A Novel Method for Early Software Quality Prediction Based on Support Vector Machine

Size: px
Start display at page:

Download "A Novel Method for Early Software Quality Prediction Based on Support Vector Machine"

Transcription

1 A Nove Method for Eary Software Quaity Prediction Based on Support Vector Machine Fei Xing 1,PingGuo 1;2, and Michae R. Lyu 2 1 Department of Computer Science Beijing Norma University, Beijing, 1875, China 2 Department of Computer Science & Engineering The Chinese University of Hong Kong, Shatin, NT, Hong Kong, SAR of China xsoar@163.com, pguo@bnu.edu.cn, yu@cse.cuhk.edu.hk Abstract The software deveopment process imposes major impacts on the quaity of software at every deveopment stage; therefore, a common goa of each software deveopment phase concerns how to improve software quaity. Software quaity prediction thus aims to evauate software quaity eve periodicay and to indicate software quaity probems eary. In this paper, we propose a nove technique to predict software quaity by adopting Support Vector Machine (SVM) in the cassification of software modues based on compexity metrics. Because ony imited information of software compexity metrics is avaiabe in eary software ife cyce, ordinary software quaity modes cannot make good predictions generay. It is we known that SVM generaizes we even in high dimensiona spaces under sma training sampe conditions. We consequenty propose a SVM-based software cassification mode, whose characteristic is appropriate for eary software quaity predictions when ony a sma number of sampe data are avaiabe. Experimenta resuts with a Medica Imaging System software metrics data show that our SVM prediction mode achieves better software quaity prediction than some commony used software quaity prediction modes. 1. Introduction Modern society is fast becoming dependent on software products and systems. High reiabiity is one of the most important probem facing the software industry. A software quaity mode is a too for focusing software enhancement efforts. Such modes yied timey predictions on a modueby-modue basis, enabing one to target high-risk modues. Software metrics represent a quantitative description of program attributes and they pay a critica roe in predicting the quaity of the resuting software [1]. Software compexity metrics have been shown to be cosey reated to the distribution of fauts in program modues. That is, there is a direct reationship between some compexity metrics and the number of fauts ater found during test, vaidation and operation [2, 3]. Consequenty, investigating the reationship between the number of fauts in a program and its software compexity metrics attracts attentions from many researchers. Software compexity metrics can be used as input variabes of quaity prediction mode to predict the faut number, but predicting the exact number of fauts in each modue is often not necessary. Severa different techniques have been proposed to deveop predictive software metrics for the cassification of software program modues into faut-prone and non faut-prone categories. These techniques incude discriminant anaysis [4, 5], factor anaysis [6], booean discriminant functions [7], cassification trees [8, 9], pattern recognition (Optima Set Reduction, OSR) [4, 1], EM agorithm [11], feedforward neura networks [12], random forests [13], and many other methods [14]. With these predictive modes, deveopers and managers can focus resources on the most faut-prone modues eary and prevent probems of poor quaity ater in the software ife cyce. To buid a predictive mode, the number of changes (fauts) is usuay required. However, to obtain the dependent criterion variabes, we need to take a ong time for coecting the feedback of test and vaidation resuts. For exampe, for the Medica Imaging System (MIS) software presented ater in this paper, the actua number of changes (fauts) in that program was coected during a three-year observation period. As software compexity metrics can be obtained reativey eary in the software ife-cyce, it is worthy to expore new techniques for eary prediction of software quaity based on software compexity metrics. On the other hand, the reationships between software metrics and the cassification of program modues are often compi-

2 cated and noninear, imiting the accuracy of conventiona approaches. So it is difficut to mode with the traditiona methods, and an appropriate noninear mode needs to be deveoped to sove the probem. Support Vector Machine (SVM) [15] is a new technique for data cassification, which has been used successfuy in many object recognition appications [16, 17, 18, 19]. SVM is known to generaize we even in high dimensiona spaces under sma training sampe conditions and it is adaptive to mode noninear functiona reationships that are difficut to mode with other techniques. A these characteristics make SVM appropriate for software quaity modeing as such conditions are typicay encountered. 2. Support Vector Machine Here we briefy review the basics of SVM first. SVM was introduced by Vapnik in the ate 196s on the foundation of statistica earning theory [2]. In theory, the SVM cassification can be traced back to the cassica structura risk minimization (SRM) approach, which determines the cassification decision function by minimizing the empirica risk The Optima Separating Hyperpane SVM empoys a inear mode to impement noninear cass boundaries through some noninear mapping of the input vectors x into the high-dimensiona feature space F via a noninear mapping φ. The optima separating hyperpane is determined by giving the argest margin of separation between different casses. For the two-cass case, this optima hyperpane bisects the shortest ine between the convex hus of the two casses. The data are separated by a hyperpane defined by a number of support vectors. The SVM attempts to pace a inear boundary between the two different casses, and orient the boundary in such a way that the margin is maximized. The boundary can be expressed as foows: (w x)+b = ; w 2 R N ; b 2 R; (1) where the vector w defines the boundary, x is the input vector of dimension N and b is a scaar threshod. The optima hyperpane is required to satisfy the foowing constrained minimization as minf 1 2 kwk2 g (2) y i (w x i + b) 1; i = 1;2;:::;; (3) where (x i ;y i ) is the training set, and is the number of training sets. Using standard Lagrangian duaity techniques, one arrives at the foowing dua Quadratic Programming (QP) probem: maxf i α 1 2 α i α j y i y j (x i x j )g (4) i; j=1 y i α i = ; (5) α i ; i = 1;2;:::;; (6) where the α i are the Lagrangian mutipiers and are nonzero ony for the support vectors. Thus, the hyperpane parameters (w;b) and the cassifier function f (x;w;b) can be computed by an optimization process. The decision function is obtained as foows: f (x) =signf y i α i (x x i )+bg: (7) 2.2. The Generaized Optima Separating Hyperpane For the ineary non-separabe case, the minimization probem needs to be modified to aow miscassified data points. This modification resuts in a soft margin cassifier that aows but penaizes errors by introducing positive sack variabes ξ i (i = 1;2;:::;) as the measurement of vioation of the constraints: minf 1 2 kwk2 +C( ξ i )g (8) y i (w x i + b) 1 ξ i ; i = 1;2;:::;; (9) where C is used to weight the penaizing variabes ξ i,anda arger C corresponds to assigning a higher penaty to errors. The soution to this minimization probem is identica to the separabe case except for a modification of the bounds of the Lagrange mutipiers. Equation (6) is thus changed to:» α i» C; i = 1;2;:::;: (1) 2.3. Generaization in High Dimensiona Feature Space In the cases where the inear boundary in input spaces is not enough to separate two casses propery, it is possibe to create a hyperpane that aows the inear separation in a higher dimension space F. The method consists of projecting the data in a higher dimension space F via a noninear mapping φ, where they are considered to become

