse symmetric inefinite linear systems. For the sake of completeness, we provie some etails of the Bunch-Kaufman pivoting algorithm. Let -, /. enote the matrix at step. To ecie the next pivot, 1. Determine 6587:9<;=9<?> 1'243, /. ;@ >BA which is the largest off-iagonal element in absolute value in the -th column. If, then go to step C. Otherwise let D (DEF ) be the smallest integer such that > G, /. >. 2. If >, /. 6 >H*I where I KJLMC*N PO4QSR4T, then use, /. 6 as a UV pivot. Otherwise, 3. Determine W XZY[\Y] 1'243 [^ _` > a, 6. G > cb 4. If I >, /. 6, then use >, /. 6 as a e pivot. 5. Else if > GfG, /., then interchange the >MHgI -th an the D -th rows an columns of, 6., use GfG, /. as a V pivot. 6. Else interchange the Jh icjpq -th an the D -th rows an columns of -, /. so that >, /. /587/ > >, /. /587 >, use k, /. 6, 6. as a &o& pivot. /5l7: /5l7nm In the next section, we present the methos that integrate the iagonal pivoting an the Bunch-Kaufman pivoting algorithms into the existing ILDUC process without significant overhea. 3. ILDUC with Pivoting for Sparse Symmetric Matrices. Algorithm 3.1 shows the ILDUC process to calculate the factorization pq Mr, moifie from the ILUC algorithm propose in [17]. ALGORITHM 3.1. ILDUC - Crout version of Incomplete LDU factorization 1. s ut A 'vwyx 2. For 'Fwzx Do : 3. Initialize row { : {z7f % A {4 /5l7f " \ t} /5l7f 4. For ~ > tƒxzsu = 6; Do : 5. {4 /587S )u{4 /587S ˆ = /;c sš; MŒ<;= 6587f 6. EnDo 7. Initialize column : Ž7f A /587S "} qt} /587S } 8. For ~ > tƒxzsžœ<;@ \ Do :

4 " b 78 N. LI AND Y. SAAD 9. /587S /587S VŒ ;@ s ; /5l7f ; 1. EnDo 11. Apply a ropping rule to row { 12. Apply a ropping rule to column 13. Œ u{rysš A Œ 6 F 14. B Uq URysŠ A = %K "} 15. For ~ > %Cq x A ;@ tšxzs?œ /; Do: 16. sš;8usƒ; ˆ ;@ sš MŒ /; 17. EnDo 18. EnDo One property of the Crout version of LU is that only previously calculate elements are use to upate the -th column of an the -th row of at step. For sparse matrices, this means new fill-ins will not interfere with the upates of the -th column of an the -th row of. Therefore, the upates to the -th row of (resp., the -th column of ) can be mae in any orer, i.e., the variable can be chosen in any orer in Line 4 (resp., in Line 8). This avois the expensive searches in the stanar ILUT. However, as pointe out in [17], two implementation ifficulties regaring sparse matrix operations have to be aresse. The first ifficulty lies in Lines 5 an 9 in Algorithm 3.1. At step, only the section Jh?C %wyx Q of the -th row of is neee to calculate the -th row of. Similarly, only the section Jh?C*wyx Q of the -th column of is neee to calculate the -th column of. Accessing entire rows of or columns of an then extracting the esire part is an expensive option. The secon ifficulty lies in lines 4 an 8 in Algorithm 3.1. is store column-wise, but the nonzeros in the -th row of must be accesse. Similarly, is store row-wise, but the nonzeros in the -th column of must be accesse. A carefully esigne bi-inex ata structure was use in [17] to aress these ifficulties, inspire from early work by Eisenstat et al. [11] an Jones an Plassmann [16]. The bi-inex ata structure consists of four arrays of size x : hdy, M =L, šdy, an % =L. At step, M šdy 6J=LQ, u, points to the first entry with the row inex greater than in the -th column of. In this way, the section /5l7f ; can be efficiently accesse, which aresses the first ifficulty. It is worth pointing out that the elements in a column of nees to be sorte by their inices to achieve this. However, in contrast with the searches neee in the stanar ILUT, this sorting is much more efficient for two reasons. First, the sort is performe only after a large number of elements in a column are roppe, unlike in ILUT, where searching is performe on all of the elements. Secon, a fast sorting algorithm such as Quick Sort can be easily applie, unlike in ILUT where some overhea in performing the search (e.g., when builing the binary search trees). To aress the secon ifficulty, the array is use to maintain linke lists of elements in the -th row of, where H. The linke lists are upate in such a way that the linke list of the elements in the -th row of is guarantee to be reay at step. This linke list will be use to upate the -th row of. šdy an % =L are forme in a similarly way. In the following, we iscuss how we integrate pivoting methos to the bi-inex ata structure use in ILDUC for sparse symmetric matrices. One critical issue is that the new methos with pivoting shoul have a similar cost an complexity as that of ILDUC The œ Diagonal Pivoting. For the œ iagonal pivoting, we nee to locate the largest iagonal element in absolute value at each step. For sparse matrices, a straightforwar linear search woul lea to a computational cost of )J=x Q, which is not acceptable especially when x is large. Alternatively, we buil a binary heap for the iagonal elements in orer to locate the largest iagonal entry efficiently. The binary heap is forme an maintaine so that each noe is greater than or equal to its chilren in absolute value. Therefore, the root noe

