Adaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model

Size: px
Start display at page:

Download "Adaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model"

Transcription

1 International Jornal of Knowledge Engineering, Vol. 1, No. 2, September 215 Adaptie Inflence Maximization in Microblog nder the Competitie Independent Cascade Model Zheng Ding, Kai Ni, and Zhiqiang He Abstract With the rapid deelopment of social media technology, many different pieces of information, ideas, prodcts, and innoations are propagating widely in online social networks. Information diffsion has been frther researched by many scientists and experts in the past few decades. In this paper, we stdy the competitie inflence propagation in sina microblog nder the competitie independent cascade model, which extends the classical independent cascade model. his paper pays attention to the problem that adaptiely selecting a certain nmber of seeds to maximize its inflence benefit (IB nder a competitie diffsion model. We call this problem the adaptie inflence maximization (AIM problem. he traditional Monte-Carlo greedy algorithm can select a specified nmber of seeds, and has a ery high complexity. A new efficient algorithm called M-based algorithm is designed to select seeds adaptiely, and faster than the Monte-Carlo greedy algorithm. Index erms Adaptie inflence maximization, competitie independent cascade model, microblog. I. INRODUCION As we moe frther into the information age, we can commnicate with each other in online social media more conenient and faster than eer before. So mch information srronds s daily and we are free to choose which pieces of media message to adopt and repost, and which pieces to ignore. his process is called information propagation. he information diffsion model throgh a social network has been stdied by many scholars. For example, ssceptible infectie Ssceptible (SIS model and ssceptible infectie remoal (SIR model [1] are first proposed to describe the information diffsion process. It is in both cases that state of nodes transfer from one of S (ssceptible, I (infectie, R (remoal to one of the two other states with certain probabilities. Simple differential eqations are sed to describe the percentage of nmber of nodes in each state. Kempe et al. [2] proposed the independent cascade (IC model and the linear threshold (L model, which characterize how information are disseminated throghot the network starting from the initial seeds nodes, which are based on a graph strctre and are widely sed today. All the models aboe only stdy the propagation of a piece Manscript receied March 3, 215; reised Jne 2, 215. his work is spported by National High echnology Research and Deelopment Program of China (863 Program SS215AA1133, and National Natral Science Fondation of China ( he athors are with the Key Laboratory of Uniersal Wireless Commnication, Ministry of Edcation, Beijing Uniersity of Posts and elecommnications, Beijing 1876, China ( dzsd213@163.com, nikai@bpt.ed.cn, hezq@bpt.ed.cn. of information in a social network. We call this single-item diffsion. In fact it is often the case that different information are propagating concrrently in a social network. Information competition is omnipresent in social network, sch as the sales competition of similar goods, the campaign between the parties in social media, and the competitie spread of rmors and trth in pblic. Competitie inflence diffsion model has been stdied by a lot of papers and books, Chen et al. [3] propose the competitie independent cascade (CIC models and the competitie linear threshold (CL model where the different kinds of information diffsion process proceed iteratiely in a synchronos way along a discrete time-axis, starting from sets of initial actiated nodes. In addition, broecheler et al. [4] pt forward the weighted generalized annotated program (wgap framework for expressing competitie diffsion models. Borodin et al. [5] extend the well-stdied linear-threshold model in three different ways to model competitie inflence diffsion. he competitie inflence maximization problem corresponds to the isse of competitie information diffsion, which aims to expand the inflence coerage of a piece of information at the same time that its competitie information is spreading. he literatre on the competitie inflence maximization problem is abndant. CLDAG algorithm is designed to sole the inflence blocking maximization problem nder the competitie linear threshold model in the et al. [6]. Carnes et al. [7] propose two models for competitie information diffsion, and gie an efficient algorithm for the inflence maximization problem from the follower s perspectie. In this paper, we make a contribtion to the competitie inflence propagation in microblog nder the competitie independent cascade model. Competitie inflence maximization problem is redefined as adaptie inflence maximization problem which takes the cost of initial seeds into consideration and select the initial seeds adaptiely. he method for adaptie inflence maximization is worth frther researching and widely sed in the commercial field. First of all, we introdce the competitie independent cascade model in sina microblog in Section II. Adaptie inflence maximization problem is proposed in Section III, while applying the Monte-Carlo greedy algorithm to try to sole the AIM problem. A more efficient algorithm called M-based algorithm is designed to sole AIM problem in Section IV. At last, we make a comparison between these two methods and draw a conclsion abot the whole paper. II. COMPEIIVE INDEPENDEN CASCADE MODEL IN SINA MICROBLOG Chen et al. [3] proposed the competitie independent DOI: /IJKE.215.V

