Set-based Approach for Lossless Graph Summarization using Locality Sensitive Hashing

Size: px
Start display at page:

Download "Set-based Approach for Lossless Graph Summarization using Locality Sensitive Hashing"

Transcription

1 Set-baed Approach for Lole Graph Summarization uing Locality Senitive Hahing Kifayat Ullah Khan Supervior: Young-Koo Lee Expected Graduation Date: Fall 0 Deptartment of Computer Engineering Kyung Hee Univerity Republic of Korea {kualizai, yklee}@khu.ac.kr Abtract Graph ummarization i a valuable approach for in-memory proceing of a big graph. A ummary graph i compact, yet it maintain the overall characteritic of the underlying graph, thu uitable for querying and viualization. To ummarize a big graph, the idea i to compre the imilar node in dene region of the graph. The exiting approache find thee imilar node either by node ordering or pair-wie imilarity computation. The former approache are calable but cannot imultaneouly conider the attribute and neighborhood imilarity among the node. In contrat, the pair-wie ummarization method can conider both the imilarity apect but are impractical for a big graph. In thi paper, we propoe a etbaed ummarization method that aggregate the et of imilar node in each iteration, thu provide calability. To find each et, we approximate the candidate imilar node without node ordering and explicit imilarity computation by uing Locality Senitive Hahing, LSH. In conjunction with an information theoretic approach, we preent the calable olution for lole ummarization of both attributed and non-attributed graph. I. INTRODUCTION With a continuou and overwhelming interet from people with divere background, the graph like ocial network, world wide web, academic, citation network, and chemical compound have become ubiquitou. Furthermore, with each blink of a human eye, the ize of thee graph i continuouly increaing. A a reult, thee graph have haped into knowledge warehoue ince their every change i triggered by the real life neceitie. However, retrieving the right information at right time i hard, ince the maive ize doe not allow their in-memory proceing. In thi ituation, graph ummarization i a valuable olution for in-memory proceing of a big graph. It compree a large ized graph into a compact ummary, and maintain the propertie of it underlying graph. Such compact verion i ueful to identify communitie and influential node, information propagation and viualization. The dene homogenou region in the graph play the key role for their ummarization. There exit a high overlap of common neighborhood among the node in uch region, which i directly exploited toward compreion. The exiting work i claified into two main tream to find uch dene region, i.e. compreion-baed and aggregation-baed. The 0 Correponding Author: Young-Koo Lee Total number of minute pent on Facebook each month: 0 Million. Lat acceed on 0//0 goal of compreion-baed method i to find an intrinic ordering of the node in a graph, o that the compreion algorithm can exploit the naturally occurring propertie like locality of reference and neighborhood imilarity. There exit a plethora of reearch work on thi apect [] [] [] [] [], however the ordering produced by combining the Layered Label Propagation and WebGraph framework in [] provide better compreion than all the exiting technique []. On the other hand, the aggregation-baed method perform pair-wie ummarization to collape a pair of node into a uper node and their correponding edge into a uper edge [] [] [0] []. Thee method create a highly compact ummary graph which i directly ueable for querying and viualization. We undertand that the trength and weaknee of both the compreion and aggregation-baed method, alo depend on the type of the graph. In cae of a non-attributed graph, the former approache are highly calable but doe not upport direct querying and viualization ince the compreed graph i tored in a compact data tructure. Furthermore, the low degree node are alo caue of in-compreibility, pecially in ocial network []. However, the pair-wie uper node creation technique i inenitive to the degree of the node and compree both the node and edge into a ummary graph. Unfortunately, the pair-wie aggregation method i impractical to ummarize a big graph. On the other hand, the node ordering cannot conider the attribute imilarity among the node when applied to a graph where each node i attached with multiple attribute. In thi ituation, the pair-wie method provide a uperior performance ince each pair-wie merge can invetigate both the neighborhood and attribute imilarity. Conidering thee fact, it i deirable to have a unified graph ummarization olution which i not only calable but alo applicable to variety of the graph, with ome minor modification. In thi paper, we preent a novel et-baed graph ummarization technique to iteratively aggregate the Set of Similar Node, SSN. A et-baed method i effective ince aggregating multiple node, facilitate efficient traveral of the entire graph for it fat ummarization. Since, the member node of a given et can have intra-connection apart from having common neighbor, o the propoed approach i uitable to identify any dene ubgraph tructure like clique, γ clique and bipartite ubgraph. However, locating uch et i the major challenge without node ordering and explicit imilarity computation. For thi purpoe, we find each SSN by approximating the

