A measure of compression gain for new alphabet symbols in data-compression

Size: px
Start display at page:

Download "A measure of compression gain for new alphabet symbols in data-compression"

Transcription

1 A measure of comression gain for new alhabet symbols in data-comression Richard Fredlund arxiv: v [cs.it] 9 Feb 204 Abstract In coding theory it is widely known that the otimal encoding for a given alhabet of symbol codes is the Shannon entroy times the number of symbols to be encoded. However, deending on the structure of the message to be encoded it is ossible to beat this otimal by including only frequently occurring aggregates of symbols from the base alhabet. We rove that the change in comressed message length by the introduction of a new aggregate symbol can be exressed as the difference of two entroies, deendent only on the robalities of the characters within the aggregate lus a correction term which involves only the robality and length of the introduced symbol. The exression is indeendent of the robality of all other symbols in the alhabet. This measure of information gain, for a new symbol, can be alied in data comression methods. I. Introduction The symbol alhabet used for most data comression schemes are either individual characters, syllables (for examle [, 2]), or words (for examle [3, 4]). With a few technicalities (e.g. unctuation in word encodings) these alhabets essentially form a artition of the text into more or less, similar arts. Saces have been added to words [5] and frequently occurring 2,3 and 4 grams have also been used to ad out the alhabet, [6]. However, adding sequences of artrary length to a base alhabet of characters, based on information gain, to be used by a variable length comression scheme such as Arithmetic coding [7] or Huffman encoding [8] has not been considered. Shannon s theorem [9] states that the best (er character) comression achievable for a message (and closely aroximated by Arithmetic encoding [7, 0]) is it s entroy relative to the alhabet. At first glance adding symbols to a base alhabet in order to further reduce this rate of comression may seem counter to Shannon s theorem. However, Shannon s theorem is true only for a fixed alhabet, and there is no reason why, deending on the structure of the message, adding aggregate symbols may not decrease the comression further. We ask the question at what oint is an aggregate symbol, comosed of two or more alhabet symbols worth adding to the model. For examle when encoding simle text, comosed of 26 alhabet symbols at what frequency is the comound symbol the comosed of three alhabet symbols worth adding to the model? To realize that for high enough frequencies adding the symbol may roduce a decrease in the exected message length notice that the number of symbols in the message will decrease by two times the number of occurrences of the word the. As each occurrence of the word the reresents a condensing of three alhabet symbols into just one new symbol. We define the gain of an new aggregate symbol to be the decrease in otimal encoding length with the introduction of the symbol. However, with the addition of a new aggregate symbol it is also ossible that the otimal encoding length of the message with resect to the alhabet will increase, rather than de-

2 crease. The gain therefore may be ositive or negative. In Section II we rove our main result, that the average gain, as measured in ts er character, of introducing a new symbol S can be exressed as the difference of two entroies, each exressed only in terms of the relative frequencies of the alhabet symbols, which are being comned to form S lus a correction term which involves only the robality and length of S. In Section III, we erform an exeriment to demonstrate the use of the information gain measure to create an aggregate alhabet for data comression. Starting with a base alhabet of just 72 distinct characters and an otimal comression rate of 4.5 ts er character, we discover an alhabet with 39 aggregate symbols which effectively reduces the rate of comression to under 3 ts er character. II. Main Result otation: start by considering a message M = m, m 2,..., m of character symbols from the alhabet A x = {a, a 2,..., a K } with known character frequencies F x = { f a, f a2,..., f ak }. The robalities of each character symbol are P x = { a, a2,..., ak } where ai = f a i for each i in {, 2,..., K}. II. Theorem We rove that when a new aggregate symbol S = b b 2...b r comosed of r (not necessarily distinct) symbols from the original alhabet A x is added to the alhabet and {S} reresents the set of distinct characters in S, then the er character information gain can be exressed as the difference of two entroies: log 2 λ log 2 () λ (Where λ reresents the robality of symbol b i after occurrences of b i in S have been removed) lus a correction term exressed only in terms of s the robality of S in the message, and r. Letting µ s = ( s (r )), the correction term is again the difference of two entroies and is given by: µ s log 2 µ s s log 2 s (2) We call µ s the rescale constant, and the length of the new message is µ s. II.2 Proof By Shannon s information theory [9] the otimal encoding for this message gives an average code-length for each encoded symbol of: L(C, X) H(X) = x A x x log 2 x (3) where H(X) is the entroy of the message M for this robality model, described by (A x, P x ). The otimal comressed code length for the whole message M is the message length times this entroy: L(M, A x ) = H(x). (4) This can be re-written in terms of the character frequencies as: L(M, A x ) = log 2 x A x f x log 2 f x (5) using the identity log 2 x = log 2 x and by noting that the sum of the frequencies x Ax f x is equal to. Let S = b b 2...b r be an aggregate symbol comosed of r symbols from the original alhabet A x so that b i A x for i in {, 2,..., K}, (ote that b i and b j may not be distinct as S may contain more than one coy of some characters in A x ), and let f S be the number of non-overlaing occurrences of S in the message M. Adding S to the alhabet gives a new alhabet of character symbols, A x = {S, a, a 2,..., a K }, a new set of robalities P k = { s, a,..., a K } and a new set of character frequencies F k = { f s, f a,..., f a K }. 2

