OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS

Size: px
Start display at page:

Download "OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS"

Transcription

1 OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS ADRIAN DEACONU Transilvania University of Brasov, Roania Abstract A linear tie and space algorith for construction of a binary tree fro the pre-order and post-order traversals is presented. The solution is not always unique. The nuber of solutions is calculated and an optial tie and space ethod to find all the solutions is shown. Keywords: binary tree, traversals, construction of tree. INTRODUCTION The proble of construction the binary tree fro the pre-order (or post-order) and inorder traversals is well-nown [][][3][4][]. The linear tie and space was achieved. The case of pre-order and post-order is less studied [][6]. The solution in this case is not even unique. We shall present an algorith to find a solution in linear tie and space and, starting fro this one, we ll be able to find all the solutions in optial tie and space coplexity. The ethod in this paper for finding one solution is adapted fro the algorith for finding the tree fro pre-order and post-order traversal vectors [6]. All the notations we shall use are according to the textboo of Ahuja, Magnanti and Orlin [7]. It is well-nown the following propriety for the post-order traversal vector: Propriety The reversed post-order vector is a root-right-to-left traversal vector. We shall nae the root-left-to-right traversal as first pre-order traversal and the rootright-to-left traversal as the second pre-order traversal, because the nodes are analyzed siilarly to pre-order traversal: root and then it s successors, but in reversed order (right-toleft). In this paper we shall refer to the first and the second pre-order traversal vectors as the pre-order (traversal) vectors of the trees. It is easy to observe that a pre-order (first or second) traversal vector starts with the root. So, we have the following propriety: Propriety In a (first or second) pre-order traversal vector the first eleent is the root of the binary tree. Let (a i ) i N be the first pre-order traversal vector and (b i ) i N the second pre-order traversal vector. We suppose for each i and j {,,, n}, i j that a i a j and b i b j. It is obviously that: { a i i,,, n } { b j j,,, n } N, (.) where N is the set of nodes of the binary tree, N n. The following propriety of the first pre-order traversal vector helps us to prove the ain theores of this paper (theore and theore ). Propriety 3 If u and v are consecutive nodes in the first pre-order traversal vector, then we have one of the following situations: i) v is a son of the node u (see fig..). If u has two sons, then v is the left one.

2 or: ii) v is the son to the right of the node w and u is the last node in the first pre-order traversal vector of the left partial tree T of w (see fig..). u w v v Fig..: First situation of propriety 3 T T u Fig..: Second situation of propriety 3. FINDING A SOLUTION The algorith we shall present is a adapted fro the algorith for reconstruction of the tree fro the pre-order and post-order traversals [6]. We shall prove two theores, which will lead us to the ethod to construct a binary tree fro the pre-order and post-order traversals. For each consecutive pair of nodes, u and v, fro the first pre-order traversal vector using one of the next two theores we can find the father denoted w of the node v. The ethod of finding w involves one of the situations described in propriety 3. The ain idea is to find a criterion for each situation that can appear and then to prove that there is only one node with this propriety. Theore. If a - is before a ( {, 3,, n}) in the second pre-order traversal vector, i.e. i, j {,,, n} so that a - b i, a b j and i < j, then the node a is a son of a -. If a - has two sons, then a is to the left of a -.. If two nodes, u and v, are consecutive in both (the first and the second) pre-order traversal vectors, then the node v is the only son of u. Proof.. Let be an arbitrary value in the set {, 3,, n}. We ae two notations: u a - b i and v a b j. (.) Let s suppose that the nodes (u and v) are respecting to the second situation fro propriety 3. Then the second pre-order traversal vector (denoted pre) is: pre (, w,, v,, u, ). (.) Since u b i and v b j (see (.)) it results fro (.) that i > j, which i < j. So, the consecutive nodes (u and v) of the first pre-order traversal vector are respecting the first situation in propriety 3.. The node v is a son of u (see.). Let s suppose that u has sons. Let t ( v) be the son to the right of u. Then, in the second preorder traversal vector, the node t is next after u and, because t v, the nodes u and v can not be consecutive (contradiction). Theore If a - is after a ( {, 3,, n}) in the second pre-order traversal vector, i.e. i, j {,,, n} so that a - b i, a b j and i > j, then the node a is the son to the right of a p, where p {,,, -} and all the nodes in the first pre-order traversal vector (if exist)

