Learning Bayesian Networks from Inaccurate Data
|
|
- Sybil Woods
- 6 years ago
- Views:
Transcription
1 Learnin Bayesian Networks from Inaccurate Data A Study on the Effect of Inaccurate Data on Parameter Estimation and Structure Learnin of Bayesian Networks Valerie Sessions Marco Valtorta Department of Computer Science and Enineerin, University of South Carolina Astract The wealth of data collected y automated systems, or pen and paper processes, and availale on the World Wide We, is staerin. With these vast amounts of data come amazin possiilities for data minin and learnin of data patterns throuh automated and semi-automated tools. However, these tools are inherently reliant on the quality of the data with which they are supplied. Without a thorouh understandin of our data s quality and the effects of poor quality on our learnin alorithms, we are consequently unale to accurately jude the quality of our models. We have distilled the ideas of prominent data quality researchers into four features of data sources: data accuracy, completeness, timeliness, and consistency. After understandin various dimensions of data quality we were ale to test the effects of inaccurate data on learnin of Bayesian Networks, specifically in Parameter Estimation and Structure Learnin. By testin the learnin alorithms with differin percentaes and amounts of inaccurate data, we have eun to develop uidelines for adjustin the learnin techniques and judin the quality of the learned models. 1
2 1. Data Quality Metrics Assessin the quality of our data is a difficult process and is ripe with sujectivity. Researchers have een attemptin for some time to create quantitative metrics to accurately jude the quality of our data. There are many different measurements that these researchers use to assess data quality. These rane from the sujective value-added and understandaility, to those that are more easily quantifiale, such as completeness and timeliness. While some researchers have up to sixteen different metrics [Pipino et al 00], we will concentrate on a core set of four for this research accuracy/precision, completeness, consistency/elievaility, and timeliness, distilled from [Wand and Wan 1996], [Stron et al 1997], and [Tayi and Ballou 1998]. We will explain these terms in the context of our research. Accuracy and precision are taken from their common scientific meanins. Accuracy represents how close a measurement, or data record, is to the real-world situation that it measures. Precision will refer to two similar ideas in this research. Firstly, it will refer to the standard deviation or variation in a numerical data record with multiple readins. As an example, if a weather sensor is calirated efore its use to have a variation of ± 0.01 C, we would use this calirated rane as the precision of the instrument. The second use for precision is to quantify the deree to which a sensor, or other data input, ives a consistent data output for a iven input, reardless of the accuracy of these results. Of course, we would wish our data to e oth accurate and precise. While accuracy is a metric that must e calculated over time and with much dilience to discover discrepancies etween what is contained in the real world and what
3 is represented in the data record, precision can more easily e calculated from the data at hand. Completeness in this research will refer to the amount of missin data records. This can e computed as the total numer of missin data, or the total numer of rows containin missin data. Each can e useful in our research. This metric is easily calculated from the data at hand, and requires no sujective insertions from the user or data manaer. Completeness is especially important in our research, as we can aue the effects of usin approximation alorithms, such as Gis Samplin or the Expectation- Maximization (EM) alorithm, in our learnin techniques. Lare amounts of missin data can also point to prolems in the data collection method and the data collection tools. Timeliness of the data is also important in the context of our data set. Data that is outdated is often useless in many fields of study, such as weather data records, or stock market data that must e used to make uyin and sellin decisions in seconds. However, in other fields the timeliness of data is not as crucial. If historical data is ein used to track consumer spendin over the last decade, havin data within minutes of the realworld event is not as important. This metric is therefore at once oth sujective and ojective. If the data is time-stamped, it is not difficult to determine the time difference etween the entry and the present time. However, we must have allowed a Suject Matter Expert to then uide the proram to determine how current the data should e for that particular purpose. Lastly, our research will employ the idea of consistency or elievaility. These metrics are similar to precision, except will e used here to compare data from different data sets. Where precision applies to one particular data source a particular sensor or 3
4 manually inputted data source, consistency/elievaility will apply to multiple data sets reportin on the same real-world situation. If we have three sensors reportin weather information from one location (or small radius) we can measure the consistency of the data for that reion as the deviation etween the data records from each sensor. Similarly, if we have eyewitness accounts at the scene of a crime, we can jude the consistency of the data set y the similarity of the accounts. This metric is computed separately from the accuracy and precision calculations and ives no weiht to one data source over the other. If there are three data sources, we will calculate one consistency metric for that data record which takes into account differences from all the data sets, without declarin which data source is most accurate. This allows us to account for differences in data without knowin the accuracy of the data set. This may seem faulty, and indeed if we have the resources to jude the accuracy of the data sets then we can assin data quality ased on those findins. However, consistency allows us a metric to determine that there are indeed differences in data sources, without tracin the data sets ack to the sources and havin to exhaustively determine which data set is most accurate. Consistency is an easier metric to calculate and more likely to e availale for use in our alorithms.. Testin the Effects of Inaccuracy While all four data quality dimensions will eventually e thorouhly studied in our research, the focus of this paper will remain on inaccuracy and its effect on learned Bayesian Networks (BNs). In order to understand these effects, a set of tests was constructed. Two test BNs were modeled one that will e considered the true state of the BN and another, ad data set in which all of the potentials were set at 0.5 (equal 4
