Efficient Techniques for Tree Similarity Queries 1

Size: px
Start display at page:

Download "Efficient Techniques for Tree Similarity Queries 1"

Transcription

1 Efficient Techniques for Tree Similrity Queries 1 Nikolus Augsten Dtbse Reserch Group Deprtment of Computer Sciences University of Slzburg, Austri July 6, 2017 Austrin Computer Science Dy 2017 / IMAGINE 17 1 Prtilly funded by Austrin Science Fund (FWF), FFTED Project P Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 1/24

2 Trees Are Everywhere dt formts (XML, JSON), directory hierrchies ERP: humn resources, enterprise ssets, bills of mteril NLP: syntx trees of nturl lnguges softwre evolution: source code bioinformtics: RNA secondry structure, crbohydrtes, neuronl morphology, phylogenetic trees imge recognition: gesture nd shpe recognition strophysics: ncestry trees of glxies (merger trees) Source: (19M trees, totl of 750M nodes) Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 2/24

3 Similrity Join on Trees tid T 1 T 2 T 3 F tree x y w v z b c b e b h tree F tid b c d T 1 e d T h i 2 x y w T 3 wz Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 3/24

4 Similrity Join on Trees tid T 1 T 2 F tree x y w v z b c b tree b c d e d h i F tid T 1 T 2 T 3 e b h x y w T 3 wz Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 3/24

5 Similrity Join on Trees tid F tree x threshold=2 tree F tid T 1 y w v z 2 b c d e T 1 T 2 b c b d h i T 2 T 3 e b h 1 x y w T 3 wz Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 3/24

6 Outline 1 How similr re two trees? 2 From trees to integer sets 3 Avoiding the nested loop join Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 4/24

7 Outline How similr re two trees? 1 How similr re two trees? 2 From trees to integer sets 3 Avoiding the nested loop join Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 5/24

8 How similr re two trees? Tree Edit Distnce (TED) minimum number of edit opertions to trnsform one tree into nother Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 6/24

9 How similr re two trees? Tree Edit Distnce (TED) minimum number of edit opertions to trnsform one tree into nother TED = 3 Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 6/24

10 How similr re two trees? Stte of the Art in TED Algorithm Time Spce Comments Zhng&Shsh 1989 O(n 4 ) O(n 2 ) O(n 2 log 2 n) runtime for blnced trees Demine et l O(n 3 ) O(n 2 ) worst cse is frequent Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 7/24

11 How similr re two trees? Stte of the Art in TED Algorithm Time Spce Comments Zhng&Shsh 1989 O(n 4 ) O(n 2 ) O(n 2 log 2 n) runtime for blnced trees Demine et l O(n 3 ) O(n 2 ) worst cse is frequent Zhng 0.5 sec Demine 30.9 sec ( 1000 nodes) Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 7/24

12 How similr re two trees? Stte of the Art in TED Algorithm Time Spce Comments Zhng&Shsh 1989 O(n 4 ) O(n 2 ) O(n 2 log 2 n) runtime for blnced trees Demine et l O(n 3 ) O(n 2 ) worst cse is frequent Zhng 0.5 sec Demine 30.9 sec ( 1000 nodes) Zhng Demine ( 1000 nodes) sec 26.0 sec Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 7/24

13 How similr re two trees? Stte of the Art in TED Algorithm Time Spce Comments Zhng&Shsh 1989 O(n 4 ) O(n 2 ) O(n 2 log 2 n) runtime for blnced trees Demine et l O(n 3 ) O(n 2 ) worst cse is frequent Zhng 0.5 sec Demine 30.9 sec ( 1000 nodes) Zhng Demine ( 1000 nodes) sec 26.0 sec Problem: Hrd-coded decomposition strtegies Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 7/24

14 How similr re two trees? Robust Tree Edit Distnce Algorithm (RTED) tree T1 strtegy computtion O(n 2 ) time nd spce optiml strtegy distnce computtion O(n 3 ) time nd O(n 2 ) spce TED tree T2 Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 8/24

15 How similr re two trees? Robust Tree Edit Distnce Algorithm (RTED) tree T1 strtegy computtion O(n 2 ) time nd spce optiml strtegy distnce computtion O(n 3 ) time nd O(n 2 ) spce TED tree T2 Algorithm Time Spce Comments Zhng&Shsh 1989 O(n 4 ) O(n 2 ) O(n 2 log 2 n) runtime for blnced trees Demine et l O(n 3 ) O(n 2 ) worst cse is frequent Pwlik&Augsten (RTED) 2011 O(n 3 ) O(n 2 ) optiml strtegy RTED: fstest known lgorithm for TED. Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 8/24

16 How similr re two trees? Performnce Evlution Runtime mesure runtime (seconds) vry tree shpe tree size 1000 nodes RTED: fstest known lgorithm for TED. Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 9/24

17 Outline From trees to integer sets 1 How similr re two trees? 2 From trees to integer sets 3 Avoiding the nested loop join Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 10/24

18 From trees to integer sets Similrity Join on Trees tid T 1 T 2 T 3 F tree x y w v z b c b e b h tree F tid b c d T 1 e d T h i 2 x y w T 3 wz Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 11/24

19 From trees to integer sets Similrity Join on Trees tid T 1 T 2 F tree x y w v z b c b tree b c d e d h i F tid T 1 T 2 T 3 e b h x y w T 3 wz Nested loop join (NLJ): 1. compute distnce between ll pirs of trees Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 11/24

20 From trees to integer sets Similrity Join on Trees tid F tree x threshold=2 tree F tid T 1 y w v z 2 b c d e T 1 T 2 b c b d h i T 2 T 3 e b h 1 x y w T 3 wz Nested loop join (NLJ): 1. compute distnce between ll pirs of trees 2. return trees within threshold Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 11/24

21 From trees to integer sets Similrity Join on Trees tid F tree x threshold=2 tree F tid T 1 y w v z 2 b c d e T 1 T 2 b c b d h i T 2 T 3 e b h 1 x y w T 3 wz Nested loop join (NLJ): 1. compute distnce between ll pirs of trees 2. return trees within threshold Very expensive: N 2 distnce computtions! Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 11/24