3 The message length will also change. This is because, for each of the f S occurrences of S in the message, r symbols from the original character sequence M will be condensed into just one character in the new alhabet A x. This gives a new message length of: = f S (r ) (6) By counting the number of characters a i in the original message and subtracting occurrences which aear in S we get the udated character frequencies: f a i = f ai f S S(a i ) (7) where S(a i ) is the number of times the character symbol a i aears in S. ote for characters not in S the number of occurrences will remain unchanged and f a i = f a. Substituting 6 and 7 into 5 gives the new exected code length for the message, with the introduction of the new aggregate symbol S. (8) L(M, A x) = log 2 f S log 2 f S f ai log 2 f ai a i / S f a i log 2 f a i Here M is the message written in the new alhabet A x and L(M, A x) is the new exected coding length for the message. We have slit the summation of the log frequencies into three distinct arts. Firstly, the term containing f S the number of occurrences of the newly introduced character S. Secondly, those characters not in S whose frequency do not change with the introduction of S and finally, those characters which are in S and whose frequencies do change. The advantage of this formulation is that the terms involving frequencies not in S cancel and comarison of 5 and 8 leads to a formula, in terms of the symbol frequencies, for the exected coding gain gain(s) over the whole message of introducing S into the alhabet: gain(s) = log 2 log 2 + f S log 2 f S f ai log 2 f ai + f a i log 2 f a i (9) The addition of the aggregate symbol S to the alhabet A x will shorten the otimally encoded message if and only if gain(s) > 0. The disadvantage of this formulation is that the exected information gain er symbol, (which is gain(s) ), aears to be deendent on, due to the log 2 term. To see that this ought not to be the case consider the scenario of a new message M new which is recisely M reeated twice, such that all character frequencies are exactly doubled. We would exect to see the overall gain for this new message to be 2 gain(s). We now recast 9 in terms of robalities. Starting by relacing f s with s in 6 to give = µ s, where µ s = ( s (r )), which also give f a i = a i µ s. Substituting these in 9 gives: gain(s) = log 2 µ s log 2 µ s + S log 2 S ai log 2 ai + a i µ s log 2 a i µ s (0) This simlifies by noticing that all terms are of the form A log 2 A and using the identity A log 2 A = A log 2 A log 2 A. Suming u the log 2 terms everything cancels by noting that P s r = ai S s s(a i ). This gives a sum over terms all of the form A log 2 A, the first of which is log 2 = 0 which also cancels to give: 3

4 gain(s) =µ s log 2 s log µ 2 s s + ai log 2 ai a i µ s log 2 a i µ s () We finish by noting that a i µ s = f a f S S(a i ) = ai s s(a i ) and let λ ai = ai s s(a i ). The average information gain er character symbol can therefore be written as: char_gain(s) = log 2 λ log 2 λ + µ s log 2 µ s s log 2 s (2) which is indeendent of the robalities, of all other alhabet symbols excet those contained in S and the robality of S itself. In more concise notation this can be rewritten as: char_gain(s) =H(µ s, ai : a i {S}) III. H( s, λ ai : a i {S}) exeriment (3) Here we erform an exeriment to demonstrate the use of the information gain measure to create an aggregate symbol alhabet for lossless text comression by finding an alhabet of aggregate symbols for a single document, Alice in wonderland (alice29.txt) from the Canterbury text corus. While both encoder and decoder are assumed to have access to a small basic alhabet of characters, without the need for transmission with the message, all other characters, (from the character set, and from the aggregate symbols) must also be encoded in the tstream for transmission. We therefore make a distinction between the message encoding, and the alhabet encoding. For each new symbol the alhabet encoding will increase in size, so the message encoding must decrease by at least this amount to be worth adding to the alhabet. III. Alhabet encoding scheme We start with a very basic standard alhabet of just 64 characters, which are assumed to be known reviously, by both the encoding and decoding software. This character set is simly the uercase and lowercase letters, and 2 unctuation symbols. These are, sace, newline, colon, semi-colon, exclamation mark, oen and close brackets, hyhen, comma, fullsto and question mark. The first 5 ts of the alhabet encoding are used to encode, MXBITS, the number of ts required to encode a frequency count in this document. The maximum being 32 ts assigned to each frequency count, which would allow u to 4294 million occurrences of any character within the document. MXBITS is determined by the maximum number of occurrences of any character in the document. For Alice29.txt, MXBITS is set to 5 indicating that 5 ts should be used to record the frequency of each alhabet symbol. (ote that in ractice this could be considerably reduced by noting that this is only the maximum ever required, and in ractice most symbol frequencies for this document fall into the range and could be exressed using only 8 ts). ext each of the 64 characters from the standard alhabet is assigned 5 ts to record it s frequency in the document (960 ts). The next 8 ts in the encoding are assigned to UMCHAR, the number of nonstandard characters in the document. We kee things simle here and assume all other characters in the document are 8 t ascii codes (unicode symbols are not considered). In Alice.txt there are 8 characters not included in the standard alhabet. These are aostrohe, two forms of seech-mark,, oen and close, square bracket, and the nu- 4