5 likelihood of either result). Data sets were then enerated with 0%, 10%, 5%, 50%, 75%, and 90% dirty data y creatin one data set with the true data records and a second with the ad data and meldin them toether. For example, to enerate a 10% dirty set for 100 records, one would enerate 90 cases from the true data set and 10 cases from the ad data set and comine them for a 100 record set. This was done for 100, 500, 1000, and 10,000 record sets. For purposes of this research, two traditional BNs were studied Trip to Asia and the Stud Farm network. The structures of these networks are shown in Fiures 1 and respectively. Fiure 1 Trip to Asia 5
6 Fiure Stud Farm Network After creatin the data sets, the enerated data were iven to three BN learnin prorams a Parameter Estimation alorithm, the Huin Researcher Structure Learnin tool that implements the NPC and PC alorithms, and Visual CB, an implementation of the CB alorithm developed y [Sinh and Valtorta 1995]. See also [Neapolitan 004]. The pseudocode for the Parameter Learnin alorithm is displayed elow in Fiure 3. The input to the code is a Huin.net file as well as the data sources either in a flat file or XML schema. The alorithm uses either the linear calculation, or the mean of the eta distriution for the potential calculation. This code can e easily manipulated for testin our new alorithms y chanin the potential calculations of each data set. 6
7 Parameter Estimation Pseudo code Input: Bayesian Network structure in form of Huin.net file, flat file or XML schema of data sets Parse structure et nodes and states of nodes from Huin structure For each Node If Node with no parents i = count total numer of entries for that node For each state of node (yes, no, other, etc) j = Count entries of that state Calculate eta distriution for that state Potential for the state = effective value, E(F) = j/i, or mean of eta distriution If Node with parents For each state of parent i = count total numer of entries where parent = that state For each state of node j = count numer of entries where parent = current state and node = current state Calculate eta distriution for that state Potential for the state = effective value, E(F) = j/i, or mean of eta distriution Output: Bayesian Network with learned potentials in form of Huin.net file Fiure 3 Parameter Estimation Pseudocode The potentials enerated y the alorithm were compared to the aseline of learnin from 0% dirty data. The variance etween the aseline and the dirty data sets was then calculated (standard variance calculation - σ αβ =, where α ( α + β ) ( α + β + 1) and β are standard parameters of the eta distriution). Then the averae variance was calculated for each size of the data set - 100, 500, 1000, and 10,000 data records. Also, the data sets potential calculations were raphed to show differences in oriinal and dirty data sets. In order to test the effects of inaccurate data on the Huin Structure Learnin alorithms, the dirty data sets were inputted to this proram and compared to a structure 7
8 learned from a aseline of 0% dirty data. These structures were compared for missin links, reversed links, and extra links to determine the effects of this inaccurate data on the learned structures. Further, the data sets were run throuh a second Structure Learnin alorithm developed y [Sinh and Valtorta 1995] the CB alorithm. This alorithm is a comination of a conditional independence testin alorithm with the traditional K alorithm for determinin BN structure. These structures were also compared for missin links, reversed links, and extra links aainst the aseline data. 3. Parameter Estimation Results The resultant potential calculations for the Trip to Asia experiments are shown in taular form in Fiure 4 and raphical form in Fiure 5. Averae Variance Baseline 10 percent 5 percent 50 percent 75 percent 90 percent Fiure 4 Averae Variance From Baseline 8
9 Comparison Of Learned Potentials 1. 1 Learned Potential Series1 Series Series3 Series4 Series5 Series Data Point Fiure 5 Comparison of learned potentials from dirty data sets. Series 1 Baseline Data Potentials learned from 0% dirty data on 100 records Series Baseline Data Potentials learned from 0% dirty data on 10,000 records Series 3 Potentials learned from 10% dirty data on 100 records Series 4 Potentials learned from 10% dirty data on 10,000 records Series 5 Potentials learned from 90% dirty data on 100 records Series 6 Potentials learned from 90% dirty data on 10,000 records The results from the raph are surprisin at first, ecause it seems as thouh the smaller data sets yield etter results than the larer ones. This is not the case however, and the apparent rise in variance as the data set ets larer is due to normal variances of the eta distriution. While the distriution of ood and ad data sets is important, the results do not chane on averae with a rise in the total numer of data records used. We will prove this in two parts. Firstly, we will prove that the potential of a state is due to the distriutions of the data, and is not affected y the amount of data used to learn the data sets. Secondly, we will show that the variance from the oriinal learned data sets is directly related to the inherent properties of the eta distriution. 9
10 Theorem 1 The learned potential of a state is invariant with respect to the numer of n ood and ad data sets, n and n, respectively, when the ratio is fixed. n Proof: Consider a inary variale, say X, in state yes. The potential of X = yes is φ ood. If a sample of size n is otained y simulation, the numer of cases in which X = yes has mean n * φ ood. Consider a second distriution in which the proaility of X = yes is φ ad. If a sample of n size is otained from this distriution, the numer of cases for which X = yes has mean n * φ ad. Considerin a sample that is an areate of the aove two, we otain the fraction of the cases for which X = yes is ( n ood ) + ( n ad ) φ overall =. (1) ( n + n ) To prove that this ratio is invariant with respect to n + n when replace n with k * n and n with k * n. (( k n ) ood ) + (( k n ) ad ) φ overall =. (( k n ) + ( k n )) This reduces to k *(( n ood ) + ( n ad )) φ overall =. k *( n + n ) n n is fixed, we will The factor k cancels out, provin that the φ overall is invariant with respect to the size of the n overall data set, when is fixed. n Lemma 1 - The variances in the data sets that are apparent in the experiment are due to the inherent properties of the eta distriution. 10
11 Explanation The formula for the eta distriution is ( α 1)!( β 1)! B ( α, β ) =. ( α + β 1)! α The mean is iven y µ = and the variance y α + β αβ σ =. ( α + β ) ( α + β + 1) We proved in Theorem 1 that the mean is invariant with respect to additional overall data when the ratio of ood data to ad data is constant. Now we will see if the variance is also invariant with respect to n + n when the ratio n n is fixed. We have the same n, n, φ ood, and φ ad from the previous proof. Sustitutin for α and β we have σ [( n = ood ) + ( n ad ( n )] [( n + n ( n ) ( n + n ood + 1) )) + ( n ( n ad ))]. Sustitutin n with k*n and n with k * n we have σ [( kn = ood ) + ( kn ad ( kn )] [( kn + kn ( kn ) ( kn + kn ood + 1) )) + ( kn ( kn ad ))]. Factorin k we have σ = k [( n ood ) + ( n k ad ( n )] [( n + n ( n ) ( kn + kn ood + 1) )) + ( n ( n ad ))] σ [( n = ood ) + ( n ad ( n )] [( n + n ( n ) ( kn + kn ood + 1) )) + ( n ( n ad ))]. We cannot factor out the k from the denominator. The lim σ = 0. k Therefore, as k ets larer the variance ecomes smaller. 11