2 0 (a ) 0 0 = {,,, } + (, ) - (, ) a (a ) v - (, ) Fig.. Set-baed approach to compre Graph G (V, E, A) Set of node with maximum ame attribute Compreion uing uper node Set of node having unique attribute for each node Compreion uing virtual node Candidate Set of Similar Node, CSSN, uing LSH. Since LSH i an approximate technique o each CSSN may contain node with varying imilaritie among each other. For thi purpoe, we propoe a pruning technique baed on a heuritic that focue the imilaritie of degree of node, to filter out a SSN from each CSSN. In cae of an attributed graph, LSH cannot imultaneouly conider both the neighborhood and attribute imilarity among the node. To olve thi problem, we modify it hahing cheme to generate SSN, containing node having high neighborhood a well a attribute imilaritie. For ummarization, we ue the information theoretic Minimum Decription Length, M DL, principle that produce a highly compact ummary graph with correction. In cae of nonattributed graph, MDL facilitate merging a SSN into a uper node with leat edge correction. Similarly for a multi-attributed graph, MDL help to compre a SSN into a uper node or aggregate it edge by adding a new virtual node, baed on highet compreion with leat attribute and edge correction. II. 0 MDL RULES AND PROBLEM STATEMENT A. MDL Rule for a Summary Graph MDL i an information theoretic principle ued to minimize the um of the ize of the theory and the aociated data to expre the knowledge. In cae of graph, the minimized theory i the ummary graph and the lit of correction i the aociated data to recontruct the original graph, if required. Our objective to ue MDL for graph ummarization i to create a compact ummary graph with leat correction. Below, we explain the MDL rule for an attributed graph which are applicable for a non-attributed graph, while ignoring the detail related to attribute and edge aggregation uing a virtual node. Following MDL explanation i adopted from [] but we modify it for attribute, virtual node and ummary graph with leat edge correction. We do not provide the comparative analyi due to lack of pace An undirected graph G(V, E, A) conit of node V and edge E where each v V i attached with the lit of attribute A. The MDL repreentation of G i formally repreented a G MDL = (S G, C r ) where S G i the ummary graph, S G (V, E, A ), and C r i the lit of correction. Each node v V i either a uper or virtual node. The uper node correpond to et A v where v A v i v V in G. A virtual node vn i a new node added to S G to compre the uper edge. Similarly each edge (A u, A v ) E i a uper edge and i the et of all edge between member of A u and A v in G, except the uper edge (A u, A vn ) E. In Figure and, we how the MDL repreentation of the graph in and after compreion uing uper and virtual node, along with the correction. The rule to create the uper edge and correction vary for uper node and virtual node. For edge correction uing uper node, we define Π a the et of all poible edge between (A u, A v ) V and A uv a the actual edge between member of A u and A v. A uper edge i created between A u and A v if A uv ( Π +)/ otherwie poitive edge correction are created between their member. The negative edge correction are created for the edge Π A uv. Since we are intereted in a compact ummary with leat correction, o we create either uper edge with poitive edge correction or only negative edge correction, which have minimum memory requirement. For each uper node, we et it attribute by picking the value which have maximum repetition in the given SSN. The remaining attribute value are marked a attribute correction. Uing virtual node, only edge correction are poible. In thi cae, we create negative edge correction for a pair of node, appearing a connected through virtual node and poitive edge correction in vice vera cae. The cot of the ummary graph depend upon it torage cot and correction. The torage cot of the mapping of uper node i mall compared to thoe of E and C r, o we ignore it. Thu the cot of ummary i computed a cot(g MDL ) = E + C r. B. Problem Statement Given an undirected graph G, our goal i to efficiently find the SSN to create a compact ummary graph with leat correction. In a non-attributed graph, there exit high neighborhood imilaritie among the member node of each SSN. The ummary graph of uch a graph i attached with edge correction only. On the other hand, there are attribute a well a edge correction for ummary of an attributed graph. Similarly, the member node of each SSN are imilar from both the neighborhood a well a attribute imilarity. III. SUMMARIZING A NON-ATTRIBUTED GRAPH In thi ection, we illutrate how we apply LSH on graph G(V, E) and briefly explain the propoed pruning technique. It hould be noted that the we identify the SSN uing a query node-baed approach, where we iteratively elect a query node q to identify it SSN. Thi approach provide each node at leat one chance of merger. We kip the explanation for bucket-baed SSN retrieval approach and related detail due to lack of pace.

