New Structural Decomposition Techniques for Constraint Satisfaction Problems
|
|
- Donna Burke
- 6 years ago
- Views:
Transcription
1 113 New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory, Univerity of Nebraka-Lincoln Abtract. We propoe four new tructural decompoition technique for Contraint Satifaction Problem. We compare thee four technique both theoretically and experimentally with hinge decompoition and hypertree decompoition. Our experiment how that one of our technique offer the bet trade-off between the computational cot of the decompoition and the width of the reulting decompoition tree. 1 Introduction Many important practical problem uch a cheduling, reource allocation, and product configuration can be modeled a a Contraint Satifaction Problem (CSP), which conit of a et of variable, the domain of thee variable, and a et of contraint over thee variable retricting allowed combination of value for variable. Although CSP are in NP-complete in general, decompoition technique borrowed from the area of databae have been ued to characterize tractable clae of CSP [1 4]. The baic principle i to decompoe the CSP into ub-problem that are organized in a tree tructure. The ubproblem are then olved indepently, and the olution are propagated in a backtrack-free manner along the tree [5] to yield a olution to the initial CSP, a decribed by Dechter and Pearl [1]. We propoe new decompoition technique and poition them in the context of the hierarchy pecified by Gottlob et al. [4], which unifie main decompoition trategie and compare them in term of generality. The main technique are biconnected decompoition (BICOMP) [6], hinge decompoition (HINGE) [2, 3], tree clutering (TCLUSTER) [1], hinge decompoition combined with tree clutering (HINGE TCLUSTER ) [2], and hypertree decompoition (HYPERTREE) [7]. Thee technique can be further characterized by their computational complexity and the width of the tree they generate (which i the ize of the larget ub-problem in the tree). Among the above method, HYPERTREE i the mot general and yield tree with the mallet poible width. However, it remain cotly in practice even though it complexity i polynomial [8] (ee experiment in Section 8). HINGE i a more efficient but le general trategy than HYPERTREE. In thi paper, we generalize HINGE into HINGE +, and introduce CUT a a variation of HINGE. Further, we propoe a new technique, TRAVERSE, which we combine with CUT to yield a B. Falting et al. (Ed.): CSCLP 2004, LNAI 3419, pp , c Springer-Verlag Berlin Heidelberg 2005
2 114 Yaling Zheng and Berthe Y. Choueiry new technique CaT. In ummary, HINGE + generalize HINGE, and CaT generalize CUT. We evaluate our new technique theoretically and empirically on randomly generated hypergraph. Our experiment how that CaT provide the bet trade-off between the width of the generated tree and the computational cot of the decompoition. Thi paper i organized a follow. Section 2 review the preliminarie of CSP. Section 3 introduce HINGE +. Section 4 decribe CUT, which i a variation of HINGE +. Section 5 introduce a new technique called TRAVERSE. Section 6 combine CUT and TRAVERSE into CaT. Section 7 etablihe the formal relationhip among thee technique, and alo with repect to HINGE and HYPERTREE. Section 8 demontrate the effectivene of CaT on randomly generated problem. Finally, Section 9 conclude the paper. 2 Background A CSP i defined a a tuple P =(V, D, C), where V i a et of variable, D i a et of value domain for the variable, and C i a et of contraint that retrict the acceptable combination of value to variable. Every contraint C i Ci a relation over a et S i Vof variable, and pecifie the et of allowed tuple a a ubet of the Carteian product of the domain of S i.wedenotetheetof variable involved in contraint C i by Scope(C i ), and the union of the cope of a et of contraint {C i } by Var({C i }). A olution to the CSP i an aignment of value to all variable uch that all the contraint are imultaneouly atified. The CSP can be repreented by it aociated contraint hypergraph. The contraint hypergraph of a CSP P =(V, D, C) igivenbyh =(V, S), where S i a et of hyperedge correponding to the cope of the contraint in the CSP. Figure 1 how the hypergraph H cg of a CSP with 22 variable and 16 contraint. The primal graph of a contraint hypergraph H =(V, S) i a graph G =(V,E), where E i a et of edge relating any 2 variable that appear in the cope of a contraint in the CSP. Figure 2 how the primal graph of H cg. Further, we ay that a hypergraph i connected when it correponding primal graph i connected. Each connected component of the primal graph define a connected component of the hypergraph. Acyclic CSP are thoe CSP whoe aociated contraint hypergraph i acyclic. A contraint hypergraph H i acyclic iff it primal graph G i chordal (i.e., every cycle of length at leat 4 ha an edge connecting 2 non-adjacent ver Fig. 1. A contraint hypergraph H cg. Fig. 2. The primal graph of H cg.
3 New Structural Decompoition Technique for Contraint Satifaction Fig. 3. AjointreeofH cg. tice) and conformal (i.e., there i a one-to-one mapping between each maximal clique of the primal graph and the cope of the contraint) [9]. The contraint hypergraph H cg hown in Figure 1 i not acyclic. Following [10], a join tree JT(H) for a contraint hypergraph H i a tree whoe node are the edge of H uch that whenever the ame vertex X V appear in 2 hyperedge 1 and 2 S,then 1 and 2 are connected, and X appear in each node on the unique path linking 1 and 2 in JT(H). In other word, the et of node in which X appear include a (connected) ubtree of JT(H). The width d of a join tree i the maximum number of hyperedge in all the node of the join tree. Figure 3 how a join tree of H cg of width d=2. The principle of tructural decompoition technique i to compute an equivalent join tree for a given contraint hypergraph. Each node in thi tree i a ub-problem for which we find all olution, then, while applying directional arc-conitency to the join tree, we can olve the CSP in a backtrack-free manner [1, 2]. The complexity of olving the ub-problem i O( S l d d log l), where l i the maximum ize of a contraint in S and d the width of the join tree [2]. Gottlob et al. [4] defined a et of criteria for comparing decompoition method, where C(D i,k) i a cla of CSP for which there exit a decompoition of width k by the decompoition method D i that can be olved in polynomial time. Thee criteria are a follow (taken verbatim from [4]): 1. Generalization. D 2 generalize D 1 if there exit a contant δ 0 uch that, for each level k, C(D 1,k) C(D 2,k+δ) hold. In practical term, thi mean that whenever a cla C of contraint i tractable according to method D 1, it i alo tractable according to D Beating. D 2 beat D 1 if there exit an integer k uch that C(D 2,k) C(D 1,m) for any m. Intuitively, thi mean that ome clae of problem are tractable according to D 2 but not according to D Strong Generalization. D 2 trongly generalize D 1 if D 2 generalize D 1 and D 2 beat D 1. Thi mean that D 2 i really the more powerful method given that, whenever D 1 guarantee polynomial runtime for contraint olving, then D 2 alo guarantee tractable contraint olving. However, there are clae of contraint that can be olved in polynomial time by uing D 2 but are not tractable according to D Strongly Incomparable. D 1 and D 2 are trongly incomparable if both D 1 beat D 2 and D 2 beat D 1. Figure 4 how the hierarchy developed by Gottlob et al. [4] baed on the above compariion criteria. Whenever two decompoition method are not related by a directed path, they are trongly incomparable.