2 International Jornal of Knowledge Engineering, Vol. 1, No. 2, September 215 cascade model to describe the mlti-item diffsion, we apply CIC model to sina microblog and only consider two kinds of competitie information which we refer to as the positie information and the negatie information. In this model, a social network is considered as a directed graph G ( V, E, where V is the set of nodes respecting sers in sina microblog and E is the set of directed edges respecting inflence relationships between sers. Each node has three possible states: inactie, positie, negatie. he positie and the negatie inflence probabilities of each edge are the same, that is the propagating probability p(. A node may change from the inactie state to the positie state or negatie state, bt cannot change from actie state to inactie state, and the state of actiated nodes is no longer changes. he propagation process starts from initial seed sets S and S, and the reslt is to obtain the positie and negatie actie set S and S while the information to complete the diffse process. he diffsion rle [3] is as follows: 1 Gien the initial seed sets S and S with S S at time step t. At eery time step t 1, nodes in actiated seed sets S and t 1 S try to actiate their t1 neighbors. 2 Positie actiate attempt: eery actie node S try t1 in to actiate their neighbors N ( \ ( S S, carries ot a positie actiation attempt with sccessfl probability p(,. If the attempt is sccessfl, is added into a positie sccessfl attempt set for node, if not, no longer be actiated. 3 Negatie actiate attempt is in the same way with the aboe process of positie actiate attempt. In the case that a node is both positiely actiated and negatiely actiated in the same time, the state of the node is set to the positie. 4 he competitie diffsion ends with the final actie sets S and t S ntil the sets of positie and negatie nodes t will no longer change, that is, St S and t1 St S. t1 In or model, the diffsion probability p(, of node to node is proportional to the similar degree and familiar degree of node and node. he similar degree is represented by the microblog text similarity S(, of ser and ser, and the familiar degree is represented by the ratio of common friends F(,. p(, S(, F(,, 1 (1 where the parameters α and β indicate the inflence weight on diffsion probability of the similar degree and the familiar degree. he math definition of similar degree and familiar degree are as follows, S(,, S(, [,1] where and are the microblog text s key words of ser and ser, represents the key words nmber of text (2. where N N N F(,, F(, [,1] N N N, and ser, F (3 N represent the neighbor friends of ser,, represents the nmber of common friends of ser N represents the friend nmber of ser. 1 Fig. 1. A directed social graph in which nodes hae two attribtes: Microblog text and friends F. III. ADAPIVE INFLUENCE MAXIMIZAION PROBLEM In this section, we first gie the definition of the adaptie inflence maximization (AIM problem, then introdce the Monte-Carlo algorithm which is sed to sole the AIM problem and analyze its performance. A. Problem Definition he adaptie inflence maximization problem is a optimization problem in which gien a social graph G ( V, E, the aboe described competitie independent cascade model, a negatie seed set S, the goal is to find a positie seed set S V \ S, sch that the positie inflence benefit B is maximized. he positie inflence benefit B is the positie coerage ( S, S mins the cost of selected positie seeds CS (. CS ( is proportional to the size of positie seeds S. he mathematical representation is: * S V \ S S arg max ( S, S C( S (4 C( S S (5 Compared with the classical inflence maximization problem, there is no limit for the nmber of the reqired seed set in AIM problem. Besides, we take the cost of seeds into consideration so that make the inflence maximization problem hae a optimal soltion. 2 2 F

3 International Jornal of Knowledge Engineering, Vol. 1, No. 2, September 215 he inflence benefit fnction is sbmodlar bt not monotonos in or model. We say that a set fnction f :2 V R is sbmodlar if for any sbsets S V and anyelement V \, f ( S { } f ( S f ( { } f (. First of all, we proe the sbmodlarity of the inflence benefit fnction in here. For any sbsets S V and any element V \, to get ( ( S { }, S S { } ( (, S S S S ( ( { }, S { } ( (, (6 is eqal to get ( S { }, S ( S, S ( { }, S (, S (7 becase the formla (7 is eqialent to the formla (6 with both sides of the former ineqality sbtract a constant *. he aboe CIC model in sina microblog is homogeneos becase the propagation probabilities of each edge are the same for positie and negatie inflence, and follows B-FP(1 reglation. he positie inflence coerage fnction is sbmodlar that is proed in chapter 4 of Wei Chen et al. [3]. So the ineqality (7 is tre and ineqality (6 is proed. herefore, he inflence benefit fnction ( S, S is sb-modlar. It is obios that inflence benefit is not monotonos so that AIM problem can be soled by Monte-Carlo greedy algorithm sing the sbmodlarity and monotonicity of inflence coerage. Next sbsection describes the Monte-Carlo greedy algorithm for the NP-hard problem in detail. B. Monte-Carlo Greedy Algorithm Monte-Carlo Greedy Algorithm is sed to sole the inflence maximization in single information diffsion process in [3], we apply it to sole AIM problem in competitie information diffsion process. he main idea of Monte-Carlo greedy algorithm is adding the node which makes the inflence coerage maximm into the positie seed set ntil the nmber of seed set reach the specified nmber. his algorithm tilize the sbmodlarity and monotonicity property of the inflence coerage. Gien seed set S, we simlate the randomized diffsion process for R times to get the aerage of the nmber of the positie actie nodes. We take the aerage of these conts in order R to get high accracy in or estimate. In the competitie inflence diffsion model, the inflence spread is a piece of information s actiated nodes nmber while two pieces of information propagate. In this Algorithm, we first determine the nmber of selected positie seeds k ranging from 1 to the size of the graph N. hen we find the optimal seeds set to maximize the positie inflence benefit. Monte-Carlo Greedy Algorithm can sole the AIM problem, howeer, the greedy algorithm reqires a large nmber of traersal to choose the optimal node, which cannot be done efficiently. It takes abot O(n 2 logn time to sole the AIM problem. When dealing with larger networks, the time consmption is nacceptable. In next section, we propose a faster algorithm to select seed nodes adaptiely. he Monte-Carlo greedy algorithm scheme can be obtained in Algorithm I ia the following recrsion procedres: Algorithm I Monte-Carlo greedy algorithm for adaptie inflence maximization. Inpt: G : social graph inclding arc weights for CIC model; S : the negatie seed set Otpt: S : the selected positie seed set Initialize S ; for k 1: N for j 1: k arg max ( S, S, G S S {} end S arg max B S end retrn S ; wv \( S S R IV. M-BASED ALGORIHM FOR HE AIM PROBLEM A. M-Based Algorithm he positie and negatie inflence coerage is not only sbmodlar bt monotonos. While a node is added in positie seed set, the positie inflence coerage may remain the same or increase, the positie inflence benefit whose change is continos will decrease or increase accordingly. It is easy to know the inflence benefit fnction is conex. So the positie benefit has a maximm ale, the node which can enhance the positie inflence benefit will be selected as the positie seeds by browsing the whole nodes except negatie seeds. his idea is based on the maximm ale property of the inflence spread, so we call this idea M-based algorithm. he mathematical description of M-based algorithm is as follows: gien a social network considered as a directed graph G ( V, E and a negatie seed set S, we want to select a positie seed set S to maximize the positie inflence benefit IB( S. First of all, S is set to an empty set. If V \ S can make the positie inflence benefit IB( S increasing, is added in positie seed set S, ntil there is no node can enhance the positie inflence benefit. Becase the diffsion process is random, IB( S is a estimated ale which is the aerage of positie inflence benefit in M times competitie diffsion. he nmber of the positie seeds do not need to specify, we obtain the adaptie seed set in this algorithm. In terms of complexity it takes abot O(n times to sole the AIM problem. he M-based algorithm process can be obtained in Algorithm II: Algorithm II M-based algorithm for adaptie inflence maximization. Inpt: G : social graph inclding arc weights for CIC model; S : the negatie seed set 131

