Mining effective design solutions based on a model-driven approach

Size: px
Start display at page:

Download "Mining effective design solutions based on a model-driven approach"

Transcription

1 ata Mining VI 463 Mining effetive design solutions based on a model-driven approah T. Katsimpa 2, S. Sirmakessis 1,. Tsakalidis 1,2 & G. Tzimas 1,2 1 Researh ademi omputer Tehnology Institute, Hellas 2 omputer Engineering & Informatis epartment, University of Patras, Hellas bstrat The World Wide Web evolution has posed new hallenges for Web appliation developers. Today s Web appliations present their ontent in a dynami manner, allow users to interat with them at a high level of sophistiation, and manage huge amounts of data, leading to a high degree of omplexity. To ope with this emerging problem, a variety of modeling methodologies, web design patterns and tehniques have been introdued. In this work we propose a methodology for mining and evaluating reurrent design solutions in the oneptual shema of Web appliations modeled using WebML, a modeling language for designing data-intensive appliations. Identifying effetive design solutions may lead to an effiient deployment of reuse. By means of our approah, an extension of the predefined set of patterns supported by WebML an be realized. What is more, when applying the methodology in a large number of appliations of the same domain, templates for Web appliation frameworks an be identified. Keywords: reuse, web modelling, web design patterns, model mining. 1 Introdution Nowadays, the design, development and maintenane of Web appliations have beome some of the most hallenging problems that web arhitets have to fae. Modern Web appliations are ompletely different in omparison to the traditional Web sites whih provide only stati ontent. They are required to manage huge amounts of data, exeute various omplex funtions and deliver their ontent in a variety of forms, aording to the user profile or role and aording to the media with whih the user aesses the appliation. WIT Transations on Information and ommuniation Tehnologies, Vol 35, 2005 WIT Press ISSN (on-line)

2 464 ata Mining VI In order to provide means for the effetive design and deployment of Web appliations, several methodologies and tehniques have been proposed by the researh ommunity. These methodologies, Retshitzegger and Shwinger [1], elevate the level of abstration in the design proess, provide tehnology independent design solutions and are based on the idea of separation of onerns. They inorporate different models for data management, navigation struture and presentation of pages to the end-users. HM was the first methodology to introdue the model-driven approah in the area of hypermedia design and was followed by RMM. Later, based on the HM a number of modelling methodologies were introdued mainly fousing on Web ppliation design, suh as HM-Lite, Strudel and OOHM. raneus is a proposal for web design and reverse engineering. Extensions of the UML language so as to make it suitable to model Web appliations have been proposed by onallen. Finally, a new modelling language was introdued, the Web modelling language WebML, whih is destined to speify omplex Web appliations at the oneptual level and along several dimensions. The methodologies noted above provide a onrete framework for Web appliation design, elevating the effiieny in the design proess and providing a firm basis for re-engineering and maintenane of web appliations. Utilizing previous experiene an also boost the final appliation s quality. To this end, the notion of design patterns was first introdued in the field of ivil engineering, lexander et al. [2] and now has expanded to a diversity of domains, inluding software engineering and in partiular Web engineering. esign patterns represent design knowledge ulled from the solutions given by experiened designers that have enountered these same problems before, possibly with slight variations Shwabe et al. [3]. By using patterns, the web arhitet onstruts appliations starting from ustomizable omponents, rather than from srath, and enfores a oherent design style over large and ompliated appliations, augmenting hypertext regularity and usability. Taking the use of design patterns one step further, the notion of Web appliation frameworks for speifi domains was introdued [3,4]. lthough the use of web design patterns is valuable when building a web appliation, omplex Web appliations need to maximize reusing larger design strutures (the whole navigation topology or struture plus assoiated funtionality). These design strutures may arise at the appliation (oneptual level) or during navigational design. esigners should find ways to express these ommonalities by using generi designs suh that only aspets unique to a partiular site should be designed or programmed. Web appliation frameworks apture the design deisions that are ommon to a ategory of Web sites and provide reusable design for that ategory eri et al. [4]. From the above, the need and importane to identify reusable design solutions is rather obvious. The ontribution of this paper is the provision of a mehanism, whih mines and evaluates reusable design solutions at the oneptual shema of a Web appliation built using WebML. Moreover, applying the proposed mehanism in a number of Web appliations of the same domain, Web appliation frameworks an be identified. In this work, WebML has been utilized WIT Transations on Information and ommuniation Tehnologies, Vol 35, 2005 WIT Press ISSN (on-line)

3 ata Mining VI 465 as design platform for the methods proposed, mainly due to its robustness and the fat that it is supported by an effiient ase tool alled WebRatio [5]. Most of the work presented here an be generalized and applied to appliations utilizing other modeling languages with slight straightforward modifiations. The remainder of this paper is organized as follows: Setion 2 presents some bakground onepts referring to the WebML method. Setion 3 provides a motivating example, while setion 4 desribes our methodology to mine reusable design solutions at the oneptual shema of Web appliations. Setion 5 illustrates a quality evaluation mehanism for the solutions retrieved by means of onsisteny. Finally, setion 6 draws our onlusions. 2 WebML at a glane Before proeeding to the rest of the paper, it is important to provide a quik overview of the WebML ore onepts. WebML is a notation for speifying omplex Web sites and appliations at the oneptual level eri et al. [6]. WebML onsists of the ata Model and the Hypertext Model. The data model utilizes the well known E/R model, in order to organize the ontent of the appliation. The hypertext model desribes how data obets are assembled into information units and elements and the way these elements are onneted by links to form hypertexts. ifferent hypertexts, alled site views, that support different user profiles, an be reated among the same data model. Site views are graphs of pages, whih are the atual ontainers of information and are built of ontent units. Units represent atomi piees of information to be published; a unit seletor speifies a prediate identifying the data to be extrated from the underlying database and displayed by the unit. Pages and units an be linked in a variety of onfigurations by means of links to form a hypertext. Besides representing user navigation, links between units also speify the transfer of ertain information (alled ontext) that the destination unit uses for seleting the data instanes to be displayed. Finally, the exeution of arbitrary business ations is modeled by means of operation units. n operation unit an be linked to other operations or ontent units. WebML inorporates some predefined operations for reating, modifying and deleting the instanes of entities and relationships, and allows developers to extend this set with their own operations. Table 1: Some basi WebML units. ata unit Multidata unit Index unit HierarhialIndex Entry unit Entity [Seletor] It displays a set of attributes for a single entity instane. Entity [Seletor] It displays a set of instanes for a given entity. Entity [Seletor] It displays a list of properties, of a given set of entity instanes. Entity1 [Seletor1] NEST Entity2 [Seletor2] It displays index entries organized in a multi-level tree. It represents forms for olleting input data into fields. WIT Transations on Information and ommuniation Tehnologies, Vol 35, 2005 WIT Press ISSN (on-line)

