Learning Bayesian Networks from Inaccurate Data

Size: px
Start display at page:

Download "Learning Bayesian Networks from Inaccurate Data"

Transcription

1 Learnin Bayesian Networks from Inaccurate Data A Study on the Effect of Inaccurate Data on Parameter Estimation and Structure Learnin of Bayesian Networks Valerie Sessions Marco Valtorta Department of Computer Science and Enineerin, University of South Carolina Astract The wealth of data collected y automated systems, or pen and paper processes, and availale on the World Wide We, is staerin. With these vast amounts of data come amazin possiilities for data minin and learnin of data patterns throuh automated and semi-automated tools. However, these tools are inherently reliant on the quality of the data with which they are supplied. Without a thorouh understandin of our data s quality and the effects of poor quality on our learnin alorithms, we are consequently unale to accurately jude the quality of our models. We have distilled the ideas of prominent data quality researchers into four features of data sources: data accuracy, completeness, timeliness, and consistency. After understandin various dimensions of data quality we were ale to test the effects of inaccurate data on learnin of Bayesian Networks, specifically in Parameter Estimation and Structure Learnin. By testin the learnin alorithms with differin percentaes and amounts of inaccurate data, we have eun to develop uidelines for adjustin the learnin techniques and judin the quality of the learned models. 1

2 1. Data Quality Metrics Assessin the quality of our data is a difficult process and is ripe with sujectivity. Researchers have een attemptin for some time to create quantitative metrics to accurately jude the quality of our data. There are many different measurements that these researchers use to assess data quality. These rane from the sujective value-added and understandaility, to those that are more easily quantifiale, such as completeness and timeliness. While some researchers have up to sixteen different metrics [Pipino et al 00], we will concentrate on a core set of four for this research accuracy/precision, completeness, consistency/elievaility, and timeliness, distilled from [Wand and Wan 1996], [Stron et al 1997], and [Tayi and Ballou 1998]. We will explain these terms in the context of our research. Accuracy and precision are taken from their common scientific meanins. Accuracy represents how close a measurement, or data record, is to the real-world situation that it measures. Precision will refer to two similar ideas in this research. Firstly, it will refer to the standard deviation or variation in a numerical data record with multiple readins. As an example, if a weather sensor is calirated efore its use to have a variation of ± 0.01 C, we would use this calirated rane as the precision of the instrument. The second use for precision is to quantify the deree to which a sensor, or other data input, ives a consistent data output for a iven input, reardless of the accuracy of these results. Of course, we would wish our data to e oth accurate and precise. While accuracy is a metric that must e calculated over time and with much dilience to discover discrepancies etween what is contained in the real world and what

3 is represented in the data record, precision can more easily e calculated from the data at hand. Completeness in this research will refer to the amount of missin data records. This can e computed as the total numer of missin data, or the total numer of rows containin missin data. Each can e useful in our research. This metric is easily calculated from the data at hand, and requires no sujective insertions from the user or data manaer. Completeness is especially important in our research, as we can aue the effects of usin approximation alorithms, such as Gis Samplin or the Expectation- Maximization (EM) alorithm, in our learnin techniques. Lare amounts of missin data can also point to prolems in the data collection method and the data collection tools. Timeliness of the data is also important in the context of our data set. Data that is outdated is often useless in many fields of study, such as weather data records, or stock market data that must e used to make uyin and sellin decisions in seconds. However, in other fields the timeliness of data is not as crucial. If historical data is ein used to track consumer spendin over the last decade, havin data within minutes of the realworld event is not as important. This metric is therefore at once oth sujective and ojective. If the data is time-stamped, it is not difficult to determine the time difference etween the entry and the present time. However, we must have allowed a Suject Matter Expert to then uide the proram to determine how current the data should e for that particular purpose. Lastly, our research will employ the idea of consistency or elievaility. These metrics are similar to precision, except will e used here to compare data from different data sets. Where precision applies to one particular data source a particular sensor or 3

4 manually inputted data source, consistency/elievaility will apply to multiple data sets reportin on the same real-world situation. If we have three sensors reportin weather information from one location (or small radius) we can measure the consistency of the data for that reion as the deviation etween the data records from each sensor. Similarly, if we have eyewitness accounts at the scene of a crime, we can jude the consistency of the data set y the similarity of the accounts. This metric is computed separately from the accuracy and precision calculations and ives no weiht to one data source over the other. If there are three data sources, we will calculate one consistency metric for that data record which takes into account differences from all the data sets, without declarin which data source is most accurate. This allows us to account for differences in data without knowin the accuracy of the data set. This may seem faulty, and indeed if we have the resources to jude the accuracy of the data sets then we can assin data quality ased on those findins. However, consistency allows us a metric to determine that there are indeed differences in data sources, without tracin the data sets ack to the sources and havin to exhaustively determine which data set is most accurate. Consistency is an easier metric to calculate and more likely to e availale for use in our alorithms.. Testin the Effects of Inaccuracy While all four data quality dimensions will eventually e thorouhly studied in our research, the focus of this paper will remain on inaccuracy and its effect on learned Bayesian Networks (BNs). In order to understand these effects, a set of tests was constructed. Two test BNs were modeled one that will e considered the true state of the BN and another, ad data set in which all of the potentials were set at 0.5 (equal 4

5 likelihood of either result). Data sets were then enerated with 0%, 10%, 5%, 50%, 75%, and 90% dirty data y creatin one data set with the true data records and a second with the ad data and meldin them toether. For example, to enerate a 10% dirty set for 100 records, one would enerate 90 cases from the true data set and 10 cases from the ad data set and comine them for a 100 record set. This was done for 100, 500, 1000, and 10,000 record sets. For purposes of this research, two traditional BNs were studied Trip to Asia and the Stud Farm network. The structures of these networks are shown in Fiures 1 and respectively. Fiure 1 Trip to Asia 5

6 Fiure Stud Farm Network After creatin the data sets, the enerated data were iven to three BN learnin prorams a Parameter Estimation alorithm, the Huin Researcher Structure Learnin tool that implements the NPC and PC alorithms, and Visual CB, an implementation of the CB alorithm developed y [Sinh and Valtorta 1995]. See also [Neapolitan 004]. The pseudocode for the Parameter Learnin alorithm is displayed elow in Fiure 3. The input to the code is a Huin.net file as well as the data sources either in a flat file or XML schema. The alorithm uses either the linear calculation, or the mean of the eta distriution for the potential calculation. This code can e easily manipulated for testin our new alorithms y chanin the potential calculations of each data set. 6

7 Parameter Estimation Pseudo code Input: Bayesian Network structure in form of Huin.net file, flat file or XML schema of data sets Parse structure et nodes and states of nodes from Huin structure For each Node If Node with no parents i = count total numer of entries for that node For each state of node (yes, no, other, etc) j = Count entries of that state Calculate eta distriution for that state Potential for the state = effective value, E(F) = j/i, or mean of eta distriution If Node with parents For each state of parent i = count total numer of entries where parent = that state For each state of node j = count numer of entries where parent = current state and node = current state Calculate eta distriution for that state Potential for the state = effective value, E(F) = j/i, or mean of eta distriution Output: Bayesian Network with learned potentials in form of Huin.net file Fiure 3 Parameter Estimation Pseudocode The potentials enerated y the alorithm were compared to the aseline of learnin from 0% dirty data. The variance etween the aseline and the dirty data sets was then calculated (standard variance calculation - σ αβ =, where α ( α + β ) ( α + β + 1) and β are standard parameters of the eta distriution). Then the averae variance was calculated for each size of the data set - 100, 500, 1000, and 10,000 data records. Also, the data sets potential calculations were raphed to show differences in oriinal and dirty data sets. In order to test the effects of inaccurate data on the Huin Structure Learnin alorithms, the dirty data sets were inputted to this proram and compared to a structure 7