3 ineary separabe. The transformation into a higher dimensiona feature space is reativey computation-intensive. A kerne can be used to perform this transformation, and the dot product in a singe step providing the transformation can be repaced by an equivaent kerne function. This heps in reducing the computationa oad and retaining the effect of higher-dimensiona transformation at the same time. The kerne function K(x i ;x j ) is defined as foows [15]: K(x i ;x j )=φ(x i ) φ (x j ): (11) There are some commony used kerne functions: 1. Poynomia: K(x i ;x j )=[(x i x j )+1] q 2. Radia basis: K(x i ;x j )=exp( kx i x j k 2 =2σ 2 ) cass1 cass Figure 1. Optima Separating Hyperpane, C 1 = C 2 = 2 3. Sigmoid: K(x i ;x j )=tanh(ν(x i x j )+c) 2.4. SVM with Risk Feature cass1 cass2 Generay speaking, the oss incurred for making an error is greater than the oss incurred for being correct, and minimizing risk means that we try to find decision procedure that minimizes serious errors. We therefore introduce risk contro into SVM, which takes into account the cost of different types of errors by adjusting the error penaty parameter C to contro the risk. We suppose the first k training sets beong to cass 1 and the remaining k + 1 training sets beong to cass 2. Equation (8) is then converted to: minf 1 2 kwk2 +C 1 ( k ξ i )+C 2 ( i=k+1 ξ i )g (12) y i (w x i + b) 1 ξ i ; i = 1;2;:::;; (13) where C 1 is the error penaty parameter of cass 1 and C 2 is the error penaty parameter of cass 2. The soution to this minimization probem is aso simiar to that of the separabe case, but the bounds of the Lagrange mutipiers is changed to:» α i» C 1 ; i = 1;2;:::;k;» α i» C 2 ; i = k + 1;k + 2;:::;: (14) Various effects of adjusting the error penaty parameter C are shown in Figs. 1, 2 and 3, respectivey. It is noted that when the cass 1 and 2 have the same vaue of parameter C, the optima separating hyperpane is achieved Transductive SVM Traditiona SVM ony empoys abeed training sampes to buid a cassifier. As a kind of semi-supervised earning Figure 2. Separating Hyperpane with Risk Feature, C 1 = 1;C 2 = 2 methods, Transductive Support Vector Machines (TSVM) [21] take into account a particuar test set as we as training set, and try to minimize miscassifications of ony those particuar exampes. Besides of abeed training sampes (x i ;y i ), we consider another m unabeed sampes x Λ i. To find a abeing yλ i of the test sampe, the hyperpane < w;b > shoud separate both training and test data with the maximum margin: Minimizeover(y Λ i ;w;b) : 1 2 kwk2 (15) y i (w x i + b) 1; i = 1;2;:::;k; y Λ i (w xλ i + b) 1; i = 1;2;:::;m: (16) To be abe to hande non-separabe data cases, we can introduce sack variabes ξ Λ i (i = 1;2;:::;m) simiar to the way we hande the traditiona SVM. That is, the earning process of TSVM can be formuated as the foowing opti-

4 cass1 cass2 where α j is the prior probabiity, m j is the mean vector, and Σ j is the covariance matrix of the jth cass. Equation (2) is often caed the discriminant function for the jth cass in the iterature [23]. Furthermore, if the prior probabiity α j is the same for a casses, the term 2nα j can be omitted and the discriminant function reduces to a simper form [24]. The parameters in Eq. (19) and Eq. (2) can be estimated with the traditiona maximum ikeihood estimator: Figure 3. Separating Hyperpane with Risk Feature, C 1 = 2;C 2 = 1 mization probem: Minimizeover (y Λ i ;w;b;ξ i ;ξ Λ i ) : 1 2 kwk2 +C ξ i +C Λ m ξ Λ i (17) y i (w x i + b) 1 ξ i ; i = 1;2;:::;k; y Λ i (w xλ i + b) 1 ξ Λ i ; i = 1;2;:::;m; ξ i ξ Λ i (18) where C and C Λ are user-specified parameters. C Λ is caed the effect factor of the unabeed exampes and C Λ ξ Λ i is caed the effect term of the ith unabeed exampe in the above function. To sove this optimization equation, agorithms can be referenced from [22]. 3. Other Modes 3.1. Discriminant Anaysis Severa researchers have appied discriminant techniques to study software compexity metrics. One of severa discriminant techniques may be appropriate for a given anaysis. Among them quadratic discriminant anaysis (QDA) is the most widey used in the fied of pattern recognition when sufficient training sampes coud be suppied. Given the data points D = fx i g N, we can appy Bayesian decision rue to cassify the data x into jth cass: with j Λ = argmin j d j (x); j = 1;2; ;k (19) d j (x) =(x m j ) T Σ 1 j (x m j )+njσ j j 2nα j (2) α j = n j N ; (21) m j = 1 n j n j x i; (22) Σ j = 1 n j n j (x i m j )(x i m j )T : (23) Now x i is a sampe from cass j with probabiity one, and n j is the training sampe number of cass j: When an unbiased estimation is used, then Σ 1 j = n j 1 n j (x i m j )(x i m j )T ; (24) which is caed the sampe covariance matrix in the iterature [25]. Using the cassification rue in Eq. (19) and Eq. (2) with the above covariance estimation is known as quadratic discriminant anaysis Cassification Tree A cassification tree (CT) can be used to predict the cass membership of objects on the basis of one or more predictor variabes. It is widey used in pattern recognition fied, whereas Khoshgoftaar introduced the cassification and regression trees (CART) agorithm to software quaity prediction [26]. The CT as we as constructing CT agorithms are described in the iterature as the foowing [27]. The tree consists of a set of decision rues, which are appied in a sequentia manner, unti each object has been assigned to a specific cass. The first decision rue, appied at the root node of the tree to the vaues of a objects aong one or more predictor variabes, has two possibe outcomes: Objects are either sent to a termina node (eaf), upon which a cass is assigned, or to an intermediate node, upon which another decision rue appies. Utimatey, a objects are sent to a termina node and assigned a cass abe. The simpest type of CT is the binary tree, in which the spits are binary (that is, each parent node is attached to two daughter nodes) and the decision rues are univariate. CTs can be constructed based on continuous or discrete predictor variabes, or on a mixture of both (when univariate spits