4 116 Yaling Zheng and Berthe Y. Choueiry HINGE TCLUSTER [Gyen et al., 1994] HINGE [Gyen et al., 1994] HYPERTREE [Gottlob et al., 2002] TCLUSTER w * [Dechter & Pearl, 1989] TREEWIDTH [Roberton & Seymour, 1986] HYPERCUTSET [Gottlob et al., 2000] BICOMP [Freuder, 1985] CUTSET [Dechter, 1987] D 1 D 2 indicate that D 2 i trongly more general than D 1 Fig. 4. The hierarchy of contraint tractability of [4]. 3 Hinge + Decompoition (HINGE + ) In thi ection, we introduce HINGE + a an improvement of HINGE. A pecified by Gyen et al. [2], HINGE decompoe the contraint hypergraph into a join tree where each node (called 1-hinge) i a et of hyperedge and 2 node that are adjacent in the tree hare exactly one hyperedge. Figure 5 how a decompoition of H cg of Figure 1 by HINGE where d = 12. The reulting decompoition guarantee a et of propertie (i.e., inheritance, decompoition, and ineparability) that they define. They alo attempted to generalize their approach to k-hinge, where a k-hinge i a node in the join tree connected to other node with at mot k hyperedge. However, they howed that their algorithm for 1- hinge cannot be generalized to achieve a correct reult. The width of the join tree of Figure 5 i particularly high. We noticed that by allowing the node of the tree to connect through more than 1 hyperedge (a uggeted by k-hinge of Jeavon et al. [3]), we can obtain a finer decompoition uch a the one hown in Figure 6. We introduce 3 important definition, which we will ue to define HINGE +, our improvment on HINGE: Definition 1. Remain-hg(F, S). Given a connected contraint hypergraph H = (V, S) and a et of hyperedge F S, we define H r =(V r, S r ),denotedremainhg(f, S), a the remaining contraint hypergraph obtained after removing F from S. More formally: V r = V\Var(F ) and S r = h S h \ Var(F ) Fig. 5. Applying HINGE to H cg Fig. 6. A finer decompoition than that of Figure 5.
5 New Structural Decompoition Technique for Contraint Satifaction 117 Definition 2. i-cut. Given a connected contraint hypergraph H =(V, S) where S i +1,ani-cut of H i a et of hyperedge F uch that: 1. F S and F = i; and 2. Remain-hg(F, S) ha at leat 2 component. Definition 3. Max-Size(F, H). Given an i-cut F of a contraint hypergraph H =(V, S), Max-Size(F, H) i the larget number of hyperedge in a connected component in Remain-hg(F, H). Given a contraint hypergraph H, HINGE continuouly find 1-cut (connecting 1-hinge). We improve HINGE by finding 1-cut through k-cut, where k i a pecified maximum cut-ize. The difficulty here i to chooe among the i-cut for agiveni (1< i k), a there may be more than one poible choice. We olve thi problem by chooing the i-cut that yield the minimum value of Max-Size. Now we define the join tree reulting from HINGE + : Definition 4. k-hinge + -tree. Given a contraint hypergraph H =(V, S), akhinge + -tree of H i a tree, T =(N,A), withnoden and labeled arc A, uch that: 1. For each tree node, p S; 2. For each hyperedge h S, there exit a tree node p uch that h p; 3. For 2 adjacent tree node p 1 and p 2, there exit an i-cut C (1 i k) uch that Var(p 1 ) Var(p 2 ) = Var(C); and 4. For each variable Y V,theet{p N Y Var(p)} induce a connected ubtree of T. Given a contraint hypergraph H and a contant number k, which i the maximum cut ize, HINGE + (ee Algorithm 1) return a k-hinge + -tree by finding 1-cut through k-cut. The wort cae of the algorithm occur when there are no i-cut 1 i (k 1). In thi cae, line 11 loop at mot S k time, and each loop can be performed in O( V S ) time. Therefore, the wort-cae time complexity of HINGE + i O( V S k+1 ). Since k i ued to limit the cut ize, Algorithm 1 remain polynomial. Figure 7 how a 2-hinge + -tree for H cg Fig. 7. Applying HINGE + to H cg with k =2.