8 learned from a aseline of 0% dirty data. These structures were compared for missin links, reversed links, and extra links to determine the effects of this inaccurate data on the learned structures. Further, the data sets were run throuh a second Structure Learnin alorithm developed y [Sinh and Valtorta 1995] the CB alorithm. This alorithm is a comination of a conditional independence testin alorithm with the traditional K alorithm for determinin BN structure. These structures were also compared for missin links, reversed links, and extra links aainst the aseline data. 3. Parameter Estimation Results The resultant potential calculations for the Trip to Asia experiments are shown in taular form in Fiure 4 and raphical form in Fiure 5. Averae Variance Baseline 10 percent 5 percent 50 percent 75 percent 90 percent Fiure 4 Averae Variance From Baseline 8

9 Comparison Of Learned Potentials 1. 1 Learned Potential Series1 Series Series3 Series4 Series5 Series Data Point Fiure 5 Comparison of learned potentials from dirty data sets. Series 1 Baseline Data Potentials learned from 0% dirty data on 100 records Series Baseline Data Potentials learned from 0% dirty data on 10,000 records Series 3 Potentials learned from 10% dirty data on 100 records Series 4 Potentials learned from 10% dirty data on 10,000 records Series 5 Potentials learned from 90% dirty data on 100 records Series 6 Potentials learned from 90% dirty data on 10,000 records The results from the raph are surprisin at first, ecause it seems as thouh the smaller data sets yield etter results than the larer ones. This is not the case however, and the apparent rise in variance as the data set ets larer is due to normal variances of the eta distriution. While the distriution of ood and ad data sets is important, the results do not chane on averae with a rise in the total numer of data records used. We will prove this in two parts. Firstly, we will prove that the potential of a state is due to the distriutions of the data, and is not affected y the amount of data used to learn the data sets. Secondly, we will show that the variance from the oriinal learned data sets is directly related to the inherent properties of the eta distriution. 9

10 Theorem 1 The learned potential of a state is invariant with respect to the numer of n ood and ad data sets, n and n, respectively, when the ratio is fixed. n Proof: Consider a inary variale, say X, in state yes. The potential of X = yes is φ ood. If a sample of size n is otained y simulation, the numer of cases in which X = yes has mean n * φ ood. Consider a second distriution in which the proaility of X = yes is φ ad. If a sample of n size is otained from this distriution, the numer of cases for which X = yes has mean n * φ ad. Considerin a sample that is an areate of the aove two, we otain the fraction of the cases for which X = yes is ( n ood ) + ( n ad ) φ overall =. (1) ( n + n ) To prove that this ratio is invariant with respect to n + n when replace n with k * n and n with k * n. (( k n ) ood ) + (( k n ) ad ) φ overall =. (( k n ) + ( k n )) This reduces to k *(( n ood ) + ( n ad )) φ overall =. k *( n + n ) n n is fixed, we will The factor k cancels out, provin that the φ overall is invariant with respect to the size of the n overall data set, when is fixed. n Lemma 1 - The variances in the data sets that are apparent in the experiment are due to the inherent properties of the eta distriution. 10

11 Explanation The formula for the eta distriution is ( α 1)!( β 1)! B ( α, β ) =. ( α + β 1)! α The mean is iven y µ = and the variance y α + β αβ σ =. ( α + β ) ( α + β + 1) We proved in Theorem 1 that the mean is invariant with respect to additional overall data when the ratio of ood data to ad data is constant. Now we will see if the variance is also invariant with respect to n + n when the ratio n n is fixed. We have the same n, n, φ ood, and φ ad from the previous proof. Sustitutin for α and β we have σ [( n = ood ) + ( n ad ( n )] [( n + n ( n ) ( n + n ood + 1) )) + ( n ( n ad ))]. Sustitutin n with k*n and n with k * n we have σ [( kn = ood ) + ( kn ad ( kn )] [( kn + kn ( kn ) ( kn + kn ood + 1) )) + ( kn ( kn ad ))]. Factorin k we have σ = k [( n ood ) + ( n k ad ( n )] [( n + n ( n ) ( kn + kn ood + 1) )) + ( n ( n ad ))] σ [( n = ood ) + ( n ad ( n )] [( n + n ( n ) ( kn + kn ood + 1) )) + ( n ( n ad ))]. We cannot factor out the k from the denominator. The lim σ = 0. k Therefore, as k ets larer the variance ecomes smaller. 11

12 Results from the Stud Farm Network are similar, ut were run on only 100 and 10,000 data records, for the aseline, 10%, 50%, and 90% dirty data. The Parameter Estimation results are shown in taular form in Fiure 6, and raphically in Fiure 7. Averae Variance Baseline 10 Percent 50 Percent 90 Percent Fiure 6 Stud Farm Averae Variance from Baseline Comparison of Learnt Potentials - 10,000 Data Records 1. Learnt Potential Baseline Percent Percent Percent Parameter Fiure 7 Stud Farm Learnt Potentials Graph 4. Structure Learnin Results The results of the structure learnin tests for the NPC/PC alorithm usin the Huin Researcher tool, and the CB alorithm, are shown in taular form in Fiure 8. Because the results from the NPC and PC tests were very similar, we will display only the NPC results for ease. 1

13 NPC-100 NPC-500 NPC-1000 NPC CB-100 CB-500 CB-1000 CB Total Wron Baseline Percent Percent Percent Percent Percent Fiure 8 NPC and CB Structure Learnin Results The total incorrect links are calculated y addin the extra links, reversed links, and missin links. This is displayed in raphical form for 100 and 10,000 data records in Fiure 9. Comparison of Incorrect Links Numer of Incorrect Links NPC-100 NPC CB-100 CB Percentae of Dirty Data Fiure 9 Comparison of Incorrect Links NPC and CB Alorithms These results are also deceivin at first, as it appears that the total amount of wron data increases until approximately 75% of dirty data, and then declines at 75-90% dirty data. This is not the case, however, as revealed y a careful examination of the total correct, missin, reversed, and extra links. At around 5-75% missin data, the learnin 13

14 alorithms ein to discover aout twice as many total links as in the 0-10% and 75-90% dirty data sets. With the larer amounts of conflictin data, the alorithm finds links in oth the ad data set and the true data set ivin us twice as many links oth correct and incorrect. As the percentae of 50-50, or ad data increases to 75-90%, or as the ad data percentae is low, 0-10%, the alorithms finds only one set of links. This can e seen as we raph the total numer of incorrect links divided y the total numer of links found. This is shown in taular form in Fiure 10 and raphically for 100 and 10,000 data records in Fiure 11. A similar result is noted in [Spirtes et al 000]. The authors discovered that if the PC alorithm fails to find an ede from the true raph in the second stae of the alorithm, then the alorithm fails in susequent steps to remove nonexistent edes. They also discovered that the failure to find an ede in the true raph could lead to orientation mistakes in susequent staes. Total Wron/Total Links NPC-100 NPC-500 NPC-1000 NPC CB-100 CB-500 CB-1000 CB Baseline Percent Percent Percent Percent Percent Fiure 10 NPC and CB Structure Learnin Results Total Incorrect/Total Links 14

15 Comparison of Learnt Structures 3.5 Total Incorrect Links/Total Links NPC-100 NPC CB-100 CB Percentae of Dirty Data Fiure 11 Comparison of Incorrect Links Total Incorrect/Total Links Results from the Stud Farm network were similar and are shown in taular form in Fiure 1 and raphically in Fiure 13. Total Incorrect Links/Total Links NPC-100 NPC CB-100 CB Baseline Percent Percent Percent Fiure 1 Stud Farm NPC and CB Structure Learnin Results 15

