An Application of Prim s Algorithm in Defining a SoS Operational Boundary

Size: px
Start display at page:

Download "An Application of Prim s Algorithm in Defining a SoS Operational Boundary"

Transcription

1 Paper #37 n pplication of Prim s lgorithm in efining a SoS Operational oundary lex orod harles V. Schaefer, Jr. School of ngineering Stevens nstitute of Technology astle Point on udson oboken, N.J , US Tel agorodis@stevens.edu r. rian Sauser harles V. Schaefer, Jr. School of ngineering Stevens nstitute of Technology astle Point on udson oboken, N.J , US Tel bsauser@stevens.edu bstract This paper presents an application of Prim s lgorithm to define the operational boundaries of the System of Systems structure. The proposed application finds the minimum and maximum spanning trees of a connected weighted System of Systems based on a new method. The integral part of the new method is a model to define combined weights of a pair of nodes and a link between them. The minimum and maximum spanning trees can represent the upper or the lower operational boundaries of a connected weighted System of Systems, depending on categories and measures for each category. n this paper the proposed method is demonstrated using a nine-node cluster of a weighted System of Systems. ntroduction With the current research and practice of System of Systems (SoS), which has been SR 2007, Stevens nstitute of Technology, SN PRONS SR 2007, March 4-6, oboken, NJ, US proven to be challenging (ar-yam 2004; elaurentis 2005), a fundamental difficulty has been the identification, management, and optimization of the operational boundaries of these systems. The scope of this paper is to present a model for defining these boundaries with the potential to manage and optimize the problem space. efore we describe our proposed model, we would like to state some fundamental premises of our investigation. irst, we propose that principles of complex systems can be used to define a foundation for which to develop such a model. or example, ar Yam in his research based on a literature review of the state of knowledge on SoS concluded that complex systems are one of the characteristics of SoS (ar-yam 2004). One of these principles is that of nonlinearity (zerwinski 998). The Nobel Prize winner Murray ell-mann stated, When dealing with any nonlinear system, especially a complex one, it is not sufficient to think of the system in terms of parts or aspects identified in advance, then to analyze those parts or aspects separately, and finally to

2 combine those analyses in an attempt to describe the entire system. Such an approach is not, by itself, a successful way to understand the behavior of the system. n this sense there is truth in the old adage that the whole is more than the sum of its parts. t is of crucial importance that we learn to supplement those essential specialized studies with what call a crude look at the whole (ell-mann 2000). Therefore, a second premise is that the summation of the parts is not a representation of the whole. third premise is that SoS, as complex systems, can be represented as networks (orogovtsev and Mendes 2003; Newman, - L.arabási, and Watts 2006; Pastor-Satorras and Vespignani 2004; Strogatz 200). Shenhar was one of the first who described the SoS as a network of systems functioning together to achieve a common purpose (Shenhar 994). Later, others such as Maier identified other known network-centric systems as SoSs (i.e. The nternet, the global communications network) (Maier 996). This premise will be applied to support the use of network graph theory to define the operational boundaries of the SoSs. ased on these premises, this paper presents an adaptation and application of Prim s algorithm to define the operational boundaries of a SoS. The proposed method finds the minimum and maximum spanning trees of a connected, weighted SoS. The integral part of the method is a model to define combined weight of a pair of nodes and a link between them. The minimum and maximum spanning trees can represent the upper or the lower operational boundary depending on categories and measures for each category. We will use a documented SoS characterization as an example of categories that can be used in the model, but these categorizations can be organization specific. SoS haracterization n accepted universal definition of SoS is elusive. f for no other reason, definition PRONS SR 2007, March 4-6, oboken, NJ, US implies a specific purpose, and the purposes vary. The definition of a system being already abstract itself only makes matters worse, leading to an abstraction squared. oth systems and SoS conform to the accepted definition of system in that each consists of parts, relationships and a whole that is greater than the sum of the parts, and therefore in that sense they are the same. ut these terms differ in a fundamental sense, one that impacts their structure, behavior and realization, and the distinction comes from the manner in which parts and relationships are gathered together and therefore in the nature of the emergent whole. This difference can further be described in that a SoS s parts, acting as autonomous systems, forming their own connection and variety in their diversity, lead to enhanced functionality, that fulfills capability demands that sets a SoS apart. Therefore, to define a SoS within our proposed model we will use a characterization and not a definition. y doing so, we might provide a set of continua for a systems typology showing the quanta that perhaps define stages in emergence between the two and along their continuum. We have chosen the characteristics of oardman and Sauser (oardman and Sauser 2006), because these characteristics are traceable back to a centre of gravity in the arguments as to what constitutes a SoS, as evidenced in the literature. See ppendix for a summary of these characteristics. SoS Operational oundary Model To explain our model, throughout the paper we will use a simple illustrative example of a SoS cluster with nine nodes (i.e. systems). The purpose of this illustration is to use an example which in its simplest form is a network of systems. igure shows our chosen example with each component system of the cluster represented as a node with a letter assignment. The nodes are then interconnected with links to create a network. 2