6 118 Yaling Zheng and Berthe Y. Choueiry Input: A hypergraph H =(V, S) and a maximum cut-ize k. Output: Ank-hinge + -tree T for (V, S). 1 i 1; 2 S cut ; 3 N i {S}; 4 Mark every hyperedge in S a unchoen ; 5 foreach j from 1 to k tep by 1 do 6 Mark the node in N i a j-non-minimal; 7 while not all node of N i are marked j-minimal do 8 Chooe a j-non-minimal node F in N i; 9 j-combination all combination of j unchoen hyperedge in F ; 10 j-cut ; 11 foreach j-combination X j-combination do 12 Γ {G X G i a connected component in Remain-hg(X, F )}; 13 if ( Γ > 1) and( C q {S cut (S cut S cut) and (S cut F )}, Γ p Γ uch that C q Γ p) then 14 j-cut j-cut {X}; 15 if j-cut then 16 chooe a j-cut C with mallet Max-Size(j-cut, F ); 17 Mark the hyperedge in C a choen ; 18 S cut S cut {C}; 19 Γ {G C G i a connected component in Remain-hg(C, F )}; 20 N i+1 (N i \{F}) Γ ; 21 Mark C a a j-cut of every element in Γ ; 22 Let γ: {FN 1,...,FN q} Γ uch that FN i γ(fn i) ; 23 A i+1 (A i \{({F, F },C) ({F, F },C) A i}) {({γ(fn),fn},c) ({F, FN},C) A i} {({Γ 0,Γ y},c) Γ 0 i an arbitrary choen element from Γ, Γ y Γ and Γ y Γ 0}; 24 Mark all the new node added to N i+1 a j-non-minimal; ele 25 Mark F a j-minimal; 26 i i +1; 27 T (N i,a i); Algorithm 1: HINGE +. 4 Cut Decompoition (CUT) In thi ection, we introduce CUT a a variation of HINGE +. The arc incident to every node in the equivalent join tree of a contraint hypergraph obtained by CUT are labeled by at mot 2 ditinct cut. For HINGE +, the arc incident to a given node in an equivalent join tree of a contraint hypergraph obtained by HINGE + can be labeled by more than 2 ditinct cut. For example, in the join
7 New Structural Decompoition Technique for Contraint Satifaction 119 tree of Figure 7, the arc incident to the node { 4, 5, 6, 11, 12 } are labeled with three different cut, namely { 4, 5 }, { 6, 12 },and{ 11 }. The algorithm of CUT i obtained by replacing the condition in line 13 with the following one: 1. Γ > 1; 2. For C q {S cut (S cut S cut )and(s cut F )}, thereexitγ p Γ uch that C q Γ p ;and 3. For every 2 et of hyperedge C i and C j S cut,ifc i C j,andc i Γ i,c j Γ j,thenγ i Γ j. The above condition guarantee that no more than 2 cut label the arc incident to a node in the join tree obtained by CUT. (Thi feature allow u to further travere each tree node from one cut to another cut and i exploited in Section 5.) The complexity of CUT i the ame a that of HINGE +. Figure 8 how the reult of applying CUT (the maximum cut ize k i 2) to the contraint hypergraph H cg hown in Figure Fig. 8. Applying CUT to H cg Travere Decompoition (TRAVERSE) In thi ection, we introduce a imple weep-like decompoition technique called TRAVERSE. We decribe two variation of TRAVERSE: TRAVERSE-I and TRAVERSE-II. TRAVERSE-I take a contraint hypergraph and one et of hyperedge in it, and weep through the hypergraph from the et of hyperedge to generate an equivalent join tree of the contraint hypergraph. TRAVERSE-II take a contraint hypergraph and 2 et of hyperedge from the hypergraph and weep through the contraint hypergraph from the firt et of hyperedge to the econd et of hyperedge to generate an equivalent join tree of the contraint hypergraph. For convenience, we firt introduce the definition of Neighbor(F, S) that will be ued in Algorithm 2 and Algorithm 3. Definition 5. Neighboring hyperedge. The neighboring hyperedge of a et of hyperedge F in a contraint hypergraph H = (V, S) with F S, denoted Neighbor(F, S), i a et given by: {e e F, e F, and Var({e}) Var(F ) }. (1) Given a contraint hypergraph H =(V, S) and a et of hyperedge F S, TRAVERSE-I return a unique join tree obtained by Algorithm 2 via weeping through the contraint hypergraph tarting from the hyperedge in F. We
8 120 Yaling Zheng and Berthe Y. Choueiry Input: a contraint hypergraph H =(V, S) and a et of hyperedge F S. Output: an equivalent join tree T for H. 1 N ; A ; 2 Mark any hyperedge e S a unviited ; 3 F v {e Var({e}) Var(F )}; 4 N N {F v}; 5 F jv F v; 6 Mark any hyperedge in F jv a viited ; 7 while not all hyperedge in S are viited do 8 F Neighbor(F jv, theetofall unviited hyperedge); 9 F v {e Var(e) Var(F ) }; 10 N N {F v}; 11 A A {(F jv,f v)}; 12 F jv F v; 13 Mark every hyperedge in F jv a viited ; T (N,A); Algorithm 2: TRAVERSE-I. denote Travere-I(H,F) the reult obtained by applying Algorithm 2 with F on H. The loop in line 7 of Algorithm 2 execute at mot S time, and each execution can be performed in O( V S ) time. Therefore, the wort-cae time complexity of TRAVERSE-I i O( V S 2 ). Figure 9 how the join tree computed by TRAVERSE-I tarting from { 1 } in H cg. Becaue it weep through the contraint hypergraph, TRAVERSE alway compute a join tree that i a connected chain, provided the contraint hypergraph i connected. The reult of the decompoition dep on F, the tarting et of hyperedge. If we travere H cg of Figure 1 tarting from { 6,, 12 }, Algorithm 2 would yield a join tree of width d = 10. Starting from { 1 }, the width i d = 3 (ee Figure 9). Our goal i to combine CUT with TRAVERSE to improve the k-hinge + - tree computed by CUT (Section 6). To thi, we introduce TRAVERSE-II (Algorithm 3), which allow u to weep the contraint hypergraph between 2 cut. TRAVERSE-II take a contraint hypergraph and 2 et of hyperedge, and then weep through the contraint hypergraph from the firt et of hyperedge to the econd et of hyperedge to generate an equivalent join tree of thi contraint hypergraph. We denote Travere-II(H,C 1,C 2 ) the reult of applying TRAVERSE-II to H from C 1 to C 2. Figure 10 how the join tree obtained by applying TRAVERSE-II to H cg from { 1 } to {, 16 }. The loop in line 7 of Algorithm 3 execute at mot S time, and each iteration can be performed in O( V S ) time. Therefore, the complexity of TRAVERSE-II i O( V S 2 ) Fig. 9. Applying TRAVERSE-I to H cg from { 1}. Fig. 10. Applying TRAVERSE-II to H cg from { 1} to {, 16}.