3 between a p and a are after b j a in the second pre-order traversal i.e. q {p+, p+,, - }, h {j+, j+,, n} : a q b h. Proof. We ae the sae notations as in the proof of theore (see (.)). We shall prove that the father denote w of v has the propriety that it is before v in the first pre-order traversal vector and all the nodes (if exist) between w and v (in the first pre-order traversal vector) are after v in the second pre-order traversal vector. If u has ore than a son (see the second part of the theore ), then u and v can not be respecting situation in propriety 3, because u is after v in the second pre-order traversal vector. So, the nodes ust be in the second situation (see fig..). In the situation, the first pre-order traversal vector is: pre (, w,, u, v, ). (.3) So, the father w is before his son v in the first pre-order traversal vector. Let t a q be a node between w a p and v a ( p < - ) in the first pre-order traversal vector, where q {p+, p+,, -}. It results that the node t ust be in the left partial binary tree of w. If t is in T, then t ust be after v in the second pre-order traversal vector. So far, we proved that the father w of v has the propriety that it is before v in the first pre-order traversal vector and all the nodes (if exist) between w and v (in the first pre-order traversal vector) are after v in the second pre-order traversal vector. Next we shall prove that the father w of v is the only node with this propriety. Let s suppose there exists another node denoted w w with the sae propriety. So, the node w is before v in the first pre-order traversal vector. We have two situations: i) The node w is before w in the first pre-order traversal vector or ii) The node w is between w and v in the first pre-order traversal vector. In the situation i) the node w is between w and v. All the nodes between w and v are after v in the second pre-order traversal vector and so, the node w ust be after v (contradiction with the propriety of w). In the situation ii), because the node w is between w and v, it ust be after v in the second pre-order traversal vector (contradiction with the presued propriety of w ). In both cases we obtained contradiction. So, the father w of v is the only node with the above propriety. The theore is proved. The theores and lead us to an algorith for finding a binary tree using the preorder traversal vectors. The pseudo-code of the algorith for finding a binary tree fro the pre-order traversal vector is:. a[] is the root of the tree;. a[] pushes the stac s; 3. For : to n do 4. PrePos[b[]] : ; end for;. :; 6. For : to n do 7. left : true; 8. While the last node u fro the stac s is after a[] in the second pre-order vector, i.e. PrePos[u] > PrePos[a[]] do 9. Pop node u out of the stac s;. left : false; end while;. Let w be the last node in the stac s;. If left then

4 3. If PrePos[w]+ PrePos[a[]] then a[] is the only son of w (left or right); :+; u[] : w; 7. else a[] is the left son of w end if; 8. else a[] is the son to right of w; end if; 9. The node a[] pushes the stac s; end for; Let s study now the algorith. The first node of any pre-order traversal vector is the root of the tree. The first pre-order traversal vector coponents are sequentially (fro the second to the last) analyzed and then inserted in the tree using the ethod given by the theores or, depending the situation. One of the tricy linear tie idea to do this in linear tie is to decide in O() if a node is before or after another node in the second pre-order traversal vector. This can be easily done using a vector denoted PrePos. PrePos[u] is the position of the node u in the second pre-order vector b. The vector PrePos can be built in linear tie directly fro the second pre-order traversal vector b. If we treat directly the situations presented in the theore, then the worst-case coplexity of the ethod is greater then O(n) (for each such situation we have to verify if the nodes between a p and a in the first pre-order traversal vector is after a in the second traversal vector). In order not to increase the coplexity of the ethod we shall use a denoted s stac. A node enters the stac s after it is analyzed. Nodes exit the stac only when a second situation of propriety 3 appears. Let s notice that for the current node a[], before taing out any node fro the stac, the last node fro the stac is a[-] (previous analyzed and inserted). If a[-] is before a[] in the second pre-order vector, then we have the first situation in the propriety 3 and no node is popped out of the stac. So, the last node in the stac (which is a[-]) is the father of a[] (see theore ). If a[-] is after a[] in the second pre-order vector then we have the second situation of the propriety 3. All the nodes in the stac which are after a[] are in the second situation of the propriety 3 they are popped out of the stac. After all these nodes are popped out of the stac, the last node in the stac is before a[] in the second pre-order traversal vector. This node has the propriety that all the nodes between it and a[] in the first pre-order traversal vector are after a[] in the second pre-order traversal vector, because they have been already analyzed (they entered in the stac before). The current node a[] is the son to the right of the last node in the stac (see theore ). In the end of the algorith, the variable will store the nuber of situations where a node has only a son. The eleents of the vector u are the nodes, which have only a son. Theore 3 The algorith presented above constructs a binary tree fro the pre-order traversals vectors. Proof. The correctness of the algorith is given by the observations above the algorith and fro the theores and. If no iteration of while do in line 8 of the algorith taes place, then the node a[] is the left son of the last node w a[-] in the stac, according to theore, else a[] is the son to the right of the last node w in the stac. If there are pops out of the stac in the line 8, then the node a[] is the son to the right of w, because in this case a[] is not the first son of w and the first son was previously inserted in the binary tree to the left.