4 International Jornal of Knowledge Engineering, Vol. 1, No. 2, September 215 Otpt: S : the selected positie seed set Initialize S ; V \ S ^ if IB( S { } IB( S S ( ^ IB S ; IB( S M M ^ Fig. 3 shows the positie inflence benefit s change sing M-based algorithm. Fig. 4 shows the program rnning times sing Monte-Carlo Greedy algorithm and M-based algorithm. From the reslt we can see M-based algorithm faster than Monte-Carlo Greedy algorithm, bt the inflence benefit is slightly smaller. Becase the diffsion has random property, the inflence benefit may float. And the experiment shows selected seed set is not niqe. B. Experiments and Reslts In this section, we se a dataset contains the directed ser network and their microblog content extracted from sina API in 214. Each node in the network represents an ser, and each directed edge connecting two nodes indicates that the two sers hae following relationship. he dataset is consist of 592 sers. able I reports the basic statistics of the dataset. ABLE I: SAISICS OF HE DAASE Nmber of nodes 592 Nmber of edges Aerage degree 5 Maximal degree 327 Eery node in the dataset is nmbered, the node nmber ranges from to 591. he negatie seeds are selected randomly in this experiment, their nmber are 22, 12, 233, 389, 42, 44, 449, 53, 553. In or experiments, the seed cost parameter γ is set to 1, Monte-Carlo Greedy algorithm with R = 1 nder CIC model, M-based algorithm with M = 1 nder CIC model, and the reslt is the aerage of many times simlation. At the same time, the reslt cre is smoothed by Origin Pro with the parameter points of windows is 2. Simlation compter configration is Intel CPU with 3.4GHZ and RAM with 5.82G. Fig. 3. Experiment reslt of m-based algorithm. Fig. 4. Rnning time of Monte-Carlo greedy algorithm and M-based algorithm. V. CONCLUSIONS In this paper, we inestigate the adaptie inflence maximization in competitie diffsion of social network. We design M-based algorithm to oercome the slowness of the Monte Carlo greedy algorithm. Howeer, the problem is still worth contining research. Fig. 2. Experiment reslt of Monte-Carlo greedy algorithm. We se aboe two algorithms to select positie seeds, 72 positie seeds which reach the maximm positie inflence benefit are selected by Monte-Carlo Greedy algorithm, 7positie seeds which reach the maximm positie inflence benefit are selected by M-based algorithm. he program of selecting optimal positie seeds sing Monte Carlo Greedy algorithm takes hors and the program sing M-based algorithm takes.853 hors. Fig. 2 depicts the positie inflence benefit s change with the increase of the positie seeds nmber sing Monte-Carlo Greedy algorithm. REFERENCES [1] M. E. Newman, he strctre and fnction of complex networks, SIAM Reiew, ol. 45, no. 2, pp , 23. [2] D. Kempe, J. Kleinberg, and E. ardos, Maximizing the spread of inflence throgh a social network, in Proc. the Ninth ACM SIGKDD International Conference on Knowledge Discoery and Data Mining, ACM, 23, pp [3] W. Chen, L. V. Lakshmanan, and C. Castillo, Information and inflence propagation in social networks, Synthesis Lectres on Data Management, ol. 5, no. 4, pp , 213. [4] M. Broecheler, P. Shakarian, and V. Sbrahmanian, A scalable framework for modeling competitie diffsion in social networks, in Proc. 21 IEEE Second International Conference on Social Compting (SocialCom, IEEE, 21, pp [5] A. Borodin, Y. Films, and J. Oren, hreshold models for competitie inflence in social networks, Internet and Network Economics, Springer, 21, pp

5 International Jornal of Knowledge Engineering, Vol. 1, No. 2, September 215 [6] X. He, G. Song, W. Chen, and Q. Jiang, Inflence blocking maximization in social networks nder the competitie linear threshold model. SDM, SIAM, 212, pp [7]. Carnes, C. Nagarajan, S. M. Wild, and A. V. Zylen, Maximizing inflence in a competitie social network: a follower s perspectie, in Proc. the Ninth International Conference on Electronic Commerce, ACM, 27, pp Zheng Ding receied a B.E. degree in commnication engineering from Chongqing Uniersity of Posts and elecommnications, Chongqing, China, in 212. Crrently she is working towards the M.S. degree in information and commnication engineering in Beijing Uniersity of Posts and elecommnications, Beijing, China. Her research interests are in the area of data mining and the Complex network dynamics. commnication, particlarly on the complex network theory. Zhiqiang He receied the B.E. and Ph.D. degrees (with distinction in signal and information processing from Beijing Uniersity of Posts and elecommnications, China, in 1999 and 24, respectiely. Since Jly 24, he has been with the School of Information and Commnication Engineering, Beijing Uniersity of Posts and elecommnications, where he is crrently an associate professor and the director of the Center of Information heory and echnology. His research interests inclde signal and information processing in wireless commnications, data mining in social network, and nderwater acost. Kai Ni receied a B.S. degree in information engineering and a Ph.D. in signal and information processing from Beijing Uniersity of Posts and elecommnications (BUP, Beijing, China, in 1998 in 23, respectiely. Crrently he is a professor in the School of Information and Commnication Engineering of BUP. His research interests are in the area of data mining and broadband wireless 133

Improving Network Connectivity Using Trusted Nodes and Edges

Improving Network Connectivity Using Trusted Nodes and Edges Improing Network Connectiity Using Trsted Nodes and Edges Waseem Abbas, Aron Laszka, Yegeniy Vorobeychik, and Xenofon Kotsokos Abstract Network connectiity is a primary attribte and a characteristic phenomenon

More information

Mathematical model for storing and effective processing of directed graphs in semistructured data management systems

Mathematical model for storing and effective processing of directed graphs in semistructured data management systems Mathematical model for storing and effectie processing of directed graphs in semistrctred data management MALIKOV A, GULEVSKIY Y, PARKHOMENKO D Information Systems and Technologies Department North Cacass

