arxiv: v1 [cs.cr] 3 Jun 2017

Size: px
Start display at page:

Download "arxiv: v1 [cs.cr] 3 Jun 2017"

Transcription

1 Spectrm-based deep neral networks for frad detection arxiv: v1 [cs.cr] 3 Jn 2017 ABSTRACT Shhan Yan Tongji University 4e66@tongji.ed.cn Jn Li University of Oregon lijn@cs.oregon.ed In this paper, we focs on frad detection on a signed graph with only a small set of labeled training data. We propose a novel framework that combines deep neral networks and spectral graph analysis. In particlar, we se the node projection (called as spectral coordinate) in the low dimensional spectral space of the graph s adjacency matrix as inpt of deep neral networks. Spectral coordinates in the spectral space captre the most sefl topology information of the network. De to the small dimension of spectral coordinates (compared with the dimension of the adjacency matrix derived from a graph), training deep neral networks becomes feasible. We develop and evalate two neral networks, deep atoencoder and convoltional neral network, in or frad detection framework. Experimental reslts on a real signed graph show that or spectrm based deep neral networks are effective in frad detection. KEYWORDS frad detection, spectrm, deep neral networks 1 INTRODUCTION Online social networks (OSNs) have become poplar social services for linking people together. Unfortnately, de to the openness of OSNs, fradsters can also easily register themselves, inject fake contents, or take fradlent activities, imposing severe secrity threads to OSNs and their legitimate participants. Many frad detection techniqes have been developed in recent years [1, 6, 9, 14], inclding content-based approaches and graph-based approaches. Different from content-based approaches that extract content featres, (i.e., text, URL), from ser activities on social networks [4], graph-based approaches identify frads based on network topologies. Often based on nspervised learning, the graph-based approaches consider frad as anomalies and extract varios graph featres associated with nodes, edges, ego-net, or commnities from the graph [2, 13]. In practice, a small set of labeled sers are often available and hence spervised learning based detection approaches cold be developed. In this paper, we introdce deep neral network models for detecting frads in signed graphs. Deep neral networks have achieved remarkable reslts in compter vision, natral langage processing, and speech recognition areas [7, 8, 12]. A deep neral network can learn different levels of representations on different layers of neral network [5]. However, one challenge of applying deep neral networks for frad detection is lack of sfficient labeled data. When deep neral networks with a high dimensional inpt Xintao W University of Arkansas xintaow@ark.ed Aidong L University of North Carolina at Charlotte aidong.l@ncc.ed have a large nmber of parameters, the deep neral networks need to be trained with a large training dataset [12]. Hence it is often infeasible to se the adjacency matrix of the nderlying graph as inpts of deep neral network models becase of the high dimension of the adjacency matrix and the small nmber of labeled sers. We propose a novel framework that combines spectral graph analysis with the deep neral networks. In particlar, we first project a graph to its spectral space formed by the principal eigenvectors of its adjacency matrix. The spectral space captres the main topological information of the graph. Each node is then mapped to a low dimensional point (called spectral coordinate) in the spectral space. We then se each node s spectral coordinate together with the aggregate information of its neighbor nodes spectral coordinates as the inpt of two deep neral network models, deep atoencoder and convoltional neral network. The advantages of or framework over past efforts are as follows. First, sing both spectral graph analysis and deep neral networks, we can avoid defining graph metrics (featres) to identify the difference between fradsters and reglar sers. Second, the low-dimensional spectral space contains the most sefl topology information of a graph. Comparing with the adjacency matrix, the dimension of spectral coordinates of nodes is mch lower. Ths, sing the node spectral coordinates as inpts to deep neral networks is sitable for real cases where the labeled sers are limited. Moreover, most of the existing works for frad detection focs on nsigned graphs in which there are only one type of links, while or framework covers signed networks. In order to captre both positive and negative edge information of a node in the signed graph, inpts of the two deep neral networks are composed by combining spectral coordinates of the node and its positive/negative-connected neighbors. 2 MODELS 2.1 Framework Given a signed ndirected graph G, each node in G indicates either a reglar ser or fradster. The signed graph G can be represented as a symmetric adjacency matrix A n n, where n is the nmber of nodes. In A n n, a ij = 1 (a ij = 1) indicates there is a positive (negative) edge between nodes i and j and a ij = 0 indicates no edge. A has n real eigenvales. Let λ i be the i-th largest eigenvales of A with eigenvector v i, λ 1 λ 2 λ n. The spectral decomposition of A is A = i λ i v i v T i (shown in Figre 1). There sally exist k leading eigenvales that are significantly greater than the rest ones for networks. The row vector α = (v 1,v 2,...,v k ) is