5 W W " W CROUT VERSIONS OF ILU FACTORIZATION WITH PIVOTING 79 is always the largest iagonal entry in absolute value. Algorithm 3.2 summarizes ILDUC with )ž iagonal pivoting (terme ILDUC-DP). Note that for a symmetric matrix the factorization is Ÿ ŽŸ(q \ M, so only nees to be calculate in the algorithm. ALGORITHM 3.2. ILDUC-DP - Incomplete M\ with V iagonal pivoting 1. s ut A 'vwyx 2. Initialize a binary heap for s} A 'K Ä 6A x 3. For 'Fwzx Do : 4. Locate the largest iagonal s G in absolute value from the root noe of the heap 5. Interchange column D an column if Dr u 6. Remove the root noe from the heap an reorer the heap 7. Initialize column : 7f A " /587S qt /587S } 8. For ~ > tƒxzsu 6; Do : 9. /587S 'q /587S ) e = /; sƒ;c = 6587f ; 1. EnDo 11. Apply a ropping rule to column 12. B Uq UR4s A = 6 K "} 13. For ~ > Cq x A ;@ Do: 14. sš;8qsš; ˆ ; s ; 15. Reorer the heap for s; 16. EnDo 17. EnDo In the above algorithm, the cost of initializing the binary heap is )J x Q (a bottom-up approach). The total cost of removing the root noe an reorering the heap is )J=x% ƒ x Q. The total cost of maintaining the heap is at most )J rx% z x Q (where ª x is the ropping parameter efining the maximum number of fill-ins allowe in each column) since whenever a iagonal element is moifie (line 15) the heap has to be reorere. Therefore, the total cost is boune by )J= x% ƒ x Q The Bunch-Kaufman Diagonal Pivoting. In the Bunch-Kaufman pivoting metho, to etermine the next pivot at each step only requires searching for at most two columns in the reuce matrix. This is feasible for a sparse symmetric matrix as the number of nonzero entries in each column is very small. Algorithm 3.3 escribes ILDUC with the Bunch-Kaufman pivoting (terme ILDUC-BKP). Since ILDUC uses a elaye-upate strategy, notice that the two columns must be upate before proceeing with the search in the algorithm. ALGORITHM 3.3. ILDUC-BKP - Incomplete with the Bunch-Kaufman pivoting metho 1. For 'Fwzx Do : 2. Loa an upate t 6587f. Let > > t} /587S > > «an > t G >. 3. If > t >H I Then 4. Let ŽK. 5. Else b 6. Loa an upate t /587S } G. Let q1)2y3 a G > t ag >. 7. If > t 6 > H I Then 8. ŽK 9. Else If t GfG Then H I 1. ŽK ; interchange the -th an the D -th rows an columns. 11. Else 12. Ž & ; interchange the Jh C PQ -th an the D -th rows an columns. 13. En If 14. En If