5 If the nodes w a[-] and a[] are consecutive in the second pre-order traversal vector, then the node a[] is the only son of w. In this case, we can not decide if a[] is the son to the left or to the right for w (see the second part of theore ). Theore 4 The algorith finds a binary tree fro the pre-order traversal vectors in linear tie and space. Proof. Every coponent a[] ( {, 3,, n} ) of the first pre-order traversal vector enters once in O() in the stac s and, because of this, it can not exit the stac s ore than once. So, the total nuber of iterations of all while loops in the whole algorith is O(n). The worst-case tie coplexity of the whole algorith is O(n). There are three vectors with n coponents involved and in the stac s all n nodes enter once, so the algorith uses linear space. It is easy to see that the construction of a binary tree fro the traversal vectors can not be done in a coplexity less than O(n). So, the algorith above has an optial tie and space coplexity. 3. FINDING ALL THE SOLUTIONS If two nodes, u and v, are consecutive in both (the first and the second) pre-order traversal vectors, then the node v is the only son of u. We can not decide which son of u (left or right) is v. For the binary trees this do atter, because the case of v being the left son of u is different than the case of v being the son to the right for u. So, having the first and the second traversal of a binary tree if there are situations described in the second part of the theore, the solution is not unique. We can calculate the nuber of solutions. Theore The nuber of solutions for the proble of construction of a binary tree fro the pre-order and post-order traversals is, where is the nuber of situations described in the second part of the theore that appear. Proof. All the situations described in the second part of the theore are independent. So, for each of these situations the nuber of solutions ultiplies by. Let s tae an exaple (see fig. 3.). Fig. 3.: Binary trees having the sae pre-order and post-order vectors In the figure 3., the first pre-order traversal vector is a (,, 3, 4, ) and the second pre-order traversal vector is b (,, 4,, 3), then, because the pair of nodes (, ) and

6 (4, ) are consecutive in both pre-order traversal vectors. The total nuber of solutions for this exaple is 4. We shall present now an optial tie and space coplexity ethod to find all the solution for the proble for construction of the binary trees fro the pre-order traversals. We saw that a solution can be found in linear tie and space. Starting fro this one we can find all solutions. We shall use a vector d with eleents or. Each eleent of d corresponds to a node, which has only a son. If d[j], then the son of the node u[j] is to the left (or to the right) and if d[j], then the son of u[j] is the other part (to the right and respectively to the left). We shall generate all possible values for the vector d and for each such instance we shall find the corresponded solution. We ll tae care to do this in O( ) tie and using linear space. A binary tree can be ept in three vectors: ls, rs and info, each having n eleents, as follows: ls[] is the son to the left of the node. If has no son, then ls[]. rs[] is the son to the right of the node. If has no son, then rs[]. info[] is the inforation of the node. The algorith to find all the solutions for the proble of construction of the binary tree fro the pre-order traversals is:. Find a solution ls, rs, info and the vector u;. For i: to do d[i]:; end for; 3. For i: to - do 4. t:; j:;. while t do 6. If d[j] then d[j]:; 7. else d[j]:; t:; 8. end if; 9. ls[u[j]] <-> ld[u[j]]; (interchange). j:j+;. end while;. In ls, lr, info is ept a new solution; 3. end for; Theore 6 The algorith finds all the solutions for the proble of construction of the binary tree fro the pre-order traversals. Proof. All possible values for the vector d are generated and for each instance the corresponded solution is found. Theore 7 All the solutions for the proble of construction of the binary tree fro the preorder traversals are found in optial tie and space coplexity. Proof. The initial solution is found linear tie and space (see theore 4). We shall calculate now the total nuber of while loops, which will give us the tie coplexity for the second part of the algorith. The iterations of a while sequence ends when t becoes. This happens on the position of the first. Let s suppose that in the i-th iteration of for, the first in d is on the position, where {,,, }. There are - such cases. In such case, while sequence has iterations. So, the total nuber of iterations of while is:. (3.) Let s prove now that O ( ) O :

7 li li R * + (3.) The su is convergent because: < < > + * * * li,,, R N N. (3.3) We can calculate the liit (3.): + + ) ( ) ( li ) ( li li li li + + (3.4) The coplexity of the whole algorith is O(n+ ) O(ax{n, }). It is obviously that an optial tie algorith can not have the coplexity less than O(ax{n, }), because the eleents of the traversal vectors ust be analyzed at least once (in O(n)) and the nuber of solutions is. The algorith uses linear space (see theore 4). This eans that the algorith for finding all the solutions for the proble of construction the binary trees fro the pre-order traversals has an optial tie and space coplexity. BIBLIOGRAPHY [] H.A. Burgdor, S. Jajodia, F.N. Springsteel, Y. Zalcstein (987), Alternative Methods for the Reconstruction of Trees fro their Traversals, BIT 7., 34-4; [] G. Chen, M.S. Yu, L. T. Liu (988), Two algoriths for constructing a binary tree fro its traversals, Inf. Process. Lett. 8, No.6, 97-99; [3] E. Mäinen (989), Constructing a binary tree fro its traversals, BIT 9, No.3, 7-7; [4] E. Mäinen (), Constructing a binary tree efficiently fro its traversals, Int. J. Coput. Math. 7, No., 43-47; [] A. Andersson, S. Carlsson (99), Construction of a tree fro its traversals in optial tie and space, Inf. Process. Lett. 34, No., -; [6] A. Deaconu (4), Iterative Algorith for Construction of a Tree fro its Pre-order and Post-order Traversals in Linear Tie and Space, Analele Stiintifice Univ. Alexandru Ioan Cuza din Iasi (serie noua), ed. Univ. Al. I. Cuza, Toul IV; [7] R. K. Ahuja, T. L. Magnanti, J. B. Orlin (993), Networ flows: Theory, Algorits and Applications, Prentice Hall.

