Indexing the Edges A simple and yet efficient approach to high-dimensional indexing
|
|
- Augustus Hall
- 6 years ago
- Views:
Transcription
1 Inexing the Eges A simple an yet efficient approach to high-imensional inexing Beng Chin Ooi Kian-Lee Tan Cui Yu Stephane Bressan Department of Computer Science National University of Singapore 3 Science Drive 2, Singapore fooibc,tankl,yucui,stephg@comp.nus.eu.sg ABSTRACT In this paper, we propose a new tunable inex scheme, calle (), that maps points in high imensional spaces to single imension values etermine by their maximum or minimum values among all imensions. By varying the tuning \knob", we can obtain ierent family of structures that are optimize for ierent istributions of ata sets. For a -imensional space, a range query nee to be transforme into subqueries. However, some of these subqueries can be prune away without evaluation, further enhancing the eciency of the scheme. Experimental results show that () can outperform the more complex Pyrami technique by a wie margin. 1. INTRODUCTION Many multi-imensional inexing structures have been propose in the literature (see [1] for a survey). In particular, it has been observe that the performance of hierarchical tree inex structures such as R-trees [2] an R -trees [3] eteriorates rapily with the increase in the imensionality of ata. This phenomenon is cause by two factors. First, let us consier the fan-out of internal noes in an R-tree. Suppose we conform to the classic enition of an R-tree where all noes are of a xe size B. The fan-out of an internal noe is clearly boune by B i=1 (2 si ) where s i is the size of ata elements corresponing to imension i. (The expression i=1(2 s i) constitutes the storage neee to ene a minimal bouning region in a - imensional space.) Clearly, the fan-out of an R-tree is inversely proportional to the imensionality of ata objects (). The smaller fan-out contributes not only to increase overlap between noe entries but also the height of the corresponing R-tree. One obvious solution is to reuce the amount ofoverlap by increasing the fan-out of selecte Permission to make igital or har copies of part or all of this work or personal or classroom use is grante without fee provie that copies are not mae or istribute for profit or commercial avantage an that copies bear this notice an the full citation on the first page. To copy otherwise, to republish, to post on servers, or to reistribute to lists, requires prior specific permission an/or a fee. POD 2, Dallas, TX USA ACM x//5...$5. noes. Notwithstaning, the size of a noe cannot be enlarge inenitely, since any increase in noe size contributes ultimately to aitional page accesses an CPU cost, causing the inex to egenerate into a semi-sequential scan within an inex. Secon, as the number of imensions increases, the area covere by the query increases tremenously. Consier a hyper-cube with a selectivity of.1% of the omain space ([,1],[,1],:::,[,1]). This is a relatively small query in two to three-imensional atabases. However, for a 4- imensional space, the query with along each imension works out to be.841, which causes the query to cover a large area of the omain space. Consequently, many leaf noes of a hierarchical inex have to be searche. The above two problems are so severe that the performance is worse o than a simple sequential scan of the inex keys [4] [5]. However, sequential scanning is expensive as it requires the whole atabase to be searche for any range queries, irrespective of query sizes. Therefore, research eorts have been riven to evelop techniques that can outperform sequential scanning. Some of the notable techniques inclue the VA-le [4] an the Pyrami scheme [5]. This paper aopts a slightly ierent approach that reuces high-imensional ata to a single imensional value. It is motivate by two observations. First, ata points in high imensional space can be orere base on the maximum value of all imensions. (We have aopte the maximum value in our iscussion. However, similar observations can be mae with the minimum value.) Secon, if an inex key oes not t in any query range, the ata point will not be in the answer set. The former implies that we can represent high-imension ata in single imensional space, an reuse existing single imensional inexes. The latter provies a mechanism to prune the search space. In this paper, we propose a new tunable inexing scheme, calle (), that aresses the eciency of the simple approach iscusse above. has several nice features. First, () aopts a simple transformation function to map high imension points to a single imension space. Let x min an x max be respectively the smallest an largest values among all the imensions of the ata point (x 1; x 2; :::; x ) x j 1, 1 j. Let the corresponing imension for x min an x max be min an max respectively. The ata point is mappe to y over a single 166
2 imensional space as follows: y = min + x min max + x max if x min + <1, x max otherwise We note that the transformation actually partitions the ata space into ierent partitions base on the imension which has the largest value or smallest value, an provies an orering within each partition. Secon, B + -tree is use to inex the transforme values. Thus, () can be implemente on existing DBMSs without aitional complexity, making it a practical approach. Thir, in (), queries on the original space nee to be transforme to queries on the transforme space. For a given range query, the range of each imension is use to generate a range subqueries on the imension. The union of the answers from all subqueries provies the caniate answer set from which the query answers can be obtaine. 