2 the spectral coordinate of node in the k-dimensional sbspace spanned by (v 1,..., v k ). Figre 1: Spectral decomposition of the adjacency matrix A In this work, we adopt deep atoencoder and convoltional neral network to identify fradsters. Instead of sing adjacency matrix, we adopt spectral coordinates to represent nodes as inpts to the two deep neral networks since spectral coordinates of nodes preserve the most sefl strctre information abot nodes. Meanwhile, given a node in a graph G, it has neighbors in s-steps. For example, when s = 1, the 1-step neighbors indicate the neighbors are one step away from the node. Spectral coordinate of s neighbors in s-steps represent broader topological information abot the node. For example, spectral coordinates of 1-step neighbors have been sccessflly sed to detect random link attacks from nsigned graphs [14]. Ths, we frther adopt the spectral coordinates of node neighbors in s-steps. In a signed graph, neighbors of node can be divided into 2 categories based on their edge types, i.e., neighbors connected by positive edges and neighbors connected by negative edges. We compte the mean vector of s-step neighbors spectral coordinates for each category, denoted as β s + where s indicates the s-step neighbors. Then, given a node, to captre a broad strctre information of, the final inpts of two deep neral networks combine the spectral coordinates of node and its two categories of neighbors in s-steps. We se a small part of labeled nodes to train the deep atoencoder and convoltional neral network. After training, the deep neral networks are able to identify fradsters of the rest nodes in the signed graph. 2.2 Using deep atoencoder (DAE) for frad detection and β s, DAE stacks mltiple basic atoencoder blocks hierarchically, which can captre mltiple levels of representations of the inpt data Figre 2: Architectre of DAE with spectral coordinates of node and its 1-step neighbors for frad detection 2 [3]. We adopt spectral coordinates of nodes in a signed graph as inpts to DAE. DAE can preserve the hidden knowledge abot the node from its spectral coordinate. Training DAE for frad detection contains two phases: the pre-training phase and training phase. In the pre-training phase, DAE trains the model in an nspervised manner. In the training phase, DAE trains the classifier and finetnes the whole model to predict the labels of nodes. Given the spectral coordinates of node and its two categories of neighbors in s-steps, the inpt x R (2s+1)k of DAE is defined as: x = [α β 1+ β 1... β s + β s ]. (1) Given a DAE, there are L encoders to compte the hidden representations z (1), z (2),..., z (L) of x layer by layer. The inpt of the (l + 1)-th encoder is the otpt of the l-th encoder. Specially, the inpt of the first encoder is x. Then, there are another L decoders to compte the reconstrcted inpt ˆx. The eqations of encoder and decoder are shown in Eqation 2 and 3, respectively. ẑ (L+l) z (l) = σ(w (l) z (l 1) + b (l) ), (2) = σ(w (L+l) ẑ (L+l 1) + b (L+l) ), (3) where W, b are the parameters of the encoder; σ is a nonlinear activation fnction. The objective fnction of pre-training is to make the reconstrcted inpt ˆx to be close to the original inpt x by minimizing the reconstrction sqared error, L(x, ˆx) = ˆx x 2. (4) After pretraining DAE, we stack L encoders layer by layer to generate the hidden representation z (L). z (L) captres the hidden information of x since it can be sed to reconstrct the inpt. Then, a softmax classifier is applied on top of the z (L) to predict the label of node. P(ŷ = c z (L) exp ( T c z (L) + b c ) ) = Cc =1 exp(t c z (L), (5) + b c ) where C is nmber of classes, c and b c are the parameters of softmax fnction for the c-th class. The parameters of softmax and deep atoencoder are trained and fine-tned by minimizing the cross entropy loss fnction, L = 1 N y i log(p(ŷ i )), (6) N i=1 where y i is the tre class of the i-th inpt, and N is the nmber of training data. Figre 2 shows the architectre of DAE with spectral coordinate of node and its 1-step neighbors. 2.3 Using convoltional neral network (CNN) for frad detection Convoltional neral networks are widely-sed in compter vision area[10]. A basic convoltional neral network is composed by a convoltion operation and a pooling operation. Given a node, the inpt of CNN X R (2s+1) k is represented as X = [α ; β 1+ ; β 1 ;... ; β s + ; β s ], (7)

3 Figre 3: Architectre of CNN with spectral coordinates of node and its 1-step neighbors for frad detection where ; indicates the vertical concatenation of two vectors. A convoltion operation which involves a filter W R m k is applied on a sb-matrix of X with m continos rows to generate a hidden featre: h j = σ((w X ) j:j+m 1 + b), (8) where σ indicates a nonlinear fnction; is a convoltion operation; b is a bias parameter; and m 2s + 1. Initially, the filter is partially connected to the inpt matrix X. Then, the filter slides throgh the whole inpt matrix X and generates a featre vector h = [h 1,,h 2s m+2 ]. After that, an average pooling operation, which calclates the average vale of the featre vector h, is sed to captre all discriminative featres of X. The average pooling operation is defined as z = mean(h). For example, when the filter size m is 1, the convoltion operation generates a featre vector h R 2s+1 which contains the hidden information of node and its all positive/negative-connected neighbors in s-steps. Then, an average pooling operation is applied on h to get the hidden featre z by calclating the average vale of h as the otpt of crrent filter. When the filter size m > 1, the model follows the similar procedre to generate hidden featres from X. Meanwhile, becase one hidden featre vector h is generated by one filter, the featre vector detects the same featre from different locations of X. To identify different aspects of featres from X, the model applies mltiple filters with different sizes of m to generate different featre vectors. After applying the pooling operation on each featre vector, the model encodes the inpt X to a representation vector z = [z 1, z 2,, z q ], where q is the nmber of featre vectors generated by q different filters. For each filter size m, CNN generates the same nmber of featre vectors. We then apply a softmax classifier on z to predict the node label P(ŷ = k z) by Eqation 5. The whole model is trained by minimizing the loss fnction shown in Eqation 6. The architectre of CNN with spectral coordinates of node and its 1-step neighbors is shown in Figre 3. 3 EXPERIMENTS To evalate the effectiveness and efficiency of or approach, we condct experiments on a signed graph for frad detection. 3.1 Experimental Setp Datasets. We condct or evalation on a signed network, WikiEditor, which is extracted from the UMD Wikipedia dataset[11]. The dataset is composed by vandals and benign sers who 3 edited the Wikipedia pages from Jan 2013 to Jly Different from benign sers, vandals edit articles in a deliberate attempt to damage Wikipedia. One edit may be reverted by bots or editors. Hence, each edit can belong to either revert or no-revert category. WikiEditor is bilt based on the co-edit relations. In particlar, a positive (negative) edge between sers i and j is added if the majority of their co-edits are from the same category (different categories). We remove those edits on meta pages (i.e., with titles containing User:, Talk:, User talk:, Wikipedia: ) becase the editings on those pages are not reverted by bot or administrators. We frther remove from or signed network those sers who do not have any co-edit relations with others. In WikiEditor, each ser is clearly labeled as either benign or vandal. Hence, we can evalate or models for frad detection on WikiEditor. Table 1: Statistics of WikiEditor # of Users (+,-) # of Links (+,-) WikiEditor (6086, 12906) (52139, 29177) Experimental settings. In or experiments, after projecting the signed graph to the spectral space, we first normalize the spectral coordinates of nodes. We then combine nodes and their 1-step neighbors spectral coordinates as inpts to deep neral networks. DAE contains two encoders. The dimensions of two encoders are 128 and 64. In CNN, the filter size m [1, 2, 3] and the nmber of filters q is 300. The training epochs of DAE and CNN models are 30 with early stopping. We randomly sample different percentages of nodes for training and se the rest of the nodes for testing. Since the labeled fradsters in real cases are sally small, we only adopt a small percentage of nodes as training data. We se the accracy to evalate the performance of different approaches for vandal detection. We report the mean vales of 10 different rns by sampling different training data. Baselines. We compare deep neral networks with two classical classifiers, k-nn and SVM. In k-nn, we set k = 3. In SVM, we adopt the RBF kernel and set the reglarization parameter c = 1. The inpts of k-nn and SVM are the same as DAE. Table 2: Accracy of vandal detection with varios sizes of training dataset Inpt A Algorithm Ratio of the training dataset 5% 10% 15% 20% k-nn 66.16% 68.82% 69.66% 74.00% SVM 67.81% 67.82% 67.88% 67.92% DAE 76.31% 78.55% 79.56% 80.59% CNN 76.70% 78.95% 80.09% 81.33% x SVM 71.60% 80.40% 80.82% 81.15% DAE 80.89% 81.13% 81.45% 81.92% k-nn 76.60% 77.38% 77.83% 78.19% CNN 80.57% 81.40% 82.02% 82.61%

