Learning Subproblem Complexities in Distributed Branch and Bound

Size: px
Start display at page:

Download "Learning Subproblem Complexities in Distributed Branch and Bound"

Transcription

1 Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine Rina Dechter Department of Computer Science University of California, Irvine Abstract In the context of istribute Branch an Boun Search for Graphical Moels, effective loa balancing is crucial yet har to achieve ue to early pruning of search branches. This paper proposes learning a regression moel over structural as well as cost function-base features to more accurately preict subproblem ahea of time, thereby enabling more balance parallel workloas. Early results show the promise of this approach. 1 Introuction This paper explores the application of learning for improve loa balancing in the context of istribute search for iscrete combinatorial optimization over graphical moels (e.g., Bayesian networks, weighte CSPs). Specifically, we consier one of the best exact search algorithms for solving the MPE/MAP task over graphical moels, AND/OR Branch an Boun (AOBB) [9], ranke first or secon in the UAI an evaluations. We aapt the establishe concept of parallel tree search [], where a search tree is explore centrally up to a certain epth an the remaining subtrees are solve in parallel. In the graphical moel context we explore the search space of partial instantiations up to a certain point an solve the resulting conitione subproblems in parallel. The istribute framework is built with a gri computing environment in min, i.e., a set of autonomous, loosely connecte systems notably, we cannot assume any kin of share memory which many parallel algorithms buil upon [,, 1]. The primary challenge an focus of this paper is therefore to fin a set of subproblems with balance, so that the overall parallel runtime will not be ominate by just a few of them. In the optimization context, however, the use of cost an heuristic functions for pruning makes it very har to reliably preict an balance subproblem ahea of time, even if structural parameters like inuce with are known. Our suggeste approach an the main contribution of this paper is to estimate subproblem by learning a regression moel over the subproblems parameters, structural as well as with respect to the cost function. This moel is traine uring preprocessing on a small number of subproblem samples an then use to preict the size of each subproblem s search space in avance, merging/splitting accoringly. Prior work on estimating search goes back to [] an more recently [], which preict the size of general backtrack trees through ranom probing. Similar schemes were evise for Branch an Boun algorithms [], where search is run for a limite time an the partially explore tree is extrapolate. Our approach iffers by sampling an learning entirely uring preprocessing, allowing very fast repeate estimates when the parallelization frontier is iteratively compute. We present some early results of this ongoing work, running with a varying egree of parallelism on haplotyping problems from the omain of genetic linkage analysis. While limite in scope at this point, results are promising, with goo parallel speeups in particular. 1

2 (a) (b) (c) () Figure 1: (a) Example primal graph with six variables, (b) its inuce graph along orering = A,B,C,D,E,F, (c) a corresponing pseuo tree, an () the resulting context-minimal AND/OR search graph. Backgroun We assume the usual efinitions of a graphical moel as a set of functions F = {f 1,...,f m } over iscrete variables X = {X 1,...,X n }, its primal graph, inuces graph, an inuce with. Figure 1(a) epicts the primal graph of an example problem with six variables. The inuce graph for the example problem along orering = A,B,C,D,E,F is epicte in Figure 1(b), its inuce with is. Note that ifferent orerings will vary in their implie inuce with; fining an orering of minimal inuce with is known to be NP-har, in practice heuristics like minfill [] are use to obtain approximations..1 AND/OR Search Spaces The concept of AND/OR search spaces has been introuce as a unifying framework for avance algorithmic schemes for graphical moels to better capture the structure of the unerlying graph [3]. Its main virtue consists in exploiting conitional inepenencies between variables, which can lea to exponential speeups. The search space is efine using a pseuo tree, which captures problem ecomposition: DEFINITION 1 (pseuo tree) Given an unirecte graph G = (X,E), a pseuo tree of G is a irecte, roote treet = (X,E ) with the same set of noesx,such that every arc ofgthat is not inclue in E is a back-arc in T, namely it connects a noe in T to an ancestor in T. The arcs in E may not all be inclue ine. AND/OR Search Trees : Given a graphical moel instance with variables X an functions F, its primal graph(x,e), an a pseuo treet, the associate AND/OR search tree consists of alternating levels of OR an AND noes. OR noes are labele X i an correspon to the variables in X. AND noes are labele X i,x i, or justx i an correspon to the values of the OR parent s variable. The structure of the AND/OR search tree is base on the unerlying pseuo tree T : the root of the AND/OR search tree is an OR noe labele with the root oft. The chilren of an OR noe X i are AND noes labele with assignments X i,x i ; the chilren of an AND noe X i,x i are OR noes labele with the chilren of X i in T, representing conitionally inepenent subproblems. It was shown that, given a pseuo tree T of height h, the size of the AND/OR search tree base on T is O(n k h ), where k bouns the omain size of variables [3]. AND/OR Search Graphs : Different noes may root ientical subproblems an can be merge through caching, yieling an AND/OR search graph of smaller size, at the expense of using aitional memory uring search. A mergeable noe X i can be ientifie by its context, the partial assignment of the ancestors of X i which separates the subproblem below X i from the rest of the network. Merging all context-mergeable noes yiels the context minimal AND/OR search graph. Given a graphical moel, its primal graph G, an a pseuo tree T, the size of the context-minimal AND/OR search graph iso(n k w ), wherew is the inuce with of G over a epth-first traversal of T an k bouns the omain size [3]. Figure 1(c) epicts a pseuo tree extracte from the inuce graph in Figure 1(b) an Figure 1() shows the corresponing context-minimal AND/OR search graph. Note that the AND noes for