6 8 N. LI AND Y. SAAD 15. Perform ILDUC elimination process using the i pivot 16. EnDo 3.3. Implementation. Similarly to ILUTP in SPARSKIT [2], ILDUC-DP an ILDUC- BKP use a permutation array along with a reverse permutation array to hol the new orering of the variables. This strategy ensures that uring the elimination the matrix elements are kept in their original labeling. For ILDUC with pivoting, new strategies are neee to aress the two implementation ifficulties mentione earlier in this section ue to pivoting. First, we nee to efficiently access /587S ; for any to calculate the -th column of. In the implementation of ILUC, recall that an x -size array M šdy is maintaine so that hdy 6J=LQ always points to the first element with a row inex greater than in column. This also requires that the elements in a column of be store in the orer of increasing row inices. However, with pivoting enable, at the time when the -th column is calculate, the orer of the elements is unknown as they may be repositione later ue to pivoting. Thus, this metho will not work with pivoting. Our new strategy to hanle this issue is as follows. Observe that the positions of elements in section M; ± 7/ ;, M, will not be change after step n. We use M šdy 6J LQ to recor the number of nonzero elements in section ; P± 7/ ;. Since the nonzero elements in ; ; are store compactly in a linear buffer, we always store the nonzero elements in section ; ± 7/ ; in the first M šdy 6J=LQ positions in the buffer. In this way, the nonzero elements in } ; are continuously store (although they may be in any orer) starting from position M šdy 6J=LQ C² in the linear buffer, which can be efficiently accesse. After ; is use to calculate the -th column of, we nee to ensure the above property for the next step. Specifically, we nee to scan the linear buffer starting from position M šdy 6J=LQ Cq to access the nonzero elements in ;. If ; is zero, we o nothing. Otherwise, it can be locate uring the scan. We then swap ; with the elements store at position M šdy 6J=LQ an let M šdy 6J=LQUwBK hdy 6J=LQlC. Thus, at step -C, the nonzero elements in section /587S } ; are guarantee to be store continuously starting at position M šdy 6J=LQ as well. Secon, we nee to access some rows of but it is store column-wise. In ILUC, recall that a x -size array M =L is carefully esigne an maintaine such that all elements in the -th row of are guarantee to form a linke list when neee at the -th step. This linke list is embee in M =L. However, when pivoting is allowe, the availability of only the -th row of is not enough. For any ³E, the ³ -th row may be interchange with the -th row at step ue to pivoting. Therefore, we nee to maintain a linke list for each row of with a row inex greater than or equal to. We can also use strategies such as preorering an equilibration to further improve the stability of our methos. We apply the Reverse Cuthill-McKee (RCM) algorithm to preorer the matrices [7] in our implementation. A matrix is equilibrate if all its rows an columns have the same length in some norm. We use the metho propose by Bunch in [5] to equilibrate a symmetric matrix so that its rows/columns are normalize uner the max-norm. It is worth pointing out that for sparse symmetric matrices the two ifficulties in ILDUC exist in the equilibration metho as well. We aress them by using the same bi-inex ata structure in our implementation. 4. Experiments. In this section, we compare the performances of ILDUC, ILDUC with e pivoting (ILDUC-DP), an ILDUC with the Bunch-Kaufman pivoting (ILDUC-BKP). The computational coes were written in C, an the experiments were conucte on a 1.7GHz Pentium 4 PC with 1GB of main memory. All coes were compile with the -O3 optimization option. We teste ILDUC, ILDUC-DP, an ILDUC-BKP on 11 symmetric inefinite matrices selecte from the Davis collection [8]. Some generic information on these matrices is given

7 " $ CROUT VERSIONS OF ILU FACTORIZATION WITH PIVOTING 81 in Table 4.1, where x is the matrix size an x xz{ is the total number of nonzeros in a full matrix. In the tests, artificial right-han sies were generate, an GMRES(6) was use to solve the systems using a zero initial guess. The iterations were stoppe when the resiual norm was reuce by 8 orers of magnitue or when the maximum iteration count of 3 was reache. The ual criterion ropping strategy was use for all preconitioners, i.e., any element of column whose magnitue was less than a tolerance < > > /587S > > 7 was roppe; an only Lfil largest elements were kept. The parameter Lfil was selecte as a multiple of the ratio y zµ, the average number of nonzero elements per column in the original matrix. We use a parameter to etermine the ropping tolerance an a parameter to set the value of Lfil : M y yµ. Nevertheless, even uner the same control parameters, the number of fill-ins may be very ifferent from metho to metho. To better compare the preconitioners, we use an inicator calle a fill-factor, i.e., the value of x xz{cj C gcu 8QfR4x xz{cj ŽQ, to represent the sparsity of the ILU factors. A goo metho shoul yiel convergence for a small fill-factor. TABLE 4.1 Symmetric Inefinite Matrices from the Davis Collection x Matrix x xz{ Source aug3cqp D PDE bloweya Cahn-Hilliar problem bratu D Bratu problem ixmaanl Dixon-Maany optimization example mario Discretization mario Discretization olesnik Straz po Ralskem mine moel sit Straz po Ralskem mine moel stokes Stokes equation tuma Mine moel tuma Mine moel Table 4.2 shows the results of the three preconitioners on the 11 matrices, where the RCM orering an equilibration were applie. "z" To ensure the preconitioners were comparable, we fixe the ropping tolerance to ó an artificially selecte a fill-in parameter for each preconitioner such that the resulting fill-factors were similar for each matrix. For references, we also teste the linear systems with ILUTP uner similar fill-in parameters. Since ILUTP oes not take avantage of symmetry an the ILUTP coe we use was written in FORTRAN, we only compare the convergence an ignore the execution time for ILUTP. In the table, the values in the fill fiel are the fill-factors. The symbol - in the fill fiel inicates that the preconitioner faile ue to a zero pivot encountere uring ILU. its enotes the number of iterations for GMRES(6) to convergence. A symbol - in the its fiel inicates that convergence was not obtaine in 3 iterations. sec. enotes the total time in secons use for each metho (Preconitioning time +GMRES(6) time). From the table, it is clear that ILUTP was not robust an ILDUC faile in most cases ue to zero pivots encountere. ILDUC with the Bunch-Kaufman is better than ILDUC with iagonal pivoting in general. Next we offer a few aitional comments on these performances. 1. aug3cqp, stokes64: For these two matrices, with a similar amount of fill-ins al- x xz{ for aug3cqp respectively), all three ILDUC-base methos converge. The number of iterations require for conver- lowe (e.g. $ x xz{, $ ¹ Tyx xz{, an $º "