9 New Structural Decompoition Technique for Contraint Satifaction 121 Input: a contraint hypergraph H =(V, S), a et of hyperedge C 1 and another et of hyperedge C 2. Output: an equivalent join tree T for H. 1 N ; A ; 2 Mark any hyperedge e S a unviited ; 3 F d {e Var(e) Var(C 2)}; 4 F v {e Var(e) Var(C 1)}; 5 N N {F v}; 6 Mark any hyperedge in F jv a viited ; 7 while (F v F d ) and (not all hyperedge in S are viited ) do 8 F Neighbor(F jv \ F d,theetofall unviited hyperedge F d ); 9 F v {e Var(e) Var(F )}; 10 N N {F v}; 11 A A {(F jv,f v)}; 12 F jv F v; 13 Mark every hyperedge in F jv a viited ; T (N,A); Algorithm 3: TRAVERSE-II. 6 Cut-and-Travere Decompoition (CaT) In thi ection, we introduce CaT, which combine CUT with TRAVERSE. The algorithm of CaT i given in Algorithm 4. Given a contraint hypergraph H =(V, S) and a maximum cut ize k, Algorithm 4 firt applie CUT to H and generate a k-hinge + -tree in which the arc incident to any tree node are labeled with at mot 2 cut. Thi tep can be implemented in O( V S k+1 ) time. Then, Algorithm 4 applie either TRAVERSE-I or TRAVERSE-II to every tree node in the k-hinge + -tree and generate a et of ub-join tree. Finally, the algorithm combine thee ub-join tree into 1 join tree. The travere proce can be performed in O( V S 2 ) time. Therefore, the complexity of CaT i O( V S k+1 + V S 2 ). Since k 1, the complexity of CaT i O( V S k+1 ). Note that the HYPERTREE algorithm compute an optimal hypertree of H that ha a width within a given bound d; the algorithm return failure if no uch decompoition exit [10]. In CaT, the contant k retrict the maximum cut ize but doe not retrict the width of the generated join tree. Figure 11 and Figure 12 how the equivalent join tree of H cg computed by CaT and HYPERTREE. In thi cae, the width of the join tree obtained by CaT and HYPERTREE are both equal to 2. 7 Characterization In thi ection, we compare our 4 technique with HINGE and HYPERTREE in term of the criteria propoed by Gottlob et al. [4]. Then, we integrate our reult into their hierarchy hown in Figure 4. Finally, we ummarize the complexity of all ix technique.
10 122 Yaling Zheng and Berthe Y. Choueiry Input: A hypergraph H =(V, S) and a maximum cut-ize k. Output: An equivalent join tree T for H. Cut H into a tree with tree node P 1,..., P m by CUT; N ; A ; foreach i from 1 to m do witch the number of cut labeling the arc incident to P i; do cae 0 (N i,a i) Travere-I(P i, any hyperedge in P i) cae 1 /* C i the only cut labeling the arc incident to P i */ (N i,a i) Travere-I(P i, C) cae 2 /* C 1 and C 2 are the cut labeling the arc incident to P i */ if the width of Travere-II(P i, C 1, C 2) the width of Travere-II(P i, C 2, C 1) then (N i,a i) Travere-II(P i, C 1, C 2) ele (N i,a i) Travere-II(P i, C 2, C 1) N N {N i}; A A {A i}; T (N,A); Algorithm 4: CaT. Firt, we introduce two pecial clae of contraint hypergraph borrowed from [4]: Circle(n) (ee Figure 13) and book(n) (ee Figure 14). Thee graph are defined a follow. For any n 3, Circle(n) i a contraint hypergraph having n hyperedge {h 1,...,h n } uch that: h i = {X i,x i+1 } for 1 i n 1and h n = {X n,x 1 }. For any n>0, book(n) i a contraint hypergraph with 2n +2 vertice and 3n + 1 hyperedge that form n quare (page of the book) with exactly one common edge {X, Y }. The hyperedge are defined a follow: b 0 = {X, Y }; b 3i+1 = {X, X i } for 1 i n; b 3i+2 = {X i,y i } for 1 i n; and b 3i+3 = {Y i,y} for 1 i n. Theorem 1. HINGE + trongly generalize HINGE. Proof. (HINGE + beat HINGE.) Conider the graph Circle(n) for ome n 3. It i eay to ee that the HINGE width of Circle(n) i n, while it HINGE + width (with a maximum cut ize of 2) i no greater than 4. Hence, n 3 {Circle(n)} C(HINGE +, 4), while n 3 {Circle(n)} C(HINGE, k)holdforeveryk>0.
11 New Structural Decompoition Technique for Contraint Satifaction 123 {0, 1, 2, 3} { 1, 3 } {1, 4, 3, 11} { 3, 4 } {4, 5, 6, 11, 12, 13} { 5, 11 } {13, 14, 22} { 17, 12 } {6, 7, 13, 14} { 6, 22 } {7, 8, 9, 14, 15, 16}{ 7, 13 } {9 10, 16, 17} { 8, 14 } {10, 17, 18, 21} {, 16 } {10, 17, 18, 20}{, 15 } {10, 17, 18, 19} {, 10 } Fig. 11. Applying CaT to H cg. x 1 x x n Fig. 13. Circle(n). Fig. 12. Applying HYPERTREE to H cg. X X 1 X 4 X 2 X Y 1 Y 3 4 Y 2 Y Fig. 14. Book(4). Y 3 Therefore, HINGE + beat HINGE. (HINGE + generalize HINGE.) It i eay to ee that HINGE i a pecial cae of HINGE + when the maximum cut ize i 1. Thu, for I C(HINGE, k), I C(HINGE +, k) hold. Theorem 2. HYPERTREE generalize HINGE +. Proof. It i obviou that I C(HINGE +, k), I C(HYPERTREE, k) hold. Theorem 3. CaT generalize CUT. Proof. The firt phae of CaT i CUT. The econd phae of CaT further decompoe each tree node of the join tree obtained by CUT. It i eay to ee that I C(CUT, k), I C(CaT, k) hold. Theorem 4. HYPERTREE generalize CaT. Proof. It i obviou that I C(CaT, k), I C(HYPERTREE, k) hold. Theorem 5. HYPERTREE trongly generalize TRAVERSE. Proof. (HYPERTREE generalize TRAVERSE.) It i obviou that I C(TRAVERSE,k), I C(HYPERTREE, k) hold. (HYPERTREE beat TRA- VERSE.) Conider the graph book(n) for ome n 1, it i eay to ee that the TRAVERSE width of book(n) i greater than n 2, while it HYPERTREE width i 2. Hence, n 1 {book(n)} C(HYPERTREE, 2), while n 1 {book(n)} C(TRAVERSE, k) for every k>0. Theorem 6. HINGE and TRAVERSE are trongly incomparable. Proof. (HINGE beat TRAVERSE.) Conider the graph book(n) for ome n 1, it i eay to ee that the TRAVERSE width of book(n) i greater than