's query mapping function facilitates eective range query processing: (i) the search space on the transforme space contains all answers from the original query, an it cannot be further constraine without the risk of missing some answers; (ii) the number of points within a search space is reuce; an (iii) some of the subqueries can be prune away without being evaluate. Finally, byvarying, we can obtain ierent families of () structures. At the extremes, () maps all high imensional points to the maximum (minimum) value among all imensions; alternatively, it can be tune to map some points to the maximum values, while others to the minimum values. Thus, () can be optimize for ata sets with ierent istributions. Unlike the Pyrami technique, no apriori knowlege or reconstruction is require. We implemente the () an evaluate its performance against the more complex Pyrami technique. Our experimental results on both uniform an skewe ata sets show that the propose scheme can be more ecient than the Pyrami technique by more than 5% of retrieval costs. The rest of our paper is organize as follows: In Section 2, we escribe existing work. In Section 3, we shall present () in etail, an in Section 4, the search algorithms. Section 5 presents the experimental stuy an reports our nings. We conclue in Section RELATED WORK There is a consierable amount of work on high-imensional inexing. In this section, we shall review two of the recently propose inexing structures, namely the Pyrami technique [5] an the VA le [4]. While the Pyrami technique is use for performance comparison in this paper, the VA-le is a potential caniate for further performance stuy. The basic iea of the Pyrami Technique is to transform - imensional ata points into 1-imensional values, an then store an access the values using a conventional inex such as the B + -tree. There are mainly two steps in its partitioning metho. First, it splits the ata space into 2 pyramis, which share the center point of the ata space as their top an have (, 1)- imensional surface of the ata space as their base. h.5 h h 1.5 Pyrami slice Figure 1: Inex key assignment in the Pyrami technique All points locate on the i-th (, 1)-imensional surface of cube (the base of the pyrami) have the common property: either their i-th coorinate is or their (i, )-th coorinate is 1. On the other han, all points locate in the i-th pyrami p i have the furthest istance from the top on the i-th imension. The imension in which the point has the longest istance from the top etermines which pyrami the point lies. Another property of Pyrami Technique is that the location of a point within its pyrami is inicate by a single value, which is the istance from the point to the center point accoring to imension j max (see Figure 1). The ata on the same slice in a pyrami have the same pyrami value. That is, any objects fall on the slice will be represente by the same pyrami value. As a result, many points will be inexe by the same key in a skewe istribution. It has been suggeste that the center point can be shifte to hanle ata skewness. However, this incurs recalculation of all inex values, i.e. reistribution of the points among the pyramis, an reconstruction of the B + -tree. To retrieve apoint q, the pyrami value P of q is compute, an use to serach the B + -tree. All points with P will be checke an retrieve. To perform a range query, the pyramis that intersect the search region are etermine, an for each pyrami, iniviual subquery range is etermine. Each subquery is use to search the B + -tree. For each range query, 2 subqueries may be require, one against each pyrami. The VA-le (vector approximation le) [4] is base on the iea of object approximation by mapping a coorinate to some value that reuces storage requirement. The basic iea is to ivie the ata space into 2 b hyper-rectangular cell where b is the tunable number of bits use for representation. For each imension i, b i bits are use, an 2 b i slices are generate in such away that all slices are equally full. The ata space consists of 2 b hyper-rectangular cell, each of which can be represente by a unique bit string of length b. A ata point is then approximate by the bit string of the cell it falls into. h 2 167
3 To perform a point or range query, the entire approximation le must be sequentially scanne. Objects whose bit string satises the query must be retrieve an checke. Typically, the VA-le is much smaller than the vector le an hence is far more ecient than irect sequential scan of ata le an the variants of R-tree. However, the performance of the VA-le is likely to be aecte by ata istributions an hence the false rop rate; the number of imensions an the volume of ata. 3. INDEXING ON THE EDGES In a multi-imensional range search, all values of all imensions must satisfy the query range along each imension. If any of them fails, the ata point will not be in the answer set. Base on this observation, a straightforwar approach is to inex on a small subset of the imensions. However, the eectiveness of such an approach epens on the ata istribution of the selecte imensions. Our preliminary stuy on inexing one single imension showe that the approach can perform worse than sequential scanning. This le us to examine novel techniques that inex on the \eges". An \ege" of a ata point refers to the maximum or minimum value among all the imensions of the point. The propose technique, () uses either the values of the Max ege (the imension with the maximum value) or the values of the Min ege (the imension with the minimum value) as the representative inex keys for the points. Because the transforme values can be orere an range queries can be performe on the transforme (single imensional) space, we can employ single imensional inexes to inex the transforme values. In this paper, we employ the B + -tree structure since it is supporte by all commercial DBMSs. Thus, () can be reaily aopte for use. In the following iscussion, we consier a unit -imensional space, i.e., points are in the space ([,1],[,1],...,[,1]). We enote an arbitrary ata point in the space as x =(x 1; x 2; :::;x ). Let x max = max i=1 xi an xmin = min i=1 xi be the maximum value an minimum value among the imensions of the point. Moreover, let max an min enote the imensions at which the maximum an minimum values occur. Let the range query be q =([x 11;x 12], [x 21;x 22], :::,[x 1;x 2]). Let ans(q) enote the answers prouce by evaluating a query q. In the following iscussion, we shall present the transformation function that maps a point inaimen- sional space to a single imensional space, an iscuss how range queries can be evaluate. 