8 82 N. LI AND Y. SAAD TABLE 4.2 Performances on Symmetric Inefinite Matrices:» ¼o½¾ ½/½ Matrix ILDUC ILDUC-DP ILDUC-BKP ILUTP Name fill its sec. fill its sec. fill its sec. fill its aug3cqp bloweya bratu ixmaanl mario mario olesnik sit stokes tuma tuma gence was similar for all methos (ILDUC-DP require slightly fewer iterations to converge for matrix stokes64). As expecte, the cost of ILDUC with pivoting is of the same orer as that of ILDUC. Even with larger fill-in factors, ILUTP i not converge. 2. bloweya, bratu3: For these two matrices, ILDUC-DP, ILDUC-BKP an ILUTP converge, but ILDUC faile ue to zero pivots encountere. Nevertheless, ILDUC- BKP an ILUTP ha better performances than ILDUC-DP. 3. mario1, mario2, tuma1: For these matrices, ILDUC-DP an ILDUC-BKP both converge, but ILDUC an ILUTP faile. ILDUC-BKP ha better performances than ILDUC-DP. With a similar or even less amount of fill-ins, ILDUC-BKP require much fewer iterations to converge. For example, for matrix tuma1, ILDUC- DP require 23 iterations to converge with a fill-factor of $ OyÀ, while ILDUC-BKP only require 71 iterations with a fill-factor of $ TŠ&. Table 4.3 compares ILDUC- DP an ILDUC-BKP with various fill-in factors on matrix tuma1. From the table, we see that ILDUC-BKP is more efficient than ILDUC-DP. Figure 4.1 (a) an (b) compare the preconitioning cost an the total cost of the two methos respectively. Preconitioning Time (s) ILDUC DP ILDUC BKP Total Time (s) ILDUC DP ILDUC BKP Fill in Factor (a) Fill in Factor (b) FIG Comparison on the preconitioning time an the total time for matrix tuma1

9 Â CROUT VERSIONS OF ILU FACTORIZATION WITH PIVOTING 83 TABLE 4.3 Matrix tuma1.» ¼o½¾ ½/½. Preconitioner GMRES(6) Total Metho fill sec. its sec. sec. ILDUC-DP ILDUC-BKP ILDUC-DP ILDUC-BKP ILDUC-DP ILDUC-BKP ILDUC-DP ILDUC-BKP ILDUC-DP ILDUC-BKP olesnik, sit1: ILDUC an ILUTP faile on these two matrices, but ILDUC-DP an ILDUC-BKP converge an ha similar performances. 5. ixmaanl: ILDUC-DP an ILUTP faile on this matrix. ILDUC-BKP ha a slightly better performance than ILDUC. 6. tuma2: ILDUC-BKP was the only preconitioning metho that converge for matrix tuma2. 5. Experiments with KKT Matrices. In this section, we test the preconitioners on 14 KKT matrices (in reference to the Karush-Kuhn-Tucker first-orer necessary optimality conitions for the solution of general nonlinear programming problems [14]) as shown in Table 5.1. KKT matrices have the form: u! Á Â Ã "Ä# an are often generate from equality an inequality constraine nonlinear programming, sparse optimal control, an mixe finite-element iscretizations of partial ifferential equations [14]. The 14 KKT matrices were provie by Little [18] an Haws [14]. Matrices P288 an P1448 were permute Á from their original form [19] in orer to obtain a more narrow banwith for the part. The experiments were conucte on a 866MHz Pentium III PC with 1GB of main memory. Table 5.2 summaries the results of ILDUC, ILDUC-DP, ILDUC-BKP, an ILUTP on these matrices. Equilibration was applie. From the table, we make the following observations. First, ILDUC-BKP has the best overall performance on these matrices. ILUTP solve 6 problems, ILDUC solve 7 problems, ILDUC-DP solve 8 problems, an ILDUC-BKP solve 12 problems. Secon, as expecte, the cost of ILDUC-BKP is of the same orer as that of ILDUC. This is evience in matrices CHOI-L, LCAV-S1, STIFF5, MASS4, MASS5 an MASS6, where the number of iterations for the two methos were ientical or very close. Thir, ILDUC-DP is the best metho for matrices P288 an P1488. Especially for P1488, ILDUC-DP is the only preconitioner that converge. However, for matrices such as CHOI-L, LCAV-S1, STIFF4 an MASS5, ILDUC-DP i not converge or require significantly more iterations to converge. Finally, although ILUTP ha the worst performance on these matrices an it i not take avantage of symmetry, it was the only metho that converge for matrix TRAJ33.

