Learning Polynomial Functions. by Feature Construction

Size: px
Start display at page:

Download "Learning Polynomial Functions. by Feature Construction"

Transcription

1 I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate 40 Sylvan R., Waltham MA suttongte.com Christopher J. Matheus GTE Laboratories Incorporate 40 Sylvan R., Waltham MA matheusgte.com Abstract We present a metho for learning higherorer polynomial functions from examples using linear regression an feature construction. Regression is use on a set of training instances to prouce a weight vector for a linear function over the feature set. If this hypothesis is imperfect, a new feature is constructe by forming the prouct of the two features that most eectively preict the square error of the current hypothesis. The algorithm is then repeate. In an extension to this metho, the specic pair of features to combine is selecte by measuring their joint ability to preict the hypothesis' error. 1 INTRODUCTION We present a metho for learning higher-orer polynomial functions from examples using linear regression an feature construction. The linear regression algorithm takes a training set an returns a hypothesis represente as the coecients for a linear function over the feature set. If this hypothesis is less than perfect when applie to the training set, a new feature is constructe by forming the prouct of the two features that most eectively preict the square error of the current hypothesis; an then the process is repeate. In an extension to this metho, the specic pair of features to combine is selecte by measuring their joint ability to preict the hypothesis' error. Preliminary experiments with this approach are promising an suggest some extensions. We begin this paper with a escription of the learning problem followe by a general explanation of our metho. We then escribe the algorithm an illustrate its use on two simple examples. We conclue with a short iscussion of anticipate extensions of this research. 2 THE PROBLEM The problem we are intereste in is learning polynomial functions from examples: Given a set of realvalue vectors fy; x1; :::x n g, learn the function y = f(x). This task represents a subset of the general problem of multivariate function approximation (see (Breiman et al., 1984; Frieman, 1988)). When f(x) is a rst-orer polynomial it can be represente as a linear function over the inepenent variables x: nx f(x) = w0 + w i x i i=0 We can erive the coecient vector w in this equation by oing a linear regression on the training instances. Equivalently, we coul inuce the coecients by training a simple linear network using the LMS rule, w i = x i ( ^f(x) y), where is the learning rate an ^f(x) is the network's estimate of f(x): 1 w0 x1 w1 ^f(x) :::: w n x n w i = x i ( ^f(x) y) Either of these methos will n the set of coecients that form the optimal linear approximation ^f(x) in terms of the minimum mean square error on the training instances. Unfortunately, linear functions are inaequate for representing higher-orer polynomials. To learn these we must either use a learning metho that searches a more complex hypothesis space (e.g., a multi-layere connectionist network) or change the set of features use as the basis for the linear function. The metho escribe in this paper implements the latter approach through a new form of feature construction.