λ-harmonious Graph Colouring Lauren DeDieu

λ-harmonious Graph Colouring Lauren DeDieu λ-haronious Graph Colouring Lauren DeDieu June 12, 2012 ABSTRACT In 198, Hopcroft and Krishnaoorthy defined a new type of graph colouring called haronious colouring. Haronious colouring is a proper vertex

More information

Trees. Linear vs. Branching CSE 143. Branching Structures in CS. What s in a Node? A Tree. [Chapter 10]

Trees. Linear vs. Branching CSE 143. Branching Structures in CS. What s in a Node? A Tree. [Chapter 10] CSE 143 Trees [Chapter 10] Linear vs. Branching Our data structures so far are linear Have a beginning and an end Everything falls in order between the ends Arrays, lined lists, queues, stacs, priority

More information

A novel algorithm to determine the leaf (leaves) of a binary tree from its preorder and postorder traversals

A novel algorithm to determine the leaf (leaves) of a binary tree from its preorder and postorder traversals Journal of Algorithms and Computation journal homepage: http://jac.ut.ac.ir A novel algorithm to determine the leaf (leaves) of a binary tree from its preorder and postorder traversals N. Aghaieabiane

More information

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl. Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable

More information

Gromov-Hausdorff Distance Between Metric Graphs

Gromov-Hausdorff Distance Between Metric Graphs Groov-Hausdorff Distance Between Metric Graphs Jiwon Choi St Mark s School January, 019 Abstract In this paper we study the Groov-Hausdorff distance between two etric graphs We copute the precise value

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University

More information

A GRAPH-PLANARIZATION ALGORITHM AND ITS APPLICATION TO RANDOM GRAPHS

A GRAPH-PLANARIZATION ALGORITHM AND ITS APPLICATION TO RANDOM GRAPHS A GRAPH-PLANARIZATION ALGORITHM AND ITS APPLICATION TO RANDOM GRAPHS T. Ozawa and H. Takahashi Departent of Electrical Engineering Faculty of Engineering, Kyoto University Kyoto, Japan 606 Abstract. In

More information

P NP. Approximation Algorithms. Computational hardness. Vertex cover. Vertex cover. Vertex cover. Plan: Vertex Cover Metric TSP 3SAT

P NP. Approximation Algorithms. Computational hardness. Vertex cover. Vertex cover. Vertex cover. Plan: Vertex Cover Metric TSP 3SAT Great Theoretical Ideas In Coputer Science Victor Adachi CS - Carnegie Mellon University Approxiation Algoriths P NP Plan: Vertex Cover 3SAT Coputational hardness Suppose we are given an NP-coplete proble

More information

3D Building Detection and Reconstruction from Aerial Images Using Perceptual Organization and Fast Graph Search

3D Building Detection and Reconstruction from Aerial Images Using Perceptual Organization and Fast Graph Search 436 Journal of Electrical Engineering & Technology, Vol. 3, No. 3, pp. 436~443, 008 3D Building Detection and Reconstruction fro Aerial Iages Using Perceptual Organization and Fast Graph Search Dong-Min

More information

An improved algorithm to reconstruct a binary tree from its inorder and postorder traversals

An improved algorithm to reconstruct a binary tree from its inorder and postorder traversals Journal of Algorithms and Computation journal homepage: http://jac.ut.ac.ir An improved algorithm to reconstruct a binary tree from its inorder and postorder traversals Niloofar Aghaieabiane 1, Henk Koppelaar

More information

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem Theoretical Analysis of Local Search and Siple Evolutionary Algoriths for the Generalized Travelling Salesperson Proble Mojgan Pourhassan ojgan.pourhassan@adelaide.edu.au Optiisation and Logistics, The

More information

A simplified approach to merging partial plane images

A simplified approach to merging partial plane images A siplified approach to erging partial plane iages Mária Kruláková 1 This paper introduces a ethod of iage recognition based on the gradual generating and analysis of data structure consisting of the 2D

More information

Geometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem.

Geometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem. Noveber 13, 2016 Geoetry. The Method of the enter of Mass (ass points): Solving probles using the Law of Lever (ass points). Menelaus theore. Pappus theore. M d Theore (Law of Lever). Masses (weights)

More information

Predicting x86 Program Runtime for Intel Processor

Predicting x86 Program Runtime for Intel Processor Predicting x86 Progra Runtie for Intel Processor Behra Mistree, Haidreza Haki Javadi, Oid Mashayekhi Stanford University bistree,hrhaki,oid@stanford.edu 1 Introduction Progras can be equivalent: given

More information

MATRIX CALCULATION BACKWARD CHAINING IN RULE BASED EXPERT SYSTEM

MATRIX CALCULATION BACKWARD CHAINING IN RULE BASED EXPERT SYSTEM 4 th Research/Expert Conference with International Participation QUAITY 5, Fojnica, B&H, Noveber 9 -, 5 ATRIX CACUATION BACKWARD CHAINING IN RUE BASED EXPERT SYSTE sc aro Hell Universit of Split, Facult

More information

Guillotine subdivisions approximate polygonal subdivisions: Part III { Faster polynomial-time approximation schemes for