5 are appied), and the trees are generay constructed by recursive partitioning (i.e., a given predictor variabe can be engaged in more than one decision rue). To construct CTs, there are two commony-used agorithms. One agorithm is cassification and regression trees (CART), which was deveoped by Breiman et a [28], and the other is the quick, unbiased, efficient statistica trees (QUEST), which was deveoped by Loh and Shih [29]. The CART agorithm finds the optima univariate spits by carrying out an exhaustive search of a possibe spits, whereas by appying a modified form of discriminant anaysis QUEST agorithm finds the optima univariate or mutivariate spits. These agorithms have some different features. It is reported that the CART agorithm is biased toward seecting predictor variabes having more eves, whereas the QUEST agorithm avoids this bias, and is therefore more appropriate when some predictor variabes have few eves whie other predictor variabes have many eves [29]. Conversey, an advantage of CART is that it is a non-parametric cassifier, i.e., no assumptions are made about the distributions of the variabes. Thus, CART anaysis can be used when the assumptions of inear discriminant anaysis (LDA) and binary ogistic regression (BLR) have not been satisfied. The optima CT is one that minimizes costs. When the prior probabiities of objects beonging to different casses are set proportiona to the cass size, and if miscassification costs are set to be the same for every cass, then minimizing costs is equivaent to minimizing the overa proportion of miscassified objects. However, if the prior probabiities are set according to previous knowedge, or if different miscassification costs are used, then minimizing costs does not correspond exacty to minimizing the miscassification rate. Unequa miscassification costs are used when one kind of miscassification is considered worse than another. For exampe, incorrecty predicting a faut-prone modue to be non faut-prone (Type II error) might be considered worse than incorrecty predicting a non faut-prone modue to be faut-prone (Type I error). In such a case, when assessing accuracy of the cassification, miscassifications of the former type coud be penaized more than miscassifications of the atter. When constructing a CT, if it is grown unti a termina nodes are homogeneous, the resuting tree is ikey to overfit the data, and wi therefore suffer a ower accuracy of cassification when appied to new objects. To avoid this case, one shoud therefore appy a stopping rue so that spitting stops at nodes that are either competey homogenous, or have no more than a specified number of objects in the case of nodes containing more than one cass. Other strategies incude specifying the size of the tree to be grown (i.e., the number of termina nodes increases), or defining the minimum heterogeneity that a node must have in order to be spit. Even when a stopping rue is appied, the resuting tree may not be the best tree, in the sense of maximizing accuracy of cassification whie at the same time minimizing compexity. Thus, in order to obtain the optima tree, we shoud derive procedures for pruning trees, i.e., for successivey prune the east important spits unti the best tree is produced. In minima cost-compexity pruning, a nested sequence of optimay pruned subtrees is generated when the tree of the maximum size is pruned to the root node. The maximum size is determined by the stopping criterion. The sequence is optimay pruned since there is no other tree of the same size with ower cost for every size of tree in the sequence. At first, the earning sampe cost decreases as the size of the tree increases. However, the cost generay decreases sowy as the first termina nodes are removed, unti a point is reached when the cost rises rapidy upon remova of additiona nodes. This turning point can be used to define the best-sized tree. Aternativey, the CV costs can be used to identify the best tree in the sequence if cross-vaidation (CV) is performed at each step of the pruning process. This is caed as minima cost-compexity CV pruning. Generay, the CV cost fas sowy to a minimum vaue as termina nodes are removed, and then rises rapidy as the ast few nodes are removed. Thus, the best tree can be defined as the tree cosest to the minimum, i.e., the tree with the minimum CV cost. In addition, Breiman et a suggested that the best-sized tree can be identified as the smaest tree whose CV cost does not exceed the cost of the minimum CV cost tree pus one standard error of this tree s CV cost [28]. 4. Experiments 4.1. Data Description In this section, we present a rea project to which we appy SVM for quaity prediction. The metrics data used for the appication represents the resuts of an investigation of software for a Medica Imaging System (MIS). It was from the data and too CD of the book [3] and widey disseminated. The tota system consists of approximatey 45 routines amounting to about 4 ines of code written in Pasca, FORTRAN, assemby, and PL/M. From the set of programs written in Pasca and FORTRAN, a random sampe of 39 routines was seected for anaysis. These routines incude approximatey 4 ines of code. The software was deveoped over a period of five years, and was in commercia use at severa hundred sites for a period of three years [6]. In MIS data set which was coected by Randy Lind [32], the number of changes made to a modue, docu-

6 LOC TComm Hastead s program ength McCabe s cycomatic compexity CL MChar Hastead s estimated program ength Beady s bandwidth metric TChar x DChar Jensen s estimator of program ength Figure 4. The reationship between the metrics the number of mented as Change Reports (), was used as an indicator of the number of fauts introduced during deveopment [31]. The changes made to the routines were anayzed, and ony those that affected the executabe code were counted as fauts (aesthetic changes such as comments were not counted). Fig. 4 shows the reationships between the number of and the software compexity metrics. We can find that the ow software compexity metric corresponds to the sma number of. It is a obvious case in rea project. In addition to the change data, the foowing 11 software compexity metrics were measured for each of the modues:

7 ff Tota ines of code incuding comments (LOC) ff Tota code ines (CL) ff Tota character count (TChar) ff Tota comments (TComm) ff Number of comment characters (MChar) 1 5 non faut prone faut prone ff Number of code characters (DChar) ff Hastead s program ength (N), where N = N 1 + N 2 and N 1 represents a tota operator count, and N 2 represents a tota operand count [33] x 1 4 ff Hastead s estimated program ength ( ˆN), where ˆN = η 1 og 2 η 1 + η 2 og 2 η 2,andη 1 and η 2 represent the unique operator and operand count, respectivey [33]. ff Jensen s estimator of program ength (N F ), where N F = og 2 η 1! + og 2 η 2![34]. ff McCabe s cycomatic compexity (v(g)), where v(g) =e n + 2, and e is the number of edges in a contro fowgraph representation of a program with n nodes [35]. ff Beady s bandwidth metric (BW), where BW 1 = n il i i and L i represents the number of nodes at eve i in a nested contro fowgraph of n nodes [34]. This metric is indicative of the average eve of nesting or width of the contro fowgraph representation of the program. In cassifying a modue to be faut-prone or non fautprone, there are two types of errors that can be made in the partition. A Type I error is the case where we concude that a program modue is faut-prone when in fact it is not. A Type II error is the case where we beieve that a program modue is non faut-prone when in fact it is faut-prone. We denote the types of errors as T1ERR and T2ERR, respectivey. Of the two types of errors, Type II error has more serious impications, since a product woud be seem better than it actuay is, and testing effort woud not be directed where it woud be needed the most. The nature of the impacts of these error types suggests that the Type II error rate is more important than the Type I error rate in considering the quaity of a cassification mode. In the experiment, we consider those modues with or 1 to be non faut-prone, and those with from 1 to 98 to be faut-prone. For the MIS data used in the experiment, there are 114 non faut-prone modues and 89 fautprone modues. The distribution of these software compexity metrics of MIS software in the first three principa Figure 5. Distribution of MIS data set in first three principa components space components (PCs) space is shown in Fig. 5. The bootstrap technique [36] is appied in the experiment. The tota 23 sampes are divided into two parts, where haf independent random sampes drawn from each cass are used to train the SVM cassifier, and the remaining haf sampes are used as test sampes to cacuate correct cassification rate (CCR). The experiment is repeated 25 times with different random partitions and the mean and standard deviation of the cassification accuracy are reported The Comparison of Severa Methods Quadratic discriminant anaysis (QDA) is a widey used cassification technique when sufficient training sampes coud be suppied. In the experiment, firsty QDA is used to cassify the origina data directy. Tabe 1 shows that for cassification directy using QDA, the CCR coud achieve 85.49%, and the Type I error and Type II error are 7.37% and 7.14%, respectivey. Principa components anaysis (PCA) [37] can aso be appied. Munson and Khoshgoftaar found that software compexity metrics are actuay inear combinations of a sma number of underying orthogona metric domains [38]. To reduce the interreated effect, we adopt PCA to transform the origina compexity metrics space into an orthogona vector space. The principe of PCA is simpe. Let us assume the data set has a covariance matrix Σ,whichisa rea symmetric matrix and can be decomposed as foows: Σ = UΛU T ; (25) where Λ is a diagona matrix with the eigenvaues λ 1 ;λ 2 ; ;λ m on its diagona, U is an orthogona matrix where coumn j is the eigenvector associated with λ j,and U T is the transpose of U. The m eigenvectors in U give the coefficients that define m uncorreated inear combinations