4 3.2 Reslts We first compare each model with different sizes of training datasets sing spectral coordinates and the adjacency matrix. The defalt dimension of spectral coordinate k is 30. When sing the adjacency matrix A, the inpt of each algorithm is each row of A. In this scenario, CNN has only one size filter w 1 n. Deep neral networks vs. Baselines. Table 2 shows the accracy of vandal detection sing the adjacency matrix A and spectral coordinates x. We can observe that DAE and CNN models otperform the baselines significantly in all settings at the 10 8 level with a t-test. In the spectral space, the performance of SVM has a big jmp when the percentage of training data increasing from 5% to 10%. In the adjacency matrix space, the performances of SVM do not improve while increasing the size of training data. It indicates that the SVM cannot be well-trained with a small training dataset, especially when the inpt has high dimensions. The accracies of k-nn increase steadily while increasing the training data, bt the accracies of k-nn are also mch worse than or DAE and CNN. Spectrm vs. Adjacency matrix. In Table 2, we frther observe that sing the spectral coordinates as inpts (x ) achieves significantly better performance than sing the adjacency matrix, especially when the percentages of training data are 5% and 10%. Meanwhile, in the spectral space, when the percentage of training dataset is 5%, DAE performs better than CNN since DAE pre-trains the model first. The pre-training phase of DAE encodes the information of nodes into hidden layers, which make the classifier predict the node labels with small training data. On the contrary, when the percentage of training dataset is larger than 5%, CNN otperforms DAE in the spectral space. It indicates CNN has better performance with enogh training data. In the adjacency matrix space, the performances of DAE are worse than CNN with varios sizes of training data. This is becase DAE has mch more parameters than CNN when sing the adjacency matrix. DAE cannot be well-trained in a high-dimensional space with a small training dataset. Effect of the dimension of spectral coordinate k. Table 3 compares the deep neral networks with k-nn and SVM on varying the dimension of spectral coordinate k. In this experiment, we se 20% of nodes as training data and the rest of nodes as testing data. When inpts of algorithms are x, we can observe that DAE and CNN models otperform classical classifiers with varios dimensions of spectral coordinates. We can frther discover that DAE and CNN also achieve the most stable accracy with varios dimensions of spectral coordinates. However, the performance of SVM significantly drops while increasing the dimension of the spectral coordinate. This is becase both DAE and CNN learn the hidden representations of nodes from their spectral coordinates. The hidden representations of nodes are sefl for predicting the labels. Neighbor inclsion vs. Neighbor exclsion. In or experiment, the inpts of DAE and CNN combine spectral coordinates of nodes and their 1-step neighbors. We frther compare the performance of algorithms that adopt the node spectral coordinate with and withot combining the 1-step neighbors spectral coordinates as inpts in Table 3. We can observe that when sing the information of the 1- step neighbors spectral coordinates, the accracies of all algorithms achieve arond 1%-2% improvement. Therefore, combining the 4 Table 3: The accracy of vandal detection with varios dimensions of spectral coordinate k when 20% of nodes are sed as the training dataset. We frther compare algorithms sing node spectral coordinate with/withot combining neighbor spectral coordinates as inpts to algorithms. x Inpt Algorithm Dimension of spectral coordinate k SVM 81.00% 81.40% 81.15% 80.70% 76.28% DAE 81.86% 81.65% 81.92% 81.87% 81.61% k-nn 79.90% 78.85% 78.19% 78.33% 77.52% CNN 82.24% 82.26% 82.61% 82.42% 82.47% α SVM 79.79% 79.65% 80.19% 80.31% 77.94% DAE 80.47% 81.10% 81.17% 81.20% 81.40% k-nn 78.00% 77.49% 76.75% 76.55% 76.92% CNN 80.52% 81.22% 81.48% 81.44% 81.39% information of node neighbors can improve the performance of frad detection. Exection time. We also compare the exection time of deep neral networks sing spectral coordinates and the adjacency matrix. The DAE and CNN models are trained on a Nvidia Tesla K20 GPU. We observe that when the ratio of training data is 20%, the training time of each epoch for CNN and DAE models with adjacency matrix is 2 seconds. On the contrary, the training time of each epoch for CNN and DAE models with spectral coordinates is less than 1 second. Therefore, sing the spectral coordinates with low dimension is also more efficient than sing the adjacency matrix. 4 CONCLUSIONS We have presented a novel framework that applies deep neral networks on the spectral space of a signed graph to identify frads. In particlar, we first condct graph spectral projections on a signed graph to obtain node spectral coordinates. The node and its s-step neighbors spectral coordinates are combined together as inpts to the deep atoencoder and convoltional neral network models for frad detection. The experiment reslts show that both deep neral networks achieve promising reslts on frad detection. Or empirical evalation frther shows that combining the information of node neighbors can improve the effectiveness of deep neral networks on frad detection. ACKNOWLEDGMENTS The athors acknowledge the spport from the 973 Program of China (2014CB340404) and China Scholarship Concil to Shhan Yan and from National Science Fondation to Xintao W ( ), Jn Li ( ) and Aidong L ( ). This research was condcted while Shhan Yan visited University of Arkansas. REFERENCES [1] Leman Akogl and Christos Falotsos What is Strange in Large Networks? Graph-based Irreglarity and Frad Detection. (2012). [2] Leman Akogl, Hanghang Tong, and Danai Kotra Graph based anomaly detection and description: a srvey. DMKD 29, 3 (2015), [3] Pierre Baldi Atoencoders, Unspervised Learning, and Deep Architectres. In Workshop on Unspervised and Transfer Learning [4] FabrÃŋcio Benevento, Gabriel Magno, Tiago Rodriges, and VirgÃŋlio Almeida Detecting spammers on twitter. In CEAS.