4 466 ata Mining VI WebML aknowledging the importane of design patterns has defined a primitive set of design patterns, offering proved solutions to problems ourring in real-life appliations. ording to the role information obets play in the appliation, four lasses of obets have been identified (ore and interonnetion onepts, aess failitators, personalization obets), that an be organized in a variety of ways to onstrut sub-shemas eri et al. [7]. The organization of ontent in web pages an also be simplified by making use of design patterns. Reurrent navigation hains of unit ompositions for ontent publishing (asaded index, indexed guided tour, obet viewpoint et.), as well as patterns for ontent management operations (obet reation-deletionmodifiation, asaded delete et.) have been identified eri et al.[6]. pattern in WebML, typially onsists of a ore speifiation, representing the invariant WebML unit omposition that haraterizes the pattern, and a number of pattern variants, whih extend the ore speifiation with all the valid modalities in whih the pattern an start (starting variants) or terminate (termination variants). Starting and termination variants respetively desribe whih units an be used for passing the ontext to the ore pattern and how the ontext generated by the ore pattern is passed to suessive ompositions in the hypertext Fraternali et al. [8]. WebML, furthermore, separating the various appliations aording to their information-delivery mission, has identified skeletons and WebML appliation frameworks eri et al. [4] that an be applied and used to Web appliations, depending on their funtionalities. 3 Motivating example In this setion we provide an instane of a WebML sheme modelling an e- learning senario that will serve as a running example throughout this paper. We assume that every lesson omprises of a number of letures, eah of whih ontains one more exerises. Eah lesson is supported by a forum, whih omprises of topis ontaining messages. The teahers and students are the basi groups of users that an aess this appliation, eah of whih has different permissions. The first part of figure 1 depits part of a teaher s site view. Suppose that the teaher wants to alter the ontents of an exerise. global parameter is used to hold the obet identifier, OI, of the teaher urrently logged into the Web appliation. Initially, the teaher views a hierarhial index of the lessons he teahes per ategory. The Lesson page ontains the Lesson data unit providing information about the lesson seleted and the LeturesIndex shows a list of the lesson s letures. Finally, the teaher, by seleting one of the letures, an aess the Exerises multidata unit, that displays all exerises related to this speifi leture. hoosing the desired exerise, he may modify its ontents. The seond part of the same figure depits part of a student s site view. Suppose that the student wants to view the messages of a lesson s forum. global parameter is used to hold the OI of the student urrently logged into the appliation. hierarhial index ontains a two-level hierarhy of lessons per ategory that the student attends. Seleting a lesson, he an view information related to it ( Lesson data unit). In the same page, the ForumsIndex displays WIT Transations on Information and ommuniation Tehnologies, Vol 35, 2005 WIT Press ISSN (on-line)

5 ata Mining VI 467 all the topis onerning the hosen lesson, whereas the Topi data unit displays information about a speifi topi. Finally, the Messages multidata unit shows the messages that belong to the seleted topi. The student an selet a message in order to view it in detail. Teaher s SV Student s SV Lesson Lesson Get Teaher Lesson LeturesIndex Get Student Lesson ForumsIndex userid ategory Nest Letures userid ategory Nest Topis Exerise ata Entry Exerise Letures Exerises Leture Message Message Topis Messages Topi Exerises KO Modify OK Exerises Letures Messages Messages Topis Exerises Figure 1: Teaher s and student s site views. 4 Methodologial approah In the sequel, we present in detail a methodology for mining reurrent design solutions in the WebML oneptual shemas of appliations. Our obetive is to apture ompositions of hypertext elements (pages, units, operations, links) serving several appliation purposes. These onfigurations are aptured in the proess of (or after) modelling a Web appliation, and an serve as effetive design solutions enabling reuse, onsisteny and quality improvement in the development and maintenane proess. 4.1 Initialisation In this phase we preproess the appliation s hypertext model, in order to form the basis for the model mining mehanism needed in the phases to follow. More preisely, onsidering an appliation having a number of site views we onvert every site view into a direted graph based on the notation desribed below, thus onstruting a set of graphs representing the navigation, ontent presentation and manipulation mehanisms of the appliation. We define a site view as a direted graph, G(V, E, f V, f E ), omprising of a set of nodes V, a set of edges E, a node-labeling funtion f V : V Σ V, and an edgelabeling funtion f E : E Σ E. f V assigns letters drawn from an alphabet Σ V to the site view nodes, whereas f E has the same role for links and the edge alphabet Σ E. Σ V has a different letter for eah different WebML element (ontent units, operations, pages et). orrespondingly, Σ E omprises of all the different kinds of links (ontextual, non ontextual et.). Besides the predefined WebML links, we introdue a speial kind of edge (labeled in the graph) in order to represent the ontainment of units or sub-pages in pages, as well as pages, sub- WIT Transations on Information and ommuniation Tehnologies, Vol 35, 2005 WIT Press ISSN (on-line)