More information

Reconstructing Generalized Staircase Polygons with Uniform Step Length

Reconstructing Generalized Staircase Polygons with Uniform Step Length Jornal of Graph Algorithms and Applications http://jgaa.info/ ol. 22, no. 3, pp. 431 459 (2018) DOI: 10.7155/jgaa.00466 Reconstrcting Generalized Staircase Polygons with Uniform Step Length Nodari Sitchinaa

More information

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation Maximal Cliqes in Unit Disk Graphs: Polynomial Approximation Rajarshi Gpta, Jean Walrand, Oliier Goldschmidt 2 Department of Electrical Engineering and Compter Science Uniersity of California, Berkeley,

More information

On Plane Constrained Bounded-Degree Spanners

On Plane Constrained Bounded-Degree Spanners On Plane Constrained Bonded-Degree Spanners Prosenjit Bose 1, Rolf Fagerberg 2, André an Renssen 1, Sander Verdonschot 1 1 School of Compter Science, Carleton Uniersity, Ottaa, Canada. Email: jit@scs.carleton.ca,

More information

v e v 1 C 2 b) Completely assigned T v a) Partially assigned Tv e T v 2 p k

v e v 1 C 2 b) Completely assigned T v a) Partially assigned Tv e T v 2 p k Approximation Algorithms for a Capacitated Network Design Problem R. Hassin 1? and R. Rai 2?? and F. S. Salman 3??? 1 Department of Statistics and Operations Research, Tel-Ai Uniersity, Tel Ai 69978, Israel.

More information

On Plane Constrained Bounded-Degree Spanners

On Plane Constrained Bounded-Degree Spanners Algorithmica manscript No. (ill be inserted by the editor) 1 On Plane Constrained Bonded-Degree Spanners 2 3 Prosenjit Bose Rolf Fagerberg André an Renssen Sander Verdonschot 4 5 Receied: date / Accepted:

More information

Mobility Control and Its Applications in Mobile Ad Hoc Networks

Mobility Control and Its Applications in Mobile Ad Hoc Networks Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai Department of Compter Science and Engineering Florida Atlantic Uniersity Boca Raton, FL 3331 Abstract Most existing localized

More information

Faster Random Walks By Rewiring Online Social Networks On-The-Fly

Faster Random Walks By Rewiring Online Social Networks On-The-Fly 1 Faster Random Walks By Rewiring Online ocial Networks On-The-Fly Zhojie Zho 1, Nan Zhang 2, Zhigo Gong 3, Gatam Das 4 1,2 Compter cience Department, George Washington Uniersity 1 rexzho@gw.ed 2 nzhang10@gw.ed

More information

Master for Co-Simulation Using FMI

Master for Co-Simulation Using FMI Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany

More information

Localized Delaunay Triangulation with Application in Ad Hoc Wireless Networks

Localized Delaunay Triangulation with Application in Ad Hoc Wireless Networks 1 Localized Delanay Trianglation with Application in Ad Hoc Wireless Networks Xiang-Yang Li Gria Călinesc Peng-Jn Wan Y Wang Department of Compter Science, Illinois Institte of Technology, Chicago, IL

More information

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,

More information

Towards applications based on measuring the orbital angular momentum of light

Towards applications based on measuring the orbital angular momentum of light CHAPTER 8 Towards applications based on measring the orbital anglar momentm of light Efficient measrement of the orbital anglar momentm (OAM) of light has been a longstanding problem in both classical

More information

Faster Random Walks By Rewiring Online Social Networks On-The-Fly

Faster Random Walks By Rewiring Online Social Networks On-The-Fly Faster Random Walks By Rewiring Online ocial Networks On-The-Fly Zhojie Zho 1, Nan Zhang 2, Zhigo Gong 3, Gatam Das 4 1,2 Compter cience Department, George Washington Uniersity 1 rexzho@gw.ed 2 nzhang10@gw.ed

More information

Chapter 5 Network Layer

Chapter 5 Network Layer Chapter Network Layer Network layer Physical layer: moe bit seqence between two adjacent nodes Data link: reliable transmission between two adjacent nodes Network: gides packets from the sorce to destination,

More information

CS 557 Lecture IX. Drexel University Dept. of Computer Science

CS 557 Lecture IX. Drexel University Dept. of Computer Science CS 7 Lectre IX Dreel Uniersity Dept. of Compter Science Fall 00 Shortest Paths Finding the Shortest Paths in a graph arises in many different application: Transportation Problems: Finding the cheapest

More information

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands

More information

Picking and Curves Week 6

Picking and Curves Week 6 CS 48/68 INTERACTIVE COMPUTER GRAPHICS Picking and Crves Week 6 David Breen Department of Compter Science Drexel University Based on material from Ed Angel, University of New Mexico Objectives Picking

More information

This chapter is based on the following sources, which are all recommended reading:

This chapter is based on the following sources, which are all recommended reading: Bioinformatics I, WS 09-10, D. Hson, December 7, 2009 105 6 Fast String Matching This chapter is based on the following sorces, which are all recommended reading: 1. An earlier version of this chapter

More information

Alliances and Bisection Width for Planar Graphs

Alliances and Bisection Width for Planar Graphs Alliances and Bisection Width for Planar Graphs Martin Olsen 1 and Morten Revsbæk 1 AU Herning Aarhs University, Denmark. martino@hih.a.dk MADAGO, Department of Compter Science Aarhs University, Denmark.