3 B have two chilren each, representing inepenent subproblems an thus emonstrating problem ecomposition. Furthermore, the OR noes for D (with context {B, C}) an F (context {B, E}) have two eges converging from the AND level above them, signifying caching. Weighte AND/OR Search Graphs : Given an AND/OR search graph, each ege from an OR noe X i to an AND noe x i can be annotate by weights erive from the set of cost functions F in the graphical moel: the weight l(x i,x i ) is the sum of all cost functions whose scope inclues X i an is fully assigne along the path from the root to x i, evaluate at the values along this path. Furthermore, each noe in the AND/OR search graph can be associate with a value: the valuev(n) of a noenis the minimal solution cost to the subproblem roote atn, subject to the current variable instantiation along the path from the root to n. v(n) can be compute recursively using the values of n s successors [3]. AND/OR Branch an Boun : AND/OR Branch an Boun is a state-of-the-art algorithm for solving optimization problems over graphical moels. Assuming a maximization task, it traverses the context-minimal AND/OR graph in a epth-first manner while keeping track of a current lower boun on the optimal solution cost. During expansion of a noe n, this lower boun l is compare with a heuristic upper boun u(n) on the optimal solution below n if u(n) l the algorithm can prune the subproblem below n [3]. Distribute AND/OR Branch an Boun : Our istribute implementation of AND/OR Branch an Boun is base on the notion of parallel tree search [], where a search tree is explore centrally up to a certain epth an the remaining subtrees are solve in parallel. In the context of graphical moels we explore the search space of partial instantiations up to a certain point an solve the resulting conitione subproblems in parallel. Applie to the search graph from Figure 1(), for instance, we coul obtain eight inepenent subproblems as shown in Figure, with a conitioning search space (in Figure : Parallelization applie to the example problem from Figure 1, resulting in eight inepenent subproblems, with conitioning search space in gray. gray) spanning the first two levels (variablesaanb). In the following we will outline our approach to fining a balance set of subproblems. 3 Loa Balancing through Complexity Preiction Our general scheme to fin a balance set of subproblems is outline in Algorithm 1: starting with just the search space root noe (corresponing to a single, large subproblem), we iteratively pick the subproblem with largest estimate an conition it further, until the esire level of parallelism (measure by the number of subproblems, typically chosen to be ten times the number of available CPUs) is obtaine. Note that each noe generate nees to have its subproblem estimate, resulting in many such queries; it is therefore avisable to keep most of the estimation to an offline preprocessing phase in orer to ensure fast preiction queries. The following section erives our principle approach to subproblem preiction, which we formulate as a regression learning problem. We note that, while the goal in the present context is Algorithm 1 Pseuo coe for subproblem generation Input: Pseuo tree T with root X, minimum subproblem count p, estimator ˆN. Output: SetF of subproblem root noes with F p. 1: F { X } : while F < p : 3: n argmax n F ˆN(n) : F F \{n } : F F chilren(n ) 3

