New Structural Decomposition Techniques for Constraint Satisfaction Problems

Size: px
Start display at page:

Download "New Structural Decomposition Techniques for Constraint Satisfaction Problems"

Transcription

1 New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln yzheng Abtract. Technique for decompoing the contraint network of a Contraint Satifaction Problem (CSP) have yielded the identification of new tractable clae of CSP [1]. In thi paper, we propoe three new decompoition technique, namely HINGE +, CUT, and TRAVERSE, where HINGE + i a generalization of HINGE by Gyen et al. [2]. Further, we combine CUT and TRAVERSE into a new trategy, which we call Cutand-Travere (CaT). We introduce thee technique and compare them according to the criteria introduced by Gottlob et al. [1]. 1 Introduction Many important practical problem uch a cheduling, reource allocation, deign and product configuration can be modeled a a Contraint Satifaction Problem (CSP), where a et of deciion need to be made, each deciion ha a number of option, and the allowable combination of thee option are retricted by a et of contraint. Becaue a CSP i in general NP-complete, earch remain the ultimate mechanim for olving it. Decompoition i a common trategy for improving the performance of earch [3]. Recently, decompoition technique borrowed from the area of databae (i.e., acyclic conjunctive querie) have been ued to characterize tractable clae of CSP [4,2,5, 1]. The baic principle i to decompoe the CSP into ub-problem that are organized in a tree tructure. The ubproblem are then olved indepently, and the olution are propagated in a backtrack-free manner along the tree [6] to yield a olution to the initial CSP. We propoe new decompoition technique and we poition them in the context of the hierarchy pecified by Gottlob et al. [1], which unifie major decompoition trategie reported in the literature and compare them in term of generality. The main technique are the biconnected decompoition (BICOMP) [6], hinge decompoition (HINGE) [2, 5], tree clutering (TCLUSTER) [4], hinge decompoition combined with tree clutering (HINGE TCLUSTER ) [2], and hypertree decompoition (HYPERTREE) [7]. Thee technique can be further characterized by the width of the tree they generate and the their computational complexity. Among the above method, HYPERTREE i the mot general and yield tree with the mallet poible width. However, it cot i high. HINGE i a more efficient but le general trategy than HYPERTREE. In thi paper, we

2 generalize HINGE into HINGE +, and introduce CUT a a variation of HINGE. Further, we propoe a new technique, TRAVERSE, which we combine with CUT to yield a new technique CaT. In ummary, HINGE + generalize HINGE, and CaT generalize CUT. Thi paper i organized a follow. Section 2 review the preliminarie of CSP. Section 3 introduce HINGE +. Section 4 decribe CUT, which i a variation of HINGE +. Section 5 introduce a new technique called TRAVERSE. Section 6 combine CUT and TRAVERSE into CaT. Section 7 etablihe the formal relationhip among thee technique and alo with repect to HINGE and HYPERTREE. Finally, Section 8 conclude the paper. 2 Background A CSP i defined a a tuple P = (V, D, C) where V i a et of variable, D i a et of value domain for the variable, and C i a et of contraint that retrict the acceptable combination of value to variable. Every contraint C i C i a relation over a et S i of variable, and pecifie the et of allowed tuple a a ubet of the Carteian product of the domain of S i. We denote the et of variable involved in contraint C i by Scope(C i ), and the union of the cope of a et of contraint {C i } by Var({C i }). A olution to the CSP i an aignment of value to all variable uch that all the contraint are imultaneouly atified. To olve a CSP we need to determine whether the CSP ha a olution and, if o, find one olution. Although CSP are NP-complete in general, ome of the CSP are tractable due to their retricted tructure. The CSP can be repreented with a contraint network, which i, in general, a hypergraph. The contraint hypergraph of a CSP P = (V, D, C) i given by H = (V, S), where S i a et of hyperedge correponding to the cope of the contraint in the CSP. Figure 1 how the hypergraph H cg of a CSP with 22 variable and 16 contraint. The Fig.1. A contraint hypergraph H cg Fig.2. The primal graph of H cg. primal graph of a contraint hypergraph H = (V, S) i a graph G = (V, E) where E i a et of edge relating any two variable that appear in the cope of a contraint in the CSP. Figure 2 how the primal graph of H cg. Further, we ay that a hypergraph i connected when it correponding primal graph i connected. Each connected component of the primal graph define a connected component of the hypergraph.

3 Acyclic CSP are thoe CSP whoe aociated contraint hypergraph i acyclic. A contraint hypergraph H i acyclic iff it primal graph G i chordal (i.e., any cycle of length greater than 3 ha a chord) and conformal (i.e., there i a one-to-one mapping between each maximal clique of the primal graph and the cope of the contraint) [8]. H cg of Figure 1 i not acyclic. Following [9], a join tree JT(H) for a contraint hypergraph H i a tree whoe node are the edge of H uch that whenever the ame vertex X V appear in two hyperedge 1 and 2 S, then 1 and 2 are connected, and X appear in each node on the unique path linking 1 and 2 in JT(H). In other word, the et of node in which X appear include a (connected) ubtree of JT(H). The width d of a join tree i the maximum number of hyperedge in all the node of the join tree. Figure 3 how a join tree of H cg of width d= Fig.3. A join tree of H cg A tructural decompoition technique compute an equivalent join tree for a given contraint hypergraph. Each node in thi tree i a ub-problem for which we find all olution. Then, while applying directional arc-conitency to the join tree, we can olve the CSP in a backtrack-free manner. The complexity of olving the ub-problem i O( S l d d log l), where l i the maximum ize of a contraint in S and d the width of the join tree. Figure 4 how the hierarchy, propoed by Gottlob et al. of known decompoition technique [1]. Thi hierarchy HINGE TCLUSTER [Gyen et al., 1994] HINGE [Gyen et al., 1994] HYPERTREE [Gottlob et al., 2002] TCLUSTER w * [Dechter & Pearl, 1989] TREEWIDTH [Roberton & Seymour, 1986] HYPERCUTSET [Gottlob et al., 2000] BICOMP [Freuder, 1985] D 1 D 2 indicate that CUTSET [Dechter, 1987] D 2 i trongly more general than D 1 Fig.4. The hierarchy of contraint tractability of [1]. characterized the relationhip between thee decompoition technique in term of the following criteria, where C(D i, k) i a cla of CSP for which there exit