3.1 Mapping High Dimensional Data to Single Dimension Space () aopts a simple mapping function that is computationally inexpensive. The ata point x is mappe to a point y over a single imensional space as follows: y = min + x min max + x max where is a real number. if x min + <1, x max otherwise First, we note that plays an important role in inuencing the number of points falling on each inex hyperplane. In fact, it is the tuning knob that aects the hyperplane an inex point shoul resie. Take a ata point (.2,.75) in 2-imensional space for example, with = :, the inex point will resie on the Min ege. By setting to.1 will push the inex point to resie on the Max ege. The higher the value of, the biasness the function is expressing towars the Max ege. When =:1, the Max ege has the preference of about 1% more. Similarly, we can \favor" the transformation to the Min ege with <. In fact, at one extreme, when 1:, the transformation maps all points to their Max ege. an by setting,1:, we always pick the value at the Min ege as the inex key. For simplicity, we shall enote the former extreme as imax, the latter extreme as imin, an any other variation as (ropping unless its value is critical). Secon, we note that the transformation actually splits the (single imensional) ata space into ierent partitions base on the imension which has the largest value or smallest value, an provies an orering within each partition. This is eecte by incluing the imension at which the maximum value occurs, i.e., the rst component of the mapping function. Finally, the unique tunable feature facilitates the aaptation of () to ata sets of ierent istributions (uniform or skewe). In cases where ata points are skewe towar certain eges, we may \scatter" these points to other eges to evenly istribute them by making a choice between min an max. Statistical information such as the number of inex points can be use for such purpose. Alternatively, one can either use the information regaring ata istribution or information collecte to categorically ajust the partitioning. 3.2 Mapping Range Queries Range queries on the original -imensional space have tobe transforme to the single imensional space for evaluation. In (), the original query on the -imensional space is mappe into subqueries one for each imension. Let us enote the subqueries as q 1, q 2, :::, q, where q i =[l i;hi] 1 i. For the jth query subrange in q, [x j1;x j2], we have q j as given by the expression in Equation 1. The union of the answers from all subqueries provies the caniate answer set from which the query answers can be obtaine, i.e., ans(q) [ i=1ans(q i). We shall now prove some interesting results. Theorem 1. Uner () scheme, ans(q) [ i=1ans(q i). Moreover, there oes not exist qi =[li;h i], where li >l i or h < h i for which ans(q) [ i=1ans(qi) always hols. In other wors, q i is \optimal" an narrowing its range may miss some of q's answers. Proof: For the rst part, we nee to show that any point x that satises q will be retrieve by some q i; 1 i. For the secon part, we only nee to show that some points that satisfy q may be misse. The proof comprises three parts, corresponing to the three cases in the range query mapping function. Case 1: min i=1 x i1 + 1, max i=1 x i1 In this case, all the answer points that satisfy the query q have been mappe to the Max ege, i.e., a point x that 168
4 q j = ( [j + max i=1 x i1; j+ x j2] if min i=1 xi1 + 1, max i=1 xi1 [j + x j1; j+ min i=1 x i2] if min i=1 x i2 + <1, max i=1 x i2 [j + x j1; j+ x j2] otherwise Equation 1: Transformation function for queries. satises q is mappe to x max, an woul have been mappe to the maxth imension, an has inex key of max + x max. The subquery range for the maxth imension is [ max + max i=1 x i1; max + x max 2]. Since x satises q, wehave x i 2 [x i1;x i2], 8i; 1 i. Moreover, we have x max x i1 8i; 1 i. This implies that x max max i=1 x i1 8i; 1 i. We also have x max x max 2. Therefore, we have x max 2 [max i=1 x i1; x max 2], i.e., x can be retrieve using the maxth subquery. Thus, ans(q) [ i=1 ans(qi). Now, let qi =[li + l;hi, h], for some l > an h >. Consier a point z =(z 1; z 2; :::;z ) that satises q. We note that if l i <zmax <li + l, then, we will miss z if qi has been use. Similarly, if h i, h <zmax < max i=1 x i2, then, we will also miss z if qi has been use. Therefore, no qi provies the tightest boun that guarantees that no points will be misse. Case 2: min i=1 x i2 + <1, max i=1 x i2 This case is the inverse of Case 1, i.e., all points in the query range belongs to the Min ege. As such, we can apply similar logic. Case 3 In case 3, the answers of q may be foun in both the Min ege an the Max ege. Given a point x that satises q, we have x i 2 [x i1;x i2], 8i; 1 i. Wehave two cases to consier. In the rst case, x is mappe to the Min ege, its inex key is min + x min, an it is inex on the minth imension. To retrieve x, we nee to examine the minth subquery, [ min + x min 1; min + x min 2]. Now, we have x min 2 [x min 1;x min 2] (since x is in the answer) an hence the minth subquery will be able to retrieve x. The secon case, which is mapping x onto the Max ege an can be similarly erive. Thus, ans(q) [ i=1 ans(qi). Now, let q i =[l i + l;h i, h], for some l > an h >. Consier a point z =(z 1; z 2; :::;z ) that satises q. We note that if l i <zmax <li + l, then, we will miss z if q i has been use. Similarly, if h i, h <zmax <h i, then, we will also miss z if q i has been use. Therefore, no q i provies the tightest boun that guarantees that no points will be misse. We woul like to point out that in an actual implementation, the leaf noes of the B + -tree will contain the highimensional point, i.e., even though the inex key on the B + -tree is only single imension, the leaf noe entries contain the triple (x key;x;ptr) where xkey is the single imensional inex key of point x an ptr is the pointer to the ata page containing other information that may be relate to the high-imensional point. Therefore, the false rop of Theorem 1 aects only the vectors use as inex keys, rather than the actual ata itself. 2 T heorem 2. Given a query q, an the subqueries q 1;q 2; :::; q, q i nee not be evaluate if any of the followings hols: (i) min (ii) min x j1 + 1, x j2 + <1, max max x j1 an h i < x j2 an l i > max x j1 min x j2 Proof: Consier the rst case: min x j1+ 1,max x j1 an h i < max x j1. The rst expression implies that all the answers for q can only be foun in the Max ege. We note that the point with the smallest maximum value that satises q is max x j1. This implies that if h i < max xj1, then the answer set for qi will be an empty set. Thus, q i nee not be evaluate. The secon expression means that all the answers for q are locate in the Min ege. The point with the largest minimum value that satises q is min xj2. This implies that if l i > min x j2, then the answer set for q i will be empty. Thus, q i nee not be evaluate. Example 1. Let = :5. Consier the range query ([.2,.3], [.4,.6]) in 2-imensional space. Since :2 + :5 > 1, :4 =:6, we know that all points that satisfy the query falls on the Max ege. This means that the lower boun for the subqueries shoul be.4, i.e., the two subqueries are respectively [.4,.3] an [.4,.6]. Since the rst subquery's upper boun (i.e,.3) is smaller than.4, it nee not be evaluate because no points will satisfy the query. T heorem 3. Given a query q, an the subqueries q 1;q 2;:::;q, at most subqueries nee to be evaluate. Proof: The proof is straightforwar, an follows from Theorem 2. From theorems 2 an 3 we have a glimpse of the eectiveness of (). In fact, for very high imension spaces, we can expect signicant savings from the pruning of subqueries. Example 2. In this example, we illustrate how can keep out points from the search space. Figure 2 shows the example. Here, we have two points A(.2,.5) an B(.87,.25) in 2-imensional space. If we employ either imax or imin, at least one false rop will occur. On the other han, using (.5) eectively keeps both points out of the search space