8 Eigenvaue Eigenvaue index Tabe 1. The comparison of severa methods appied to software quaity prediction Methods CCR Std T1ERR T2ERR QDA 85.49% % 7.14% PCA+QDA 86.53% % 7.52% PCA+CART 83.2% % 6.41% SVM 89.% % 8.67% PCA+SVM 89.7% % 8.87% TSVM 9.3% % 7.86% Figure 6. Eigenvaue in decreasing order of the origina compexity metrics. These orthogona inear combinations are the principa components of Σ. An eement u ij of U gives the coefficient of the ith compexity metric in the jth principe component. λ j gives the amount of compexity metric variance that is expained by the jth principe component. In principa components anaysis, the eigenvaues aong the diagona of Λ form a decreasing series that expains a of the compexity data variance; that is, λ 1 > λ 2 > > λ m,and m j=1 λ j gives the tota variance in the compexity metric data. The first few principa components typicay expain a arge proportion of the tota observed variance. Thus, restricting our attention to the first few principa components can achieve a reduction in dimensionaity with an insignificant oss of variance. From Fig. 6, we can find that the first two PCs have ony.23% reconstruction error, so we choose them to define a 2-dimensiona subspace and form 2-dimensiona vectors in this subspace. Then QDA is used to compete the cassification. The experimenta resuts are shown in Tabe 1, where we can find that the composite cassifier PCA+QDA achieves higher CCR 86.53% than QDA. Cassification and regression trees (CART) anaysis, a powerfu nonparametric approach in cassification or prediction, is aso empoyed. We use PCA de-correated data asinputofcart,and obtain83.2%ccr, which is ower than that of PCA+QDA. Consequenty Type II error aso decines compared with PCA+QDA, as shown in Tabe 1. Furthermore, we discuss the approach in buiding software quaity prediction mode using SVM. Firsty, the origina data are directy empoyed as the input to SVM. Considering the adaptive capacity of SVM, Radia Basis Function (RBF) is seected as the kerne function. From Tabe 1 we can see that direct cassification by SVM coud achieve 89.% CCR. According to the appied hypothesis tests (ttest), the SVM method achieves a mean of the cassification accuracy in the vaidation set, which is significanty (α=.5) arger than that of the QDA method (p-vaue is Tabe 2. The cassification accuracy comparison of the three kernes of SVM Kerne function CCR Std T1ERR T2ERR Poynomia 7.74%.28.45% 28.81% Radia basis 88.68% % 8.67% Sigmoid 88.75% % 8.96% equa to 9: ). But Type II error using SVM is higher than that of QDA. As a comparison, we aso engage the dimension reduced data with PCA as the input of SVM. However, according to the hypothesis tests (t-test) appied, the cassification resut is not significanty improved (pvaue is equa to.96). The reason is that SVM can simuate a non-inear projection which can map ineary inseparabe data into a higher dimension space where the casses are ineary separabe. So data space transform has itte infuence on SVM. TSVM is a new method derived from SVM. When appying it to buid the cassifier, we find that the best CCR of 9.3% is achieved. But it is more time consuming for TSVM training than other methods The Comparison of the Three Kernes of SVM For three kinds of commony-used kerne functions that are mentioned in Section 2.3, we compare their performance in the experiment aso. Tabe 2 shows the experimenta resut, where we can ceary see that Radia Basis kerne function and Sigmoid kerne function a achieve exceent performance, which are significanty better than Poynomia kerne function Experiments with the Minimum Risk In practica case, Type II error often causes more serious consequence than Type I error does, so it is necessary to reduce Type II error. In Section 2.4, we introduce the

9 Tabe 3. SVM with the risk feature C 1 C 2 CCR Std T1ERR T2ERR % % 5.1% % % 7.52% % % 8.67% % % 8.87% % % 8.87% Tabe 4. The Bayesian decision with the minimum risk Risk ratio CCR Std T1ERR T2ERR 1: % % 6.47% 1: % % 5.14% 1: % % 3.37% 1: % % 1.57% 1: % %.27% SVM theory combined with error risk contro. In this experiment, we appy the theory to adjust Type II error. Tabe 3 shows the experimenta resut. When C 1 and C 2 are equa to 2, 89.7% CCR is achieved, which is the optima soution of SVM. But in this case Type II error is much arger than the Type I error. However, we can adjust C 1 to reduce Type II error. From Tabe 3, we find that when C 1 is reduced graduay, CCR aso reduces, but this eads to the increase of Type I error. When C 1 is reduced to 5, CCR is changed to 86.53%, where ow Type II error 5.1% is achieved. As a comparison, we aso empoy the Bayesian decision with the minimum risk to buid a quaity prediction mode. The resuts are shown in Tabe 4, where the first coumn is the risk ratio of Type I error versus Type II error. We can observe that SVM with risk is superior to the Bayesian decision based on the minimum risk in the cassification performance. Nevertheess, the Bayesian decision can adjust type II error to a very ow vaue at the cost of ower CCR and higher Type I error. 5. Concusions A nove technique for software quaity prediction is proposed in this paper. This methodoogy is based on support vector machine. The vaidity and robustness of SVM make it a meaningfu too for rea-word appications in software quaity prediction. Firsty, SVM is adaptive to modeing noninear functiona reationships which are difficut to mode with other techniques. Secondy, SVM generaizes we even in high dimensiona spaces under sma training sampe conditions. Consequenty, software quaity prediction modes can be buit much earier with SVM than other conventiona techniques. Furthermore, as a new approach, Transductive SVM (TSVM) takes into account particuar test sampes as we as training sampes in buiding cassifiers. Thirdy, the SVM-based software quaity prediction mode achieves a reativey good performance. According to the hypothesis tests (t-test) appied, the cassification resuts of the SVM are better than those of either QDA or a cassification tree. Finay, we can contro Type II error by adjusting the error penaty parameter C of SVM, which can achieve better cassification performancethan using the minimum-risk-based Bayesian decision when considering both CCR and Type II error. To summarize, a the above characteristics show that the new approach which has never been expored in the software engineering fieds offers a very promising technique in software quaity prediction. We beieve that our method can be extensivey appied in many software engineering fieds. Acknowedgements This research work described in this paper was fuy supported by a grant from the Nationa Natura Science Foundation of China (Project No ) and a grant from Hong Kong Research Grants Counci (Project No. CUHK425/4E). References [1] N. E. Fenton and S. L. Pfeeger, Software metrics: a rigorous and practica approach, 2nd ed. Boston, MA: PWS Pubishing Co., [2] V. Y. Shen, T. J. Yu, S. M. Thebaut, and L. R. Pausen, Identifying error-prone software an empirica study, IEEE Transactions on Software Engineering, vo. SE-11, no. 4, pp , apr [3] T. M. Khoshgoftaar and E. B. Aen, Cassification of faut-prone software modues: Prior probabiities, costs, and mode evauation, Empirica Software Engineering, vo. 3, no. 3, pp , September [4] L. C. Briand, V. R. Basii, and C. Hetmanski, Deveoping interpretabe modes for optimized set reduction for identifying high-risk software components, IEEE Transactions on Software Engineering, vo. SE-19, no. 11, pp , [5] J. Munson and T. Khoshgoftaar, The detection of fautprone programs, IEEE Transactions on Software Engineering, vo. SE-18, no. 5, pp , [6] T. Khoshgoftaar and J. Munson, Predicting software deveopment error using software compexity metrics, IEEE Transactions on Software Engineering, vo. 8, no. 2, pp , 199. [7] T. M. Khoshgoftaar, Improving usefuness of software