6 468 ata Mining VI areas and units in areas (note that arbitrary ontainment sequenes an exist ). transformation example of the two site views desribed in setion 3 is depited in fig. 2. S S P P P P E P P P P N N G H I M G H I M Figure 2: Graph transformation of the two site views. 4.2 Extration of predefined patterns and uniformity We traverse iteratively eah graph onstruted in the previous phase in order to loate predefined ontent publishing and management WebML patterns taking into aount their variants. Every pattern found is stored in a pattern ourrenes repository, along with its starting and termination variants. The ourrene frequeny of eah pattern is also stored. The retrieval of a predefined pattern an be ahieved using graph mathing tools suh as GraphGrep [9], whih given a olletion of graphs and a sub-graph (in our ase, graphs representing the predefined patterns), returns all the ourrenes of the pattern in eah graph. Next, taking into aount the various WebML predefined variants we have loated, we substitute, where possible (this step requires the designer s intervention), the variants found within eah graph with the default pattern variant. The default pattern variant is the one having the maximum ourrene frequeny. Upon ompletion of this step, a more uniform definition of eah site view is aomplished, and new graphs representing the hypertext shema are generated. 4.3 esign solutions extration We traverse eah newly generated graph so as to identify idential subgraphs - andidate design solutions. lthough the problem is NP-omplete Garey and Johnson [10], this an be ahieved by utilizing several heuristi algorithms (e.g. losegraph Yan and Han [11]). These algorithms demand as input the dataset of graphs to be searhed and the desired support (the minimum perentage of ourrenes in the entire database) of the subgraphs to be retrieved. The extrated subgraphs should not represent predefined WebML patterns, but may ontain one or more of them. We store the mined subgraphs in the pattern ourrenes repository, along with their variants. For instane, omparing the graphs that orrespond to our example, an idential subgraph is easily identified. The entire student s graph onstitutes a subgraph of the teaher s graph and should be stored. The teaher s graph extends the identified andidate design solution with a subgraph that orresponds WIT Transations on Information and ommuniation Tehnologies, Vol 35, 2005 WIT Press ISSN (on-line)

7 ata Mining VI 469 to an obet modify pattern. Thus, a variant of the andidate design solution an be extrated from the teaher s graph, and should also be stored. fterwards, we examine the retrieved design solutions and substitute, where possible, the variants with the default onstrut variant, generating new graphs representing the hypertext shema of the appliation. The newly generated graphs are one again searhed for hypertext onfigurations that were not retrieved in the previous step. 4.4 Extending the sets of design solutions This phase aims at aquiring a larger number of andidate design solutions. First, we examine every solution stored in the repository, and in ase it ontains predefined WebML ontent management patterns, but one or more of the remaining patterns is/are missing, we add the respetive missing ones. For instane, if we loate a design onstrut, whose starting or termination variant is a reate pattern, we omplement it by adding the modify and/or delete pattern(s). In our example we retrieved a variant that ontains a modify obet pattern. Thus, more variants that ontain the obet deletion or reation pattern in plae of the obet modify pattern should be stored in the repository. The repository an be further extended with broader design solutions, if we take into aount the intermediate onstruts of units that may onnet two or more already mined design onstruts. Traversing the graphs, we searh for ouples of subgraphs (already mined design onfigurations) that are interonneted through different nodes or subgraphs. We query for interonnetion variants that are smaller than any other onfiguration involved in the larger design solution (fig. 3). Therefore, we utilize these onstruts that inlude, at most, the minimum number of units among the onfigurations involved. whole site view, in the worst ase, ould be thought of as a andidate design solution, but it will be disarded due to the evaluation metris of the following setion. esign onstrut i esign onstrut esign onstrut i esign onstrut E I S I N Intermediate Subgraph E E I S N H Intermediate Subgraph E Figure 3: Extending the set of design solutions. 4.5 Evaluation metris Up to this point, the repository may ontain a large number of andidate design solutions. This number may inrease even more, if we apply the methodology to omplex Web appliations or to a number of appliations. In order to deide whether the retrieved design onstruts an be onsidered as effetive design solutions, we have to evaluate them in terms of importane and propose a first level ranking. To this end several fators should be taken into aount. WIT Transations on Information and ommuniation Tehnologies, Vol 35, 2005 WIT Press ISSN (on-line)

8 470 ata Mining VI first ruial fator is the frequeny of appearane of a speifi design onstrut in the oneptual shema. High frequeny implies high probability of effetive use of a speifi navigational hain. We define as appearane f the frequeny of a design solution, whih omprises of: a) the overall number of appearing instanes of a design solution, f 0, b) the appearane in f a areas, ) the appearane in f σ site views, and d) the appearane in f π pages. The size of an extrated onfiguration an be also onsidered as a very important metri. It is obvious that repetition of a large design onfiguration in the hypertext model of an appliation implies a high probability for having identified the use of an important solution. Thus, we introdue population p, as the number of WebML elements involved in the onfiguration. Population depends on: a) p δ, the number of ontent units, b) p l, the number of links and ) p op, the number of operation units. ombining the frequeny and the population of a design solution, we ompute the importane V of a design solution utilizing the following formula: V = f x p (1) fo, fa, fσ, fπ, where f = + + +, f [0,4] (2) fo,max Nα Nσ Nπ f max represents the maximum value of the orresponding metri, while N is the orresponding sum of areas, site views and pages overall in a speifi WebML oneptual shema, and pδ, pl, pop, p = + +, p [0,3] (3) pδ,max pl,max pop,max nother fator that should be taken into aount is the omplexity d of a design onstrut, depending on the number of pages that host the onstrut (fragmentation φ). That is: d = 1/φ (4) Finally, we introdue the semanti value e of a design solution that represents the number of data model entities partiipating in the design solution onsidered per oneptual fator as: a) e, entities belonging to the ore subshema, b) e per, entities belonging to the personalization sub-shema and ) e a, entities belonging to the aess sub-shema. The value of e is alulated by: e, eper, ea, e = + +, e [0,3] (5) e,max eper,max ea,max ombining the above metris, the total impat I of a design solution in a WebML oneptual shema, is given by: e I = V (6) φ fter omputing the fator I for every design solution in a speifi oneptual shema, results are presented in a desending order to depit the most important and effetive design solutions on the top. The same proedure an be applied repeatedly to site views from different appliations in order to detet similar pattern implementation behaviours and group the results. WIT Transations on Information and ommuniation Tehnologies, Vol 35, 2005 WIT Press ISSN (on-line)

