Lazy Updates: An Efficient Technique to Continuously Monitoring Reverse knn

Size: px
Start display at page:

Download "Lazy Updates: An Efficient Technique to Continuously Monitoring Reverse knn"

Transcription

1 Lazy Updates: An Effiient Tehniue to Continuously onitoring Reverse k uhammad Aamir Cheema, Xuemin Lin, Ying Zhang, Wei Wang, Wenjie Zhang The University of ew South Wales, Australia ICTA, Australia {maheema, lxue, yingz, weiw, zhangw}@se.unsw.edu.au ABSTRACT In this paper, we study the problem of ontinuous monitoring of reverse k nearest neighbor ueries. Existing ontinuous reverse nearest neighbor monitoring tehniues are sensitive towards objets and ueries movement. For example, the results of a uery are to be reomputed whenever the uery hanges its loation. We present a framework for ontinuous reverse k nearest neighbor ueries by assigning eah objet and uery with a retangular safe region suh that the expensive reomputation is not reuired as long as the uery and objets remain in their respetive safe regions. This signifiantly improves the omputation ost. As a by-produt, our framework also redues the ommuniation ost in lient-server arhitetures beause an objet does not report its loation to the server unless it leaves its safe region or the server sends a loation update reuest. We also ondut a rigid ost analysis to guide an effetive seletion of suh retangular safe regions. The extensive experiments demonstrate that our tehniues outperform the existing tehniues by an order of magnitude in terms of omputation ost and ommuniation ost. 1. ITRODUCTIO Given a uery point, a reverse k nearest neighbor (Rk) uery retrieves all the data points that have as one of their k nearest neighbors. Throughout this paper, we use R ueries to refer to Rk ueries for whih k = 1. We give a more formal definition of the Rk problem in Setion. Consider the example of Fig. 1 where the nearest neighbor (the losest objet) of is o 1. However, it is not the R of beause the losest point of o 1 is not. The Rs of are o 3 and o. R has reeived onsiderable attention [1, 16, 1, 1, 1, 17, 19, 6,, 1] from database researh ommunity based on the appliations suh as deision support, loation based servie, resoure alloation, profile-based management, et. With the availability of inexpensive mobile devies, position loators and heap wireless networks, loation based Xuemin Lin is supported by Australian Researh Counil Disovery Grants (DP9877, DP8813, DP98773 and DP6668) and Google Researh Award. Wei Wang is supported by ARC Disovery Projets DP98773 and DP Permission to opy without fee all or part of this material is granted provided that the opies are not made or distributed for diret ommerial advantage, the VLDB opyright notie and the title of the publiation and its date appear, and notie is given that opying is by permission of the Very Large Data Base Endowment. To opy otherwise, or to republish, to post on servers or to redistribute to lists, reuires a fee and/or speial permission from the publisher, AC. VLDB 9, August -8, 9, Lyon, Frane Copyright 9 VLDB Endowment, AC ----//. servies are gaining inreasing popularity. An example of suh loation based servies is zhiing 1. Consider that a user needs a taxi and she sends her loation to a taxi ompany s dispath enter. The ompany notifies to a taxi for whih she is the losest passenger (the taxi is R of the user). o o o 1 o 3 Figure 1: o 3 and o are Rs of Other examples of loation based servies inlude loation based games, traffi monitoring, loation based SS advertising, enhaned 911 servies and army strategi planning et. These appliations may reuire ontinuous monitoring of reverse nearest moving objets. For instane, in reality games (e.g., BotFighters, Swordfish), players with mobile devies searh for other mobile devies in neighborhood. For example, in the award winning game BotFighters, a player gets points by shooting other nearby players via mobiles. In suh an appliation, some players may want to ontinuously monitor her reverse nearest neighbors in order to avoid being shot by other players. In the sea-battlefield, a warship may register a ontinuous R uery to monitor other warships that might seek assistanes from it and then may ontat them from time to time. Driven by suh appliations, the ontinuous monitoring of reverse nearest neighbors has been investigated and several tehniues have been proposed reently [1, 9,, ] in the light of loation-based servies. The existing ontinuous monitoring tehniues [1, 9,, ] adopt two frameworks based on different appliations. In [1], the veloity of eah objet is assumed to be expliitly expressed while [9,, ] deal with a general situation where the objet veloities may be impossible to be expliitly expressed. In this paper, our researh is based on the general situation; that is, objet veloities are not expliitly expressible. The tehniues in [9,, ] adopt a two-phase omputation. In the filtering phase, objets are pruned by using the existing pruning paradigms from [16, 17] and the remaining objets are onsidered as the andidate objets. In the verifiation phase, every andidate objet for whih the uery is its losest point is reported as the R. To update the results, at eah time-stamp, if the set of andidate objets is deteted to be unhanged then only the verifiation phase is alled to verify the results. evertheless, both the filtering and verifiation phases are reuired if one of the andidate objets hanges its loation or other objets 1

2 move into the andidate region. Similarly, a set of andidate objets is needed to be re-omputed (reall filtering) if the uery hanges its loation. Previous tehniues [9,, ] reuire expensive filtering if a uery or any andidate objet hanges its loation. Our initial experiment results show that the ost of verifiation phase is muh lower than the ost of filtering phase. In our tehniue, we assign eah uery and objet a safe region (a retangular area). The filtering phase for a uery is not reuired as long as the uery and its andidate objets remain in their orresponding safe regions. This signifiantly redues the omputation time of ontinuously monitoring Rk ueries. As a by-produt, our proposed framework also signifiantly redues the ommuniation ost in a lient-server arhiteture. In the existing tehniues, every objet reports its loation to the server at every time-stamp regardless whether uery results will be affeted or not. Conseuently, suh a omputation model reuires transmission of a large number of loation updates; doing this has a diret impat on the wireless ommuniation ost and power onsumption - the most preious resoures in mobile environment [7]. In our framework, eah moving objet reports its loation update only when it leaves the region. This signifiantly saves the ommuniation osts. Sine we hoose a simple safe region shape (a retangle), our framework an be easily integrated with the work in [7] to develop a safe region based system that supports Rk, range and k ueries Contributions. Below, we summarize our ontributions: 1. We present a framework for ontinuously monitoring R together with a novel set of effetive pruning and effiient inrement omputation tehniues. It not only redues the total omputation ost of the system but also redues the ommuniation ost.. We extend our algorithm for the ontinuous monitoring of Rk. Our algorithm an be used to monitor both mono-hromati and bihromati Rk (to be formally defined in Setion.1). 3. We provide a rigid analysis of the relationship between the omputation/ommuniation osts and the safe regions. This also guides us to effetively selet the safe regions.. Our extensive experiments demonstrate that the developed tehniues outperform the previous algorithms by an order of magnitude in terms of omputation ost and ommuniation ost. The remaining of the paper is organized as follows. In Setion, we give the problem statement, related work and motivation. Setion 3 presents the framework of our tehniues and a set of novel pruning tehniues. Setion presents our tehniues for ontinuously monitoring R ueries, as well as a rigid ost analysis. Setion gives the extension of our tehniues to multidimensional spae, to Rk, and to Bihromati Rk. The experiment results are reported in Setion 6. Setion 7 onludes the paper.. BACKGROUD IFORATIO.1 Problem Definition There are two types of Rk ueries [1] namely, monohromati and bihromati Rk ueries. Below we define both. onohromati Rk uery: Given a set of multidimensional points P and a point P, a monohromati Rk uery retrieves points p P, dist(p,) dist(p,p k ) where dist is a distane metri that is assumed to be Eulidean distane in this paper, and p k is the kth nearest point to p in P {}. ote that, in suh ueries, both the data objets and the uery objets belong to the same lass of objets. Consider an example of the reality game BotFighters, where a player issues a uery to find other players for whom she is the losest person. Bihromati Rk uery: Given two sets O and P eah ontaining different types of objets, a bihromati Rk uery for a point O is to retrieve every objet p P suh that dist(p,) dist(p, o k ) where o k is the kth nearest point of p in O {}. In ontrast to monohromati ueries, the uery and data objets belong to two different lasses. Consider the example of a battlefield where a medial unit might issue a bihromati R uery to find the wounded soldiers for whom it is the losest medial unit.. Related Work First, we present pruning tehniues for snapshot R ueries. Snapshot R ueries report the results only one and do not reuire ontinuous monitoring. Snapshot R Queries: Korn et al. [1] were first to study R ueries. They answer R uery by prealulating a irle for eah data objet p suh that the nearest neighbor of p lies on the perimeter of the irle. R of a uery are the points that ontain in its irle. Tehniues to improve their work were proposed in [, 1]. g d S 3 e 6 o b S 6o a S 1 S S S 6 f g d S 3 e b S a S 1 S S S 6 Figure : Six-regions Figure 3: Filtering and pruning verifiation First work that does not need any pre-omputation was presented by Stanoi et al. [16]. They solve R ueries by partitioning the whole spae entred at the uery into six eual regions of 6 eah (S 1 to S 6 in Fig. ). It an be proved that only the nearest point to in eah partition an possibly be the R. This also means that, in twodimensional spae, there are at most six possible Rs of a uery. Consider the region S 3 where is the nearest objet to and d annot be the R beause its distane to is smaller than its distane to. This an be proved by the triangle d where d 6 and d 6, hene dist(d,) dist(d,). Fig. 3 shows the area (shown shaded) that annot ontain R of. In filtering phase, the andidate R objets (a, b,, e and f in our example) are seleted by issuing nearest neighbor ueries in eah region. In verifiation phase, any andidate objet for whih is its nearest neighbor is reported as R (a and f). In this paper, we all this approah six-regions pruning approah. Tao et al. [17] use the property of perpendiular bisetors to answer Rk ueries. Consider the example of Fig., where a bisetor between and is shown that divides the f