10 quaity cassification modes based on booean discriminant functions, in Internationa Symposium on Software Reiabiity Engineering, (ISSRE 2), 22, pp [8] T. M. Khoshgoftaar, R. Shan, and E. B. Aen, Improving tree-based modes of software quaity with principa components anaysis, in Internationa Symposium on Software Reiabiity Engineering, (ISSRE ), 2, pp [9] T. M. Khoshgoftaar, V. Thaker, and E. B. Aen, Modeing faut-prone modues of subsystems, in Internationa Symposium on Software Reiabiity Engineering, (ISSRE ), 2, pp [1] L. C. Briand, V. R. Basii, and W. M. Thomas, A pattern recognition approach for software engineering data anaysis, IEEE Transactions on Software Engineering, vo.se- 18, no. 11, pp , [11] P. Guo and M. R. Lyu, Software quaity prediction using mixture mode with em agorithm, in Proceedings of the First Asia-Pacific Conference on Quaity Software,(APAQS 2), Hong Kong, 2, pp [12] T. M. Khoshgoftaar, D. L. Lanning, and A. S. Pandya, A comparative study of pattern recognition techniques for quaity evauation of teecommunications software, IEEE Journa on Seected Areas in Communications, vo. 12, no. 2, pp , [13] L. Guo, Y. Ma, B. Cukic, and H. Singh, Robust prediction of faut-proneness by random forests, in Internationa Symposium on Software Reiabiity Engineering, (ISSRE 4), 24, pp [14] I. Myrtveit, E. Stensrud, and M. Shepperd, Reiabiity and vaidity in comparative studies of software prediction modes, IEEE Transactions on Software Engineering, vo. 31, no. 5, pp , 25. [15] C. Cortes and V. Vapnik, Support-vector network, Machine Learning, vo. 2, pp , [16] S. Dumais, Using svms for text categorization, IEEE Inteigent Systems, vo. 13, no. 4, pp , [17] M. Ponti and A. Verri, Support vector machines for 3d object recognition, IEEE Transactions on Pattern Anaysis & Machine Inteigence, vo. 2, no. 6, pp , [18] H. Drucker, D. Wu, and V. N. Vapnik, Support vector machines for spam categorization, IEEE Transactions on Neura Networks, vo. 1, no. 5, pp , [19] F. Xing and P. Guo, Cassification of stear spectra data using svm, in Internationa Symposium on Neura Networks (ISNN 24), ser. Lecture Notes in Computer Science, vo Berin, Heideberger: Springer-Verag, 24, pp [2] V. N. Vapnik, The Nature of Statistica Learning Theory. New York: Springer-Verag, [21] T. Joachims, Transductive inference for text cassification using support vector machines, in Proceedings of the 16th Internationa Conference on Machine Learning, (ICML 99), Bed, Sovenia, 1999, pp [22] T. Joachims, Ed., Learning to Cassify Text using Support Vector Machines: Methods, Theory, and Agorithms. Kuwer, may 22. [23] S. Aeberhard, D. Coomans, and V. O. de, Comparative anaysis of statistica pattern recognition methods in high dimensiona settings, Pattern Recognition, vo. 27, no. 8, pp , [24] X. Wang, F. Xing, and P. Guo, Comparison of discriminant anaysis methods appied to stear data cassification, in Third Internationa Symposium on Mutispectra Image Processing and Pattern Recognition (MIPPR 3), ser. Proceedings of SPIE, vo Beingham, WA: The Internationa Society for Optica Engineering, 23, pp [25] K. Fukunaga, Introduction to Statistica Pattern Recognition, 2nd ed. Boston: Academic Press, 199. [26] T. M. Khoshgoftaar and E. B. Aen, Predicting faut-prone software modues in embedded systems with cassification trees, in Proceedings of Fourth Internationa Symposium on High-Assurance Systems Engineering, Washington, DC USA, 1999, pp [27] A. P. Worth and M. T. D. Cronin, The use of discriminant anaysis, ogistic regression and cassification tree anaysis in the deveopment of cassification modes for human heath effects, Journa of Moecuar Structure(Theochem), vo.622, pp , 23. [28] L. Breiman, J. H. Friedman, R. A. Oshen, and C. J. Stone, Cassification and Regression Trees. Caifornia: Wadsworth, Inc., [29] L. W. Y. and S. Y. S., Spit seection methods for cassification trees, Statistica Sinica, vo. 7, pp , [3] M. R. Lyu, Ed., Handbook of Software Reiabiity Engineering. IEEE Computer Society Press and McGraw-Hi Book Company, [31] V. R. Basii and D. H. Hutchens, An empirica study of a syntactic compexity famiy, IEEE Transactions on Software Engineering, vo. SE-9, no. 6, pp , nov [32] R. K. Lind, An experimenta study of software metrics and their reationship to software error, Master s thesis, University of Wisconsin-Miwaukee, Miwaukee, Dec [33] M. H. Hastead, Eements of Software Science. NewYork: Esevier, [34] H. Jensen and K. Vairavan, An experimenta study of software metrics for rea-time software, IEEE Transactions on Software Engineering, vo. SE-11, no. 2, pp , feb [35] T. J. McCabe, A compexity measure, IEEE Transactions on Software Engineering, vo. SE-2, no. 4, pp , [36] B. Efron and R. J. Tibshirani, An introduction to the Bootstrap, Chapman and Ha, [37] I. Joiffe, Principa Component Anaysis. New York: Springer-Verag, [38] J. C. Munson and T. M. Khoshgoftaar, The dimensionaity of program compexity, in Proc. 11th Internationa Conference on Software Engineering, Pittsburgh, 1989, pp

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

Automatic Grouping for Social Networks CS229 Project Report

Automatic Grouping for Social Networks CS229 Project Report Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct

More information

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

A Novel Linear-Polynomial Kernel to Construct Support Vector Machines for Speech Recognition

A Novel Linear-Polynomial Kernel to Construct Support Vector Machines for Speech Recognition Journa of Computer Science 7 (7): 99-996, 20 ISSN 549-3636 20 Science Pubications A Nove Linear-Poynomia Kerne to Construct Support Vector Machines for Speech Recognition Bawant A. Sonkambe and 2 D.D.