5 y y 1 1 A (.2,.5) A B(.87,,25) B x x 1 (a) imax (b) imin Figure 2: Sample search space for 2-imensional space. 4. IMINMAX() SEARCH ALGORITHMS In our implementation of (), we have aopte the B + -tree [6] as the unerlying single imensional inex structure. However, for greater eciency, leaf noes also store the high-imensional key, i.e., leaf noe entries are of the form (key, v, ptr) where key is the single imensional key, v is the high-imensional vector whose transforme value is key, an ptr is the pointer to the ata page containing information relate to v. Keeping v at the leaf noes can minimize page accesses to non-matching points. We note that multiple high-imensional keys may be mappe to a single key value. The search, insert an elete algorithms are similar to the B + -tree algorithms. The aitional complexity arises as we have to eal with the aitional high-imensional key (besies the single imensional key value). In this paper, we shall present the search algorithms (for both point an range queries). Insert an elete algorithms are similar to those of B + -tree, an so we omit them. 4.1 Point Search Algorithm In point search, a point p is issue an all matching tuples are to be retrieve. Suppose has been tune for performance purposes, the maximum an minimum values of p have to be use to search the tree. In this case, a that will cause the search to be one on the other ege can be use to call the algorithm. The algorithm is summarize in Figure 3. Base on, the search algorithm rst maps p to the single-imensional key, x p, using the function transform(point, ) (line 1). For each query, the B + -tree is traverse (line 2) to the leaf noe where x p may be store. If the point oes not exist, then a NULL value is returne (lines 3-4). Otherwise, for every matching x p value, the high-imensional key of the ata is compare with p for a match. Those that match are accesse using the pointer value (lines 7-13); otherwise, they are ignore. We note that it is possible for a sequence of leaf noes to contain matching key values an hence they all have to be examine. The nal answers are then returne (line 14). 4.2 Range Search Algorithm Range queries are slightly more complicate than point search. Figure 4 shows the algorithm. Unlike point queries, a - imensional range query r is transforme into subqueries (line 2,3). The ith subquery is enote as r i =[l i;hi]. Next, routine prunesubquery is invoke to check if r i can be prune (line 4). If it can be, then it is ignore. Otherwise, the subquery is evaluate as follows (lines 5-12). The B + -tree is traverse to the appropriate leaf noe. If there are no points in the range of r i, then the subquery stops. Otherwise, for every x 2 [l i;hi], the high-imensional key of the ata is compare with p for a match. Those that match are accesse using the pointer value. As in point search, multiple leaf pages may have to be examine. Once all subqueries have been evaluate, the nal answers are then returne (line 13). 5. PERFORMANCE STUDY We implemente () an the Pyrami technique [5] in C, an use the B + -tree as the single imensional inex structure. Each inex page is 4 KB pages. We i not buer any ata pages in this stuy. Therefore, every page touche incurs an I/O. However, it shoul be note that the traversal paths of the subqueries generate by () o not overlap an hence share very few common internal noes. This is also true for the subqueries generate by the Pyrami technique. For the performance stuy reporte, we i not use Theorem 2 to prune any subqueries. We conucte many experiments. Here, we report some of the more interesting results on range queries. A total of 5 range queries are use. Each query is a hyper-cube an has a efault selectivity of.1% of the omain space ([,1],[,1],:::,[,1]). The query with is the -th root of the selectivity: p :1. As an inication on how large the with of a fairly low selectivity can be, the query with for 4-imensional space is.841, which ismuch larger than half of the extension of the ata space along each imension. Different query size will be use for non-uniform istributions. The efault number of imensions use is 3. Each I/O correspons to the retrieval of a 4 KB page. The average I/O cost of the queries is use as the performance metrics. 17
6 Algorithm PointSearch Input: point p,, root of the B + -tree R Output: tuples matching p 1. x p transform(p, ) 2. l traverse(x p, R) 3. if x p is not foun in l 4. return (NULL) 5. else 6. S ; 7. for every entry in l with key x p,(x p; v; ptr) 8. if v == p 9. tuple access(ptr) 1. S S[ tuple 11. if l's last entry contains key x p 12. l l's right sibling 13. goto return (S) Algorithm RangeSearch Figure 3: Point search algorithm. Input: range query r =([x 11;x 12]; [x 21;x 22];:::), root of the B + -tree R Output: answer tuples to the range query 1. S ; 2. for (i =1to) 3. r i transform(r, i) 4. if NOT(pruneSubquery(r i, r)) 5. l traverse(l i, R) 6. for every entry in l with key x 2 [l i;hi], (x; v; ptr) 7. if v == P 8. tuple access(ptr) 9. S S[ tuple 1. if l's last entry contains key x<h i 11. l l's right sibling 12. goto return (S) Figure 4: Range search algorithm. 5.1 Effect of Dimensions In the rst set of experiments, wevary the number of imensions from 8 to 5. The ata set is uniformly istribute over the omain space. There are a total of 1K points. In the rst experiment, besies the Pyrami scheme, we also compare against the MAX scheme an the sequential scan (seq-scan) technique. The MAX scheme is the simple scheme that maps each point to its maximum value. However, the transforme space is not partitione. Moreover, two variations of () are use, namely imax (i.e., = 1) an ( = :) (enote as ). Figure 5 shows the results. First, we note that both the MAX an seq-scan techniques perform poorly, an their I/O cost increases with the higher number of imensions. MAX performs slightly worse because of the aitional internal noes to be accesse an the high number of false rops. Secon, while the number of I/Os for, imax an Pyrami also increases with increasing number of imensions, it is growing at a much slower rate. Thir, we see that performs the best, with Pyrami following closely, an imax performing worse than Pyrami. imin- Max outperforms imax an Pyrami since its search space touches fewer points. In a typical application, apart from the inex attributes, there are many more large attributes which make sequential scan of an entire le not cost eective. Instea, a feature le which consists of vectors of inex attribute values is use to lter out objects (recors) that o not match the search conition. However, we note that for queries which entail retrieval of a large proportion of objects, irect sequential scan may still be cost eective. The ata le of the technique can be clustere base on the leaf noes of its B + - tree to reuce ranom reas. The clusters can be forme in 171