Guillotine subdivisions approximate polygonal subdivisions: Part III { Faster polynomial-time approximation schemes for Guillotine subdivisions approxiate polygonal subdivisions: Part III { Faster polynoial-tie approxiation schees for geoetric network optiization Joseph S. B. Mitchell y April 19, 1997; Last revision: May

More information

time using O( n log n ) processors on the EREW PRAM. Thus, our algorithm improves on the previous results, either in time complexity or in the model o

time using O( n log n ) processors on the EREW PRAM. Thus, our algorithm improves on the previous results, either in time complexity or in the model o Reconstructing a Binary Tree from its Traversals in Doubly-Logarithmic CREW Time Stephan Olariu Michael Overstreet Department of Computer Science, Old Dominion University, Norfolk, VA 23529 Zhaofang Wen

More information

CMSC351 - Fall 2014, Homework #2

CMSC351 - Fall 2014, Homework #2 CMSC351 - Fall 2014, Homework #2 Due: October 8th at the start of class Name: Section: Grades depend on neatness and clarity. Write your answers with enough detail about your approach and concepts used,

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

Section 5.5. Left subtree The left subtree of a vertex V on a binary tree is the graph formed by the left child L of V, the descendents

Section 5.5. Left subtree The left subtree of a vertex V on a binary tree is the graph formed by the left child L of V, the descendents Section 5.5 Binary Tree A binary tree is a rooted tree in which each vertex has at most two children and each child is designated as being a left child or a right child. Thus, in a binary tree, each vertex

More information

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13 Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical

More information

Survivability Function A Measure of Disaster-Based Routing Performance

Survivability Function A Measure of Disaster-Based Routing Performance Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected

More information

Data & Knowledge Engineering

Data & Knowledge Engineering Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID

More information

Optimal Route Queries with Arbitrary Order Constraints

Optimal Route Queries with Arbitrary Order Constraints IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL.?, NO.?,? 20?? 1 Optial Route Queries with Arbitrary Order Constraints Jing Li, Yin Yang, Nikos Maoulis Abstract Given a set of spatial points DS,

More information

A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER

A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER VIOLETA TOMAŠEVIĆ, SLOBODAN BOJANIĆ 2 and OCTAVIO NIETO-TALADRIZ 2 The Mihajlo Pupin Institute, Volgina 5, 000 Belgrade, SERBIA AND MONTENEGRO 2 Technical University

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

Summary. Reconstruction of data from non-uniformly spaced samples

Summary. Reconstruction of data from non-uniformly spaced samples Is there always extra bandwidth in non-unifor spatial sapling? Ralf Ferber* and Massiiliano Vassallo, WesternGeco London Technology Center; Jon-Fredrik Hopperstad and Ali Özbek, Schluberger Cabridge Research

More information

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S COPUTER GEERATED HOLOGRAS Optical Sciences 67 W.J. Dallas (onday, August 3, 004, 1:38 P) PART III: CHAPTER OE DIFFUSERS FOR CGH S Part III: Chapter One Page 1 of 8 Introduction Hologras for display purposes

More information

The Unit Bar Visibility Number of a Graph

The Unit Bar Visibility Number of a Graph The Unit Bar Visibility Nuber of a Graph Eily Gaub 1,4, Michelle Rose 2,4, and Paul S. Wenger,4 August 20, 2015 Abstract A t-unit-bar representation of a graph G is an assignent of sets of at ost t horizontal

More information

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao

More information

Regular and Irreguar m-polar Fuzzy Graphs

Regular and Irreguar m-polar Fuzzy Graphs Global Journal of Matheatical Sciences: Theory and Practical. ISSN 0974-300 Volue 9, Nuber 07, pp. 39-5 International Research Publication House http://www.irphouse.co Regular and Irreguar -polar Fuzzy

More information

CS 361 Meeting 8 9/24/18

CS 361 Meeting 8 9/24/18 CS 36 Meeting 8 9/4/8 Announceents. Hoework 3 due Friday. Review. The closure properties of regular languages provide a way to describe regular languages by building the out of sipler regular languages

More information

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute

More information

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3 2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

Assignment 1. Stefano Guerra. October 11, The following observation follows directly from the definition of in order and pre order traversal:

Assignment 1. Stefano Guerra. October 11, The following observation follows directly from the definition of in order and pre order traversal: Assignment 1 Stefano Guerra October 11, 2016 1 Problem 1 Describe a recursive algorithm to reconstruct an arbitrary binary tree, given its preorder and inorder node sequences as input. First, recall that

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm roceedings of the 7th International Conference on Innovation & Manageent 893 Research on a Kind of QoS-Sensitive Seantic Web Services Coposition Method Based on Genetic Algorith Cao Hongjiang, Nie Guihua,

More information

Privacy-preserving String-Matching With PRAM Algorithms

Privacy-preserving String-Matching With PRAM Algorithms Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

Discrete Fourier Transform

Discrete Fourier Transform Discrete Fourier Transfor This is the first tutorial in our ongoing series on tie series spectral analysis. In this entry, we will closely exaine the discrete Fourier transfor (aa DFT) and its inverse,