9 ata Mining VI 471 Having evaluated and ranked the various design onstruts; the hypertext arhitet has aess to a library of design solutions along with their variants. pplying the proposed mehanism in a number of appliations of the same domain, patterns and templates for Web appliation frameworks, supporting the appliations ommonalities and aommodating validations, an be identified. What is more, the designer s task an be further failitated; utilizing languages suh as transformers-by example Lehner and Shrefl [12] (a language whih allows defining transformers for WebML shemes by example). The identified frameworks, in ombination with transformers by example, assist the designer in performing effetive and onsistent modelling ativities in an automati manner and onstruting wizards for future web appliation development. 5 Quality evaluation The quality of the final appliation an benefit from the effiient adoption of suessful design solutions. Even when the web arhitet has effetive design solutions at his disposal, the problem that arises is that of verifying if they are applied onsistently throughout the appliation. If the design solutions are onsistently used, end-users find it easier to understand how to navigate through an appliation and how to ativate operations. Moreover, web arhitets an predit in advane how to organize an unfamiliar setion of the appliation. In Fraternali et al. [8] a methodology is introdued for the evaluation of the onsistent appliation of predefined WebML design patterns within the oneptual shema of an appliation. We utilize that methodology and extend it, in order to introdue metris depiting the onsistent appliation of the design solutions retrieved. In order to ahieve that, we introdue two metris that ompute the statistial variane of the ourrene of the N termination or starting variants of the onfigurations retrieved, normalized with respet to the best ase variane. The Start Point Metri (SPM) and the End Point Metri (EPM). The definition of SPM follows (EPM is defined analogously): SPM 2 σ σ = (7) where σ 2 is the statistial variane of the starting variants ourrenes, whih is alulated through the following formula: 1 2 B 1 N 2 2 σ = ( ) ( pi ) (8) N i= 0 N N is the number of variants addressed by the metri, while p i is the perentage of ourrenes for the i-th onfiguration variant. σ 2 B is instead the best ase variane, and is therefore alulated through eqn. (8), assuming that only one variant has been oherently used throughout the appliation. WIT Transations on Information and ommuniation Tehnologies, Vol 35, 2005 WIT Press ISSN (on-line)

10 472 ata Mining VI Table 2: SPM metri measurement sale. Metri s Range Measurement Sale Value 0 <= SPM<0.2 Insuffiient 0.2<= SPM<0.4 Weak 0.4<= SPM<0.6 isrete 0.6<= SPM<0.8 Good 0.8<= SPM<=1 Optimum The last step in the metris definition is the reation of a measurement sale, whih defines a mapping between the numerial results obtained through the alulus method with meaningful disrete values. The SPM metri adopts an ordinal nominal sale; eah nominal value in the sale expresses a onsisteny level, orresponding to a range of numerial values of the metris, as defined in table 2. The same sale overs EPM metri too. 6 onlusions In this paper, we proposed a methodology and provided metris for mining effetive design solutions at the WebML oneptual shema of an appliation. Moreover, we illustrated a quality evaluation tehnique for the solutions retrieved by means of onsisteny. This methodology when applied to a large number of WebML appliation shemas provides a mehanism for the identifiation of templates in speifi domain Web appliation frameworks and an form a valuable tool for hypertext arhitets for the identifiation of Web design patterns. We are urrently working on loating more preise metris for the seure extration of design solutions. Furthermore, applying the methodology to a large number of appliations, in order to fine-tune it, is one of our goals. Referenes [1] Retshitzegger, W. & Shwinger, W., Towards modeling of dataweb appliations - a requirements perspetive. In Pro. of MIS, vol. 1, [2] lexander,., Ishikawa, S., Silverstein, M., Jaobson, M., Fiksdahl-King, I. & ngel, S., Pattern Language, Oxford University Press, [3] Shwabe,, Esmeraldo, L., Rossi, G. & Lyardet, F., Engineering Web ppliations for Reuse. IEEE Multimedia, 8(1), pp.20-31, [4] eri S., Fraternali, P. & Matera, M., WebML ppliation Frameworks: a oneptual Tool for Enhaning esign Reuse. In Pro. of WWW10, [5] WebRatio, [6] eri, S., Fraternali, P., Bongio,., Brambilla, M., omai, S. & Matera, M., esigning ata-intensive Web ppliations, Morgan Kauffmann, WIT Transations on Information and ommuniation Tehnologies, Vol 35, 2005 WIT Press ISSN (on-line)

11 ata Mining VI 473 [7] eri, S., Fraternali, P. & Matera, M., oneptual Modelling of ata- Intensive Web ppliations. IEEE Internet omputing, 6(4), pp.20-30, [8] Fraternali, P., Matera, M. & Maurino,., WQ: an XSL Framework for nalyzing the Quality of Web ppliations. Pro. of IWWOST'02, [9] GraphGrep, [10] Garey, M.R. & Johnson,. S., omputers and intratability: guide to NP-ompleteness, Freeman, [11] Yan, X. & Han, J., losegraph: Mining losed Frequent Graph Patterns. Proeedings of the 9th M SIGK03, pp , ugust [12] Lehner, S. & Shrefl, M., efining web shema transformers by example. In Proeedings of EX 03, Springer, WIT Transations on Information and ommuniation Tehnologies, Vol 35, 2005 WIT Press ISSN (on-line)