More information

MACHINE learning techniques can, automatically,

MACHINE learning techniques can, automatically, Proceedings of Internationa Joint Conference on Neura Networks, Daas, Texas, USA, August 4-9, 203 High Leve Data Cassification Based on Network Entropy Fiipe Aves Neto and Liang Zhao Abstract Traditiona

More information

Image Segmentation Using Semi-Supervised k-means

Image Segmentation Using Semi-Supervised k-means I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging

More information

Response Surface Model Updating for Nonlinear Structures

Response Surface Model Updating for Nonlinear Structures Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

Binarized support vector machines

Binarized support vector machines Universidad Caros III de Madrid Repositorio instituciona e-archivo Departamento de Estadística http://e-archivo.uc3m.es DES - Working Papers. Statistics and Econometrics. WS 2007-11 Binarized support vector

More information

Research of Classification based on Deep Neural Network

Research of  Classification based on Deep Neural Network 2018 Internationa Conference on Sensor Network and Computer Engineering (ICSNCE 2018) Research of Emai Cassification based on Deep Neura Network Wang Yawen Schoo of Computer Science and Engineering Xi

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

GPU Implementation of Parallel SVM as Applied to Intrusion Detection System

GPU Implementation of Parallel SVM as Applied to Intrusion Detection System GPU Impementation of Parae SVM as Appied to Intrusion Detection System Sudarshan Hiray Research Schoar, Department of Computer Engineering, Vishwakarma Institute of Technoogy, Pune, India sdhiray7@gmai.com

More information

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions 2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing

More information

Semi-Supervised Learning with Sparse Distributed Representations

Semi-Supervised Learning with Sparse Distributed Representations Semi-Supervised Learning with Sparse Distributed Representations David Zieger dzieger@stanford.edu CS 229 Fina Project 1 Introduction For many machine earning appications, abeed data may be very difficut

More information

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters Optimization and Appication of Support Vector Machine Based on SVM Agorithm Parameters YAN Hui-feng 1, WANG Wei-feng 1, LIU Jie 2 1 ChongQing University of Posts and Teecom 400065, China 2 Schoo Of Civi

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

A Petrel Plugin for Surface Modeling

A Petrel Plugin for Surface Modeling A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica

More information

A Column Generation Approach for Support Vector Machines

A Column Generation Approach for Support Vector Machines A Coumn Generation Approach for Support Vector Machines Emiio Carrizosa Universidad de Sevia (Spain). ecarrizosa@us.es Beén Martín-Barragán Universidad de Sevia (Spain). bemart@us.es Doores Romero Moraes

More information

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES Eya En Gad, Akshay Gadde, A. Saman Avestimehr and Antonio Ortega Department of Eectrica Engineering University of Southern

More information

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study

More information

Automatic Hidden Web Database Classification

Automatic Hidden Web Database Classification Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,

More information

Quaternion Support Vector Classifier

Quaternion Support Vector Classifier Quaternion Support Vector Cassifier G. López-Gonzáez, Nancy Arana-Danie, and Eduardo Bayro-Corrochano CINVESTAV - Unidad Guadaajara, Av. de Bosque 1145, Coonia e Bajo, Zapopan, Jaisco, México {geopez,edb}@gd.cinvestav.mx

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

A HYBRID FEATURE SELECTION METHOD BASED ON FISHER SCORE AND GENETIC ALGORITHM

A HYBRID FEATURE SELECTION METHOD BASED ON FISHER SCORE AND GENETIC ALGORITHM Journa of Mathematica Sciences: Advances and Appications Voume 37, 2016, Pages 51-78 Avaiabe at http://scientificadvances.co.in DOI: http://dx.doi.org/10.18642/jmsaa_7100121627 A HYBRID FEATURE SELECTION

More information

Improvement of Nearest-Neighbor Classifiers via Support Vector Machines

Improvement of Nearest-Neighbor Classifiers via Support Vector Machines From: FLAIRS-01 Proceedings. Copyright 2001, AAAI (www.aaai.org). A rights reserved. Improvement of Nearest-Neighbor Cassifiers via Support Vector Machines Marc Sebban and Richard Nock TRIVIA-Department

More information

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method 297 Rea-Time Feature escriptor Matching via a Muti-Resoution Ehaustive Search Method Chi-Yi Tsai, An-Hung Tsao, and Chuan-Wei Wang epartment of Eectrica Engineering, Tamang University, New Taipei City,

More information

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction

More information

Comparative Analysis of Relevance for SVM-Based Interactive Document Retrieval

Comparative Analysis of Relevance for SVM-Based Interactive Document Retrieval Comparative Anaysis for SVM-Based Interactive Document Retrieva Paper: Comparative Anaysis of Reevance for SVM-Based Interactive Document Retrieva Hiroshi Murata, Takashi Onoda, and Seiji Yamada Centra

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

Modification of Support Vector Machine for Microarray Data Analysis

Modification of Support Vector Machine for Microarray Data Analysis Goba Journa of Computer Science and Technoogy Hardware & Computation Voume 13 Issue 1 Version 1.0 Year 2013 Type: Doube Bind Peer Reviewed Internationa Research Journa Pubisher: Goba Journas Inc. (USA)

More information

On-Chip CNN Accelerator for Image Super-Resolution

On-Chip CNN Accelerator for Image Super-Resolution On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

Digital Image Watermarking Algorithm Based on Fast Curvelet Transform

Digital Image Watermarking Algorithm Based on Fast Curvelet Transform J. Software Engineering & Appications, 010, 3, 939-943 doi:10.436/jsea.010.310111 Pubished Onine October 010 (http://www.scirp.org/journa/jsea) 939 igita Image Watermarking Agorithm Based on Fast Curveet

More information

Massively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks.

Massively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks. assivey Parae Part of Speech Tagging Using in-ax oduar Neura Networks Bao-Liang Lu y, Qing a z, ichinori Ichikawa y, & Hitoshi Isahara z y Lab. for Brain-Operative Device, Brain Science Institute, RIEN

More information

Fast Methods for Kernel-based Text Analysis

Fast Methods for Kernel-based Text Analysis Proceedings of the 41st Annua Meeting of the Association for Computationa Linguistics, Juy 2003, pp. 24-31. Fast Methods for Kerne-based Text Anaysis Taku Kudo and Yuji Matsumoto Graduate Schoo of Information

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162 oward Efficient Spatia Variation Decomposition via Sparse Regression Wangyang Zhang, Karthik Baakrishnan, Xin Li, Duane Boning and Rob Rutenbar 3 Carnegie Meon University, Pittsburgh, PA 53, wangyan@ece.cmu.edu,

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing 100039, China shentao@casm.ac.cn Xu Dehe Institute of resources and environment, North

More information

Evolving Role Definitions Through Permission Invocation Patterns

Evolving Role Definitions Through Permission Invocation Patterns Evoving Roe Definitions Through Permission Invocation Patterns Wen Zhang EECS Dept. Vanderbit University Nashvie, TN, USA wen.zhang.1@vanderbit.edu David Liebovitz Dept. of Medicine Northwestern University

More information

Transformation Invariance in Pattern Recognition: Tangent Distance and Propagation

Transformation Invariance in Pattern Recognition: Tangent Distance and Propagation Transformation Invariance in Pattern Recognition: Tangent Distance and Propagation Patrice Y. Simard, 1 Yann A. Le Cun, 2 John S. Denker, 2 Bernard Victorri 3 1 Microsoft Research, 1 Microsoft Way, Redmond,