4 to ensure balance subproblem in the istribute scheme, accurate preiction is a worthwhile issue in itself an a possible subject of future research. 3.1 Subproblem Complexity Preiction Given a search noe n, we propose to moel the of the subproblem below it (measure by the number of noe expansions require for its solution) as an exponential function of various subproblem features x j (n), capturing the exponential nature of the search space size as follows: N(n) = b j λjxj(n) (1) The subproblem features x j (n) we consier can be ivie into two groups: Structural: (n), epth of n in the conitioning search space; h(n), height of the subproblem pseuo tree below n; w(n), inuce with of the conitione subproblem below n; c(n), the number of problem variables in the subproblem below n. Cost-function relate: U(n), heuristic upper boun on the subproblem solution cost below n, as use by the Branch an Boun algorithm for pruning; L(n), lower boun on the subproblem solution cost as erive from the current best (overall) solution. If we instea consier the log, Equation 1 becomes the following: logn(n) = j λ j x j (n) () Fining suitable parameter values λ j can thus be formulate as a well-known linear regression problem. In other wors, given a set ofmsample subproblemsn k an their respective complexities N(n k ), 1 k m, we aim to fin parameters λ j that minimize the mean square error: MSE = 1 m ( λ j x j (n k ) logn(n k )) (3) m k=1 j The optimal selection of λ j s can be compute using the orinary least squares metho: We take each sample subproblem s features as a row of the esign matrix X (i.e., X i,j = x j (n i )) an let Y withy i = log(n(n i )) enote the column vector of log subproblem sizes. With as the Eucliean norm, we then minimize XΛ Y through the close-form expression ˆΛ = (X T X) 1 X T Y. Optionally applying rige regression for regularization we get: ˆΛ = (X T X +αi) 1 X T Y () where I is the ientity matrix an α R a small constant (e.g. α =.1). Given the learne parameters ˆλ j we can then preict the (log) of a new subproblem n as: log ˆN(n ) = j ˆλ j x j (n ) () In the following we briefly escribe how we can obtain the sample set of subproblems require to learn the parameter values ˆλ j of the regression moel. 3. Subproblem Sampling Recall first that AND/OR Branch an Boun is a epth-first search scheme. Secon, we realize that any leaf noe that is generate is a subproblem in itself (of size 1) an as the algorithm backtracks from the leaf the solve subproblem expans in size. Hence obtaining a single sample subproblem is straightforwar: we run the search for a limite number of operations an take the largest solve subproblem as the sample. To obtain multiple ifferent samples, we introuce ranomness in the value choices of the search up to a certain epth, below which the algorithm continues to use the heuristic upper boun as a value selection heuristic as before. For the parallel results in the following section, for a given problem instance we sample 1 subproblems each of size approx. 1,,,,,, 1,, 1,, an, noes, for a total of samples. This sampling process takes aroun 1 minutes per problem instance an is performe offline at this stage eventually it will be fully integrate into the parallel scheme.

5 (a) Peigree1, 1 CPUs / 1 subproblems (root) [y] (b) Peigree13, CPUs / subproblems (root) [y] (c) Peigree31, 1 CPUs / 1 subproblems 1 1 () Peigree1, 1 CPUs / 1 subproblems 1 1 (root) [y] (root) [y] (e) Peigree19, 3 CPUs / 3 subproblems (root) [y] Regression estimate (log1).. (f) Peigree1, 1 CPUs, 1 subproblems. subproblems optimal... Actual subproblem (log1) Regression estimate (log1).. (g) Peigree31, 1 CPUs / 1 subproblems. subproblems optimal... Actual subproblem (log1) Regression estimate (log1).. (h) Peigree1, 1 CPUs / 1 subproblems. subproblems optimal... Actual subproblem (log1) Figure 3: (a) (e): Subproblem statistics for select runs. Shown are each subproblem s as well as the epth of its root in the central search space (plotte against secon y-axis). (f) (h): Scatter plots of subproblem complexities against regression estimates. Empirical Results This line of work is an ongoing effort, with a more comprehensive stuy to be carrie out in the future; here we present some early results. We note that fining suitable benchmark problems is not an easy feat: if problems are too simple, parallelization is most likely etrimental overall, ue to preprocessing an overhea from the istribute scheme. Many very har problems, on the other han, will still remain infeasible for practical purposes, in particular since every experiment bins a potentially large number of share parallel resources for an extene perio of time. We report on five haplotyping problems from the omain of genetic linkage analysis, which correspon to MPE queries over Bayesian networks. With sequential runtimes from uner one hour to over six ays, we varie the number of CPUs epening on the problem, since massive parallelism is futile for relatively simple problems. For each instance below, n is the number of problem variables, k its maximum omain size, w the inuce with, an h the pseuo tree height. Table 1 contains results in terms of parallel runtime with varying levels of parallelism, epening on overall problem. Also inclue are sequential solution times (using plain AOBB)