4 a decompoition of width k by the decompoition method D i that can be olved in polynomial time [1] 1 : 1. Generalization. D 2 generalize D 1 if there exit a contant δ uch that, for each level k, C(D 1, k) C(D 2, k) hold. In practical term, thi mean that whenever a cla C of contraint i tractable according to method D 1, it i alo tractable according to D Beating. D 2 beat D 1 if there exit an integer k uch that C(D 2, k) i not contained in cla C(D 1, m) for any m. Intuitively, thi mean that ome clae of problem are tractable according to D 2 but not according to D Strong generalization. D 2 trongly generalize D 1 if D 2 generalize D 1 and D 2 beat D 1. Thi mean that D 2 i really the more powerful method given that, whenever D 1 guarantee polynomial runtime for contraint olving, then D 2 alo guarantee tractable contraint olving. However, there are clae of contraint that can be olved in polynomial time by uing D 2 but are not tractable according to D Strongly incomparable. D 1 and D 2 are trongly incomparable if both D 1 beat D 2 and D 2 beat D 1. 3 Hinge + decompoition (HINGE + ) A pecified by Gyen et al. [2], HINGE decompoe the contraint hypergraph into a join tree where each node (called 1-hinge) i a et of hyperedge and two node that are adjacent in the tree hare exactly one hyperedge. Figure 5 how a decompoition of H cg of Figure 1 by HINGE where d = 12. The reulting decompoition guarantee a et of propertie (i.e., inheritance, decompoition, and ineparability) that they define. They alo attempted to generalize their approach to k-hinge, where a k-hinge i a node in the join tree connected to other node with at mot k hyperedge. However, they howed that their algorithm for 1-hinge cannot be generalized to achieve a correct reult. The width of the join tree of Figure 5 i particularly high. We noticed that by allowing the node of the tree to connect through more than one hyperedge (a uggeted by k-hinge of Jeavon et al. [5]), we can obtain better decompoition uch a the one we how in Figure 6. We introduce the concept of k-cut to achieve uch a reult, which yield HINGE +, our improvment on HINGE. Conider a contraint hypergraph H = (V, S) and a et of hyperedge F S. We define H r = (V r, S r ), denoted Remain-hg(F, H), a the remaining contraint hypergraph obtained after removing F from H. More formally: V r = V \ Var(F) S r = h S h \ Var(F). 1 In thi hierarchy method that are not related are guaranteed not comparable.

5 Fig.5. Applying HINGE to H cg. Fig. 6. A better decompoition than that of Figure 5. Definition 1 (i-cut). Given a connected contraint hypergraph H = (V, S) where S i+1, a i-cut of H i a et of hyperedge F that atifie the following condition: 1. F S and F = i; and 2. The remaining contraint hypergraph ha at leat 2 component. Definition 2 (Max-Size(F, H)). Given an i-cut F of a contraint hypergraph H = (V, S), Max-Size(F, H) i the larget number of hyperedge in a connected component in Remain-hg(F, H). Therefore, given a contraint hypergraph H, HINGE continuouly find 1-cut (connecting 1-hinge). We improve HINGE by finding 1-cut through k-cut, where k i a pecified maximum cut-ize. The difficulty here i to chooe among the i-cut for a given i (1< i k), a there may be more than one poible choice. We olve thi problem by chooing the i-cut that yield the minimum value of Max-Size. Now we define the join tree reulting from HINGE + : Definition 3 (k-hinge + -tree). Given a contraint hypergraph H = (V, S), a k-hinge + -tree of H i a tree, T = (N, A), with node N and labeled arc A, uch that: 1. Each tree node p S; 2. For each hyperedge h S, there exit a tree node p uch that h p; 3. Two adjacent tree node p 1 and p 2, there exit an i-cut C (1 i k) that Var(p 1 ) Var(p 2 ) = Var(C); and 4. For each variable Y V, the et {p N Y Var(p)} induce a connected ubtree of T. Given a contraint hypergraph H and a contant number k, the hinge + decompoition algorithm hown in Figure 1 return a k-hinge + -tree by finding 1-cut through k-cut. In Algorithm 1, k i the maximum cut ize. The wort cae of the algorithm occur when there are no i-cut 1 i (k 1). In the wort cae,

6 Input: A hypergraph H = (V, S) and a maximum cut-ize k. Output: An k-hinge + -tree T for (V, S). 1 i 1; 2 S cut ; 3 N i {S}; 4 Mark every hyperedge in S a unchoen ; 5 foreach j from 1 to k tep by 1 do 6 Mark the node in N i a j-non-minimal; 7 while not all node of N i are marked j-minimal do 8 Chooe a j-non-minimal node F in N i; 9 j-combination all combination of j unchoen hyperedge in F; 10 j-cut ; 11 foreach j-combination X j-combination do 12 Γ {G X G i a connected component in Remain-hg(X,F)}; 13 if ( Γ > 1) and ( C q S cut, Γ p Γ uch that C q Γ p); then 14 j-cut j-cut {X}; 15 if j-cut then 16 chooe a j-cut C with mallet Max-Size(j-cut, F); 17 Mark the hyperedge in C a choen ; 18 S cut S cut {C}; 19 Γ {G C G i a connected component in Remain-hg(C,F)}; 20 N i+1 (N i \ {F }) Γ; 21 Mark C a a j-cut of every element in Γ; 22 Let γ: {FN 1,..., FN q} Γ uch that FN i γ(fn i) ; 23 A i+1 (A i \ {({F, F }, C) ({F, F }, C) A i}) {({γ(fn), FN}, C) ({F, FN}, C) A i} {({Γ 0, Γ y}, C) Γ 0 i an arbitrary choen element from Γ, Γ y Γ and Γ y Γ 0}; 24 Mark all the new node added to N i+1 a j-non-minimal; ele 25 Mark F a j-minimal; 26 i i + 1; 27 T (N i, A i); Algorithm 1: Algorithm of HINGE +.