3 Links that are not shown are assumed to not exist. Node s weight (c i ) relates to a system connected via link (a i ) to another system. Link s weight (a i ) represents the maturity of system integration between pair of nodes b i and c i. λ i and β i are parameters of the system depending on the category and measures for each category. w i is the combined weight of the i- th pair of nodes and link between them. i is an identifier of a pair of nodes and the link between them. or a none existing link w i = 0 igure. NY ab SoS luster Weight ssignments The first step in defining the model and an integral part of the method is to identify the combined weight of a pair of nodes and a link between them. or our example system, we will use the following nomenclature to describe the example system: Minimum Weight Spanning Tree The next step is to assign weights based on a predefined categorization for determining the minimum weight spanning tree. s stated earlier, we would be using the oardman and Sauser characterization of SoS to define these categories. xtracting a Minimum Spanning Tree (MST) is a classic problem. Significant research has been conducted to compare performance of various MST algorithms for different applications in various settings (redman and Tarjan 987; Kruskal 956; Moret and Shapiro 994; Noshita 985; Prim 957; ijkstra 959). System System b Node Link Weight Node i c Weight a i i Weight We use Prim s algorithm to calculate the ombined Weight w i igure 2. Weight ssignments igure 2 depicts two weighted nodes and a weighted link between them with a combined weight w i. The following formula represents the combined weight of a pair of nodes and a link between them: w i = a i + λ i b i +β i c i () Node s weight (b i ) relates to a particular system in a SoS. minimum cost spanning tree for a connected weighted graph (Prim 957). n the proposed algorithm, the sum of combined weights w i of the minimum spanning tree will represent this tree total value: W MinSpanTree = w i (2) i MinSpanTree Where each w i is defined by formula (). The value of WMinSpanTree that was calculated in formula (2) will be used as a lower operational boundary of a SoS based on specific category. 3 PRONS SR 2007, March 4-6, oboken, NJ, US

4 Maximum Weight Spanning Tree n this section we will find the maximum weight spanning tree based on a minimum spanning tree algorithm (ven 979). The value of the maximum weight spanning tree will be calculated as follows: W MaxSpanTree = i i MaxSpanTree The value of WMaxSpanTree calculated by formula (3) will be used as an upper operational boundary of a SoS based on specific category. pplication of the Method Let s assume that connectivity category of a SoS depicted in igure is represented by the following graph. w (3) or the purposes of our example we are using the onnectivity category and assuming that the combined weights have been calculated and assigned on a scale of 0 to, as illustrated in igure 3. The methodology for determining the weights will be organizational and characteristic specific. or the purposes of this paper, the weights are randomly selected to illustrate the model. inding Lower Operational oundary s previously suggested, we will find the value of the minimum spanning tree in order to define the lower operational boundary of the SoS depicted in igure 3. igure 3. Weighted SoS (onnectivity ategory) The extracted minimum cost spanning tree is represented in igure 4. The numbers allotted between vertices indicate the assigned combined weights. Vertices are components of the System of Systems represented by letters to. igure 4. Maximum Weight Spanning Tree The following is a detailed description of how the minimum cost spanning tree is extracted. Select an arbitrary node. Select a node neighboring node with the lowest weight value. is away, is and is ; as a result we select. Select the neighboring node with the lowest weight value away from either or. Node is away from, is away from. is away from. is away from but only from. Select. Now, are part of the tree. Select the neighboring node with the lowest weight value away from, or. is away from and also away from. is away from, and is from. s a result,,,, or can be selected. We select. s a result, are part of the tree. Select because, and all have weight value of, so again, any one of them can be selected. and are part of the tree. 4 PRONS SR 2007, March 4-6, oboken, NJ, US