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

Exploring the Commonality in Feature Modeling Notations

Exploring the Commonality in Feature Modeling Notations Exploring the Commonality in Feature Modeling Notations Miloslav ŠÍPKA Slovak University of Tehnology Faulty of Informatis and Information Tehnologies Ilkovičova 3, 842 16 Bratislava, Slovakia miloslav.sipka@gmail.om

More information

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm

More information

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department

More information

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425) Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method 3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr

More information

Unsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks

Unsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks Unsupervised Stereosopi Video Objet Segmentation Based on Ative Contours and Retrainable Neural Networks KLIMIS NTALIANIS, ANASTASIOS DOULAMIS, and NIKOLAOS DOULAMIS National Tehnial University of Athens

More information

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1. Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,

More information

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communiations 1 RAC 2 E: Novel Rendezvous Protool for Asynhronous Cognitive Radios in Cooperative Environments Valentina Pavlovska,

More information

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization Self-Adaptive Parent to Mean-Centri Reombination for Real-Parameter Optimization Kalyanmoy Deb and Himanshu Jain Department of Mehanial Engineering Indian Institute of Tehnology Kanpur Kanpur, PIN 86 {deb,hjain}@iitk.a.in

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University

More information

Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8

Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8 Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introdution... 1 1.1. Internet Information...2 1.2. Internet Information Retrieval...3 1.2.1. Doument Indexing...4 1.2.2. Doument Retrieval...4

More information

Partial Character Decoding for Improved Regular Expression Matching in FPGAs

Partial Character Decoding for Improved Regular Expression Matching in FPGAs Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia

More information

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer

More information

New Fuzzy Object Segmentation Algorithm for Video Sequences *

New Fuzzy Object Segmentation Algorithm for Video Sequences * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 521-537 (2008) New Fuzzy Obet Segmentation Algorithm for Video Sequenes * KUO-LIANG CHUNG, SHIH-WEI YU, HSUEH-JU YEH, YONG-HUAI HUANG AND TA-JEN YAO Department

More information

CleanUp: Improving Quadrilateral Finite Element Meshes

CleanUp: Improving Quadrilateral Finite Element Meshes CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)

More information

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr

More information

Approximate logic synthesis for error tolerant applications

Approximate logic synthesis for error tolerant applications Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu

More information

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion

More information

CA Test Data Manager 4.x Implementation Proven Professional Exam (CAT-681) Study Guide Version 1.0

CA Test Data Manager 4.x Implementation Proven Professional Exam (CAT-681) Study Guide Version 1.0 Implementation Proven Professional Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer

More information

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient

More information

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah

More information

Cluster-Based Cumulative Ensembles

Cluster-Based Cumulative Ensembles Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,

More information

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based

More information

Parametric Abstract Domains for Shape Analysis

Parametric Abstract Domains for Shape Analysis Parametri Abstrat Domains for Shape Analysis Xavier RIVAL (INRIA & Éole Normale Supérieure) Joint work with Bor-Yuh Evan CHANG (University of Maryland U University of Colorado) and George NECULA (University

More information

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering A Novel Bit Level Time Series Representation with Impliation of Similarity Searh and lustering hotirat Ratanamahatana, Eamonn Keogh, Anthony J. Bagnall 2, and Stefano Lonardi Dept. of omputer Siene & Engineering,

More information

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,

More information

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Arne Hamann, Razvan Rau, Rolf Ernst Institute of Computer and Communiation Network Engineering Tehnial University of Braunshweig,

More information

Performance Benchmarks for an Interactive Video-on-Demand System

Performance Benchmarks for an Interactive Video-on-Demand System Performane Benhmarks for an Interative Video-on-Demand System. Guo,P.G.Taylor,E.W.M.Wong,S.Chan,M.Zukerman andk.s.tang ARC Speial Researh Centre for Ultra-Broadband Information Networks (CUBIN) Department

More information

Sparse Certificates for 2-Connectivity in Directed Graphs

Sparse Certificates for 2-Connectivity in Directed Graphs Sparse Certifiates for 2-Connetivity in Direted Graphs Loukas Georgiadis Giuseppe F. Italiano Aikaterini Karanasiou Charis Papadopoulos Nikos Parotsidis Abstrat Motivated by the emergene of large-sale

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality INTERNATIONAL CONFERENCE ON MANUFACTURING AUTOMATION (ICMA200) Multi-Piee Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality Stephen Stoyan, Yong Chen* Epstein Department of

More information

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification erformane Improvement of TC on Wireless Cellular Networks by Adaptive Combined with Expliit Loss tifiation Masahiro Miyoshi, Masashi Sugano, Masayuki Murata Department of Infomatis and Mathematial Siene,

More information

This fact makes it difficult to evaluate the cost function to be minimized

This fact makes it difficult to evaluate the cost function to be minimized RSOURC LLOCTION N SSINMNT In the resoure alloation step the amount of resoures required to exeute the different types of proesses is determined. We will refer to the time interval during whih a proess

More information

Gray Codes for Reflectable Languages

Gray Codes for Reflectable Languages Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings

More information

CA Agile Requirements Designer 2.x Implementation Proven Professional Exam (CAT-720) Study Guide Version 1.0

CA Agile Requirements Designer 2.x Implementation Proven Professional Exam (CAT-720) Study Guide Version 1.0 Exam (CAT-720) Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized

More information

Exploiting Enriched Contextual Information for Mobile App Classification

Exploiting Enriched Contextual Information for Mobile App Classification Exploiting Enrihed Contextual Information for Mobile App Classifiation Hengshu Zhu 1 Huanhuan Cao 2 Enhong Chen 1 Hui Xiong 3 Jilei Tian 2 1 University of Siene and Tehnology of China 2 Nokia Researh Center