3 Node Attribute Neighbor Id a, b,, a, b,,, a, b,,,, a, b,, a, b, a, b,, π π π π π π π π Degree (n i ) = Degree (n ) =... = Degree (n c ) () Degree (n i ) = Degree (q) () Band Band π π π π (e) Hah Table Hah Table,,,,, Fig.. LSH applied on graph G (V, E, A) Binary repreentation of neighbor lit and hah function Minhah matrix Diviion of matrix into band (e) Combined hah code for each portion of column (f) Hah table containing bucket of candidate imilar node (f) Let evaluate a cae where we obtain ome edge correction, when the imilaritie between the node in a SSN are lightly varying. Conider the bipartite graph in Figure which on aggregation, produce a uper node with two edge correction. Thi illutrate that there are no edge correction when the degree are ame, Figure, but they occur when a change happen in the degree, Figure. So it i evident that the edge correction from a uper node, depend upon the deviation in the degree of each n i from that of q (). Edge Correction Fig.. Relationhip between the neighborhood imilarity and degree of node. Node having ame degree and ame imilaritie Variation in degree of node, producing edge correction A. Identifying SSN We create the uper node uing SSN. To find the SSN, we apply LSH on G uing tep in Figure, and retrieve CSSN againt each q. Since each SSN i a ubet of it correponding CSSN, o we propoe a heuritic baed on imilaritie among degree of node and ue it to propoe a pruning technique. ) Similar Degree Heuritic: Given a CSSN, the imilar degree heuritic aim to identify it ubet of node by chooing the node having imilar degree to that of q. By having the imilar degree, the imilarity among the member node of each SSN increae, reulting in uper node with leat edge correction. Note that the node having ame degree to that of q, are conidered by default. Normally, the node having varying degree reduce the neighborhood overlap. Thu we find that there i a relationhip between the imilarity of node and their degree. Conider a CSSN = {,,, } in Figure. From thi CSSN, the SSN contain all the node which on aggregation produce a uper node with no edge correction. We oberve that in thi SSN, the neighborhood of any given node n i i ame to every other node () and alo to that of q (). Nbr (n i ) = Nbr (n )... Nbr (n c ) () where n i SSN and n i q - (, ) - (, ) Nbr (n i ) = Nbr (q) () Invetigating the degree of each node in the given SSN, we find that degree of any n i SSN i alo equal to every other node in it () and alo to that of q (). Degree (q) Degree (n i ) δ Degree (q) () We add any n i CSSN to SSN if it degree difference with q atifie δ Degree (q) (). Otherwie, there are more edge correction from a uper node compared to the deired compreion ratio. We bound δ by 0 δ 0., where the lower limit target each n i having complete neighborhood overlap with q. Similarly, the upper limit of δ enforce to have more common to that of non-common neighbor between n i and q. Thu we oberve that the node having imilar degree in CSSN, have higher probability to be more imilar. By defining the range of δ, pruning the leat imilar node in a CSSN i facilitated. Uing (), we alo obtain the lower and upper bound to extract a SSN from a given CSSN (). δ min Degree (q) Degree ni δ max Degree (q) () When each n i have imilar degree to that of q then there i a high probability to have large neighborhood overlap between n i and q. However, imply relying on imilar degree, produce inconitent reult in ome of the cae. Fortunately, we reolve thi inconitency and identify the required node uing propoed pruning method. ) Auto Pruning: The objective of auto pruning i to filter the node from a CSSN, which minimize the overlap of common neighbor. The imilar degree heuritic directly help prune the node having large deviation from the degree of q. To prune the leat imilar node, we firt ort the CSSN uing degree of node. Thi ort bring the node having imilar degree to q cloer to it in the orted order. We then tart the earch of SSN by iteratively comparing the overlap ratio from the nearby node in the orted order. We add a node into SSN if it neighbor atify the bound in (). On narrowing the bound, we tend to extract only the highly imilar node which reult in lower compreion ratio. Having uch bound, the likely imilar node at leat get the chance for overlap computation. An end to the traveral happen either when we find the node violating the bound or entire lit i exhauted if each member of CSSN ha degree within the bound.