16 Comparison of Learnt Structures 7 6 Total Wron/Total Links NPC-100 NPC CB-100 CB Percentae Dirty Data Fiure 13 Stud Farm Comparison of Incorrect Links Total Incorrect/Total Links 5. Conclusions Even from a cursory overview of the results of these experiments, it is evident that Parameter Estimation alorithms are more tolerant of inaccuracies in data than the Structure Learnin alorithms we have studied NPC and CB. At only 10% dirty data, the CB alorithm with 10,000 data records increased the numer of incorrect links from (aseline) to 16 - an 800% increase. NPC also had an increase in incorrect links of 35% for 10,000 records with only 10% dirty data. The results after 10% dirty data, while not increasin at a sinificant rate, also do not ecome closer to the oriinal structure, as would e expected. There does not seem to e a sinificant advantae to either of these Structure Learnin alorithms in terms of handlin inaccurate data, althouh the CB alorithm appears, in these two examples, to create etter structures for smaller data records, and NPC seems to create etter structures with larer amounts of data. Therefore when dealin with small data sets of inaccurate data, the CB alorithm may e a etter 16

17 choice for learnin structures. The most sinificant findin of this research, thouh, is that even at small amounts of inaccurate data, these Structure Learnin alorithms are unale to enerate correct structures. Therefore a thorouh understandin of the quality of the data is very important when usin Structure Learnin alorithms, as even small inaccuracies can create completely incorrect models. Our parameter estimation alorithm, however, does follow a radual increase in inaccurate modelin when learned from inaccurate data sets. As the inaccuracy of the data increases, the learned potentials also deviate from the oriinal and increase radually accordin to percentae of missin data. Therefore, unlike the Structure Learnin alorithms we have studied, BNs learned from inaccurate data can e useful when the potentials are iven a rane of accuracy ased on the elieved accuracy of the data. Therefore if a model is elieved to e ased on data that is 90% accurate with 100 data records, the potentials can e iven with a standard deviation of approximately 0.18 ( variance = ). This variance was taken from the Trip to Asia data results, however we realize that the Stud Farm standard deviation for 10% missin data would e hiher 0.8. Our future research will strive to verify an averae potential deviation for the various percentaes of inaccurate data that can e applied to a wide rane of new models. 6. Future Research Future research shall include methods for incorporatin the results of these experiments into learnin alorithms for BNs. For Parameter Estimation this opens two areas of future research quantifyin averae standard deviation fiures for expressin the rane of accuracy of a model learned from partially inaccurate data, and investiation into 17

18 methods for discountin those sets of data that are deemed to e partially inaccurate. We elieve this will add to the adaptation work of [Olesen et al 199] which was incorporated into the Huin enine. The results of these experiments are discourain for improvement of Structure Learnin alorithms for learnin from inaccurate data sets, as even small amounts of inaccurate data appear to reatly impact the usefulness and accuracy of the learned models. Our research will continue to test further Structure Learnin alorithms with the intent of findin an alorithm that handles inaccuracies more effectively. Alon with this research, it is also our elief that the inaccuracies of the data itself can e modeled effectively to show the dependence of the model upon data quality. For example, each node or link in the learned Bayesian Network can also have a quality node that quantifies the overall accuracy, completeness, timeliness, and consistency of the data set that was used for learnin. There exists a causal link from the accuracy of the data to the learned potentials and structure. An example of this idea is shown in Fiure

19 Fiure 14 Modelin Inaccuracies as a Causal Entity The potential tale for Tuerculosis chanes to add the parameter of Link Dependence on Data Accuracy. As the accuracy of the data decreases, the causal relationship etween Trip to Asia and Has Tuerculosis eins to fade and the potentials ecome evenly split no dependence on one parameter over another. This allows us to chane our model dynamically as our eliefs aout the quality of the data chanes. This is a challenin prolem, as more experiments will e needed to confirm the relationship etween accuracy of the data and existence of a learned causal link. Usin this initial research as a uide, however, it is our elief that we can ein to understand and account for data quality in the automated learnin of BNs. 19

20 7. Bilioraphy Neapolitan, R.E. (004). Learnin Bayesian Networks. Upper Saddle River, NJ: Pearson Education, Inc. Olesen, K., Lauritsen, S., Jensen, F. (199) ahugin: A System Creatin Adaptive Causal Proailistic Networks. Proceedins of the Eihth Conference on Uncertainty in Artificial Intellience, 3-9. Pipino, L., Lee, Y., and Wan, R. (00). Data Quality Assessment. Communications of the ACM, Vol Sinh, M., and Valtorta, M. (1995). Construction of Bayesian Network Structures from Data: a Brief Survey and an Efficient Alorithm. International Journal of Approximate Reasonin. Spirtes, P., Glymour, C., and Scheines, R. Causation, Prediction, and Search. MIT Press, Camride, Massachusetts, 000. Stron, D., Lee, Y., and Wan, R. (1997). Data Quality in Context. Communications of the ACM. Vol Tayi, G. and Ballou, D. (1998). Examinin Data Quality. Communications of the ACM. Vol Wand, Y. and Wan, R. (1996). Anchorin Data Quality Dimensions in Ontoloical Foundations. Communications of the ACM Vol

Probabilistic Gaze Estimation Without Active Personal Calibration

Probabilistic Gaze Estimation Without Active Personal Calibration Probabilistic Gaze Estimation Without Active Personal Calibration Jixu Chen Qian Ji Department of Electrical,Computer and System Enineerin Rensselaer Polytechnic Institute Troy, NY 12180 chenji@e.com qji@ecse.rpi.edu

More information

THE EFFECTS OF DATA QUALITY ON MACHINE LEARNING ALGORITHMS (Research-in-Progress IQ Concepts, Tools, Metrics, Measures, Models, and Methodologies)

THE EFFECTS OF DATA QUALITY ON MACHINE LEARNING ALGORITHMS (Research-in-Progress IQ Concepts, Tools, Metrics, Measures, Models, and Methodologies) THE EFFECTS OF DATA QUALITY ON MACHINE LEARNING ALGORITHMS (Research-in-Progress IQ Concepts, Tools, Metrics, Measures, Models, and Methodologies) Valerie Sessions University of South Carolina, USA sessionv@cse.sc.edu

More information

Chapter 5 THE MODULE FOR DETERMINING AN OBJECT S TRUE GRAY LEVELS

Chapter 5 THE MODULE FOR DETERMINING AN OBJECT S TRUE GRAY LEVELS Qian u Chapter 5. Determinin an Object s True Gray evels 3 Chapter 5 THE MODUE OR DETERMNNG AN OJECT S TRUE GRAY EVES This chapter discusses the module for determinin an object s true ray levels. To compute

More information

THE APPLICATION OF RELIABILITY BASED OPTIMIZATION OF TOPHAT STIFFENED COMPOSITE PANELS UNDER BIDIRECTIONAL BUCKLING LOAD

THE APPLICATION OF RELIABILITY BASED OPTIMIZATION OF TOPHAT STIFFENED COMPOSITE PANELS UNDER BIDIRECTIONAL BUCKLING LOAD 8 TH ITERATIOAL COFERECE O COMPOSITE MATERIALS THE APPLICATIO OF RELIABILITY BASED OPTIMIZATIO OF TOPHAT STIFFEED COMPOSITE PAELS UDER BIDIRECTIOAL BUCKLIG LOAD X.G. Xue, *, G.X. Li, R.A. Shenoi, A.J.