22 From trees to integer sets Stndrd Join Techniques Fil Sorting: Errors destroy sort order customer nme city Fried Slzburg Frodo Auenlnd Mri Wien customer nme Fried Mri Vrodo city Slzburg Wien Auenlnd Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 12/24

23 From trees to integer sets Stndrd Join Techniques Fil Sorting: Errors destroy sort order customer nme city customer nme Fried Slzburg Fried Frodo Auenlnd Mri Mri Wien Vrodo Hshing: Errors chnge hsh vlue city Slzburg Wien Auenlnd 0 Frodo Fried 1 2 Mri Fried 1 Vrodo 2 Mri 3 4 Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 12/24

24 From trees to integer sets pq-grms: From Trees to Sets Split trees into pq-grms (smll subtrees of fixed shpe) b e b c e b b e b b b c e b c b c b c e Hsh pq-grms to integers Intuition: Similr trees mny common pq-grms Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 13/24

25 From trees to integer sets pq-grms Hve Useful Properties Efficiency pq-grm runtime: O(n log n) edit distnce runtime: O(n 3 ) edit dist 2,3-grm dist Filter for edit distnce good pproximtion gurntees lower bound (fnout weighting of opertions) time [sec] number of nodes (n) Tree similrity simplified to set overlp. Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 14/24

26 Outline Avoiding the nested loop join 1 How similr re two trees? 2 From trees to integer sets 3 Avoiding the nested loop join Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 15/24

27 Avoiding the nested loop join Nested Loop Join for Sets A Smll Experiment Dtset: title nd uthor of n = 873k publictions (DBLP) vg. 15 words (min: 2, mx: 289) 409k different words, Zipfin frequency distribution Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 16/24

28 Avoiding the nested loop join Nested Loop Join for Sets A Smll Experiment Dtset: title nd uthor of n = 873k publictions (DBLP) vg. 15 words (min: 2, mx: 289) 409k different words, Zipfin frequency distribution Gol: find ll similr pirs (e.g. 90% overlp) Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 16/24

29 Avoiding the nested loop join Nested Loop Join for Sets A Smll Experiment Dtset: title nd uthor of n = 873k publictions (DBLP) vg. 15 words (min: 2, mx: 289) 409k different words, Zipfin frequency distribution Gol: find ll similr pirs (e.g. 90% overlp) Similrity check is very fst: 6 ns 15 CPU cycles Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 16/24

30 Avoiding the nested loop join Nested Loop Join for Sets A Smll Experiment Dtset: title nd uthor of n = 873k publictions (DBLP) vg. 15 words (min: 2, mx: 289) 409k different words, Zipfin frequency distribution Gol: find ll similr pirs (e.g. 90% overlp) Similrity check is very fst: 6 ns 15 CPU cycles Nested loop join: too mny comprisons! (pprox. 381 billion) Overlp Runtime [s] NLJ does not even scle for very fst checks. Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 16/24

31 Avoiding the nested loop join Trick: Avoid Touching Hopeless Cndidtes Prefix filter 1 : only look t smll prt of the set sort sets nd cut fter prefix no overlp in prefix similrity threshold not rechble r: c e f g r s 4 s: b d e f g 1 Chudhuri, Gnti, Kushik. A primitive opertor for similrity joins in dt clening. ICDE Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 17/24

32 Avoiding the nested loop join Prefix Index Join collection S prefix index lookup collection of probing sets R c c r 6 s 1 s 3 s 4 s 2 s 3 s 5 r 7 Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 18/24

33 Avoiding the nested loop join Prefix Index Join collection S prefix index lookup collection of probing sets R c c r 6 s 1 s 3 s 4 s 2 s 3 s 5 r 7 Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 18/24

34 Avoiding the nested loop join Comprison to Nested Loop Join Overlp Nested Loop Join Prefix Join s 0.26 s s 0.44 s s 1.54 s s 4.93 s Prefix Join 1500 to 8000 times fster thn nested loop join! Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 19/24

35 Summry Conclusion Set similrity join RTED: efficient tree edit distnce pq-grms: from trees to sets prefix: voiding nested loop join Publictions Very Lrge Dtbse Conference (VLDB 2005, 2011, 2016) ACM Trns. on Dtbse Systems (TODS 2010, 2015) Elsevier Informtion Systems (Inf. Syst. 2016) Algorithms nd technology mtter efficient solutions orders of mgnitude fster Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 20/24

36 Conclusion Conclusion nd Outlook technologicl limits lck of understnding Dt Anlysis Informtion Systems mny outlets Dtbse Systems ICDE VLDB SIGMOD Dtbse Theory ICDT PODS technology theoreticl foundtion Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 21/24

37 Conclusion Conclusion nd Outlook technologicl limits lck of understnding Dt Anlysis Informtion Systems mny outlets Dtbse Systems ICDE VLDB SIGMOD Dtbse Theory ICDT PODS technology theoreticl foundtion Efficient technology is key enbler for innovtion in big dt. Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 21/24

38 Conclusion Conclusion nd Outlook technologicl limits lck of understnding Dt Anlysis Informtion Systems mny outlets Dtbse Systems ICDE VLDB SIGMOD Dtbse Theory ICDT PODS technology theoreticl foundtion DACH publictions in top-3 DBS outlets: only 1.5% from Austri Efficient technology is key enbler for innovtion in big dt. Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 21/24

39 Conclusion Conclusion nd Outlook technologicl limits lck of understnding Dt Anlysis Informtion Systems mny outlets Dtbse Systems ICDE VLDB SIGMOD Dtbse Theory ICDT PODS technology theoreticl foundtion DACH publictions in top-3 DBS outlets: only 1.5% from Austri Mster Dt Science in Slzburg: dt nlysis + pplictions + technology Efficient technology is key enbler for innovtion in big dt. Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 21/24