5 [5] Y. Bengio, A. Corville, and P. Vincent Representation Learning: A Review and New Perspectives. TPAMI 35, 8 (2013), [6] Qiang Cao, Xiaowei Yang, Jieqi Y, and Christopher Palow Uncovering Large Grops of Active Malicios Acconts in Online Social Networks. In CCS. [7] Alex Graves, Abdel-rahman Mohamed, and Geoffrey Hinton Speech Recognition with Deep Recrrent Neral Networks. In ICASSP. [8] Kaiming He, Xiangy Zhang, Shaoqing Ren, and Jian Sn Deep Residal Learning for Image Recognition. In CVPR. [9] Meng Jiang, Peng Ci, Alex Betel, Christos Falotsos, and Shiqiang Yang CatchSync: Catching Synchronized Behavior in Large Directed Graphs. In KDD. [10] Alex Krizhevsky, Ilya Stskever, and Geoffrey E. Hinton ImageNet Classification with Deep Convoltional Neral Networks. In NIPS. [11] Srijan Kmar, Francesca Spezzano, and V.S. Sbrahmanian VEWS: A Wikipedia Vandal Early Warning System. In KDD. [12] Yann LeCn, Yosha Bengio, and Geoffrey Hinton Deep learning. Natre 521, 7553 (2015), [13] Caleb C. Noble and Diane J. Cook Graph-based Anomaly Detection. In KDD. [14] X. Ying, X. W, and D. BarbarÃą Spectrm based frad detection in social networks. In ICDE

AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING

AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING Mingsheng LIAO, Li ZHANG, Zxn ZHANG, Jiangqing ZHANG Whan Technical University of Srveying and Mapping, Natinal Lab. for Information Eng. in

More information

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz

More information

Networks An introduction to microcomputer networking concepts

Networks An introduction to microcomputer networking concepts Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES

More information

Tu P7 15 First-arrival Traveltime Tomography with Modified Total Variation Regularization

Tu P7 15 First-arrival Traveltime Tomography with Modified Total Variation Regularization T P7 15 First-arrival Traveltime Tomography with Modified Total Variation Reglarization W. Jiang* (University of Science and Technology of China) & J. Zhang (University of Science and Technology of China)

More information

Real-time mean-shift based tracker for thermal vision systems

Real-time mean-shift based tracker for thermal vision systems 9 th International Conference on Qantitative InfraRed Thermography Jly -5, 008, Krakow - Poland Real-time mean-shift based tracker for thermal vision systems G. Bieszczad* T. Sosnowski** * Military University

More information

A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA

A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA Mei Zho*, Ling-li Tang, Chan-rong Li, Zhi Peng, Jing-mei Li Academy of Opto-Electronics, Chinese Academy of Sciences, No.9, Dengzhang

More information

IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION

IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION ICAS 2 CONGRESS IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION Christophe Le Garrec, Marc Hmbert, Michel Lacabanne Aérospatiale Matra

More information

Master for Co-Simulation Using FMI

Master for Co-Simulation Using FMI Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany

More information

arxiv: v1 [cs.si] 14 Mar 2017

arxiv: v1 [cs.si] 14 Mar 2017 SNE: Signed Network Embedding Shuhan Yuan 1, Xintao Wu 2, and Yang Xiang 1 1 Tongji University, Shanghai, China, Email:{4e66,shxiangyang}@tongji.edu.cn 2 University of Arkansas, Fayetteville, AR, USA,

More information

Tdb: A Source-level Debugger for Dynamically Translated Programs

Tdb: A Source-level Debugger for Dynamically Translated Programs Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,

More information

The Disciplined Flood Protocol in Sensor Networks

The Disciplined Flood Protocol in Sensor Networks The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab

More information

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands

More information

Multi-lingual Multi-media Information Retrieval System

Multi-lingual Multi-media Information Retrieval System Mlti-lingal Mlti-media Information Retrieval System Shoji Mizobchi, Sankon Lee, Fmihiko Kawano, Tsyoshi Kobayashi, Takahiro Komats Gradate School of Engineering, University of Tokshima 2-1 Minamijosanjima,

More information

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003 From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information

More information

CS 4204 Computer Graphics

CS 4204 Computer Graphics CS 424 Compter Graphics Crves and Srfaces Yong Cao Virginia Tech Reference: Ed Angle, Interactive Compter Graphics, University of New Mexico, class notes Crve and Srface Modeling Objectives Introdce types

More information

Deep Learning with Tensorflow AlexNet

Deep Learning with Tensorflow   AlexNet Machine Learning and Computer Vision Group Deep Learning with Tensorflow http://cvml.ist.ac.at/courses/dlwt_w17/ AlexNet Krizhevsky, Alex, Ilya Sutskever, and Geoffrey E. Hinton, "Imagenet classification

More information

Evaluating Influence Diagrams

Evaluating Influence Diagrams Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will

More information

TOWARD AN UNCERTAINTY PRINCIPLE FOR WEIGHTED GRAPHS

TOWARD AN UNCERTAINTY PRINCIPLE FOR WEIGHTED GRAPHS TOWARD AN UNCERTAINTY PRINCIPLE FOR WEIGHTED GRAPHS Bastien Pasdelop, Réda Alami, Vincent Gripon Telecom Bretagne UMR CNRS Lab-STICC name.srname@telecom-bretagne.e Michael Rabbat McGill University ECE

More information

PlenoPatch: Patch-based Plenoptic Image Manipulation

PlenoPatch: Patch-based Plenoptic Image Manipulation 1 PlenoPatch: Patch-based Plenoptic Image Maniplation Fang-Le Zhang, Member, IEEE, Je Wang, Senior Member, IEEE, Eli Shechtman, Member, IEEE, Zi-Ye Zho, Jia-Xin Shi, and Shi-Min H, Member, IEEE Abstract