More information

A NEW METHOD FOR EXTRACTING 3D SOLID MODELS OF OBJECTS USING 2D TECHNICAL DRAWINGS

A NEW METHOD FOR EXTRACTING 3D SOLID MODELS OF OBJECTS USING 2D TECHNICAL DRAWINGS Mathematical and Computational Applications, Vol. 12, No. 1, pp. 31-39, 2007. Association for Scientific Research A NEW METHOD FOR EXTRACTING 3D SOLID MODELS OF OBJECTS USING 2D TECHNICAL DRAWINGS İrahim

More information

SCALE SELECTIVE EXTENDED LOCAL BINARY PATTERN FOR TEXTURE CLASSIFICATION. Yuting Hu, Zhiling Long, and Ghassan AlRegib

SCALE SELECTIVE EXTENDED LOCAL BINARY PATTERN FOR TEXTURE CLASSIFICATION. Yuting Hu, Zhiling Long, and Ghassan AlRegib SCALE SELECTIVE EXTENDED LOCAL BINARY PATTERN FOR TEXTURE CLASSIFICATION Yutin Hu, Zhilin Lon, and Ghassan AlReib Multimedia & Sensors Lab (MSL) Center for Sinal and Information Processin (CSIP) School

More information

Heuristic Searching: A* Search

Heuristic Searching: A* Search IOSR Journal of Computer Enineerin (IOSRJCE) ISSN: 2278-0661 Volume 4, Issue 2 (Sep.-Oct. 2012), PP 01-05 Nazmul Hasan (Department of Computer Science and Enineerin, Military Institute of Science and Technoloy,

More information

Optimal design of Fresnel lens for a reading light system with. multiple light sources using three-layered Hierarchical Genetic.

Optimal design of Fresnel lens for a reading light system with. multiple light sources using three-layered Hierarchical Genetic. Optimal desin of Fresnel lens for a readin liht system with multiple liht sources usin three-layered Hierarchical Genetic Alorithm Wen-Gon Chen, and Chii-Maw Uan Department of Electrical Enineerin, I Shou

More information

Pedestrian Detection Using Structured SVM

Pedestrian Detection Using Structured SVM Pedestrian Detection Using Structured SVM Wonhui Kim Stanford University Department of Electrical Engineering wonhui@stanford.edu Seungmin Lee Stanford University Department of Electrical Engineering smlee729@stanford.edu.

More information

Polygonal Approximation of Closed Curves across Multiple Views

Polygonal Approximation of Closed Curves across Multiple Views Polyonal Approximation of Closed Curves across Multiple Views M. Pawan Kumar Saurah oyal C. V. Jawahar P. J. Narayanan Centre for Visual Information echnoloy International Institute of Information echnoloy

More information

Recent Results from Analyzing the Performance of Heuristic Search

Recent Results from Analyzing the Performance of Heuristic Search Recent Results from Analyzing the Performance of Heuristic Search Teresa M. Breyer and Richard E. Korf Computer Science Department University of California, Los Angeles Los Angeles, CA 90095 {treyer,korf}@cs.ucla.edu

More information

Development of a variance prioritized multiresponse robust design framework for quality improvement

Development of a variance prioritized multiresponse robust design framework for quality improvement Development of a variance prioritized multiresponse robust desin framework for qualit improvement Jami Kovach Department of Information and Loistics Technolo, Universit of Houston, Houston, Texas 7704,

More information

optimization agents user interface agents database agents program interface agents

optimization agents user interface agents database agents program interface agents A MULTIAGENT SIMULATION OPTIMIZATION SYSTEM Sven Hader Department of Computer Science Chemnitz University of Technoloy D-09107 Chemnitz, Germany E-Mail: sha@informatik.tu-chemnitz.de KEYWORDS simulation

More information

G Force Tolerance Sample Solution

G Force Tolerance Sample Solution G Force Tolerance Sample Solution Introduction When different forces are applied to an oject, G-Force is a term used to descrie the resulting acceleration, and is in relation to acceleration due to gravity(g).

More information

Grooming Multicast Traffic in Unidirectional SONET/WDM Rings

Grooming Multicast Traffic in Unidirectional SONET/WDM Rings 1 Groomin Multicast Traffic in Unidirectional SONET/WDM Rins Anuj Rawat, Richard La, Steven Marcus and Mark Shayman Abstract In this paper we study the problem of efficient roomin of iven non-uniform multicast

More information

M3AR: A Privacy Preserving Algorithm that Maintains Association Rules

M3AR: A Privacy Preserving Algorithm that Maintains Association Rules M3A: A Privacy Preservin Alorithm that Maintains Association ules Huynh Van Quoc Phuon, ran Khanh Dan, Vo hi Noc Chau Faculty of Computer Science and Enineerin, HCMU National University of Ho Chi Minh

More information

WAVELENGTH Division Multiplexing (WDM) significantly

WAVELENGTH Division Multiplexing (WDM) significantly IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 6, AUGUST 27 1 Groomin Multicast Traffic in Unidirectional SONET/WDM Rins Anuj Rawat, Richard La, Steven Marcus, and Mark Shayman Abstract

More information

CAM Part II: Intersections

CAM Part II: Intersections CAM Part II: Intersections In the previous part, we looked at the computations of derivatives of B-Splines and NURBS. The first derivatives are of interest, since they are used in computin the tanents

More information

TOWARD A UNIFIED INFORMATION SPACE FOR THE SPECIFICATION OF BUILDING PERFORMANCE SIMULATION RESULTS

TOWARD A UNIFIED INFORMATION SPACE FOR THE SPECIFICATION OF BUILDING PERFORMANCE SIMULATION RESULTS Ninth International IBPSA Conference Montréal, Canada Auust 15-18, 2005 TOWARD A UNIFIED INFORMATION SPACE FOR THE SPECIFICATION OF BUILDING PERFORMANCE SIMULATION RESULTS Ardeshir Mahdavi, Julia Bachiner,

More information

The Gene Expression Messy Genetic Algorithm For. Hillol Kargupta & Kevin Buescher. Computational Science Methods division

The Gene Expression Messy Genetic Algorithm For. Hillol Kargupta & Kevin Buescher. Computational Science Methods division The Gene Expression Messy Genetic Alorithm For Financial Applications Hillol Karupta & Kevin Buescher Computational Science Methods division Los Alamos National Laboratory Los Alamos, NM, USA. Abstract

More information

A Combined Delay and Throughput Proportional Scheduling Scheme for Differentiated Services

A Combined Delay and Throughput Proportional Scheduling Scheme for Differentiated Services A Combined Delay and Throuhput Proportional Schedulin Scheme for Differentiated Services Samyukta Sankaran and Ahmed E.Kamal Department of Electrical and Computer Enineerin Iowa State University Ames,

More information

THE FEASIBILITY OF SMOOTHED PARTICLE HYDRODYNAMICS FOR MULTIPHASE OILFIELD SYSTEMS

THE FEASIBILITY OF SMOOTHED PARTICLE HYDRODYNAMICS FOR MULTIPHASE OILFIELD SYSTEMS Seventh International Conference on CFD in the Minerals and Process Industries CSIRO, Melbourne, Australia 9-11 December 009 THE FEASIBILITY OF SMOOTHED PARTICLE HYDRODYNAMICS FOR MULTIPHASE OILFIELD SYSTEMS

More information

Learning Deep Features for One-Class Classification

Learning Deep Features for One-Class Classification 1 Learnin Deep Features for One-Class Classification Pramuditha Perera, Student Member, IEEE, and Vishal M. Patel, Senior Member, IEEE Abstract We propose a deep learnin-based solution for the problem

More information

A Framework for Dynamic Image Sampling Based on Supervised Learning

A Framework for Dynamic Image Sampling Based on Supervised Learning A Framework for Dynamic Image Sampling Based on Supervised Learning G. M. Dilshan P. Godaliyadda, Dong Hye Ye, Michael D. Uchic, Michael A. Groeer, Gregery T. Buzzard, and Charles A. Bouman School of Electrical

More information

Figure 1: The trajectory of a projectile launched at θ 1 > 0.