7 line 11 loop at mot S k time, and each loop can be performed in O( V (S ) time. So the wort time complexity of HINGE + i O( V (S k+1 ). Since k i ued to limit the cut ize, Algorithm 1 remain polynomial. Figure 6 how a 2-hinge + -tree for H cg Fig.7. Applying HINGE + on H cg with k = 2. 4 Cut decompoition (CUT) Notice that, in general, the arc incident to a given node in a join tree may be labeled by two or more ditinct cut. For example, in the join tree of Figure 7, the arc incident to the node { 4, 5, 6,, 12 } are labeled with three different cut, namely { 4, 5 }, { 6, 12 }, and { }. In thi ection, we conider a variation of HINGE + called CUT, which retrict to at mot 2 the number of different cut labeling the arc incident to any given node in the join tree. Thi i achieved by replacing the condition in line 13 with the following one: 1. Γ > 1; 2. C q S cut, there exit Γ p Γ uch that C q Γ p ; and 3. For every two et of hyperedge C i and C j S cut, if C i C j, and C i Γ i, C j Γ j, then Γ i Γ j. The above condition guarantee that no more than two cut label the arc incident to a node in the join tree obtained by CUT. (Thi feature allow u to further travere each tree node from one cut to another cut and i exploited in Section 5.) The complexity of CUT i the ame a that of HINGE +, and it thu i polynomial. Figure 8 how the reult of applying CUT to the contraint hypergraph H cg of Figure 1 with k =2. 5 Travere decompoition (TRAVERSE) Given a contraint hypergraph H = (V, S) and a et of hyperedge F S, TRAVERSE return a unique join tree obtained by Algorithm 2 via weeping through the contraint hypergraph tarting from the hyperedge in F. We denote by Travere-I(H, F) the reult obtained by applying Algorithm 2 with F on H.

8 Fig.8. Applying CUT on H cg. Definition 4 (Neighboring hyperedge). The neighboring hyperedge of a et of hyperedge F in a contraint hypergraph H = (V, S) with F S, denoted Neighbor(F, S), i a et given by: {e e F, e F, and Var({e}) Var(F) }. (1) Input: a contraint hypergraph H = (V, S) and a et of hyperedge F S. Output: an equivalent join tree T for H. 1 N ; A ; 2 Mark any hyperedge e S a unviited ; 3 F v {e Var({e}) Var(F)}; 4 N N {F v}; 5 F jv F v; 6 Mark any hyperedge in F jv a viited ; 7 while not all hyperedge in S are viited do 8 F Neighbor(F jv, the et of all unviited hyperedge); 9 F v {e Var(e) Var(F ) }; 10 N N {F v}; 11 A A {(F jv, F v)}; 12 F jv F v; 13 Mark every hyperedge in F jv a viited ; T (N, A); Algorithm 2: Algorithm for TRAVERSE-I. The loop in line 7 of the Algorithm 2 execute at mot S time, and each execution can be performed in O( V (S ) time. Therefore, the complexity TRA- VERSE i V S 2 ) and i polynomial. Figure 9 how the join tree computed by travere decompoition from { 1 } in H cg. TRAVERSE alway compute a join tree that i a connected chain, provided the contraint hypergraph i connected. The reult of the decompoition dep on F the tarting et of hyperedge. If we travere H cg of Figure 1 tarting from { 6,, 12 }, Algorithm 2 yield a join tree of width d = 10. Starting from { 1 }, the width i d = 3 (ee Figure 9).

9 Fig.9. Applying TRAVERSE on H cg. We can combine CUT with TRAVERSE to improve the k-hinge + -tree computed by CUT. To thi, we need to modify the Algorithm 2 in order to allow it to weep the contraint hypergraph between two cut. In order to travere a contraint hypergraph from one et of hyperedge to another et of hyperedge, which will be ued in Section 6, we only need to revie Algorithm 2 to Algorithm 3. We denote by Travere-II(H, C 1, C 2 ) the reult of applying Algorithm 3 C 1 to C 2 on H The complexity of Algorithm 3 i alo O( V S 2 ). Input: a contraint hypergraph H = (V, S), a et of hyperedge C 1 and another et of hyperedge C 2. Output: an equivalent join tree T for H. N ; A ; Mark any hyperedge e S a unviited ; F d {e Var(e) Var(C 2)}; F v {e Var(e) Var(C 1)}; N N {F v}; Mark any hyperedge in F jv a viited ; while (F v F d ) and (not all hyperedge in S are viited ) do F Neighbor(F jv \ F d, the et of all unviited hyperedge F d ); F v {e Var(e) Var(F )}; N N {F v}; A A {(F jv, F v)}; F jv F v; Mark every hyperedge in F jv a viited ; T (N, A); Algorithm 3: Algorithm for TRAVERSE-II. 6 Cut-and-Travere decompoition (CaT) In thi ection, we introduce CaT, which combine CUT with TRAVERSE. The algorithm for CaT i given in Algorithm 4. Theorem 1. Given a contraint hypergraph H and a contant number k, the CaT algorithm compute an equivalent join tree for H.

10 Input: A hypergraph H = (V, S) and a maximum cut-ize k. Output: An equivalent join tree T for H. Cut H into a tree with tree node P 1,..., P m by CUT; N ; A ; foreach i from 1 to m do witch the number of cut labeling the arc incident to P i; do cae 0 (N i, A i) Travere-I(P i, any hyperedge in P i) ; cae 1 (N i, A i) Travere-I(P i, C) where C i the only cut labeling the arc incident to P i ; cae 2 (N i, A i) Travere-II(P i, C 1, C 2) where C 1 and C 2 are the cut labeling the arc incident to P i ; N N {N i}; A A {A i}; T (N, A); Algorithm 4: The algorithm for CaT. Proof. Algorithm 4 firt applie CUT to compute T 1 a k-hinge + -tree equivalent to a contraint hypergraph H = (V, S). The arc incident to any tree node in T 1 are labeled with at mot two cut. The algorithm travere each tree node in T 1 by applying TRAVERSE. If there i only one tree node in T 1, then CaT become TRAVERSE, which exactly compute an equivalent join tree for H. If there are at mot 2 tree node in T 1, then each tree node contain at leat 1 cut and at mot 2 cut. Since the reult of TRAVERSE on each tree node containing 1 cut i a chain-like join tree that begin with one cut, the reult of TRAVERSE on each tree node containing 2 cut i alo a chain-like join tree that begin with one cut and with another cut. The ub join tree for all tree node are exactly connected through thee cut, which guarantee the connectedne property of the combined join tree of thee ub join tree. Thu, the CaT algorithm compute an equivalent join tree for H. HYPERTREE [9] compute an optimal hypertree of H with a width within a given bound k; the algorithm return failure if no uch decompoition exit. In our approach, the contant k only retrict the ize of cut; it doe not retrict the width of the join tree computed by CaT. Therefore, CaT i more flexible than HYPERTREE.