More information

Switched state-feedback controllers with multi-estimators for MIMO systems

Switched state-feedback controllers with multi-estimators for MIMO systems Proceedings of the th WEA Int Conf on COMPUTATIONAL INTELLIGENCE MAN-MACHINE YTEM AND CYBERNETIC Venice Ital November - 6 89 witched state-feedback controllers with mlti-estimators for MIMO sstems LIBOR

More information

Resolving Linkage Anomalies in Extracted Software System Models

Resolving Linkage Anomalies in Extracted Software System Models Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program

More information

EMC ViPR. User Guide. Version

EMC ViPR. User Guide. Version EMC ViPR Version 1.1.0 User Gide 302-000-481 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is accrate

More information

STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWORK DYNAMICS FOR STATIC OPTIMIZATION

STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWORK DYNAMICS FOR STATIC OPTIMIZATION STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWOR DYNAMICS FOR STATIC OPTIMIZATION Grsel Serpen and Yifeng X Electrical Engineering and Compter Science Department, The University of Toledo, Toledo, OH

More information

Semantic segmentation is the task of labeling every pixel in

Semantic segmentation is the task of labeling every pixel in Deep Learning for Visal Understanding: Part Anrag Arnab, Shai Zheng, Sadeep Jayasmana, Bernardino Romera-Paredes, Måns Larsson, Alexander Kirillov, Bogdan Savchynskyy, Carsten Rother, Fredrik Kahl, and

More information

Normalized averaging using adaptive applicability functions with application in image reconstruction from sparsely and randomly sampled data

Normalized averaging using adaptive applicability functions with application in image reconstruction from sparsely and randomly sampled data Normalized averaging sing adaptive applicability fnctions with application in image reconstrction from sparsely and randomly sampled data Tan Q. Pham, Lcas J. van Vliet Pattern Recognition Grop, Faclty

More information

PlenoPatch: Patch-based Plenoptic Image Manipulation

PlenoPatch: Patch-based Plenoptic Image Manipulation 1 PlenoPatch: Patch-based Plenoptic Image Maniplation Fang-Le Zhang, Member, IEEE, Je Wang, Senior Member, IEEE, Eli Shechtman, Member, IEEE, Zi-Ye Zho, Jia-Xin Shi, and Shi-Min H, Member, IEEE Abstract

More information

Hardware-Accelerated Free-Form Deformation

Hardware-Accelerated Free-Form Deformation Hardware-Accelerated Free-Form Deformation Clint Cha and Ulrich Nemann Compter Science Department Integrated Media Systems Center University of Sothern California Abstract Hardware-acceleration for geometric

More information

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna

More information

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,

More information

REDUCED-REFERENCE ASSESSMENT OF PERCEIVED QUALITY BY EXPLOITING COLOR INFORMATION

REDUCED-REFERENCE ASSESSMENT OF PERCEIVED QUALITY BY EXPLOITING COLOR INFORMATION REDUCED-REFERENCE ASSESSMENT OF PERCEIVED QUALITY BY EXPLOITING COLOR INFORMATION Jdith Redi, Paolo Gastaldo, Rodolfo Znino, and Ingrid Heyndericx (+) University of Genoa, DIBE, Via Opera Pia a - 645 Genova

More information

Image Compression Compression Fundamentals

Image Compression Compression Fundamentals Compression Fndamentals Data compression refers to the process of redcing the amont of data reqired to represent given qantity of information. Note that data and information are not the same. Data refers

More information

h-vectors of PS ear-decomposable graphs

h-vectors of PS ear-decomposable graphs h-vectors of PS ear-decomposable graphs Nima Imani 2, Lee Johnson 1, Mckenzie Keeling-Garcia 1, Steven Klee 1 and Casey Pinckney 1 1 Seattle University Department of Mathematics, 901 12th Avene, Seattle,

More information

On the Existence of Subliminal Channel in Instant Messaging Systems

On the Existence of Subliminal Channel in Instant Messaging Systems , pp. 353-362 http://dx.doi.org/10.14257/ijsia.2015.9.3.27 On the Existence of Sbliminal Channel in Instant Messaging Systems Lingyn Xiang 1, Yha Xie 2, Gang Lo 3 and Weizheng Wang 1 1 School of Compter

More information

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT PAAMETE OPTIMIZATION FO TAKAGI-SUGENO FUZZY MODELS LESSONS LEANT Manfred Männle Inst. for Compter Design and Falt Tolerance Univ. of Karlsrhe, 768 Karlsrhe, Germany maennle@compter.org Brokat Technologies

More information

Method to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot

Method to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot Method to bild an initial adaptive Nero-Fzzy controller for joints control of a legged robot J-C Habmremyi, P. ool and Y. Badoin Royal Military Academy-Free University of Brssels 08 Hobbema str, box:mrm,

More information

Channel Locality Block: A Variant of Squeeze-and-Excitation

Channel Locality Block: A Variant of Squeeze-and-Excitation Channel Locality Block: A Variant of Squeeze-and-Excitation 1 st Huayu Li Northern Arizona University Flagstaff, United State Northern Arizona University hl459@nau.edu arxiv:1901.01493v1 [cs.lg] 6 Jan

More information

The Volcano Optimizer Generator: Extensibility and Efficient Search

The Volcano Optimizer Generator: Extensibility and Efficient Search The Volcano Optimizer Generator: Extensibility and Efficient Search - Prithvi Lakshminarayanan - 301313262 Athors Goetz Graefe, Portland State University Won the Most Inflential Paper award in 1993 Worked

More information

Henry Chu. Professor, School of Computing and Informatics Executive Director, Informatics Research Institute. University of Louisiana at Lafayette

Henry Chu. Professor, School of Computing and Informatics Executive Director, Informatics Research Institute. University of Louisiana at Lafayette Henry Ch Professor, School of Compting and Informatics Exective Director, Informatics Research Institte University of Loisiana at Lafayette Informatics Research Institte We condct research in data science

More information

What s New in AppSense Management Suite Version 7.0?