3 spae into two half-spaes (the shaded half-spae and the white half-spae). Any point that lies in the shaded halfspae H : is always loser to than to and annot be the R for this reason. Their algorithm prunes the spae by the half-spaes drawn between and its neighbors in the unpruned region. Fig. shows the example where half-spaes between and a, and f (H a:, H : and H f:, respetively) are shown and the shaded area is pruned. Then, the andidate objets (a, and f) are verified as Rs if is their losest objet. We all this approah half-spae pruning approah. It is shown in [17] that the half-spae pruning is more powerful than the six-regions pruning and it prunes larger area (ompare the shaded areas of Fig. 3 and Fig. ). d g e H : b f a d H : g e b f a H a: Figure : Half-spae Figure : Filtering and pruning verifiation Wu et. al [1] propose an algorithm for Rk ueries in d-spae. Instead of using bisetors to prune the objets, they use a onvex polygon obtained from the intersetion of the bisetors. Any objet that lies outside the polygon an be pruned. Continuous R Queries: Computation-effiient monitoring of ontinuous range ueries [, 11], nearest neighbor ueries [13, 7, 3, 8, 18] and reverse nearest neighbor ueries [1,, 9, ] has reeived signifiant attention. Although there exists work on ommuniation-effiient monitoring of range ueries [7] and nearest neighbor ueries [7, 1], there is no prior work that redues the ommuniation ost for ontinuous R ueries. Below, we briefly desribe the R monitoring algorithms that improve the omputation ost. Benetis et al. [1] presented the first ontinuous R monitoring algorithm. However, they assume that veloities of the objets are known. First work that does not assume any knowledge of objets motion patterns was presented by Xia et al. []. Their proposed solution is based on the six-regions approah. Kang et al. [9] proposed a ontinuous monitoring R algorithm based on the half-spae pruning approah. Consider the examples of Fig. 3 and Fig., the results of the R uery may hange in any of the following three senarios: H f: 1. the uery or one of the andidate objets hanges its loation. the nearest neighbor of a andidate objet is hanged (an objet enters or leaves the irles shown in Fig. 3 and Fig. ) 3. an objet moves into the unpruned region (the areas shown in white in Fig. 3 and Fig. ) Xia et al. [] use this observation and propose a solution for ontinuous R ueries based on the six-regions approah. They answer R ueries by monitoring six pieregions (the white areas in Fig. 3) and the irles around the andidate objets that over their nearest neighbors. Kang et al. [9] use the same observation and propose a solution based on the half-spae pruning approah. They ontinuously monitor R ueries by monitoring the unpruned region (white area in Fig. ) and the irles around the andidate objets that over their nearest neighbors. Both the approahes use a grid struture to store the loations of the objets and ueries. They mark the ells of the grid that lie or overlap with the area to be monitored. Any objet movement in these ells triggers the update of the results. To the best of our knowledge, there exists only one solution for ontinuous monitoring of Rk ueries [] whih is similar to the six-regions based R monitoring presented in []. Wu et al. [] issue k nearest neighbor (k) ueries in eah region instead of single nearest neighbor ueries. The ks in eah region are the andidate objets and they are verified if is one of their k losest objets. To monitor the results, for eah andidate objet, they ontinuously monitor the irle around it that ontains k nearest neighbors. It is important to note that the problem of Rk ueries is different from all-nearest neighbor ueries [] where nearest neighbors of every objet in a given dataset is to be found from another dataset..3 otivation Both the six-regions and the half-spae based solutions have two major limitations. 1. As illustrated in the three senarios presented in the previous setion, the existing tehniues are sensitive to objet movement. If a uery or any of its andidate objets hanges its loation, filtering phase is alled again whih is omputationally expensive. For example, if a uery is ontinuously moving, at eah timestamp both of the approahes will have to ompute the results from srath. For example, in the half-spae based approah, the half-spaes between and its previous andidates are redrawn and the pruning area is adjusted. In our initial experiments, we find that the ost of redrawing the half-spaes (and marking and unmarking the relevant ells) is omputationally almost as expensive as the initial omputation of the results.. The previous tehniues reuire every objet to report its exat loation to the server at every timestamp regardless whether it affets the uery result or not. This has a diret impat on the two most preious resoures in mobile environment, wireless ommuniation ost and power onsumption. Ideally, only the objets that affet the uery results should report their loations. For example, in Fig., as long as objets d, e and g do not enter into the white region or the three irles, they do not affet the results of the uery. otivated by these, we present a framework that provides a omputation and ommuniation effiient solution. ote that, in some appliations, the lients may have to periodially report their loations to the server for other types of ueries. In this ase, saving the ommuniation ost is not possible. evertheless, our framework signifiantly redues the omputation osts for suh appliations. 3. FRAEWORK Eah moving objet and uery is assigned a safe region of a retangular shape. Although other simple shapes (e.g., In rest of the paper, we present our tehniue assuming that the lients send their loations only for the Rk uery. For the ase when the lients periodially send their loations for other types of ueries, our tehniues an be easily applied. The only hange is that the safe regions are stored on the server whih ignores the loation updates from the objets that are still in their safe regions. Experiments show superiority of our approah for both of the ases.

4 irles) ould be used as safe regions, we hoose the safe region of a retangular shape mainly beause defining effetive pruning rules is easier for the retangular safe regions. The lients may use their motion patterns to assign themselves better safe regions. However, we assume that suh information is not utilized by the lients or the server beause we do not assume any knowledge about the motion pattern of the objets. In our framework, the server reommends the side lengths of the safe regions (a system parameter) to the lients. A lient assigns itself a new safe region suh that it lies at the enter of the safe region. An objet reports its loation to the server only when it moves out of its safe region. Suh updates issued by the lients (objets) are alled soure-initiated updates [7]. In order to update the results, the server might need to know the exat loation of an objet that is still in its safe region. The server sends a reuest to suh objet and updates the results after reeiving its exat loation. Suh updates are alled server-initiated updates [7]. If an objet stops moving (e.g., a ar is parked), it notifies the server and the server redues its safe region to a point until it starts moving again. In the previous approahes [, 9], the pruned area beomes invalid if the uery point hanges its loation. On the other hand, in our framework, the uery is also assigned with a safe region and the pruned area remains valid as long as the uery and its andidate objets remain in their respetive safe regions and no other objet enters in the unpruned region. Although the uery is also assigned with a safe region, it reports its loation at every timestamp. This is beause its loation is important to ompute the exat results and a server-initiated update would be reuired (in most of the ases) if it does not report its loation itself. oreover, the number of ueries in the system is usually muh smaller than the number of objets. Hene, the loation updates by the ueries do not have signifiant effet on the total ommuniation ost. Table 1 defines the notations used throughout this paper. otation Definition B x: a perpendiular bisetor between point x and H x: a half-spae defined by B x: ontaining point x H :x a half-spae defined by B x: ontaining point H a:b H :d intersetion of the two half-spaes A[i] value of a point A in the i th dimension maxdist(x, y) maximum distane between x and y (eah of x and y is either a point or a retangle) mindist(x, y) minimum distane between x and y (eah of x and y is either a point or a retangle) R fil, R nd, R retangular region of the filtering objet, andidate objet and uery, respetively R H [i] highest oordinate value of a retangle R in i th dimension R L [i] lowest oordinate value of a retangle R in i th dimension Table 1: otations Like existing work on ontinuous spatial ueries [13, 9, ], we assume that the errors due to the measuring euipments are insignifiant and an be ignored. Our ontinuous monitoring algorithm onsists of the following two phases. Initial omputation: When a new uery is issued, the server first omputes the set of andidate objets by applying pruning rules presented in Setion 3.1. This phase is alled filtering phase. Then, for eah andidate objet, the server verifies it as Rk if the uery is one of its k losest points. This phase is alled verifiation phase. Continuous monitoring: The server maintains the set of andidate objets throughout the life of a uery. Upon reeiving loation updates, the server updates the andidate set if it is affeted by some loation updates. Otherwise, the server alls verifiation module to verify the andidate objets and reports the results. 3.1 Pruning Rules To the best of our knowledge, we are first to present novel pruning rules for R ueries that an be applied when loations of the objets are unknown within their retangular regions. These pruning rules an also be applied on the minimum bounding retangles of the spatial objets that have irregular shapes (in ontrast to the assumption that the spatial objets are points). In Setion, we extend the pruning rules for Rk ueries. In this setion, an objet that is used for pruning other objets is alled a filtering objet and the objet that is being onsidered for pruning is alled a andidate objet Half-spae Pruning First, we present the hallenges in defining this pruning rule by giving an example of a simpler ase where the exat loation of a filtering objet p is known but the exat loation of is not known on a line (shown in Fig. 6). Any objet x annot be the R of if mindist(x, ) dist(x, p) where mindist(x, ) is the minimum distane of x from the line. Hene, the boundary that defines the pruned area onsists of every point x that satisfies mindist(x, ) = dist(x, p). ote that for any point x in the spae on the right side of the line L, mindist(x, ) = dist(x,). Hene, in the spae on the right side of the line L, the bisetor between p and the point satisfies the euation of the boundary (beause for any point x on this bisetor dist(x, ) = dist(x, p)). Similarly, on the left side of L, the bisetor between p and satisfies the ondition. In the area between L and L, a parabola (shown in Fig. 6) satisfies the euation of the boundary. Hene the shaded area defined by the two half-spaes and the parabola an be pruned. ote that the intersetion of half-spaes H p: and H p: does not define the area orretly. As shown in Fig. 6, a point p lying in this area may be loser to than to the point p. H p: L parabola p' L H p: Figure 6: The exat loation of the point on line is not known p H p: L B L A p H p: Figure 7: Approximation of parabola by a line Unfortunately, the pruning of the shaded area may be expensive due to presene of the parabola. One solution is to approximate the parabola by a line AB where A is the intersetion of H p: and L and B is the intersetion of H p: and L. Fig. 7 shows the line AB and the pruned area is shown shaded. Another solution is to move the half-spaes H p: and H p: suh that both pass through a point that satisfies mindist(, ) dist(, p) (e.g., any point lying in the shaded area of Fig. 6). This approximation of the pruning area is tighter if the point lies on the boundary. Fig. 8 shows the half-spaes H p: and H p: moved to suh point.