7 MAX imax Pyrami Seq-Scan Dimension Data Set Size (K) Pyrami Figure 5: Eect of imensions on uniformly istribute ata set Dimension Pyrami Figure 6: Comparing an Pyrami schemes. such a way they allow easy insertion of objects an expansion of their extent. Other optimizations such as those at the physical level are possible to make the B + -tree behave like an inex sequential le. Base on above argument an experimental results, for all subsequent experiments, we shall restrict our stuy to an Pyrami techniques. We further evaluate Pyrami an an the results are shown in Figure 6. We observe that remains superior, an can outperform Pyrami by up to 25%. 5.2 Effect of Data Set Sizes an Query Sizes In this set of experiments, we stuy several ierent factors - the ata set sizes, the query selectivities. For both stuies, we xe the number of imensions at 3. Figure 7 shows the results when we vary the ata set sizes from 1K to 5K points. Figure 8 shows the results when we vary the query selectivities from.1% to 1%. Figure 7: Eect of varying ata set sizes Pyrami Selectivity of Query (%) Figure 8: Eect of varying query selectivity (1K ataset). As expecte, both an Pyrami incurre higher I/O cost with increasing ata set sizes as well as the query selectivities. As before remains superior over the Pyrami scheme. It is interesting to note that the relative ierence between the two schemes seems to be unaecte by the ata set sizes an query selectivities. Upon investigation, we foun that both an Pyrami return the same caniate answer set. The improvement of stems from its reuce number of subqueries compare to the Pyrami scheme. 5.3 Effect of Data Distributions In this experiment, we stuy the relative performance of an Pyrami on skewe ata istributions. Here, we show the results on two istributions, namely skewe normal an skewe exponential. Figure 9 illustrates two skewe ata istributions in a 2-imensional space. The rst set of experiments stuies the eect of on skewe 172
8 norm (a) Normal istribution.1 exp (b) Exponential istribution Figure 9: Skewe ata istribution. normal istribution. For normal istribution, the closer the ata center is to the cluster center, the more we can keep points evenly assigne to each ege. For queries that follow the same istribution, the ata points will have the same probability of being kept far from the query cube. In these experiments, we x each imension of the query to have a with f.4. Figure 1(a) shows the results for 1K 3-imensional points. First, we observe that for, there exists a certain optimal value that leas to the best performance. Essentially, \looks out" for the center of the cluster. Secon, can outperform the Pyrami technique by a wie margin (more than 5%!). Thir, we note that can perform worse than the Pyrami scheme. This occurs when the istribution of points to the eges become skewe, an a larger numberofpoints have to be searche. Because of the above points, we note that it is important to ne tune for ierent ata istributions in orer to obtain optimal performance. The nice property is that this tuning can be easily performe by varying. In Figure 1(b), we have the results for 5K 3-imensional points. As in the earlier experiment, 's eectiveness epens on the value set. We observe that performs better than Pyrami over a wier range of tuning factors, an over a wier margin (more than 66%) Pyrami Tuning value of (a) 1K points Pyrami Tuning value of (b) 5K points Figure 1: Skewe normal ata set. The secon set of experiments looks at the relative performance of the schemes for skewe exponential ata sets. As above, we x each imension of the query to have a with of.4. For exponential istribution (we choose to be exponential to small value), many imensions will have small values, an a small number of them will have large values. Thus, lots of ata points will have at least one big value. Because many of the imensions are with small values, the ata points ten to lie close along the eges of ata space. We note that exponential ata istribution can be far ifferent from each other. They are more likely to be close along the eges, or close to the ierent corners epening 173
9 on the number of imensions that are skewe to be large, or small. A range query, if it is with exponentially istribution characteristic, its subqueries will mostly be close to the low corner. Therefore, tuning the keys to choose large values is likely to keep away more points from the query. Figure 11 shows the results for 5K 3-imensional points on skewe exponential istribution. The results are similar to that of the normal istribution experiments is optimal at certain values. [4] R. Weber, H. Schek, S. Blott. A Quantitative Analysis an Performance Stuy for Similarity-Search Methos in High-Dimensional Spaces. VLDB'98, , [5] S. Berchtol, C. B}ohm, H-P. Kriegel. The Pyrami-Technique: Towars Breaking the Curse of Dimensionality. SIGMOD'98, , [6] D. Comer. The Ubiquitous B-tree. ACM Computing Surveys. 11(2), 121{137, Pyrami Tuning value of Figure 11: Skewe exponential ata sets (5K points). 6. CONCLUSION In this paper, we have propose a simple an yet very ecient metho for inexing very high imensional ata base on eges. We have shown by experiments that the metho is signicantly more ecient an ynamic than the Pyrami technique. Performance ierence is expecte to increase as the ata volume an imensionality increase, an for skewe ata istributions. We are currently comparing against the VA-le [4] an looking at how to generalize () for nearest neighbor search. We are also looking at the possibility an the eect of maintaining i for each imension. Finally, we are exploring how to etermine aaptively. 7. ACKNOWLEDGEMENT This work is partially supporte by the Global-Atlas project fune by the National University of Singapore. 8. REFERENCES [1] E. Bertino, et. al. Inexing Techniques for Avance Database Systems. Chapters 2, , Kluwer Acaemic Publishers, Boston, [2] A. Guttman. R-tree: A ynamic Inex Structure for Spatial Searching. SIGMOD'84, 47-54, [3] N. Beckmann, H-P. Kriegel R. Schneier, B. Seeger. The R -tree: An Ecient an Robust Access Metho for Points an Rectangles. SIGMOD'9, ,