4 IV. SUMMARIZING AN ATTRIBUTED GRAPH In thi ection, we preent the propoed approach to unify the topological and attribute information in LSH, ince the LSH tep in Figure doe not conider the attribute imilarity. For each node in an attributed graph G(V, E, A), the adjacency lit N br and attribute et Attrib are emantically two different entitie. Wherea, the adjacency lit of each node hold it tructural information, the et of attribute decribe it identity. Apart from their emantic difference, uually the neighborhood of each node ha much larger ize compared to it attribute et, N br >> Attrib. Since in real world graph like ocial network, uer often do not provide all the attribute information. On the other hand, the graph having power law propertie have large number of low degree node, leading to N br < Attrib. Both of thee information can be conidered a the two dimenion of each node and the problem i how to unify or reduce them uch that their output preerve the intrinic propertie from both the apect. In our cenario, we refer thi problem a the cure of dimenionality due to the emantic difference between the two dimenion, rather than upon their count. Since the exiting dimenion reduction method, both linear and non-linear, operate on n-dimenional data where n can be large but have emantic homogeneity like patial information. So we oberve that thee technique are not applicable for G(V, E, A). However, influenced by the projection technique we propoe to project the two dimenion of each node into a ingle unified granularity level. To be precie, we union the attribute et of each node with it adjacency lit and perform LSH on the unified lit. By uch unification, the ubequent minhah ignature of each node contain the repreentation from both the apect. Thi i o ince any value in the combined lit can become the minimum value againt a given hah function π k. Thu, the reulting CSSN have high probability to be imilar from both the apect. We now formally define the propoed unified information in Definition. Definition. [N eighbor Attribute Lit] Given a node v i V along with it lit of neighbor N i and attribute A i, the Neighbor Attribute Lit (NAL) i a unified lit that concatenate N i and A i. Figure how a graph G (V, E, A) where each v i V i attached with two attribute. In Figure, we map the attribute into numeric value to unite them with the adjacency lit. The Figure illutrate the NAL for node and. With the unification of attribute and neighborhood information, we can compute the minhah value uing hah function. Since now we conider both the information for minhah computation, it i deirable that their repreentation mut be preerved in hah function. We now formally define the hah function in Definition. Definition. [U nif ied Hah F unction] The random permutation {π, π,..., π m } i a et of hah function where π i i a permutation of {,,..., n, n +,..., k}. The et {,,..., n} are the total node in G and {n +,..., k} i the union of all cardinal value from each attribute. We illutrate the ample hah function in Figure. Here each function i the random permutation from total node in Node Id Attribute Neighbor a, b,, a, b,,, a, b,,,, a, b,, a, b, a, b,, 0 A B a b a b Mapping A B 0 π 0 π 0 Fig.. Illutrating the Unified LSH concept Graph G (V,E,A) Attribute Mapping Sample Node from G with their NAL Hah function the G and poible attribute value from all the attribute, after mapping. A. Balance between Neighborhood and Attribute Information Having NAL for each node and unified hah function, we can find the CSSN. However, thi procedure may till not reveal the node imilar from both the apect. For intance, conider the NAL i of a node v i. Uing (), we find that each element in NAL i ha the equal probability to be minimum againt a given hah function, π k. On the other hand, ince the ize of adjacency lit and attribute et are not ame. So v i V, whoe Nbr >> Attrib, their attribute have very low probability to be minimum in any of the hah function, compared to that of their neighbor, (). Thi reult in creation of minhah ignature column preerving the neighborhood information only, thu minimizing the influence of attribute information. In wort cae, a pair of node (u, v) V having a complete overlap of neighbor but no attribute imilarity or vice vera, will produce exactly ame minhah ignature. For example, conider the node in Figure. Uing (), the probability of each element in it NAL to be conidered a minimum i 0.. However, the probability of any neighbor in NAL to become minimum i larger than that of any of it attribute value, 0. and 0. repectively. Now in Figure conider the node, a wort cae cenario, where both hare all of their neighbor but have no attribute in common. Concluively, their Jaccard imilarity doe not depict the real ituation and may produce more attribute correction on aggregation into a uper node. P r (min (π (NAL i )) = x NAL i ) = NAL i P r (min (π (NAL i )) = x Nbr i ) P r (min (π (NAL i )) = y Attrib i ) () Ideally the minhah ignature of each node mut have the repreentation from it neighbor a well attribute. For thi purpoe, we propoe to enforce repreentation from both the ()