5 merals, 2 and 9. These are encoded with 8 ts for ascii code, and 5 ts for character frequency. That is 23 8 = 84 ts. Before any aggregate symbols are added therefore, the number of ts, used by the alhabet encoding are = 57. The next 5 ts of the encoding are allocated to AGCOUT, the number of aggregate symbols to be included in the alhabet. At initialization, AGCOUT is set to 0 and the alhabet contains = 72 characters. Aggregate symbols in this imlementation consist of two ordered symbols, from the already existing alhabet. As new aggregates are added, they may consist of comnations of revious aggregates, or of characters from the base alhabet. As the aggregate alhabet increases in size, the number of ossible aggregates also increases. For an alhabet of length, the first and second symbol both have ossible values giving a total of 2 ossible new aggregate symbols. The number of ts required to encode each aggregate symbols deends on the number of ts required to encode a value in{,..., }. At initialization = 72, hence the number of ts to encode each sub-symbol in the aggregate is given by log 2 (AGCOUT+72). 5 ts must also be allocated to record the frequency count. This gives a total of 5+2 log 2 (AGCOUT+72) ts for each new aggregate symbol. This starts of at 29 ts and increases by 2 ts each time gets too large. III.2 Search algorithm Here we have ket the search for aggregate symbols with maximum, comression gain as simle as ossible. At each ste the symbol gain is calculated for each of the ossible 2 aggregates and the highest gain is selected. If this gain is higher than the number of ts necessary for the alhabet encoding, then the symbol is added. This aroach becomes infeasible as grows large, and it is exected that better search algorithms can be found to find aggregates with a high exected gain. gain symbol freq 6538 he the in ing ou [s] the , [s] [nl][nl] [nl][nl] ve nd and , [nl][nl] , [s] and [s]the[s] th Al Ali 395 III.3 Results The brute force algorithm described above was imlemented on Alice29.txt from the Canterbury Corus. The uncomressed document contains 48480, 8 t ascii characters. At initialisation there were 72 distinct characters in the base alhabet. The alhabet encoding occuied 57 ts and the otimal message encoding length which could be closely aroximated by arithmetic encoding was ts. So the total message encoding before any aggregates were introduced was 6724 ts. This gives a message encoding of 4.5 (2.d..) ts er character. and a total encoding of 4.52 (2.d..) ts er character. Subsequently 39 aggregate symbols were added to the alhabet. This increased the number of ts required by the alhabet encoding to ts. However, the otimal message encoding droed to ts, leaving a total encoding length of 4376 ts. This gives a message encoding of 2.63 (2.d..) ts er character and a total encoding of 2.95(2.d.) ts er character. The t rate could have droed further 5

6 however by this oint the exeriment had slowed down considerably, so the exeriment was stoed soon after the t rate of 3 ts er character was reached. The above table shows the first 20 aggregate symbols selected by the algorithm. otice that the first 8 symbols seem quite generic and might well be informative symbols for many text documents. It is interesting to note that the second symbol is the while th is not selected until the 8th symbol, instead he is selected as the first symbol, having high frequency and an information gain of 6538 ts. However, symbol 9 and 20 are Al and Ali and the next two symbols are Alic and Alice resectively. These symbols are secific to the document. Other aggregate symbols, which are recognizable as being secific to Alice29.txt and aear in the alhabet are, Dormouse, Hare, Mock, curious, remark, said Alice, little, the Queen and Duchess. otice that the information gain is not always strictly decreasing with each new aggregate symbol. The information gain of ing, and and Ali are each higher than their immediate redecessors, in, nd and Al, resectively. Meaning that where a longer aggregate symbol has high gain, the shorter aggregates which build u to the longer symbol, may have a lower gain. III.4 Discussion of Results The aggregate alhabet found, achieves a 4.7% (.d..) reduction in message encoding length, and a 34.7% (.d..) reduction in total encoding length relative to the Shannon otimal for the basic alhabet of single characters. Reaching a message encoding of 2.63 (2.d..) ts er character and a total encoding of 2.95 (2.d.) ts er character before the exeriment was stoed. Both the alhabet encoding, and the search algorithm used to find new aggregate symbols, are not ideal, and leave considerable scoe to be imroved uon, in develoing a ractical data comression scheme. However, the results obtained demonstrate the basic efficacy of using this measure of information gain to create an alhabet for data comression. The two drawbacks of this imlementation are: firstly, it can only find larger chunks which are informative by working u through smaller chunks first. e.g. al, ali, alic, alice. (which requires the smaller chunks to also be informative); secondly, once a larger chunk is found, the smaller chunks which lead u to it, will often become less informative in the alhabet. However it is interesting that the airwise-encoder is able to find some longer sequences such as the Queen, and said Alice, showing there is enough information gain in the airwise stes to lead u to these articular sequences. Better comression rates could be achieved by using a dictionary aroach and initially adding whole words before starting the airwise comnation of symbols, and also removing smaller chunks if they become uninformative. IV. Conclusion The contribution in Section II, has been to find a simle formulation which measures the change in comression length when adding a new aggregate symbol to an alhabet code for data comression. This formulation is concise and indeendent of the frequency of all other characters from the alhabet not in the new symbol. Comutation time for this measure is therefore indeendent of size of the alhabet. This measure is otentially alicable to any variable length coding scheme with an alhabet and could be used with either static or adative schemes such as PPM [0]. One advantage of using this measure to create alhabets for symbol codes is that no rior knowledge of the structure of the data is required, and like Lemel-Ziv [] it can be alied to any data which contains reetitions. 6

7 References [] J. Lansky and M. Zemlicka, Comression of small text files using syllables., in DCC,. 458, IEEE Comuter Society, [2] I. Akman, H. Bayindir, S. Ozleme, Z. Akin, and S. Misra, A lossless text comression technique using syllable based morhology., Int. Arab J. Inf. Technol., vol. 8, no., , 20. [3] A. Moffat and R. Y. K. Isal, Word-based text comression using the burrowswheeler transform., Inf. Process. Manage., vol. 4, no. 5, , [4] A. Farina, G. avarro, and J. R. Parama, Boosting text comression with wordbased statistical encoding., Comut. J., vol. 55, no.,. 3, 202. [5] R. Y. K. Isal, A. Moffat, and A. C. H. gai, Enhanced word-based block-sorting text comression., in ACSC (M. J. Oudshoorn, ed.), vol. 4 of CRPIT, , Australian Comuter Society, [6] S. Grabowski, Text rocessing for burrows-wheeler block sorting comression., in VII Konferencja Sieci i systemy Informatycne-Teorra, Projekty, Wdrozenia,Lodzkiej, 999. [7] F. Run, Arithmetic stream coding using fixed recision registers., IEEE Transactions on Information Theory, vol. 25, no. 6, , 979. [8] D. Huffman, A.: A method for the construction of minimumredundancy codes, in Proceedings of the IRE, 952. [9] D. MacKay, Information Theory, Inference, and Learning Algorithms. Cambridge University Press, [0] P. G. Howard and J. S. Vitter, Analysis of arithmetic coding for data comression., in Data Comression Conference (J. A. Storer and J. H. Reif, eds.),. 3 2, IEEE Comuter Society, 99. [] J. Ziv and A. Lemel, Comression of individual sequences via variable-rate coding, IEEE Trans. Inf. Theor., vol. 24, , Set