2 I 3 THE METHOD As a simple example, consier the function y = 2x1 + 5x2x3. Clearly, y is not linear over the set of primitive features fx1; x2; x3g. If, however, we a a new feature x 0 = x2x3, then y can be represente as a linear function over this new basis: y = 2x1 + 5x 0. The problem with this sort of feature construction is knowing which new features to construct. For example, for a polynomial of orer with training instances escribe by n inepenent features an with c constructive operators, the carinality of the space of potentially useful new features is of orer c(n + 1). In our metho we control the complexity of feature construction with two major constraints. First, we use multiplication as our only constructive operator. For polynomial functions this single operator is sucient; its use for this problem omain can be viewe as a piece of omain knowlege. Secon, the multiplication operator we use is binary. This means we can combine only two features at a time, an must apply the operator iteratively to construct higher-orer features. For example, to construct the new feature x1x2x3 woul require two iterations of feature construction, e.g. x 0 = prouct(x1; x2) followe by x 00 = prouct(x 0 ; x3). Having just this single binary operator reuces the number of caniate new features at any given moment to n2 2. This number is still rather large to simply a all caniates, most of which woul be useless anyway. Instea, we selectively construct new features one at a time by rating all features iniviually an then forming the prouct of the pair of features with the highest ratings. In our metho, features are rate accoring to their ability to preict the square error of the hypothesis (cf., Sanger, 1991). The rational behin this way of rating features can be explaine by viewing the moel in terms of a single unit network. After the network is traine on a set of examples it will accurately preict y for some training instances but not for others. On the instances where its preiction is poor, the square error (the square of the ierence between the preicte an actual values) will be high. When the square error is high, the largest ajustments are mae by the learning rule, an the largest of these are mae in the coecients whose features have the largest magnitues at the time (recall w i = x i ( ^f(x) y)). If, after the network coecients have stabilize, a given feature x j still tens to be high when the error is high, this implies that this unit is relevant to the target function but by itself it is unable to accurately contribute to the preiction of the function's value. One way to measure the ability of a feature to preict the square error is to measure the correlation between the square error an the square of the feature's value: correlation i =E[e 2 x 2 i ] where E stans for the expecte value. This is the approach propose by Sanger (1991), who notes that this correlation is proportional to the variance of the coecients in the limit as they approach stability. 1 We have use this feature-rating metho successfully, but we have also ha a problem with it: if a new feature such as x 2 i is constructe, its correlation is typically very similar to that of its single parent x i, an therefore it is rate highly for inclusion in a further new features. Consequently, the system procees to construct more an more complex features in the same terms, contributing little new to the feature set. We have moie Sanger's iea to give it a competitive quality that iscourages the formation of features that o not improve the preiction of the square error. Instea of using the correlations between square error an square value we use the coecients from a regression of the square error over the square values: Regress(e 2 jx 2 ). The equivalent network is as shown below: 1 p0 p1 x 2 1 be 2 :::: p n x 2 n p i = x 2 i ( b e 2 e 2 ) We refer to these coecients p as \potentials" because we use them to etermine a feature's relative potential for being useful as part of a new feature. To construct a new feature we take the prouct of the two features with the highest potentials. 2 4 THE ALGORITHM The algorithm to implement our metho is written as pseuo-coe in Figure 1. After normalizing the training instances such that all features have zero mean an variance of one, a regression is performe (step 1) on the training set to learn the best set of coecients for preicting y given x. If the error (the resiual) is approximately zero, then the function has been learne an the algorithm halts; otherwise feature construction is initiate (step 2). A secon regression is performe to erive the potentials p for preicting the square error from the (normalize) values of x 2 i. The prouct of the two features with the highest potentials becomes the enition of a new feature. This feature 1 Note that this iers from \cascae correlation" (Fahlman an Lebiere, 1990) in that we correlate with the square of the error, rather that with the error itself. 2 If the two features with the highest potentials have alreay been use to ene a feature then the next best pair is use.

3 step 0: initialize variables I = number of instances n = number of features X = norm(ffx 1 1:::x 1 ng:::fx I 1; :::x I ngg) Y = norm(fy 1 :::y I g) F eatureset = fx1:::x ng step 1: o the regression w = Regress(Y jx) P P I SquareError = i=1 ((w0 + I j=1 wjxi j) y i ) 2 if SquareError 0 return results an STOP. step 2: construct new feature X 2 = norm(ff(x 1 1) 2 :::(x 1 n) 2 g:::f(x I 1) 2 ; :::(x I n) 2 gg) p = Regress(SquareErrorjX 2 ) Inex1 = inex(heighest(p)) Inex2 = inex(secon heighest(p)) NewF eature = prouct(x inex1 ; x inex2 ) F eatureset = F eatureset + NewF eature n = n + 1 X = norm(ffx 1 1; :::x 1 n1; prouct(x 1 inex1 ; x1 inex2 )g... fx I 1; :::x I n1; prouct(x I inex1 ; xi inex2 )gg) GOTO step 1. Figure 1: The Potentials Algorithm is ae to the feature set an all the instances are upate an renormalize. The algorithm then returns to step 1 an the process is repeate. 5 AN EXAMPLE Figure 2 shows a simple example illustrating the algorithm an some of its problems. For this example 200 training instances were create by ranomly generating ve real-value variables (range = [0,1]) an calculating their values for the function y = 2 + 3x1x2 + 4x3x4x5. In aition to y an these ve relevant variables x1; x2; x3; x4; an x5; four istracter variables x6; x7; x8; an x9 were ae to each instance (ranomly generate in the same way). In this example, the algorithm erive the correct function in the seventh cycle, after creating six new terms: x5x5, x4x5, x4x4x5x5, x3x4x5, x2x2, an x1x2. The output from each cycle reports the following information: Coes the coecients for each feature resulting from the linear regression Potentials the potentials use to select the two features to combine into a new term Resiual the total square error of the best linear moel of the target function as erive by the regression algorithm New Terms the new term that was constructe One thing to notice in this example is that the algorithm completely isregars the istracter variables (a characteristic share by the correlation metho). This has been a consistent result in all our tests in which the training set was suciently large for the complexity of the terms in the function. As the number of primitive features in a term increases, each iniviual feature's contribution to the function's value ecreases; as this contribution becomes small it becomes icult to separate from the ranom noise of the istracters, unless the size of the training set is appropriately increase. There are two problems with this example, one obvious an the other more subtle. First, four unnecessary features were constructe: x5x5, x3x3, x4x4x5x5, an x1x1. These i not prevent solution of the problem, but they i slow own the process; for more complex functions these aitional terms coul become problematic. Secon, the target function is such that the potentials of the relevant features are signicantly ifferent epening upon which of the two terms of the function they participate in. As a result, the algorithm is able to etermine which relevant features go together. So for example, x1 is in a term of two features having a coecient of 3 whereas x3 is in a term of three features weighte by 4; consequently their initial potentials are quite ierent. If we ha use the function y = x1x2 + x3x4 the algorithm woul not have been able to tell that x1 shoul be paire with x2 rather than with x3 or x4, other than by chance. 6 JOINT POTENTIALS The example iscusse above shows that the metho of potentials is goo at ientifying which terms are relevant to the function, but not at etermining which combinations of these terms are relevant. To remey this shortcoming we evelope the notion of \joint potentials," that is, the potentials of pairs of features. To compute the potentials of all pairs of n features is not feasible as it woul require a regression on n 2 variables. Instea, we restrict attention to the pairs of features that appear most promising accoring to the prouct of the potentials of their constituent features. For the m most promising pairs, for m << n 2, we perform another regression onto the square error. The coecients of this regression are calle the joint potentials. The pair with the highest joint potential is then selecte as the next new feature. This is basically a traitional generate-an-test approach to feature construction, 3 but guie by the potential ratings of the iniviual original features. The example run in Figure 3 shows the results of using this metho on the training set from the rst example (using n = m = 9). This time the algorithm constructs the minimum number of new features require to learn 3 As in, e.g., (Ivakhnenko, 1971).