11 Given a contraint hypergraph H = (V, S) and a contant number k, CaT firt compute an k-hinge + -tree T 1 by CUT, which can be implemented in O( V (S k+1 ). The travere proce can be performed in O( V (S 2 ). Therefore, the complexity of CaT i O( V S k+1 + V S 2 ). Since k 1, the complexity of CaT i O( V S k+1 ). Figure 10 and Figure 11 how the equivalent tree of H cg computed by CaT and HYPERTREE. In thi cae, the width of the decompoition obtained by CaT and HYPERTREE are the ame and equal to {0, 1, 2, 3} {, } {1, 4, 3, 11} { 3, 4 } {4, 5, 6, 11, 12, 13} {, } {13, 14, 22} {, } {6, 7, 13, 14} {, 22 } {7, 8, 9, 14, 15, 16}{, 13 } {9 10, 16, 17} { 8, 14 } {10, 17, 18, 21} {, 16 } {10, 17, 18, 20}{, 15 } {10, 17, 18, 19} {, 10 } Fig.10. Applying CaT on H cg. Fig. 11. Applying HYPERTREE on H cg. 7 Characterization In thi ection, we compare HINGE, HINGE +, CUT, TRAVERSE, CaT and HYPERTREE in term of the criteria propoed by Gottlob et al. in [1]. Finally, we enrich the new contraint tractability hierarchy propoed by thee reearcher. Theorem 2. CaT trongly generalize CUT. Proof. The firt tep of CaT i CUT. The econd tep of CaT i TRAVERSE. TRAVERSE will improve or keep the ame decompoition reult by CUT, thu CaT generalize CUT. For H cg hown in Figure 1, CaT compute a join tree with width 2 when limiting cut ize to 2, a hown in Figure 10. CUT compute a join tree with width 4 when limiting cut ize to 2, a hown in Figure 8. Thu, CaT beat CUT. Therefore, CaT trongly generalize CUT. Theorem 3. HINGE + trongly generalize HINGE. Proof. When k = 1, HINGE + i exactly the ame a HINGE. When k > 1, HINGE + firt perform HINGE, then continuouly find 2-cut through k-cut, which will improve or keep the ame decompoition reult by HINGE. Thu, HINGE + generalize HINGE. For H cg hown in Figure 1, HINGE + compute a

12 join tree with width 5 when limiting cut ize to 2, a hown in Figure 7, while HINGE compute a join tree with width 12, a hown in Figure 5. Thu, CaT beat CUT. Therefore, HINGE + trongly generalize HINGE. Alo, Since HYPERTREE alway compute an optimal decompoition, while HINGE +, CUT and CaT are baed on heuritic function, HYPERTREE generalize thee method. For TRAVERSE, the decompoition reult dep on the et of hyperedge it begin with, thu it cannot compare with HINGE, HINGE +, CUT, and CaT. Gottlob et al. [1] introduce the following comparion criteria to compare 2 different decompoition method D 1 and D 2. To compare HINGE, HINGE +, CUT, TRAVERSE, CaT and HYPERTREE with each other, we give two additional contraint hypergraph borrowed from [1]. For any n > 0, let triangle(n) be the graph (V, E) define a follow. The et of vertice V contain 2n + 1 vertice p 1,...,p 2n+1. For each even index i, 2 i 2n, {p i, p i 1 }, {p i, p i+1 }, and {p i 1, p i+1 } are edge in E. No other edge belong to E. Figure 12 how the triangle(3). The hypertree width of triangle(n) i 2. In fact, a hypertree (T, χ, λ), where T i a imple chain of n vertice v 1,..., v n, and, for each v i (1 i n), χ(v i ) = {p 2i 1, p 2i, p 2i+1 } and λ(v i ) contain the two edge {p 2i 1, p 2i } and {p 2i, p 2i+1 }, i a width 2 hypertree decompoition of triangle(n). For any n > 0, let book(n) be a graph having 2n + 2 vertice and 3n + 1 edge that form n quare (page of the book) having exactly one common edge {X, Y }. It i eay to ee that the hypertree width of book(n) i 2. Figure 13 how the graph book(4). p 2 p 4 p 6 p 1 p 3 p 5 p 7 Fig. 12. Triangle(3). Fig. 13. Book(4). Theorem 4. HYPERTREE trongly generalize CaT. Proof. HYPERTREE compute a join tree with the mallet poible width for a contraint hypergraph. Becaue CaT a heuritic decompoition method, it only chooe one poible decompoition. Therefore, HYPERTREE alway produce a join tree whoe width i at mot a large a CaT. Thu HYPERTREE generalize CaT. For triangle(3) hown in Figure 12, HYPERTREE compute a hypertree with width 2 a hown in Figure 14, while CaT compute a join tree with width 3 when limiting cut ize to 2, a hown in Figure 15. Note that here we denote 1 a the hyperedge {P 1, P 2 }, 2 a the hyperedge {P 2, P 3 }, 3 a the hyperedge {P 1, P 3 }, 4 a the hyperedge {P 3, P 4 }, 5 a the hyperedge {P 4, P 5 }, 6 a the hyperedge {P 3, P 5 }, a the hyperedge {P 5, P 6 }, 8 a the hyperedge {P 6, P 7 },