Figure 1: The trajectory of a projectile launched at θ 1 > 0. 3 Projectile Motion Introduction Important: Complete and submit the Lab 3 problem set on WebAssin before you leave lab today. Your instructor and lab assistant will be happy to help. In Lab 2, you tested

More information

A Flexible Integration Strategy for In-Car Telematics Systems

A Flexible Integration Strategy for In-Car Telematics Systems A Flexible Interation Stratey for In-Car Telematics Systems Thomas Bauer Jens Herrmann Peter Liesmeyer Christopher Robinson-Mallett University of Potsdam Hasso-Plattner-Institute thomas.bauer @hpi.uni-potsdam.de

More information

SBG SDG. An Accurate Error Control Mechanism for Simplification Before Generation Algorihms

SBG SDG. An Accurate Error Control Mechanism for Simplification Before Generation Algorihms An Accurate Error Control Mechanism for Simplification Before Generation Alorihms O. Guerra, J. D. Rodríuez-García, E. Roca, F. V. Fernández and A. Rodríuez-Vázquez Instituto de Microelectrónica de Sevilla,

More information

Binary Decision Tree Using Genetic Algorithm for Recognizing Defect Patterns of Cold Mill Strip

Binary Decision Tree Using Genetic Algorithm for Recognizing Defect Patterns of Cold Mill Strip Binary Decision Tree Using Genetic Algorithm for Recognizing Defect Patterns of Cold Mill Strip Kyoung Min Kim 1,4, Joong Jo Park, Myung Hyun Song 3, In Cheol Kim 1, and Ching Y. Suen 1 1 Centre for Pattern

More information

/06/$20.00 c 2006 IEEE I. INTRODUCTION

/06/$20.00 c 2006 IEEE I. INTRODUCTION Scalale Router Memory Architecture Based on Interleaved DRAM Feng Wang and Mounir Hamdi Computer Science Department of The Hong Kong University of Science and Technology {fwang, hamdi}@cs.ust.hk Astract

More information

TETROBOT: A NOVEL MECHANISM FOR RECONFIGURABLE PARALLEL ROBOTICS. Student, Machine Building Faculty, Technical University of Cluj-Napoca

TETROBOT: A NOVEL MECHANISM FOR RECONFIGURABLE PARALLEL ROBOTICS. Student, Machine Building Faculty, Technical University of Cluj-Napoca UNIVERSITATEA TRANSILVANIA DIN BRA0OV Catedra Desin de Produs 1i Robotic2 Simpozionul na8ional cu participare interna8ional9 PRoiectarea ASIstat9 de Calculator P R A S I C ' 02 Vol. I Mecanisme 1i Triboloie

More information

Electrical Power System Harmonic Analysis Using Adaptive BSS Algorithm

Electrical Power System Harmonic Analysis Using Adaptive BSS Algorithm Sensors & ransducers 2013 by IFSA http://www.sensorsportal.com Electrical Power System Harmonic Analysis Usin Adaptive BSS Alorithm 1,* Chen Yu, 2 Liu Yuelian 1 Zhenzhou Institute of Aeronautical Industry

More information

UNIT 10 Trigonometry UNIT OBJECTIVES 287

UNIT 10 Trigonometry UNIT OBJECTIVES 287 UNIT 10 Trigonometry Literally translated, the word trigonometry means triangle measurement. Right triangle trigonometry is the study of the relationships etween the side lengths and angle measures of

More information

Fanout-tree Restructuring Algorithm for Post-placement Timing. Optimization TOSHIBA. Kawasaki, JAPAN

Fanout-tree Restructuring Algorithm for Post-placement Timing. Optimization TOSHIBA. Kawasaki, JAPAN Fanout-tree Restructurin Alorithm for Post-placement Timin Optimization T.Aoki, M.Murakata, T.Mitsuhashi and N.Goto y Semiconductor DA &Test Enineerin Center, y Research and Development Center, TOSHBA

More information

Development and Verification of an SP 3 Code Using Semi-Analytic Nodal Method for Pin-by-Pin Calculation

Development and Verification of an SP 3 Code Using Semi-Analytic Nodal Method for Pin-by-Pin Calculation Journal of Physical Science and Application 7 () (07) 0-7 doi: 0.765/59-5348/07.0.00 D DAVID PUBLISHIN Development and Verification of an SP 3 Code Usin Semi-Analytic Chuntao Tan Shanhai Nuclear Enineerin

More information

A Dynamic Approach to Probabilistic Inference using Bayesian Networks

A Dynamic Approach to Probabilistic Inference using Bayesian Networks A Dynamic Approach to Proailistic Inference using Bayesian Networks Michael C Horsch and David Poole Department of Computer Science University of British Columia Vancouver, British Columia Canada email:

More information

CHAPTER 13 FINITE ELEMENTS: STIFFNESS MATRICES

CHAPTER 13 FINITE ELEMENTS: STIFFNESS MATRICES 4 5 CHAPTER FINITE ELEMENTS: STIFFNESS MATRICES. Introduction The purpose of this chapter is to use two simpe exampes to expain the asics of how finite eement stiffness matrices are formuated and how static

More information

Reversible Image Merging for Low-level Machine Vision

Reversible Image Merging for Low-level Machine Vision Reversible Imae Merin for Low-level Machine Vision M. Kharinov St. Petersbur Institute for Informatics and Automation of RAS, 14_liniya Vasil evskoo ostrova 39, St. Petersbur, 199178 Russia, khar@iias.spb.su,

More information

Bus-Based Communication Synthesis on System-Level

Bus-Based Communication Synthesis on System-Level Bus-Based Communication Synthesis on System-Level Michael Gasteier Manfred Glesner Darmstadt University of Technoloy Institute of Microelectronic Systems Karlstrasse 15, 64283 Darmstadt, Germany Abstract

More information

A Scene Text-Based Image Retrieval System

A Scene Text-Based Image Retrieval System A Scene Text-Based Imae Retrieval System Thuy Ho Faculty of Information System University of Information Technoloy Ho Chi Minh city, Vietnam thuyhtn@uit.edu.vn Noc Ly Faculty of Information Technoloy University

More information

RBFT: Redundant Byzantine Fault Tolerance

RBFT: Redundant Byzantine Fault Tolerance RBFT: Redundant Byzantine Fault Tolerance Pierre-Louis Aulin Grenole University Sonia Ben Mokhtar CNRS - LIRIS Vivien Quéma Grenole INP Astract Byzantine Fault Tolerant state machine replication (BFT)

More information

FLEXnav: A Fuzzy Logic Expert Dead-reckoning System for the Segway RMP

FLEXnav: A Fuzzy Logic Expert Dead-reckoning System for the Segway RMP Proceedins of the SPIE efense and Security Symposium, Unmanned Ground Vehicle Technoloy VI (O54), Orlando FL, -6 FLEXnav: A Fuzzy Loic Expert ead-reckonin System for the Seway MP Lauro Ojeda, Mukunda aju,

More information

Hot X: Algebra Exposed

Hot X: Algebra Exposed Hot X: Algera Exposed Solution Guide for Chapter 5 Here are the solutions for the Doing the Math exercises in Hot X: Algera Exposed! (assume that all denominators 0) DTM from p.59 2. Since they have the

More information

Tree Based Symmetric Key Broadcast Encryption

Tree Based Symmetric Key Broadcast Encryption Tree Based Symmetric Key Broadcast Encryption Sanjay Bhattacherjee and Palash Sarkar Applied Statistics Unit Indian Statistical Institute 203, B.T.Road, Kolkata, India - 700108. {sanjay r,palash}@isical.ac.in

More information

Chapter - 1 : IMAGE FUNDAMENTS

Chapter - 1 : IMAGE FUNDAMENTS Chapter - : IMAGE FUNDAMENTS Imae processin is a subclass of sinal processin concerned specifically with pictures. Improve imae quality for human perception and/or computer interpretation. Several fields

More information

Learning Geometric Concepts with an Evolutionary Algorithm. Andreas Birk. Universitat des Saarlandes, c/o Lehrstuhl Prof. W.J.