4 Coeffs: Potentials: Resiual: 193 New Terms: X5X5 Cycle 2: Coeffs: Potentials: Resiual: 193 New Terms: X4X5 Cycle 3: Coeffs: Potentials: Resiual: 193 New Terms: X4X4X5X5 Cycle 4: Coeffs: Potentials: Resiual: 189 New Terms: X3X4X5 Cycle 5: Coeffs: Potentials: Resiual: 69 New Terms: X2X2 Cycle 6: Coeffs: Potentials: Resiual: 68 New Terms: X1X2 Cycle 7: Coeffs: Resiual: 0 Solution: (+ 2.0 (* 4.0 X3 X4 X5) (* 3.0 X1 X2) ) Figure 2: Application of the algorithm to the target function y = 2 + 3x1x2 + 4x3x4x5. The training set inclue four istracter variables an 200 examples. the target function. The information isplaye on each cycle now inclues the top four joint potentials (limite to four for isplay purposes). The example run in Figure 4 shows how the joint potentials metho also solves the problem of etermining which pairs of relevant features belong together. Recall our statement that functions of the form y = x1x2 + x3x4 (where each term is of equal weight an length) are icult for the straight potential metho because it has no way of eciing how to pair features. This thir example emonstrates that the joint potential selection metho can correctly ecie which of the relevant features to combine. Notice that if the algorithm ha use the (non-joint) potentials to pick the new feature pair on cycle 1, it woul have create the useless new feature x1x4 since x1 an x4 have the two highest potentials. Using joint potentials, the relevant feature x1x2 is constructe instea. 7 EXTENSIONS This research is still preliminary. We are in the process of esigning more thorough tests of this approach an we are eveloping a better theoretical explanation for when an why this approach works. In aition we are exploring several new ieas, among them: An incremental algorithm. The current algorithm assumes that all the instances are available at the outset. We inten to make it able to construct features an learn functions incrementally, i.e., by processing each example only once. Comparisons. We are currently working with Sanger to obtain irect comparisons with his original metho on the basis of learning rate an computational requirements. Multiple new features per cycle. Rather than aing just a single feature per cycle we are working on a metho that as a set of features base on their potentials or joint potentials. Application to more complex functions. Because we have constraine our metho to the use of a multiplication operator the omain of solvable problems is quite limite. We are exploring the use of aitional constructive operators, such as ivision, roots, an transcenental functions. Pruning of unnecessary features. As we saw in the above examples, the metho of potentials is quite goo at ientifying irrelevant features. It shoul be a simple matter to use this information to prune the feature set an thereby reuce the computation at each cycle.