More information

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis

More information

The AMDREL Project in Retrospective

The AMDREL Project in Retrospective The AMDREL Projet in Retrospetive K. Siozios 1, G. Koutroumpezis 1, K. Tatas 1, N. Vassiliadis 2, V. Kalenteridis 2, H. Pournara 2, I. Pappas 2, D. Soudris 1, S. Nikolaidis 2, S. Siskos 2, and A. Thanailakis

More information

Constructing Transaction Serialization Order for Incremental. Data Warehouse Refresh. Ming-Ling Lo and Hui-I Hsiao. IBM T. J. Watson Research Center

Constructing Transaction Serialization Order for Incremental. Data Warehouse Refresh. Ming-Ling Lo and Hui-I Hsiao. IBM T. J. Watson Research Center Construting Transation Serialization Order for Inremental Data Warehouse Refresh Ming-Ling Lo and Hui-I Hsiao IBM T. J. Watson Researh Center July 11, 1997 Abstrat In typial pratie of data warehouse, the

More information

A Formal Hybrid Analysis Technique for Composite Web Services Verification

A Formal Hybrid Analysis Technique for Composite Web Services Verification A Formal Hybrid Analysis Tehnique for Composite Web Servies Verifiation MAY HAIDAR 1,2, HICHAM H. HALLAL 1 1 Computer Siene Department / Department of Eletrial Engineering Fahad Bin Sultan University P.O

More information

Accommodations of QoS DiffServ Over IP and MPLS Networks

Accommodations of QoS DiffServ Over IP and MPLS Networks Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering

More information

Verifying Interaction Protocol Compliance of Service Orchestrations

Verifying Interaction Protocol Compliance of Service Orchestrations Verifying Interation Protool Compliane of Servie Orhestrations Andreas Shroeder and Philip Mayer Ludwig-Maximilians-Universität Münhen, Germany {shroeda, mayer}@pst.ifi.lmu.de Abstrat. An important aspet

More information

Detection and Recognition of Non-Occluded Objects using Signature Map

Detection and Recognition of Non-Occluded Objects using Signature Map 6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,

More information

CA Service Desk Manager 14.x Implementation Proven Professional Exam (CAT-181) Study Guide Version 1.3

CA Service Desk Manager 14.x Implementation Proven Professional Exam (CAT-181) Study Guide Version 1.3 Exam (CAT-181) Study Guide Version 1.3 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized

More information

A {k, n}-secret Sharing Scheme for Color Images

A {k, n}-secret Sharing Scheme for Color Images A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University

More information

Test Case Generation from UML State Machines

Test Case Generation from UML State Machines Test Case Generation from UML State Mahines Dirk Seifert To ite this version: Dirk Seifert. Test Case Generation from UML State Mahines. [Researh Report] 2008. HAL Id: inria-00268864

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless

More information

Video Data and Sonar Data: Real World Data Fusion Example

Video Data and Sonar Data: Real World Data Fusion Example 14th International Conferene on Information Fusion Chiago, Illinois, USA, July 5-8, 2011 Video Data and Sonar Data: Real World Data Fusion Example David W. Krout Applied Physis Lab dkrout@apl.washington.edu

More information

Batch Auditing for Multiclient Data in Multicloud Storage

Batch Auditing for Multiclient Data in Multicloud Storage Advaned Siene and Tehnology Letters, pp.67-73 http://dx.doi.org/0.4257/astl.204.50. Bath Auditing for Multilient Data in Multiloud Storage Zhihua Xia, Xinhui Wang, Xingming Sun, Yafeng Zhu, Peng Ji and

More information

Graph-Based vs Depth-Based Data Representation for Multiview Images

Graph-Based vs Depth-Based Data Representation for Multiview Images Graph-Based vs Depth-Based Data Representation for Multiview Images Thomas Maugey, Antonio Ortega, Pasal Frossard Signal Proessing Laboratory (LTS), Eole Polytehnique Fédérale de Lausanne (EPFL) Email:

More information

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY Dileep P, Bhondarkor Texas Instruments Inorporated Dallas, Texas ABSTRACT Charge oupled devies (CCD's) hove been mentioned as potential fast auxiliary

More information

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections SVC-DASH-M: Salable Video Coding Dynami Adaptive Streaming Over HTTP Using Multiple Connetions Samar Ibrahim, Ahmed H. Zahran and Mahmoud H. Ismail Department of Eletronis and Eletrial Communiations, Faulty

More information

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT?

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? 3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? Bernd Girod, Peter Eisert, Marus Magnor, Ekehard Steinbah, Thomas Wiegand Te {girod eommuniations Laboratory, University of Erlangen-Nuremberg

More information

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes Deteting Outliers in High-Dimensional Datasets with Mixed Attributes A. Koufakou, M. Georgiopoulos, and G.C. Anagnostopoulos 2 Shool of EECS, University of Central Florida, Orlando, FL, USA 2 Dept. of

More information

CA Release Automation 5.x Implementation Proven Professional Exam (CAT-600) Study Guide Version 1.1

CA Release Automation 5.x Implementation Proven Professional Exam (CAT-600) Study Guide Version 1.1 Exam (CAT-600) Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized

More information

Multi-Channel Wireless Networks: Capacity and Protocols

Multi-Channel Wireless Networks: Capacity and Protocols Multi-Channel Wireless Networks: Capaity and Protools Tehnial Report April 2005 Pradeep Kyasanur Dept. of Computer Siene, and Coordinated Siene Laboratory, University of Illinois at Urbana-Champaign Email:

More information

An Efficient and Scalable Approach to CNN Queries in a Road Network

An Efficient and Scalable Approach to CNN Queries in a Road Network An Effiient and Salable Approah to CNN Queries in a Road Network Hyung-Ju Cho Chin-Wan Chung Dept. of Eletrial Engineering & Computer Siene Korea Advaned Institute of Siene and Tehnology 373- Kusong-dong,