Learning Geometric Concepts with an Evolutionary Algorithm. Andreas Birk. Universitat des Saarlandes, c/o Lehrstuhl Prof. W.J. Learnin Geometric Concepts with an Evolutionary Alorithm Andreas Birk Universitat des Saarlandes, c/o Lehrstuhl Prof. W.J. Paul Postfach 151150, 66041 Saarbrucken, Germany cyrano@cs.uni-sb.de http://www-wjp.cs.uni-sb.de/cyrano/

More information

Low cost concurrent error masking using approximate logic circuits

Low cost concurrent error masking using approximate logic circuits 1 Low cost concurrent error maskin usin approximate loic circuits Mihir R. Choudhury, Member, IEEE and Kartik Mohanram, Member, IEEE Abstract With technoloy scalin, loical errors arisin due to sinle-event

More information

DYNAMIC COUPLING OF UNDERACTUATED MANIPULATORS

DYNAMIC COUPLING OF UNDERACTUATED MANIPULATORS Proceedins of the 4th IEEE Conference on Control Applications, Albany, USA, Sep. 1995, pp. 5-55. DYNAMIC COUPLING OF UNDERACTUATED MANIPULATORS Marcel Bererman Christopher Lee Yanshen Xu The Robotics Institute

More information

Iterative Single-Image Digital Super-Resolution Using Partial High-Resolution Data

Iterative Single-Image Digital Super-Resolution Using Partial High-Resolution Data Iterative Sinle-Imae Diital Super-Resolution Usin Partial Hih-Resolution Data Eran Gur, Member, IAENG and Zeev Zalevsky Abstract The subject of extractin hih-resolution data from low-resolution imaes is

More information

Affinity Hybrid Tree: An Indexing Technique for Content-Based Image Retrieval in Multimedia Databases

Affinity Hybrid Tree: An Indexing Technique for Content-Based Image Retrieval in Multimedia Databases Affinity Hybrid Tree: An Indexin Technique for Content-Based Imae Retrieval in Multimedia Databases Kasturi Chatterjee and Shu-Chin Chen Florida International University Distributed Multimedia Information

More information

Array Dependence Analysis as Integer Constraints. Array Dependence Analysis Example. Array Dependence Analysis as Integer Constraints, cont

Array Dependence Analysis as Integer Constraints. Array Dependence Analysis Example. Array Dependence Analysis as Integer Constraints, cont Theory of Integers CS389L: Automated Logical Reasoning Omega Test Işıl Dillig Earlier, we talked aout the theory of integers T Z Signature of T Z : Σ Z : {..., 2, 1, 0, 1, 2,..., 3, 2, 2, 3,..., +,, =,

More information

Optimal Scheduling of Dynamic Progressive Processing

Optimal Scheduling of Dynamic Progressive Processing Optimal Schedulin of Dynamic roressive rocessin Abdel-Illah ouaddib and Shlomo Zilberstein Abstract. roressive processin allows a system to satisfy a set of requests under time pressure by limitin the

More information

THE DECISION OF THE OPTIMAL PARAMETERS IN MARKOV RANDOM FIELDS OF IMAGES BY GENETIC ALGORITHM

THE DECISION OF THE OPTIMAL PARAMETERS IN MARKOV RANDOM FIELDS OF IMAGES BY GENETIC ALGORITHM Zhaoao Zheng THE DECISION OF THE OPTIMAL PARAMETERS IN MARKOV RANDOM FIELDS OF IMAGES BY GENETIC ALGORITHM Zhaoao Zheng, Hong Zheng School of Information Engineering Wuhan Technical University of Surveying

More information

Slicing Multi-threaded Java Programs : A Case Study

Slicing Multi-threaded Java Programs : A Case Study Slicin Multi-threaded Java Prorams : A Case Study Matthew B. Dwyer y, James C. Corbett z, John Hatcliff y, Stefan Sokolowski y, Honjun Zhen y ydepartment of Computin and Information Sciences Kansas State

More information

Towards a Method for Data Accuracy Assessment Utilizing a Bayesian Network Learning Algorithm

Towards a Method for Data Accuracy Assessment Utilizing a Bayesian Network Learning Algorithm Towards a Method for Data Accuracy Assessment Utilizing a Bayesian Network Learning Algorithm 14 V. SESSIONS Charleston Southern University and M. VALTORTA University of South Carolina This research develops

More information

Minimum-Cost Multicast Routing for Multi-Layered Multimedia Distribution

Minimum-Cost Multicast Routing for Multi-Layered Multimedia Distribution Minimum-Cost Multicast Routin for Multi-Layered Multimedia Distribution Hsu-Chen Chen and Frank Yeon-Sun Lin Department of Information Manaement, National Taiwan University 50, Lane 144, Keelun Rd., Sec.4,

More information

TCP-FIT: An Improved TCP Congestion Control Algorithm and its Performance

TCP-FIT: An Improved TCP Congestion Control Algorithm and its Performance TCP-FIT: An Improved TCP Conestion Control Alorithm and its Performance Jinyuan Wan, Jiantao Wen, Jun Zhan and Yuxin Han Key Laboratory of Pervasive Computin, Ministry of Education Tsinhua National Laboratory

More information

Leveraging Models at Run-time to Retrieve Information for Feature Location

Leveraging Models at Run-time to Retrieve Information for Feature Location Leverain Models at Run-time to Retrieve Information for Feature Location Lorena Arcea,2, Jaime Font,2 Øystein Hauen 2,3, and Carlos Cetina San Jore University, SVIT Research Group, Zaraoza, Spain {larcea,jfont,ccetina}@usj.es

More information

Gybeh' c.s 9 Springer-Verlag 1993

Gybeh' c.s 9 Springer-Verlag 1993 Biol. yern. 69, 345-351 (1993) Blogr =- Gyeh' c.s 9 Springer-Verlag 1993 Solution of the direct and inverse kinematic prolems y a common algorithm ased on the mean of multiple computations H. ruse, U.