10 84 N. LI AND Y. SAAD TABLE 5.1 KKT Matrices x Matrix x xz{ Source P Magnetostatic problem (2D coarse iscretization) P Magnetostatic problem (2D fine iscretization) CHOI Particles in flui simulator (5 escening particles) CHOI-L Particles in flui simulator (5 escening particles) LCAV-S Full Navier-Stokes equations in L shape cavity OPT Optimization problem STIFF Stiffness problem STIFF Stiffness problem MASS Mass problem MASS Mass problem MASS Mass problem TRAJ Sparse optimal control problem TRAJ Sparse optimal control problem LNTS Sparse optimal control problem TABLE 5.2 Performances on KKT Matrices: ÅŽ¼oƾ Ç,» ¼½¾ ½ Matrix ILDUC ILDUC-DP ILDUC-BKP ILUTP Name fill its sec. fill its sec. fill its sec. fill its P P CHOI CHOI-L LCAV-S OPT STIFF STIFF MASS MASS MASS TRAJ TRAJ LNTS Conclusion. We have explore two symmetry-preserving pivoting methos an shown how to integrate them into a Crout version of the ILU factorization. As expecte, this implementation results in better quality symmetric incomplete factorization for symmetric matrices. The overhea associate with this implementation is not significant. In aition, the pivoting methos have been emonstrate to fit the unerlying ata structure use in ILUC. Our experiments show that the Bunch-Kaufman pivoting metho can be efficiently an effectively integrate with a sparse symmetric iterative solver. 7. Acknowlegements. We woul like to thank Leigh Little, John Haws, Masha Sosonkina an Ilaria Perugia for proviing many of the test matrices use in the numerical tests Section 4 an 5. We also thank the anonymous referees for their helpful comments on an earlier

11 version of this paper. CROUT VERSIONS OF ILU FACTORIZATION WITH PIVOTING 85 REFERENCES [1] C. AHSCRAFT, R. G. GRIMES, AND J. G. LEWIS, Accurate Symmetric Inefinite Linear Equation Solvers, SIAM J. Matrix Anal. Appl., 2 (1998), No. 2, pp [2] M. BOLLHÖFER AND Y. SAAD, A factore approximate inverse preconitioner with pivoting, SIAM J. Matrix Anal. Appl., 23 (21), No. 3, pp [3] M. BOLLHÖFER, A robust ILU with pivoting base on monitoring the growth of the inverse factors, Linear Algebra Appl., 338 (21), No. 1-3, pp [4] J. R. BUNCH AND B. N. PARLETT, Direct Methos for Solving Symmetric Inefinite Systems of Linear Equations, SIAM J. Matrix Anal. Appl., 8 (1971), pp [5] J. R. BUNCH, Equilibration of Symmetric Matrices in the Max-Norm, J. ACM, 18 (1971), No. 4, pp [6] J. R. BUNCH AND L. KAUFMAN, Some Stable Methos for Calculating Inertia an Solving Symmetric Linear Systems, Math. Comp., 31 (1977), No. 137, pp [7] E. CUTHILL AND J. MCKEE, Reucing the banwith of sparse symmetric matrices, in Proceeings of the ACM National Conference, 24 (1969), pp [8] T. DAVIS, University of Floria Sparse Matrix Collection, NA Digest, 92 (1994, October 16), No. 42, NA Digest, 96 (1996, July 23), No. 28, an NA Digest, 97 (1997, June 7), No. 23. [9] I. S. DUFF AND J. KOSTER, The esign an use of algorithms for permuting large entries to the iagonal of sparse matrices, SIAM J. Matrix Anal. Appl., 2 (1999), No. 4, pp [1] I. S. DUFF AND S. PRALET, Strategies for scaling an pivoting for sparse symmetric inefinite problems, SIAM J. Matrix Anal. Appl., (to appear). [11] S. C. EISENSTAT, M. H. SCHULTZ, AND A. H. SHERMAN, Algorithms an ata structures for sparse symmetric Gaussian elimination, SIAM J. Sci. Comput., 2 (1981), pp [12] G. H. GOLUB AND C. F. VAN LOAN, Matrix Computations, Thir e., The Johns Hopkins University Press, Baltimore, MD, [13] M. HAGEMANN AND O. SCHENK, Weighte Matchings for the Preconitioning of Symmetric Inefinite Linear Systems, Technical Report CS-24-5, Department of Computer Science, University of Basel. [14] J. C. HAWS AND C. D. MEYER, Preconitioning KKT systems, Numer. Linear Algebra Appl., (to appear). [15] N. J. HIGHAM, Stability of the iagonal pivoting metho with partial pivoting, SIAM J. Matrix Anal. Appl., 18 (2), No. 1, pp [16] M. JONES AND P. PLASSMANN, An improve incomplete Cholesky factorization, ACM Trans. Math. Software, 21 (1995), pp [17] N. LI, Y. SAAD, AND E. CHOW, Crout versions of ILU for general sparse matrices, SIAM J. Sci. Comput., 25 (23), No. 2, pp [18] L. LITTLE, KKT matrices for testing, Personal communication, 23. [19] I. PERUGIA, V. SIMONCINI, AND M. ARIOLI, Linear Algebra Methos in a Mixe Approximation of Magnetostatic Problems, SIAM J. Sci. Comput., 21 (1999), No. 3, pp [2] Y. SAAD, SPARSKIT: A basic tool kit for sparse matrix computations, Technical Report RIACS-9-2, Research Institute for Avance Computer Science, NASA Ames Research Center, Moffet Fiel, CA, 199. [21] Y. SAAD, ILUT: a ual threshol incomplete ILU factorization, Numer. Linear Algebra Appl., 1 (1994), pp [22] Y. SAAD, Iterative Methos for Sparse Linear Systems, Secon e., SIAM, Philaelphia, 23.