6 sequential CPUs time sp CPUs time sp peigree1, 1 3 peigree13 1, 1 1,3 1 1 peigree31 9,, 1 1,13 1 peigree1,11 1,3 9 3, 1 peigree19 1,9,3 3,39 19 Table 1: Sequential an parallel runtime results for ifferent number of CPUs (number of subproblems is always ten times number of CPUs). sp is speeup vs. sequential. All times in secons. an relative speeup. Figure 3 shows etaile subproblems statistics: (a) through (e) epict the of the iniviual subproblems for select runs an allow us to assess loa balancing; (f) through (h) irectly contrast the estimates from the learne regression moel with the actual subproblem complexities, enabling evaluation of the preiction quality. Peigree1 (n = 1,k =,w = 33,h = 1) : Solve sequentially in uner one hour, this problem oesn t leave room for much parallelism an using more than 1 CPUs woul a little benefit. The subproblem complexities, however, seem fairly balance (Fig. 3(a)). Peigree13 (n = 1,k = 3,w = 3,h = 1) : Sequential AOBB takes about 3 1/ hours on this problem, using 1 CPUs yiels almost perfect linear speeup. The effect oesn t hol as strongly for CPUs, but the time improvement is still pronounce. The loa balancing is acceptable as well (Fig. 3(b)), however we foun that the unerlying moel preictions (not picture) are many orers of magnitue ifferent from the actual complexities, which will nee further investigation. Peigree31 (n = 113,k =,w = 3,h = ) : We obtain favorable speeups with up to 1 processors. Similarly, the istribution of subproblem complexities seems relatively balance (Fig. 3(c)). The unerlying estimates, however, are again not very accurate (Fig. 3(g)). Peigree1 (n = 11,k =,w = 39,h = 9) : One of the two problems where using all available 3 CPUs makes sense, yieling a substantial speeup. The subproblem complexities are not quite as balance (Fig. 3()) an the unerlying preictions quite crue (Fig. 3(h)), but it oes not appear to impact the overall solution time negatively. Peigree19 (n = 93,k =,w =,h = 9) : The harest problem in this set, its parallel speeup is a bit less istinct. We think this is ue to the consierable imbalance across subproblems (Fig. 3(e)); in fact the overall time is ominate by a few long-running subproblems. Overall, however, we observe very reasonable parallel speeups across instances; loa balancing seems fairly effective, with the exception of peigree19, which we nee to investigate more closely. However, while our framework appears to generally enable effective loa balancing, the accuracy of the unerluing estimates is meiocre at best; further research is neee here as well. Conclusion & Future Work We have evelope a istribute Branch an Boun framework that uses learning to achieve better loa balancing on a computational gri. In particular, we propose to train a linear regression moel on structural an cost-function base features of sample subproblems. The resulting moel is then use to etermine a suitable parallelization of the entire problem search space. Early results shown in Section have shown promise, but also highlighte areas for future work. We were able to obtain very goo parallel speeups for very complex as well as (using fewer CPUs) relatively simple problems an generally observe effective loa balancing. However, we also foun that in most cases the learne regression moel in t preict complexities very accurately, sometimes leaing to imbalance subproblem complexities. The most notable example in this regar was peigree19, which will require more in-epth analysis. Future work will involve ientifying aitional features to a to the moel, experimenting with varying sample sizes, an, most importantly, a more extensive empirical evaluation of the various aspects of our scheme on more problem instances. Another path worth investigating might be using non-linear moels an to compare their performance to the current linear regression.