5 A half-spae that is moved is alled normalized half-spae and a half-spae H p: that is moved is denoted as H p:. Fig. 8 shows the normalized half-spaes H p: and H p: and their intersetion an be pruned (the shaded area). Among the two possible solutions disussed above, we hoose normalized half-spaes in developing our pruning rules for the following reason. In our relatively simple example, the number of half-spaes reuired to prune the area by using the normalized half-spaes is two (in ontrast to three lines for the other solution). The differene between this number beomes signifiant when both the uery and the filtering objet are represented by retangles espeially in multidimensional spae. This makes the pruning by normalized half-spaes a less expensive hoie. ow, we present our pruning rule that defines the pruned area by using two half spaes in two dimensional spae and d half-spaes for d-dimensional spae when d >. This pruning rule uses the normalized half-spaes between d seleted orners of the two retangles to prune the spae. Below, we give a formal desription of our pruning rule in d dimensional spae. Then, we briefly desribe the reason of its orretness in two dimensional spae. First, we define the following onepts: Antipodal Corners Let C be a orner of retangle R1 and C be a orner in R, the two orners are alled antipodal orners 3 if for every dimension i where C[i] = R1 L[i] then C [i] = R H[i] and for every dimension j where C[j] = R1 H[j] then C [j] = R L[j]. For example, in two dimensional spae, a lower-left orner of R1 is the antipodal orner of the upper-right orner of R. Fig. 9 shows two retangles R1 and R. The orners B and are two antipodal orners. Similarly, other pairs of antipodal orners are (D, O), (C, ) and (A, P). Antipodal Half-Spae A half-spae that is defined by the bisetor between two antipodal orners is alled antipodal half-spae. Fig. 9 shows two antipodal half-spaes H :B and H O:D. H p: H p: H p: p H p: Figure 8: Defining pruned region by moving half-spaes C D B H :B R 1 A P O H :B R H O:D H O:D Figure 9: Antipodal orners and normalized half-spaes ormalized Half-Spae Let B and be two points in hyper-retangles R1 and R, respetively. The normalized half-spae H :B is a spae defined by the bisetor between and B that passes through a point suh that [i] = (R1 L[i]+R L[i])/ for all dimensions i for whih B[i] > [i] and [j] = (R1 H[i]+R H[j])/ for all dimensions j for whih B[j] [j]. Fig. 9 shows two normalized (antipodal) halfspaes H :B and H O:D. The point for the two half-spae is also shown. The ineualities (1) and () define the half-spae H :B and its normalized half-spae H :B, respetively. dx (B[i] [i]) x[i] < i=1 dx i=1 (B[i] [i])(b[i] + [i]) 3 R L[i] (R H[i]) is the lowest (highest) oordinate of a hyperretangle R in i th dimension (1) dx (B[i] [i]) x[i] < i=1 8 (R1 L[i] + R L[i]) dx ><, if B[i] > [i] (B[i] [i]) i=1 >: (R1 H[i] + R H[i]), otherwise () ote that the right hand side of the Euation (1) annot be smaller than the right hand side of Euation (). For this reason H B H B. ow, we present our pruning rule. Pruning Rule 1 : Let R and R fil be the retangular regions of the uery and a filtering objet p, respetively. For any point p that lies in T d i=1 H C i :C i, mindist(p, R ) > maxdist(p, R fil ) where H C i :C i is normalized half-spae between C i (the i th orner of the retangle R fil ) and its antipodal orner C i in R. Hene p an be pruned. C D B R H :C A H :B P O R fil H P:A H O:D Figure 1: Pruning area of half-spae pruning and dominane pruning A D R H P:A B C 1 R fil H :B H :C O P H O:D Figure 11: Any point in shaded area annot be R of Fig. 1 shows an example of the half-spae pruning where the four normalized antipodal half-spaes define the pruned region (the area shown shaded). The proof of orretness is non-trivial and is given in our tehnial report (Lemma ) [3]. Below, we present the intuitive justifiation of the proof. Intuitively (as in example of Fig. 8), if we draw all possible half-spaes between all points of R and R fil and move them to a point for whih mindist(, R ) maxdist(,r fil ), then the intersetion of these half-spaes orretly approximates the pruned region. Also note that in two dimensional spae, at most two normalized spaes define suh area. Consider the example of Fig. 1, where only H O:D and H :B define the pruned region (the reason is that these two have largest and smallest slopes among all other possible halfspaes). In fat, the antipodal orners are defined suh that the half-spaes having largest and smallest slopes are among the four antipodal half-spaes. oreover, the point shown in Fig. 1 satisfies mindist(, R ) = maxdist(,r fil ) beause normalized half-spaes are defined suh that lies at the middle of the line that joins the orners A and. Hene the four normalized antipodal half-spaes orretly approximate the pruned region. For ease of explanation, in Fig. 1, we have shown an example where the two retangles R and R fil do not overlap eah other in any dimension. If the two retangles overlap eah other in any dimension (as in Fig. 11), the four half-spaes do not meet at the same point. In Fig. 11, H O:D and H P:A are moved to 1 and H :C and H :B are moved to point. However, it an be verified by alulating the intersetion that the half-spaes that define the pruned region (H :B and H P:A) meet at a point that satisfies mindist(, R ) maxdist(,r fil ).