5 Coeffs: Potentials: Joints: (( ) ( ) ( ) ( )) Resiual: 193 New Terms: X4X5 Cycle 2: Coeffs: Potentials: Joints: (( ) ( ) ( ) ( )) Resiual: 193 New Terms: X3X4X5 Cycle 3: Coeffs: Potentials: Joints: (( ) ( ) ( ) ( )) Resiual: 69 New Terms: X1X2 Cycle 4: Coeffs: Resiual: 0 Solution: (+ 2.0 (* 4.0 X3 X4 X5) (* 3.0 X1 X2) ) Figure 3: Application of the algorithm to the target function y = 2 + 3x1x2 + 4x3x4x5 using Joint Potentials. The training set inclue four istracter variables an 200 examples. Coeffs: Potentials: Joints: (( ) ( ) ( ) ( )) Resiual: 189 New Terms: X1X2 Cycle 2: Coeffs: Potentials: Joints: (( ) ( ) ( ) ( )) Resiual: 89 New Terms: X3X4 Cycle 3: Coeffs: Resiual: 0 Solution: (+ (* 1.0 X1 X2) (* 1.0 X3 X4) ) Figure 4: Application of the algorithm to the target function y = x1x2 + x3x4 using Joint Potentials. The training set inclue four istracter variables an 200 examples. Acknowlegments We woul like to thank Terry Sanger for his encouragement an iscussion of this work. Thank you also to Rich Branau for his helpful comments. References L. Breiman, J. H. Frieman, R. A. Olshen, an C. J. Stone. (1984) Classication an Regression Trees. Wasworth & Brooks, Belmont, California. S. E. Fahlman an C. Lebiere. (1990) The cascaecorrelation learning architecture. In D. S. Touretzky, (e.), Avances in Neural Information Processing Systems 2, pages 524{532. Morgan Kaufmann. J. H. Frieman. (1988) Multivariate aaptive regression splines. Technical Report TR No. 102, Laboratory for Computational Statistics, Stanfor University, Stanfor, CA. A. G. Ivakhnenko. (1971) Polynomial theory of complex systems. IEEE Trans. Systems, Man, an Cybernetics, SMC-1(4):364{378. T. D. Sanger. (1991) A tree-structure algorithm for reucing computation in networks with separable basis functions. Neural Computation, 3(1):67{78.

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

6 Gradient Descent. 6.1 Functions

6 Gradient Descent. 6.1 Functions 6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing Inexing the Eges A simple an yet efficient approach to high-imensional inexing Beng Chin Ooi Kian-Lee Tan Cui Yu Stephane Bressan Department of Computer Science National University of Singapore 3 Science

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Impact of cache interferences on usual numerical dense loop. nests. O. Temam C. Fricker W. Jalby. University of Leiden INRIA University of Versailles

Impact of cache interferences on usual numerical dense loop. nests. O. Temam C. Fricker W. Jalby. University of Leiden INRIA University of Versailles Impact of cache interferences on usual numerical ense loop nests O. Temam C. Fricker W. Jalby University of Leien INRIA University of Versailles Niels Bohrweg 1 Domaine e Voluceau MASI 2333 CA Leien 78153

More information

Fast Fractal Image Compression using PSO Based Optimization Techniques

Fast Fractal Image Compression using PSO Based Optimization Techniques Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting

More information

Inuence of Cross-Interferences on Blocked Loops: to know the precise gain brought by blocking. It is even dicult to determine for which problem

Inuence of Cross-Interferences on Blocked Loops: to know the precise gain brought by blocking. It is even dicult to determine for which problem Inuence of Cross-Interferences on Blocke Loops A Case Stuy with Matrix-Vector Multiply CHRISTINE FRICKER INRIA, France an OLIVIER TEMAM an WILLIAM JALBY University of Versailles, France State-of-the art

More information

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

Rough Set Approach for Classification of Breast Cancer Mammogram Images

Rough Set Approach for Classification of Breast Cancer Mammogram Images Rough Set Approach for Classification of Breast Cancer Mammogram Images Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative Methos an Information Systems

More information

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

d 3 d 4 d d d d d d d d d d d 1 d d d d d d

d 3 d 4 d d d d d d d d d d d 1 d d d d d d Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus

More information

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science

More information

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

William S. Law. Erik K. Antonsson. Engineering Design Research Laboratory. California Institute of Technology. Abstract

William S. Law. Erik K. Antonsson. Engineering Design Research Laboratory. California Institute of Technology. Abstract Optimization Methos for Calculating Design Imprecision y William S. Law Eri K. Antonsson Engineering Design Research Laboratory Division of Engineering an Applie Science California Institute of Technology

More information

Considering bounds for approximation of 2 M to 3 N

Considering bounds for approximation of 2 M to 3 N Consiering bouns for approximation of to (version. Abstract: Estimating bouns of best approximations of to is iscusse. In the first part I evelop a powerseries, which shoul give practicable limits for

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember 107 IEICE TRANS INF & SYST, VOLE88 D, NO5 MAY 005 LETTER An Improve Neighbor Selection Algorithm in Collaborative Filtering Taek-Hun KIM a), Stuent Member an Sung-Bong YANG b), Nonmember SUMMARY Nowaays,

More information

Department of Computer Science, POSTECH, Pohang , Korea. (x 0 (t); y 0 (t)) 6= (0; 0) and N(t) is well dened on the

Department of Computer Science, POSTECH, Pohang , Korea. (x 0 (t); y 0 (t)) 6= (0; 0) and N(t) is well dened on the Comparing Oset Curve Approximation Methos Gershon er +, In-Kwon, an Myung-Soo Kim + Department of Computer Science, Technion, IIT, Haifa 32000, Israel Department of Computer Science, POSTECH, Pohang 790-784,

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

P. Fua and Y. G. Leclerc. SRI International. 333 Ravenswood Avenue, Menlo Park, CA

P. Fua and Y. G. Leclerc. SRI International. 333 Ravenswood Avenue, Menlo Park, CA Moel Driven Ege Detection P. Fua an Y. G. Leclerc SI International 333 avenswoo Avenue, Menlo Park, CA 9425 (fua@ai.sri.com leclerc@ai.sri.com) Machine Vision an Applications, 3, 199 Abstract Stanar ege

More information

Verifying performance-based design objectives using assemblybased vulnerability

Verifying performance-based design objectives using assemblybased vulnerability Verying performance-base esign objectives using assemblybase vulnerability K.A. Porter Calornia Institute of Technology, Pasaena, Calornia, USA A.S. Kiremijian Stanfor University, Stanfor, Calornia, USA

More information

Modifying ROC Curves to Incorporate Predicted Probabilities

Modifying ROC Curves to Incorporate Predicted Probabilities Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

Chapter 5 Proposed models for reconstituting/ adapting three stereoscopes

Chapter 5 Proposed models for reconstituting/ adapting three stereoscopes Chapter 5 Propose moels for reconstituting/ aapting three stereoscopes - 89 - 5. Propose moels for reconstituting/aapting three stereoscopes This chapter offers three contributions in the Stereoscopy area,

More information

Investigation into a new incremental forming process using an adjustable punch set for the manufacture of a doubly curved sheet metal

Investigation into a new incremental forming process using an adjustable punch set for the manufacture of a doubly curved sheet metal 991 Investigation into a new incremental forming process using an ajustable punch set for the manufacture of a oubly curve sheet metal S J Yoon an D Y Yang* Department of Mechanical Engineering, Korea

More information

Evolutionary Optimisation Methods for Template Based Image Registration

Evolutionary Optimisation Methods for Template Based Image Registration Evolutionary Optimisation Methos for Template Base Image Registration Lukasz A Machowski, Tshilizi Marwala School of Electrical an Information Engineering University of Witwatersran, Johannesburg, South

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

A Convex Clustering-based Regularizer for Image Segmentation

A Convex Clustering-based Regularizer for Image Segmentation Vision, Moeling, an Visualization (2015) D. Bommes, T. Ritschel an T. Schultz (Es.) A Convex Clustering-base Regularizer for Image Segmentation Benjamin Hell (TU Braunschweig), Marcus Magnor (TU Braunschweig)

More information

1 Surprises in high dimensions

1 Surprises in high dimensions 1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Correlation-based color mosaic interpolation using a connectionist approach

Correlation-based color mosaic interpolation using a connectionist approach Correlation-base color mosaic interpolation using a connectionist approach Gary L. Embler * Agilent Technologies, Inc. 75 Bowers Avenue, MS 87H Santa Clara, California 9554 USA ABSTRACT This paper presents