40 Conclusion Conclusion nd Outlook technologicl limits lck of understnding Dt Anlysis Informtion Systems mny outlets Dtbse Systems ICDE VLDB SIGMOD Dtbse Theory ICDT PODS technology theoreticl foundtion DACH publictions in top-3 DBS outlets: only 1.5% from Austri Mster Dt Science in Slzburg: dt nlysis + pplictions + technology Invittion: VLDB 2017 in Munich, EDBT 2018 in Vienn! Efficient technology is key enbler for innovtion in big dt. Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 21/24

41 Thnks! Conclusion Thnks for your ttention! Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 22/24

42 References I Conclusion Nikolus Augsten, Michel Böhlen, nd Johnn Gmper. Approximte mtching of hierrchicl dt using pq-grms. In Proceedings of the Interntionl Conference on Very Lrge Dtbses (VLDB), pges , Trondheim, Norwy, September ACM Press. ISBN Nikolus Augsten, Michel Böhlen, nd Johnn Gmper. The pq-grm distnce between ordered lbeled trees. ACM Trnsctions on Dtbse Systems (TODS), 35(1):1 36, ISSN Willi Mnn, Nikolus Augsten, nd Pngiotis Bouros. An empiricl evlution of set similrity join techniques. PVLDB, 9(9): , ISSN Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 23/24

43 References II Conclusion Mteusz Pwlik nd Nikolus Augsten. RTED: A robust lgorithm for the tree edit distnce. PVLDB, 5(4): , December ISSN Mteusz Pwlik nd Nikolus Augsten. Efficient computtion of the tree edit distnce. ACM Trnsctions on Dtbse Systems (TODS), 40(1):3:1 3:40, Mrch ISSN Mteusz Pwlik nd Nikolus Augsten. Tree edit distnce: Robust nd memory-efficient. Informtion Systems, 56: , ISSN Nikolus Augsten (Univ. of Slzburg) Efficient Tree Similrity Queries July 6, / 24 24/24

UNIT 11. Query Optimization

UNIT 11. Query Optimization UNIT Query Optimiztion Contents Introduction to Query Optimiztion 2 The Optimiztion Process: An Overview 3 Optimiztion in System R 4 Optimiztion in INGRES 5 Implementing the Join Opertors Wei-Png Yng,

More information

Regular Expression Matching with Multi-Strings and Intervals. Philip Bille Mikkel Thorup

Regular Expression Matching with Multi-Strings and Intervals. Philip Bille Mikkel Thorup Regulr Expression Mtching with Multi-Strings nd Intervls Philip Bille Mikkel Thorup Outline Definition Applictions Previous work Two new problems: Multi-strings nd chrcter clss intervls Algorithms Thompson

More information

Systems I. Logic Design I. Topics Digital logic Logic gates Simple combinational logic circuits

Systems I. Logic Design I. Topics Digital logic Logic gates Simple combinational logic circuits Systems I Logic Design I Topics Digitl logic Logic gtes Simple comintionl logic circuits Simple C sttement.. C = + ; Wht pieces of hrdwre do you think you might need? Storge - for vlues,, C Computtion

More information

Nearest Keyword Set Search in Multi-dimensional Datasets

Nearest Keyword Set Search in Multi-dimensional Datasets Nerest Keyword Set Serch in Multi-dimensionl Dtsets Vishwkrm Singh Deprtment of Computer Science University of Cliforni Snt Brbr, USA Emil: vsingh014@gmil.com Ambuj K. Singh Deprtment of Computer Science

More information

Elena Baralis, Silvia Chiusano Politecnico di Torino. Pag. 1. Query optimization. DBMS Architecture. Query optimizer. Query optimizer.

Elena Baralis, Silvia Chiusano Politecnico di Torino. Pag. 1. Query optimization. DBMS Architecture. Query optimizer. Query optimizer. DBMS Architecture SQL INSTRUCTION OPTIMIZER Dtbse Mngement Systems MANAGEMENT OF ACCESS METHODS BUFFER MANAGER CONCURRENCY CONTROL RELIABILITY MANAGEMENT Index Files Dt Files System Ctlog DATABASE 2 Query

More information

Algorithm Design (5) Text Search

Algorithm Design (5) Text Search Algorithm Design (5) Text Serch Tkshi Chikym School of Engineering The University of Tokyo Text Serch Find sustring tht mtches the given key string in text dt of lrge mount Key string: chr x[m] Text Dt:

More information

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li 2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min

More information

Transparent neutral-element elimination in MPI reduction operations

Transparent neutral-element elimination in MPI reduction operations Trnsprent neutrl-element elimintion in MPI reduction opertions Jesper Lrsson Träff Deprtment of Scientific Computing University of Vienn Disclimer Exploiting repetition nd sprsity in input for reducing

More information

CSCI1950 Z Computa4onal Methods for Biology Lecture 2. Ben Raphael January 26, hhp://cs.brown.edu/courses/csci1950 z/ Outline

CSCI1950 Z Computa4onal Methods for Biology Lecture 2. Ben Raphael January 26, hhp://cs.brown.edu/courses/csci1950 z/ Outline CSCI1950 Z Comput4onl Methods for Biology Lecture 2 Ben Rphel Jnury 26, 2009 hhp://cs.brown.edu/courses/csci1950 z/ Outline Review of trees. Coun4ng fetures. Chrcter bsed phylogeny Mximum prsimony Mximum

More information

Text mining: bag of words representation and beyond it

Text mining: bag of words representation and beyond it Text mining: bg of words representtion nd beyond it Jsmink Dobš Fculty of Orgniztion nd Informtics University of Zgreb 1 Outline Definition of text mining Vector spce model or Bg of words representtion

More information

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis On the Detection of Step Edges in Algorithms Bsed on Grdient Vector Anlysis A. Lrr6, E. Montseny Computer Engineering Dept. Universitt Rovir i Virgili Crreter de Slou sin 43006 Trrgon, Spin Emil: lrre@etse.urv.es

More information

Presentation Martin Randers

Presentation Martin Randers Presenttion Mrtin Rnders Outline Introduction Algorithms Implementtion nd experiments Memory consumption Summry Introduction Introduction Evolution of species cn e modelled in trees Trees consist of nodes