More information

arxiv: v7 [math.gm] 15 Jan 2019

arxiv: v7 [math.gm] 15 Jan 2019 arxiv:6.0688v7 [ath.gm] 5 Jan 09 Finite and Infinite Nested Square Roots Convergent to One BENJAMIN EDUN Abstract. We investigate nested square root forulas convergent to by two ethods. In the first ethod

More information

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We

More information

IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE. Rafael García, Xevi Cufí and Lluís Pacheco

IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE. Rafael García, Xevi Cufí and Lluís Pacheco IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE Rafael García, Xevi Cufí and Lluís Pacheco Coputer Vision and Robotics Group Institute of Inforatics and Applications, University of

More information

FUZZY NODE FUZZY GRAPH AND ITS CLUSTER ANALYSIS

FUZZY NODE FUZZY GRAPH AND ITS CLUSTER ANALYSIS Applications (IJERA) ISSN: 48-96 www.era.co FUZZY NODE FUZZY GRAPH AND ITS CLUSTER ANALYSIS Dr.E.Chandrasekaran Associate Professor in atheatics, Presidency College, Chennai. Tailnadu, India. N.Sathyaseelan

More information

The Internal Conflict of a Belief Function

The Internal Conflict of a Belief Function The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of

More information

Multi Packet Reception and Network Coding

Multi Packet Reception and Network Coding The 2010 Military Counications Conference - Unclassified Progra - etworking Protocols and Perforance Track Multi Packet Reception and etwork Coding Aran Rezaee Research Laboratory of Electronics Massachusetts

More information

Novel Image Representation and Description Technique using Density Histogram of Feature Points

Novel Image Representation and Description Technique using Density Histogram of Feature Points Novel Iage Representation and Description Technique using Density Histogra of Feature Points Keneilwe ZUVA Departent of Coputer Science, University of Botswana, P/Bag 00704 UB, Gaborone, Botswana and Tranos

More information

Fair Resource Allocation for Heterogeneous Tasks

Fair Resource Allocation for Heterogeneous Tasks Fair Resource Allocation for Heterogeneous Tasks Koyel Mukherjee, Partha utta, Gurulingesh Raravi, Thangaraj Balasubraania, Koustuv asgupta, Atul Singh Xerox Research Center India, Bangalore, India 560105

More information

Grading Results Total 100

Grading Results Total 100 University of California, Berkeley College of Engineering Departent of Electrical Engineering and Coputer Sciences Fall 2003 Instructor: Dave Patterson 2003-11-19 v1.9 CS 152 Exa #2 Solutions Personal

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

Generating Mechanisms for Evolving Software Mirror Graph

Generating Mechanisms for Evolving Software Mirror Graph Journal of Modern Physics, 2012, 3, 1050-1059 http://dx.doi.org/10.4236/jp.2012.39139 Published Online Septeber 2012 (http://www.scirp.org/journal/jp) Generating Mechaniss for Evolving Software Mirror

More information

Problem Solving of graph correspondence using Genetics Algorithm and ACO Algorithm

Problem Solving of graph correspondence using Genetics Algorithm and ACO Algorithm Proble Solving of graph correspondence using Genetics Algorith and ACO Algorith Alireza Rezaee, 1, Azizeh Ajalli 2 Assistant professor,departent of Mechatronics Engineering, Faculty of New Sciences and

More information

TRees are one of the most important structures in computer

TRees are one of the most important structures in computer Raning and Unraning Algorithms for -ary Trees in Gray Code Order Fateme Ashari-Ghomi, Najme Khorasani, and Abbas Nowzari-Dalini Abstract In this paper, we present two new raning and unraning algorithms

More information

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

Image Reconstruction. R.D. Badawi. Department of Radiology Department of Biomedical Engineering. Page 1

Image Reconstruction. R.D. Badawi. Department of Radiology Department of Biomedical Engineering. Page 1 First ever X-ray iage - 895 Iage Reconstruction R.D. Badawi Departent of Radiology Departent of Bioedical Engineering X-ray Projection Iaging Requires straight line trajectory of unattenuated x-rays Nuclear

More information

Fast Accumulation Lattice Algorithm for Mining Sequential Patterns

Fast Accumulation Lattice Algorithm for Mining Sequential Patterns Proceedings of the 6th WSEAS International Conference on Applied Coputer Science, Hangzhou, China, April 15-17, 2007 229 Fast Accuulation Lattice Algorith for Mining Sequential Patterns NANCY P. LIN, WEI-HUA

More information

Ranking Spatial Data by Quality Preferences

Ranking Spatial Data by Quality Preferences 1 Ranking Spatial Data by Quality Preferences Man Lung Yiu, Hua Lu, Nikos Maoulis, and Michail Vaitis Abstract A spatial preference query ranks objects based on the qualities of features in their spatial

More information

Multipath Selection and Channel Assignment in Wireless Mesh Networks

Multipath Selection and Channel Assignment in Wireless Mesh Networks Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,

More information

Formal Languages and Automata Theory, SS Project (due Week 14)

Formal Languages and Automata Theory, SS Project (due Week 14) Formal Languages and Automata Theory, SS 2018. Project (due Week 14) 1 Preliminaries The objective is to implement an algorithm for the evaluation of an arithmetic expression. As input, we have a string

More information

Image Filter Using with Gaussian Curvature and Total Variation Model

Image Filter Using with Gaussian Curvature and Total Variation Model IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.