More information

Short-term prediction of photovoltaic power based on GWPA - BP neural network model

Short-term prediction of photovoltaic power based on GWPA - BP neural network model Short-term preiction of photovoltaic power base on GWPA - BP neural networ moel Jian Di an Shanshan Meng School of orth China Electric Power University, Baoing. China Abstract In recent years, ue to China's

More information

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times Algorithm for Intermoal Optimal Multiestination Tour with Dynamic Travel Times Neema Nassir, Alireza Khani, Mark Hickman, an Hyunsoo Noh This paper presents an efficient algorithm that fins the intermoal

More information

Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Based on Complexity

Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Based on Complexity Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Base on Complexity Xiangao Huang 1 Wei Huang 2 Xiaozhou Liu 3 Chao Wang 4 Zhu jing Wang 5 Tao Wang 1 1 College of Engineering, Shantou

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples

More information

Interior Permanent Magnet Synchronous Motor (IPMSM) Adaptive Genetic Parameter Estimation

Interior Permanent Magnet Synchronous Motor (IPMSM) Adaptive Genetic Parameter Estimation Interior Permanent Magnet Synchronous Motor (IPMSM) Aaptive Genetic Parameter Estimation Java Rezaie, Mehi Gholami, Reza Firouzi, Tohi Alizaeh, Karim Salashoor Abstract - Interior permanent magnet synchronous

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural

More information

NTCIR-6 CLIR-J-J Experiments at Yahoo! Japan

NTCIR-6 CLIR-J-J Experiments at Yahoo! Japan NTCIR-6 CLIR-J-J Experiments at Yahoo! Japan Sumio FUJITA Yahoo Japan Corporation, Roppongi Hills Mori Tower, 6-10-1, Roppongi, Minato-ku, Tokyo 106-6182, Japan sufujita AT yahoo-corp DOT jp Abstract This

More information

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,

More information

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach Nishi Sharma, Vanna Verma Abstract Wireless sensor networks (WSNs) is one of the emerging fiel of research in recent era

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

NAND flash memory is widely used as a storage

NAND flash memory is widely used as a storage 1 : Buffer-Aware Garbage Collection for Flash-Base Storage Systems Sungjin Lee, Dongkun Shin Member, IEEE, an Jihong Kim Member, IEEE Abstract NAND flash-base storage evice is becoming a viable storage

More information

Design and Analysis of Optimization Algorithms Using Computational

Design and Analysis of Optimization Algorithms Using Computational Appl. Num. Anal. Comp. Math., No. 3, 43 433 (4) / DOI./anac.47 Design an Analysis of Optimization Algorithms Using Computational Statistics T. Bartz Beielstein, K.E. Parsopoulos,3, an M.N. Vrahatis,3 Department

More information

Frequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises

Frequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises verview Frequent Pattern Mining comprises Frequent Pattern Mining hristian Borgelt School of omputer Science University of Konstanz Universitätsstraße, Konstanz, Germany christian.borgelt@uni-konstanz.e

More information

FTSM FAST TAKAGI-SUGENO FUZZY MODELING. Manfred Männle

FTSM FAST TAKAGI-SUGENO FUZZY MODELING. Manfred Männle FTS FAST TAKAGI-SUGENO FUZZY ODELING anfre ännle Institute for Computer Design an Fault Tolerance University of Karlsruhe, D-7628 Karlsruhe, Germany anfre.aennle@informatik.uni-karlsruhe.e Abstract Takagi-Sugeno

More information

Divide-and-Conquer Algorithms

Divide-and-Conquer Algorithms Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:

More information

A PSO Optimized Layered Approach for Parametric Clustering on Weather Dataset

A PSO Optimized Layered Approach for Parametric Clustering on Weather Dataset Vol.3, Issue.1, Jan-Feb. 013 pp-504-508 ISSN: 49-6645 A PSO Optimize Layere Approach for Parametric Clustering on Weather Dataset Shikha Verma, 1 Kiran Jyoti 1 Stuent, Guru Nanak Dev Engineering College

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Super-resolution Frame Reconstruction Using Subpixel Motion Estimation

Super-resolution Frame Reconstruction Using Subpixel Motion Estimation Super-resolution Frame Reconstruction Using Subpixel Motion Estimation ABSTRACT When vieo ata is use for forensic analysis, it may transpire that the level of etail available is insufficient. This is particularly