5 apect in the minhah ignature o that the bia toward either apect i minimized. In our approach, we ue a parameter p to preerve the neighborhood and attribute information in the minhah ignature for each node. Specifying p guarantee that certain proportion of minhah value are computed from each component, retricting the large percentage of minhahe from either component. Uing p, the equation () and (0) tate the fraction of minhah value from each of the two component in NAL i for each v i. We undertand that the right election of p play a key role to aign certain weight to each of the two component in NAL i. For intance, if p = and total hah function are 0 then uing () and (0), the minhah ignature column for the node in Figure, contain 0% minhah value from each of the component, (). Thu, we find with the incluion of p, the probability to have minhah value from attribute increae from 0. to 0.. Minhah Nbr v i Minhah Attrib v i = m p m = p m () (0) P r (min (π (NAL i )) = x Nbr i ) = P r (min (π (NAL i )) = y Attrib i ) () We oberve that the enforced incluion of neighborhood and attribute information in the minhah ignature, may produce erroneou reult when we generate CSSN in hah table. Figure diplay the tep when we plit the minhah matrix into b band of r row each, to create CSSN on the bai of hah code. If a given band get a portion of minhah column where all the minhah value are either from neighbor or attribute then the correponding bucket will contain the node imilar from that very apect only. There i a higher probability for thi ituation in the cae when we ue higher count of hah function, ince then the length of reulting minhah column for each node i alo high. Thi ituation i poible in both the random and equential election of minhah value for each band. To overcome thi limitation, we propoe a concept called Bi M inhahing which produce minhah ignature preerving the repreentation from both the apect from NAL i of each v i. B. Bi-Minhahing In bi-minhahing, we compute the minhah ignature of each v i where both of it dimenion (neighbor or attribute) ha the equal probability to be choen a minimum againt any hah function, π k. Uing () and (0), we firt compute the minhah ignature M NAL from neighbor and attribute. Next, we again apply minhaing on M NAL to compute it minhah ignature uing the ame hah function to create M / NAL. Thi econd level hahing completely randomize the minhah repreentation of both the apect from NAL i of each v i. Thu it rightly approximate the true Jaccard imilarity between any pair of node (v i, v j ). We find the ignificance of bi-minhahing i two-folded. Firt, it create a balance between neighborhood and attribute information, i.e., when N br >> Attrib or vice vera. Since etting p to 0%, the initial hahing create the minhah ignature where each of the two component ha balanced repreentation. Secondly, the equal minhah repreentation i itelf the olution of electing the appropriate value of p. V. CONCLUSION AND FUTURE WORK In thi paper, we propoe a et-baed approach for graph ummarization. A et-baed approach i calable ince it aggregate multiple node in each iteration. We undertand that the propoed approach add a new dimenion in aggregation-baed ummarization ince we directly target the inherent occurrence of phenomenon like friend of friend have many common friend in ocial network without node ordering or explicit imilarity computation. Currently, our approach i applicable to both attributed and non-attributed graph, but we plan to build a unified olution to ummarize further type of graph like heterogeneou and weighted graph. VI. ACKNOWLEDGMENT Thi work wa upported by the National Reearch Foundation of Korea (NRF) grant funded by the Korea government(mest) (No. 0RAAA00). REFERENCES [] F. Chierichetti, R. Kumar, S. Lattanzi, M. Mitzenmacher, A. Panconei, and P. Raghavan, On compreing ocial network, in Proceeding of the th ACM SIGKDD international conference on Knowledge dicovery and data mining. ACM, 00, pp.. [] P. Boldi and S. Vigna, The webgraph framework i: compreion technique, in Proceeding of the th international conference on World Wide Web. ACM, 00, pp. 0. [] U. Kang and C. Falouto, Beyond caveman communitie : Hub and poke for graph compreion and mining, in Data Mining (ICDM), 0 IEEE th International Conference on. IEEE, 0, pp [] G. Buehrer and K. Chellapilla, A calable pattern mining approach to web graph compreion with communitie, in Proceeding of the 00 International Conference on Web Search and Data Mining. ACM, 00, pp. 0. [] I. Safro and B. Temkin, Multicale approach for the network compreion-friendly ordering, Journal of Dicrete Algorithm, vol., no., pp. 0 0, 0. [] P. Boldi, M. Roa, M. Santini, and S. Vigna, Layered label propagation: A multireolution coordinate-free ordering for compreing ocial network, in Proceeding of the 0th international conference on World Wide Web. ACM, 0, pp.. [] P. Liako, K. Papakontantinopoulou, and M. Siouti, Puhing the envelope in graph compreion, in Proceeding of the rd ACM International Conference on Information and Knowledge Management. ACM, 0, pp.. [] S. Navlakha, R. Ratogi, and N. Shrivatava, Graph ummarization with bounded error, in Proceeding of the 00 ACM SIGMOD international conference on Management of data. ACM, 00, pp.. [] H. Toivonen, F. Zhou, A. Hartikainen, and A. Hinkka, Compreion of weighted graph, in Proceeding of the th ACM SIGKDD international conference on Knowledge dicovery and data mining. ACM, 0, pp.. [0] K. LeFevre and E. Terzi, Gra: Graph tructure ummarization. in SDM. SIAM, 00, pp.. [] Y. Tian, R. A. Hankin, and J. M. Patel, Efficient aggregation for graph ummarization, in Proceeding of the 00 ACM SIGMOD international conference on Management of data. ACM, 00, pp. 0.

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

xy-monotone path existence queries in a rectilinear environment

xy-monotone path existence queries in a rectilinear environment CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

Chapter S:II (continued)

Chapter S:II (continued) Chapter S:II (continued) II. Baic Search Algorithm Sytematic Search Graph Theory Baic State Space Search Depth-Firt Search Backtracking Breadth-Firt Search Uniform-Cot Search AND-OR Graph Baic Depth-Firt

More information

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity

More information

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

Gray-level histogram. Intensity (grey-level) transformation, or mapping. Use of intensity transformations:

Gray-level histogram. Intensity (grey-level) transformation, or mapping. Use of intensity transformations: Faculty of Informatic Eötvö Loránd Univerity Budapet, Hungary Lecture : Intenity Tranformation Image enhancement by point proceing Spatial domain and frequency domain method Baic Algorithm for Digital

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

A Boyer-Moore Approach for. Two-Dimensional Matching. Jorma Tarhio. University of California. Berkeley, CA Abstract

A Boyer-Moore Approach for. Two-Dimensional Matching. Jorma Tarhio. University of California. Berkeley, CA Abstract A Boyer-Moore Approach for Two-Dimenional Matching Jorma Tarhio Computer Science Diviion Univerity of California Berkeley, CA 94720 Abtract An imple ublinear algorithm i preented for two-dimenional tring

More information

3D SMAP Algorithm. April 11, 2012

3D SMAP Algorithm. April 11, 2012 3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative

More information

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck. Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization

More information

else end while End References

else end while End References 621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized

More information

CENTER-POINT MODEL OF DEFORMABLE SURFACE

CENTER-POINT MODEL OF DEFORMABLE SURFACE CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D

More information

Image authentication and tamper detection using fragile watermarking in spatial domain