What s New in AppSense Management Suite Version 7.0? What s New in AMS V7.0 What s New in AppSense Management Site Version 7.0? AppSense Management Site Version 7.0 is the latest version of the AppSense prodct range and comprises three prodct components,

More information

POWER-OF-2 BOUNDARIES

POWER-OF-2 BOUNDARIES Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of

More information

A sufficient condition for spiral cone beam long object imaging via backprojection

A sufficient condition for spiral cone beam long object imaging via backprojection A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral

More information

Picking and Curves Week 6

Picking and Curves Week 6 CS 48/68 INTERACTIVE COMPUTER GRAPHICS Picking and Crves Week 6 David Breen Department of Compter Science Drexel University Based on material from Ed Angel, University of New Mexico Objectives Picking

More information

Review. A single-cycle MIPS processor

Review. A single-cycle MIPS processor Review If three instrctions have opcodes, 7 and 5 are they all of the same type? If we were to add an instrction to IPS of the form OD $t, $t2, $t3, which performs $t = $t2 OD $t3, what wold be its opcode?

More information

FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES

FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES RICARDO G. DURÁN AND ARIEL L. LOMBARDI Abstract. We consider the nmerical approximation of a model convection-diffsion

More information

CS224W Final Report. 1 Introduction. 3 Data Collection and Visualization. 2 Prior Work. Cyprien de Lichy, Renke Pan, Zheng Wu.

CS224W Final Report. 1 Introduction. 3 Data Collection and Visualization. 2 Prior Work. Cyprien de Lichy, Renke Pan, Zheng Wu. CS224W Final Report Cyprien de Lichy, Renke Pan, Zheng W 1 Introdction December 9, 2015 Recommender systems are information filtering systems that provide sers with personalized sggestions for prodcts

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 53 Design of Operating Systems Spring 8 Lectre 2: Virtal Memory Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Recap: cache Well-written programs exhibit

More information

Subgraph Matching with Set Similarity in a Large Graph Database

Subgraph Matching with Set Similarity in a Large Graph Database 1 Sbgraph Matching with Set Similarity in a Large Graph Database Liang Hong, Lei Zo, Xiang Lian, Philip S. Y Abstract In real-world graphs sch as social networks, Semantic Web and biological networks,

More information

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity

More information

Weighted Convolutional Neural Network. Ensemble.

Weighted Convolutional Neural Network. Ensemble. Weighted Convolutional Neural Network Ensemble Xavier Frazão and Luís A. Alexandre Dept. of Informatics, Univ. Beira Interior and Instituto de Telecomunicações Covilhã, Portugal xavierfrazao@gmail.com

More information

Fault Tolerance in Hypercubes

Fault Tolerance in Hypercubes Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different

More information

arxiv: v1 [cs.si] 12 Dec 2016

arxiv: v1 [cs.si] 12 Dec 2016 Connection Discovery sing Shared Images by Gassian Relational Topic Model Xiaopeng Li, Ming Cheng, James She HKUST-NIE Social Media Lab, Hong Kong University of Science & Technology, Hong Kong xlibo@connect.st.hk,

More information

COMPOSITION OF STABLE SET POLYHEDRA

COMPOSITION OF STABLE SET POLYHEDRA COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining

More information

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems Reqirements Engineering Objectives An introdction to reqirements Gerald Kotonya and Ian Sommerville To introdce the notion of system reqirements and the reqirements process. To explain how reqirements

More information

Image Denoising Algorithms

Image Denoising Algorithms Image Denoising Algorithms Xiang Hao School of Compting, University of Utah, USA, hao@cs.tah.ed Abstract. This is a report of an assignment of the class Mathematics of Imaging. In this assignment, we first

More information

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code:

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code: EE8 Winter 25 Homework #2 Soltions De Thrsday, Feb 2, 5 P. ( points) Consider the following fragment of Java code: for (i=; i

More information

An Introduction to GPU Computing. Aaron Coutino MFCF

An Introduction to GPU Computing. Aaron Coutino MFCF An Introdction to GPU Compting Aaron Cotino acotino@waterloo.ca MFCF What is a GPU? A GPU (Graphical Processing Unit) is a special type of processor that was designed to render and maniplate textres. They

More information

EECS 487: Interactive Computer Graphics f

EECS 487: Interactive Computer Graphics f Interpolating Key Vales EECS 487: Interactive Compter Graphics f Keys Lectre 33: Keyframe interpolation and splines Cbic splines The key vales of each variable may occr at different frames The interpolation

More information

L EGAL NOTICES. ScanSoft, Inc. 9 Centennial Drive Peabody, MA 01960, United States of America

L EGAL NOTICES. ScanSoft, Inc. 9 Centennial Drive Peabody, MA 01960, United States of America L EGAL NOTICES Copyright 2002 by ScanSoft, Inc. All rights reserved. No part of this pblication may be transmitted, transcribed, reprodced, stored in any retrieval system or translated into any langage

More information

Combined cine- and tagged-mri for tracking landmarks on the tongue surface

Combined cine- and tagged-mri for tracking landmarks on the tongue surface INTERSPEECH 2015 Combined cine- and tagged-mri for tracking landmarks on the tonge srface Honghao Bao 1, Wenhan L 1, Kiyoshi Honda 2,*, Jiango Wei 1, Qiang Fang 3, Jianw Dang 2, 4 1 School of Compter Software,

More information

Fast Obstacle Detection using Flow/Depth Constraint

Fast Obstacle Detection using Flow/Depth Constraint Fast Obstacle etection sing Flow/epth Constraint S. Heinrich aimlerchrylser AG P.O.Box 2360, -89013 Ulm, Germany Stefan.Heinrich@aimlerChrysler.com Abstract The early recognition of potentially harmfl

More information

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING International Jornal of Modern Engineering Research (IJMER) www.imer.com Vol.1, Isse1, pp-134-139 ISSN: 2249-6645 IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING

More information

Constructing and Comparing User Mobility Profiles for Location-based Services

Constructing and Comparing User Mobility Profiles for Location-based Services Constrcting and Comparing User Mobility Profiles for Location-based Services Xihi Chen Interdisciplinary Centre for Secrity, Reliability and Trst, University of Lxemborg Jn Pang Compter Science and Commnications,

More information

Optimal Sampling in Compressed Sensing

Optimal Sampling in Compressed Sensing Optimal Sampling in Compressed Sensing Joyita Dtta Introdction Compressed sensing allows s to recover objects reasonably well from highly ndersampled data, in spite of violating the Nyqist criterion. In