More information

Sequential and parallel deficit scaling algorithms for minimum flow in bipartite networks

Sequential and parallel deficit scaling algorithms for minimum flow in bipartite networks Sequential and parallel deficit scaling algorithms for minimum flow in bipartite networks LAURA CIUPALĂ Department of Computer Science University Transilvania of Braşov Iuliu Maniu Street 50, Braşov ROMANIA

More information

A Novel 2D Texture Classifier For Gray Level Images

A Novel 2D Texture Classifier For Gray Level Images 2012, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.co A Novel 2D Texture Classifier For Gray Level Iages B.S. Mousavi 1 Young Researchers Club, Zahedan

More information

Author. Published. Journal Title DOI. Copyright Statement. Downloaded from. Griffith Research Online. Kandjani, Hadi, Wen, Larry, Bernus, Peter

Author. Published. Journal Title DOI. Copyright Statement. Downloaded from. Griffith Research Online. Kandjani, Hadi, Wen, Larry, Bernus, Peter Enterprise Architecture Cybernetics for Global Mining Projects: Reducing the Structural Coplexity of Global Mining Supply Networks via Virtual Brokerage Author Kandjani, Hadi, Wen, Larry, Bernus, Peter

More information

A parallel algorithm for generation of RNA secondary structures with length n and k base-pairs

A parallel algorithm for generation of RNA secondary structures with length n and k base-pairs Iran J Coput Sci (2018) 1:11 17 https://doi.org/10.1007/s42044-017-0001-2 ORIGIAL ARICLE A parallel algorith for generation of RA secondary structures with length n and k base-pairs Shahin Mohaadi 1 Abbas

More information

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu

More information

Reconstruction of Time Series using Optimal Ordering of ICA Components

Reconstruction of Time Series using Optimal Ordering of ICA Components Reconstruction of Tie Series using Optial Ordering of ICA Coponents Ar Goneid and Abear Kael Departent of Coputer Science & Engineering, The Aerican University in Cairo, Cairo, Egypt e-ail: goneid@aucegypt.edu

More information

Ascending order sort Descending order sort

Ascending order sort Descending order sort Scalable Binary Sorting Architecture Based on Rank Ordering With Linear Area-Tie Coplexity. Hatrnaz and Y. Leblebici Departent of Electrical and Coputer Engineering Worcester Polytechnic Institute Abstract

More information

[ DATA STRUCTURES ] Fig. (1) : A Tree

[ DATA STRUCTURES ] Fig. (1) : A Tree [ DATA STRUCTURES ] Chapter - 07 : Trees A Tree is a non-linear data structure in which items are arranged in a sorted sequence. It is used to represent hierarchical relationship existing amongst several

More information

Incremental Algorithms for the Minimum Cost Flow Problem

Incremental Algorithms for the Minimum Cost Flow Problem Incremental Algorithms for the Minimum Cost Flow Problem LAURA CIUPALĂ Department of Computer Science University Transilvania of Braşov Iuliu Maniu Street 50, Braşov ROMANIA laura_ciupala@yahoo.com Abstract:

More information

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural

More information

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang IEEE International Conference on ultiedia and Expo POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION Junjun Jiang, Ruiin Hu, Zhen Han, Tao Lu, and Kebin Huang National Engineering

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

Compiling an Honest but Curious Protocol

Compiling an Honest but Curious Protocol 6.876/18.46: Advanced Cryptography May 7, 003 Lecture 1: Copiling an Honest but Curious Protocol Scribed by: Jonathan Derryberry 1 Review In previous lectures, the notion of secure ultiparty coputing was

More information

Chapter 20: Binary Trees

Chapter 20: Binary Trees Chapter 20: Binary Trees 20.1 Definition and Application of Binary Trees Definition and Application of Binary Trees Binary tree: a nonlinear linked list in which each node may point to 0, 1, or two other

More information

First Semester - Question Bank Department of Computer Science Advanced Data Structures and Algorithms...

First Semester - Question Bank Department of Computer Science Advanced Data Structures and Algorithms... First Semester - Question Bank Department of Computer Science Advanced Data Structures and Algorithms.... Q1) What are some of the applications for the tree data structure? Q2) There are 8, 15, 13, and

More information

Medical Biophysics 302E/335G/ st1-07 page 1

Medical Biophysics 302E/335G/ st1-07 page 1 Medical Biophysics 302E/335G/500 20070109 st1-07 page 1 STEREOLOGICAL METHODS - CONCEPTS Upon copletion of this lesson, the student should be able to: -define the ter stereology -distinguish between quantitative

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

A Comparison Analysis of Graphical Models of Object-Oriented Databases and the GOQL Model

A Comparison Analysis of Graphical Models of Object-Oriented Databases and the GOQL Model A Coparison Analysis of Graphical Models of Object-Oriented Databases and the GOQL Model EUCLID KERAMOPOULOS School of Coputer Science Westinster University 5 New Cavendish Street, London WM 8JS, UK PHILIPPOS