13 { p 1, p2, p 3 } { 1, 2 } { p 4, p 5, p 6 }{ 4, 5 } p 7 p 8 p 9 {,, } {, 8 } Fig. 14. Applying HYPERTREE on triangle(3). Fig.15. Applying CaT on triangle(3). and a the hyperedge {P 5, P 7 }. Thu, HYPERTREE beat CaT. Therefore, HYPERTREE trongly generalize CaT. Theorem 5. HYPERTREE trongly generalize TRAVERSE. Proof. HYPERTREE compute a join tree for a contraint hypergraph with the mallet hypertree width. TRAVERSE compute one poibility of an equivalent join tree for a contraint hypergraph. Therefore, for a ame contraint hypergraph, HYPERTREE alway produce a join tree whoe width i maller than or equal to the width of the join tree that TRAVERSE compute. HYPERTREE thu generalize TRAVERSE. For H cg hown in Figure 1, TRAVERSE compute a join tree with width 3, a hown in Figure 9, while HYPERTREE compute a join tree with width 2, a hown in Figure 11. Thu, HYPERTREE beat TRAVERSE. Therefore, HYPERTREE trongly generalize TRAVERSE. Theorem 6. HYPERTREE trongly generalize HINGE +. Proof. HYPERTREE compute a join tree for a contraint hypergraph with the mallet hypertree width. HINGE + compute one poible equivalent join tree of a contraint hypergraph. Therefore, for a ame contraint hypergraph, HYPER- TREE alway produce a join tree whoe width i maller than or equal to the width of the join tree that HINGE + compute. Thu HYPERTREE generalize HINGE +. For H cg hown IN Figure 1, HINGE + compute a join tree with width 4 when limiting cut ize to 2, a hown in Figure 7, while HYPERTREE compute a hypertree tree with width 2, a hown in Figure 10. Thu, HYPERTREE beat HINGE +. Therefore, HYPERTREE trongly generalize HINGE +. Theorem 7. TRAVERSE and CUT are trongly incomparable. Proof. For H cg hown in Figure 1, TRAVERSE compute a join tree with width 3, a hown in Figure 9, while CUT compute a join tree with width 4 when limiting cut ize to 2, a hown in Figure 8. Thu, TRAVERSE beat CUT. For book(4) hown in Figure 13, a travere decompoition from hyperedge {X 1, X, Y, Y 1 } ha width 3, while a cut decompoition limiting cut ize to 2 ha width 2. Thu, CUT beat TRAVERSE. Therefore, TRAVERSE and CUT are trongly incomparable. Theorem 8. TRAVERSE and HINGE + are trongly incomparable.

14 Proof. For H cg a hown in Figure 1, TRAVERSE compute a join tree with width 3, a hown in Figure 9, while HINGE + compute a join tree with width 5 when limiting cut ize to 2, a hown in Figure 8. Thu, TRAVERSE beat HINGE +. For book(4) hown in Figure 13, a travere decompoition tarting from hyperedge {X 1, X, Y, Y 1 } ha width 3, while a hinge + decompoition limiting cut ize to 2 ha width 2. Thu, HINGE + beat TRAVERSE. Therefore, TRAVERSE and HINGE + are trongly incomparable. Figure 16 how a contraint tractability hierarchy baed on the above comparion reult and Gottlob et al. concluion [1]. Thi hierarchy i not yet complete. HYPERTREE [Gottlob et al., 2002] TRAVERSE CaT HINGE + CUT D 1 D 2 indicate that D 2 i trongly more general than D 1 HINGE [Gyen et al., 1994] Fig.16. Comparing our technique to previou one. Table 1 ummarize the complexity of the decompoition technique we dicu in thi ection. Technique Table 1. Complexity of decompoition method. Complexity HYPERTREE Normal form: opt-d-decomp [7] O( S 2d V 2 ) Reduced normal form [10] Bet cae: O( S d V + S 2 V ) HINGE O( V S 2 ) HINGE + O( V S k+1 ) CUT O( V S k+1 ) TRAVERSE O( V S 2 ) CaT O( V S k+1 ) Solving the CSP after decompoition O( S l d dlog l) V : number of variable (i.e., vertice) S : number of contraint (i.e., hyperedge) d: width of the join tree reulting from a decompoition k: maximum cut-ize l: maximum ize of a contraint in S

15 8 Concluion In thi paper, we propoed new technique to further improve the decompoition reult of HINGE. We preented a different view of HINGE and generalize thi method a HINGE +. Then we introduced a variation of HINGE + called CUT. We alo propoed a new decompoition method called TRAVERSE, which can be further combined with CUT a CaT. We howed that HINGE +, CUT, TRA- VERSE, and CaT can be performed in polynomial time. We compared HINGE, HINGE +, CUT, TRAVERSE, CaT and HYPERTREE with each other. We enriched the contraint tractability hierarchy introduced by Gottlob et al. in [1] by adding the comparion reult. In the future, we plan to compare HINGE +, CUT, TRAVERSE, and CaT with HINGE TCLUSTER and HINGE+BICOMP+HYPERTREE. Acknowledgment: Thi work i upported by CAREER Award # from the National Science Foundation. Deb Derrick provided invaluable editorial help. Reference 1. Gottlob, G., Leone, N., Scarcello, F.: A Comparion of Structural CSP Decompoition Method. Artificial Intelligence 124 (2000) Gyen, M., Jeavon, P.G., Cohen, D.A.: Decompoing Contraint Satifaction Problem Uing Databae Technique. Artificial Intelligence 66 (1994) Freuder, E.C., Hubbe, P.D.: A Dijunctive Decompoition Control Schema for Contraint Satifaction. In Sarawat, V., Hentenryck, P.V., ed.: Principle and Practice of Contraint Programming. MIT Pre, Cambridge, MA (1995) Dechter, R., Pearl, J.: Tree Clutering for Contraint Network. Artificial Intelligence 38 (1989) Jeavon, P.G., Cohen, D.A., Gyen, M.: A Structural Decompoition for Hypergraph. Contemporary Mathematic 178 (1994) Freuder, E.C.: A Sufficient Condition for Backtrack-Bounded Search. JACM 32 (4) (1985) Gottlob, G., Leone, N., Scarcello, F.: Hypertree Decompoition and Tractable Querie. Journal of Computer and Sytem Science 64 (2002) Dechter, R.: Contraint Proceing. Morgan Kaufmann (2003) 9. Gottlob, G., Leone, N., Scarcello, F.: On Tractable Querie and Contraint. In: 10 th International Conference and Workhop on Databae and Expert Sytem Application (DEXA 1999). (1999) Harvey, P., Ghoe, A.: Reducing Redundancy in the Hypertree Decompoition Scheme. In: The 15 th IEEE International Conference on Tool with Artificial Intelligence (ICTAI 03). (2003)

New Structural Decomposition Techniques for Constraint Satisfaction Problems

New Structural Decomposition Techniques for Constraint Satisfaction Problems 113 New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory, Univerity of Nebraka-Lincoln {yzheng,choueiry}@ce.unl.edu Abtract.