More information

Evaluating Influence Diagrams

Evaluating Influence Diagrams Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will

More information

Tu P7 15 First-arrival Traveltime Tomography with Modified Total Variation Regularization

Tu P7 15 First-arrival Traveltime Tomography with Modified Total Variation Regularization T P7 15 First-arrival Traveltime Tomography with Modified Total Variation Reglarization W. Jiang* (University of Science and Technology of China) & J. Zhang (University of Science and Technology of China)

More information

FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES

FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES RICARDO G. DURÁN AND ARIEL L. LOMBARDI Abstract. We consider the nmerical approximation of a model convection-diffsion

More information

Friend of My Friend: Network Formation with Two-Hop Benefit

Friend of My Friend: Network Formation with Two-Hop Benefit Friend of My Friend: Network Formation with Two-Hop Benefit Elliot Ansheleich, Onkar Bhardwaj, and Michael Usher Rensselaer Polytechnic Institte, Troy NY, USA Abstract. How and why people form ties is

More information

Today. B-splines. B-splines. B-splines. Computergrafik. Curves NURBS Surfaces. Bilinear patch Bicubic Bézier patch Advanced surface modeling

Today. B-splines. B-splines. B-splines. Computergrafik. Curves NURBS Surfaces. Bilinear patch Bicubic Bézier patch Advanced surface modeling Comptergrafik Matthias Zwicker Uniersität Bern Herbst 29 Cres Srfaces Parametric srfaces Bicbic Bézier patch Adanced srface modeling Piecewise Bézier cres Each segment spans for control points Each segment

More information

Networks An introduction to microcomputer networking concepts

Networks An introduction to microcomputer networking concepts Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES

More information

Optimal Sampling in Compressed Sensing

Optimal Sampling in Compressed Sensing Optimal Sampling in Compressed Sensing Joyita Dtta Introdction Compressed sensing allows s to recover objects reasonably well from highly ndersampled data, in spite of violating the Nyqist criterion. In

More information

Resolving Linkage Anomalies in Extracted Software System Models

Resolving Linkage Anomalies in Extracted Software System Models Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program

More information

Fixed-Parameter Algorithms for Cluster Vertex Deletion

Fixed-Parameter Algorithms for Cluster Vertex Deletion Fixed-Parameter Algorithms for Clster Vertex Deletion Falk Hüffner Christian Komsieicz Hannes Moser Rolf Niedermeier Institt für Informatik, Friedrich-Schiller-Uniersität Jena, Ernst-Abbe-Platz 2, D-07743

More information

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,

More information

METAMODEL FOR SOFTWARE SOLUTIONS IN COMPUTED TOMOGRAPHY

METAMODEL FOR SOFTWARE SOLUTIONS IN COMPUTED TOMOGRAPHY VOL. 10, NO 22, DECEBER, 2015 ISSN 1819-6608 ETAODEL FOR SOFTWARE SOLUTIONS IN COPUTED TOOGRAPHY Vitaliy ezhyev Faclty of Compter Systems and Software Engineering, Universiti alaysia Pahang, Gambang, alaysia

More information

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity

More information

Object Pose from a Single Image

Object Pose from a Single Image Object Pose from a Single Image How Do We See Objects in Depth? Stereo Use differences between images in or left and right eye How mch is this difference for a car at 00 m? Moe or head sideways Or, the

More information

CAPL Scripting Quickstart

CAPL Scripting Quickstart CAPL Scripting Qickstart CAPL (Commnication Access Programming Langage) For CANalyzer and CANoe V1.01 2015-12-03 Agenda Important information before getting started 3 Visal Seqencer (GUI based programming

More information

Distributed Systems Security. Authentication Practice - 2. Prof. Steve Wilbur

Distributed Systems Security. Authentication Practice - 2. Prof. Steve Wilbur Distribted Systems Secrity Athentication Practice - 2 Prof. Steve Wilbr s.wilbr@cs.cl.ac.k MSc in Data Commnications Networks and Distribted Systems, UCL Lectre Objectives Examine X.509 as a practical

More information

[1] Hopcroft, J., D. Joseph and S. Whitesides, Movement problems for twodimensional

[1] Hopcroft, J., D. Joseph and S. Whitesides, Movement problems for twodimensional Acknoledgement. The athors thank Bill Lenhart for interesting discssions on the recongration of rlers. References [1] Hopcroft, J., D. Joseph and S. Whitesides, Moement problems for todimensional linkages,

More information

C Puzzles! Taken from old exams. Integers Sep 3, Encoding Integers Unsigned. Encoding Example (Cont.) The course that gives CMU its Zip!

C Puzzles! Taken from old exams. Integers Sep 3, Encoding Integers Unsigned. Encoding Example (Cont.) The course that gives CMU its Zip! 15-13 The corse that gies CMU its Zip! Topics class3.ppt Integers Sep 3,! Nmeric Encodings " Unsigned & Two s complement! Programming Implications " C promotion rles! Basic operations " Addition, negation,

More information

Pushing squares around

Pushing squares around Pshing sqares arond Adrian Dmitresc János Pach Ý Abstract We stdy dynamic self-reconfigration of modlar metamorphic systems. We garantee the feasibility of motion planning in a rectanglar model consisting

More information

Analytical Solution of Kinematic Response of Batter Pile under P and SV Waves Earthquake

Analytical Solution of Kinematic Response of Batter Pile under P and SV Waves Earthquake 7 th SASTech 013, ran, Bandar-Abbas. 7-8 March, 013. Organized by Khaaran nstitte of igher Edcation Analytical Soltion of Kinematic Response of Batter ile nder and S Waes Earthqake M. Ghazai 1,. Raanshenas

More information

STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWORK DYNAMICS FOR STATIC OPTIMIZATION

STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWORK DYNAMICS FOR STATIC OPTIMIZATION STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWOR DYNAMICS FOR STATIC OPTIMIZATION Grsel Serpen and Yifeng X Electrical Engineering and Compter Science Department, The University of Toledo, Toledo, OH

More information

Method to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot

Method to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot Method to bild an initial adaptive Nero-Fzzy controller for joints control of a legged robot J-C Habmremyi, P. ool and Y. Badoin Royal Military Academy-Free University of Brssels 08 Hobbema str, box:mrm,

More information

h-vectors of PS ear-decomposable graphs

h-vectors of PS ear-decomposable graphs h-vectors of PS ear-decomposable graphs Nima Imani 2, Lee Johnson 1, Mckenzie Keeling-Garcia 1, Steven Klee 1 and Casey Pinckney 1 1 Seattle University Department of Mathematics, 901 12th Avene, Seattle,

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 15: Virtal Address Space Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian OS Abstractions Applications

More information

Design and Optimization of Multi-Faceted Reflectarrays for Satellite Applications