Image authentication and tamper detection using fragile watermarking in spatial domain International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: 2278 1323 Image authentication and tamper detection uing fragile watermarking

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

Drawing Lines in 2 Dimensions

Drawing Lines in 2 Dimensions Drawing Line in 2 Dimenion Drawing a traight line (or an arc) between two end point when one i limited to dicrete pixel require a bit of thought. Conider the following line uperimpoed on a 2 dimenional

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique 202 International Conference on Frontier in Handwriting Recognition Building a Compact On-line MRF Recognizer for Large Character Set uing Structured Dictionary Repreentation and Vector Quantization Technique

More information

The norm Package. November 15, Title Analysis of multivariate normal datasets with missing values

The norm Package. November 15, Title Analysis of multivariate normal datasets with missing values The norm Package November 15, 2003 Verion 1.0-9 Date 2002/05/06 Title Analyi of multivariate normal dataet with miing value Author Ported to R by Alvaro A. Novo . Original by Joeph

More information

Chapter 13 Non Sampling Errors

Chapter 13 Non Sampling Errors Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

SIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial

SIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial SIMIT 7 Component Type Editor (CTE) Uer manual Siemen Indutrial Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult

More information

mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee

mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee Reolving Deadlock for Pipelined Stream Application on Network-on-Chip Xiaohang Wang 1,2, Peng Liu 1 1 Department of Information Science and Electronic Engineering, Zheiang Univerity Hangzhou, Zheiang,

More information

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT

More information

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Iue 4, April 2015 International Journal Advance Reearch in Computer Science and Management Studie Reearch Article / Survey Paper / Cae Study Available online at: www.ijarcm.com

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

Shortest Paths with Single-Point Visibility Constraint

Shortest Paths with Single-Point Visibility Constraint Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet

More information

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation

More information

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two

More information

Edits in Xylia Validity Preserving Editing of XML Documents

Edits in Xylia Validity Preserving Editing of XML Documents dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,

More information

arxiv: v1 [cs.ds] 27 Feb 2018

arxiv: v1 [cs.ds] 27 Feb 2018 Incremental Strong Connectivity and 2-Connectivity in Directed Graph Louka Georgiadi 1, Giueppe F. Italiano 2, and Niko Parotidi 2 arxiv:1802.10189v1 [c.ds] 27 Feb 2018 1 Univerity of Ioannina, Greece.

More information

Modeling of underwater vehicle s dynamics

Modeling of underwater vehicle s dynamics Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation

More information

Delaunay Triangulation: Incremental Construction

Delaunay Triangulation: Incremental Construction Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )

More information

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal

More information

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent

More information

/06/$ IEEE 364

/06/$ IEEE 364 006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;

More information

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -

More information

A Practical Model for Minimizing Waiting Time in a Transit Network

A Practical Model for Minimizing Waiting Time in a Transit Network A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,

More information

Service and Network Management Interworking in Future Wireless Systems

Service and Network Management Interworking in Future Wireless Systems Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering

More information

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt

More information

New Structural Decomposition Techniques for Constraint Satisfaction Problems

New Structural Decomposition Techniques for Constraint Satisfaction Problems New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.

More information

IMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak

IMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak IMPROVED DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION Tak-Shing Wong, Charle A. Bouman, and Ilya Pollak School of Electrical and Computer Engineering Purdue Univerity ABSTRACT We propoe

More information

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de

More information

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline Generic Travere CS 62, Lecture 9 Jared Saia Univerity of New Mexico Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v) from the bag if (v i unmarked) mark v; parent(v) = p;

More information

A Sparse Shared-Memory Multifrontal Solver in SCAD Software

A Sparse Shared-Memory Multifrontal Solver in SCAD Software Proceeding of the International Multiconference on ISBN 978-83-6080--9 Computer Science and Information echnology, pp. 77 83 ISSN 896-709 A Spare Shared-Memory Multifrontal Solver in SCAD Software Sergiy

More information

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in

More information

A User-Attention Based Focus Detection Framework and Its Applications

A User-Attention Based Focus Detection Framework and Its Applications A Uer-Attention Baed Focu Detection Framework and It Application Chia-Chiang Ho, Wen-Huang Cheng, Ting-Jian Pan, Ja-Ling Wu Communication and Multimedia Laboratory, Department of Computer Science and Information

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

Comparison of Methods for Horizon Line Detection in Sea Images

Comparison of Methods for Horizon Line Detection in Sea Images Comparion of Method for Horizon Line Detection in Sea Image Tzvika Libe Evgeny Gerhikov and Samuel Koolapov Department of Electrical Engineering Braude Academic College of Engineering Karmiel 2982 Irael

More information

Cut Tree Construction from Massive Graphs

Cut Tree Construction from Massive Graphs Cut Tree Contruction from Maive Graph Takuya Akiba Yoichi Iwata Youke Samehima # Naoto Mizuno Youke Yano # Preferred Network, Inc. National Intitute of Informatic # Recruit Holding Co., Ltd. The Univerity