12 124 Yaling Zheng and Berthe Y. Choueiry n 2, while it HINGE width i 4. Hence, n 1 {book(n)} C(HINGE+,4), while n 1 {book(n)} C(HINGE, k) for every k > 0. (TRAVERSE beat HINGE.) Conider the graph Circle(n) for ome n 3. It i eay to ee that the HINGE width of Circle(n) i n while it TRAVERSE width (from an arbitrary choen hyperedge) i 2. Hence, n 3 {Circle(n)} C(TRAVERSE, 2), while n 3 {Circle(n)} C(HINGE, k) holdforeveryk>0. Therefore, TRA- VERSE beat HINGE. Theorem 7. CUT beat TRAVERSE. Proof. Conider the graph book(n) for ome n 1, it i eay to ee that the TRA- VERSE width of book(n) i greater than n 2, while it CUT width i 4. Hence, n 1 {book(n)} C(CUT, 4), while n 1 {book(n)} C(TRAVERSE,k)for every k>0. Theorem 8. CaT beat TRAVERSE. Proof. Conider the graph book(n) for ome n 1, It i eay to ee that the TRAVERSE width of book(n) i greater than n 2 while it CaT width (with the maximum cut ize being 2) i 2. Hence, n 1 {book(n)} C(CaT, 2), while {book(n)} C(TRAVERSE, k) for every k>0. n 1 Theorem 9. HINGE + beat TRAVERSE. Proof. Conider the graph book(n) for ome n 1, it i eay to ee that the TRAVERSE width of book(n) i greater than n 2, while it HINGE+ width i 4. Hence, n 1 {book(n)} C(HINGE+, 4), while n 1 {book(n)} C(TRAVERSE,k) for every k>0. Theorem 10. CUT beat HINGE. Proof. Conider the graph Circle(n) for ome n 3. It i eay to ee that the HINGE width of Circle(n) i n, while it CUT width (with maximum cut ize being 2) i 2. Hence, n 3 {Circle(n)} C(CUT, 2), while n 3 {Circle(n)} C(HINGE, k) holdforeveryk>0. Therefore, CUT beat HINGE. The above theorem implied that CaT beat HINGE and HYPERTREE generalize CUT. The relationhip between HINGE + and CUT and between HINGE + and CaT are till need to be invetigated. Figure 15 ummarize the main relationhip tudied above. The olid directed edge from D 1 to D 2 indicate that D 2 trongly generalize D 1. The dotted directed edge from D 1 to D 2 indicate D 2 generalize D 1. Note that the picture i incomplete. Table 1 ummarize the complexity of the technique hown in Figure Preliminary Experiment In order to ae empirically the above technique, we compared their performance on randomly generated hypergraph in term of two criteria: the CPU time for computing the decompoition and the width of the reulting join tree.
13 New Structural Decompoition Technique for Contraint Satifaction 125 Table 1. Complexity of decompoition method. Technique Complexity HYPERTREE Normal form: opt-d-decomp [7] O( S 2d V 2 ) Reduced normal form [8] Bet cae: O( S d V + S 2 V ) HINGE O( V S 2 ) HINGE + O( V S k+1 ) CUT O( V S k+1 ) TRAVERSE O( V S 2 ) CaT O( V S k+1 ) Solving the CSP after decompoition O( S l d d log l) V : number of variable (i.e., vertice). S : number of contraint (i.e., hyperedge). d: width of the join tree reulting from a decompoition. k: maximum cut-ize. l: maximum ize of a contraint in S. HYPERTREE [Gottlob et al., 2002] D 1 D 2 indicate that TRAVERSE CaT CUT HINGE + HINGE [Gyen et al., 1994] D 2 i trongly more general than D 1 D 1 D 2 indicate that D 2 i more general than D 1 Fig. 15. Illutrating the relationhip between the variou tudied technique. For HYPERTREE, we ued the algorithm of Harvey and Ghoe [8], which improve on the opt-k-decomp algorithm of Gottlob et al. [10]. By tarting with k=1 and incrementing it value by 1 until it find decompoition, the algorithm we ued guarantee an optimal decompoition. We generated random hypergraph etting the number of contraint to 10, 11, 12, and 13. In each intance, we choe the arity of the contraint randomly in {2, 3, 4}. Table 2 ummarize the contraint hypergraph ued in the experiment. We et the maximum cut ize k=2 for HINGE +, CUT, and CaT. Figure 16 and Figure 17 how, for a fixed number of contraint, the average CPU time and average width of the generated join tree. Figure 16 and Figure 17 how the average CPU time and average width of different decompoition technique. Table 3 average thee reult over all 4000 intance generated. From thee experiment, we have the following obervation: For CPU time, TRAVERSE < HINGE < CUT CaT HINGE + HYPERTREE.