More information

Cone Cluster Labeling for Support Vector Clustering

Cone Cluster Labeling for Support Vector Clustering Cone Cluster Lbeling for Support Vector Clustering Sei-Hyung Lee Deprtment of Computer Science University of Msschusetts Lowell MA 1854, U.S.A. slee@cs.uml.edu Kren M. Dniels Deprtment of Computer Science

More information

Graph Exploration: Taking the User into the Loop

Graph Exploration: Taking the User into the Loop Grph Explortion: Tking the User into the Loop Dvide Mottin, Anj Jentzsch, Emmnuel Müller Hsso Plttner Institute, Potsdm, Germny 2016/10/24 CIKM2016, Indinpolis, US Who we re Dvide Mottin grph mining, novel

More information

Alignment of Long Sequences. BMI/CS Spring 2012 Colin Dewey

Alignment of Long Sequences. BMI/CS Spring 2012 Colin Dewey Alignment of Long Sequences BMI/CS 776 www.biostt.wisc.edu/bmi776/ Spring 2012 Colin Dewey cdewey@biostt.wisc.edu Gols for Lecture the key concepts to understnd re the following how lrge-scle lignment

More information

Midterm 2 Sample solution

Midterm 2 Sample solution Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the

More information

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

LECT-10, S-1 FP2P08, Javed I.

LECT-10, S-1 FP2P08, Javed I. A Course on Foundtions of Peer-to-Peer Systems & Applictions LECT-10, S-1 CS /799 Foundtion of Peer-to-Peer Applictions & Systems Kent Stte University Dept. of Computer Science www.cs.kent.edu/~jved/clss-p2p08

More information

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES GENEATING OTHOIMAGES FO CLOSE-ANGE OBJECTS BY AUTOMATICALLY DETECTING BEAKLINES Efstrtios Stylinidis 1, Lzros Sechidis 1, Petros Ptis 1, Spiros Sptls 2 Aristotle University of Thessloniki 1 Deprtment of

More information

Better Hill-Climbing Searches for Parsimony

Better Hill-Climbing Searches for Parsimony Better Hill-Climbing Serches for Prsimony Gneshkumr Gnpthy, Vijy Rmchndrn, nd Tndy Wrnow Deprtment of Computer Sciences, University of Texs, Austin, TX 78712; gsgk, vlr, tndy @cs.utexs.edu Abstrct. The

More information

Topological Queries on Graph-structured XML Data: Models and Implementations

Topological Queries on Graph-structured XML Data: Models and Implementations Topologicl Queries on Grph-structured XML Dt: Models nd Implementtions Hongzhi Wng, Jinzhong Li, nd Jizhou Luo Astrct In mny pplictions, dt is in grph structure, which cn e nturlly represented s grph-structured

More information

Preserving Constraints for Aggregation Relationship Type Update in XML Document

Preserving Constraints for Aggregation Relationship Type Update in XML Document Preserving Constrints for Aggregtion Reltionship Type Updte in XML Document Eric Prdede 1, J. Wenny Rhyu 1, nd Dvid Tnir 2 1 Deprtment of Computer Science nd Computer Engineering, L Trobe University, Bundoor

More information

Parameterless Outlier Detection in Data Streams

Parameterless Outlier Detection in Data Streams Prmeterless Outlier Detection in Dt Strems Alice Mrscu nd Florent Mssegli INRIA AxIS Project-Tem 2004 route des lucioles - BP 93 {first.lst}@sophi.inri.fr ABSTRACT Outlyingness is subjective concept relying

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully

More information

A Comparison of the Discretization Approach for CST and Discretization Approach for VDM

A Comparison of the Discretization Approach for CST and Discretization Approach for VDM Interntionl Journl of Innovtive Reserch in Advnced Engineering (IJIRAE) Volume1 Issue1 (Mrch 2014) A Comprison of the Discretiztion Approch for CST nd Discretiztion Approch for VDM Omr A. A. Shib Fculty

More information

Phylogeny and Molecular Evolution

Phylogeny and Molecular Evolution Phylogeny nd Moleculr Evolution Chrcter Bsed Phylogeny 1/50 Credit Ron Shmir s lecture notes Notes by Nir Friedmn Dn Geiger, Shlomo Morn, Sgi Snir nd Ron Shmir Durbin et l. Jones nd Pevzner s presenttion

More information

TO REGULAR EXPRESSIONS

TO REGULAR EXPRESSIONS Suject :- Computer Science Course Nme :- Theory Of Computtion DA TO REGULAR EXPRESSIONS Report Sumitted y:- Ajy Singh Meen 07000505 jysmeen@cse.iit.c.in BASIC DEINITIONS DA:- A finite stte mchine where

More information

CS 221: Artificial Intelligence Fall 2011

CS 221: Artificial Intelligence Fall 2011 CS 221: Artificil Intelligence Fll 2011 Lecture 2: Serch (Slides from Dn Klein, with help from Sturt Russell, Andrew Moore, Teg Grenger, Peter Norvig) Problem types! Fully observble, deterministic! single-belief-stte

More information

COLOUR IMAGE MATCHING FOR DTM GENERATION AND HOUSE EXTRACTION

COLOUR IMAGE MATCHING FOR DTM GENERATION AND HOUSE EXTRACTION Hee Ju Prk OLOUR IMAGE MATHING FOR DTM GENERATION AND HOUSE EXTRATION Hee Ju PARK, Petr ZINMMERMANN * Swiss Federl Institute of Technology, Zuric Switzerlnd Institute for Geodesy nd Photogrmmetry heeju@ns.shingu-c.c.kr

More information

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. General Tree Search. Uniform Cost. Lecture 3: A* Search 9/4/2007

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. General Tree Search. Uniform Cost. Lecture 3: A* Search 9/4/2007 CS 88: Artificil Intelligence Fll 2007 Lecture : A* Serch 9/4/2007 Dn Klein UC Berkeley Mny slides over the course dpted from either Sturt Russell or Andrew Moore Announcements Sections: New section 06:

More information

CSEP 573 Artificial Intelligence Winter 2016

CSEP 573 Artificial Intelligence Winter 2016 CSEP 573 Artificil Intelligence Winter 2016 Luke Zettlemoyer Problem Spces nd Serch slides from Dn Klein, Sturt Russell, Andrew Moore, Dn Weld, Pieter Abbeel, Ali Frhdi Outline Agents tht Pln Ahed Serch

More information

Statistical classification of spatial relationships among mathematical symbols

Statistical classification of spatial relationships among mathematical symbols 2009 10th Interntionl Conference on Document Anlysis nd Recognition Sttisticl clssifiction of sptil reltionships mong mthemticl symbols Wl Aly, Seiichi Uchid Deprtment of Intelligent Systems, Kyushu University

More information

Dynamic Programming. Andreas Klappenecker. [partially based on slides by Prof. Welch] Monday, September 24, 2012

Dynamic Programming. Andreas Klappenecker. [partially based on slides by Prof. Welch] Monday, September 24, 2012 Dynmic Progrmming Andres Klppenecker [prtilly bsed on slides by Prof. Welch] 1 Dynmic Progrmming Optiml substructure An optiml solution to the problem contins within it optiml solutions to subproblems.

More information

Functor (1A) Young Won Lim 8/2/17

Functor (1A) Young Won Lim 8/2/17 Copyright (c) 2016-2017 Young W. Lim. Permission is grnted to copy, distribute nd/or modify this document under the terms of the GNU Free Documenttion License, Version 1.2 or ny lter version published

More information

Tool Vendor Perspectives SysML Thus Far

Tool Vendor Perspectives SysML Thus Far Frontiers 2008 Pnel Georgi Tec, 05-13-08 Tool Vendor Perspectives SysML Thus Fr Hns-Peter Hoffmnn, Ph.D Chief Systems Methodologist Telelogic, Systems & Softwre Modeling Business Unit Peter.Hoffmnn@telelogic.com

More information

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1.

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1. Answer on Question #5692, Physics, Optics Stte slient fetures of single slit Frunhofer diffrction pttern. The slit is verticl nd illuminted by point source. Also, obtin n expression for intensity distribution

More information

a < a+ x < a+2 x < < a+n x = b, n A i n f(x i ) x. i=1 i=1

a < a+ x < a+2 x < < a+n x = b, n A i n f(x i ) x. i=1 i=1 Mth 33 Volume Stewrt 5.2 Geometry of integrls. In this section, we will lern how to compute volumes using integrls defined by slice nlysis. First, we recll from Clculus I how to compute res. Given the

More information

II. THE ALGORITHM. A. Depth Map Processing

II. THE ALGORITHM. A. Depth Map Processing Lerning Plnr Geometric Scene Context Using Stereo Vision Pul G. Bumstrck, Bryn D. Brudevold, nd Pul D. Reynolds {pbumstrck,brynb,pulr2}@stnford.edu CS229 Finl Project Report December 15, 2006 Abstrct A

More information

Functor (1A) Young Won Lim 10/5/17

Functor (1A) Young Won Lim 10/5/17 Copyright (c) 2016-2017 Young W. Lim. Permission is grnted to copy, distribute nd/or modify this document under the terms of the GNU Free Documenttion License, Version 1.2 or ny lter version published

More information

COMPUTER EDUCATION TECHNIQUES, INC. (MS_W2K3_SERVER ) SA:

COMPUTER EDUCATION TECHNIQUES, INC. (MS_W2K3_SERVER ) SA: In order to lern which questions hve een nswered correctly: 1. Print these pges. 2. Answer the questions. 3. Send this ssessment with the nswers vi:. FAX to (212) 967-3498. Or. Mil the nswers to the following

More information

Demand-Driven Context-Sensitive Alias Analysis for Java

Demand-Driven Context-Sensitive Alias Analysis for Java Demnd-Driven Context-Sensitive Alis Anlysis or Jv Dcong (Tony) Yn Guoqing (Hrry) Xu Atns Rountev Ohio Stte University PRESTO: Progrm Anlyses nd Sotwre Tools Reserch Group, Ohio Stte University Alis Anlysis

More information

Epson Projector Content Manager Operation Guide

Epson Projector Content Manager Operation Guide Epson Projector Content Mnger Opertion Guide Contents 2 Introduction to the Epson Projector Content Mnger Softwre 3 Epson Projector Content Mnger Fetures... 4 Setting Up the Softwre for the First Time

More information

What are suffix trees?

What are suffix trees? Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl

More information

CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona

CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona CSc 453 Compilers nd Systems Softwre 4 : Lexicl Anlysis II Deprtment of Computer Science University of Arizon collerg@gmil.com Copyright c 2009 Christin Collerg Implementing Automt NFAs nd DFAs cn e hrd-coded

More information

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search Uninformed Serch [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.] Tody Serch Problems Uninformed Serch Methods

More information

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search.

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search. CS 88: Artificil Intelligence Fll 00 Lecture : A* Serch 9//00 A* Serch rph Serch Tody Heuristic Design Dn Klein UC Berkeley Multiple slides from Sturt Russell or Andrew Moore Recp: Serch Exmple: Pncke

More information

SYSTEMA / THERMICA version 4 Overview of the new capabilities

SYSTEMA / THERMICA version 4 Overview of the new capabilities SYSTEMA / THERMICA version 4 Overview of the new cpbilities Prepred by Mrc Jcquiu, SAS 16 th Europen Workshop on Therml nd ECLS Softwre, 22-23 October 2002 SYSTEMA / THERMICA current sttus (1/3) SYSTEMA

More information

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers Mth Modeling Lecture 4: Lgrnge Multipliers Pge 4452 Mthemticl Modeling Lecture 4: Lgrnge Multipliers Lgrnge multipliers re high powered mthemticl technique to find the mximum nd minimum of multidimensionl

More information

From Dependencies to Evaluation Strategies

From Dependencies to Evaluation Strategies From Dependencies to Evlution Strtegies Possile strtegies: 1 let the user define the evlution order 2 utomtic strtegy sed on the dependencies: use locl dependencies to determine which ttriutes to compute