More information

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Ho Wireless Networks Giorgio Quer, Federio Librino, Lua Canzian, Leonardo Badia, Mihele Zorzi, University of California San Diego La

More information

Manipulation of Graphs, Algebras and Pictures. Essays Dedicated to Hans-Jörg Kreowski on the Occasion of His 60th Birthday

Manipulation of Graphs, Algebras and Pictures. Essays Dedicated to Hans-Jörg Kreowski on the Occasion of His 60th Birthday Eletroni Communiations of the EASST Volume 26 (2010) Manipulation of Graphs, Algebras and Pitures Essays Dediated to Hans-Jörg Kreowski on the Oasion of His 60th Birthday Autonomous Units for Solving the

More information

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive

More information

arxiv: v1 [cs.db] 13 Sep 2017

arxiv: v1 [cs.db] 13 Sep 2017 An effiient lustering algorithm from the measure of loal Gaussian distribution Yuan-Yen Tai (Dated: May 27, 2018) In this paper, I will introdue a fast and novel lustering algorithm based on Gaussian distribution

More information

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,

More information

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu

More information

PROJECT PERIODIC REPORT

PROJECT PERIODIC REPORT FP7-ICT-2007-1 Contrat no.: 215040 www.ative-projet.eu PROJECT PERIODIC REPORT Publishable Summary Grant Agreement number: ICT-215040 Projet aronym: Projet title: Enabling the Knowledge Powered Enterprise

More information

Path Sharing and Predicate Evaluation for High-Performance XML Filtering*

Path Sharing and Predicate Evaluation for High-Performance XML Filtering* Path Sharing and Prediate Evaluation for High-Performane XML Filtering Yanlei Diao, Mihael J. Franklin, Hao Zhang, Peter Fisher EECS, University of California, Berkeley {diaoyl, franklin, nhz, fisherp}@s.erkeley.edu

More information

A scheme for racquet sports video analysis with the combination of audio-visual information

A scheme for racquet sports video analysis with the combination of audio-visual information A sheme for raquet sports video analysis with the ombination of audio-visual information Liyuan Xing a*, Qixiang Ye b, Weigang Zhang, Qingming Huang a and Hua Yu a a Graduate Shool of the Chinese Aadamy

More information

A Coarse-to-Fine Classification Scheme for Facial Expression Recognition

A Coarse-to-Fine Classification Scheme for Facial Expression Recognition A Coarse-to-Fine Classifiation Sheme for Faial Expression Reognition Xiaoyi Feng 1,, Abdenour Hadid 1 and Matti Pietikäinen 1 1 Mahine Vision Group Infoteh Oulu and Dept. of Eletrial and Information Engineering

More information

An Edge-based Clustering Algorithm to Detect Social Circles in Ego Networks

An Edge-based Clustering Algorithm to Detect Social Circles in Ego Networks JOURNAL OF COMPUTERS, VOL. 8, NO., OCTOBER 23 2575 An Edge-based Clustering Algorithm to Detet Soial Cirles in Ego Networks Yu Wang Shool of Computer Siene and Tehnology, Xidian University Xi an,77, China

More information

Zippy - A coarse-grained reconfigurable array with support for hardware virtualization

Zippy - A coarse-grained reconfigurable array with support for hardware virtualization Zippy - A oarse-grained reonfigurable array with support for hardware virtualization Christian Plessl Computer Engineering and Networks Lab ETH Zürih, Switzerland plessl@tik.ee.ethz.h Maro Platzner Department

More information

Improved Circuit-to-CNF Transformation for SAT-based ATPG

Improved Circuit-to-CNF Transformation for SAT-based ATPG Improved Ciruit-to-CNF Transformation for SAT-based ATPG Daniel Tille 1 René Krenz-Bååth 2 Juergen Shloeffel 2 Rolf Drehsler 1 1 Institute of Computer Siene, University of Bremen, 28359 Bremen, Germany

More information

Interconnection Styles

Interconnection Styles Interonnetion tyles oftware Design Following the Export (erver) tyle 2 M1 M4 M5 4 M3 M6 1 3 oftware Design Following the Export (Client) tyle e 2 e M1 M4 M5 4 M3 M6 1 e 3 oftware Design Following the Export

More information

New Channel Allocation Techniques for Power Efficient WiFi Networks

New Channel Allocation Techniques for Power Efficient WiFi Networks ew Channel Alloation Tehniques for Power Effiient WiFi etworks V. Miliotis, A. Apostolaras, T. Korakis, Z. Tao and L. Tassiulas Computer & Communiations Engineering Dept. University of Thessaly Centre

More information

Cluster Centric Fuzzy Modeling

Cluster Centric Fuzzy Modeling 10.1109/TFUZZ.014.300134, IEEE Transations on Fuzzy Systems TFS-013-0379.R1 1 Cluster Centri Fuzzy Modeling Witold Pedryz, Fellow, IEEE, and Hesam Izakian, Student Member, IEEE Abstrat In this study, we

More information

Semi-Supervised Affinity Propagation with Instance-Level Constraints

Semi-Supervised Affinity Propagation with Instance-Level Constraints Semi-Supervised Affinity Propagation with Instane-Level Constraints Inmar E. Givoni, Brendan J. Frey Probabilisti and Statistial Inferene Group University of Toronto 10 King s College Road, Toronto, Ontario,

More information

Creating Adaptive Web Sites Through Usage-Based Clustering of URLs

Creating Adaptive Web Sites Through Usage-Based Clustering of URLs Creating Adaptive Web Sites Through Usage-Based Clustering of URLs Bamshad Mobasher Dept. of Computer Siene, DePaul University, Chiago, IL mobasher@s.depaul.edu Robert Cooley, Jaideep Srivastava Dept.