More information

arxiv: v1 [cs.cv] 8 May 2017

arxiv: v1 [cs.cv] 8 May 2017 Light Field Video Captre Using a Learning-Based Hybrid Imaging System arxiv:105.0299v1 [cs.cv] 8 May 201 TING-CHUN WANG, University of California, Berkeley JUN-YAN ZHU, University of California, Berkeley

More information

Unit Testing with VectorCAST and AUTOSAR

Unit Testing with VectorCAST and AUTOSAR Unit Testing with VectorCAST and AUTOSAR Vector TechDay Software Testing with VectorCAST V1.0 2018-11-15 Agenda Introdction Unit Testing Demo Working with AUTOSAR Generated Code Unit Testing AUTOSAR SWCs

More information

This chapter is based on the following sources, which are all recommended reading:

This chapter is based on the following sources, which are all recommended reading: Bioinformatics I, WS 09-10, D. Hson, December 7, 2009 105 6 Fast String Matching This chapter is based on the following sorces, which are all recommended reading: 1. An earlier version of this chapter

More information

JOINT INTENT DETECTION AND SLOT FILLING USING CONVOLUTIONAL NEURAL NETWORKS. Puyang Xu, Ruhi Sarikaya. Microsoft Corporation

JOINT INTENT DETECTION AND SLOT FILLING USING CONVOLUTIONAL NEURAL NETWORKS. Puyang Xu, Ruhi Sarikaya. Microsoft Corporation JOINT INTENT DETECTION AND SLOT FILLING USING CONVOLUTIONAL NEURAL NETWORKS Puyang Xu, Ruhi Sarikaya Microsoft Corporation ABSTRACT We describe a joint model for intent detection and slot filling based

More information

Content Content Introduction

Content Content Introduction Content Content Introdction...................................................................... 3 Roles in the provisioning process............................................................... 4 Server

More information

Factors Influencing Performance of Firefly and Particle Swarm Optimization Algorithms

Factors Influencing Performance of Firefly and Particle Swarm Optimization Algorithms Factors Inflencing Performance of Firefly and Particle Swarm Optimization Algorithms Damanjeet Kar, UIET, Panjab University, Chandigarh Abstract In this paper, two natre inspired meta heristic approaches

More information

Inception and Residual Networks. Hantao Zhang. Deep Learning with Python.

Inception and Residual Networks. Hantao Zhang. Deep Learning with Python. Inception and Residual Networks Hantao Zhang Deep Learning with Python https://en.wikipedia.org/wiki/residual_neural_network Deep Neural Network Progress from Large Scale Visual Recognition Challenge (ILSVRC)

More information

CS 153 Design of Operating Systems

CS 153 Design of Operating Systems CS 153 Design of Operating Systems Spring 18 Lectre 3: OS model and Architectral Spport Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Last time/today

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 15: Virtal Address Space Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian OS Abstractions Applications

More information

Topic Continuity for Web Document Categorization and Ranking

Topic Continuity for Web Document Categorization and Ranking Topic Continity for Web ocment Categorization and Ranking B. L. Narayan, C. A. Mrthy and Sankar. Pal Machine Intelligence Unit, Indian Statistical Institte, 03, B. T. Road, olkata - 70008, India. E-mail:

More information

Sampling Online Social Networks by Random Walk with Indirect Jumps

Sampling Online Social Networks by Random Walk with Indirect Jumps Sampling Online Social Networks by Random Walk with Indirect Jmps Jnzho Zhao, Pinghi Wang, John C.S. Li, Don Towsley, and Xiaohong Gan arxiv:708.0908v [cs.si] 30 Ag 207 Abstract Random walk-based sampling

More information

Detecting Collective Attention Spam

Detecting Collective Attention Spam Detecting Collective Attention Spam Kymin Lee, James Caverlee, Krishna Y. Kamath, Zhiyan Cheng Department of Compter Science and Engineering Texas A&M University College Station, TX 77843 {kymin, caverlee,

More information

SZ-1.4: Significantly Improving Lossy Compression for Scientific Data Sets Based on Multidimensional Prediction and Error- Controlled Quantization

SZ-1.4: Significantly Improving Lossy Compression for Scientific Data Sets Based on Multidimensional Prediction and Error- Controlled Quantization SZ-1.4: Significantly Improving Lossy Compression for Scientific Data Sets Based on Mltidimensional Prediction and Error- Controlled Qantization Dingwen Tao (University of California, Riverside) Sheng

More information

Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks

Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks Shaoqing Ren, Kaiming He, Ross Girshick, and Jian Sun Presented by Tushar Bansal Objective 1. Get bounding box for all objects

More information

COPYRIGHTED MATERIAL. Recording Macros and Getting Started with VBA. Part 1

COPYRIGHTED MATERIAL. Recording Macros and Getting Started with VBA. Part 1 Part 1 Recording Macros and Getting Started with VBA Chapter 1: Recording and Rnning Macros in the Office Applications Chapter 2: Getting Started with the Visal Basic Editor Chapter 3: Editing Recorded

More information

Chapter 6: Pipelining

Chapter 6: Pipelining CSE 322 COPUTER ARCHITECTURE II Chapter 6: Pipelining Chapter 6: Pipelining Febrary 10, 2000 1 Clothes Washing CSE 322 COPUTER ARCHITECTURE II The Assembly Line Accmlate dirty clothes in hamper Place in

More information

A personalized search using a semantic distance measure in a graph-based ranking model

A personalized search using a semantic distance measure in a graph-based ranking model Article A personalized search sing a semantic distance measre in a graph-based ranking model Jornal of Information Science XX (X) pp. 1-23 The Athor(s) 2011 Reprints and Permissions: sagepb.co.k/jornalspermissions.nav

More information

The extra single-cycle adders

The extra single-cycle adders lticycle Datapath As an added bons, we can eliminate some of the etra hardware from the single-cycle path. We will restrict orselves to sing each fnctional nit once per cycle, jst like before. Bt since

More information

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,

More information

New-Sum: A Novel Online ABFT Scheme For General Iterative Methods

New-Sum: A Novel Online ABFT Scheme For General Iterative Methods New-Sm: A Novel Online ABFT Scheme For General Iterative Methods Dingwen Tao (University of California, Riverside) Shaiwen Leon Song (Pacific Northwest National Laboratory) Sriram Krishnamoorthy (Pacific