12 Results from the Stud Farm Network are similar, ut were run on only 100 and 10,000 data records, for the aseline, 10%, 50%, and 90% dirty data. The Parameter Estimation results are shown in taular form in Fiure 6, and raphically in Fiure 7. Averae Variance Baseline 10 Percent 50 Percent 90 Percent Fiure 6 Stud Farm Averae Variance from Baseline Comparison of Learnt Potentials - 10,000 Data Records 1. Learnt Potential Baseline Percent Percent Percent Parameter Fiure 7 Stud Farm Learnt Potentials Graph 4. Structure Learnin Results The results of the structure learnin tests for the NPC/PC alorithm usin the Huin Researcher tool, and the CB alorithm, are shown in taular form in Fiure 8. Because the results from the NPC and PC tests were very similar, we will display only the NPC results for ease. 1
13 NPC-100 NPC-500 NPC-1000 NPC CB-100 CB-500 CB-1000 CB Total Wron Baseline Percent Percent Percent Percent Percent Fiure 8 NPC and CB Structure Learnin Results The total incorrect links are calculated y addin the extra links, reversed links, and missin links. This is displayed in raphical form for 100 and 10,000 data records in Fiure 9. Comparison of Incorrect Links Numer of Incorrect Links NPC-100 NPC CB-100 CB Percentae of Dirty Data Fiure 9 Comparison of Incorrect Links NPC and CB Alorithms These results are also deceivin at first, as it appears that the total amount of wron data increases until approximately 75% of dirty data, and then declines at 75-90% dirty data. This is not the case, however, as revealed y a careful examination of the total correct, missin, reversed, and extra links. At around 5-75% missin data, the learnin 13
14 alorithms ein to discover aout twice as many total links as in the 0-10% and 75-90% dirty data sets. With the larer amounts of conflictin data, the alorithm finds links in oth the ad data set and the true data set ivin us twice as many links oth correct and incorrect. As the percentae of 50-50, or ad data increases to 75-90%, or as the ad data percentae is low, 0-10%, the alorithms finds only one set of links. This can e seen as we raph the total numer of incorrect links divided y the total numer of links found. This is shown in taular form in Fiure 10 and raphically for 100 and 10,000 data records in Fiure 11. A similar result is noted in [Spirtes et al 000]. The authors discovered that if the PC alorithm fails to find an ede from the true raph in the second stae of the alorithm, then the alorithm fails in susequent steps to remove nonexistent edes. They also discovered that the failure to find an ede in the true raph could lead to orientation mistakes in susequent staes. Total Wron/Total Links NPC-100 NPC-500 NPC-1000 NPC CB-100 CB-500 CB-1000 CB Baseline Percent Percent Percent Percent Percent Fiure 10 NPC and CB Structure Learnin Results Total Incorrect/Total Links 14
15 Comparison of Learnt Structures 3.5 Total Incorrect Links/Total Links NPC-100 NPC CB-100 CB Percentae of Dirty Data Fiure 11 Comparison of Incorrect Links Total Incorrect/Total Links Results from the Stud Farm network were similar and are shown in taular form in Fiure 1 and raphically in Fiure 13. Total Incorrect Links/Total Links NPC-100 NPC CB-100 CB Baseline Percent Percent Percent Fiure 1 Stud Farm NPC and CB Structure Learnin Results 15
16 Comparison of Learnt Structures 7 6 Total Wron/Total Links NPC-100 NPC CB-100 CB Percentae Dirty Data Fiure 13 Stud Farm Comparison of Incorrect Links Total Incorrect/Total Links 5. Conclusions Even from a cursory overview of the results of these experiments, it is evident that Parameter Estimation alorithms are more tolerant of inaccuracies in data than the Structure Learnin alorithms we have studied NPC and CB. At only 10% dirty data, the CB alorithm with 10,000 data records increased the numer of incorrect links from (aseline) to 16 - an 800% increase. NPC also had an increase in incorrect links of 35% for 10,000 records with only 10% dirty data. The results after 10% dirty data, while not increasin at a sinificant rate, also do not ecome closer to the oriinal structure, as would e expected. There does not seem to e a sinificant advantae to either of these Structure Learnin alorithms in terms of handlin inaccurate data, althouh the CB alorithm appears, in these two examples, to create etter structures for smaller data records, and NPC seems to create etter structures with larer amounts of data. Therefore when dealin with small data sets of inaccurate data, the CB alorithm may e a etter 16
17 choice for learnin structures. The most sinificant findin of this research, thouh, is that even at small amounts of inaccurate data, these Structure Learnin alorithms are unale to enerate correct structures. Therefore a thorouh understandin of the quality of the data is very important when usin Structure Learnin alorithms, as even small inaccuracies can create completely incorrect models. Our parameter estimation alorithm, however, does follow a radual increase in inaccurate modelin when learned from inaccurate data sets. As the inaccuracy of the data increases, the learned potentials also deviate from the oriinal and increase radually accordin to percentae of missin data. Therefore, unlike the Structure Learnin alorithms we have studied, BNs learned from inaccurate data can e useful when the potentials are iven a rane of accuracy ased on the elieved accuracy of the data. Therefore if a model is elieved to e ased on data that is 90% accurate with 100 data records, the potentials can e iven with a standard deviation of approximately 0.18 ( variance = ). This variance was taken from the Trip to Asia data results, however we realize that the Stud Farm standard deviation for 10% missin data would e hiher 0.8. Our future research will strive to verify an averae potential deviation for the various percentaes of inaccurate data that can e applied to a wide rane of new models. 6. Future Research Future research shall include methods for incorporatin the results of these experiments into learnin alorithms for BNs. For Parameter Estimation this opens two areas of future research quantifyin averae standard deviation fiures for expressin the rane of accuracy of a model learned from partially inaccurate data, and investiation into 17