More information

Quality of Service Evaluations of Multicast Streaming Protocols *

Quality of Service Evaluations of Multicast Streaming Protocols * Quaity of Service Evauations of Muticast Streaming Protocos Haonan Tan Derek L. Eager Mary. Vernon Hongfei Guo omputer Sciences Department University of Wisconsin-Madison, USA {haonan, vernon, guo}@cs.wisc.edu

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism Backing-up Fuzzy Contro of a Truck-traier Equipped with a Kingpin Siding Mechanism G. Siamantas and S. Manesis Eectrica & Computer Engineering Dept., University of Patras, Patras, Greece gsiama@upatras.gr;stam.manesis@ece.upatras.gr

More information

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER Internationa Journa on Technica and Physica Probems of Engineering (IJTPE) Pubished by Internationa Organization of IOTPE ISSN 077-358 IJTPE Journa www.iotpe.com ijtpe@iotpe.com September 014 Issue 0 Voume

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

Endoscopic Motion Compensation of High Speed Videoendoscopy

Endoscopic Motion Compensation of High Speed Videoendoscopy Endoscopic Motion Compensation of High Speed Videoendoscopy Bharath avuri Department of Computer Science and Engineering, University of South Caroina, Coumbia, SC - 901. ravuri@cse.sc.edu Abstract. High

More information

Sequential Approximate Multiobjective Optimization using Computational Intelligence

Sequential Approximate Multiobjective Optimization using Computational Intelligence The Ninth Internationa Symposium on Operations Research and Its Appications (ISORA 10) Chengdu-Jiuzhaigou, China, August 19 23, 2010 Copyright 2010 ORSC & APORC, pp. 1 12 Sequentia Approximate Mutiobjective

More information

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

SOFT SENSOR DEVELOPMENT AND OPTIMIZATION OF THE COMMERCIAL PETROCHEMICAL PLANT INTEGRATING SUPPORT VECTOR REGRESSION AND GENETIC ALGORITHM

SOFT SENSOR DEVELOPMENT AND OPTIMIZATION OF THE COMMERCIAL PETROCHEMICAL PLANT INTEGRATING SUPPORT VECTOR REGRESSION AND GENETIC ALGORITHM From the SeectedWorks of Dr. Sandip Kumar Lahiri 2009 SOFT SENSOR DEVELOPMENT AND OPTIMIZATION OF THE COMMERCIAL PETROCHEMICAL PLANT INTEGRATING SUPPORT VECTOR REGRESSION AND GENETIC ALGORITHM sandip k

More information

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations Formuation of Loss minimization Probem Using Genetic Agorithm and Line-Fow-based Equations Sharanya Jaganathan, Student Member, IEEE, Arun Sekar, Senior Member, IEEE, and Wenzhong Gao, Senior member, IEEE

More information

Chapter Multidimensional Direct Search Method

Chapter Multidimensional Direct Search Method Chapter 09.03 Mutidimensiona Direct Search Method After reading this chapter, you shoud be abe to:. Understand the fundamentas of the mutidimensiona direct search methods. Understand how the coordinate

More information

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department

More information

Efficient Histogram-based Indexing for Video Copy Detection

Efficient Histogram-based Indexing for Video Copy Detection Efficient Histogram-based Indexing for Video Copy Detection Chih-Yi Chiu, Jenq-Haur Wang*, and Hung-Chi Chang Institute of Information Science, Academia Sinica, Taiwan *Department of Computer Science and

More information

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae

More information

Pneumo-Mechanical Simulation of a 2 Dof Planar Manipulator

Pneumo-Mechanical Simulation of a 2 Dof Planar Manipulator Pneumo-Mechanica Simuation of a 2 Dof Panar Manipuator Hermes GIBERTI, Simone CINQUEMANI Mechanica Engineering Department, Poitecnico di Miano, Campus Bovisa Sud, via La Masa 34, 2156, Miano, Itay ABSTRACT

More information

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y. FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four

More information

A study of comparative evaluation of methods for image processing using color features

A study of comparative evaluation of methods for image processing using color features A study of comparative evauation of methods for image processing using coor features FLORENTINA MAGDA ENESCU,CAZACU DUMITRU Department Eectronics, Computers and Eectrica Engineering University Pitești

More information

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:

More information

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line American J. of Engineering and Appied Sciences 3 (): 5-24, 200 ISSN 94-7020 200 Science Pubications Appication of Inteigence Based Genetic Agorithm for Job Sequencing Probem on Parae Mixed-Mode Assemby

More information

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) botton@poms.uc.ac.be Bernard

More information

An Introduction to Design Patterns

An Introduction to Design Patterns An Introduction to Design Patterns 1 Definitions A pattern is a recurring soution to a standard probem, in a context. Christopher Aexander, a professor of architecture Why woud what a prof of architecture

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

TSR: Topology Reduction from Tree to Star Data Grids

TSR: Topology Reduction from Tree to Star Data Grids 03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen

More information

Solutions to the Final Exam

Solutions to the Final Exam CS/Math 24: Intro to Discrete Math 5//2 Instructor: Dieter van Mekebeek Soutions to the Fina Exam Probem Let D be the set of a peope. From the definition of R we see that (x, y) R if and ony if x is a

More information

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-7435 Voume 10 Issue 16 BioTechnoogy 014 An Indian Journa FULL PAPER BTAIJ, 10(16), 014 [999-9307] Study on prediction of type- fuzzy ogic power system based

More information

QoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization

QoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization QoS-Aware Data Transmission and Wireess Energy Transfer: Performance Modeing and Optimization Dusit Niyato, Ping Wang, Yeow Wai Leong, and Tan Hwee Pink Schoo of Computer Engineering, Nanyang Technoogica

More information

A Robust Sign Language Recognition System with Sparsely Labeled Instances Using Wi-Fi Signals

A Robust Sign Language Recognition System with Sparsely Labeled Instances Using Wi-Fi Signals A Robust Sign Language Recognition System with Sparsey Labeed Instances Using Wi-Fi Signas Jiacheng Shang, Jie Wu Center for Networked Computing Dept. of Computer and Info. Sciences Tempe University Motivation

More information

Sparse Representation based Face Recognition with Limited Labeled Samples

Sparse Representation based Face Recognition with Limited Labeled Samples Sparse Representation based Face Recognition with Limited Labeed Sampes Vijay Kumar, Anoop Namboodiri, C.V. Jawahar Center for Visua Information Technoogy, IIIT Hyderabad, India Abstract Sparse representations

More information

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages Fuzzy Equivaence Reation Based Custering and Its Use to Restructuring Websites Hyperinks and Web Pages Dimitris K. Kardaras,*, Xenia J. Mamakou, and Bi Karakostas 2 Business Informatics Laboratory, Dept.