Design and Optimization of Multi-Faceted Reflectarrays for Satellite Applications Design and Optimization of Mlti-Faceted Reflectarrays for Satellite Applications Min Zho, Stig B. Sørensen, Peter Meincke, and Erik Jørgensen TICRA, Copenhagen, Denmark ticra@ticra.com Abstract The design

More information

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems Reqirements Engineering Objectives An introdction to reqirements Gerald Kotonya and Ian Sommerville To introdce the notion of system reqirements and the reqirements process. To explain how reqirements

More information

ABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS

ABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS Proceedings th FIG Symposim on Deformation Measrements Santorini Greece 00. ABSOUTE DEFORMATION PROFIE MEASUREMENT IN TUNNES USING REATIVE CONVERGENCE MEASUREMENTS Mahdi Moosai and Saeid Khazaei Mining

More information

Rectangle-of-influence triangulations

Rectangle-of-influence triangulations CCCG 2016, Vancoer, British Colmbia, Ag 3 5, 2016 Rectangle-of-inflence trianglations Therese Biedl Anna Lbi Saeed Mehrabi Sander Verdonschot 1 Backgrond The concept of rectangle-of-inflence (RI) draings

More information

Available online: 25 Oct To link to this article:

Available online: 25 Oct To link to this article: This article was downloaded by: [Whan Uniersity] On: 5 Febrary 202, At: 9:06 Pblisher: Taylor & Francis Informa Ltd Registered in England and Wales Registered Nmber: 072954 Registered office: Mortimer

More information

CS 4204 Computer Graphics

CS 4204 Computer Graphics CS 424 Compter Graphics Crves and Srfaces Yong Cao Virginia Tech Reference: Ed Angle, Interactive Compter Graphics, University of New Mexico, class notes Crve and Srface Modeling Objectives Introdce types

More information

A Unified Energy-Efficient Topology for Unicast and Broadcast

A Unified Energy-Efficient Topology for Unicast and Broadcast A Unified Energy-Efficient Topology for Unicast and Broadcast Xiang-Yang Li Dept. of Compter Science Illinois Institte of Technology, Chicago, IL, USA xli@cs.iit.ed Wen-Zhan Song School of Eng. & Comp.

More information

Multi-lingual Multi-media Information Retrieval System

Multi-lingual Multi-media Information Retrieval System Mlti-lingal Mlti-media Information Retrieval System Shoji Mizobchi, Sankon Lee, Fmihiko Kawano, Tsyoshi Kobayashi, Takahiro Komats Gradate School of Engineering, University of Tokshima 2-1 Minamijosanjima,

More information

Chapter 7 TOPOLOGY CONTROL

Chapter 7 TOPOLOGY CONTROL Chapter TOPOLOGY CONTROL Oeriew Topology Control Gabriel Graph et al. XTC Interference SINR & Schedling Complexity Distribted Compting Grop Mobile Compting Winter 00 / 00 Distribted Compting Grop MOBILE

More information

Minimal Edge Addition for Network Controllability

Minimal Edge Addition for Network Controllability This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,

More information

Towards Understanding Bilevel Multi-objective Optimization with Deterministic Lower Level Decisions

Towards Understanding Bilevel Multi-objective Optimization with Deterministic Lower Level Decisions Towards Understanding Bilevel Mlti-objective Optimization with Deterministic Lower Level Decisions Ankr Sinha Ankr.Sinha@aalto.fi Department of Information and Service Economy, Aalto University School

More information

On the Existence of Subliminal Channel in Instant Messaging Systems

On the Existence of Subliminal Channel in Instant Messaging Systems , pp. 353-362 http://dx.doi.org/10.14257/ijsia.2015.9.3.27 On the Existence of Sbliminal Channel in Instant Messaging Systems Lingyn Xiang 1, Yha Xie 2, Gang Lo 3 and Weizheng Wang 1 1 School of Compter

More information

Queries. Inf 2B: Ranking Queries on the WWW. Suppose we have an Inverted Index for a set of webpages. Disclaimer. Kyriakos Kalorkoti

Queries. Inf 2B: Ranking Queries on the WWW. Suppose we have an Inverted Index for a set of webpages. Disclaimer. Kyriakos Kalorkoti Qeries Inf B: Ranking Qeries on the WWW Kyriakos Kalorkoti School of Informatics Uniersity of Edinbrgh Sppose e hae an Inerted Index for a set of ebpages. Disclaimer I Not really the scenario of Lectre.

More information

EMC ViPR. User Guide. Version

EMC ViPR. User Guide. Version EMC ViPR Version 1.1.0 User Gide 302-000-481 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is accrate

More information

Mobility Control and Its Applications in Mobile Ad Hoc Networks

Mobility Control and Its Applications in Mobile Ad Hoc Networks Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai, Florida Atlantic Uniersity Abstract Most eisting localized protocols in mobile ad hoc netorks, sch as data commnication

More information

Today s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of

Today s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of Today s Lectre Lectre 27: Introdction to Software Architectre Kenneth M. Anderson Fondations of Software Engineering CSCI 5828 - Spring Semester, 1999 Introdction and Backgrond of Software Architectre

More information

Multiple Source Shortest Paths in a Genus g Graph

Multiple Source Shortest Paths in a Genus g Graph Mltiple Sorce Shortest Paths in a Gens g Graph Sergio Cabello Erin W. Chambers Abstract We gie an O(g n log n) algorithm to represent the shortest path tree from all the ertices on a single specified face

More information

p-norm MINIMIZATION OVER INTERSECTIONS OF CONVEX SETS İlker Bayram

p-norm MINIMIZATION OVER INTERSECTIONS OF CONVEX SETS İlker Bayram p-norm MINIMIZATION OVER INTERSECTIONS OF CONVEX SETS İlker Bayram Istanbl Technical University, Department of Electronics and Telecommnications Engineering, Istanbl, Trkey ABSTRACT We consider the imization

More information

circuit simulation NP-complete? backward retiming forward retiming f(x)

circuit simulation NP-complete? backward retiming forward retiming f(x) Optimal FPGA Mapping and Retiming with Ecient Initial State Comptation Jason Cong and Chang W Department of Compter Science Uniersity of California, Los Angeles, CA 995 Abstract For seqential circits with

More information

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING International Jornal of Modern Engineering Research (IJMER) www.imer.com Vol.1, Isse1, pp-134-139 ISSN: 2249-6645 IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING

More information

A Distributed Algorithm for Deadlock Detection and Resolution

A Distributed Algorithm for Deadlock Detection and Resolution A Distribted Algorithm for Deadlock Detection and Resoltion Don P. Mitchell Michael J. Merritt AT&T Bell Laboratories ABSTRACT This aer resents two distribted algorithms for detecting and resoling deadlocks.