7 References [1] Geoffrey Chu, Christian Schulte, an Peter J. Stuckey. Confience-base work stealing in parallel constraint programming. In Ian Gent, eitor, CP, volume 3 of Lecture Notes in Computer Science, pages 1, Lisbon, Portugal, September 9. Springer-Verlag. [] Gérar Cornuéjols, Miroslav Karamanov, an Yanjun Li. Early estimates of the size of branchan-boun trees. INFORMS Journal on Computing, 1(1): 9,. [3] Rina Dechter an Robert Mateescu. AND/OR search spaces for graphical moels. Artif. Intell., 11(-3):3 1,. [] Bernar Genron an Teoor Gabriel Crainic. Parallel branch-an-boun algorithms: Survey an synthesis. Operations Research, ():1 1, 199. [] Ananth Grama an Vipin Kumar. State of the art in parallel search techniques for iscrete optimization problems. IEEE Trans. Knowl. Data Eng., 11(1): 3, [] Philip Kilby, John Slaney, Sylvie Thiébaux, an Toby Walsh. Estimating search tree size. In AAAI, pages AAAI Press,. [] Uffe Kjaerulff. Triangulation of graphs algorithms giving small total state space. Technical report, Aalborg University, 199. [] Donal E. Knuth. Estimating the efficiency of backtrack programs. Mathematics of Computation, 9(19):11 13, 19. [9] Rau Marinescu an Rina Dechter. AND/OR Branch-an-Boun search for combinatorial optimization in graphical moels. Artif. Intell., 13(1-1):1 191, 9.

Advances in Parallel Branch and Bound

Advances in Parallel Branch and Bound ECAI 2012 Advances in Parallel Branch and Bound Lars Otten and Rina Dechter Dept. of Computer Science University of California, Irvine Summary Parallelizing AND/OR Branch and Bound: - Advanced optimization

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

FINDING MOST LIKELY HAPLOTYPES IN GENERAL PEDIGREES THROUGH PARALLEL SEARCH WITH DYNAMIC LOAD BALANCING

FINDING MOST LIKELY HAPLOTYPES IN GENERAL PEDIGREES THROUGH PARALLEL SEARCH WITH DYNAMIC LOAD BALANCING FINDING MOST LIKELY HAPLOTYPES IN GENERAL PEDIGREES THROUGH PARALLEL SEARCH WITH DYNAMIC LOAD BALANCING LARS OTTEN and RINA DECHTER Bren School of Information and Computer Sciences University of California,

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus

More information

Uninformed search methods

Uninformed search methods CS 1571 Introuction to AI Lecture 4 Uninforme search methos Milos Hauskrecht milos@cs.pitt.eu 539 Sennott Square Announcements Homework assignment 1 is out Due on Thursay, September 11, 014 before the

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

Frequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises

Frequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises verview Frequent Pattern Mining comprises Frequent Pattern Mining hristian Borgelt School of omputer Science University of Konstanz Universitätsstraße, Konstanz, Germany christian.borgelt@uni-konstanz.e

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

6 Gradient Descent. 6.1 Functions

6 Gradient Descent. 6.1 Functions 6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations

More information

1 Surprises in high dimensions

1 Surprises in high dimensions 1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Learning Polynomial Functions. by Feature Construction

Learning Polynomial Functions. by Feature Construction I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Table-based division by small integer constants

Table-based division by small integer constants Table-base ivision by small integer constants Florent e Dinechin, Laurent-Stéphane Diier LIP, Université e Lyon (ENS-Lyon/CNRS/INRIA/UCBL) 46, allée Italie, 69364 Lyon Ceex 07 Florent.e.Dinechin@ens-lyon.fr

More information

Figure 1: Schematic of an SEM [source: ]

Figure 1: Schematic of an SEM [source:   ] EECI Course: -9 May 1 by R. Sanfelice Hybri Control Systems Eelco van Horssen E.P.v.Horssen@tue.nl Project: Scanning Electron Microscopy Introuction In Scanning Electron Microscopy (SEM) a (bunle) beam