More information

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA Preprint, August 5, 2018. 1 All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA Mikhail Ivanov, Frerik Brännström, Alexanre Graell i Amat, an Petar Popovski Department of Signals an Systems,

More information

A Framework for Dialogue Detection in Movies

A Framework for Dialogue Detection in Movies A Framework for Dialogue Detection in Movies Margarita Kotti, Constantine Kotropoulos, Bartosz Ziólko, Ioannis Pitas, an Vassiliki Moschou Department of Informatics, Aristotle University of Thessaloniki

More information

Table-based division by small integer constants

Table-based division by small integer constants Table-base ivision by small integer constants Florent e Dinechin, Laurent-Stéphane Diier LIP, Université e Lyon (ENS-Lyon/CNRS/INRIA/UCBL) 46, allée Italie, 69364 Lyon Ceex 07 Florent.e.Dinechin@ens-lyon.fr

More information

Characterizing Decoding Robustness under Parametric Channel Uncertainty

Characterizing Decoding Robustness under Parametric Channel Uncertainty Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric

More information

Research Article Research on Law s Mask Texture Analysis System Reliability

Research Article Research on Law s Mask Texture Analysis System Reliability Research Journal of Applie Sciences, Engineering an Technology 7(19): 4002-4007, 2014 DOI:10.19026/rjaset.7.761 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitte: November

More information

Digital fringe profilometry based on triangular fringe patterns and spatial shift estimation

Digital fringe profilometry based on triangular fringe patterns and spatial shift estimation University of Wollongong Research Online Faculty of Engineering an Information Sciences - Papers: Part A Faculty of Engineering an Information Sciences 4 Digital fringe profilometry base on triangular

More information

A Multi-class SVM Classifier Utilizing Binary Decision Tree

A Multi-class SVM Classifier Utilizing Binary Decision Tree Informatica 33 (009) 33-41 33 A Multi-class Classifier Utilizing Binary Decision Tree Gjorgji Mazarov, Dejan Gjorgjevikj an Ivan Chorbev Department of Computer Science an Engineering Faculty of Electrical

More information

Design Management Using Dynamically Defined Flows

Design Management Using Dynamically Defined Flows Design Management Using Dynamically Deine Flows Peter R. Sutton*, Jay B. Brockman** an Stephen W. Director* *Department o Electrical an Computer Engineering, Carnegie Mellon University, Pittsburgh, PA

More information

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients Probabilistic Meium Access Control for 1 Full-Duplex Networks with Half-Duplex Clients arxiv:1608.08729v1 [cs.ni] 31 Aug 2016 Shih-Ying Chen, Ting-Feng Huang, Kate Ching-Ju Lin, Member, IEEE, Y.-W. Peter

More information

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose

More information

Frequency Domain Parameter Estimation of a Synchronous Generator Using Bi-objective Genetic Algorithms

Frequency Domain Parameter Estimation of a Synchronous Generator Using Bi-objective Genetic Algorithms Proceeings of the 7th WSEAS International Conference on Simulation, Moelling an Optimization, Beijing, China, September 15-17, 2007 429 Frequenc Domain Parameter Estimation of a Snchronous Generator Using

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Fast Window Based Stereo Matching for 3D Scene Reconstruction

Fast Window Based Stereo Matching for 3D Scene Reconstruction The International Arab Journal of Information Technology, Vol. 0, No. 3, May 203 209 Fast Winow Base Stereo Matching for 3D Scene Reconstruction Mohamma Mozammel Chowhury an Mohamma AL-Amin Bhuiyan Department

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Control of Scalable Wet SMA Actuator Arrays

Control of Scalable Wet SMA Actuator Arrays Proceeings of the 2005 IEEE International Conference on Robotics an Automation Barcelona, Spain, April 2005 Control of Scalable Wet SMA Actuator Arrays eslie Flemming orth Dakota State University Mechanical

More information

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun

More information

Exercises of PIV. incomplete draft, version 0.0. October 2009

Exercises of PIV. incomplete draft, version 0.0. October 2009 Exercises of PIV incomplete raft, version 0.0 October 2009 1 Images Images are signals efine in 2D or 3D omains. They can be vector value (e.g., color images), real (monocromatic images), complex or binary

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information

Discriminative Filters for Depth from Defocus

Discriminative Filters for Depth from Defocus Discriminative Filters for Depth from Defocus Fahim Mannan an Michael S. Langer School of Computer Science, McGill University Montreal, Quebec HA 0E9, Canaa. {fmannan, langer}@cim.mcgill.ca Abstract Depth