6 3.1. Dominane Pruning We first give the intuition behind this pruning rule. Consider the example of Fig. 1 again. The normalized halfspaes are defined suh that if R fil and R do not overlap eah other in any dimension then all the normalized antipodal half-spaes meet at same point. We also observe that the angle between the half-spaes that define the pruned area (shown in grey) is always greater than 9. Based on these observations, it an be verified that the spae dominated by (the dotted-shaded area) an be pruned. Formal proof is given in our tehnial report (Lemma 6) [3]. 1 R n 3 F p R fil f R nd R R R nd Figure 1: Shaded areas Figure 13: R nd an be an be pruned pruned by R 1 and R Let R be the retangular region of. We an obtain the d regions as shown in Fig. 1. Let R fil be the retangular region of a filtering objet that lies ompletely in one of the d regions. Let f be the furthest orner of R fil from R and n be the nearest orner of R from f (as shown in region 1 of Fig. 1). A point F p that lies at the entre of the line joining f and n is alled a frontier point. Pruning Rule : Any andidate objet p that is dominated by the frontier point F p of a filtering objet annot be R of. Fig. 1 shows four examples of dominane pruning (one in eah region). In eah partition, the shaded area is dominated by the frontier point of that partition and an be pruned. ote that if R fil overlaps R in any dimension, we annot use this pruning rule beause the normalized antipodal half-spaes in this ase do not meet at the same point. For example, the four normalized antipodal half-spaes interset at two points in Fig. 11. In general, the pruning power of this rule is less than that of the half-spae pruning. Fig. 1 shows the area pruned by the half-spae pruning (the shaded area) and dominane pruning (the dotted area). The main advantage of this pruning rule is that the pruning proedure is omputationally more effiient than the half-spae pruning, as heking the dominane relationship is easier etri Based Pruning Pruning Rule 3 : A andidate objet an be pruned if maxdist(r nd, R fil ) < mindist(r nd, R ) where R nd is the retangular region of the andidate objet. This pruning approah is the least expensive beause it reuires a simple distane omparison. Reall that the halfspae (or the dominane) pruning defines a region suh that any point p that lies in it is always loser to the filtering objet than to. etri based pruning heks this by a simple distane omparison. However, this does not mean that the metri based pruning has at least as muh pruning power as half-spae or dominane pruning. This is beause the half-spae and dominane pruning an trim the retangular region of a andidate objet that lies in the pruned R 1 region. It may lead to pruning of a andidate objet when more than one filtering objets are onsidered. Consider the example of Fig. 13, where two retangles R 1 and R of two filtering objets are shown. The retangle R nd annot be pruned when half-spae pruning is applied on R 1 or R alone. However, the retangle R nd an be pruned when both R 1 and R are onsidered. As in [17], we use loose trimming of the retangle by using trimming algorithm [6]. The trimming algorithm trims a part of the retangle that annot be pruned. First, R nd is pruned by the half-spaes of R 1 and the trimming algorithm trims the retangle that lies in the pruned region. The unpruned retangle R nd (shown with dotted shaded area) is returned. This remaining retangle ompletely lies in the area pruned by R so the andidate objet is pruned. ote that metri based pruning annot prune R nd. Also note that if the exat loation of a andidate objet is known (R nd is a point) and metri based pruning fails to prune the objet then half-spae pruning and dominane pruning also fail to prune the objet. Hene, half-spae pruning and dominane pruning are applied only when the exat loation of a andidate objet is not known Pruning if exat loation of uery is known If the exat loation of the uery or a filtering objet is known, previous pruning rules an be applied by reduing the retangles to points. However, a tighter pruning is possible if the exat loation of the uery is known. Below, we present a tighter pruning rule for suh ase. Pruning Rule : Let R fil be a hyper-retangle and be a uery point. For any point p that lies in T d i=1 HC i: (C i is the i th orner of R fil ), dist(p,) > maxdist(p,r fil ) and thus p annot be the R of. Proof. aximum distane between a retangle R fil and any point p is the maximum of distanes between p and the four orners, i.e., maxdist(p,r fil ) = max(dist(p,c i)) where C i is the i th orner of R fil. Any point p that lies in a half-spae H Ci : satisfies dist(p,) > dist(p, C i) for the orner C i of R fil. Hene a point p lying in T d i=1 HC i:, satisfies dist(p,) > maxdist(p,r fil ). H P: H : p' R fil O P H : H O: Figure 1: Half-spae pruning when exat loation of uery is known Consider the example of Fig. 1 that shows the half-spaes between and the orners of R fil. Any point that lies in the shaded area is loser to every point in retangle R fil than to. It is easy to prove that the pruned area is tight. In other words, any point p that lies outside the shaded area may possibly be the R of. Fig. 1 shows suh point p. Sine it does not lie in H P: it is loser to than to the orner P. Hene it may be the R of if the exat loation of the filtering objet is at orner P.

7 3.1. Integrating the pruning rules Algorithm 1 is the implementation of all the pruning rules. Speifially, we apply pruning rules in inreasing order of their omputational osts (i.e., metri based pruning, dominane pruning and then half-spae pruning). While simple pruning rules are not as restriting as more expensive ones, they an uikly disard many non-promising andidate objets and save the overall omputational time. Algorithm 1 : Prune(R, S fil, R nd ) Input: R : retangular region of ; S fil : a set of filtering objets ; R nd : the retangular region of andidate objet Output: returns true if R nd is pruned; otherwise, returns false Desription: 1: for eah R fil in S fil do : if maxdist(r nd, R fil ) < mindist(r, R nd ) then // Pruning rule 3 3: : return true if mindist(r nd, R fil ) > maxdist(r, R nd ) then : S fil = S fil R fil // R fil annot prune R nd 6: if exat loation of nd is known then 7: return false // the objet annot be pruned 8: for eah R fil in S fil do 9: if R fil is fully dominated by R in a partition P then // Pruning rule 1: trim the part of R nd that is dominated by F p 11: return true if R nd is pruned 1: return 13: for eah R fil in S fil do 1: Trim using half-spae pruning // Pruning rule 1 1: return true if R nd is pruned 16: return false Three subtle optimizations in the algorithm are: 1. As stated in Setion 3.1.3, if the exat loation of the andidate objet is known then only metri based pruning is reuired. So, we do not onsider dominane and half-spae pruning for suh andidates (line 7).. If mindist(r nd, R fil ) > maxdist(r, R nd ) for a given BR R fil, then R fil annot prune any part of R nd. Hene suh R fil is not onsidered for dominane and half-spae pruning (lines -). 3. If the frontier point F p1 of a filtering objet R fil1 is dominated by the frontier point F p of another filtering objet R fil, then F p1 an be removed from S fil beause the area pruned by F p1 an also be pruned by F p. However, note that a frontier point annot be used to prune its own retangle. Therefore, before deleting F p1, we use it to prune the retangle belonging to F p. This optimization redues the ost of dominane pruning.. COTIUOUS R OITORIG In this setion, we present our R monitoring algorithm alled (Swift And Cheap) due to its omputational effiieny and ommuniation ost saving..1 Data Struture Our system has an objet table and a uery table. Objet table (uery table) stores the id and the retangular region for eah objet (uery). In addition, the uery table stores a set of andidate objets S nd for eah uery. ain-memory omputation is the main paradigm in online/real-time uery proessing [13, 9, ]. Grid struture is preferred when updates are intensive [13] beause omplex data strutures (e.g., R-tree, Quad-tree) are expensive to update. For this reason, we hoose grid-based data struture to store the loations and retangular regions of moving objets and ueries. Eah ell ontains two lists: 1) objet list; ) influene list. Objet list of a ell ontains objet id of every objet whose retangular region overlaps the ell. This list is used to identify the objets that may be loated in this ell. Influene list of a ell ontains uery ids of all ueries for whih this ell lies in (or overlaps with) the unpruned region. The intuition is that if an objet moves into this ell, we know that the ueries in the influene list of this ell are affeted. Range ueries and onstrained ueries (nearest neighbors in onstrained region) are issued to ompute Rs of a uery (e.g., six onstrained nearest neighbor ueries are issued in the six-regions based approah). In our algorithm, we also need an algorithm to searh the nearby objets in a onstrained area (the unpruned region). Several ontinuous nearest neighbors algorithms [7, 13, 3] based on grid-based index have been proposed. However, the extension of these grid-aess methods for ueries on onstrained area beomes ineffiient. i.e., the ells around ueries are retrieved even if they lie in the pruned region. To effiiently searh nearest neighbors in a onstrained area, we propose a grid-based aess method where the grid is treated as a oneptual tree. Intermediate entries Grid ells root Figure 1: Coneptual Figure 16: Illustration grid-tree of a grid of filtering phase Fig. 1 shows an example of the oneptual grid-tree of a grid. For a grid-based struture ontaining n n ells where n, the root of our oneptual grid-tree is a retangle that ontains all n n ells. Eah entry at l-th level of this grid-tree ontains (n l) (n l) ells (root being at level ). An entry at l-th level is divided into four eual non-overlapping retangles suh that eah suh retangle ontains (n l 1) (n l 1) ells. Any n-th level entry of the tree orresponds to one ell of the grid struture. Fig. 1 shows root entry, intermediate entries and the ells of grid. ote that the grid-tree does not exist physially, it is just a oneptual visualisation of the grid. The spatial ueries algorithms that an be applied on R- tree an easily be applied on the oneptual grid tree. The advantage of using this grid-tree over previously used gridbased aess methods is that if an intermediate entry of the tree lies in the pruned region, none of the ells inside it are aessed.. Initial Computation The initial omputation onsists of two phases namely filtering and verifiation. Below we disuss them in detail...1 Filtering In this phase (Algorithm ), the grid-tree is traversed to selet the andidate objets and these objets are stored in S nd. These andidate objets are also used to prune other objets. Initially, root entry of the grid-tree is inserted in a min-heap H. We try to prune every de-heaped entry e (line 6) by using the pruning rules presented in the previous setion. If e is a ell and annot be pruned, we insert the objets into heap that are in its objet list. Otherwise, if e o o R o1 o 6 o 3 o