More information

Encoding techniques for evading n-gram based Intrusion Detection Systems

Encoding techniques for evading n-gram based Intrusion Detection Systems Encoding techniques for evding n-grm bsed Intrusion Detection Systems Studienrbeit Moritz Bechler moritz.bechler@student.uni-tuebingen.de Universität Tübingen Wilhelm Schickrd Institut SPRING 7 5.7.2012

More information

AI Adjacent Fields. This slide deck courtesy of Dan Klein at UC Berkeley

AI Adjacent Fields. This slide deck courtesy of Dan Klein at UC Berkeley AI Adjcent Fields Philosophy: Logic, methods of resoning Mind s physicl system Foundtions of lerning, lnguge, rtionlity Mthemtics Forml representtion nd proof Algorithms, computtion, (un)decidility, (in)trctility

More information

Outline. Two combinatorial optimization problems in machine learning. Talk objectives. Grammar induction. DFA induction.

Outline. Two combinatorial optimization problems in machine learning. Talk objectives. Grammar induction. DFA induction. Outline Two comintoril optimiztion prolems in mchine lerning Pierre.Dupont@uclouvin.e 1 Feture selection ICTEAM Institute Université ctholique de Louvin Belgium My 1, 011 P. Dupont (UCL Mchine Lerning

More information

2 Computing all Intersections of a Set of Segments Line Segment Intersection

2 Computing all Intersections of a Set of Segments Line Segment Intersection 15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design

More information

Representation of Numbers. Number Representation. Representation of Numbers. 32-bit Unsigned Integers 3/24/2014. Fixed point Integer Representation

Representation of Numbers. Number Representation. Representation of Numbers. 32-bit Unsigned Integers 3/24/2014. Fixed point Integer Representation Representtion of Numbers Number Representtion Computer represent ll numbers, other thn integers nd some frctions with imprecision. Numbers re stored in some pproximtion which cn be represented by fixed

More information

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,

More information

Stained Glass Design. Teaching Goals:

Stained Glass Design. Teaching Goals: Stined Glss Design Time required 45-90 minutes Teching Gols: 1. Students pply grphic methods to design vrious shpes on the plne.. Students pply geometric trnsformtions of grphs of functions in order to

More information

CSCI 446: Artificial Intelligence

CSCI 446: Artificial Intelligence CSCI 446: Artificil Intelligence Serch Instructor: Michele Vn Dyne [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.]

More information

Looking up objects in Pastry

Looking up objects in Pastry Review: Pstry routing tbles 0 1 2 3 4 7 8 9 b c d e f 0 1 2 3 4 7 8 9 b c d e f 0 1 2 3 4 7 8 9 b c d e f 0 2 3 4 7 8 9 b c d e f Row0 Row 1 Row 2 Row 3 Routing tble of node with ID i =1fc s - For ech

More information

Parallel Square and Cube Computations

Parallel Square and Cube Computations Prllel Squre nd Cube Computtions Albert A. Liddicot nd Michel J. Flynn Computer Systems Lbortory, Deprtment of Electricl Engineering Stnford University Gtes Building 5 Serr Mll, Stnford, CA 945, USA liddicot@stnford.edu

More information

Vulnerability Analysis of Electric Power Communication Network. Yucong Wu

Vulnerability Analysis of Electric Power Communication Network. Yucong Wu 2nd Interntionl Conference on Advnces in Mechnicl Engineering nd Industril Informtics (AMEII 2016 Vulnerbility Anlysis of Electric Power Communiction Network Yucong Wu Deprtment of Telecommunictions Engineering,

More information

Lexical Analysis: Constructing a Scanner from Regular Expressions

Lexical Analysis: Constructing a Scanner from Regular Expressions Lexicl Anlysis: Constructing Scnner from Regulr Expressions Gol Show how to construct FA to recognize ny RE This Lecture Convert RE to n nondeterministic finite utomton (NFA) Use Thompson s construction

More information

Implementing Automata. CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona

Implementing Automata. CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona Implementing utomt Sc 5 ompilers nd Systems Softwre : Lexicl nlysis II Deprtment of omputer Science University of rizon collerg@gmil.com opyright c 009 hristin ollerg NFs nd DFs cn e hrd-coded using this

More information

The Search for Optimality in Automated Intrusion Response

The Search for Optimality in Automated Intrusion Response The Serch for Optimlity in Automted Intrusion Response Yu-Sung Wu nd Surbh Bgchi (DCSL) & The Center for Eduction nd Reserch in Informtion Assurnce nd Security (CERIAS) School of Electricl nd Computer

More information

SAPPER: Subgraph Indexing and Approximate Matching in Large Graphs

SAPPER: Subgraph Indexing and Approximate Matching in Large Graphs SAPPER: Sugrph Indexing nd Approximte Mtching in Lrge Grphs Shijie Zhng, Jiong Yng, Wei Jin EECS Dept., Cse Western Reserve University, {shijie.zhng, jiong.yng, wei.jin}@cse.edu ABSTRACT With the emergence

More information

Step-Voltage Regulator Model Test System

Step-Voltage Regulator Model Test System IEEE PES GENERAL MEETING, JULY 5 Step-Voltge Regultor Model Test System Md Rejwnur Rshid Mojumdr, Pblo Arboley, Senior Member, IEEE nd Cristin González-Morán, Member, IEEE Abstrct In this pper, 4-node

More information

Compression Outline :Algorithms in the Real World. Lempel-Ziv Algorithms. LZ77: Sliding Window Lempel-Ziv

Compression Outline :Algorithms in the Real World. Lempel-Ziv Algorithms. LZ77: Sliding Window Lempel-Ziv Compression Outline 15-853:Algorithms in the Rel World Dt Compression III Introduction: Lossy vs. Lossless, Benchmrks, Informtion Theory: Entropy, etc. Proility Coding: Huffmn + Arithmetic Coding Applictions