More information

The SODA AOSE Methodology

The SODA AOSE Methodology The SODA AOSE Methodology Multiagent Systems LM Sistemi Multiagente LM Ambra Molesini & Andrea Omiini {ambra.molesini, andrea.omiini}@unibo.it Dipartimento di Informatia Sienza e Ingegneria (DISI) Alma

More information

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks A Dual-Hamiltonian-Path-Based Multiasting Strategy for Wormhole-Routed Star Graph Interonnetion Networks Nen-Chung Wang Department of Information and Communiation Engineering Chaoyang University of Tehnology,

More information

Chromaticity-matched Superimposition of Foreground Objects in Different Environments

Chromaticity-matched Superimposition of Foreground Objects in Different Environments FCV216, the 22nd Korea-Japan Joint Workshop on Frontiers of Computer Vision Chromatiity-mathed Superimposition of Foreground Objets in Different Environments Yohei Ogura Graduate Shool of Siene and Tehnology

More information

Parallelizing Frequent Web Access Pattern Mining with Partial Enumeration for High Speedup

Parallelizing Frequent Web Access Pattern Mining with Partial Enumeration for High Speedup Parallelizing Frequent Web Aess Pattern Mining with Partial Enumeration for High Peiyi Tang Markus P. Turkia Department of Computer Siene Department of Computer Siene University of Arkansas at Little Rok

More information

CONTROL SYSTEMS ANALYSIS & DESIGN SERVER. F. Morilla*, A. Fernández +, S. Dormido Canto*

CONTROL SYSTEMS ANALYSIS & DESIGN SERVER. F. Morilla*, A. Fernández +, S. Dormido Canto* CONTROL SYSTEMS ANALYSS & ESGN SERVER F. Morilla*, A. Fernández +, S. ormido Canto* * pto de nformátia y Automátia, UNE, Avda. Senda del Rey 9, 28040 Madrid, Spain. Phone:34-91-3987156, Fax:34-91-3986697,

More information

1. Introduction. 2. The Probable Stope Algorithm

1. Introduction. 2. The Probable Stope Algorithm 1. Introdution Optimization in underground mine design has reeived less attention than that in open pit mines. This is mostly due to the diversity o underground mining methods and omplexity o underground

More information

Deep Rule-Based Classifier with Human-level Performance and Characteristics

Deep Rule-Based Classifier with Human-level Performance and Characteristics Deep Rule-Based Classifier with Human-level Performane and Charateristis Plamen P. Angelov 1,2 and Xiaowei Gu 1* 1 Shool of Computing and Communiations, Lanaster University, Lanaster, LA1 4WA, UK 2 Tehnial

More information

A New RBFNDDA-KNN Network and Its Application to Medical Pattern Classification

A New RBFNDDA-KNN Network and Its Application to Medical Pattern Classification A New RBFNDDA-KNN Network and Its Appliation to Medial Pattern Classifiation Shing Chiang Tan 1*, Chee Peng Lim 2, Robert F. Harrison 3, R. Lee Kennedy 4 1 Faulty of Information Siene and Tehnology, Multimedia

More information

A service-oriented UML profile with formal support

A service-oriented UML profile with formal support A servie-oriented UML profile with formal support Roberto Bruni 1, Matthias Hölzl 3, Nora Koh 2,3, Alberto Lluh Lafuente 1, Philip Mayer 3, Ugo Montanari 1, and Andreas Shroeder 3 1 University of Pisa,

More information

Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis

Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis Journal of Computer Siene 4 (): 9-97, 008 ISSN 549-3636 008 Siene Publiations Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis Deepti Gaur, Aditya Shastri and Ranjit Biswas Department of Computer

More information

Numerical simulation of hemolysis: a comparison of Lagrangian and Eulerian modelling

Numerical simulation of hemolysis: a comparison of Lagrangian and Eulerian modelling Modelling in Mediine and Biology VI 361 Numerial simulation of hemolysis: a omparison of Lagrangian and Eulerian modelling S. Pirker 1, H. Shima 2 & M. Stoiber 2 1 Johannes Kepler University, 4040 Linz,

More information

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq Volume 4 Issue 6 June 014 ISSN: 77 18X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om Medial Image Compression using

More information

Alleviating DFT cost using testability driven HLS

Alleviating DFT cost using testability driven HLS Alleviating DFT ost using testability driven HLS M.L.Flottes, R.Pires, B.Rouzeyre Laboratoire d Informatique, de Robotique et de Miroéletronique de Montpellier, U.M. CNRS 5506 6 rue Ada, 34392 Montpellier

More information

Query Evaluation Overview. Query Optimization: Chap. 15. Evaluation Example. Cost Estimation. Query Blocks. Query Blocks

Query Evaluation Overview. Query Optimization: Chap. 15. Evaluation Example. Cost Estimation. Query Blocks. Query Blocks Query Evaluation Overview Query Optimization: Chap. 15 CS634 Leture 12 SQL query first translated to relational algebra (RA) Atually, some additional operators needed for SQL Tree of RA operators, with

More information

Incremental Mining of Partial Periodic Patterns in Time-series Databases

Incremental Mining of Partial Periodic Patterns in Time-series Databases CERIAS Teh Report 2000-03 Inremental Mining of Partial Periodi Patterns in Time-series Dataases Mohamed G. Elfeky Center for Eduation and Researh in Information Assurane and Seurity Purdue University,

More information

- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger.

- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger. - 1 - S 21 Diretory-based Administration of Virtual Private Networks: Poliy & Configuration Charles A Kunzinger kunzinge@us.ibm.om - 2 - Clik here Agenda to type page title What is a VPN? What is VPN Poliy?

More information

PERSISTENT NAMING FOR PARAMETRIC MODELS

PERSISTENT NAMING FOR PARAMETRIC MODELS PERSISTENT NAMING FOR PARAMETRIC MODELS Dago AGBODAN, David MARCHEIX and Guy PIERRA Laboratory of Applied Computer Siene (LISI) National Shool of Engineers in Mehanis and Aeronautis (ENSMA) Téléport 2

More information