Improving Performance of Sparse Matrix-Vector Multiplication

Improving Performance of Sparse Matrix-Vector Multiplication Improving Performance of Sparse Matrix-Vector Multiplication Ali Pınar Michael T. Heath Department of Computer Science an Center of Simulation of Avance Rockets University of Illinois at Urbana-Champaign

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

6.823 Computer System Architecture. Problem Set #3 Spring 2002

6.823 Computer System Architecture. Problem Set #3 Spring 2002 6.823 Computer System Architecture Problem Set #3 Spring 2002 Stuents are strongly encourage to collaborate in groups of up to three people. A group shoul han in only one copy of the solution to the problem

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis

More information

Optimizing the quality of scalable video streams on P2P Networks

Optimizing the quality of scalable video streams on P2P Networks Optimizing the quality of scalable vieo streams on PP Networks Paper #7 ASTRACT The volume of multimeia ata, incluing vieo, serve through Peer-to-Peer (PP) networks is growing rapily Unfortunately, high

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

1 Surprises in high dimensions

1 Surprises in high dimensions 1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Tracking and Regulation Control of a Mobile Robot System With Kinematic Disturbances: A Variable Structure-Like Approach

Tracking and Regulation Control of a Mobile Robot System With Kinematic Disturbances: A Variable Structure-Like Approach W. E. Dixon e-mail: wixon@ces.clemson.eu D. M. Dawson e-mail: awson@ces.clemson.eu E. Zergeroglu e-mail: ezerger@ces.clemson.eu Department of Electrical & Computer Engineering, Clemson University, Clemson,

More information

Chapter 9 Memory Management

Chapter 9 Memory Management Contents 1. Introuction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threas 6. CPU Scheuling 7. Process Synchronization 8. Dealocks 9. Memory Management 10.Virtual Memory

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Adjacency Matrix Based Full-Text Indexing Models

Adjacency Matrix Based Full-Text Indexing Models 1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Linus Svärm Petter Stranmark Centre for Mathematical Sciences, Lun University {linus,petter}@maths.lth.se Abstract Shift-map image processing is a new framework base on energy

More information

Tight Wavelet Frame Decomposition and Its Application in Image Processing

Tight Wavelet Frame Decomposition and Its Application in Image Processing ITB J. Sci. Vol. 40 A, No., 008, 151-165 151 Tight Wavelet Frame Decomposition an Its Application in Image Processing Mahmu Yunus 1, & Henra Gunawan 1 1 Analysis an Geometry Group, FMIPA ITB, Banung Department

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

A Plane Tracker for AEC-automation Applications

A Plane Tracker for AEC-automation Applications A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)

More information

Discrete Markov Image Modeling and Inference on the Quadtree

Discrete Markov Image Modeling and Inference on the Quadtree 390 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 9, NO. 3, MARCH 2000 Discrete Markov Image Moeling an Inference on the Quatree Jean-Marc Laferté, Patrick Pérez, an Fabrice Heitz Abstract Noncasual Markov

More information

Parallel Directionally Split Solver Based on Reformulation of Pipelined Thomas Algorithm

Parallel Directionally Split Solver Based on Reformulation of Pipelined Thomas Algorithm NASA/CR-1998-208733 ICASE Report No. 98-45 Parallel Directionally Split Solver Base on Reformulation of Pipeline Thomas Algorithm A. Povitsky ICASE, Hampton, Virginia Institute for Computer Applications

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpenCourseWare http://ocw.mit.eu 6.854J / 18.415J Avance Algorithms Fall 2008 For inormation about citing these materials or our Terms o Use, visit: http://ocw.mit.eu/terms. 18.415/6.854 Avance Algorithms

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:

More information

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

A Duality Based Approach for Realtime TV-L 1 Optical Flow

A Duality Based Approach for Realtime TV-L 1 Optical Flow A Duality Base Approach for Realtime TV-L 1 Optical Flow C. Zach 1, T. Pock 2, an H. Bischof 2 1 VRVis Research Center 2 Institute for Computer Graphics an Vision, TU Graz Abstract. Variational methos