More information

Stress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling

Stress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Stre-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Menter F.R. ANSYS Germany GmbH Introduction It i oberved in many CFD imulation that RANS model how inherent technology limitation

More information

Optimizing Synchronous Systems for Multi-Dimensional. Notre Dame, IN Ames, Iowa computation is an optimization problem (b) circuit

Optimizing Synchronous Systems for Multi-Dimensional. Notre Dame, IN Ames, Iowa computation is an optimization problem (b) circuit Optimizing Synchronou Sytem for ulti-imenional pplication Nelon L. Pao and Edwin H.-. Sha Liang-Fang hao ept. of omputer Science & Eng. ept. of Electrical & omputer Eng. Univerity of Notre ame Iowa State

More information

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,

More information

UC Berkeley International Conference on GIScience Short Paper Proceedings

UC Berkeley International Conference on GIScience Short Paper Proceedings UC Berkeley International Conference on GIScience Short Paper Proceeding Title A novel method for probabilitic coverage etimation of enor network baed on 3D vector repreentation in complex urban environment

More information

A Fast Association Rule Algorithm Based on Bitmap Computing with Multiple Minimum Supports using Maximum Constraints

A Fast Association Rule Algorithm Based on Bitmap Computing with Multiple Minimum Supports using Maximum Constraints A Fat Aociation Rule Algorithm Baed on Bitmap Computing with Multiple Minimum Support uing Maximum Contraint Jyothi Patil, and Dr. V.D.Mytri Abtract Mining aociation rule from databae i a timeconuming

More information

A note on degenerate and spectrally degenerate graphs

A note on degenerate and spectrally degenerate graphs A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove

More information

Lecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization

Lecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization Lecture Outline Global flow analyi Global Optimization Global contant propagation Livene analyi Adapted from Lecture by Prof. Alex Aiken and George Necula (UCB) CS781(Praad) L27OP 1 CS781(Praad) L27OP

More information

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES MAKARA, TEKNOLOGI, VOL. 9, NO., APRIL 5: 3-35 3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES Mochammad Zulianyah Informatic Engineering, Faculty of Engineering, ARS International Univerity,

More information

Application of Social Relation Graphs for Early Detection of Transient Spammers

Application of Social Relation Graphs for Early Detection of Transient Spammers Radolaw rendel and Henryk Krawczyk Application of Social Relation raph for Early Detection of Tranient Spammer RADOSLAW RENDEL and HENRYK KRAWCZYK Electronic, Telecommunication and Informatic Department

More information

An Intro to LP and the Simplex Algorithm. Primal Simplex

An Intro to LP and the Simplex Algorithm. Primal Simplex An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n

More information

Implementation of a momentum-based distance metric for motion graphs. Student: Alessandro Di Domenico (st.no ), Supervisor: Nicolas Pronost

Implementation of a momentum-based distance metric for motion graphs. Student: Alessandro Di Domenico (st.no ), Supervisor: Nicolas Pronost Implementation of a momentum-baed ditance metric for motion graph Student: Aleandro Di Domenico (t.no 3775682), Supervior: Nicola Pronot April 3, 2014 Abtract Thi report preent the procedure and reult

More information

KS3 Maths Assessment Objectives

KS3 Maths Assessment Objectives KS3 Math Aement Objective Tranition Stage 9 Ratio & Proportion Probabilit y & Statitic Appreciate the infinite nature of the et of integer, real and rational number Can interpret fraction and percentage

More information

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

An Approach to a Test Oracle for XML Query Testing

An Approach to a Test Oracle for XML Query Testing An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,

More information

Markov Random Fields in Image Segmentation

Markov Random Fields in Image Segmentation Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image

More information

An Improved Implementation of Elliptic Curve Digital Signature by Using Sparse Elements

An Improved Implementation of Elliptic Curve Digital Signature by Using Sparse Elements The International Arab Journal of Information Technology, Vol. 1, No., July 004 0 An Improved Implementation of Elliptic Curve Digital Signature by Uing Spare Element Eam Al-Daoud Computer Science Department,

More information

Parallel Approaches for Intervals Analysis of Variable Statistics in Large and Sparse Linear Equations with RHS Ranges

Parallel Approaches for Intervals Analysis of Variable Statistics in Large and Sparse Linear Equations with RHS Ranges American Journal of Applied Science 4 (5): 300-306, 2007 ISSN 1546-9239 2007 Science Publication Correponding Author: Parallel Approache for Interval Analyi of Variable Statitic in Large and Spare Linear

More information

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds * Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm

More information

A Multi-objective Genetic Algorithm for Reliability Optimization Problem

A Multi-objective Genetic Algorithm for Reliability Optimization Problem International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR

More information

Trainable Context Model for Multiscale Segmentation

Trainable Context Model for Multiscale Segmentation Trainable Context Model for Multicale Segmentation Hui Cheng and Charle A. Bouman School of Electrical and Computer Engineering Purdue Univerity Wet Lafayette, IN 47907-1285 {hui, bouman}@ ecn.purdue.edu