18 methods for discountin those sets of data that are deemed to e partially inaccurate. We elieve this will add to the adaptation work of [Olesen et al 199] which was incorporated into the Huin enine. The results of these experiments are discourain for improvement of Structure Learnin alorithms for learnin from inaccurate data sets, as even small amounts of inaccurate data appear to reatly impact the usefulness and accuracy of the learned models. Our research will continue to test further Structure Learnin alorithms with the intent of findin an alorithm that handles inaccuracies more effectively. Alon with this research, it is also our elief that the inaccuracies of the data itself can e modeled effectively to show the dependence of the model upon data quality. For example, each node or link in the learned Bayesian Network can also have a quality node that quantifies the overall accuracy, completeness, timeliness, and consistency of the data set that was used for learnin. There exists a causal link from the accuracy of the data to the learned potentials and structure. An example of this idea is shown in Fiure
19 Fiure 14 Modelin Inaccuracies as a Causal Entity The potential tale for Tuerculosis chanes to add the parameter of Link Dependence on Data Accuracy. As the accuracy of the data decreases, the causal relationship etween Trip to Asia and Has Tuerculosis eins to fade and the potentials ecome evenly split no dependence on one parameter over another. This allows us to chane our model dynamically as our eliefs aout the quality of the data chanes. This is a challenin prolem, as more experiments will e needed to confirm the relationship etween accuracy of the data and existence of a learned causal link. Usin this initial research as a uide, however, it is our elief that we can ein to understand and account for data quality in the automated learnin of BNs. 19
20 7. Bilioraphy Neapolitan, R.E. (004). Learnin Bayesian Networks. Upper Saddle River, NJ: Pearson Education, Inc. Olesen, K., Lauritsen, S., Jensen, F. (199) ahugin: A System Creatin Adaptive Causal Proailistic Networks. Proceedins of the Eihth Conference on Uncertainty in Artificial Intellience, 3-9. Pipino, L., Lee, Y., and Wan, R. (00). Data Quality Assessment. Communications of the ACM, Vol Sinh, M., and Valtorta, M. (1995). Construction of Bayesian Network Structures from Data: a Brief Survey and an Efficient Alorithm. International Journal of Approximate Reasonin. Spirtes, P., Glymour, C., and Scheines, R. Causation, Prediction, and Search. MIT Press, Camride, Massachusetts, 000. Stron, D., Lee, Y., and Wan, R. (1997). Data Quality in Context. Communications of the ACM. Vol Tayi, G. and Ballou, D. (1998). Examinin Data Quality. Communications of the ACM. Vol Wand, Y. and Wan, R. (1996). Anchorin Data Quality Dimensions in Ontoloical Foundations. Communications of the ACM Vol
Probabilistic Gaze Estimation Without Active Personal Calibration
Probabilistic Gaze Estimation Without Active Personal Calibration Jixu Chen Qian Ji Department of Electrical,Computer and System Enineerin Rensselaer Polytechnic Institute Troy, NY 12180 chenji@e.com qji@ecse.rpi.edu
More informationTHE EFFECTS OF DATA QUALITY ON MACHINE LEARNING ALGORITHMS (Research-in-Progress IQ Concepts, Tools, Metrics, Measures, Models, and Methodologies)
THE EFFECTS OF DATA QUALITY ON MACHINE LEARNING ALGORITHMS (Research-in-Progress IQ Concepts, Tools, Metrics, Measures, Models, and Methodologies) Valerie Sessions University of South Carolina, USA sessionv@cse.sc.edu
More informationChapter 5 THE MODULE FOR DETERMINING AN OBJECT S TRUE GRAY LEVELS
Qian u Chapter 5. Determinin an Object s True Gray evels 3 Chapter 5 THE MODUE OR DETERMNNG AN OJECT S TRUE GRAY EVES This chapter discusses the module for determinin an object s true ray levels. To compute
More informationTHE APPLICATION OF RELIABILITY BASED OPTIMIZATION OF TOPHAT STIFFENED COMPOSITE PANELS UNDER BIDIRECTIONAL BUCKLING LOAD
8 TH ITERATIOAL COFERECE O COMPOSITE MATERIALS THE APPLICATIO OF RELIABILITY BASED OPTIMIZATIO OF TOPHAT STIFFEED COMPOSITE PAELS UDER BIDIRECTIOAL BUCKLIG LOAD X.G. Xue, *, G.X. Li, R.A. Shenoi, A.J.
More informationA NEW METHOD FOR EXTRACTING 3D SOLID MODELS OF OBJECTS USING 2D TECHNICAL DRAWINGS
Mathematical and Computational Applications, Vol. 12, No. 1, pp. 31-39, 2007. Association for Scientific Research A NEW METHOD FOR EXTRACTING 3D SOLID MODELS OF OBJECTS USING 2D TECHNICAL DRAWINGS İrahim
More informationSCALE SELECTIVE EXTENDED LOCAL BINARY PATTERN FOR TEXTURE CLASSIFICATION. Yuting Hu, Zhiling Long, and Ghassan AlRegib
SCALE SELECTIVE EXTENDED LOCAL BINARY PATTERN FOR TEXTURE CLASSIFICATION Yutin Hu, Zhilin Lon, and Ghassan AlReib Multimedia & Sensors Lab (MSL) Center for Sinal and Information Processin (CSIP) School
More informationHeuristic Searching: A* Search
IOSR Journal of Computer Enineerin (IOSRJCE) ISSN: 2278-0661 Volume 4, Issue 2 (Sep.-Oct. 2012), PP 01-05 Nazmul Hasan (Department of Computer Science and Enineerin, Military Institute of Science and Technoloy,
More informationOptimal design of Fresnel lens for a reading light system with. multiple light sources using three-layered Hierarchical Genetic.
Optimal desin of Fresnel lens for a readin liht system with multiple liht sources usin three-layered Hierarchical Genetic Alorithm Wen-Gon Chen, and Chii-Maw Uan Department of Electrical Enineerin, I Shou
More informationPedestrian Detection Using Structured SVM
Pedestrian Detection Using Structured SVM Wonhui Kim Stanford University Department of Electrical Engineering wonhui@stanford.edu Seungmin Lee Stanford University Department of Electrical Engineering smlee729@stanford.edu.
More informationPolygonal Approximation of Closed Curves across Multiple Views
Polyonal Approximation of Closed Curves across Multiple Views M. Pawan Kumar Saurah oyal C. V. Jawahar P. J. Narayanan Centre for Visual Information echnoloy International Institute of Information echnoloy
More informationRecent Results from Analyzing the Performance of Heuristic Search
Recent Results from Analyzing the Performance of Heuristic Search Teresa M. Breyer and Richard E. Korf Computer Science Department University of California, Los Angeles Los Angeles, CA 90095 {treyer,korf}@cs.ucla.edu
More informationDevelopment of a variance prioritized multiresponse robust design framework for quality improvement
Development of a variance prioritized multiresponse robust desin framework for qualit improvement Jami Kovach Department of Information and Loistics Technolo, Universit of Houston, Houston, Texas 7704,
More informationoptimization agents user interface agents database agents program interface agents
A MULTIAGENT SIMULATION OPTIMIZATION SYSTEM Sven Hader Department of Computer Science Chemnitz University of Technoloy D-09107 Chemnitz, Germany E-Mail: sha@informatik.tu-chemnitz.de KEYWORDS simulation
More informationG Force Tolerance Sample Solution
G Force Tolerance Sample Solution Introduction When different forces are applied to an oject, G-Force is a term used to descrie the resulting acceleration, and is in relation to acceleration due to gravity(g).