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

ETNA Kent State University

ETNA Kent State University Electronic Transactions on Numerical Analysis. Volume 6, pp. 246-254, December 997. Copyright 997,. ISSN 068-963. ETNA etna@mcs.kent.eu FAST SOLUTION OF MSC/NASTRAN SPARSE MATRIX PROBLEMS USING A MULTILEVEL

More information

Verifying performance-based design objectives using assemblybased vulnerability

Verifying performance-based design objectives using assemblybased vulnerability Verying performance-base esign objectives using assemblybase vulnerability K.A. Porter Calornia Institute of Technology, Pasaena, Calornia, USA A.S. Kiremijian Stanfor University, Stanfor, Calornia, USA

More information

Implementation and Evaluation of NAS Parallel CG Benchmark on GPU Cluster with Proprietary Interconnect TCA

Implementation and Evaluation of NAS Parallel CG Benchmark on GPU Cluster with Proprietary Interconnect TCA Implementation an Evaluation of AS Parallel CG Benchmark on GPU Cluster with Proprietary Interconnect TCA Kazuya Matsumoto 1, orihisa Fujita 2, Toshihiro Hanawa 3, an Taisuke Boku 1,2 1 Center for Computational

More information

Image compression predicated on recurrent iterated function systems

Image compression predicated on recurrent iterated function systems 2n International Conference on Mathematics & Statistics 16-19 June, 2008, Athens, Greece Image compression preicate on recurrent iterate function systems Chol-Hui Yun *, Metzler W. a an Barski M. a * Faculty

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.

More information

Characterizing Decoding Robustness under Parametric Channel Uncertainty

Characterizing Decoding Robustness under Parametric Channel Uncertainty Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

Selection Strategies for Initial Positions and Initial Velocities in Multi-optima Particle Swarms

Selection Strategies for Initial Positions and Initial Velocities in Multi-optima Particle Swarms ACM, 2011. This is the author s version of the work. It is poste here by permission of ACM for your personal use. Not for reistribution. The efinitive version was publishe in Proceeings of the 13th Annual

More information

Fast Fractal Image Compression using PSO Based Optimization Techniques

Fast Fractal Image Compression using PSO Based Optimization Techniques Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,

More information

CS350 - Exam 4 (100 Points)

CS350 - Exam 4 (100 Points) Fall 0 Name CS0 - Exam (00 Points).(0 points) Re-Black Trees For the Re-Black tree below, inicate where insert() woul initially occur before rebalancing/recoloring. Sketch the tree at ALL intermeiate steps

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

Divide-and-Conquer Algorithms

Divide-and-Conquer Algorithms Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:

More information

A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Based on Gravity

A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Based on Gravity Worl Applie Sciences Journal 16 (10): 1387-1392, 2012 ISSN 1818-4952 IDOSI Publications, 2012 A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Base on Gravity Aliasghar Rahmani Hosseinabai,

More information

Nonsymmetric Problems. Abstract. The eect of a threshold variant TPABLO of the permutation

Nonsymmetric Problems. Abstract. The eect of a threshold variant TPABLO of the permutation Threshold Ordering for Preconditioning Nonsymmetric Problems Michele Benzi 1, Hwajeong Choi 2, Daniel B. Szyld 2? 1 CERFACS, 42 Ave. G. Coriolis, 31057 Toulouse Cedex, France (benzi@cerfacs.fr) 2 Department

More information

Parts Assembly by Throwing Manipulation with a One-Joint Arm

Parts Assembly by Throwing Manipulation with a One-Joint Arm 21 IEEE/RSJ International Conference on Intelligent Robots an Systems, Taipei, Taiwan, October, 21. Parts Assembly by Throwing Manipulation with a One-Joint Arm Hieyuki Miyashita, Tasuku Yamawaki an Masahito

More information

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:

More information

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure

More information

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural

More information

Learning Polynomial Functions. by Feature Construction

Learning Polynomial Functions. by Feature Construction I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

Optimization of cable-stayed bridges with box-girder decks

Optimization of cable-stayed bridges with box-girder decks Avances in Engineering Software 31 (2000) 417 423 www.elsevier.com/locate/avengsoft Optimization of cable-staye briges with box-girer ecks L.M.C. Simões*, J.H.J.O. Negrão Department of Civil Engineering,

More information

Data Mining: Clustering

Data Mining: Clustering Bi-Clustering COMP 790-90 Seminar Spring 011 Data Mining: Clustering k t 1 K-means clustering minimizes Where ist ( x, c i t i c t ) ist ( x m j 1 ( x ij i, c c t ) tj ) Clustering by Pattern Similarity

More information

Large-scale Structural Analysis Using General Sparse Matrix Technique

Large-scale Structural Analysis Using General Sparse Matrix Technique Large-scale Structural Analysis Using General Sparse Matrix Technique Yuan-Sen Yang 1), Shang-Hsien Hsieh 1), Kuang-Wu Chou 1), and I-Chau Tsai 1) 1) Department of Civil Engineering, National Taiwan University,