More information

ECEN 468 Advanced Logic Design Lecture 36: RTL Optimization

ECEN 468 Advanced Logic Design Lecture 36: RTL Optimization ECEN 468 Advnced Logic Design Lecture 36: RTL Optimiztion ECEN 468 Lecture 36 RTL Design Optimiztions nd Trdeoffs 6.5 While creting dtpth during RTL design, there re severl optimiztions nd trdeoffs, involving

More information

Theory of Computation CSE 105

Theory of Computation CSE 105 $ $ $ Theory of Computtion CSE 105 Regulr Lnguges Study Guide nd Homework I Homework I: Solutions to the following problems should be turned in clss on July 1, 1999. Instructions: Write your nswers clerly

More information

Knowledge States: A Tool in Randomized Online Algorithms

Knowledge States: A Tool in Randomized Online Algorithms : A Tool in Rndomized Online Algorithms Center for the Advnced Study of Algorithms School of Computer Science University of Nevd, Ls Vegs ADS 2007 couthors: Lwrence L. Lrmore, John Nog, Rüdiger Reischuk

More information

USING HOUGH TRANSFORM IN LINE EXTRACTION

USING HOUGH TRANSFORM IN LINE EXTRACTION Stylinidis, Efstrtios USING HOUGH TRANSFORM IN LINE EXTRACTION Efstrtios STYLIANIDIS, Petros PATIAS The Aristotle University of Thessloniki, Deprtment of Cdstre Photogrmmetry nd Crtogrphy Univ. Box 473,

More information

COMMON HALF YEARLY EXAMINATION DECEMBER 2018

COMMON HALF YEARLY EXAMINATION DECEMBER 2018 li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net.pds.pds COMMON HALF YEARLY EXAMINATION DECEMBER 2018 STD : XI SUBJECT: COMPUTER SCIENCE

More information

Dr. D.M. Akbar Hussain

Dr. D.M. Akbar Hussain Dr. D.M. Akr Hussin Lexicl Anlysis. Bsic Ide: Red the source code nd generte tokens, it is similr wht humns will do to red in; just tking on the input nd reking it down in pieces. Ech token is sequence

More information

DYNAMIC DISCRETIZATION: A COMBINATION APPROACH

DYNAMIC DISCRETIZATION: A COMBINATION APPROACH DYNAMIC DISCRETIZATION: A COMBINATION APPROACH FAN MIN, QIHE LIU, HONGBIN CAI, AND ZHONGJIAN BAI School of Computer Science nd Engineering, University of Electronic Science nd Technology of Chin, Chengdu

More information

Topic 2: Lexing and Flexing

Topic 2: Lexing and Flexing Topic 2: Lexing nd Flexing COS 320 Compiling Techniques Princeton University Spring 2016 Lennrt Beringer 1 2 The Compiler Lexicl Anlysis Gol: rek strem of ASCII chrcters (source/input) into sequence of

More information

TCP/ICN: Carrying TCP over Content Centric and Named Data Networks

TCP/ICN: Carrying TCP over Content Centric and Named Data Networks TCP/ICN: Crrying TCP over Content Centric nd Nmed Dt Networks Ily Moiseenko Cisco Systems Dve Orn Cisco Systems Outline I. Introduction II. Design Bsic fetching proxy Relible prefetching proxy Unrelible

More information

Tree Structured Symmetrical Systems of Linear Equations and their Graphical Solution

Tree Structured Symmetrical Systems of Linear Equations and their Graphical Solution Proceedings of the World Congress on Engineering nd Computer Science 4 Vol I WCECS 4, -4 October, 4, Sn Frncisco, USA Tree Structured Symmetricl Systems of Liner Equtions nd their Grphicl Solution Jime

More information

A Fast Imaging Algorithm for Near Field SAR

A Fast Imaging Algorithm for Near Field SAR Journl of Computing nd Electronic Informtion Mngement ISSN: 2413-1660 A Fst Imging Algorithm for Ner Field SAR Guoping Chen, Lin Zhng, * College of Optoelectronic Engineering, Chongqing University of Posts

More information

The Distributed Data Access Schemes in Lambda Grid Networks

The Distributed Data Access Schemes in Lambda Grid Networks The Distributed Dt Access Schemes in Lmbd Grid Networks Ryot Usui, Hiroyuki Miygi, Yutk Arkw, Storu Okmoto, nd Noki Ymnk Grdute School of Science for Open nd Environmentl Systems, Keio University, Jpn

More information

COMPUTER SCIENCE 123. Foundations of Computer Science. 6. Tuples

COMPUTER SCIENCE 123. Foundations of Computer Science. 6. Tuples COMPUTER SCIENCE 123 Foundtions of Computer Science 6. Tuples Summry: This lecture introduces tuples in Hskell. Reference: Thompson Sections 5.1 2 R.L. While, 2000 3 Tuples Most dt comes with structure

More information

Frequent Closed Itemset Mining Using Prefix Graphs

Frequent Closed Itemset Mining Using Prefix Graphs Frequent Closed Itemset Mining Using Prefix Grphs H. D. K. Moonesinghe, Smh Fodeh, Png-Ning Tn Deprtment of Computer Science & Engineering Michign Stte University Est Lnsing, MI 48824 (moonesin, fodehsm,

More information

CS481: Bioinformatics Algorithms

CS481: Bioinformatics Algorithms CS481: Bioinformtics Algorithms Cn Alkn EA509 clkn@cs.ilkent.edu.tr http://www.cs.ilkent.edu.tr/~clkn/teching/cs481/ EXACT STRING MATCHING Fingerprint ide Assume: We cn compute fingerprint f(p) of P in

More information

Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network

Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 Revisiting the notion of Origin-Destintion Trffic Mtrix of the Hosts tht re ttched to Switched Locl Are Network Mondy

More information

Data Flow on a Queue Machine. Bruno R. Preiss. Copyright (c) 1987 by Bruno R. Preiss, P.Eng. All rights reserved.