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

A Comparison of Structural CSP Decomposition Methods

A Comparison of Structural CSP Decomposition Methods A Comparison of Structural CSP Decomposition Methods Georg Gottlob Institut für Informationssysteme, Technische Universität Wien, A-1040 Vienna, Austria. E-mail: gottlob@dbai.tuwien.ac.at Nicola Leone

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

Delaunay Triangulation: Incremental Construction

Delaunay Triangulation: Incremental Construction Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )

More information

3D SMAP Algorithm. April 11, 2012

3D SMAP Algorithm. April 11, 2012 3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative

More information

AUTOMATIC TEST CASE GENERATION USING UML MODELS

AUTOMATIC TEST CASE GENERATION USING UML MODELS Volume-2, Iue-6, June-2014 AUTOMATIC TEST CASE GENERATION USING UML MODELS 1 SAGARKUMAR P. JAIN, 2 KHUSHBOO S. LALWANI, 3 NIKITA K. MAHAJAN, 4 BHAGYASHREE J. GADEKAR 1,2,3,4 Department of Computer Engineering,

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

xy-monotone path existence queries in a rectilinear environment

xy-monotone path existence queries in a rectilinear environment CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of

More information

arxiv: v1 [cs.ds] 27 Feb 2018

arxiv: v1 [cs.ds] 27 Feb 2018 Incremental Strong Connectivity and 2-Connectivity in Directed Graph Louka Georgiadi 1, Giueppe F. Italiano 2, and Niko Parotidi 2 arxiv:1802.10189v1 [c.ds] 27 Feb 2018 1 Univerity of Ioannina, Greece.

More information

A note on degenerate and spectrally degenerate graphs

A note on degenerate and spectrally degenerate graphs A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove

More information

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

A Practical Model for Minimizing Waiting Time in a Transit Network

A Practical Model for Minimizing Waiting Time in a Transit Network A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,

More information

Chapter S:II (continued)

Chapter S:II (continued) Chapter S:II (continued) II. Baic Search Algorithm Sytematic Search Graph Theory Baic State Space Search Depth-Firt Search Backtracking Breadth-Firt Search Uniform-Cot Search AND-OR Graph Baic Depth-Firt

More information

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity

More information

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck. Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

Markov Random Fields in Image Segmentation

Markov Random Fields in Image Segmentation Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

A Multi-objective Genetic Algorithm for Reliability Optimization Problem

A Multi-objective Genetic Algorithm for Reliability Optimization Problem International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR

More information

An Intro to LP and the Simplex Algorithm. Primal Simplex

An Intro to LP and the Simplex Algorithm. Primal Simplex An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term

More information

The Comparison of Neighbourhood Set and Degrees of an Interval Graph G Using an Algorithm

The Comparison of Neighbourhood Set and Degrees of an Interval Graph G Using an Algorithm The Comparion of Neighbourhood Set and Degree of an Interval Graph G Uing an Algorithm Dr.A.Sudhakaraiah, K.Narayana Aitant Profeor, Department of Mathematic, S.V. Univerity, Andhra Pradeh, India Reearch

More information

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

Algorithmic Discrete Mathematics 4. Exercise Sheet

Algorithmic Discrete Mathematics 4. Exercise Sheet Algorithmic Dicrete Mathematic. Exercie Sheet Department of Mathematic SS 0 PD Dr. Ulf Lorenz 0. and. May 0 Dipl.-Math. David Meffert Verion of May, 0 Groupwork Exercie G (Shortet path I) (a) Calculate

More information

Research Article Longest Path Reroute to Optimize the Optical Multicast Routing in Sparse Splitting WDM Networks

Research Article Longest Path Reroute to Optimize the Optical Multicast Routing in Sparse Splitting WDM Networks International Optic Volume 0, Article ID 9, page http://dxdoiorg/0/0/9 Reearch Article Longet Path Reroute to Optimize the Optical Multicat Routing in Spare Splitting WDM Network Huanlin Liu, Hongyue Dai,

More information

Planning of scooping position and approach path for loading operation by wheel loader

Planning of scooping position and approach path for loading operation by wheel loader 22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader

More information

Modeling of underwater vehicle s dynamics

Modeling of underwater vehicle s dynamics Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation

More information

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,

More information

Edits in Xylia Validity Preserving Editing of XML Documents

Edits in Xylia Validity Preserving Editing of XML Documents dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,

More information

Brief Announcement: Distributed 3/2-Approximation of the Diameter

Brief Announcement: Distributed 3/2-Approximation of the Diameter Brief Announcement: Ditributed /2-Approximation of the Diameter Preliminary verion of a brief announcement to appear at DISC 14 Stephan Holzer MIT holzer@mit.edu David Peleg Weizmann Intitute david.peleg@weizmann.ac.il

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

Lecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization

Lecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization Lecture Outline Global flow analyi Global Optimization Global contant propagation Livene analyi Adapted from Lecture by Prof. Alex Aiken and George Necula (UCB) CS781(Praad) L27OP 1 CS781(Praad) L27OP

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

Shortest Paths with Single-Point Visibility Constraint

Shortest Paths with Single-Point Visibility Constraint Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet

More information

Acyclic Network. Tree Based Clustering. Tree Decomposition Methods

Acyclic Network. Tree Based Clustering. Tree Decomposition Methods Summary s Join Tree Importance of s Solving Topological structure defines key features for a wide class of problems CSP: Inference in acyclic network is extremely efficient (polynomial) Idea: remove cycles

More information

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline Generic Travere CS 62, Lecture 9 Jared Saia Univerity of New Mexico Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v) from the bag if (v i unmarked) mark v; parent(v) = p;

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds * Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm

More information

Distributed Fractional Packing and Maximum Weighted b-matching via Tail-Recursive Duality