More informationGrooming Multicast Traffic in Unidirectional SONET/WDM Rings
1 Groomin Multicast Traffic in Unidirectional SONET/WDM Rins Anuj Rawat, Richard La, Steven Marcus and Mark Shayman Abstract In this paper we study the problem of efficient roomin of iven non-uniform multicast
More informationM3AR: A Privacy Preserving Algorithm that Maintains Association Rules
M3A: A Privacy Preservin Alorithm that Maintains Association ules Huynh Van Quoc Phuon, ran Khanh Dan, Vo hi Noc Chau Faculty of Computer Science and Enineerin, HCMU National University of Ho Chi Minh
More informationWAVELENGTH Division Multiplexing (WDM) significantly
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 6, AUGUST 27 1 Groomin Multicast Traffic in Unidirectional SONET/WDM Rins Anuj Rawat, Richard La, Steven Marcus, and Mark Shayman Abstract
More informationCAM Part II: Intersections
CAM Part II: Intersections In the previous part, we looked at the computations of derivatives of B-Splines and NURBS. The first derivatives are of interest, since they are used in computin the tanents
More informationTOWARD A UNIFIED INFORMATION SPACE FOR THE SPECIFICATION OF BUILDING PERFORMANCE SIMULATION RESULTS
Ninth International IBPSA Conference Montréal, Canada Auust 15-18, 2005 TOWARD A UNIFIED INFORMATION SPACE FOR THE SPECIFICATION OF BUILDING PERFORMANCE SIMULATION RESULTS Ardeshir Mahdavi, Julia Bachiner,
More informationThe Gene Expression Messy Genetic Algorithm For. Hillol Kargupta & Kevin Buescher. Computational Science Methods division
The Gene Expression Messy Genetic Alorithm For Financial Applications Hillol Karupta & Kevin Buescher Computational Science Methods division Los Alamos National Laboratory Los Alamos, NM, USA. Abstract
More informationA Combined Delay and Throughput Proportional Scheduling Scheme for Differentiated Services
A Combined Delay and Throuhput Proportional Schedulin Scheme for Differentiated Services Samyukta Sankaran and Ahmed E.Kamal Department of Electrical and Computer Enineerin Iowa State University Ames,
More informationTHE FEASIBILITY OF SMOOTHED PARTICLE HYDRODYNAMICS FOR MULTIPHASE OILFIELD SYSTEMS
Seventh International Conference on CFD in the Minerals and Process Industries CSIRO, Melbourne, Australia 9-11 December 009 THE FEASIBILITY OF SMOOTHED PARTICLE HYDRODYNAMICS FOR MULTIPHASE OILFIELD SYSTEMS
More informationLearning Deep Features for One-Class Classification
1 Learnin Deep Features for One-Class Classification Pramuditha Perera, Student Member, IEEE, and Vishal M. Patel, Senior Member, IEEE Abstract We propose a deep learnin-based solution for the problem
More informationA Framework for Dynamic Image Sampling Based on Supervised Learning
A Framework for Dynamic Image Sampling Based on Supervised Learning G. M. Dilshan P. Godaliyadda, Dong Hye Ye, Michael D. Uchic, Michael A. Groeer, Gregery T. Buzzard, and Charles A. Bouman School of Electrical
More informationFigure 1: The trajectory of a projectile launched at θ 1 > 0.
3 Projectile Motion Introduction Important: Complete and submit the Lab 3 problem set on WebAssin before you leave lab today. Your instructor and lab assistant will be happy to help. In Lab 2, you tested
More informationA Flexible Integration Strategy for In-Car Telematics Systems
A Flexible Interation Stratey for In-Car Telematics Systems Thomas Bauer Jens Herrmann Peter Liesmeyer Christopher Robinson-Mallett University of Potsdam Hasso-Plattner-Institute thomas.bauer @hpi.uni-potsdam.de
More informationSBG SDG. An Accurate Error Control Mechanism for Simplification Before Generation Algorihms
An Accurate Error Control Mechanism for Simplification Before Generation Alorihms O. Guerra, J. D. Rodríuez-García, E. Roca, F. V. Fernández and A. Rodríuez-Vázquez Instituto de Microelectrónica de Sevilla,
More informationBinary Decision Tree Using Genetic Algorithm for Recognizing Defect Patterns of Cold Mill Strip
Binary Decision Tree Using Genetic Algorithm for Recognizing Defect Patterns of Cold Mill Strip Kyoung Min Kim 1,4, Joong Jo Park, Myung Hyun Song 3, In Cheol Kim 1, and Ching Y. Suen 1 1 Centre for Pattern
More information/06/$20.00 c 2006 IEEE I. INTRODUCTION
Scalale Router Memory Architecture Based on Interleaved DRAM Feng Wang and Mounir Hamdi Computer Science Department of The Hong Kong University of Science and Technology {fwang, hamdi}@cs.ust.hk Astract
More informationTETROBOT: A NOVEL MECHANISM FOR RECONFIGURABLE PARALLEL ROBOTICS. Student, Machine Building Faculty, Technical University of Cluj-Napoca
UNIVERSITATEA TRANSILVANIA DIN BRA0OV Catedra Desin de Produs 1i Robotic2 Simpozionul na8ional cu participare interna8ional9 PRoiectarea ASIstat9 de Calculator P R A S I C ' 02 Vol. I Mecanisme 1i Triboloie
More informationElectrical Power System Harmonic Analysis Using Adaptive BSS Algorithm
Sensors & ransducers 2013 by IFSA http://www.sensorsportal.com Electrical Power System Harmonic Analysis Usin Adaptive BSS Alorithm 1,* Chen Yu, 2 Liu Yuelian 1 Zhenzhou Institute of Aeronautical Industry
More informationUNIT 10 Trigonometry UNIT OBJECTIVES 287
UNIT 10 Trigonometry Literally translated, the word trigonometry means triangle measurement. Right triangle trigonometry is the study of the relationships etween the side lengths and angle measures of
More informationFanout-tree Restructuring Algorithm for Post-placement Timing. Optimization TOSHIBA. Kawasaki, JAPAN
Fanout-tree Restructurin Alorithm for Post-placement Timin Optimization T.Aoki, M.Murakata, T.Mitsuhashi and N.Goto y Semiconductor DA &Test Enineerin Center, y Research and Development Center, TOSHBA
More informationDevelopment and Verification of an SP 3 Code Using Semi-Analytic Nodal Method for Pin-by-Pin Calculation
Journal of Physical Science and Application 7 () (07) 0-7 doi: 0.765/59-5348/07.0.00 D DAVID PUBLISHIN Development and Verification of an SP 3 Code Usin Semi-Analytic Chuntao Tan Shanhai Nuclear Enineerin
More informationA Dynamic Approach to Probabilistic Inference using Bayesian Networks
A Dynamic Approach to Proailistic Inference using Bayesian Networks Michael C Horsch and David Poole Department of Computer Science University of British Columia Vancouver, British Columia Canada email:
More informationCHAPTER 13 FINITE ELEMENTS: STIFFNESS MATRICES
4 5 CHAPTER FINITE ELEMENTS: STIFFNESS MATRICES. Introduction The purpose of this chapter is to use two simpe exampes to expain the asics of how finite eement stiffness matrices are formuated and how static