More information

FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES

FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES Tien Sy Nguyen, Stéphane Begot, Forent Ducuty, Manue Avia To cite this version: Tien Sy Nguyen, Stéphane Begot, Forent

More information

MULTITASK MULTIVARIATE COMMON SPARSE REPRESENTATIONS FOR ROBUST MULTIMODAL BIOMETRICS RECOGNITION. Heng Zhang, Vishal M. Patel and Rama Chellappa

MULTITASK MULTIVARIATE COMMON SPARSE REPRESENTATIONS FOR ROBUST MULTIMODAL BIOMETRICS RECOGNITION. Heng Zhang, Vishal M. Patel and Rama Chellappa MULTITASK MULTIVARIATE COMMON SPARSE REPRESENTATIONS FOR ROBUST MULTIMODAL BIOMETRICS RECOGNITION Heng Zhang, Visha M. Pate and Rama Cheappa Center for Automation Research University of Maryand, Coage

More information

Minimizing Resource Cost for Camera Stream Scheduling in Video Data Center

Minimizing Resource Cost for Camera Stream Scheduling in Video Data Center Gao YH, Ma HD, Liu W. Minimizing resource cost for camera stream scheduing in video data center. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 555 570 May 2017. DOI 10.1007/s11390-017-1743-x Minimizing

More information

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM JOINT IMAGE REGISTRATION AND AMPLE-BASED SUPER-RESOLUTION ALGORITHM Hyo-Song Kim, Jeyong Shin, and Rae-Hong Park Department of Eectronic Engineering, Schoo of Engineering, Sogang University 35 Baekbeom-ro,

More information

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing Rea-Time Image Generation with Simutaneous Video Memory Read/rite Access and Fast Physica Addressing Mountassar Maamoun 1, Bouaem Laichi 2, Abdehaim Benbekacem 3, Daoud Berkani 4 1 Department of Eectronic,

More information

(0,l) (0,0) (l,0) (l,l)

(0,l) (0,0) (l,0) (l,l) Parae Domain Decomposition and Load Baancing Using Space-Fiing Curves Srinivas Auru Fatih E. Sevigen Dept. of CS Schoo of EECS New Mexico State University Syracuse University Las Cruces, NM 88003-8001

More information

ESTABLISHMENT OF EFFECTIVE METAMODELS FOR SEAKEEPING PERFORMANCE IN MULTIDISCIPLINARY SHIP DESIGN OPTIMIZATION

ESTABLISHMENT OF EFFECTIVE METAMODELS FOR SEAKEEPING PERFORMANCE IN MULTIDISCIPLINARY SHIP DESIGN OPTIMIZATION Journa of Marine Science and Technoogy, Vo., No., pp. - () DOI:./JMST--- ESTABLISHMENT OF EFFECTIVE METAMODELS FOR SEAKEEPING PERFORMANCE IN MULTIDISCIPLINARY SHIP DESIGN OPTIMIZATION Dongqin Li, Phiip

More information

FACE RECOGNITION WITH HARMONIC DE-LIGHTING. s: {lyqing, sgshan, wgao}jdl.ac.cn

FACE RECOGNITION WITH HARMONIC DE-LIGHTING.  s: {lyqing, sgshan, wgao}jdl.ac.cn FACE RECOGNITION WITH HARMONIC DE-LIGHTING Laiyun Qing 1,, Shiguang Shan, Wen Gao 1, 1 Graduate Schoo, CAS, Beijing, China, 100080 ICT-ISVISION Joint R&D Laboratory for Face Recognition, CAS, Beijing,

More information

A Method for Calculating Term Similarity on Large Document Collections

A Method for Calculating Term Similarity on Large Document Collections $ A Method for Cacuating Term Simiarity on Large Document Coections Wofgang W Bein Schoo of Computer Science University of Nevada Las Vegas, NV 915-019 bein@csunvedu Jeffrey S Coombs and Kazem Taghva Information

More information

Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering

Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering Kin-Hon Ho, Michae Howarth, Ning Wang, George Pavou and Styianos Georgouas Centre for Communication Systems Research, University

More information

MCSE Training Guide: Windows Architecture and Memory

MCSE Training Guide: Windows Architecture and Memory MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the

More information

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Nattawut Thepayasuwan, Member, IEEE and Aex Doboi, Member, IEEE Abstract

More information

Alpha labelings of straight simple polyominal caterpillars

Alpha labelings of straight simple polyominal caterpillars Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.

More information

Development of a hybrid K-means-expectation maximization clustering algorithm

Development of a hybrid K-means-expectation maximization clustering algorithm Journa of Computations & Modeing, vo., no.4, 0, -3 ISSN: 79-765 (print, 79-8850 (onine Scienpress Ltd, 0 Deveopment of a hybrid K-means-expectation maximization custering agorithm Adigun Abimboa Adebisi,

More information

Support Vector Regression for Software Reliability Growth Modeling and Prediction

Support Vector Regression for Software Reliability Growth Modeling and Prediction Support Vector Regression for Software Reliability Growth Modeling and Prediction 925 Fei Xing 1 and Ping Guo 2 1 Department of Computer Science Beijing Normal University, Beijing 100875, China xsoar@163.com

More information

Quality Assessment using Tone Mapping Algorithm

Quality Assessment using Tone Mapping Algorithm Quaity Assessment using Tone Mapping Agorithm Nandiki.pushpa atha, Kuriti.Rajendra Prasad Research Schoar, Assistant Professor, Vignan s institute of engineering for women, Visakhapatnam, Andhra Pradesh,

More information

A probabilistic fuzzy method for emitter identification based on genetic algorithm

A probabilistic fuzzy method for emitter identification based on genetic algorithm A probabitic fuzzy method for emitter identification based on genetic agorithm Xia Chen, Weidong Hu, Hongwen Yang, Min Tang ATR Key Lab, Coege of Eectronic Science and Engineering Nationa University of

More information

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models On Upper Bounds for Assortment Optimization under the Mixture of Mutinomia Logit Modes Sumit Kunnumka September 30, 2014 Abstract The assortment optimization probem under the mixture of mutinomia ogit

More information

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University Arithmetic Coding Prof. Ja-Ling Wu Department of Computer Science and Information Engineering Nationa Taiwan University F(X) Shannon-Fano-Eias Coding W..o.g. we can take X={,,,m}. Assume p()>0 for a. The

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

Collinearity and Coplanarity Constraints for Structure from Motion

Collinearity and Coplanarity Constraints for Structure from Motion Coinearity and Copanarity Constraints for Structure from Motion Gang Liu 1, Reinhard Kette 2, and Bodo Rosenhahn 3 1 Institute of Information Sciences and Technoogy, Massey University, New Zeaand, Department

More information

Layer-Specific Adaptive Learning Rates for Deep Networks

Layer-Specific Adaptive Learning Rates for Deep Networks Layer-Specific Adaptive Learning Rates for Deep Networks arxiv:1510.04609v1 [cs.cv] 15 Oct 2015 Bharat Singh, Soham De, Yangmuzi Zhang, Thomas Godstein, and Gavin Tayor Department of Computer Science Department

More information

Space-Time Trade-offs.

Space-Time Trade-offs. Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

An Exponential Time 2-Approximation Algorithm for Bandwidth

An Exponential Time 2-Approximation Algorithm for Bandwidth An Exponentia Time 2-Approximation Agorithm for Bandwidth Martin Fürer 1, Serge Gaspers 2, Shiva Prasad Kasiviswanathan 3 1 Computer Science and Engineering, Pennsyvania State University, furer@cse.psu.edu

More information