Distributed Fractional Packing and Maximum Weighted b-matching via Tail-Recursive Duality Ditributed Fractional Packing and Maximum Weighted b-matching via Tail-Recurive Duality Chrito Koufogiannaki, Neal E. Young Department of Computer Science, Univerity of California, Riveride {ckou, neal}@c.ucr.edu

More information

Optimal Multi-Robot Path Planning on Graphs: Complete Algorithms and Effective Heuristics

Optimal Multi-Robot Path Planning on Graphs: Complete Algorithms and Effective Heuristics Optimal Multi-Robot Path Planning on Graph: Complete Algorithm and Effective Heuritic Jingjin Yu Steven M. LaValle Abtract arxiv:507.0390v [c.ro] Jul 05 We tudy the problem of optimal multi-robot path

More information

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Iue 4, April 2015 International Journal Advance Reearch in Computer Science and Management Studie Reearch Article / Survey Paper / Cae Study Available online at: www.ijarcm.com

More information

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov

More information

The Data Locality of Work Stealing

The Data Locality of Work Stealing The Data Locality of Work Stealing Umut A. Acar School of Computer Science Carnegie Mellon Univerity umut@c.cmu.edu Guy E. Blelloch School of Computer Science Carnegie Mellon Univerity guyb@c.cmu.edu Robert

More information

Sequencing and Counting with the multicost-regular Constraint

Sequencing and Counting with the multicost-regular Constraint Sequencing and Counting with the multicot-regular Contraint Julien Menana and Sophie Demaey École de Mine de Nante, LINA CNRS UMR 6241, F-44307 Nante, France. {julien.menana,ophie.demaey}@emn.fr Abtract.

More information

else end while End References

else end while End References 621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized

More information

Service and Network Management Interworking in Future Wireless Systems

Service and Network Management Interworking in Future Wireless Systems Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering

More information

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique 202 International Conference on Frontier in Handwriting Recognition Building a Compact On-line MRF Recognizer for Large Character Set uing Structured Dictionary Repreentation and Vector Quantization Technique

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

Contents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course:

Contents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course: Content Shortet path Algorithm and Network 21/211 The hortet path problem: Statement Verion Application Algorithm (for ingle ource p problem) Reminder: relaxation, Dijktra, Variant of Dijktra, Bellman-Ford,

More information

Drawing Lines in 2 Dimensions

Drawing Lines in 2 Dimensions Drawing Line in 2 Dimenion Drawing a traight line (or an arc) between two end point when one i limited to dicrete pixel require a bit of thought. Conider the following line uperimpoed on a 2 dimenional

More information

Using Partial Evaluation in Distributed Query Evaluation

Using Partial Evaluation in Distributed Query Evaluation A X x Z z R r y Y B Uing Partial Evaluation in Ditributed Query Evaluation Peter Buneman Gao Cong Univerity of Edinburgh Wenfei Fan Univerity of Edinburgh & Bell Laboratorie Anataio Kementietidi Univerity

More information

Kinematics Programming for Cooperating Robotic Systems

Kinematics Programming for Cooperating Robotic Systems Kinematic Programming for Cooperating Robotic Sytem Critiane P. Tonetto, Carlo R. Rocha, Henrique Sima, Altamir Dia Federal Univerity of Santa Catarina, Mechanical Engineering Department, P.O. Box 476,

More information

Distribution-based Microdata Anonymization

Distribution-based Microdata Anonymization Ditribution-baed Microdata Anonymization Nick Kouda niverity of Toronto kouda@c.toronto.edu Ting Yu North Carolina State niverity yu@cc.ncu.edu Diveh Srivatava AT&T Lab Reearch diveh@reearch.att.com Qing

More information

Parallel Approaches for Intervals Analysis of Variable Statistics in Large and Sparse Linear Equations with RHS Ranges

Parallel Approaches for Intervals Analysis of Variable Statistics in Large and Sparse Linear Equations with RHS Ranges American Journal of Applied Science 4 (5): 300-306, 2007 ISSN 1546-9239 2007 Science Publication Correponding Author: Parallel Approache for Interval Analyi of Variable Statitic in Large and Spare Linear

More information

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit

More information

An Improved Implementation of Elliptic Curve Digital Signature by Using Sparse Elements

An Improved Implementation of Elliptic Curve Digital Signature by Using Sparse Elements The International Arab Journal of Information Technology, Vol. 1, No., July 004 0 An Improved Implementation of Elliptic Curve Digital Signature by Uing Spare Element Eam Al-Daoud Computer Science Department,

More information

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem

More information

A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED

A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED Jutin Domke and Yianni Aloimono Computational Viion Laboratory, Center for Automation Reearch Univerity of Maryland College Park,

More information

/06/$ IEEE 364

/06/$ IEEE 364 006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;

More information

CSE 250B Assignment 4 Report

CSE 250B Assignment 4 Report CSE 250B Aignment 4 Report March 24, 2012 Yuncong Chen yuncong@c.ucd.edu Pengfei Chen pec008@ucd.edu Yang Liu yal060@c.ucd.edu Abtract In thi project, we implemented the recurive autoencoder (RAE) a decribed

More information

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two

More information

Diverse: Application-Layer Service Differentiation in Peer-to-Peer Communications

Diverse: Application-Layer Service Differentiation in Peer-to-Peer Communications Divere: Application-Layer Service Differentiation in Peer-to-Peer Communication Chuan Wu, Student Member, IEEE, Baochun Li, Senior Member, IEEE Department of Electrical and Computer Engineering Univerity

More information

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance A Hybrid Deployable Dynamic Traffic Aignment Framework for Robut Online Route Guidance Sriniva Peeta School of Civil Engineering, Purdue Univerity Chao Zhou Sabre, Inc. Sriniva Peeta School of Civil Engineering

More information

Shortest Path Routing in Arbitrary Networks

Shortest Path Routing in Arbitrary Networks Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,

More information

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT

More information

Highly Heterogeneous XML Collections: How to retrieve precise results?