More informationReversible Image Merging for Low-level Machine Vision
Reversible Imae Merin for Low-level Machine Vision M. Kharinov St. Petersbur Institute for Informatics and Automation of RAS, 14_liniya Vasil evskoo ostrova 39, St. Petersbur, 199178 Russia, khar@iias.spb.su,
More informationBus-Based Communication Synthesis on System-Level
Bus-Based Communication Synthesis on System-Level Michael Gasteier Manfred Glesner Darmstadt University of Technoloy Institute of Microelectronic Systems Karlstrasse 15, 64283 Darmstadt, Germany Abstract
More informationA Scene Text-Based Image Retrieval System
A Scene Text-Based Imae Retrieval System Thuy Ho Faculty of Information System University of Information Technoloy Ho Chi Minh city, Vietnam thuyhtn@uit.edu.vn Noc Ly Faculty of Information Technoloy University
More informationRBFT: Redundant Byzantine Fault Tolerance
RBFT: Redundant Byzantine Fault Tolerance Pierre-Louis Aulin Grenole University Sonia Ben Mokhtar CNRS - LIRIS Vivien Quéma Grenole INP Astract Byzantine Fault Tolerant state machine replication (BFT)
More informationFLEXnav: A Fuzzy Logic Expert Dead-reckoning System for the Segway RMP
Proceedins of the SPIE efense and Security Symposium, Unmanned Ground Vehicle Technoloy VI (O54), Orlando FL, -6 FLEXnav: A Fuzzy Loic Expert ead-reckonin System for the Seway MP Lauro Ojeda, Mukunda aju,
More informationHot X: Algebra Exposed
Hot X: Algera Exposed Solution Guide for Chapter 5 Here are the solutions for the Doing the Math exercises in Hot X: Algera Exposed! (assume that all denominators 0) DTM from p.59 2. Since they have the
More informationTree Based Symmetric Key Broadcast Encryption
Tree Based Symmetric Key Broadcast Encryption Sanjay Bhattacherjee and Palash Sarkar Applied Statistics Unit Indian Statistical Institute 203, B.T.Road, Kolkata, India - 700108. {sanjay r,palash}@isical.ac.in
More informationChapter - 1 : IMAGE FUNDAMENTS
Chapter - : IMAGE FUNDAMENTS Imae processin is a subclass of sinal processin concerned specifically with pictures. Improve imae quality for human perception and/or computer interpretation. Several fields
More informationLearning Geometric Concepts with an Evolutionary Algorithm. Andreas Birk. Universitat des Saarlandes, c/o Lehrstuhl Prof. W.J.
Learnin Geometric Concepts with an Evolutionary Alorithm Andreas Birk Universitat des Saarlandes, c/o Lehrstuhl Prof. W.J. Paul Postfach 151150, 66041 Saarbrucken, Germany cyrano@cs.uni-sb.de http://www-wjp.cs.uni-sb.de/cyrano/
More informationLow cost concurrent error masking using approximate logic circuits
1 Low cost concurrent error maskin usin approximate loic circuits Mihir R. Choudhury, Member, IEEE and Kartik Mohanram, Member, IEEE Abstract With technoloy scalin, loical errors arisin due to sinle-event
More informationDYNAMIC COUPLING OF UNDERACTUATED MANIPULATORS
Proceedins of the 4th IEEE Conference on Control Applications, Albany, USA, Sep. 1995, pp. 5-55. DYNAMIC COUPLING OF UNDERACTUATED MANIPULATORS Marcel Bererman Christopher Lee Yanshen Xu The Robotics Institute
More informationIterative Single-Image Digital Super-Resolution Using Partial High-Resolution Data
Iterative Sinle-Imae Diital Super-Resolution Usin Partial Hih-Resolution Data Eran Gur, Member, IAENG and Zeev Zalevsky Abstract The subject of extractin hih-resolution data from low-resolution imaes is
More informationAffinity Hybrid Tree: An Indexing Technique for Content-Based Image Retrieval in Multimedia Databases
Affinity Hybrid Tree: An Indexin Technique for Content-Based Imae Retrieval in Multimedia Databases Kasturi Chatterjee and Shu-Chin Chen Florida International University Distributed Multimedia Information
More informationArray Dependence Analysis as Integer Constraints. Array Dependence Analysis Example. Array Dependence Analysis as Integer Constraints, cont
Theory of Integers CS389L: Automated Logical Reasoning Omega Test Işıl Dillig Earlier, we talked aout the theory of integers T Z Signature of T Z : Σ Z : {..., 2, 1, 0, 1, 2,..., 3, 2, 2, 3,..., +,, =,
More informationOptimal Scheduling of Dynamic Progressive Processing
Optimal Schedulin of Dynamic roressive rocessin Abdel-Illah ouaddib and Shlomo Zilberstein Abstract. roressive processin allows a system to satisfy a set of requests under time pressure by limitin the
More informationTHE DECISION OF THE OPTIMAL PARAMETERS IN MARKOV RANDOM FIELDS OF IMAGES BY GENETIC ALGORITHM
Zhaoao Zheng THE DECISION OF THE OPTIMAL PARAMETERS IN MARKOV RANDOM FIELDS OF IMAGES BY GENETIC ALGORITHM Zhaoao Zheng, Hong Zheng School of Information Engineering Wuhan Technical University of Surveying
More informationSlicing Multi-threaded Java Programs : A Case Study
Slicin Multi-threaded Java Prorams : A Case Study Matthew B. Dwyer y, James C. Corbett z, John Hatcliff y, Stefan Sokolowski y, Honjun Zhen y ydepartment of Computin and Information Sciences Kansas State
More informationTowards a Method for Data Accuracy Assessment Utilizing a Bayesian Network Learning Algorithm
Towards a Method for Data Accuracy Assessment Utilizing a Bayesian Network Learning Algorithm 14 V. SESSIONS Charleston Southern University and M. VALTORTA University of South Carolina This research develops
More informationMinimum-Cost Multicast Routing for Multi-Layered Multimedia Distribution
Minimum-Cost Multicast Routin for Multi-Layered Multimedia Distribution Hsu-Chen Chen and Frank Yeon-Sun Lin Department of Information Manaement, National Taiwan University 50, Lane 144, Keelun Rd., Sec.4,
More informationTCP-FIT: An Improved TCP Congestion Control Algorithm and its Performance
TCP-FIT: An Improved TCP Conestion Control Alorithm and its Performance Jinyuan Wan, Jiantao Wen, Jun Zhan and Yuxin Han Key Laboratory of Pervasive Computin, Ministry of Education Tsinhua National Laboratory
More informationLeveraging Models at Run-time to Retrieve Information for Feature Location
Leverain Models at Run-time to Retrieve Information for Feature Location Lorena Arcea,2, Jaime Font,2 Øystein Hauen 2,3, and Carlos Cetina San Jore University, SVIT Research Group, Zaraoza, Spain {larcea,jfont,ccetina}@usj.es
More informationGybeh' c.s 9 Springer-Verlag 1993
Biol. yern. 69, 345-351 (1993) Blogr =- Gyeh' c.s 9 Springer-Verlag 1993 Solution of the direct and inverse kinematic prolems y a common algorithm ased on the mean of multiple computations H. ruse, U.