8 is an intermediate entry of the grid-tree, we insert its four hildren into the heap H with key mindist(, R ). If e is an objet and is not pruned, we insert it into S nd. The algorithm stops when the heap beomes empty. Algorithm : Filtering 1: for eah uery do : S nd = φ 3: Initialize a min-heap H with root entry of Grid-Tree : while H is not empty do : de-heap an entry e 6: if (not Pruned(R, S nd, e)) then // Algorithm 1 7: if e is a ell in Grid then 8: for eah objet o in objet list of e do 9: insert o into H if not already inserted 1: else if e is an intermediate entry of grid-tree then 11: for eah of its four hildren do 1: insert into H with key mindist(, R ) 13: else if e is an objet then 1: S nd = S nd {e} Fig. 16 shows an example of the filtering phase. For better illustration, the grid is not shown. Objets are numbered in order of their proximity to. Algorithm iteratively finds the nearest objets and prunes the spae aordingly. In the example of Fig. 16, the algorithm first finds o 1 and prunes the spae. Sine the next losest objet o lies in the pruned spae, it is not onsidered and o 3 is seleted instead. The algorithm ontinues and retrieves o and o and the shaded area is pruned. The algorithm stops beause there is no other objet in the unpruned area (the white area). The retangles of the pruned objets are shown in broken lines. One important note is that in this phase, the all to pruning algorithm at line 6 does not onsider the exat loations of any objet or uery for pruning even if the exat loation is known. This is beause we want to find a set of andidate objets S nd suh that as long as all of them remain in their retangular regions and no other objet enters in the unpruned area, the set of andidate objets is not affeted. For example, the set of andidate objets {o 1, o 3, o, o } will not hange unless or any andidate objet moves out of its retangular region or any of the remaining objets (o and o 6) moves in the unpruned area (the white area). arking the ells in unpruned area: To uikly identify that an objet has moved into the unpruned area of a uery, eah ell that lies in the unpruned area is marked. ore speifially, is added in the influene list of suh ell. We mark these ells in a hierarhial way by using the grid-tree. For example, if an entry ompletely lies in the unpruned region, all the ells ontained by it are marked. The ells are unmarked similarly... Verifiation At this stage, we have a set of andidate objets S nd for eah uery. ow, we proeed to verify the objets. Sine every uery reports its loation to the server at every timestamp, we an use its loation to further refine its S nd. ore speifially, any objet o S nd annot be the R of for whih mindist(o, ) maxdist(o,o ) for any other o S nd. If the objet annot be pruned by this distane based pruning, we try to prune it by using pruning rule. For every uery, its andidate objets that annot be pruned are stored in a list S global. The server sends messages to every objet in S global for whih the exat loation is not known. The objets send their exat loations in response. For eah uery, the list of andidate objets is further refined by using these exat loations. As noted in [16], at this stage, the number of andidate objets for a uery annot be greater than six in two dimensional spae. We verify these andidate objets as follows. Algorithm 3 : Verifiation 1: Refine S nd using the exat loation of : Reuest objets in S nd to send their exat loations 3: Selet andidate objets based on exat loation of the objets : Verify andidate objets (at most six) by issuing boolean range ueries For a andidate objet o, we issue a boolean range uery [1] entered at o with range dist(o, ). In ontrast to the onventional range ueries, a boolean range uery does not return all the objets in the range. It returns true if an objet is found within the range, otherwise it returns false. Fig. 17 shows an example, where andidate objets are o 1 to o. The objet o 3 annot be the R beause o 6 (for whih we know the exat loation) is found within the range. Similarly, o annot be the R beause the retangular region of o 6 ompletely lies within the range. The objet o is onfirmed as R beause no objet is found within the range. The only andidate objet for whih the results is undeided is o 1 beause we do not know the exat loation of objet o whih may or may not lie within the range. The server needs its exat loation in order to verify o 1. For eah uery, the server ollets all suh objets. Then, it sends messages to all these objets and verifies all undeided andidate objets upon reeiving the exat loations. o 7 o 6 o 3 o o 6 Figure 17: Illustration of verifiation phase ote that, to ompute the results of all ueries, the server issues at most two reuest streams and reeives at most two response streams..3 Continuous onitoring The set of andidate objets S nd of a uery hanges only when the uery or one of the andidate objets leaves its retangular region or when any other objet enters into the unpruned region. If S nd is not affeted, we simply all the verifiation phase to update the results. Otherwise, we have to update S nd. One approah to update S nd is to prune the area using urrent retangular regions of and its andidate objets. Any objet that is found in the unpruned region is inluded in S nd. The ells that orrespond to the old unpruned regions are unmarked and the ells that lie in or overlap with the new region are marked. In our experiments, we found that this update of S nd and grid ells is almost as expensive as omputing the S nd from srath. Below, we show that if we hoose to ompute S nd from srath, we may save omputation ost in next timestamps. When a uery or one of its andidate objets leaves its retangular region, other andidate objets may also have moved and are likely to leave their regions in next few timestamps whih will trigger the expensive filtering phase again. o 1 o o

9 Sine we have to ommuniate with these andidate objets in verifiation phase anyway, we ask them to not only send their exat loations but also their new retangles. After reeiving these new retangular regions, we ompute the results of ueries as in initial omputation. ow all the andidate objets have new safe regions and the set of andidate objets is expeted to remain unhanged for longer. Suppose that an objet o is andidate for two ueries 1 and and S nd of 1 is affeted by a loation update of any other objet o. We annot ask o to update its retangular region beause it will affet S nd of uery as well. Hene, the server only asks an objet to update its retangular region if it does not affet other ueries.. Cost Analysis In this setion, we analyse the omputation and ommuniation ost for our proposed solution. First, we present a pruning rule based on six-regions approah and ompute the ommuniation ost. Then, we show that the pruning rules used in our tehniue are superior. Hene the ommuniation ost gives an upper bound. Then, we analyse the omputation ost. Assumptions: We assume that the system ontains objets in a unit spae (extent of the spae on both dimensions is from to 1). Eah retangular region is a suare and width of eah side is w. The enters of all retangular regions are uniformly distributed. Communiation ost: Consider the example of Fig. 18 where a 6 region bounded by the angle EC is shown in thik lines. Suppose that we find a filtering objet whose retangular region R fil is fully ontained in the region. Any objet o an be pruned if dist(o, ) maxdist(r fil, ). In other words, the possible andidates may lie only in the spae defined by EC where EC is an ar and C = E = maxdist(r fil, ). Let r be the distane between and the enter of R fil. Then, maxdist(r fil, ) r + w/ where w/ is the half of the diagonal length of R fil. Sine, all objets are represented by retangular regions, any objet is possible R andidate that has its entre at a distane not greater than w/ from the region EC. So, the range beomes (r + w). Total number of andidates that overlap or lie within the region EC is π(r + w) 6 Let R be the maximum of r of all six regions, the total number of andidate objets is bounded by S nd = π(r + w) (3) The server sends reuest to all these andidate objets and reeives their exat loations. So the total number of messages 1 at this stage is bounded by 1 = π(r + w) () After reeiving the updates, the server eliminates the andidate objets that annot be the R (based on their exat loations). As proved in [16], the number of andidate objets annot be greater than six. Hene, the server needs to verify those six andidate objets. In order to verify a andidate objet o, the server issues a range uery of distane dist(o, ) entered at o. In worst ase, all the objets that lie within this range must report their exat loations. Total number of objets that overlap or lie within the range is π(dist(o,) + w/ ) Sine these andidate objets belong to the nearest neighbors in eah region, dist(o, ) orresponds to the distane of losest objet in the region. For all six regions, the maximum of dist(o, ) is the distane of sixth nearest neighbor from (assuming uniform distribution). So the maximum range is the radius of a irle around that ontains six objets. As we assume a unit spae, the radius of suh irle 6 that ontains six objets is. So the maximum number π of messages reuired to verify all six andidate objets is r 6 = 6 π( π + w/ ) 1 + are the messages reuired to retrieve the serverinitiated updates. Let 3 be the number of soure-initiated updates (the objets that leave their retangular regions). Let v be the average speed of objets. An objet starting at enter of the suare of width w and moving with speed v will take at least w/v time to leave the region. So, total number of updates 3 at eah timestamp is 3 = min( v w,1) ote that the euation bounds the number of soureinitiated updates by. The total ommuniation ost per timestamp ( ) where 1 denotes the loation update of the uery. ote that if w is small, the number of soure-initiated updates 3 inreases and if w is large, the number of server-initiated updates ( 1 + ) inreases. ow, we find R. ote that to use the pruning of Fig. 18, we had assumed that R fil ompletely lies in the 6 degree region EC. Hene r in Euation (3) orresponds to the distane of the losest objet in eah region that ompletely lies in it. Similarly, R is the maximum of r of eah region. D C B E H D G K L E R fil C r' H J H D: A B F w A G R fil r F Figure 18: Half-spae pruning vs six-regions based pruning Figure 19: An objet ompletely lying in the 6 degree region Fig. 19 shows a region DE and a retangular region R fil of a filtering objet (shown in broken line). ote that any retangular region of side length w with enter lying in ABC (the shaded area) will ompletely lie in the region DE. In other words, r orresponds to the losest objet of in the region that has enter lying in ABC. Let r = H = J as shown in Fig. 19. Let the radius belonging to area A be r. The radius r an be omputed as r = r A where A = G + GA = G + w/. The length of G =.866w whih an be found by the triangle FG where FG = w/ and GF = 6. Hene r = r 1.366w. It an be verified that when r = 6 π w, then π(r ) = 6. In other words when radius is r, one objet in eah region will be found suh that it ompletely lies in the region. So 1 an be rewritten as

Drawing lines. Naïve line drawing algorithm. drawpixel(x, round(y)); double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx; double y = y0;

Drawing lines. Naïve line drawing algorithm. drawpixel(x, round(y)); double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx; double y = y0; Naïve line drawing algorithm // Connet to grid points(x0,y0) and // (x1,y1) by a line. void drawline(int x0, int y0, int x1, int y1) { int x; double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx;

More information

An Efficient and Scalable Approach to CNN Queries in a Road Network

An Efficient and Scalable Approach to CNN Queries in a Road Network An Effiient and Salable Approah to CNN Queries in a Road Network Hyung-Ju Cho Chin-Wan Chung Dept. of Eletrial Engineering & Computer Siene Korea Advaned Institute of Siene and Tehnology 373- Kusong-dong,