More information

Towards Parallel Search for Optimization in Graphical Models

Towards Parallel Search for Optimization in Graphical Models Towards Parallel Search for Optimization in Graphical Models Lars Otten and Rina Dechter Bren School of Information and Computer Sciences University of California, Irvine {lotten,dechter}@ics.uci.edu Abstract

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

Acknowledgement. Flow Graph Theory. Depth First Search. Speeding up DFA 8/16/2016

Acknowledgement. Flow Graph Theory. Depth First Search. Speeding up DFA 8/16/2016 8/6/06 Program Analysis https://www.cse.iitb.ac.in/~karkare/cs68/ Flow Graph Theory Acknowlegement Slies base on the material at http://infolab.stanfor.eu/~ullman/ragon/ w06/w06.html Amey Karkare Dept

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose

More information

Exercises of PIV. incomplete draft, version 0.0. October 2009

Exercises of PIV. incomplete draft, version 0.0. October 2009 Exercises of PIV incomplete raft, version 0.0 October 2009 1 Images Images are signals efine in 2D or 3D omains. They can be vector value (e.g., color images), real (monocromatic images), complex or binary

More information

Divide-and-Conquer Algorithms

Divide-and-Conquer Algorithms Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:

More information

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples

More information

Optimal Oblivious Path Selection on the Mesh

Optimal Oblivious Path Selection on the Mesh Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract

More information

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks Coorinating Distribute Algorithms for Feature Extraction Offloaing in Multi-Camera Visual Sensor Networks Emil Eriksson, György Dán, Viktoria Foor School of Electrical Engineering, KTH Royal Institute

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

Characterizing Decoding Robustness under Parametric Channel Uncertainty

Characterizing Decoding Robustness under Parametric Channel Uncertainty Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric

More information

Rough Set Approach for Classification of Breast Cancer Mammogram Images

Rough Set Approach for Classification of Breast Cancer Mammogram Images Rough Set Approach for Classification of Breast Cancer Mammogram Images Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative Methos an Information Systems

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

Performance Modelling of Necklace Hypercubes

Performance Modelling of Necklace Hypercubes erformance Moelling of ecklace ypercubes. Meraji,,. arbazi-aza,, A. atooghy, IM chool of Computer cience & harif University of Technology, Tehran, Iran {meraji, patooghy}@ce.sharif.eu, aza@ipm.ir a Abstract

More information

Design of Policy-Aware Differentially Private Algorithms

Design of Policy-Aware Differentially Private Algorithms Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft

More information

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle

More information

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA Preprint, August 5, 2018. 1 All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA Mikhail Ivanov, Frerik Brännström, Alexanre Graell i Amat, an Petar Popovski Department of Signals an Systems,

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information

2-connected graphs with small 2-connected dominating sets

2-connected graphs with small 2-connected dominating sets 2-connecte graphs with small 2-connecte ominating sets Yair Caro, Raphael Yuster 1 Department of Mathematics, University of Haifa at Oranim, Tivon 36006, Israel Abstract Let G be a 2-connecte graph. A

More information

Reformulation and Solution Algorithms for Absolute and Percentile Robust Shortest Path Problems

Reformulation and Solution Algorithms for Absolute and Percentile Robust Shortest Path Problems > REPLACE THIS LINE WITH YOUR PAPER IENTIFICATION NUMBER (OUBLE-CLICK HERE TO EIT) < 1 Reformulation an Solution Algorithms for Absolute an Percentile Robust Shortest Path Problems Xuesong Zhou, Member,

More information

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT

More information

Fuzzy Clustering in Parallel Universes

Fuzzy Clustering in Parallel Universes Fuzzy Clustering in Parallel Universes Bern Wisweel an Michael R. Berthol ALTANA-Chair for Bioinformatics an Information Mining Department of Computer an Information Science, University of Konstanz 78457

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

Optimal Distributed P2P Streaming under Node Degree Bounds

Optimal Distributed P2P Streaming under Node Degree Bounds Optimal Distribute P2P Streaming uner Noe Degree Bouns Shaoquan Zhang, Ziyu Shao, Minghua Chen, an Libin Jiang Department of Information Engineering, The Chinese University of Hong Kong Department of EECS,