More information

A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Based on Gravity

A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Based on Gravity Worl Applie Sciences Journal 16 (10): 1387-1392, 2012 ISSN 1818-4952 IDOSI Publications, 2012 A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Base on Gravity Aliasghar Rahmani Hosseinabai,

More information

A Modified Immune Network Optimization Algorithm

A Modified Immune Network Optimization Algorithm IAENG International Journal of Computer Science, 4:4, IJCS_4_4_3 A Moifie Immune Network Optimization Algorithm Lu Hong, Joarer Kamruzzaman Abstract This stuy proposes a moifie artificial immune network

More information

Using Ray Tracing for Site-Specific Indoor Radio Signal Strength Analysis 1

Using Ray Tracing for Site-Specific Indoor Radio Signal Strength Analysis 1 Using Ray Tracing for Site-Specific Inoor Raio Signal Strength Analysis 1 Michael Ni, Stephen Mann, an Jay Black Computer Science Department, University of Waterloo, Waterloo, Ontario, NL G1, Canaa Abstract

More information

Lesson 11 Interference of Light

Lesson 11 Interference of Light Physics 30 Lesson 11 Interference of Light I. Light Wave or Particle? The fact that light carries energy is obvious to anyone who has focuse the sun's rays with a magnifying glass on a piece of paper an

More information

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,

More information

Distributed Planning in Hierarchical Factored MDPs

Distributed Planning in Hierarchical Factored MDPs Distribute Planning in Hierarchical Factore MDPs Carlos Guestrin Computer Science Dept Stanfor University guestrin@cs.stanfor.eu Geoffrey Goron Computer Science Dept Carnegie Mellon University ggoron@cs.cmu.eu

More information

Discrete Markov Image Modeling and Inference on the Quadtree

Discrete Markov Image Modeling and Inference on the Quadtree 390 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 9, NO. 3, MARCH 2000 Discrete Markov Image Moeling an Inference on the Quatree Jean-Marc Laferté, Patrick Pérez, an Fabrice Heitz Abstract Noncasual Markov

More information

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic WLAN Inoor Positioning Base on Eucliean Distances an Fuzzy Logic Anreas TEUBER, Bern EISSFELLER Institute of Geoesy an Navigation, University FAF, Munich, Germany, e-mail: (anreas.teuber, bern.eissfeller)@unibw.e

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Cellular Ants: Combining Ant-Based Clustering with Cellular Automata

Cellular Ants: Combining Ant-Based Clustering with Cellular Automata Cellular Ants: Combining Ant-Base Clustering with Cellular Automata Anrew Vane Moere & Justin James Clayen Key Centre of Design Computing & Cognition, University of Syney, Australia {anrew,justin}@arch.usy.eu.au

More information

Animated Surface Pasting

Animated Surface Pasting Animate Surface Pasting Clara Tsang an Stephen Mann Computing Science Department University of Waterloo 200 University Ave W. Waterloo, Ontario Canaa N2L 3G1 e-mail: clftsang@cgl.uwaterloo.ca, smann@cgl.uwaterloo.ca

More information

Fuzzy Learning Variable Admittance Control for Human-Robot Cooperation

Fuzzy Learning Variable Admittance Control for Human-Robot Cooperation Fuzzy Learning ariable Amittance Control for Human-Robot Cooperation Fotios Dimeas an Nikos Aspragathos Abstract This paper presents a metho for variable amittance control in human-robot cooperation tasks,

More information

Handling missing values in kernel methods with application to microbiology data

Handling missing values in kernel methods with application to microbiology data an Machine Learning. Bruges (Belgium), 24-26 April 2013, i6oc.com publ., ISBN 978-2-87419-081-0. Available from http://www.i6oc.com/en/livre/?gcoi=28001100131010. Hanling missing values in kernel methos

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Kinematic Analysis of a Family of 3R Manipulators

Kinematic Analysis of a Family of 3R Manipulators Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,

More information

Nearest Neighbor Search using Additive Binary Tree

Nearest Neighbor Search using Additive Binary Tree Nearest Neighbor Search using Aitive Binary Tree Sung-Hyuk Cha an Sargur N. Srihari Center of Excellence for Document Analysis an Recognition State University of New York at Buffalo, U. S. A. E-mail: fscha,sriharig@cear.buffalo.eu

More information