Source Coding and express these numbers in a binary system using M log

Source Coding and express these numbers in a binary system using M log Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is

More information

Randomized algorithms: Two examples and Yao s Minimax Principle

Randomized algorithms: Two examples and Yao s Minimax Principle Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum

More information

arxiv: v1 [cs.mm] 18 Jan 2016

arxiv: v1 [cs.mm] 18 Jan 2016 Lossless Intra Coding in with 3-ta Filters Saeed R. Alvar a, Fatih Kamisli a a Deartment of Electrical and Electronics Engineering, Middle East Technical University, Turkey arxiv:1601.04473v1 [cs.mm] 18

More information

A Study of Protocols for Low-Latency Video Transport over the Internet

A Study of Protocols for Low-Latency Video Transport over the Internet A Study of Protocols for Low-Latency Video Transort over the Internet Ciro A. Noronha, Ph.D. Cobalt Digital Santa Clara, CA ciro.noronha@cobaltdigital.com Juliana W. Noronha University of California, Davis

More information

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal

More information

Introduction to Image Compresion

Introduction to Image Compresion ENEE63 Fall 2 Lecture-7 Introduction to Image Comresion htt://www.ece.umd.edu/class/enee63/ minwu@eng.umd.edu M. Wu: ENEE63 Digital Image Processing (Fall') Min Wu Electrical & Comuter Engineering Univ.

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China

More information

Distributed Estimation from Relative Measurements in Sensor Networks

Distributed Estimation from Relative Measurements in Sensor Networks Distributed Estimation from Relative Measurements in Sensor Networks #Prabir Barooah and João P. Hesanha Abstract We consider the roblem of estimating vectorvalued variables from noisy relative measurements.

More information

Truth Trees. Truth Tree Fundamentals

Truth Trees. Truth Tree Fundamentals Truth Trees 1 True Tree Fundamentals 2 Testing Grous of Statements for Consistency 3 Testing Arguments in Proositional Logic 4 Proving Invalidity in Predicate Logic Answers to Selected Exercises Truth

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

Equality-Based Translation Validator for LLVM

Equality-Based Translation Validator for LLVM Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented

More information

1.5 Case Study. dynamic connectivity quick find quick union improvements applications

1.5 Case Study. dynamic connectivity quick find quick union improvements applications . Case Study dynamic connectivity quick find quick union imrovements alications Subtext of today s lecture (and this course) Stes to develoing a usable algorithm. Model the roblem. Find an algorithm to

More information

Swift Template Matching Based on Equivalent Histogram

Swift Template Matching Based on Equivalent Histogram Swift emlate Matching ased on Equivalent istogram Wangsheng Yu, Xiaohua ian, Zhiqiang ou * elecommunications Engineering Institute Air Force Engineering University Xi an, PR China *corresonding author:

More information

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions

More information

The concept of set is a very basic one. It is simple; yet, it suffices as the basis on which all abstract notions in mathematics can be built.

The concept of set is a very basic one. It is simple; yet, it suffices as the basis on which all abstract notions in mathematics can be built. Chater 1 Sets and functions Section 1.1 Sets The concet of set is a very basic one. It is simle; yet, it suffices as the basis on which all abstract notions in mathematics can be built. A set is determined

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information

Introduction to Parallel Algorithms

Introduction to Parallel Algorithms CS 1762 Fall, 2011 1 Introduction to Parallel Algorithms Introduction to Parallel Algorithms ECE 1762 Algorithms and Data Structures Fall Semester, 2011 1 Preliminaries Since the early 1990s, there has

More information

TOPP Probing of Network Links with Large Independent Latencies

TOPP Probing of Network Links with Large Independent Latencies TOPP Probing of Network Links with Large Indeendent Latencies M. Hosseinour, M. J. Tunnicliffe Faculty of Comuting, Information ystems and Mathematics, Kingston University, Kingston-on-Thames, urrey, KT1

More information

Near-Optimal Routing Lookups with Bounded Worst Case Performance

Near-Optimal Routing Lookups with Bounded Worst Case Performance Near-Otimal Routing Lookus with Bounded Worst Case Performance Pankaj Guta Balaji Prabhakar Stehen Boyd Deartments of Electrical Engineering and Comuter Science Stanford University CA 9430 ankaj@stanfordedu

More information

Parallel Construction of Multidimensional Binary Search Trees. Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka

Parallel Construction of Multidimensional Binary Search Trees. Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka Parallel Construction of Multidimensional Binary Search Trees Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka School of CIS and School of CISE Northeast Parallel Architectures Center Syracuse

More information

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links

More information

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,

More information

Lecture 8: Orthogonal Range Searching

Lecture 8: Orthogonal Range Searching CPS234 Comutational Geometry Setember 22nd, 2005 Lecture 8: Orthogonal Range Searching Lecturer: Pankaj K. Agarwal Scribe: Mason F. Matthews 8.1 Range Searching The general roblem of range searching is

More information

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method ITB J. Eng. Sci. Vol. 39 B, No. 1, 007, 1-19 1 Leak Detection Modeling and Simulation for Oil Pieline with Artificial Intelligence Method Pudjo Sukarno 1, Kuntjoro Adji Sidarto, Amoranto Trisnobudi 3,