More information

Improving Performance of Sparse Matrix-Vector Multiplication

Improving Performance of Sparse Matrix-Vector Multiplication Improving Performance of Sparse Matrix-Vector Multiplication Ali Pınar Michael T. Heath Department of Computer Science an Center of Simulation of Avance Rockets University of Illinois at Urbana-Champaign

More information

ACE: And/Or-parallel Copying-based Execution of Logic Programs

ACE: And/Or-parallel Copying-based Execution of Logic Programs ACE: An/Or-parallel Copying-base Execution of Logic Programs Gopal GuptaJ Manuel Hermenegilo* Enrico PontelliJ an Vítor Santos Costa' Abstract In this paper we present a novel execution moel for parallel

More information

Fast Fractal Image Compression using PSO Based Optimization Techniques

Fast Fractal Image Compression using PSO Based Optimization Techniques Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting

More information

Additional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication

Additional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Aitional Divie an Conquer Algorithms Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Divie an Conquer Closest Pair Let s revisit the closest pair problem. Last

More information

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember 107 IEICE TRANS INF & SYST, VOLE88 D, NO5 MAY 005 LETTER An Improve Neighbor Selection Algorithm in Collaborative Filtering Taek-Hun KIM a), Stuent Member an Sung-Bong YANG b), Nonmember SUMMARY Nowaays,

More information

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural

More information

A Plane Tracker for AEC-automation Applications

A Plane Tracker for AEC-automation Applications A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

Algebraic transformations of Gauss hypergeometric functions

Algebraic transformations of Gauss hypergeometric functions Algebraic transformations of Gauss hypergeometric functions Raimunas Viūnas Faculty of Mathematics, Kobe University Abstract This article gives a classification scheme of algebraic transformations of Gauss

More information

Modifying ROC Curves to Incorporate Predicted Probabilities

Modifying ROC Curves to Incorporate Predicted Probabilities Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,

More information

Parallel Directionally Split Solver Based on Reformulation of Pipelined Thomas Algorithm

Parallel Directionally Split Solver Based on Reformulation of Pipelined Thomas Algorithm NASA/CR-1998-208733 ICASE Report No. 98-45 Parallel Directionally Split Solver Base on Reformulation of Pipeline Thomas Algorithm A. Povitsky ICASE, Hampton, Virginia Institute for Computer Applications

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

Considering bounds for approximation of 2 M to 3 N

Considering bounds for approximation of 2 M to 3 N Consiering bouns for approximation of to (version. Abstract: Estimating bouns of best approximations of to is iscusse. In the first part I evelop a powerseries, which shoul give practicable limits for

More information

Efficient AND/OR Search Algorithms for Exact MAP Inference Task over Graphical Models

Efficient AND/OR Search Algorithms for Exact MAP Inference Task over Graphical Models Efficient AND/OR Search Algorithms for Exact MAP Inference Task over Graphical Models Akihiro Kishimoto IBM Research, Ireland Joint work with Radu Marinescu and Adi Botea Outline 1 Background 2 RBFAOO

More information

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Overlap Interval Partition Join

Overlap Interval Partition Join Overlap Interval Partition Join Anton Dignös Department of Computer Science University of Zürich, Switzerlan aignoes@ifi.uzh.ch Michael H. Böhlen Department of Computer Science University of Zürich, Switzerlan

More information

Inuence of Cross-Interferences on Blocked Loops: to know the precise gain brought by blocking. It is even dicult to determine for which problem

Inuence of Cross-Interferences on Blocked Loops: to know the precise gain brought by blocking. It is even dicult to determine for which problem Inuence of Cross-Interferences on Blocke Loops A Case Stuy with Matrix-Vector Multiply CHRISTINE FRICKER INRIA, France an OLIVIER TEMAM an WILLIAM JALBY University of Versailles, France State-of-the art

More information

Secure Network Coding for Distributed Secret Sharing with Low Communication Cost

Secure Network Coding for Distributed Secret Sharing with Low Communication Cost Secure Network Coing for Distribute Secret Sharing with Low Communication Cost Nihar B. Shah, K. V. Rashmi an Kannan Ramchanran, Fellow, IEEE Abstract Shamir s (n,k) threshol secret sharing is an important