14 126 Yaling Zheng and Berthe Y. Choueiry Table 2. Contraint hypergraph ued in the experiment. #contraint #variable # intance 10 {16, 17,..., 25} 1000 (100 intance for each fixed number of variable) 11 {18, 19,..., 27} 1000 (100 intance for each fixed number of variable) 12 {20, 21,..., 29} 1000 (100 intance for each fixed number of variable) 13 {22, 23,..., 31} 1000 (100 intance for each fixed number of variable) CPU time (mec) HYPERTREE CPU time (mec) # Contraint HINGE+ CaT CUT HINGE TRAVERSE # Contraint Width TRAVERSE HINGE CUT HINGE+ CaT HYPERTREE # Contraint Fig. 16. Average CPU time. Fig. 17. Average width. TRAVERSE i the quicket technique followed by HINGE then CaT, HINGE +, and CUT, which have comparable value for the CPU time. All technique are ignificantly quicker than HYPERTREE. Indeed, the computationally cot of HYPERTREE i prohibitively high although it wort-cae time complexity i polynomial. For width, HYPERTREE CaT < HINGE + CUT HINGE < TRAVERSE. The join tree obtained with TRAVERSE ha the larget width. The average width of the join tree generated by HINGE + and CUT are maller than that of the join tree generated by HINGE. However, the difference of thee value are within 4%. The width of the join tree generated by CaT and HY- PERTREE differ by only 4%, which i negligible. Alo, they are ignificantly maller than thoe generated by the remaining technique. In ummary, CaT offer the bet trade-off between the CPU time and the width of the computed join tree among the decompoition method teted. 9 Concluion In thi paper, we propoed two main new tructural decompoition: HINGE + and CaT. HINGE + trongly generalize HINGE of Gyen et al. [2]. CaT i built by combining CUT (a variation of HINGE + ) and TRAVERSE (a weep-like
15 New Structural Decompoition Technique for Contraint Satifaction 127 Table 3. Average reult over all 4000 intance. Comparion criteria HINGE HINGE + CUT TRAVERSE CaT HYPERTREE Average CPU time [mec] Width decompoition technique). We compared thee technique among themelve and with HINGE and HYPERTREE both theoretically and experimentally. Our experiment howed that the CaT offer the bet trade-off between cot and quality of the reulting decompoition. In the future, we plan to addre the following iue: (1) Compare our technique with the remaining technique hown in Figure 4; and (2) Perform experiment on pecial type of graph (e.g., mall-world graph and clutered graph) and real-world problem (e.g., the one ued in [11]). Acknowledgment Thi work i upported by CAREER Award # from the National Science Foundation. The experiment were conducted utilizing the Reearch Computing Facility of the Univerity of Nebraka-Lincoln. Deb Derrick provided invaluable editorial help. Reference 1. Dechter, R., Pearl, J.: Tree Clutering for Contraint Network. Artificial Intelligence 38 (1989) Gyen, M., Jeavon, P.G., Cohen, D.A.: Decompoing Contraint Satifaction Problem Uing Databae Technique. Artificial Intelligence 66 (1994) Jeavon, P.G., Cohen, D.A., Gyen, M.: A Structural Decompoition for Hypergraph. Contemporary Mathematic 178 (1994) Gottlob, G., Leone, N., Scarcello, F.: A Comparion of Structural CSP Decompoition Method. Artificial Intelligence 124 (2000) Freuder, E.C.: A Sufficient Condition for Backtrack-Free Search. JACM 29 (1) (1982) Freuder, E.C.: A Sufficient Condition for Backtrack-Bounded Search. JACM 32 (4) (1985) Gottlob, G., Leone, N., Scarcello, F.: Hypertree Decompoition and Tractable Querie. Journal of Computer and Sytem Science 64 (2002) Harvey, P., Ghoe, A.: Reducing Redundancy in the Hypertree Decompoition Scheme. In: The 15 th IEEE International Conference on Tool with Artificial Intelligence (ICTAI 03). (2003) Dechter, R.: Contraint Proceing. Morgan Kaufmann (2003) 10. Gottlob, G., Leone, N., Scarcello, F.: On Tractable Querie and Contraint. In: 10 th International Conference and Workhop on Databae and Expert Sytem Application (DEXA 1999). (1999) Gottlob, G., Hutle, M., Wotawa, F.: Combining Hypertree, Bicomp, And Hinge Decompoition. In: Proc. of the 15 th ECAI, Lyon, France (2002)
New Structural Decomposition Techniques for Constraint Satisfaction Problems
New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.
More informationRouting Definition 4.1
4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing
More informationMinimum congestion spanning trees in bipartite and random graphs
Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu
More informationLecture 14: Minimum Spanning Tree I
COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce
More information3D SMAP Algorithm. April 11, 2012
3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative
More informationDelaunay Triangulation: Incremental Construction
Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )
More informationA Comparison of Structural CSP Decomposition Methods
A Comparison of Structural CSP Decomposition Methods Georg Gottlob Institut für Informationssysteme, Technische Universität Wien, A-1040 Vienna, Austria. E-mail: gottlob@dbai.tuwien.ac.at Nicola Leone
More informationKaren L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract
Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial
More information1 The secretary problem
Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.
More informationA note on degenerate and spectrally degenerate graphs
A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove
More informationMAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc
MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic
More informationUniversität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.
Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut
More informationarxiv: v1 [cs.ds] 27 Feb 2018
Incremental Strong Connectivity and 2-Connectivity in Directed Graph Louka Georgiadi 1, Giueppe F. Italiano 2, and Niko Parotidi 2 arxiv:1802.10189v1 [c.ds] 27 Feb 2018 1 Univerity of Ioannina, Greece.
More informationxy-monotone path existence queries in a rectilinear environment
CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of
More informationGeneric Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline
Generic Travere CS 62, Lecture 9 Jared Saia Univerity of New Mexico Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v) from the bag if (v i unmarked) mark v; parent(v) = p;
More informationChapter S:II (continued)
Chapter S:II (continued) II. Baic Search Algorithm Sytematic Search Graph Theory Baic State Space Search Depth-Firt Search Backtracking Breadth-Firt Search Uniform-Cot Search AND-OR Graph Baic Depth-Firt
More informationDAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications
DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu
More informationAN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM
RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt
More informationTopics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X
Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term
More informationHassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,
COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)
More informationAn Intro to LP and the Simplex Algorithm. Primal Simplex
An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n
More informationCutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.
Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization
More informationA Practical Model for Minimizing Waiting Time in a Transit Network
A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two
More informationSLA Adaptation for Service Overlay Networks
SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada
More informationA Fast Association Rule Algorithm Based On Bitmap and Granular Computing
A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity
More informationAUTOMATIC TEST CASE GENERATION USING UML MODELS
Volume-2, Iue-6, June-2014 AUTOMATIC TEST CASE GENERATION USING UML MODELS 1 SAGARKUMAR P. JAIN, 2 KHUSHBOO S. LALWANI, 3 NIKITA K. MAHAJAN, 4 BHAGYASHREE J. GADEKAR 1,2,3,4 Department of Computer Engineering,
More informationAdvanced Encryption Standard and Modes of Operation
Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES
More informationModeling of underwater vehicle s dynamics
Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation
More informationOperational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz
Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,
More informationMarkov Random Fields in Image Segmentation
Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image
More informationOn successive packing approach to multidimensional (M-D) interleaving
On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a
More informationnp vp cost = 0 cost = c np vp cost = c I replacing term cost = c+c n cost = c * Error detection Error correction pron det pron det n gi
Spoken Language Paring with Robutne and ncrementality Yohihide Kato, Shigeki Matubara, Katuhiko Toyama and Yauyohi nagaki y Graduate School of Engineering, Nagoya Univerity y Faculty of Language and Culture,
More informationAn Extension of Complexity Bounds and Dynamic Heuristics for Tree-Decompositions of CSP
An Extension of Complexity Bounds and Dynamic Heuristics for Tree-Decompositions of CSP Philippe Jégou, Samba Ndojh Ndiaye, and Cyril Terrioux LSIS - UMR CNRS 6168 Université Paul Cézanne (Aix-Marseille
More informationDistributed Fractional Packing and Maximum Weighted b-matching via Tail-Recursive Duality
Ditributed Fractional Packing and Maximum Weighted b-matching via Tail-Recurive Duality Chrito Koufogiannaki, Neal E. Young Department of Computer Science, Univerity of California, Riveride {ckou, neal}@c.ucr.edu
More informationA SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS
A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt
More informationPerformance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks
Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity
More informationShortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights
Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two
More informationDistributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router
Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To
More informationLecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization
Lecture Outline Global flow analyi Global Optimization Global contant propagation Livene analyi Adapted from Lecture by Prof. Alex Aiken and George Necula (UCB) CS781(Praad) L27OP 1 CS781(Praad) L27OP
More informationKey Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.
Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in
More informationShortest Paths with Single-Point Visibility Constraint
Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet
More informationA Multi-objective Genetic Algorithm for Reliability Optimization Problem
International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR
More informationSequencing and Counting with the multicost-regular Constraint
Sequencing and Counting with the multicot-regular Contraint Julien Menana and Sophie Demaey École de Mine de Nante, LINA CNRS UMR 6241, F-44307 Nante, France. {julien.menana,ophie.demaey}@emn.fr Abtract.
More informationContents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course:
Content Shortet path Algorithm and Network 21/211 The hortet path problem: Statement Verion Application Algorithm (for ingle ource p problem) Reminder: relaxation, Dijktra, Variant of Dijktra, Bellman-Ford,
More informationToday s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is
Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -
More informationSee chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM
Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive
More informationPlanning of scooping position and approach path for loading operation by wheel loader
22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader
More informationelse end while End References
621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized
More informationCERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu
CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,
More informationAlgorithmic Discrete Mathematics 4. Exercise Sheet
Algorithmic Dicrete Mathematic. Exercie Sheet Department of Mathematic SS 0 PD Dr. Ulf Lorenz 0. and. May 0 Dipl.-Math. David Meffert Verion of May, 0 Groupwork Exercie G (Shortet path I) (a) Calculate
More informationBuilding a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique
202 International Conference on Frontier in Handwriting Recognition Building a Compact On-line MRF Recognizer for Large Character Set uing Structured Dictionary Repreentation and Vector Quantization Technique
More informationThe Split Domination and Irredundant Number of a Graph
The Split Domination and Irredundant Number of a Graph S. Delbin Prema 1, C. Jayaekaran 2 1 Department of Mathematic, RVS Technical Campu-Coimbatore, Coimbatore - 641402, Tamil Nadu, India 2 Department
More informationLinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage
Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,
More informationThe Comparison of Neighbourhood Set and Degrees of an Interval Graph G Using an Algorithm
The Comparion of Neighbourhood Set and Degree of an Interval Graph G Uing an Algorithm Dr.A.Sudhakaraiah, K.Narayana Aitant Profeor, Department of Mathematic, S.V. Univerity, Andhra Pradeh, India Reearch
More informationShortest Path Routing in Arbitrary Networks
Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,
More informationManeuverable Relays to Improve Energy Efficiency in Sensor Networks
Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov
More informationUsing Partial Evaluation in Distributed Query Evaluation
A X x Z z R r y Y B Uing Partial Evaluation in Ditributed Query Evaluation Peter Buneman Gao Cong Univerity of Edinburgh Wenfei Fan Univerity of Edinburgh & Bell Laboratorie Anataio Kementietidi Univerity
More informationStochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang
Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,
More informationDrawing Lines in 2 Dimensions
Drawing Line in 2 Dimenion Drawing a traight line (or an arc) between two end point when one i limited to dicrete pixel require a bit of thought. Conider the following line uperimpoed on a 2 dimenional
More informationOptimal Multi-Robot Path Planning on Graphs: Complete Algorithms and Effective Heuristics
Optimal Multi-Robot Path Planning on Graph: Complete Algorithm and Effective Heuritic Jingjin Yu Steven M. LaValle Abtract arxiv:507.0390v [c.ro] Jul 05 We tudy the problem of optimal multi-robot path
More informationTouring a Sequence of Polygons
Touring a Sequence of Polygon Mohe Dror (1) Alon Efrat (1) Anna Lubiw (2) Joe Mitchell (3) (1) Univerity of Arizona (2) Univerity of Waterloo (3) Stony Brook Univerity Problem: Given a equence of k polygon
More informationDiverse: Application-Layer Service Differentiation in Peer-to-Peer Communications
Divere: Application-Layer Service Differentiation in Peer-to-Peer Communication Chuan Wu, Student Member, IEEE, Baochun Li, Senior Member, IEEE Department of Electrical and Computer Engineering Univerity
More informationBrief Announcement: Distributed 3/2-Approximation of the Diameter
Brief Announcement: Ditributed /2-Approximation of the Diameter Preliminary verion of a brief announcement to appear at DISC 14 Stephan Holzer MIT holzer@mit.edu David Peleg Weizmann Intitute david.peleg@weizmann.ac.il
More informationAcyclic Network. Tree Based Clustering. Tree Decomposition Methods
Summary s Join Tree Importance of s Solving Topological structure defines key features for a wide class of problems CSP: Inference in acyclic network is extremely efficient (polynomial) Idea: remove cycles
More informationLocalized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks
Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de
More informationService and Network Management Interworking in Future Wireless Systems
Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering
More informationParallel Approaches for Intervals Analysis of Variable Statistics in Large and Sparse Linear Equations with RHS Ranges
American Journal of Applied Science 4 (5): 300-306, 2007 ISSN 1546-9239 2007 Science Publication Correponding Author: Parallel Approache for Interval Analyi of Variable Statitic in Large and Spare Linear
More informationThis article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and
Thi article appeared in a journal publihed by Elevier. The attached copy i furnihed to the author for internal non-commercial reearch and education ue, including for intruction at the author intitution
More informationDistribution-based Microdata Anonymization
Ditribution-baed Microdata Anonymization Nick Kouda niverity of Toronto kouda@c.toronto.edu Ting Yu North Carolina State niverity yu@cc.ncu.edu Diveh Srivatava AT&T Lab Reearch diveh@reearch.att.com Qing
More informationEmbedding Service Function Tree with Minimum Cost for NFV Enabled Multicast
1 Embedding Service Function Tree with Minimum ot for NFV Enabled Multicat angbang Ren, Student Member, IEEE, eke Guo, Senior Member, IEEE, Yulong Shen, Member, IEEE, Guoming Tang, Member, IEEE, Xu Lin,
More informationISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Iue 4, April 2015 International Journal Advance Reearch in Computer Science and Management Studie Reearch Article / Survey Paper / Cae Study Available online at: www.ijarcm.com
More information[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata
he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online
More informationAn Approach to a Test Oracle for XML Query Testing
An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,
More informationEdits in Xylia Validity Preserving Editing of XML Documents
dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,
More informationTexture-Constrained Active Shape Models
107 Texture-Contrained Active Shape Model Shuicheng Yan, Ce Liu Stan Z. Li Hongjiang Zhang Heung-Yeung Shum Qianheng Cheng Microoft Reearch Aia, Beijing Sigma Center, Beijing 100080, China Dept. of Info.