More information

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism Erlin Yao, Mingyu Chen, Rui Wang, Wenli Zhang, Guangming Tan Key Laboratory of Comuter System and Architecture Institute

More information

SPARSE SIGNAL REPRESENTATION FOR COMPLEX-VALUED IMAGING Sadegh Samadi 1, M üjdat Çetin 2, Mohammad Ali Masnadi-Shirazi 1

SPARSE SIGNAL REPRESENTATION FOR COMPLEX-VALUED IMAGING Sadegh Samadi 1, M üjdat Çetin 2, Mohammad Ali Masnadi-Shirazi 1 SPARSE SIGNAL REPRESENTATION FOR COMPLEX-VALUED IMAGING Sadegh Samadi 1, M üjdat Çetin, Mohammad Ali Masnadi-Shirazi 1 1. Shiraz University, Shiraz, Iran,. Sabanci University, Istanbul, Turkey ssamadi@shirazu.ac.ir,

More information

Implementations of Partial Document Ranking Using. Inverted Files. Wai Yee Peter Wong. Dik Lun Lee

Implementations of Partial Document Ranking Using. Inverted Files. Wai Yee Peter Wong. Dik Lun Lee Imlementations of Partial Document Ranking Using Inverted Files Wai Yee Peter Wong Dik Lun Lee Deartment of Comuter and Information Science, Ohio State University, 36 Neil Ave, Columbus, Ohio 4321, U.S.A.

More information

CS 229 Final Project: Single Image Depth Estimation From Predicted Semantic Labels

CS 229 Final Project: Single Image Depth Estimation From Predicted Semantic Labels CS 229 Final Project: Single Image Deth Estimation From Predicted Semantic Labels Beyang Liu beyangl@cs.stanford.edu Stehen Gould sgould@stanford.edu Prof. Dahne Koller koller@cs.stanford.edu December

More information

Introduction to Visualization and Computer Graphics

Introduction to Visualization and Computer Graphics Introduction to Visualization and Comuter Grahics DH2320, Fall 2015 Prof. Dr. Tino Weinkauf Introduction to Visualization and Comuter Grahics Grids and Interolation Next Tuesday No lecture next Tuesday!

More information

Real Time Compression of Triangle Mesh Connectivity

Real Time Compression of Triangle Mesh Connectivity Real Time Comression of Triangle Mesh Connectivity Stefan Gumhold, Wolfgang Straßer WSI/GRIS University of Tübingen Abstract In this aer we introduce a new comressed reresentation for the connectivity

More information

10. Parallel Methods for Data Sorting

10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting... 1 10.1. Parallelizing Princiles... 10.. Scaling Parallel Comutations... 10.3. Bubble Sort...3 10.3.1. Sequential Algorithm...3

More information

Building Better Nurse Scheduling Algorithms

Building Better Nurse Scheduling Algorithms Building Better Nurse Scheduling Algorithms Annals of Oerations Research, 128, 159-177, 2004. Dr Uwe Aickelin Dr Paul White School of Comuter Science University of the West of England University of Nottingham

More information

Non-Strict Independence-Based Program Parallelization Using Sharing and Freeness Information

Non-Strict Independence-Based Program Parallelization Using Sharing and Freeness Information Non-Strict Indeendence-Based Program Parallelization Using Sharing and Freeness Information Daniel Cabeza Gras 1 and Manuel V. Hermenegildo 1,2 Abstract The current ubiuity of multi-core rocessors has

More information

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture

More information

Distributed Basis Pursuit

Distributed Basis Pursuit Distributed Basis Pursuit João F. C. Mota, João M. F. Xavier, Pedro M. Q. Aguiar, and Markus Püschel arxiv:009.28v3 [math.oc] 4 Mar 202 Abstract We roose a distributed algorithm for solving the otimization

More information

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics structure arises in many alications of geometry. The dual structure, called a Delaunay triangulation also has many interesting roerties. Figure 3: Voronoi diagram and Delaunay triangulation. Search: Geometric

More information

Directed File Transfer Scheduling

Directed File Transfer Scheduling Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was

More information

Learning Robust Locality Preserving Projection via p-order Minimization

Learning Robust Locality Preserving Projection via p-order Minimization Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence Learning Robust Locality Preserving Projection via -Order Minimization Hua Wang, Feiing Nie, Heng Huang Deartment of Electrical

More information

Information Flow Based Event Distribution Middleware

Information Flow Based Event Distribution Middleware Information Flow Based Event Distribution Middleware Guruduth Banavar 1, Marc Kalan 1, Kelly Shaw 2, Robert E. Strom 1, Daniel C. Sturman 1, and Wei Tao 3 1 IBM T. J. Watson Research Center Hawthorne,

More information

Extracting Optimal Paths from Roadmaps for Motion Planning

Extracting Optimal Paths from Roadmaps for Motion Planning Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu

More information

An Efficient Video Program Delivery algorithm in Tree Networks*

An Efficient Video Program Delivery algorithm in Tree Networks* 3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,

More information

An Indexing Framework for Structured P2P Systems

An Indexing Framework for Structured P2P Systems An Indexing Framework for Structured P2P Systems Adina Crainiceanu Prakash Linga Ashwin Machanavajjhala Johannes Gehrke Carl Lagoze Jayavel Shanmugasundaram Deartment of Comuter Science, Cornell University

More information

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1 Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Weimin Chen, Volker Turau TR-93-047 August, 1993 Abstract This aer introduces a new technique for source-to-source code

More information

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,

More information

Efficient Parallel Hierarchical Clustering

Efficient Parallel Hierarchical Clustering Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore

More information

A Model-Adaptable MOSFET Parameter Extraction System

A Model-Adaptable MOSFET Parameter Extraction System A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313

More information

Multi-robot SLAM with Unknown Initial Correspondence: The Robot Rendezvous Case

Multi-robot SLAM with Unknown Initial Correspondence: The Robot Rendezvous Case Multi-robot SLAM with Unknown Initial Corresondence: The Robot Rendezvous Case Xun S. Zhou and Stergios I. Roumeliotis Deartment of Comuter Science & Engineering, University of Minnesota, Minneaolis, MN

More information

Semi-Supervised Learning Based Object Detection in Aerial Imagery

Semi-Supervised Learning Based Object Detection in Aerial Imagery Semi-Suervised Learning Based Obect Detection in Aerial Imagery Jian Yao Zhongfei (Mark) Zhang Deartment of Comuter Science, State University of ew York at Binghamton, Y 13905, USA yao@binghamton.edu Zhongfei@cs.binghamton.edu

More information

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY Andrew Lam 1, Steven J.E. Wilton 1, Phili Leong 2, Wayne Luk 3 1 Elec. and Com. Engineering 2 Comuter Science

More information

Complexity analysis and performance evaluation of matrix product on multicore architectures

Complexity analysis and performance evaluation of matrix product on multicore architectures Comlexity analysis and erformance evaluation of matrix roduct on multicore architectures Mathias Jacquelin, Loris Marchal and Yves Robert École Normale Suérieure de Lyon, France {Mathias.Jacquelin Loris.Marchal

More information

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu

More information

Stereo Disparity Estimation in Moment Space

Stereo Disparity Estimation in Moment Space Stereo Disarity Estimation in oment Sace Angeline Pang Faculty of Information Technology, ultimedia University, 63 Cyberjaya, alaysia. angeline.ang@mmu.edu.my R. ukundan Deartment of Comuter Science, University

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

High Quality Offset Printing An Evolutionary Approach

High Quality Offset Printing An Evolutionary Approach High Quality Offset Printing An Evolutionary Aroach Ralf Joost Institute of Alied Microelectronics and omuter Engineering University of Rostock Rostock, 18051, Germany +49 381 498 7272 ralf.joost@uni-rostock.de

More information

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University.

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University. Relations with Relation Names as Arguments: Algebra and Calculus Kenneth A. Ross Columbia University kar@cs.columbia.edu Abstract We consider a version of the relational model in which relation names may

More information

SPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation

SPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation To aear in IEEE VLSI Test Symosium, 1997 SITFIRE: Scalable arallel Algorithms for Test Set artitioned Fault Simulation Dili Krishnaswamy y Elizabeth M. Rudnick y Janak H. atel y rithviraj Banerjee z y

More information

Convex Hulls. Helen Cameron. Helen Cameron Convex Hulls 1/101

Convex Hulls. Helen Cameron. Helen Cameron Convex Hulls 1/101 Convex Hulls Helen Cameron Helen Cameron Convex Hulls 1/101 What Is a Convex Hull? Starting Point: Points in 2D y x Helen Cameron Convex Hulls 3/101 Convex Hull: Informally Imagine that the x, y-lane is

More information

Experiments on Patent Retrieval at NTCIR-4 Workshop

Experiments on Patent Retrieval at NTCIR-4 Workshop Working Notes of NTCIR-4, Tokyo, 2-4 June 2004 Exeriments on Patent Retrieval at NTCIR-4 Worksho Hironori Takeuchi Λ Naohiko Uramoto Λy Koichi Takeda Λ Λ Tokyo Research Laboratory, IBM Research y National

More information

Patterned Wafer Segmentation

Patterned Wafer Segmentation atterned Wafer Segmentation ierrick Bourgeat ab, Fabrice Meriaudeau b, Kenneth W. Tobin a, atrick Gorria b a Oak Ridge National Laboratory,.O.Box 2008, Oak Ridge, TN 37831-6011, USA b Le2i Laboratory Univ.of

More information

Tracking Multiple Targets Using a Particle Filter Representation of the Joint Multitarget Probability Density

Tracking Multiple Targets Using a Particle Filter Representation of the Joint Multitarget Probability Density Tracing Multile Targets Using a Particle Filter Reresentation of the Joint Multitarget Probability Density Chris Kreucher, Keith Kastella, Alfred Hero This wor was suorted by United States Air Force contract

More information

MULTI-CAMERA SURVEILLANCE WITH VISUAL TAGGING AND GENERIC CAMERA PLACEMENT. Jian Zhao and Sen-ching S. Cheung

MULTI-CAMERA SURVEILLANCE WITH VISUAL TAGGING AND GENERIC CAMERA PLACEMENT. Jian Zhao and Sen-ching S. Cheung MULTI-CAMERA SURVEILLANCE WITH VISUAL TAGGING AND GENERIC CAMERA PLACEMENT Jian Zhao and Sen-ching S. Cheung University of Kentucky Center for Visualization and Virtual Environment 1 Quality Street, Suite

More information

Using Rational Numbers and Parallel Computing to Efficiently Avoid Round-off Errors on Map Simplification

Using Rational Numbers and Parallel Computing to Efficiently Avoid Round-off Errors on Map Simplification Using Rational Numbers and Parallel Comuting to Efficiently Avoid Round-off Errors on Ma Simlification Maurício G. Grui 1, Salles V. G. de Magalhães 1,2, Marcus V. A. Andrade 1, W. Randolh Franklin 2,

More information

REAL NUMBERS. 1.1 Introduction

REAL NUMBERS. 1.1 Introduction REAL NUMBERS 1 REAL NUMBERS 1 1.1 Introduction In Class IX, you began your exloration of the world of real numbers and encountered irrational numbers. We continue our discussion on real numbers in this