More informationReal-Time Median Filtering for Embedded Smart Cameras
Real-Time Median Filtering for Emedded Smart Cameras Yong Zhao Brown University Yong Zhao@rown.edu Gariel Tauin Brown University tauin@rown.edu Figure 1: System architecture of our proof-of-concept Visual
More informationAgus Harjoko Lab. Elektronika dan Instrumentasi, FMIPA, Universitas Gadjah Mada, Yogyakarta, Indonesia
A Comparison Study of the Performance of the Fourier Transform Based Algorithm and the Artificial Neural Network Based Algorithm in Detecting Faric Texture Defect Agus Harjoko La. Elektronika dan Instrumentasi,
More informationEfficient Generation of Large Amounts of Training Data for Sign Language Recognition: A Semi-Automatic Tool
Efficient Generation of Lare Amounts of Trainin Data for Sin Lanuae Reconition: A Semi-Automatic Tool Ruiduo Yan, Sudeep Sarkar, Barbara Loedin, and Arthur Karshmer University of South Florida, Tampa,
More informationAnalyzing the Performance of Pattern Database Heuristics
Analyzing the Performance of Pattern Dataase Heuristics Richard E. Korf Computer Science Department University of California, Los Angeles Los Angeles, CA 90095 korf@cs.ucla.edu Astract We introduce a model
More informationIMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY
IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY Shreelekshmi R, Wilscy M 2 and C E Veni Madhavan 3 Department of Computer Science & Engineering, College of Engineering, Trivandrum,
More informationThe Role of Switching in Reducing the Number of Electronic Ports in WDM Networks
1 The Role of Switchin in Reducin the Number of Electronic Ports in WDM Networks Randall A. Berry and Eytan Modiano Abstract We consider the role of switchin in minimizin the number of electronic ports
More informationDistortion Measurement Using Arc-Length-Parameterisation within a Vertex-Based Shape Coding Framework
Proceedings of 11th International Conference on Computer and Information Technology (ICCIT 008) 5-7 Decemer, 008, Khulna, Bangladesh Distortion Measurement Using Arc-Length-Parameterisation within a Vertex-Based
More informationalgorithms ISSN
Algorithms 29, 2, 46-75; doi:.339/a246 OPEN ACCESS algorithms ISSN 999-4893 www.mdpi.com/journal/algorithms Article A Novel Block-ased Watermarking Scheme Using the SVD Transform Alessandro Basso*, Francesco
More informationA Scene Text-Based Image Retrieval System
A Scene Text-Based Imae Retrieval System ThuyHo Faculty of Information System University of Information Technoloy Ho Chi Minh city, Vietnam thuyhtn@uit.edu.vn Noc Ly Faculty of Information Technoloy University
More informationHCE: A New Channel Exchange Scheme for Handovers in Mobile Cellular Systems
129 HCE: A New Channel Exchane Scheme for Handovers in Mobile Cellular Systems DNESH K. ANVEKAR* and S. SANDEEP PRADHAN Department of Electrical Communication Enineerin ndian nstitute of Science, Banalore
More informationPrelim 1. CS 2110, 14 March 2017, 7:30 PM Total Question Name Short answer. OO Recursion Loop invariants Max Score Grader
Prelim 1 CS 2110, 14 March 2017, 7:30 PM 1 2 3 4 5 Total Question Name Short answer OO Recursion Loop invariants Max 1 36 33 15 15 100 Score Grader The exam is closed ook and closed notes. Do not egin
More informationEfficient Generation of Large Amounts of Training Data for Sign Language Recognition: A Semi-automatic Tool
Efficient Generation of Lare Amounts of Trainin Data for Sin Lanuae Reconition: A Semi-automatic Tool Ruiduo Yan, Sudeep Sarkar,BarbaraLoedin, and Arthur Karshmer University of South Florida, Tampa, FL,
More informationPractical training Inga Kindermann; Dominik Haeussler
liht interference Materials: Laserpointer mountin material diffraction ratin with 40 slits per centimetre, CD-ROM (and ), cardboard security advise: Never let the direct beam of a laser hit your eyes!
More informationMulti-Class Protein Fold Recognition Using Multi-Objective Evolutionary Algorithms
1 Multi-Class Protein Fold Reconition Usin Multi-bjective Evolutionary Alorithms Stanley Y. M. Shi, P. N. Suanthan, Senior Member IEEE and Kalyanmoy Deb, Senior Member IEEE KanGAL Report Number 2004007
More informationProtection of Location Privacy using Dummies for Location-based Services
Protection of Location Privacy usin for Location-based Services Hidetoshi Kido y Yutaka Yanaisawa yy Tetsuji Satoh y;yy ygraduate School of Information Science and Technoloy, Osaka University yyntt Communication
More informationReducing network cost of many-to-many communication in unidirectional WDM rings with network coding
Reducin network cost of many-to-many communication in unidirectional WDM rins with network codin Lon Lon and Ahmed E. Kamal Department of Electrical and Computer Enineerin, Iowa State University Email:
More informationGEOMETRICAL ASPECTS OF RECONSTRUCTION OF THE CYLINDRICAL PANORAMA
he Journal of Polish ociety for Geometry and Enineerin Graphics Volume 24 (2013), 9-14 9 GEOMEICAL APEC O ECONUCION O HE CYLINDICAL PANOAMA Jolanta DŹWIEZYŃKA zeszow University of echnoloy, Department
More informationImitation: An Alternative to Generalization in Programming by Demonstration Systems
Imitation: An Alternative to Generalization in Prorammin by Demonstration Systems Technical Report UW-CSE-98-08-06 Amir Michail University of Washinton amir@cs.washinton.edu http://www.cs.washinton.edu/homes/amir/opsis.html
More informationEfficient and Provably Secure Ciphers for Storage Device Block Level Encryption
Efficient and Provably Secure Ciphers for Storae Device Block evel Encryption Yulian Zhen SIS Department, UNC Charlotte yzhen@uncc.edu Yone Wan SIS Department, UNC Charlotte yonwan@uncc.edu ABSTACT Block
More informationTwo Kinds of Golden Triangles, Generalized to Match Continued Fractions
Journal for Geometry and Graphics Volume (2007), No. 2, 65 7. Two Kinds of Golden Triangles, Generalized to Match Continued Fractions Clark Kimerling Department of Mathematics, University of Evansville
More informationCaching Policies for In-Network Caching
Caching Policies for In-Network Caching Zhe Li, Gwendal Simon, Annie Gravey Institut Mines Telecom - Telecom Bretagne, UMR CNRS 674 IRISA Université Européenne de Bretagne, France {firstname.lastname}@telecom-retagne.eu