More information

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425) Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University

More information

Efficient Construction of Safe Regions for Moving knn Queries Over Dynamic Datasets

Efficient Construction of Safe Regions for Moving knn Queries Over Dynamic Datasets Efficient Construction of Safe Regions for Moving knn Queries Over Dynamic Datasets Mahady Hasan, Muhammad Aamir Cheema, Xuemin Lin, Ying Zhang The University of New South Wales, Australia {mahadyh,macheema,lxue,yingz}@cse.unsw.edu.au

More information

The Min-dist Location Selection Query

The Min-dist Location Selection Query The Min-dist Loation Seletion Query Jianzhong Qi 1, Rui Zhang, Lars Kulik 3, Dan Lin 4, Yuan Xue 5 University of Melbourne, Vitoria, Australia 1, {jiqi,rui}@sse.unimelb.edu.au, 3,5 {lkulik,yuaxue}@unimelb.edu.au

More information

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes Deteting Outliers in High-Dimensional Datasets with Mixed Attributes A. Koufakou, M. Georgiopoulos, and G.C. Anagnostopoulos 2 Shool of EECS, University of Central Florida, Orlando, FL, USA 2 Dept. of

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

Efficiently Monitoring Reverse k Nearest Neighbors in Spatial Networks

Efficiently Monitoring Reverse k Nearest Neighbors in Spatial Networks THE UNIVERSITY OF NEW SOUTH WALES SCHOOL OF COMPUTER SCIENCE AND ENGINEERING Efficiently Monitoring Reverse k Nearest Neighbors in Spatial Networks Shenlu Wang ( shenlu.wang@gmail.com ) Computer Science

More information

Incremental Mining of Partial Periodic Patterns in Time-series Databases

Incremental Mining of Partial Periodic Patterns in Time-series Databases CERIAS Teh Report 2000-03 Inremental Mining of Partial Periodi Patterns in Time-series Dataases Mohamed G. Elfeky Center for Eduation and Researh in Information Assurane and Seurity Purdue University,

More information

Colouring contact graphs of squares and rectilinear polygons de Berg, M.T.; Markovic, A.; Woeginger, G.

Colouring contact graphs of squares and rectilinear polygons de Berg, M.T.; Markovic, A.; Woeginger, G. Colouring ontat graphs of squares and retilinear polygons de Berg, M.T.; Markovi, A.; Woeginger, G. Published in: nd European Workshop on Computational Geometry (EuroCG 06), 0 Marh - April, Lugano, Switzerland

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer

More information

1. Introduction. 2. The Probable Stope Algorithm

1. Introduction. 2. The Probable Stope Algorithm 1. Introdution Optimization in underground mine design has reeived less attention than that in open pit mines. This is mostly due to the diversity o underground mining methods and omplexity o underground

More information

Facility Location: Distributed Approximation

Facility Location: Distributed Approximation Faility Loation: Distributed Approximation Thomas Mosibroda Roger Wattenhofer Distributed Computing Group PODC 2005 Where to plae ahes in the Internet? A distributed appliation that has to dynamially plae

More information

MATH STUDENT BOOK. 12th Grade Unit 6

MATH STUDENT BOOK. 12th Grade Unit 6 MATH STUDENT BOOK 12th Grade Unit 6 Unit 6 TRIGONOMETRIC APPLICATIONS MATH 1206 TRIGONOMETRIC APPLICATIONS INTRODUCTION 3 1. TRIGONOMETRY OF OBLIQUE TRIANGLES 5 LAW OF SINES 5 AMBIGUITY AND AREA OF A TRIANGLE

More information

Detection and Recognition of Non-Occluded Objects using Signature Map

Detection and Recognition of Non-Occluded Objects using Signature Map 6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,

More information

Adobe Certified Associate

Adobe Certified Associate Adobe Certified Assoiate About the Adobe Certified Assoiate (ACA) Program The Adobe Certified Assoiate (ACA) program is for graphi designers, Web designers, video prodution designers, and digital professionals

More information

Multi-Channel Wireless Networks: Capacity and Protocols

Multi-Channel Wireless Networks: Capacity and Protocols Multi-Channel Wireless Networks: Capaity and Protools Tehnial Report April 2005 Pradeep Kyasanur Dept. of Computer Siene, and Coordinated Siene Laboratory, University of Illinois at Urbana-Champaign Email:

More information

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient

More information

1. The collection of the vowels in the word probability. 2. The collection of real numbers that satisfy the equation x 9 = 0.

1. The collection of the vowels in the word probability. 2. The collection of real numbers that satisfy the equation x 9 = 0. C HPTER 1 SETS I. DEFINITION OF SET We begin our study of probability with the disussion of the basi onept of set. We assume that there is a ommon understanding of what is meant by the notion of a olletion

More information

with respect to the normal in each medium, respectively. The question is: How are θ

with respect to the normal in each medium, respectively. The question is: How are θ Prof. Raghuveer Parthasarathy University of Oregon Physis 35 Winter 8 3 R EFRACTION When light travels from one medium to another, it may hange diretion. This phenomenon familiar whenever we see the bent

More information

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

Chapter 2: Introduction to Maple V

Chapter 2: Introduction to Maple V Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard

More information

HEXA: Compact Data Structures for Faster Packet Processing

HEXA: Compact Data Structures for Faster Packet Processing Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

Dynamic Programming. Lecture #8 of Algorithms, Data structures and Complexity. Joost-Pieter Katoen Formal Methods and Tools Group

Dynamic Programming. Lecture #8 of Algorithms, Data structures and Complexity. Joost-Pieter Katoen Formal Methods and Tools Group Dynami Programming Leture #8 of Algorithms, Data strutures and Complexity Joost-Pieter Katoen Formal Methods and Tools Group E-mail: katoen@s.utwente.nl Otober 29, 2002 JPK #8: Dynami Programming ADC (214020)

More information

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr

More information

Gray Codes for Reflectable Languages

Gray Codes for Reflectable Languages Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings

More information

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department

More information

CleanUp: Improving Quadrilateral Finite Element Meshes

CleanUp: Improving Quadrilateral Finite Element Meshes CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)

More information

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1. Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,

More information

Approximate logic synthesis for error tolerant applications

Approximate logic synthesis for error tolerant applications Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu

More information

Exploring the Commonality in Feature Modeling Notations

Exploring the Commonality in Feature Modeling Notations Exploring the Commonality in Feature Modeling Notations Miloslav ŠÍPKA Slovak University of Tehnology Faulty of Informatis and Information Tehnologies Ilkovičova 3, 842 16 Bratislava, Slovakia miloslav.sipka@gmail.om

More information

Accommodations of QoS DiffServ Over IP and MPLS Networks

Accommodations of QoS DiffServ Over IP and MPLS Networks Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering

More information

Improved flooding of broadcast messages using extended multipoint relaying

Improved flooding of broadcast messages using extended multipoint relaying Improved flooding of broadast messages using extended multipoint relaying Pere Montolio Aranda a, Joaquin Garia-Alfaro a,b, David Megías a a Universitat Oberta de Catalunya, Estudis d Informàtia, Mulimèdia

More information

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of

More information

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks A Dual-Hamiltonian-Path-Based Multiasting Strategy for Wormhole-Routed Star Graph Interonnetion Networks Nen-Chung Wang Department of Information and Communiation Engineering Chaoyang University of Tehnology,

More information

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks 62 Uplink Channel Alloation Sheme and QoS Management Mehanism for Cognitive Cellular- Femtoell Networks Kien Du Nguyen 1, Hoang Nam Nguyen 1, Hiroaki Morino 2 and Iwao Sasase 3 1 University of Engineering

More information

The Happy Ending Problem

The Happy Ending Problem The Happy Ending Problem Neeldhara Misra STATUTORY WARNING This doument is a draft version 1 Introdution The Happy Ending problem first manifested itself on a typial wintery evening in 1933 These evenings

More information

Cluster-based Cooperative Communication with Network Coding in Wireless Networks

Cluster-based Cooperative Communication with Network Coding in Wireless Networks Cluster-based Cooperative Communiation with Network Coding in Wireless Networks Zygmunt J. Haas Shool of Eletrial and Computer Engineering Cornell University Ithaa, NY 4850, U.S.A. Email: haas@ee.ornell.edu

More information

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless

More information

1 The Knuth-Morris-Pratt Algorithm

1 The Knuth-Morris-Pratt Algorithm 5-45/65: Design & Analysis of Algorithms September 26, 26 Leture #9: String Mathing last hanged: September 26, 27 There s an entire field dediated to solving problems on strings. The book Algorithms on

More information

To Do. Assignment Overview. Outline. Mesh Viewer (3.1) Mesh Connectivity (3.2) Advanced Computer Graphics (Spring 2013)

To Do. Assignment Overview. Outline. Mesh Viewer (3.1) Mesh Connectivity (3.2) Advanced Computer Graphics (Spring 2013) daned Computer Graphis (Spring 23) CS 283, Leture 5: Mesh Simplifiation Rai Ramamoorthi http://inst.ees.berkeley.edu/~s283/sp3 To Do ssignment, Due Feb 22 Start reading and working on it now. This leture