d 3 d 4 d d d d d d d d d d d 1 d d d d d d
Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching
More informationOnline Appendix to: Generalizing Database Forensics
Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that
More informationNon-homogeneous Generalization in Privacy Preserving Data Publishing
Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h
More informationCluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters
Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets
More informationSkyline Community Search in Multi-valued Networks
Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h
More information1 Surprises in high dimensions
1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic
More informationInuence of Cross-Interferences on Blocked Loops: to know the precise gain brought by blocking. It is even dicult to determine for which problem
Inuence of Cross-Interferences on Blocke Loops A Case Stuy with Matrix-Vector Multiply CHRISTINE FRICKER INRIA, France an OLIVIER TEMAM an WILLIAM JALBY University of Versailles, France State-of-the art
More informationOverlap Interval Partition Join
Overlap Interval Partition Join Anton Dignös Department of Computer Science University of Zürich, Switzerlan aignoes@ifi.uzh.ch Michael H. Böhlen Department of Computer Science University of Zürich, Switzerlan
More informationAnalysis of half-space range search using the k-d search skip list. Here we analyse the expected time for half-space
Analysis of half-space range search using the k- search skip list Mario A. Lopez Brafor G. Nickerson y 1 Abstract We analyse the average cost of half-space range reporting for the k- search skip list.
More informationTransient analysis of wave propagation in 3D soil by using the scaled boundary finite element method
Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite
More informationIntensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2
This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar
More informationAlmost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control
Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract
More informationLearning convex bodies is hard
Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples
More informationLearning Polynomial Functions. by Feature Construction
I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate
More informationCoupling the User Interfaces of a Multiuser Program
Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces
More information6.854J / J Advanced Algorithms Fall 2008
MIT OpenCourseWare http://ocw.mit.eu 6.854J / 18.415J Avance Algorithms Fall 2008 For inormation about citing these materials or our Terms o Use, visit: http://ocw.mit.eu/terms. 18.415/6.854 Avance Algorithms
More informationAdjacency Matrix Based Full-Text Indexing Models
1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,
More informationYet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien
Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,
More informationWilliam S. Law. Erik K. Antonsson. Engineering Design Research Laboratory. California Institute of Technology. Abstract
Optimization Methos for Calculating Design Imprecision y William S. Law Eri K. Antonsson Engineering Design Research Laboratory Division of Engineering an Applie Science California Institute of Technology
More informationExtending High-Dimensional Indexing Techniques Pyramid and iminmax(θ) : Lessons Learned
Extending High-Dimensional Indexing Techniques Pyramid and iminmax(θ) : Lessons Learned Karthik Ganesan Pillai, Liessman Sturlaugson, Juan M. Banda, and Rafal A. Angryk Montana State University, Bozeman,
More informationA Cost Model For Nearest Neighbor Search. High-Dimensional Data Space
A Cost Moel For Nearest Neighbor Search in High-Dimensional Data Space Stefan Berchtol University of Munich Germany berchtol@informatikuni-muenchene Daniel A Keim University of Munich Germany keim@informatikuni-muenchene
More informationDivide-and-Conquer Algorithms
Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science
More informationRandom Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation
DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,
More informationA Cost Model for Query Processing in High-Dimensional Data Spaces
A Cost Moel for Query Processing in High-Dimensional Data Spaces Christian Böhm Luwig Maximilians Universität München This is a preliminary release of an article accepte by ACM Transactions on Database
More informationOn the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems
On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,
More informationDesign of Policy-Aware Differentially Private Algorithms
Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft
More informationParticle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base
More informationLoop Scheduling and Partitions for Hiding Memory Latencies
Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:
More information6 Gradient Descent. 6.1 Functions
6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output
More informationCharacterizing Decoding Robustness under Parametric Channel Uncertainty
Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric
More informationBIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES
BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations
More informationShift-map Image Registration
Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.
More informationA Classification of 3R Orthogonal Manipulators by the Topology of their Workspace
A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.
More informationOn Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation
On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member
More informationIntroduction to Indexing R-trees. Hong Kong University of Science and Technology
Introduction to Indexing R-trees Dimitris Papadias Hong Kong University of Science and Technology 1 Introduction to Indexing 1. Assume that you work in a government office, and you maintain the records
More informationQuestions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!
EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an
More informationLecture 1 September 4, 2013
CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the
More informationA Stochastic Process on the Hypercube with Applications to Peer to Peer Networks
A Stochastic Process on the Hypercube with Applications to Peer to Peer Networs [Extene Abstract] Micah Aler Department of Computer Science, University of Massachusetts, Amherst, MA 0003 460, USA micah@cs.umass.eu
More informationThe Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract
The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie
More informationk-balanced Sorting and Skew Join in MPI and MapReduce
k-balance Sorting an Skew Join in MPI an MapReuce Silu Huang, Aa Wai-Chee Fu Department of Computer Science an Engineering, Chinese University of Hong Kong slhuang,aafu@cse.cuhk.eu.hk Abstract We consier
More informationHere are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.
Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus
More informationSolution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation
Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University
More informationUsing Vector and Raster-Based Techniques in Categorical Map Generalization
Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department
More informationPreamble. Singly linked lists. Collaboration policy and academic integrity. Getting help
CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html
More informationComputer Graphics Chapter 7 Three-Dimensional Viewing Viewing
Computer Graphics Chapter 7 Three-Dimensional Viewing Outline Overview of Three-Dimensional Viewing Concepts The Three-Dimensional Viewing Pipeline Three-Dimensional Viewing-Coorinate Parameters Transformation
More informationRobust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks
Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,
More informationAPPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly
International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -
More informationClassical Mechanics Examples (Lagrange Multipliers)
Classical Mechanics Examples (Lagrange Multipliers) Dipan Kumar Ghosh Physics Department, Inian Institute of Technology Bombay Powai, Mumbai 400076 September 3, 015 1 Introuction We have seen that the
More informationSecure Network Coding for Distributed Secret Sharing with Low Communication Cost
Secure Network Coing for Distribute Secret Sharing with Low Communication Cost Nihar B. Shah, K. V. Rashmi an Kannan Ramchanran, Fellow, IEEE Abstract Shamir s (n,k) threshol secret sharing is an important
More informationImpact of cache interferences on usual numerical dense loop. nests. O. Temam C. Fricker W. Jalby. University of Leiden INRIA University of Versailles
Impact of cache interferences on usual numerical ense loop nests O. Temam C. Fricker W. Jalby University of Leien INRIA University of Versailles Niels Bohrweg 1 Domaine e Voluceau MASI 2333 CA Leien 78153
More information2-connected graphs with small 2-connected dominating sets
2-connecte graphs with small 2-connecte ominating sets Yair Caro, Raphael Yuster 1 Department of Mathematics, University of Haifa at Oranim, Tivon 36006, Israel Abstract Let G be a 2-connecte graph. A
More informationClassifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means
Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu
More informationWaleed K. Al-Assadi. Anura P. Jayasumana. Yashwant K. Malaiya y. February Colorado State University
Dierential I DDQ Testable Static RAM Architecture Walee K. Al-Assai Anura P. Jayasumana Yashwant K. Malaiya y Technical Report CS-96-102 February 1996 Department of Electrical Engineering/ y Department
More informationInvestigation into a new incremental forming process using an adjustable punch set for the manufacture of a doubly curved sheet metal
991 Investigation into a new incremental forming process using an ajustable punch set for the manufacture of a oubly curve sheet metal S J Yoon an D Y Yang* Department of Mechanical Engineering, Korea
More informationarxiv: v1 [math.co] 15 Dec 2017
Rectilinear Crossings in Complete Balance -Partite -Uniform Hypergraphs Rahul Gangopahyay Saswata Shannigrahi arxiv:171.05539v1 [math.co] 15 Dec 017 December 18, 017 Abstract In this paper, we stuy the
More informationDepartment of Computer Science, POSTECH, Pohang , Korea. (x 0 (t); y 0 (t)) 6= (0; 0) and N(t) is well dened on the
Comparing Oset Curve Approximation Methos Gershon er +, In-Kwon, an Myung-Soo Kim + Department of Computer Science, Technion, IIT, Haifa 32000, Israel Department of Computer Science, POSTECH, Pohang 790-784,
More informationThroughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem
Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple
More informationQueueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks
Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication
More informationd1 d2 d d1 d2 d3 (b) The corresponding bitmap structure
Efficient Progressive Skyline Computation Kian-Lee Tan Pin-Kwang Eng Beng Chin Ooi Department of Computer Science National University of Singapore Abstract In this paper, we focus on the retrieval of a
More informationEstimating Velocity Fields on a Freeway from Low Resolution Video
Estimating Velocity Fiels on a Freeway from Low Resolution Vieo Young Cho Department of Statistics University of California, Berkeley Berkeley, CA 94720-3860 Email: young@stat.berkeley.eu John Rice Department
More informationfiltering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember
107 IEICE TRANS INF & SYST, VOLE88 D, NO5 MAY 005 LETTER An Improve Neighbor Selection Algorithm in Collaborative Filtering Taek-Hun KIM a), Stuent Member an Sung-Bong YANG b), Nonmember SUMMARY Nowaays,
More informationComputer Organization
Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.
More informationPERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING
PERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING PAMELA RUSSELL ADVISOR: PAUL CULL OREGON STATE UNIVERSITY ABSTRACT. Birchall an Teor prove that
More informationFeature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory
Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative
More informationCloud Search Service Product Introduction. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.