More information

EECS 487: Interactive Computer Graphics f

EECS 487: Interactive Computer Graphics f Interpolating Key Vales EECS 487: Interactive Compter Graphics f Keys Lectre 33: Keyframe interpolation and splines Cbic splines The key vales of each variable may occr at different frames The interpolation

More information

THE Unit Commitment problem (UCP) is the problem of

THE Unit Commitment problem (UCP) is the problem of IEEE TRANS IN POWER SYSTEMS 1 A new MILP-based approach for Unit Commitment in power prodction planning. Ana Viana and João Pedro Pedroso Abstract This paper presents a novel, iterative optimisation algorithm

More information

Subgraph Matching with Set Similarity in a Large Graph Database

Subgraph Matching with Set Similarity in a Large Graph Database 1 Sbgraph Matching with Set Similarity in a Large Graph Database Liang Hong, Lei Zo, Xiang Lian, Philip S. Y Abstract In real-world graphs sch as social networks, Semantic Web and biological networks,

More information

EMC VNX Series. Problem Resolution Roadmap for VNX with ESRS for VNX and Connect Home. Version VNX1, VNX2 P/N REV. 03

EMC VNX Series. Problem Resolution Roadmap for VNX with ESRS for VNX and Connect Home. Version VNX1, VNX2 P/N REV. 03 EMC VNX Series Version VNX1, VNX2 Problem Resoltion Roadmap for VNX with ESRS for VNX and Connect Home P/N 300-014-335 REV. 03 Copyright 2012-2014 EMC Corporation. All rights reserved. Pblished in USA.

More information

Features. ICMS Integrated Corrosion Management System

Features. ICMS Integrated Corrosion Management System ICMS Integrated Corrosion System Featres Total Corrosion Data Data Exhange with DCS/PCS/SCADA Systems Correlate Corrosion & Process Data Enables Highly Cost-Effective Asset Designed Specifically for Corrosion

More information

Lemma 1 Let the components of, Suppose. Trees. A tree is a graph which is. (a) Connected and. (b) has no cycles (acyclic). (b)

Lemma 1 Let the components of, Suppose. Trees. A tree is a graph which is. (a) Connected and. (b) has no cycles (acyclic). (b) Trees Lemma Let the components of ppose "! be (a) $&%('*)+ - )+ / A tree is a graph which is (b) 0 %(')+ - 3)+ / 6 (a) (a) Connected and (b) has no cycles (acyclic) (b) roof Eery path 8 in which is not

More information

StaCo: Stackelberg-based Coverage Approach in Robotic Swarms

StaCo: Stackelberg-based Coverage Approach in Robotic Swarms Maastricht University Department of Knowledge Engineering Technical Report No.:... : Stackelberg-based Coverage Approach in Robotic Swarms Kateřina Staňková, Bijan Ranjbar-Sahraei, Gerhard Weiss, Karl

More information

C Puzzles The course that gives CMU its Zip! Integer Arithmetic Operations Jan. 25, Unsigned Addition. Visualizing Integer Addition

C Puzzles The course that gives CMU its Zip! Integer Arithmetic Operations Jan. 25, Unsigned Addition. Visualizing Integer Addition 1513 The corse that gies CMU its Zip! Integer Arithmetic Operations Jan. 5, 1 Topics Basic operations Addition, negation, mltiplication Programming Implications Conseqences of oerflow Using shifts to perform

More information

Curves and Surfaces. CS 537 Interactive Computer Graphics Prof. David E. Breen Department of Computer Science

Curves and Surfaces. CS 537 Interactive Computer Graphics Prof. David E. Breen Department of Computer Science Crves and Srfaces CS 57 Interactive Compter Graphics Prof. David E. Breen Department of Compter Science E. Angel and D. Shreiner: Interactive Compter Graphics 6E Addison-Wesley 22 Objectives Introdce types

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introdction (forarding and roting) Reie of qeeing theor Roting algorithms Link state, Distance Vector Roter design and operation IP: Internet Protocol IP4 (datagram format, addressing, ICMP,

More information

Isilon InsightIQ. Version 2.5. User Guide

Isilon InsightIQ. Version 2.5. User Guide Isilon InsightIQ Version 2.5 User Gide Pblished March, 2014 Copyright 2010-2014 EMC Corporation. All rights reserved. EMC believes the information in this pblication is accrate as of its pblication date.

More information

CS 153 Design of Operating Systems

CS 153 Design of Operating Systems CS 153 Design of Operating Systems Spring 18 Lectre 3: OS model and Architectral Spport Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Last time/today

More information

Local Run Manager. Software Reference Guide for MiSeqDx

Local Run Manager. Software Reference Guide for MiSeqDx Local Rn Manager Software Reference Gide for MiSeqDx Local Rn Manager Overview 3 Dashboard Overview 4 Administrative Settings and Tasks 7 Workflow Overview 12 Technical Assistance 17 Docment # 1000000011880

More information

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un Dynamic Maintenance of Majority Information in Constant Time per Update? Gdmnd S. Frandsen and Sven Skym BRICS 1 Department of Compter Science, University of arhs, Ny Mnkegade, DK-8000 arhs C, Denmark

More information

A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA

A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA Mei Zho*, Ling-li Tang, Chan-rong Li, Zhi Peng, Jing-mei Li Academy of Opto-Electronics, Chinese Academy of Sciences, No.9, Dengzhang

More information

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna

More information

Factors Influencing Performance of Firefly and Particle Swarm Optimization Algorithms

Factors Influencing Performance of Firefly and Particle Swarm Optimization Algorithms Factors Inflencing Performance of Firefly and Particle Swarm Optimization Algorithms Damanjeet Kar, UIET, Panjab University, Chandigarh Abstract In this paper, two natre inspired meta heristic approaches