More information

arxiv: v1 [cs.db] 13 Sep 2017

arxiv: v1 [cs.db] 13 Sep 2017 An effiient lustering algorithm from the measure of loal Gaussian distribution Yuan-Yen Tai (Dated: May 27, 2018) In this paper, I will introdue a fast and novel lustering algorithm based on Gaussian distribution

More information

C 2 C 3 C 1 M S. f e. e f (3,0) (0,1) (2,0) (-1,1) (1,0) (-1,0) (1,-1) (0,-1) (-2,0) (-3,0) (0,-2)

C 2 C 3 C 1 M S. f e. e f (3,0) (0,1) (2,0) (-1,1) (1,0) (-1,0) (1,-1) (0,-1) (-2,0) (-3,0) (0,-2) SPECIAL ISSUE OF IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION: MULTI-ROBOT SSTEMS, 00 Distributed reonfiguration of hexagonal metamorphi robots Jennifer E. Walter, Jennifer L. Welh, and Nany M. Amato Abstrat

More information

Fast Distribution of Replicated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon

Fast Distribution of Replicated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon ACEEE Int. J. on Information Tehnology, Vol. 3, No. 2, June 2013 Fast Distribution of Repliated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon Email: mmalli@aou.edu.lb

More information

An Interactive-Voting Based Map Matching Algorithm

An Interactive-Voting Based Map Matching Algorithm Eleventh International Conferene on Mobile Data Management An Interative-Voting Based Map Mathing Algorithm Jing Yuan* University of Siene and Tehnology of China Hefei, China yuanjing@mail.ust.edu.n Yu

More information

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality INTERNATIONAL CONFERENCE ON MANUFACTURING AUTOMATION (ICMA200) Multi-Piee Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality Stephen Stoyan, Yong Chen* Epstein Department of

More information

Contour Box: Rejecting Object Proposals Without Explicit Closed Contours

Contour Box: Rejecting Object Proposals Without Explicit Closed Contours Contour Box: Rejeting Objet Proposals Without Expliit Closed Contours Cewu Lu, Shu Liu Jiaya Jia Chi-Keung Tang The Hong Kong University of Siene and Tehnology Stanford University The Chinese University

More information

Using Augmented Measurements to Improve the Convergence of ICP

Using Augmented Measurements to Improve the Convergence of ICP Using Augmented Measurements to Improve the onvergene of IP Jaopo Serafin, Giorgio Grisetti Dept. of omputer, ontrol and Management Engineering, Sapienza University of Rome, Via Ariosto 25, I-0085, Rome,

More information

Rotation Invariant Spherical Harmonic Representation of 3D Shape Descriptors

Rotation Invariant Spherical Harmonic Representation of 3D Shape Descriptors Eurographis Symposium on Geometry Proessing (003) L. Kobbelt, P. Shröder, H. Hoppe (Editors) Rotation Invariant Spherial Harmoni Representation of 3D Shape Desriptors Mihael Kazhdan, Thomas Funkhouser,

More information

Directed Rectangle-Visibility Graphs have. Abstract. Visibility representations of graphs map vertices to sets in Euclidean space and

Directed Rectangle-Visibility Graphs have. Abstract. Visibility representations of graphs map vertices to sets in Euclidean space and Direted Retangle-Visibility Graphs have Unbounded Dimension Kathleen Romanik DIMACS Center for Disrete Mathematis and Theoretial Computer Siene Rutgers, The State University of New Jersey P.O. Box 1179,

More information

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks International Journal of Computer Theory and Engineering, Vol. 5, No. 2, April 213 A Multi-Head Clustering Algorithm in Vehiular Ad Ho Networks Shou-Chih Lo, Yi-Jen Lin, and Jhih-Siao Gao Abstrat Clustering

More information

Query Evaluation Overview. Query Optimization: Chap. 15. Evaluation Example. Cost Estimation. Query Blocks. Query Blocks

Query Evaluation Overview. Query Optimization: Chap. 15. Evaluation Example. Cost Estimation. Query Blocks. Query Blocks Query Evaluation Overview Query Optimization: Chap. 15 CS634 Leture 12 SQL query first translated to relational algebra (RA) Atually, some additional operators needed for SQL Tree of RA operators, with

More information

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Ho Wireless Networks Giorgio Quer, Federio Librino, Lua Canzian, Leonardo Badia, Mihele Zorzi, University of California San Diego La

More information

The AMDREL Project in Retrospective

The AMDREL Project in Retrospective The AMDREL Projet in Retrospetive K. Siozios 1, G. Koutroumpezis 1, K. Tatas 1, N. Vassiliadis 2, V. Kalenteridis 2, H. Pournara 2, I. Pappas 2, D. Soudris 1, S. Nikolaidis 2, S. Siskos 2, and A. Thanailakis

More information

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method 3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr

More information

2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any urrent or future media, inluding reprinting/republishing this material for advertising

More information

Acoustic Links. Maximizing Channel Utilization for Underwater

Acoustic Links. Maximizing Channel Utilization for Underwater Maximizing Channel Utilization for Underwater Aousti Links Albert F Hairris III Davide G. B. Meneghetti Adihele Zorzi Department of Information Engineering University of Padova, Italy Email: {harris,davide.meneghetti,zorzi}@dei.unipd.it

More information

1. Inversions. A geometric construction relating points O, A and B looks as follows.

1. Inversions. A geometric construction relating points O, A and B looks as follows. 1. Inversions. 1.1. Definitions of inversion. Inversion is a kind of symmetry about a irle. It is defined as follows. he inversion of degree R 2 entered at a point maps a point to the point on the ray

More information

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering A Novel Bit Level Time Series Representation with Impliation of Similarity Searh and lustering hotirat Ratanamahatana, Eamonn Keogh, Anthony J. Bagnall 2, and Stefano Lonardi Dept. of omputer Siene & Engineering,

More information

Performance Benchmarks for an Interactive Video-on-Demand System

Performance Benchmarks for an Interactive Video-on-Demand System Performane Benhmarks for an Interative Video-on-Demand System. Guo,P.G.Taylor,E.W.M.Wong,S.Chan,M.Zukerman andk.s.tang ARC Speial Researh Centre for Ultra-Broadband Information Networks (CUBIN) Department

More information

Particle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating

Particle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating Original Artile Partile Swarm Optimization for the Design of High Diffration Effiient Holographi Grating A.K. Tripathy 1, S.K. Das, M. Sundaray 3 and S.K. Tripathy* 4 1, Department of Computer Siene, Berhampur

More information

Sequential Incremental-Value Auctions

Sequential Incremental-Value Auctions Sequential Inremental-Value Autions Xiaoming Zheng and Sven Koenig Department of Computer Siene University of Southern California Los Angeles, CA 90089-0781 {xiaominz,skoenig}@us.edu Abstrat We study the

More information

Vertex Unfoldings of Orthogonal Polyhedra: Positive, Negative, and Inconclusive Results

Vertex Unfoldings of Orthogonal Polyhedra: Positive, Negative, and Inconclusive Results CCCG 2018, Winnipeg, Canada, August 8 10, 2018 Vertex Unfoldings of Orthogonal Polyhedra: Positive, Negative, and Inonlusive Results Luis A. Garia Andres Gutierrrez Isaa Ruiz Andrew Winslow Abstrat We

More information

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of

More information

Plot-to-track correlation in A-SMGCS using the target images from a Surface Movement Radar

Plot-to-track correlation in A-SMGCS using the target images from a Surface Movement Radar Plot-to-trak orrelation in A-SMGCS using the target images from a Surfae Movement Radar G. Golino Radar & ehnology Division AMS, Italy ggolino@amsjv.it Abstrat he main topi of this paper is the formulation

More information

Displacement-based Route Update Strategies for Proactive Routing Protocols in Mobile Ad Hoc Networks

Displacement-based Route Update Strategies for Proactive Routing Protocols in Mobile Ad Hoc Networks Displaement-based Route Update Strategies for Proative Routing Protools in Mobile Ad Ho Networks Mehran Abolhasan 1 and Tadeusz Wysoki 1 1 University of Wollongong, NSW 2522, Australia E-mail: mehran@titr.uow.edu.au,

More information

Adapting K-Medians to Generate Normalized Cluster Centers

Adapting K-Medians to Generate Normalized Cluster Centers Adapting -Medians to Generate Normalized Cluster Centers Benamin J. Anderson, Deborah S. Gross, David R. Musiant Anna M. Ritz, Thomas G. Smith, Leah E. Steinberg Carleton College andersbe@gmail.om, {dgross,

More information

13.1 Numerical Evaluation of Integrals Over One Dimension

13.1 Numerical Evaluation of Integrals Over One Dimension 13.1 Numerial Evaluation of Integrals Over One Dimension A. Purpose This olletion of subprograms estimates the value of the integral b a f(x) dx where the integrand f(x) and the limits a and b are supplied

More information

DECT Module Installation Manual

DECT Module Installation Manual DECT Module Installation Manual Rev. 2.0 This manual desribes the DECT module registration method to the HUB and fan airflow settings. In order for the HUB to ommuniate with a ompatible fan, the DECT module