More information

Real-Time Median Filtering for Embedded Smart Cameras

Real-Time Median Filtering for Embedded Smart Cameras Real-Time Median Filtering for Emedded Smart Cameras Yong Zhao Brown University Yong Zhao@rown.edu Gariel Tauin Brown University tauin@rown.edu Figure 1: System architecture of our proof-of-concept Visual

More information

Agus Harjoko Lab. Elektronika dan Instrumentasi, FMIPA, Universitas Gadjah Mada, Yogyakarta, Indonesia

Agus Harjoko Lab. Elektronika dan Instrumentasi, FMIPA, Universitas Gadjah Mada, Yogyakarta, Indonesia A Comparison Study of the Performance of the Fourier Transform Based Algorithm and the Artificial Neural Network Based Algorithm in Detecting Faric Texture Defect Agus Harjoko La. Elektronika dan Instrumentasi,

More information

Efficient Generation of Large Amounts of Training Data for Sign Language Recognition: A Semi-Automatic Tool

Efficient Generation of Large Amounts of Training Data for Sign Language Recognition: A Semi-Automatic Tool Efficient Generation of Lare Amounts of Trainin Data for Sin Lanuae Reconition: A Semi-Automatic Tool Ruiduo Yan, Sudeep Sarkar, Barbara Loedin, and Arthur Karshmer University of South Florida, Tampa,

More information

Analyzing the Performance of Pattern Database Heuristics

Analyzing the Performance of Pattern Database Heuristics Analyzing the Performance of Pattern Dataase Heuristics Richard E. Korf Computer Science Department University of California, Los Angeles Los Angeles, CA 90095 korf@cs.ucla.edu Astract We introduce a model

More information

IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY

IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY Shreelekshmi R, Wilscy M 2 and C E Veni Madhavan 3 Department of Computer Science & Engineering, College of Engineering, Trivandrum,

More information

The Role of Switching in Reducing the Number of Electronic Ports in WDM Networks

The Role of Switching in Reducing the Number of Electronic Ports in WDM Networks 1 The Role of Switchin in Reducin the Number of Electronic Ports in WDM Networks Randall A. Berry and Eytan Modiano Abstract We consider the role of switchin in minimizin the number of electronic ports

More information

Distortion Measurement Using Arc-Length-Parameterisation within a Vertex-Based Shape Coding Framework

Distortion Measurement Using Arc-Length-Parameterisation within a Vertex-Based Shape Coding Framework Proceedings of 11th International Conference on Computer and Information Technology (ICCIT 008) 5-7 Decemer, 008, Khulna, Bangladesh Distortion Measurement Using Arc-Length-Parameterisation within a Vertex-Based

More information

algorithms ISSN

algorithms ISSN Algorithms 29, 2, 46-75; doi:.339/a246 OPEN ACCESS algorithms ISSN 999-4893 www.mdpi.com/journal/algorithms Article A Novel Block-ased Watermarking Scheme Using the SVD Transform Alessandro Basso*, Francesco

More information

A Scene Text-Based Image Retrieval System

A Scene Text-Based Image Retrieval System A Scene Text-Based Imae Retrieval System ThuyHo Faculty of Information System University of Information Technoloy Ho Chi Minh city, Vietnam thuyhtn@uit.edu.vn Noc Ly Faculty of Information Technoloy University

More information

HCE: A New Channel Exchange Scheme for Handovers in Mobile Cellular Systems

HCE: A New Channel Exchange Scheme for Handovers in Mobile Cellular Systems 129 HCE: A New Channel Exchane Scheme for Handovers in Mobile Cellular Systems DNESH K. ANVEKAR* and S. SANDEEP PRADHAN Department of Electrical Communication Enineerin ndian nstitute of Science, Banalore

More information

Prelim 1. CS 2110, 14 March 2017, 7:30 PM Total Question Name Short answer. OO Recursion Loop invariants Max Score Grader

Prelim 1. CS 2110, 14 March 2017, 7:30 PM Total Question Name Short answer. OO Recursion Loop invariants Max Score Grader Prelim 1 CS 2110, 14 March 2017, 7:30 PM 1 2 3 4 5 Total Question Name Short answer OO Recursion Loop invariants Max 1 36 33 15 15 100 Score Grader The exam is closed ook and closed notes. Do not egin

More information

Efficient Generation of Large Amounts of Training Data for Sign Language Recognition: A Semi-automatic Tool

Efficient Generation of Large Amounts of Training Data for Sign Language Recognition: A Semi-automatic Tool Efficient Generation of Lare Amounts of Trainin Data for Sin Lanuae Reconition: A Semi-automatic Tool Ruiduo Yan, Sudeep Sarkar,BarbaraLoedin, and Arthur Karshmer University of South Florida, Tampa, FL,

More information

Practical training Inga Kindermann; Dominik Haeussler

Practical training Inga Kindermann; Dominik Haeussler liht interference Materials: Laserpointer mountin material diffraction ratin with 40 slits per centimetre, CD-ROM (and ), cardboard security advise: Never let the direct beam of a laser hit your eyes!

More information

Multi-Class Protein Fold Recognition Using Multi-Objective Evolutionary Algorithms

Multi-Class Protein Fold Recognition Using Multi-Objective Evolutionary Algorithms 1 Multi-Class Protein Fold Reconition Usin Multi-bjective Evolutionary Alorithms Stanley Y. M. Shi, P. N. Suanthan, Senior Member IEEE and Kalyanmoy Deb, Senior Member IEEE KanGAL Report Number 2004007

More information

Protection of Location Privacy using Dummies for Location-based Services

Protection of Location Privacy using Dummies for Location-based Services Protection of Location Privacy usin for Location-based Services Hidetoshi Kido y Yutaka Yanaisawa yy Tetsuji Satoh y;yy ygraduate School of Information Science and Technoloy, Osaka University yyntt Communication

More information

Reducing network cost of many-to-many communication in unidirectional WDM rings with network coding

Reducing network cost of many-to-many communication in unidirectional WDM rings with network coding Reducin network cost of many-to-many communication in unidirectional WDM rins with network codin Lon Lon and Ahmed E. Kamal Department of Electrical and Computer Enineerin, Iowa State University Email:

More information

GEOMETRICAL ASPECTS OF RECONSTRUCTION OF THE CYLINDRICAL PANORAMA

GEOMETRICAL ASPECTS OF RECONSTRUCTION OF THE CYLINDRICAL PANORAMA he Journal of Polish ociety for Geometry and Enineerin Graphics Volume 24 (2013), 9-14 9 GEOMEICAL APEC O ECONUCION O HE CYLINDICAL PANOAMA Jolanta DŹWIEZYŃKA zeszow University of echnoloy, Department

More information

Imitation: An Alternative to Generalization in Programming by Demonstration Systems

Imitation: An Alternative to Generalization in Programming by Demonstration Systems Imitation: An Alternative to Generalization in Prorammin by Demonstration Systems Technical Report UW-CSE-98-08-06 Amir Michail University of Washinton amir@cs.washinton.edu http://www.cs.washinton.edu/homes/amir/opsis.html

More information

Efficient and Provably Secure Ciphers for Storage Device Block Level Encryption

Efficient and Provably Secure Ciphers for Storage Device Block Level Encryption Efficient and Provably Secure Ciphers for Storae Device Block evel Encryption Yulian Zhen SIS Department, UNC Charlotte yzhen@uncc.edu Yone Wan SIS Department, UNC Charlotte yonwan@uncc.edu ABSTACT Block

More information

Two Kinds of Golden Triangles, Generalized to Match Continued Fractions

Two Kinds of Golden Triangles, Generalized to Match Continued Fractions Journal for Geometry and Graphics Volume (2007), No. 2, 65 7. Two Kinds of Golden Triangles, Generalized to Match Continued Fractions Clark Kimerling Department of Mathematics, University of Evansville

More information

Caching Policies for In-Network Caching

Caching Policies for In-Network Caching Caching Policies for In-Network Caching Zhe Li, Gwendal Simon, Annie Gravey Institut Mines Telecom - Telecom Bretagne, UMR CNRS 674 IRISA Université Européenne de Bretagne, France {firstname.lastname}@telecom-retagne.eu

More information

CLASS NOTES Models, Algorithms and Data: Introduction to computing 2018

CLASS NOTES Models, Algorithms and Data: Introduction to computing 2018 CLASS NOTES Models, Alorithms and Data: Introduction to computin 2018 Petros Koumoutsakos, Jens Honore Walther (Last update: March 5, 2018) IMPORTANT DISCLAIMERS 1. REFERENCES: Much of the material (ideas,