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stolyar Abstract Backpressure-base aaptive routing

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

ACE: And/Or-parallel Copying-based Execution of Logic Programs

ACE: And/Or-parallel Copying-based Execution of Logic Programs ACE: An/Or-parallel Copying-base Execution of Logic Programs Gopal GuptaJ Manuel Hermenegilo* Enrico PontelliJ an Vítor Santos Costa' Abstract In this paper we present a novel execution moel for parallel

More information

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples

More information

Handling missing values in kernel methods with application to microbiology data

Handling missing values in kernel methods with application to microbiology data an Machine Learning. Bruges (Belgium), 24-26 April 2013, i6oc.com publ., ISBN 978-2-87419-081-0. Available from http://www.i6oc.com/en/livre/?gcoi=28001100131010. Hanling missing values in kernel methos

More information

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing Inexing the Eges A simple an yet efficient approach to high-imensional inexing Beng Chin Ooi Kian-Lee Tan Cui Yu Stephane Bressan Department of Computer Science National University of Singapore 3 Science

More information

The Journal of Systems and Software

The Journal of Systems and Software The Journal of Systems an Software 83 (010) 1864 187 Contents lists available at ScienceDirect The Journal of Systems an Software journal homepage: www.elsevier.com/locate/jss Embeing capacity raising

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

Exploring Context with Deep Structured models for Semantic Segmentation

Exploring Context with Deep Structured models for Semantic Segmentation 1 Exploring Context with Deep Structure moels for Semantic Segmentation Guosheng Lin, Chunhua Shen, Anton van en Hengel, Ian Rei between an image patch an a large backgroun image region. Explicitly moeling

More information

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,

More information

Chapter 5 Proposed models for reconstituting/ adapting three stereoscopes

Chapter 5 Proposed models for reconstituting/ adapting three stereoscopes Chapter 5 Propose moels for reconstituting/ aapting three stereoscopes - 89 - 5. Propose moels for reconstituting/aapting three stereoscopes This chapter offers three contributions in the Stereoscopy area,

More information

Variable Independence and Resolution Paths for Quantified Boolean Formulas

Variable Independence and Resolution Paths for Quantified Boolean Formulas Variable Inepenence an Resolution Paths for Quantifie Boolean Formulas Allen Van Geler http://www.cse.ucsc.eu/ avg University of California, Santa Cruz Abstract. Variable inepenence in quantifie boolean

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

Additional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication

Additional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Aitional Divie an Conquer Algorithms Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Divie an Conquer Closest Pair Let s revisit the closest pair problem. Last

More information

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

A Highly Scalable Parallel Boundary Element Method for Capacitance Extraction

A Highly Scalable Parallel Boundary Element Method for Capacitance Extraction A Highly Scalable Parallel Bounary Element Metho for Capacitance Extraction The MIT Faculty has mae this article openly available. Please share how this access benefits you. Your story matters. Citation

More information

Frequency Domain Parameter Estimation of a Synchronous Generator Using Bi-objective Genetic Algorithms

Frequency Domain Parameter Estimation of a Synchronous Generator Using Bi-objective Genetic Algorithms Proceeings of the 7th WSEAS International Conference on Simulation, Moelling an Optimization, Beijing, China, September 15-17, 2007 429 Frequenc Domain Parameter Estimation of a Snchronous Generator Using

More information

Principles of B-trees

Principles of B-trees CSE465, Fall 2009 February 25 1 Principles of B-trees Noes an binary search Anoe u has size size(u), keys k 1,..., k size(u) 1 chilren c 1,...,c size(u). Binary search property: for i = 1,..., size(u)

More information

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science

More information

A General Technique for Non-blocking Trees

A General Technique for Non-blocking Trees A General Technique for Non-blocking Trees Trevor rown an Faith Ellen University of Toronto, Canaa Eric Ruppert York University, Canaa Abstract We escribe a general technique for obtaining provably correct,

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

Exploring Context with Deep Structured models for Semantic Segmentation

Exploring Context with Deep Structured models for Semantic Segmentation APPEARING IN IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, APRIL 2017. 1 Exploring Context with Deep Structure moels for Semantic Segmentation Guosheng Lin, Chunhua Shen, Anton van en

More information

d 3 d 4 d d d d d d d d d d d 1 d d d d d d

d 3 d 4 d d d d d d d d d d d 1 d d d d d d Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly

More information

Solving Sparse Linear Systems. Forward and backward substitution for solving lower or upper triangular systems

Solving Sparse Linear Systems. Forward and backward substitution for solving lower or upper triangular systems AMSC 6 /CMSC 76 Advanced Linear Numerical Analysis Fall 7 Direct Solution of Sparse Linear Systems and Eigenproblems Dianne P. O Leary c 7 Solving Sparse Linear Systems Assumed background: Gauss elimination

More information