More information

6.1 Topological relations between two simple geometric objects

6.1 Topological relations between two simple geometric objects Chapter 5 proposed a spatial odel to represent the spatial extent of objects in urban areas. The purpose of the odel, as was clarified in Chapter 3, is ultifunctional, i.e. it has to be capable of supplying

More information

Multiple operand addition and multiplication

Multiple operand addition and multiplication Multiple operand addition and ultiplication by SHANKER SINGH and RONALD WAXMAN International Business Machines Corporation Poughkeepsie, N ew York INTRODUCTION Traditionally, adders used in sall- and ediu-sized

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

a graph is a data structure made up of nodes in graph theory the links are normally called edges

a graph is a data structure made up of nodes in graph theory the links are normally called edges 1 Trees Graphs a graph is a data structure made up of nodes each node stores data each node has links to zero or more nodes in graph theory the links are normally called edges graphs occur frequently in

More information

Quantitative Comparison of Sinc-Approximating Kernels for Medical Image Interpolation

Quantitative Comparison of Sinc-Approximating Kernels for Medical Image Interpolation Quantitative Coparison of Sinc-Approxiating Kernels for Medical Iage Interpolation Erik H. W. Meijering, Wiro J. Niessen, Josien P. W. Plui, Max A. Viergever Iage Sciences Institute, Utrecht University

More information

LOSSLESS COMPRESSION OF BAYER MASK IMAGES USING AN OPTIMAL VECTOR PREDICTION TECHNIQUE

LOSSLESS COMPRESSION OF BAYER MASK IMAGES USING AN OPTIMAL VECTOR PREDICTION TECHNIQUE 1th European Signal Processing Conference (EUSIPCO 2006), Florence, Italy, Septeber -8, 2006, copyright by EUASIP LOSSLESS COMPESSION OF AYE MASK IMAES USIN AN OPTIMAL VECTO PEDICTION TECHNIQUE Stefano

More information

Course Review for. Cpt S 223 Fall Cpt S 223. School of EECS, WSU

Course Review for. Cpt S 223 Fall Cpt S 223. School of EECS, WSU Course Review for Midterm Exam 1 Cpt S 223 Fall 2011 1 Midterm Exam 1 When: Friday (10/14) 1:10-2pm Where: in class Closed book, closed notes Comprehensive Material for preparation: Lecture slides & in-class

More information

Implementation of fast motion estimation algorithms and comparison with full search method in H.264

Implementation of fast motion estimation algorithms and comparison with full search method in H.264 IJCSNS International Journal of Coputer Science and Network Security, VOL.8 No.3, March 2008 139 Ipleentation of fast otion estiation algoriths and coparison with full search ethod in H.264 A.Ahadi, M.M.Azadfar

More information

Available online at Procedia Computer Science 9 (2012 ) International Conference on Computational Science, ICCS 2012

Available online at   Procedia Computer Science 9 (2012 ) International Conference on Computational Science, ICCS 2012 Available online at www.sciencedirect.co Procedia Coputer Science 9 (2012 ) 1363 1370 Abstract International Conference on Coputational Science, ICCS 2012 Reachability Analysis of Concurrent Boolean Progras

More information

Homework 1. An Introduction to Neural Networks

Homework 1. An Introduction to Neural Networks Hoework An Introduction to Neural Networks -785: Introduction to Deep Learning Spring 09 OUT: January 4, 09 DUE: February 6, 09, :59 PM Start Here Collaboration policy: You are expected to coply with the

More information

Knowledge Discovery Applied to Agriculture Economy Planning

Knowledge Discovery Applied to Agriculture Economy Planning Knowledge Discovery Applied to Agriculture Econoy Planning Bing-ru Yang and Shao-un Huang Inforation Engineering School University of Science and Technology, Beiing, China, 100083 Eail: bingru.yang@b.col.co.cn

More information

The Boundary Between Privacy and Utility in Data Publishing

The Boundary Between Privacy and Utility in Data Publishing The Boundary Between Privacy and Utility in Data Publishing Vibhor Rastogi Dan Suciu Sungho Hong ABSTRACT We consider the privacy proble in data publishing: given a database instance containing sensitive

More information

Verifying the structure and behavior in UML/OCL models using satisfiability solvers

Verifying the structure and behavior in UML/OCL models using satisfiability solvers IET Cyber-Physical Systes: Theory & Applications Review Article Verifying the structure and behavior in UML/OCL odels using satisfiability solvers ISSN 2398-3396 Received on 20th October 2016 Revised on

More information

Construction of a regular hendecagon by two-fold origami

Construction of a regular hendecagon by two-fold origami J. C. LUCERO /207 Construction of a regular hendecagon by two-fold origai Jorge C. Lucero 1 Introduction Single-fold origai refers to geoetric constructions on a sheet of paper by perforing a sequence

More information

Approximate String Matching with Reduced Alphabet

Approximate String Matching with Reduced Alphabet Approxiate String Matching with Reduced Alphabet Leena Salela 1 and Jora Tarhio 2 1 University of Helsinki, Departent of Coputer Science leena.salela@cs.helsinki.fi 2 Aalto University Deptartent of Coputer

More information