More information

Gradient based progressive probabilistic Hough transform

Gradient based progressive probabilistic Hough transform Gradient based progressive probabilisti Hough transform C.Galambos, J.Kittler and J.Matas Abstrat: The authors look at the benefits of exploiting gradient information to enhane the progressive probabilisti

More information

IN structured P2P overlay networks, each node and file key

IN structured P2P overlay networks, each node and file key 242 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 21, NO. 2, FEBRUARY 2010 Elasti Routing Table with Provable Performane for Congestion Control in DHT Networks Haiying Shen, Member, IEEE,

More information

Intra- and Inter-Stream Synchronisation for Stored Multimedia Streams

Intra- and Inter-Stream Synchronisation for Stored Multimedia Streams IEEE International Conferene on Multimedia Computing & Systems, June 17-23, 1996, in Hiroshima, Japan, p 372-381 Intra- and Inter-Stream Synhronisation for Stored Multimedia Streams Ernst Biersak, Werner

More information

Precise Hausdorff Distance Computation between Polygonal Meshes

Precise Hausdorff Distance Computation between Polygonal Meshes Preise Hausdorff Distane Computation between Polygonal Meshes Mihael Bartoň a, Iddo Hanniel a,b, Gershon Elber a, Myung-Soo Kim a Tehnion Israel Institute of Tehnology, Haifa 32000, Israel b SolidWorks

More information

A New RBFNDDA-KNN Network and Its Application to Medical Pattern Classification

A New RBFNDDA-KNN Network and Its Application to Medical Pattern Classification A New RBFNDDA-KNN Network and Its Appliation to Medial Pattern Classifiation Shing Chiang Tan 1*, Chee Peng Lim 2, Robert F. Harrison 3, R. Lee Kennedy 4 1 Faulty of Information Siene and Tehnology, Multimedia

More information

Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8

Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8 Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introdution... 1 1.1. Internet Information...2 1.2. Internet Information Retrieval...3 1.2.1. Doument Indexing...4 1.2.2. Doument Retrieval...4

More information

Triangles. Learning Objectives. Pre-Activity

Triangles. Learning Objectives. Pre-Activity Setion 3.2 Pre-tivity Preparation Triangles Geena needs to make sure that the dek she is building is perfetly square to the brae holding the dek in plae. How an she use geometry to ensure that the boards

More information

Boundary Correct Real-Time Soft Shadows

Boundary Correct Real-Time Soft Shadows Boundary Corret Real-Time Soft Shadows Bjarke Jakobsen Niels J. Christensen Bent D. Larsen Kim S. Petersen Informatis and Mathematial Modelling Tehnial University of Denmark {bj, nj, bdl}@imm.dtu.dk, kim@deadline.dk

More information

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments Establishing Seure Ethernet LANs Using Intelligent Swithing Hubs in Internet Environments WOEIJIUNN TSAUR AND SHIJINN HORNG Department of Eletrial Engineering, National Taiwan University of Siene and Tehnology,

More information

Chemical, Biological and Radiological Hazard Assessment: A New Model of a Plume in a Complex Urban Environment

Chemical, Biological and Radiological Hazard Assessment: A New Model of a Plume in a Complex Urban Environment hemial, Biologial and Radiologial Haard Assessment: A New Model of a Plume in a omplex Urban Environment Skvortsov, A.T., P.D. Dawson, M.D. Roberts and R.M. Gailis HPP Division, Defene Siene and Tehnology

More information

Semi-Supervised Affinity Propagation with Instance-Level Constraints

Semi-Supervised Affinity Propagation with Instance-Level Constraints Semi-Supervised Affinity Propagation with Instane-Level Constraints Inmar E. Givoni, Brendan J. Frey Probabilisti and Statistial Inferene Group University of Toronto 10 King s College Road, Toronto, Ontario,

More information

Batch Auditing for Multiclient Data in Multicloud Storage

Batch Auditing for Multiclient Data in Multicloud Storage Advaned Siene and Tehnology Letters, pp.67-73 http://dx.doi.org/0.4257/astl.204.50. Bath Auditing for Multilient Data in Multiloud Storage Zhihua Xia, Xinhui Wang, Xingming Sun, Yafeng Zhu, Peng Ji and

More information

KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION

KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION Cuiui Kang 1, Shengai Liao, Shiming Xiang 1, Chunhong Pan 1 1 National Laboratory of Pattern Reognition, Institute of Automation, Chinese

More information

Grade 6. Mathematics. Student Booklet SPRING 2009 RELEASED ASSESSMENT QUESTIONS. Assessment of Reading, Writing and Mathematics, Junior Division

Grade 6. Mathematics. Student Booklet SPRING 2009 RELEASED ASSESSMENT QUESTIONS. Assessment of Reading, Writing and Mathematics, Junior Division Grade 6 Assessment of Reading, Writing and Mathematis, Junior Division Student Booklet Mathematis SPRING 2009 RELEASED ASSESSMENT QUESTIONS Please note: The format of these booklets is slightly different

More information

\A CENTRAL FACILITIES LOCATION PROBLEM INVOLVING TRAVELING SALESMAN TOURS AND EXPECTED DISTANCES/ MASTER OF SCIENCE

\A CENTRAL FACILITIES LOCATION PROBLEM INVOLVING TRAVELING SALESMAN TOURS AND EXPECTED DISTANCES/ MASTER OF SCIENCE \A CENTRAL FACILITIES LOCATION PROBLEM INVOLVING TRAVELING SALESMAN TOURS AND EXPECTED DISTANCES/ by Thesis submitted to the Graduate Faulty of the Virginia Polytehni Institute and State University in

More information

XML Data Streams. XML Stream Processing. XML Stream Processing. Yanlei Diao. University of Massachusetts Amherst

XML Data Streams. XML Stream Processing. XML Stream Processing. Yanlei Diao. University of Massachusetts Amherst XML Stream Proessing Yanlei Diao University of Massahusetts Amherst XML Data Streams XML is the wire format for data exhanged online. Purhase orders http://www.oasis-open.org/ommittees/t_home.php?wg_abbrev=ubl

More information

Projections. Let us start with projections in 2D, because there are easier to visualize.

Projections. Let us start with projections in 2D, because there are easier to visualize. Projetions Let us start ith projetions in D, beause there are easier to visualie. Projetion parallel to the -ais: Ever point in the -plane ith oordinates (, ) ill be transformed into the point ith oordinates

More information

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Arne Hamann, Razvan Rau, Rolf Ernst Institute of Computer and Communiation Network Engineering Tehnial University of Braunshweig,

More information

INTERPOLATED AND WARPED 2-D DIGITAL WAVEGUIDE MESH ALGORITHMS

INTERPOLATED AND WARPED 2-D DIGITAL WAVEGUIDE MESH ALGORITHMS Proeedings of the COST G-6 Conferene on Digital Audio Effets (DAFX-), Verona, Italy, Deember 7-9, INTERPOLATED AND WARPED -D DIGITAL WAVEGUIDE MESH ALGORITHMS Vesa Välimäki Lab. of Aoustis and Audio Signal

More information

Fast Rigid Motion Segmentation via Incrementally-Complex Local Models

Fast Rigid Motion Segmentation via Incrementally-Complex Local Models Fast Rigid Motion Segmentation via Inrementally-Complex Loal Models Fernando Flores-Mangas Allan D. Jepson Department of Computer Siene, University of Toronto {mangas,jepson}@s.toronto.edu Abstrat The

More information

Improved Circuit-to-CNF Transformation for SAT-based ATPG

Improved Circuit-to-CNF Transformation for SAT-based ATPG Improved Ciruit-to-CNF Transformation for SAT-based ATPG Daniel Tille 1 René Krenz-Bååth 2 Juergen Shloeffel 2 Rolf Drehsler 1 1 Institute of Computer Siene, University of Bremen, 28359 Bremen, Germany

More information

Year 11 GCSE Revision - Re-visit work

Year 11 GCSE Revision - Re-visit work Week beginning 6 th 13 th 20 th HALF TERM 27th Topis for revision Fators, multiples and primes Indies Frations, Perentages, Deimals Rounding 6 th Marh Ratio Year 11 GCSE Revision - Re-visit work Understand

More information

This fact makes it difficult to evaluate the cost function to be minimized

This fact makes it difficult to evaluate the cost function to be minimized RSOURC LLOCTION N SSINMNT In the resoure alloation step the amount of resoures required to exeute the different types of proesses is determined. We will refer to the time interval during whih a proess

More information

Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks

Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks Crowd-GPS-Se: Leveraging Crowdsouring to Detet and Loalize GPS Spoofing Attaks Kai Jansen, Matthias Shäfer, Daniel Moser, Vinent Lenders, Christina Pöpper and Jens Shmitt Ruhr-University Bohum, Germany,

More information

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion

More information

Graph-Based vs Depth-Based Data Representation for Multiview Images

Graph-Based vs Depth-Based Data Representation for Multiview Images Graph-Based vs Depth-Based Data Representation for Multiview Images Thomas Maugey, Antonio Ortega, Pasal Frossard Signal Proessing Laboratory (LTS), Eole Polytehnique Fédérale de Lausanne (EPFL) Email:

More information