More information

Testing Structural Properties in Textual Data: Beyond Document Grammars

Testing Structural Properties in Textual Data: Beyond Document Grammars Teting Structural Propertie in Textual Data: Beyond Document Grammar Felix Saaki and Jen Pönninghau Univerity of Bielefeld, Germany Abtract Schema language concentrate on grammatical contraint on document

More information

A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED

A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED Jutin Domke and Yianni Aloimono Computational Viion Laboratory, Center for Automation Reearch Univerity of Maryland College Park,

More information

np vp cost = 0 cost = c np vp cost = c I replacing term cost = c+c n cost = c * Error detection Error correction pron det pron det n gi

np vp cost = 0 cost = c np vp cost = c I replacing term cost = c+c n cost = c * Error detection Error correction pron det pron det n gi Spoken Language Paring with Robutne and ncrementality Yohihide Kato, Shigeki Matubara, Katuhiko Toyama and Yauyohi nagaki y Graduate School of Engineering, Nagoya Univerity y Faculty of Language and Culture,

More information

Multicast with Network Coding in Application-Layer Overlay Networks

Multicast with Network Coding in Application-Layer Overlay Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 1, JANUARY 2004 1 Multicat with Network Coding in Application-Layer Overlay Network Ying Zhu, Baochun Li, Member, IEEE, and Jiang Guo Abtract

More information

Quadrilaterals. Learning Objectives. Pre-Activity

Quadrilaterals. Learning Objectives. Pre-Activity Section 3.4 Pre-Activity Preparation Quadrilateral Intereting geometric hape and pattern are all around u when we tart looking for them. Examine a row of fencing or the tiling deign at the wimming pool.

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier a a The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each b c circuit will be decribed in Verilog

More information

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial

More information

Planning of scooping position and approach path for loading operation by wheel loader

Planning of scooping position and approach path for loading operation by wheel loader 22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented

More information

A Study of a Variable Compression Ratio and Displacement Mechanism Using Design of Experiments Methodology

A Study of a Variable Compression Ratio and Displacement Mechanism Using Design of Experiments Methodology A Study of a Variable Compreion Ratio and Diplacement Mechanim Uing Deign of Experiment Methodology Shugang Jiang, Michael H. Smith, Maanobu Takekohi Abtract Due to the ever increaing requirement for engine

More information

Brief Announcement: Distributed 3/2-Approximation of the Diameter

Brief Announcement: Distributed 3/2-Approximation of the Diameter Brief Announcement: Ditributed /2-Approximation of the Diameter Preliminary verion of a brief announcement to appear at DISC 14 Stephan Holzer MIT holzer@mit.edu David Peleg Weizmann Intitute david.peleg@weizmann.ac.il

More information

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II IEEE INFOCO 2002 1 Ditributed Partial Information anagement (DPI) Scheme for Survivable Network - Part II Dahai Xu Chunming Qiao Department of Computer Science and Engineering State Univerity of New York

More information

Web Science and additionality

Web Science and additionality Admin tuff... Lecture 1: EITN01 Web Intelligence and Information Retrieval Meage, lide, handout, lab manual and link: http://www.eit.lth.e/coure/eitn01 Contact: Ander Ardö, Ander.Ardo@eit.lth.e, room:

More information

Variable Resolution Discretization in the Joint Space

Variable Resolution Discretization in the Joint Space Variable Reolution Dicretization in the Joint Space Chritopher K. Monon, David Wingate, and Kevin D. Seppi {c,wingated,keppi}@c.byu.edu Computer Science, Brigham Young Univerity Todd S. Peteron peterto@uvc.edu

More information

Interface Tracking in Eulerian and MMALE Calculations

Interface Tracking in Eulerian and MMALE Calculations Interface Tracking in Eulerian and MMALE Calculation Gabi Luttwak Rafael P.O.Box 2250, Haifa 31021,Irael Interface Tracking in Eulerian and MMALE Calculation 3D Volume of Fluid (VOF) baed recontruction

More information

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance A Hybrid Deployable Dynamic Traffic Aignment Framework for Robut Online Route Guidance Sriniva Peeta School of Civil Engineering, Purdue Univerity Chao Zhou Sabre, Inc. Sriniva Peeta School of Civil Engineering

More information

Aspects of Formal and Graphical Design of a Bus System

Aspects of Formal and Graphical Design of a Bus System Apect of Formal and Graphical Deign of a Bu Sytem Tiberiu Seceleanu Univerity of Turku, Dpt. of Information Technology Turku, Finland tiberiu.eceleanu@utu.fi Tomi Weterlund Turku Centre for Computer Science

More information

New Structural Decomposition Techniques for Constraint Satisfaction Problems

New Structural Decomposition Techniques for Constraint Satisfaction Problems 113 New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory, Univerity of Nebraka-Lincoln {yzheng,choueiry}@ce.unl.edu Abtract.

More information