More information

Planarity-Preserving Clustering and Embedding for Large Planar Graphs

Planarity-Preserving Clustering and Embedding for Large Planar Graphs Planarity-Presering Clstering and Embedding for Large Planar Graphs Christian A. Dncan, Michael T. Goodrich, and Stephen G. Koboro Center for Geometric Compting The Johns Hopkins Uniersity Baltimore, MD

More information

A choice relation framework for supporting category-partition test case generation

A choice relation framework for supporting category-partition test case generation Title A choice relation framework for spporting category-partition test case generation Athor(s) Chen, TY; Poon, PL; Tse, TH Citation Ieee Transactions On Software Engineering, 2003, v. 29 n. 7, p. 577-593

More information

Millimeter-Wave Multi-Hop Wireless Backhauling for 5G Cellular Networks

Millimeter-Wave Multi-Hop Wireless Backhauling for 5G Cellular Networks 2017 IEEE 85th Vehiclar Technology Conference (VTC-Spring) Millimeter-Wave Mlti-Hop Wireless Backhaling for 5G Celllar Networks B. P. S. Sahoo, Chn-Han Yao, and Hng-Y Wei Gradate Institte of Electrical

More information

Energy-Efficient Mobile-Edge Computation Offloading for Applications with Shared Data

Energy-Efficient Mobile-Edge Computation Offloading for Applications with Shared Data Energy-Efficient Mobile-Edge Comptation Offloading for Applications with Shared Data Xiangy He, Hong Xing, Ye Chen, Armgam Nallanathan School of Electronic Engineering and Compter Science Qeen Mary University

More information

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment

More information

COMPOSITION OF STABLE SET POLYHEDRA

COMPOSITION OF STABLE SET POLYHEDRA COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining

More information

Real-time mean-shift based tracker for thermal vision systems

Real-time mean-shift based tracker for thermal vision systems 9 th International Conference on Qantitative InfraRed Thermography Jly -5, 008, Krakow - Poland Real-time mean-shift based tracker for thermal vision systems G. Bieszczad* T. Sosnowski** * Military University

More information

Building Facade Detection, Segmentation, and Parameter Estimation for Mobile Robot Localization and Guidance

Building Facade Detection, Segmentation, and Parameter Estimation for Mobile Robot Localization and Guidance Bilding Facade etection, Segmentation, and Parameter Estimation for Mobile Robot Localization and Gidance Jeffrey A. elmerico SUNY at Bffalo jad12@bffalo.ed Philip aid Army Research Laboratory Adelphi,

More information

Continuity Smooth Path Planning Using Cubic Polynomial Interpolation with Membership Function

Continuity Smooth Path Planning Using Cubic Polynomial Interpolation with Membership Function J Electr Eng Technol Vol., No.?: 74-?, 5 http://dx.doi.org/.537/jeet.5..?.74 ISSN(Print) 975- ISSN(Online) 93-743 Continity Smooth Path Planning Using Cbic Polomial Interpolation with Membership Fnction

More information

New Architectures for Hierarchical Predictive Control

New Architectures for Hierarchical Predictive Control Preprint, 11th IFAC Symposim on Dynamics and Control of Process Systems, inclding Biosystems Jne 6-8, 216. NTNU, Trondheim, Norway New Architectres for Hierarchical Predictive Control Victor M. Zavala

More information

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz

More information

Constraint-Driven Communication Synthesis

Constraint-Driven Communication Synthesis Constraint-Drien Commnication Synthesis Alessandro Pinto Goqiang Wang Lca P. Carloni Abstract Constraint-drien Commnication Synthesis enables the atomatic design of the commnication architectre of a complex

More information

TAKING THE PULSE OF ICT IN HEALTHCARE

TAKING THE PULSE OF ICT IN HEALTHCARE ICT TODAY THE OFFICIAL TRADE JOURNAL OF BICSI Janary/Febrary 2016 Volme 37, Nmber 1 TAKING THE PULSE OF ICT IN HEALTHCARE + PLUS + High-Power PoE + Using HDBaseT in AV Design for Schools + Focs on Wireless

More information

3D SURFACE RECONSTRUCTION BASED ON COMBINED ANALYSIS OF REFLECTANCE AND POLARISATION PROPERTIES: A LOCAL APPROACH

3D SURFACE RECONSTRUCTION BASED ON COMBINED ANALYSIS OF REFLECTANCE AND POLARISATION PROPERTIES: A LOCAL APPROACH 3D SURFACE RECONSTRUCTION BASED ON COMBINED ANALYSIS OF REFLECTANCE AND POLARISATION PROPERTIES: A LOCAL APPROACH Pablo d Angelo and Christian Wöhler DaimlerChrysler Research and Technology, Machine Perception

More information

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code:

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code: EE8 Winter 25 Homework #2 Soltions De Thrsday, Feb 2, 5 P. ( points) Consider the following fragment of Java code: for (i=; i

More information

Combined cine- and tagged-mri for tracking landmarks on the tongue surface

Combined cine- and tagged-mri for tracking landmarks on the tongue surface INTERSPEECH 2015 Combined cine- and tagged-mri for tracking landmarks on the tonge srface Honghao Bao 1, Wenhan L 1, Kiyoshi Honda 2,*, Jiango Wei 1, Qiang Fang 3, Jianw Dang 2, 4 1 School of Compter Software,

More information

Digital Image Processing Chapter 5: Image Restoration

Digital Image Processing Chapter 5: Image Restoration Digital Image Processing Chapter 5: Image Restoration Concept of Image Restoration Image restoration is to restore a degraded image back to the original image while image enhancement is to maniplate the

More information

Unit Testing with VectorCAST and AUTOSAR

Unit Testing with VectorCAST and AUTOSAR Unit Testing with VectorCAST and AUTOSAR Vector TechDay Software Testing with VectorCAST V1.0 2018-11-15 Agenda Introdction Unit Testing Demo Working with AUTOSAR Generated Code Unit Testing AUTOSAR SWCs

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 8: Threads Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Processes P1 P2 Recall that Bt OS A process

More information