More information

Pairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11:

Pairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11: airwise alignment using shortest path algorithms, Gunnar Klau, November 9,, : 3 3 airwise alignment using shortest path algorithms e will iscuss: it graph Dijkstra s algorithm algorithm (GDU) 3. References

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Linus Svärm Petter Stranmark Centre for Mathematical Sciences, Lun University {linus,petter}@maths.lth.se Abstract Shift-map image processing is a new framework base on energy

More information

A Stochastic Process on the Hypercube with Applications to Peer to Peer Networks

A Stochastic Process on the Hypercube with Applications to Peer to Peer Networks A Stochastic Process on the Hypercube with Applications to Peer to Peer Networs [Extene Abstract] Micah Aler Department of Computer Science, University of Massachusetts, Amherst, MA 0003 460, USA micah@cs.umass.eu

More information

Estimating Velocity Fields on a Freeway from Low Resolution Video

Estimating Velocity Fields on a Freeway from Low Resolution Video Estimating Velocity Fiels on a Freeway from Low Resolution Vieo Young Cho Department of Statistics University of California, Berkeley Berkeley, CA 94720-3860 Email: young@stat.berkeley.eu John Rice Department

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

A Model for the Expected Running Time of Collision Detection using AABB Trees

A Model for the Expected Running Time of Collision Detection using AABB Trees Eurographics Symposium on Virtual Environments (26) Roger Hubbol an Ming Lin (Eitors) A Moel for the Expecte Running Time of Collision Detection using AABB Trees Rene Weller2 an Jan Klein an Gabriel Zachmann2

More information

Chalmers Publication Library

Chalmers Publication Library Chalmers Publication Library All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA This ocument has been ownloae from Chalmers Publication Library (CPL). It is the author s version of a work

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.

More information

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao

More information

Just-In-Time Software Pipelining

Just-In-Time Software Pipelining Just-In-Time Software Pipelining Hongbo Rong Hyunchul Park Youfeng Wu Cheng Wang Programming Systems Lab Intel Labs, Santa Clara What is software pipelining? A loop optimization exposing instruction-level

More information

The Journal of Systems and Software

The Journal of Systems and Software The Journal of Systems an Software 83 (010) 1864 187 Contents lists available at ScienceDirect The Journal of Systems an Software journal homepage: www.elsevier.com/locate/jss Embeing capacity raising

More information

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks Optimal Routing an Scheuling for Deterministic Delay Tolerant Networks Davi Hay Dipartimento i Elettronica olitecnico i Torino, Italy Email: hay@tlc.polito.it aolo Giaccone Dipartimento i Elettronica olitecnico

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

CS350 - Exam 4 (100 Points)

CS350 - Exam 4 (100 Points) Fall 0 Name CS0 - Exam (00 Points).(0 points) Re-Black Trees For the Re-Black tree below, inicate where insert() woul initially occur before rebalancing/recoloring. Sketch the tree at ALL intermeiate steps

More information

Ad-Hoc Networks Beyond Unit Disk Graphs

Ad-Hoc Networks Beyond Unit Disk Graphs A-Hoc Networks Beyon Unit Disk Graphs Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 8092 Zurich, Switzerlan {kuhn, wattenhofer, zollinger}@inf.ethz.ch ABSTRACT

More information

Open Access Adaptive Image Enhancement Algorithm with Complex Background

Open Access Adaptive Image Enhancement Algorithm with Complex Background Sen Orers for Reprints to reprints@benthamscience.ae 594 The Open Cybernetics & Systemics Journal, 205, 9, 594-600 Open Access Aaptive Image Enhancement Algorithm with Complex Bacgroun Zhang Pai * epartment

More information

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Positions, Iterators, Tree Structures and Tree Traversals. Readings - Chapter 7.3, 7.4 and 8

Positions, Iterators, Tree Structures and Tree Traversals. Readings - Chapter 7.3, 7.4 and 8 Positions, Iterators, Tree Structures an Reaings - Chapter 7.3, 7.4 an 8 1 Positional Lists q q q q A position acts as a marker or token within the broaer positional list. A position p is unaffecte by

More information