More informationTesting Structural Properties in Textual Data: Beyond Document Grammars
Teting Structural Propertie in Textual Data: Beyond Document Grammar Felix Saaki and Jen Pönninghau Univerity of Bielefeld, Germany Abtract Schema language concentrate on grammatical contraint on document
More informationRefining SIRAP with a Dedicated Resource Ceiling for Self-Blocking
Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT
More informationThe Data Locality of Work Stealing
The Data Locality of Work Stealing Umut A. Acar School of Computer Science Carnegie Mellon Univerity umut@c.cmu.edu Guy E. Blelloch School of Computer Science Carnegie Mellon Univerity guyb@c.cmu.edu Robert
More information/06/$ IEEE 364
006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;
More informationTouring a Sequence of Polygons
Touring a Sequence of Polygon Mohe Dror (1) Alon Efrat (1) Anna Lubiw (2) Joe Mitchell (3) (1) Univerity of Arizona (2) Univerity of Waterloo (3) Stony Brook Univerity Problem: Given a equence of k polygon
More informationSet-based Approach for Lossless Graph Summarization using Locality Sensitive Hashing
Set-baed Approach for Lole Graph Summarization uing Locality Senitive Hahing Kifayat Ullah Khan Supervior: Young-Koo Lee Expected Graduation Date: Fall 0 Deptartment of Computer Engineering Kyung Hee Univerity
More informationThe Association of System Performance Professionals
The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and
More informationarxiv: v1 [math.co] 18 Jan 2019
Anti-Ramey number of path in hypergraph Ran Gu 1, Jiaao Li 2 and Yongtang Shi 3 1 College of Science, Hohai Univerity, Nanjing, Jiangu Province 210098, P.R. China 2 School of Mathematical Science and LPMC
More informationKhoirul Umam 1, Agus Zainal Arifin 2 and Dini Adni Navastara 3
I J C T A, 9(-A), 016, pp 763-777 International Science Pre A Novel Strategy of Differential Evolution Algorithm Croover Operator Baed on Graylevel Cluter Similarity for Automatic Multilevel Image Threholding
More informationCSE 250B Assignment 4 Report
CSE 250B Aignment 4 Report March 24, 2012 Yuncong Chen yuncong@c.ucd.edu Pengfei Chen pec008@ucd.edu Yang Liu yal060@c.ucd.edu Abtract In thi project, we implemented the recurive autoencoder (RAE) a decribed
More informationCompressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit
Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit
More informationA METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS
Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh
More informationIncreasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment
Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in
More informationA Sparse Shared-Memory Multifrontal Solver in SCAD Software
Proceeding of the International Multiconference on ISBN 978-83-6080--9 Computer Science and Information echnology, pp. 77 83 ISSN 896-709 A Spare Shared-Memory Multifrontal Solver in SCAD Software Sergiy
More informationHow to Select Measurement Points in Access Point Localization
Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,
More informationDomain-Specific Modeling for Rapid System-Wide Energy Estimation of Reconfigurable Architectures
Domain-Specific Modeling for Rapid Sytem-Wide Energy Etimation of Reconfigurable Architecture Seonil Choi 1,Ju-wookJang 2, Sumit Mohanty 1, Viktor K. Praanna 1 1 Dept. of Electrical Engg. 2 Dept. of Electronic
More informationIntegrated Single-arm Assembly and Manipulation Planning using Dynamic Regrasp Graphs
Proceeding of The 2016 IEEE International Conference on Real-time Computing and Robotic June 6-9, 2016, Angkor Wat, Cambodia Integrated Single-arm Aembly and Manipulation Planning uing Dynamic Regrap Graph
More informationVariable Resolution Discretization in the Joint Space
Variable Reolution Dicretization in the Joint Space Chritopher K. Monon, David Wingate, and Kevin D. Seppi {c,wingated,keppi}@c.byu.edu Computer Science, Brigham Young Univerity Todd S. Peteron peterto@uvc.edu
More informationAn Improved Implementation of Elliptic Curve Digital Signature by Using Sparse Elements
The International Arab Journal of Information Technology, Vol. 1, No., July 004 0 An Improved Implementation of Elliptic Curve Digital Signature by Uing Spare Element Eam Al-Daoud Computer Science Department,
More informationGrowing Networks Through Random Walks Without Restarts
Growing Network Through Random Walk Without Retart Bernardo Amorim, Daniel Figueiredo, Giulio Iacobelli, Giovanni Neglia To cite thi verion: Bernardo Amorim, Daniel Figueiredo, Giulio Iacobelli, Giovanni
More informationModeling and Analysis of Slow CW Decrease for IEEE WLAN
Modeling and Analyi of Slow CW Decreae for IEEE 82. WLAN Qiang Ni, Imad Aad 2, Chadi Barakat, and Thierry Turletti Planete Group 2 Planete Group INRIA Sophia Antipoli INRIA Rhône-Alpe Sophia Antipoli,
More informationKeywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE
Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent
More informationHighly Heterogeneous XML Collections: How to retrieve precise results?
Highly Heterogeneou XML Collection: How to retrieve precie reult? Imael Sanz, Marco Meiti 2, Giovanna Guerrini, Rafael Berlanga Llavori () Univeritat Jaume I, Catellón, Spain - {berlanga,imael.sanz}@uji.e
More informationA User-Attention Based Focus Detection Framework and Its Applications
A Uer-Attention Baed Focu Detection Framework and It Application Chia-Chiang Ho, Wen-Huang Cheng, Ting-Jian Pan, Ja-Ling Wu Communication and Multimedia Laboratory, Department of Computer Science and Information
More information