More information

MATHEMATICAL MODELING OF COMPLEX MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT

MATHEMATICAL MODELING OF COMPLEX MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT MATHEMATICAL MODELING OF COMPLE MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT V.N. Nesterov JSC Samara Electromechanical Plant, Samara, Russia Abstract. The rovisions of the concet of a multi-comonent

More information

521493S Computer Graphics Exercise 3 (Chapters 6-8)

521493S Computer Graphics Exercise 3 (Chapters 6-8) 521493S Comuter Grahics Exercise 3 (Chaters 6-8) 1 Most grahics systems and APIs use the simle lighting and reflection models that we introduced for olygon rendering Describe the ways in which each of

More information

GRAPH CUT OPTIMIZATION FOR THE MUMFORD-SHAH MODEL

GRAPH CUT OPTIMIZATION FOR THE MUMFORD-SHAH MODEL GRAPH CUT OPTIMIZATION FOR THE MUMFORD-SHAH MODEL Noha El Zehiry 1,2, Steve Xu 2, Prasanna Sahoo 2 and Adel Elmaghraby 1 1 Deartment of Comuter Engineering and Comuter Science, University of Louisville,

More information

Collective communication: theory, practice, and experience

Collective communication: theory, practice, and experience CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Comutat.: Pract. Exer. 2007; 19:1749 1783 Published online 5 July 2007 in Wiley InterScience (www.interscience.wiley.com)..1206 Collective

More information

High Quality Offset Printing An Evolutionary Approach

High Quality Offset Printing An Evolutionary Approach High Quality Offset Printing An Evolutionary Aroach Ralf Joost Institute of Alied Microelectronics and omuter Engineering University of Rostock Rostock, 18051, Germany +49 381 498 7272 ralf.joost@uni-rostock.de

More information

CMSC 425: Lecture 16 Motion Planning: Basic Concepts

CMSC 425: Lecture 16 Motion Planning: Basic Concepts : Lecture 16 Motion lanning: Basic Concets eading: Today s material comes from various sources, including AI Game rogramming Wisdom 2 by S. abin and lanning Algorithms by S. M. LaValle (Chats. 4 and 5).

More information

Complexity analysis of matrix product on multicore architectures

Complexity analysis of matrix product on multicore architectures Comlexity analysis of matrix roduct on multicore architectures Mathias Jacquelin, Loris Marchal and Yves Robert École Normale Suérieure de Lyon, France {Mathias.Jacquelin Loris.Marchal Yves.Robert}@ens-lyon.fr

More information

Grouping of Patches in Progressive Radiosity

Grouping of Patches in Progressive Radiosity Grouing of Patches in Progressive Radiosity Arjan J.F. Kok * Abstract The radiosity method can be imroved by (adatively) grouing small neighboring atches into grous. Comutations normally done for searate

More information

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal International Journal of Information and Electronics Engineering, Vol. 1, No. 1, July 011 An Efficient VLSI Architecture for Adative Rank Order Filter for Image Noise Removal M. C Hanumantharaju, M. Ravishankar,

More information

Optimizing Dynamic Memory Management!

Optimizing Dynamic Memory Management! Otimizing Dynamic Memory Management! 1 Goals of this Lecture! Hel you learn about:" Details of K&R hea mgr" Hea mgr otimizations related to Assignment #6" Faster free() via doubly-linked list, redundant

More information

Mitigating the Impact of Decompression Latency in L1 Compressed Data Caches via Prefetching

Mitigating the Impact of Decompression Latency in L1 Compressed Data Caches via Prefetching Mitigating the Imact of Decomression Latency in L1 Comressed Data Caches via Prefetching by Sean Rea A thesis resented to Lakehead University in artial fulfillment of the requirement for the degree of

More information

MATH4455 Module 10 Worth the Weight

MATH4455 Module 10 Worth the Weight MTH4455 Module 10 Worth the Weight Math Math oncets: Weighted Means, Inscribed reas, eneralized Midoints uxiliary Ideas: Quadrilaterals, eneralized Proortions, Polygons, onvexity I. Personally Inscribed.

More information

Optimal Multiple Sprite Generation based on Physical Camera Parameter Estimation

Optimal Multiple Sprite Generation based on Physical Camera Parameter Estimation Otimal Multile Srite Generation based on Physical Camera Parameter Estimation Matthias Kunter* a, Andreas Krutz a, Mrinal Mandal b, Thomas Sikora a a Commun. Systems Grou, Technische Universität Berlin,

More information

Label-Guided Graph Exploration by a Finite Automaton

Label-Guided Graph Exploration by a Finite Automaton Label-Guided Grah Exloration by a Finite Automaton REUVEN COHEN Boston University, USA PIERRE FRAIGNIAUD CNRS and Université Paris Diderot - Paris 7, France DAVID ILCINKAS CNRS and Université Bordeaux

More information

Lecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model.

Lecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model. U.C. Berkeley CS273: Parallel and Distributed Theory Lecture 18 Professor Satish Rao Lecturer: Satish Rao Last revised Scribe so far: Satish Rao (following revious lecture notes quite closely. Lecture

More information

Complexity analysis of matrix product on multicore architectures

Complexity analysis of matrix product on multicore architectures Comlexity analysis of matrix roduct on multicore architectures Mathias Jacquelin, Loris Marchal and Yves Robert École Normale Suérieure de Lyon, France {Mathias.Jacquelin Loris.Marchal Yves.Robert}@ens-lyon.fr

More information

An Annotated k-deep Prefix Tree for (1-k)-mer Based Sequence Comparisons

An Annotated k-deep Prefix Tree for (1-k)-mer Based Sequence Comparisons An Annotated k-dee Prefix Tree for (1-k)-mer Based Sequence Comarisons Adrienne Breland 1, Karen Schlauch, Monica Nicolescu 1, Frederick C. Harris Jr. 1 Det. of Com. Sci. & Engr. 1 001-775-784-6974 {breland,monica,fredh}@cse.unr.edu

More information

Adaptive Location Constraint Processing

Adaptive Location Constraint Processing Adative Location Constraint Processing Zhengdao Xu and Hans-Arno Jacobsen University of Toronto zhengdao@cs.toronto.edu, jacobsen@eecg.toronto.edu ABSTRACT An imortant roblem for many location-based alications

More information

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment

More information

To appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree

To appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree To aear in IEEE TKDE Title: Efficient Skyline and To-k Retrieval in Subsaces Keywords: Skyline, To-k, Subsace, B-tree Contact Author: Yufei Tao (taoyf@cse.cuhk.edu.hk) Deartment of Comuter Science and

More information

Auto-Tuning Distributed-Memory 3-Dimensional Fast Fourier Transforms on the Cray XT4

Auto-Tuning Distributed-Memory 3-Dimensional Fast Fourier Transforms on the Cray XT4 Auto-Tuning Distributed-Memory 3-Dimensional Fast Fourier Transforms on the Cray XT4 M. Gajbe a A. Canning, b L-W. Wang, b J. Shalf, b H. Wasserman, b and R. Vuduc, a a Georgia Institute of Technology,

More information

Fast Distributed Process Creation with the XMOS XS1 Architecture

Fast Distributed Process Creation with the XMOS XS1 Architecture Communicating Process Architectures 20 P.H. Welch et al. (Eds.) IOS Press, 20 c 20 The authors and IOS Press. All rights reserved. Fast Distributed Process Creation with the XMOS XS Architecture James

More information

Interactive Image Segmentation

Interactive Image Segmentation Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).

More information

Pivot Selection for Dimension Reduction Using Annealing by Increasing Resampling *

Pivot Selection for Dimension Reduction Using Annealing by Increasing Resampling * ivot Selection for Dimension Reduction Using Annealing by Increasing Resamling * Yasunobu Imamura 1, Naoya Higuchi 1, Tetsuji Kuboyama 2, Kouichi Hirata 1 and Takeshi Shinohara 1 1 Kyushu Institute of

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Distrib. Comut. 71 (2011) 288 301 Contents lists available at ScienceDirect J. Parallel Distrib. Comut. journal homeage: www.elsevier.com/locate/jdc Quality of security adatation in arallel

More information

Experimental Comparison of Shortest Path Approaches for Timetable Information

Experimental Comparison of Shortest Path Approaches for Timetable Information Exerimental Comarison of Shortest Path roaches for Timetable Information Evangelia Pyrga Frank Schulz Dorothea Wagner Christos Zaroliagis bstract We consider two aroaches that model timetable information

More information

Privacy Preserving Moving KNN Queries

Privacy Preserving Moving KNN Queries Privacy Preserving Moving KNN Queries arxiv:4.76v [cs.db] 4 Ar Tanzima Hashem Lars Kulik Rui Zhang National ICT Australia, Deartment of Comuter Science and Software Engineering University of Melbourne,

More information

Submission. Verifying Properties Using Sequential ATPG

Submission. Verifying Properties Using Sequential ATPG Verifying Proerties Using Sequential ATPG Jacob A. Abraham and Vivekananda M. Vedula Comuter Engineering Research Center The University of Texas at Austin Austin, TX 78712 jaa, vivek @cerc.utexas.edu Daniel

More information

Improving Parallel-Disk Buffer Management using Randomized Writeback æ

Improving Parallel-Disk Buffer Management using Randomized Writeback æ Aears in Proceedings of ICPP 98 1 Imroving Parallel-Disk Buffer Management using Randomized Writeback æ Mahesh Kallahalla Peter J Varman Detartment of Electrical and Comuter Engineering Rice University

More information

The Priority R-Tree: A Practically Efficient and Worst-Case Optimal R-Tree

The Priority R-Tree: A Practically Efficient and Worst-Case Optimal R-Tree The Priority R-Tree: A Practically Efficient and Worst-Case Otimal R-Tree Lars Arge Deartment of Comuter Science Duke University, ox 90129 Durham, NC 27708-0129 USA large@cs.duke.edu Mark de erg Deartment

More information

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION Yugoslav Journal of Oerations Research (00), umber, 5- A BICRITERIO STEIER TREE PROBLEM O GRAPH Mirko VUJO[EVI], Milan STAOJEVI] Laboratory for Oerational Research, Faculty of Organizational Sciences University

More information

RTL Fast Convolution using the Mersenne Number Transform

RTL Fast Convolution using the Mersenne Number Transform RTL Fast Convolution using the Mersenne Number Transform Oscar N. Bria and Horacio A. Villagarcía o.bria@ieee.org CeTAD - - Argentina Abstract VHDL is a versatile high level language for the secification

More information

Face Recognition Using Legendre Moments

Face Recognition Using Legendre Moments Face Recognition Using Legendre Moments Dr.S.Annadurai 1 A.Saradha Professor & Head of CSE & IT Research scholar in CSE Government College of Technology, Government College of Technology, Coimbatore, Tamilnadu,

More information

arxiv: v1 [cs.dc] 13 Nov 2018

arxiv: v1 [cs.dc] 13 Nov 2018 Task Grah Transformations for Latency Tolerance arxiv:1811.05077v1 [cs.dc] 13 Nov 2018 Victor Eijkhout November 14, 2018 Abstract The Integrative Model for Parallelism (IMP) derives a task grah from a

More information