More information

TAKING THE PULSE OF ICT IN HEALTHCARE

TAKING THE PULSE OF ICT IN HEALTHCARE ICT TODAY THE OFFICIAL TRADE JOURNAL OF BICSI Janary/Febrary 2016 Volme 37, Nmber 1 TAKING THE PULSE OF ICT IN HEALTHCARE + PLUS + High-Power PoE + Using HDBaseT in AV Design for Schools + Focs on Wireless

More information

A choice relation framework for supporting category-partition test case generation

A choice relation framework for supporting category-partition test case generation Title A choice relation framework for spporting category-partition test case generation Athor(s) Chen, TY; Poon, PL; Tse, TH Citation Ieee Transactions On Software Engineering, 2003, v. 29 n. 7, p. 577-593

More information

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks Cost Based Local Forwarding Transmission Schemes for Two-hop Celllar Networks Zhenggang Zhao, Xming Fang, Yan Long, Xiaopeng H, Ye Zhao Key Lab of Information Coding & Transmission Sothwest Jiaotong University,

More information

Blurred Palmprint Recognition Based on Relative Invariant Structure Feature

Blurred Palmprint Recognition Based on Relative Invariant Structure Feature 5 International Conference on Comptational Science and Comptational Intelligence Blrred Palmprint Recognition Based on Relative Invariant Strctre Featre Gang Wang, Weibo Wei*, Zhenkan Pan College of Information

More information

METAMODEL FOR SOFTWARE SOLUTIONS IN COMPUTED TOMOGRAPHY

METAMODEL FOR SOFTWARE SOLUTIONS IN COMPUTED TOMOGRAPHY VOL. 10, NO 22, DECEBER, 2015 ISSN 1819-6608 ETAODEL FOR SOFTWARE SOLUTIONS IN COPUTED TOOGRAPHY Vitaliy ezhyev Faclty of Compter Systems and Software Engineering, Universiti alaysia Pahang, Gambang, alaysia

More information

The single-cycle design from last time

The single-cycle design from last time lticycle path Last time we saw a single-cycle path and control nit for or simple IPS-based instrction set. A mlticycle processor fies some shortcomings in the single-cycle CPU. Faster instrctions are not

More information

1048: Computer Organization

1048: Computer Organization 48: Compter Organization Lectre 5 Datapath and Control Lectre5B - mlticycle implementation (cwli@twins.ee.nct.ed.tw) 5B- Recap: A Single-Cycle Processor PCSrc 4 Add Shift left 2 Add ALU reslt PC address

More information

Light Field Video Capture Using a Learning-Based Hybrid Imaging System

Light Field Video Capture Using a Learning-Based Hybrid Imaging System Light Field Video Captre Using a Learning-Based Hybrid Imaging System TING-CHUN WANG, University of California, Berkeley JUN-YAN ZHU, University of California, Berkeley NIMA KHADEMI KALANTARI, University

More information

Blended Deformable Models

Blended Deformable Models Blended Deformable Models (In IEEE Trans. Pattern Analysis and Machine Intelligence, April 996, 8:4, pp. 443-448) Doglas DeCarlo and Dimitri Metaxas Department of Compter & Information Science University

More information

Bits, Bytes, and Integers. Bits, Bytes, and Integers. The Decimal System and Bases. Everything is bits. Converting from Decimal to Binary

Bits, Bytes, and Integers. Bits, Bytes, and Integers. The Decimal System and Bases. Everything is bits. Converting from Decimal to Binary with contribtions from Dr. Bin Ren, College of William & Mary Addition, negation, mltiplication, shifting 1 Everything is bits The Decimal System and Bases Each bit is or 1 By encoding/interpreting sets

More information

Computer User s Guide 4.0

Computer User s Guide 4.0 Compter User s Gide 4.0 2001 Glenn A. Miller, All rights reserved 2 The SASSI Compter User s Gide 4.0 Table of Contents Chapter 1 Introdction...3 Chapter 2 Installation and Start Up...5 System Reqirements

More information

Introduction to Computational Manifolds and Applications

Introduction to Computational Manifolds and Applications IMPA - Institto de Matemática Pra e Aplicada, Rio de Janeiro, RJ, Brazil Introdction to Comptational Manifolds and Applications Part 1 - Constrctions Prof. Marcelo Ferreira Siqeira mfsiqeira@dimap.frn.br

More information

PARTITIONING AND MODULAR CODE SYNTHESIS FOR RECONFIGURABLE MECHATRONIC SOFTWARE COMPONENTS

PARTITIONING AND MODULAR CODE SYNTHESIS FOR RECONFIGURABLE MECHATRONIC SOFTWARE COMPONENTS ARTITIONING AND MODULAR CODE SYNTHESIS FOR RECONFIGURABLE MECHATRONIC SOFTWARE COMONENTS Sven Brmester and Holger Giese Software Engineering Grop University of aderborn Warbrger Str. 00, D-33098 aderborn,

More information

Machine Learning 13. week

Machine Learning 13. week Machine Learning 13. week Deep Learning Convolutional Neural Network Recurrent Neural Network 1 Why Deep Learning is so Popular? 1. Increase in the amount of data Thanks to the Internet, huge amount of

More information

Layered Light Field Reconstruction for Defocus Blur

Layered Light Field Reconstruction for Defocus Blur Layered Light Field Reconstrction for Defocs Blr KARTHIK VAIDYANATHAN, JACOB MUNKBERG, PETRIK CLARBERG and MARCO SALVI Intel Corporation We present a novel algorithm for reconstrcting high qality defocs

More information

Appearance Based Tracking with Background Subtraction

Appearance Based Tracking with Background Subtraction The 8th International Conference on Compter Science & Edcation (ICCSE 213) April 26-28, 213. Colombo, Sri Lanka SD1.4 Appearance Based Tracking with Backgrond Sbtraction Dileepa Joseph Jayamanne Electronic

More information

DIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES

DIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES DIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES Binh-Son Ha 1 Imari Sato 2 Kok-Lim Low 1 1 National University of Singapore 2 National Institte of Informatics, Tokyo, Japan ABSTRACT Dal

More information