More informationCLASS NOTES Models, Algorithms and Data: Introduction to computing 2018
CLASS NOTES Models, Alorithms and Data: Introduction to computin 2018 Petros Koumoutsakos, Jens Honore Walther (Last update: March 5, 2018) IMPORTANT DISCLAIMERS 1. REFERENCES: Much of the material (ideas,
More informationUmbrella : A novel fixed-size DHT protocol
Umrella : A novel fixed-size DHT protocol A. D. Sotiriou, P. Kalliaras, P. Papageorgiou, N. Mitrou Computer Network Laoratory, School of Electrical and Computer Engineering National Technical University
More informationTheory of Integers. CS389L: Automated Logical Reasoning. Lecture 13: The Omega Test. Overview of Techniques. Geometric Description
Theory of ntegers This lecture: Decision procedure for qff theory of integers CS389L: Automated Logical Reasoning Lecture 13: The Omega Test şıl Dillig As in previous two lectures, we ll consider T Z formulas
More informationLinear Network Coding
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 2, FEBRUARY 2003 371 Linear Network Codin Shuo-Yen Robert Li, Senior Member, IEEE, Raymond W. Yeun, Fellow, IEEE, Nin Cai Abstract Consider a communication
More informationMultiplying and Dividing, Decimals and Fractions Student Signature: Parent/Carer signature:
Preparin yourself for mathematics at Guilsborouh Multiplyin and Dividin, Decimals and Fractions Student Sinature: Parent/Carer sinature: Dear student, This booklet contains work which you need to complete
More informationA Genetic Algorithm for Packing Three-Dimensional Non-Convex. Objects Having Cavities and Holes. Engineering Math and Computer Science Dept
A Genetic Alorithm for Packin Three-Dimensional Non-Convex Objects Havin Cavities and Holes Ilkka Ikonen William E. Biles Department of Industrial Enineerin University of Louisville Louisville, KY 40292
More informationEfficient Minimization of Sum and Differential Costs on Machines with Job Placement Constraints
Efficient Minimization of Sum and Differential Costs on Machines with Job Placement Constraints Jaya Prakash Champati and Ben Lian Department of Electrical and Computer Enineerin, University of Toronto
More informationReducing Network Cost of Many-to-Many Communication in Unidirectional WDM Rings with Network Coding
1 Reducin Network Cost of Many-to-Many Communication in Unidirectional WDM Rins with Network Codin Lon Lon and Ahmed E. Kamal, Senior Member, IEEE Abstract In this paper we address the problem of traffic
More informationSome New Implication Operations Emerging From Fuzzy Logic
Some New Implication Operations Emerging From Fuzzy Logic Manish K. Srivastava, S. Kumar 2 and R.S. Parihar Sunrise University, Alwar, Rajsthan tomanishis@gmail.com 2 sanjeevis@yahoo.co.in Astract: We
More informationA Mobile Robot that Understands Pedestrian Spatial Behaviors
The 00 IEEE/RSJ International Conference on Intellient Robots and Systems October -, 00, Taipei, Taiwan A Mobile Robot that Understands Pedestrian Spatial Behaviors Shu-Yun Chun and Han-Pan Huan, Member,
More informationFair inter-tap routing and backhaul assignment for wireless mesh networks
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mo. Comput. (2008) Pulished online in Wiley InterScience (www.interscience.wiley.com).629 Fair inter-tap routing and ackhaul assignment for wireless
More informationPattern Recognition Letters
attern Reconition Letters 29 (2008) 1596 1602 Contents lists available at ScienceDirect attern Reconition Letters journal homepae: www.elsevier.com/locate/patrec 3D face reconition by constructin deformation
More informationOCC and Its Variants. Jan Lindström. Helsinki 7. November Seminar on real-time systems UNIVERSITY OF HELSINKI. Department of Computer Science
OCC and Its Variants Jan Lindström Helsinki 7. November 1997 Seminar on real-time systems UNIVERSITY OF HELSINKI Department o Computer Science Contents 1 Introduction 1 2 Optimistic Concurrency Control
More informationData-analysis problems of interest
Introduction 3 Data-analysis prolems of interest. Build computational classification models (or classifiers ) that assign patients/samples into two or more classes. - Classifiers can e used for diagnosis,
More informationEdge-segment-based Background Modeling: Non-parametric Online Background Update
2013 10th IEEE International Conference on Advanced Video and Signal Based Surveillance Edge-segment-ased Background Modeling: Non-parametric Online Background Update Jaemyun Kim, Adin Ramirez Rivera,
More informationFPGA Technology Mapping: A Study of Optimality
FPGA Technoloy Mappin: A Study o Optimality Andrew Lin Department o Electrical and Computer Enineerin University o Toronto Toronto, Canada alin@eec.toronto.edu Deshanand P. Sinh Altera Corporation Toronto
More informationFLEXnav: Fuzzy Logic Expert Rule-based Position Estimation for Mobile Robots on Rugged Terrain
Proceedins of the 2002 IEEE International Conference on Robotics and Automation. Washinton DC, USA, 10-17 May 2002, pp. 317-322 FLEXnav: Fuzzy Loic Expert Rule-based Position Estimation for Mobile Robots
More informationMulti Objective Reconfiguration of Distribution Networks with the Objective to Reduce Losses and Improving Power Quality Parameters
Applied mathematics in Engineering, Management and Technology 2 (5) 214:177-183 www.amiemt-journal.com Multi Ojective Reconfiguration of Distriution Networks with the Ojective to Reduce Losses and Improving
More informationIBM Thomas J. Watson Research Center. Yorktown Heights, NY, U.S.A. The major advantage of BDDs is their eciency for a
Equivalence Checkin Usin Cuts and Heaps Andreas Kuehlmann Florian Krohm IBM Thomas J. Watson Research Center Yorktown Heihts, NY, U.S.A. Abstract This paper presents a verication technique which is specically
More informationOn Defending Peer-to-Peer System-based Active Worm Attacks
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE GLOBECOM 25 proceedins. On Defendin eer-to-eer System-based Active
More informationEcient and Precise Modeling of Exceptions for the Analysis of Java Programs. IBM Research. Thomas J. Watson Research Center
Ecient and Precise Modelin of Exceptions for the Analysis of Java Prorams Jon-Deok Choi David Grove Michael Hind Vivek Sarkar IBM Research Thomas J. Watson Research Center P.O. Box 704, Yorktown Heihts,
More information