Highly Heterogeneous XML Collections: How to retrieve precise results? Highly Heterogeneou XML Collection: How to retrieve precie reult? Imael Sanz, Marco Meiti 2, Giovanna Guerrini, Rafael Berlanga Llavori () Univeritat Jaume I, Catellón, Spain - {berlanga,imael.sanz}@uji.e

More information

Summary. Acyclic Networks Join Tree Clustering. Tree Decomposition Methods. Acyclic Network. Tree Based Clustering. Tree Decomposition.

Summary. Acyclic Networks Join Tree Clustering. Tree Decomposition Methods. Acyclic Network. Tree Based Clustering. Tree Decomposition. Summary s Join Tree Importance of s Solving Topological structure denes key features for a wide class of problems CSP: Inference in acyclic network is extremely ecient (polynomial) Idea: remove cycles

More information

Touring a Sequence of Polygons

Touring a Sequence of Polygons Touring a Sequence of Polygon Mohe Dror (1) Alon Efrat (1) Anna Lubiw (2) Joe Mitchell (3) (1) Univerity of Arizona (2) Univerity of Waterloo (3) Stony Brook Univerity Problem: Given a equence of k polygon

More information

Khoirul Umam 1, Agus Zainal Arifin 2 and Dini Adni Navastara 3

Khoirul Umam 1, Agus Zainal Arifin 2 and Dini Adni Navastara 3 I J C T A, 9(-A), 016, pp 763-777 International Science Pre A Novel Strategy of Differential Evolution Algorithm Croover Operator Baed on Graylevel Cluter Similarity for Automatic Multilevel Image Threholding

More information

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de

More information

np vp cost = 0 cost = c np vp cost = c I replacing term cost = c+c n cost = c * Error detection Error correction pron det pron det n gi

np vp cost = 0 cost = c np vp cost = c I replacing term cost = c+c n cost = c * Error detection Error correction pron det pron det n gi Spoken Language Paring with Robutne and ncrementality Yohihide Kato, Shigeki Matubara, Katuhiko Toyama and Yauyohi nagaki y Graduate School of Engineering, Nagoya Univerity y Faculty of Language and Culture,

More information

A Novel Feature Line Segment Approach for Pattern Classification

A Novel Feature Line Segment Approach for Pattern Classification 12th International Conference on Information Fuion Seattle, WA, USA, July 6-9, 2009 A Novel Feature Line Segment Approach for Pattern Claification Yi Yang Intitute of Integrated Automation Xi an Jiaotong

More information

A New Approach to Pipeline FFT Processor

A New Approach to Pipeline FFT Processor A ew Approach to Pipeline FFT Proceor Shouheng He and Mat Torkelon Department of Applied Electronic, Lund Univerity S- Lund, SWEDE email: he@tde.lth.e; torkel@tde.lth.e Abtract A new VLSI architecture

More information

mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee

mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee Reolving Deadlock for Pipelined Stream Application on Network-on-Chip Xiaohang Wang 1,2, Peng Liu 1 1 Department of Information Science and Electronic Engineering, Zheiang Univerity Hangzhou, Zheiang,

More information

Testing Structural Properties in Textual Data: Beyond Document Grammars

Testing Structural Properties in Textual Data: Beyond Document Grammars Teting Structural Propertie in Textual Data: Beyond Document Grammar Felix Saaki and Jen Pönninghau Univerity of Bielefeld, Germany Abtract Schema language concentrate on grammatical contraint on document

More information

Texture-Constrained Active Shape Models

Texture-Constrained Active Shape Models 107 Texture-Contrained Active Shape Model Shuicheng Yan, Ce Liu Stan Z. Li Hongjiang Zhang Heung-Yeung Shum Qianheng Cheng Microoft Reearch Aia, Beijing Sigma Center, Beijing 100080, China Dept. of Info.

More information

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -

More information

Acyclic Network. Tree Based Clustering. Tree Decomposition Methods

Acyclic Network. Tree Based Clustering. Tree Decomposition Methods Summary s Cluster Tree Elimination Importance of s Solving Topological structure dene key features for a wide class of problems CSP: Inference in acyclic network is extremely ecient (polynomial) Idea:

More information

Touring a Sequence of Polygons

Touring a Sequence of Polygons Touring a Sequence of Polygon Mohe Dror (1) Alon Efrat (1) Anna Lubiw (2) Joe Mitchell (3) (1) Univerity of Arizona (2) Univerity of Waterloo (3) Stony Brook Univerity Problem: Given a equence of k polygon

More information

Reducing redundancy in the hypertree decomposition scheme

Reducing redundancy in the hypertree decomposition scheme University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 00 Reducing redundancy in the hypertree decomposition scheme Peter Harvey

More information

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation

More information

Set-based Approach for Lossless Graph Summarization using Locality Sensitive Hashing

Set-based Approach for Lossless Graph Summarization using Locality Sensitive Hashing Set-baed Approach for Lole Graph Summarization uing Locality Senitive Hahing Kifayat Ullah Khan Supervior: Young-Koo Lee Expected Graduation Date: Fall 0 Deptartment of Computer Engineering Kyung Hee Univerity

More information

A TOPSIS based Method for Gene Selection for Cancer Classification

A TOPSIS based Method for Gene Selection for Cancer Classification Volume 67 No17, April 2013 A TOPSIS baed Method for Gene Selection for Cancer Claification IMAbd-El Fattah,WIKhedr, KMSallam, 1 Department of Statitic, 3 Department of Deciion upport, 2 Department of information

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and Thi article appeared in a journal publihed by Elevier. The attached copy i furnihed to the author for internal non-commercial reearch and education ue, including for intruction at the author intitution

More information

A Sparse Shared-Memory Multifrontal Solver in SCAD Software

A Sparse Shared-Memory Multifrontal Solver in SCAD Software Proceeding of the International Multiconference on ISBN 978-83-6080--9 Computer Science and Information echnology, pp. 77 83 ISSN 896-709 A Spare Shared-Memory Multifrontal Solver in SCAD Software Sergiy

More information

Variable Resolution Discretization in the Joint Space

Variable Resolution Discretization in the Joint Space Variable Reolution Dicretization in the Joint Space Chritopher K. Monon, David Wingate, and Kevin D. Seppi {c,wingated,keppi}@c.byu.edu Computer Science, Brigham Young Univerity Todd S. Peteron peterto@uvc.edu

More information