Data Flow on a Queue Machine. Bruno R. Preiss. Copyright (c) 1987 by Bruno R. Preiss, P.Eng. All rights reserved. Dt Flow on Queue Mchine Bruno R. Preiss 2 Outline Genesis of dt-flow rchitectures Sttic vs. dynmic dt-flow rchitectures Pseudo-sttic dt-flow execution model Some dt-flow mchines Simple queue mchine Prioritized

More information

Topic: Software Model Checking via Counter-Example Guided Abstraction Refinement. Having a BLAST with SLAM. Combining Strengths. SLAM Overview SLAM

Topic: Software Model Checking via Counter-Example Guided Abstraction Refinement. Having a BLAST with SLAM. Combining Strengths. SLAM Overview SLAM Hving BLAST with SLAM Topic: Softwre Model Checking vi Counter-Exmple Guided Abstrction Refinement There re esily two dozen SLAM/BLAST/MAGIC ppers; I will skim. # # Theorem Proving Combining Strengths

More information

OUTPUT DELIVERY SYSTEM

OUTPUT DELIVERY SYSTEM Differences in ODS formtting for HTML with Proc Print nd Proc Report Lur L. M. Thornton, USDA-ARS, Animl Improvement Progrms Lortory, Beltsville, MD ABSTRACT While Proc Print is terrific tool for dt checking

More information

An introduction to model checking

An introduction to model checking An introduction to model checking Slide 1 University of Albert Edmonton July 3rd, 2002 Guy Trembly Dépt d informtique UQAM Outline Wht re forml specifiction nd verifiction methods? Slide 2 Wht is model

More information

Qubit allocation for quantum circuit compilers

Qubit allocation for quantum circuit compilers Quit lloction for quntum circuit compilers Nov. 10, 2017 JIQ 2017 Mrcos Yukio Sirichi Sylvin Collnge Vinícius Fernndes dos Sntos Fernndo Mgno Quintão Pereir Compilers for quntum computing The first genertion

More information

A Scalable and Reliable Mobile Agent Computation Model

A Scalable and Reliable Mobile Agent Computation Model A Sclble nd Relible Mobile Agent Computtion Model Yong Liu, Congfu Xu, Zhohui Wu, nd Yunhe Pn College of Computer Science, Zhejing University Hngzhou 310027, Chin cckffe@yhoo.com.cn Abstrct. This pper

More information

International Conference on Mechanics, Materials and Structural Engineering (ICMMSE 2016)

International Conference on Mechanics, Materials and Structural Engineering (ICMMSE 2016) \ Interntionl Conference on Mechnics, Mterils nd tructurl Engineering (ICMME 2016) Reserch on the Method to Clibrte tructure Prmeters of Line tructured Light Vision ensor Mingng Niu1,, Kngnin Zho1, b,

More information

Computing offsets of freeform curves using quadratic trigonometric splines

Computing offsets of freeform curves using quadratic trigonometric splines Computing offsets of freeform curves using qudrtic trigonometric splines JIULONG GU, JAE-DEUK YUN, YOONG-HO JUNG*, TAE-GYEONG KIM,JEONG-WOON LEE, BONG-JUN KIM School of Mechnicl Engineering Pusn Ntionl

More information

COMP 423 lecture 11 Jan. 28, 2008

COMP 423 lecture 11 Jan. 28, 2008 COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring

More information

2-3 search trees red-black BSTs B-trees

2-3 search trees red-black BSTs B-trees 2-3 serch trees red-lck BTs B-trees 3 2-3 tree llow 1 or 2 keys per node. 2-node: one key, two children. 3-node: two keys, three children. ymmetric order. Inorder trversl yields keys in scending order.

More information

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016 Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence Winter 2016 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl

More information

CPSC 213. Polymorphism. Introduction to Computer Systems. Readings for Next Two Lectures. Back to Procedure Calls

CPSC 213. Polymorphism. Introduction to Computer Systems. Readings for Next Two Lectures. Back to Procedure Calls Redings for Next Two Lectures Text CPSC 213 Switch Sttements, Understnding Pointers - 2nd ed: 3.6.7, 3.10-1st ed: 3.6.6, 3.11 Introduction to Computer Systems Unit 1f Dynmic Control Flow Polymorphism nd

More information

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases Overview Mobile computing nd dtbses Generl issues in mobile dt mngement Dt dissemintion Dt consistency Loction dependent queries Interfces Detils of brodcst disks thlis klfigopoulos Network rchitecture

More information

Lecture 5: Spatial Analysis Algorithms

Lecture 5: Spatial Analysis Algorithms Lecture 5: Sptil Algorithms GEOG 49: Advnced GIS Sptil Anlsis Algorithms Bsis of much of GIS nlsis tod Mnipultion of mp coordintes Bsed on Eucliden coordinte geometr http://stronom.swin.edu.u/~pbourke/geometr/

More information

Spatial Cohesion Queries

Spatial Cohesion Queries Sptil Cohesion Queries Dimitris Schridis Technische Universität Wien Vienn, Austri dimitris@ec.tuwien.c.t Antonios Deliginnkis Technicl University of Crete Chni, Greece deli@softnet.tuc.gr ABSTRACT Given

More information

Spotting Separator Points at Line Terminals in Compressed Document Images for Text-line Segmentation

Spotting Separator Points at Line Terminals in Compressed Document Images for Text-line Segmentation Spotting Seprtor Points t Line Terminls in Compressed Document Imges for Text-line Segmenttion Amrnth R. Deprtment of Studies in Computer Science, University of Mysore, Indi. ABSTRACT Line seprtors re

More information

CS 268: IP Multicast Routing

CS 268: IP Multicast Routing Motivtion CS 268: IP Multicst Routing Ion Stoic April 5, 2004 Mny pplictions requires one-to-mny communiction - E.g., video/udio conferencing, news dissemintion, file updtes, etc. Using unicst to replicte

More information

SkyDiver: A Framework for Skyline Diversification

SkyDiver: A Framework for Skyline Diversification SkyDiver: A Frmework for Skyline Diversifiction George Vlkns Dept. of Informtics nd Telecommunictions University of Athens Athens, Greece gvlk@di.uo.gr Apostolos N. Ppdopoulos Dept. of Informtics Aristotle

More information