More information

Umbrella : A novel fixed-size DHT protocol

Umbrella : A novel fixed-size DHT protocol Umrella : A novel fixed-size DHT protocol A. D. Sotiriou, P. Kalliaras, P. Papageorgiou, N. Mitrou Computer Network Laoratory, School of Electrical and Computer Engineering National Technical University

More information

Theory of Integers. CS389L: Automated Logical Reasoning. Lecture 13: The Omega Test. Overview of Techniques. Geometric Description

Theory of Integers. CS389L: Automated Logical Reasoning. Lecture 13: The Omega Test. Overview of Techniques. Geometric Description Theory of ntegers This lecture: Decision procedure for qff theory of integers CS389L: Automated Logical Reasoning Lecture 13: The Omega Test şıl Dillig As in previous two lectures, we ll consider T Z formulas

More information

Linear Network Coding

Linear Network Coding IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 2, FEBRUARY 2003 371 Linear Network Codin Shuo-Yen Robert Li, Senior Member, IEEE, Raymond W. Yeun, Fellow, IEEE, Nin Cai Abstract Consider a communication

More information

Multiplying and Dividing, Decimals and Fractions Student Signature: Parent/Carer signature:

Multiplying and Dividing, Decimals and Fractions Student Signature: Parent/Carer signature: Preparin yourself for mathematics at Guilsborouh Multiplyin and Dividin, Decimals and Fractions Student Sinature: Parent/Carer sinature: Dear student, This booklet contains work which you need to complete

More information

A Genetic Algorithm for Packing Three-Dimensional Non-Convex. Objects Having Cavities and Holes. Engineering Math and Computer Science Dept

A Genetic Algorithm for Packing Three-Dimensional Non-Convex. Objects Having Cavities and Holes. Engineering Math and Computer Science Dept A Genetic Alorithm for Packin Three-Dimensional Non-Convex Objects Havin Cavities and Holes Ilkka Ikonen William E. Biles Department of Industrial Enineerin University of Louisville Louisville, KY 40292

More information

Efficient Minimization of Sum and Differential Costs on Machines with Job Placement Constraints

Efficient Minimization of Sum and Differential Costs on Machines with Job Placement Constraints Efficient Minimization of Sum and Differential Costs on Machines with Job Placement Constraints Jaya Prakash Champati and Ben Lian Department of Electrical and Computer Enineerin, University of Toronto

More information

Reducing Network Cost of Many-to-Many Communication in Unidirectional WDM Rings with Network Coding

Reducing Network Cost of Many-to-Many Communication in Unidirectional WDM Rings with Network Coding 1 Reducin Network Cost of Many-to-Many Communication in Unidirectional WDM Rins with Network Codin Lon Lon and Ahmed E. Kamal, Senior Member, IEEE Abstract In this paper we address the problem of traffic

More information

Some New Implication Operations Emerging From Fuzzy Logic

Some New Implication Operations Emerging From Fuzzy Logic Some New Implication Operations Emerging From Fuzzy Logic Manish K. Srivastava, S. Kumar 2 and R.S. Parihar Sunrise University, Alwar, Rajsthan tomanishis@gmail.com 2 sanjeevis@yahoo.co.in Astract: We

More information

A Mobile Robot that Understands Pedestrian Spatial Behaviors

A Mobile Robot that Understands Pedestrian Spatial Behaviors The 00 IEEE/RSJ International Conference on Intellient Robots and Systems October -, 00, Taipei, Taiwan A Mobile Robot that Understands Pedestrian Spatial Behaviors Shu-Yun Chun and Han-Pan Huan, Member,

More information

Fair inter-tap routing and backhaul assignment for wireless mesh networks

Fair inter-tap routing and backhaul assignment for wireless mesh networks WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mo. Comput. (2008) Pulished online in Wiley InterScience (www.interscience.wiley.com).629 Fair inter-tap routing and ackhaul assignment for wireless

More information

Pattern Recognition Letters

Pattern Recognition Letters attern Reconition Letters 29 (2008) 1596 1602 Contents lists available at ScienceDirect attern Reconition Letters journal homepae: www.elsevier.com/locate/patrec 3D face reconition by constructin deformation

More information

OCC and Its Variants. Jan Lindström. Helsinki 7. November Seminar on real-time systems UNIVERSITY OF HELSINKI. Department of Computer Science

OCC and Its Variants. Jan Lindström. Helsinki 7. November Seminar on real-time systems UNIVERSITY OF HELSINKI. Department of Computer Science OCC and Its Variants Jan Lindström Helsinki 7. November 1997 Seminar on real-time systems UNIVERSITY OF HELSINKI Department o Computer Science Contents 1 Introduction 1 2 Optimistic Concurrency Control

More information

Data-analysis problems of interest

Data-analysis problems of interest Introduction 3 Data-analysis prolems of interest. Build computational classification models (or classifiers ) that assign patients/samples into two or more classes. - Classifiers can e used for diagnosis,

More information

Edge-segment-based Background Modeling: Non-parametric Online Background Update

Edge-segment-based Background Modeling: Non-parametric Online Background Update 2013 10th IEEE International Conference on Advanced Video and Signal Based Surveillance Edge-segment-ased Background Modeling: Non-parametric Online Background Update Jaemyun Kim, Adin Ramirez Rivera,

More information

FPGA Technology Mapping: A Study of Optimality

FPGA Technology Mapping: A Study of Optimality FPGA Technoloy Mappin: A Study o Optimality Andrew Lin Department o Electrical and Computer Enineerin University o Toronto Toronto, Canada alin@eec.toronto.edu Deshanand P. Sinh Altera Corporation Toronto

More information

FLEXnav: Fuzzy Logic Expert Rule-based Position Estimation for Mobile Robots on Rugged Terrain

FLEXnav: Fuzzy Logic Expert Rule-based Position Estimation for Mobile Robots on Rugged Terrain Proceedins of the 2002 IEEE International Conference on Robotics and Automation. Washinton DC, USA, 10-17 May 2002, pp. 317-322 FLEXnav: Fuzzy Loic Expert Rule-based Position Estimation for Mobile Robots

More information

Multi Objective Reconfiguration of Distribution Networks with the Objective to Reduce Losses and Improving Power Quality Parameters

Multi Objective Reconfiguration of Distribution Networks with the Objective to Reduce Losses and Improving Power Quality Parameters Applied mathematics in Engineering, Management and Technology 2 (5) 214:177-183 www.amiemt-journal.com Multi Ojective Reconfiguration of Distriution Networks with the Ojective to Reduce Losses and Improving

More information

IBM Thomas J. Watson Research Center. Yorktown Heights, NY, U.S.A. The major advantage of BDDs is their eciency for a

IBM Thomas J. Watson Research Center. Yorktown Heights, NY, U.S.A. The major advantage of BDDs is their eciency for a Equivalence Checkin Usin Cuts and Heaps Andreas Kuehlmann Florian Krohm IBM Thomas J. Watson Research Center Yorktown Heihts, NY, U.S.A. Abstract This paper presents a verication technique which is specically

More information

On Defending Peer-to-Peer System-based Active Worm Attacks

On Defending Peer-to-Peer System-based Active Worm Attacks This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE GLOBECOM 25 proceedins. On Defendin eer-to-eer System-based Active

More information

Ecient and Precise Modeling of Exceptions for the Analysis of Java Programs. IBM Research. Thomas J. Watson Research Center

Ecient and Precise Modeling of Exceptions for the Analysis of Java Programs. IBM Research. Thomas J. Watson Research Center Ecient and Precise Modelin of Exceptions for the Analysis of Java Prorams Jon-Deok Choi David Grove Michael Hind Vivek Sarkar IBM Research Thomas J. Watson Research Center P.O. Box 704, Yorktown Heihts,

More information