1.3.15 Issue 01 Date 2018-11-21 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Lt. 2019. All rights reserve. No part of this ocument may be reprouce or transmitte in any form or by any
More informationState Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway
State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle
More informationAn Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources
An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract
More informationMultilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis
Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT
More informationAuthenticated indexing for outsourced spatial databases
The VLDB Journal (2009) 8:63 648 DOI 0.007/s00778-008-03-2 REGULAR PAPER Authenticate inexing for outsource spatial atabases Yin Yang Stavros Papaopoulos Dimitris Papaias George Kollios Receive: February
More informationDistributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs
IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,
More informationResearch Article Inviscid Uniform Shear Flow past a Smooth Concave Body
International Engineering Mathematics Volume 04, Article ID 46593, 7 pages http://x.oi.org/0.55/04/46593 Research Article Invisci Uniform Shear Flow past a Smooth Concave Boy Abullah Mura Department of
More informationKinematic Analysis of a Family of 3R Manipulators
Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,
More informationAnimated Surface Pasting
Animate Surface Pasting Clara Tsang an Stephen Mann Computing Science Department University of Waterloo 200 University Ave W. Waterloo, Ontario Canaa N2L 3G1 e-mail: clftsang@cgl.uwaterloo.ca, smann@cgl.uwaterloo.ca
More informationUsing the Holey Brick Tree for Spatial Data. in General Purpose DBMSs. Northeastern University
Using the Holey Brick Tree for Spatial Data in General Purpose DBMSs Georgios Evangelidis Betty Salzberg College of Computer Science Northeastern University Boston, MA 02115-5096 1 Introduction There is
More informationRough Set Approach for Classification of Breast Cancer Mammogram Images
Rough Set Approach for Classification of Breast Cancer Mammogram Images Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative Methos an Information Systems
More information6.823 Computer System Architecture. Problem Set #3 Spring 2002
6.823 Computer System Architecture Problem Set #3 Spring 2002 Stuents are strongly encourage to collaborate in groups of up to three people. A group shoul han in only one copy of the solution to the problem
More informationA Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition
ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural
More informationStudy of Network Optimization Method Based on ACL
Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department
More informationA Modified Immune Network Optimization Algorithm
IAENG International Journal of Computer Science, 4:4, IJCS_4_4_3 A Moifie Immune Network Optimization Algorithm Lu Hong, Joarer Kamruzzaman Abstract This stuy proposes a moifie artificial immune network
More informationFast Fractal Image Compression using PSO Based Optimization Techniques
Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting
More informationControlling formations of multiple mobile robots. Jaydev P. Desai Jim Ostrowski Vijay Kumar
Controlling formations of multiple mobile robots Jayev P. Desai Jim Ostrowski Vijay Kumar General Robotics an Active Sensory Perception (GRASP) Laboratory, University of Pennsylvania 340 Walnut Street,
More informationA multiple wavelength unwrapping algorithm for digital fringe profilometry based on spatial shift estimation
University of Wollongong Research Online Faculty of Engineering an Information Sciences - Papers: Part A Faculty of Engineering an Information Sciences 214 A multiple wavelength unwrapping algorithm for
More informationImage Segmentation using K-means clustering and Thresholding
Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,
More informationImproving Spatial Reuse of IEEE Based Ad Hoc Networks
mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos
More informationShift-map Image Registration
Shift-map Image Registration Linus Svärm Petter Stranmark Centre for Mathematical Sciences, Lun University {linus,petter}@maths.lth.se Abstract Shift-map image processing is a new framework base on energy
More informationNEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2.
JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 13/009, ISSN 164-6037 Krzysztof WRÓBEL, Rafał DOROZ * fingerprint, reference point, IPAN99 NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES
More informationThreshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides
Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita
More informationLocal Path Planning with Proximity Sensing for Robot Arm Manipulators. 1. Introduction
Local Path Planning with Proximity Sensing for Robot Arm Manipulators Ewar Cheung an Vlaimir Lumelsky Yale University, Center for Systems Science Department of Electrical Engineering New Haven, Connecticut
More informationBlind Data Classification using Hyper-Dimensional Convex Polytopes
Blin Data Classification using Hyper-Dimensional Convex Polytopes Brent T. McBrie an Gilbert L. Peterson Department of Electrical an Computer Engineering Air Force Institute of Technology 9 Hobson Way
More informationTest-Based Inference of Polynomial Loop-Bound Functions
Test-Base Inference of Polynomial Loop-Boun Functions Olha Shkaravska Roy Kersten Rabou University Nijmegen {shkarav,r.kersten}@cs.ru.nl Marko van Eekelen Rabou University Nijmegen an Open Universiteit
More informationSURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH
SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway
More informationRecitation Caches and Blocking. 4 March 2019
15-213 Recitation Caches an Blocking 4 March 2019 Agena Reminers Revisiting Cache Lab Caching Review Blocking to reuce cache misses Cache alignment Reminers Due Dates Cache Lab (Thursay 3/7) Miterm Exam
More informationUNIT 9 INTERFEROMETRY
UNIT 9 INTERFEROMETRY Structure 9.1 Introuction Objectives 9. Interference of Light 9.3 Light Sources for 9.4 Applie to Flatness Testing 9.5 in Testing of Surface Contour an Measurement of Height 9.6 Interferometers
More informationProvisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks
Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:
More informationBends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways
Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis
More informationEvolutionary Optimisation Methods for Template Based Image Registration
Evolutionary Optimisation Methos for Template Base Image Registration Lukasz A Machowski, Tshilizi Marwala School of Electrical an Information Engineering University of Witwatersran, Johannesburg, South
More informationConsidering bounds for approximation of 2 M to 3 N
Consiering bouns for approximation of to (version. Abstract: Estimating bouns of best approximations of to is iscusse. In the first part I evelop a powerseries, which shoul give practicable limits for
More information5th International Conference on Advanced Design and Manufacturing Engineering (ICADME 2015)
5th International Conference on Avance Design an Manufacturing Engineering (ICADME 25) Research on motion characteristics an application of multi egree of freeom mechanism base on R-W metho Xiao-guang
More information