5 2 3 4 Select, since is the lowest weight value away from. and are now part of the tree. Select, because is away from. Now,, and are part of the tree. Select, because is away from. Now,, and are part of the tree. inally, is selected because is away from., and are part of the minimum cost spanning tree. igure 5 depicts the presented minimum weight spanning progression. igure 5. Minimum Weight Spanning Tree Progression igure 6. Maximum Weight Spanning Tree The maximum weight spanning tree represents either the strongest or the weakest path depending on the category and category measures. The weakest link can be of particular significance in weighted networks (ranovetter 973). or example: n the connectivity category with capabilities measure, the larger the weight, the stronger the path. On the other hand, with risk measure, the larger the weight (higher the risk), the weaker the path. Optimization Space We agree with isner et al. that the optimization of each system does not guarantee the optimization of the overall system of systems (isner, Marciniak, and McMillan 99) owever, a SoS can be optimized by selecting the optimum tree between components depending on categories and measures for these categories. Therefore, the area between operational boundaries is an optimization space of a SoS, as illustrated in igure 7 based on calculations shown in igure 8. inding Upper Operational oundary The maximum weight spanning tree is used to define upper operational boundaries of a SoS. igure 6 depicts the maximum spanning tree found for the given SoS graph. 5 PRONS SR 2007, March 4-6, oboken, NJ, US

6 Total Weight of the Spanning Tree Number of Nodes in a Network (omponent Systems in a SoS) igure 7. Optimization Space of SoS (onnectivity ategory) # of Nodes Optimization in a Network W MinSpanTree W MaxSpanTree Space Optimization Space igure 8. Optimization Space alculation igure 8 also shows, as expected, that as the number of nodes on a network decreases the optimization space is also decreasing. The Minimum Operational oundary and the Maximum Operational oundary of the Optimization Space as shown in igure 7 are correspondingly the values of the weights of the minimum and the maximum spanning trees. These weights are defined in formula (2) and (3). The SoS optimization space and its minimum and maximum boundaries depend on the SoS components categories and measures. ategories and Measures or this paper we used defined categories for characterization of a SoS as defined in PRONS SR 2007, March 4-6, oboken, NJ, US.2 raph ppendix. While we did not define how these categories may be quantified, each category there can have a single or multiple measures, for example: vailability unctionality ntegration Supportability ompatibility The characterization of a system boundary need not ask was it good or bad, but was it the right boundary to the situation, the task and the environment. We presented a model for characterizing a SoS operation boundary, but a characterization of classification system should provide a framework through which to define and establish guidelines with attributes that ensure meaningful differentiation are recognized and addressed (Sauser, 2006). Thus any model such as the one we have presented should be organization-specific (no project or organization is the same), maintain simplicity for a universal use within an organization, and provide two fundamental functions, definition and arrangement. efinition is the determination of classes of entities that share characteristic attributes; and arrangement involves a systematic ordering of classes that expresses conceptual relationships within the overall structure (Jacob, 99). onclusion Maturity apability Security Risk tc. n this paper we introduced a new method to define SoS operational boundaries based on a characterization of a SoS and to determine the optimum connectivity path between SoS components. We proposed a model to define the combined weight of a pair of nodes and a link between them. The research suggests that by extracting the minimum and maximum spanning trees from the connected weighted graph we can 6

7 determine the operational boundaries of the SoS structure. The new method and accompanying model will be used as a framework for future research on the topic. urthermore, a practical tool to define operational boundaries of a SoS based on the proposed framework is a part of current and future research by the authors of this paper. uture Research s part of future research the proposed method will be applied to the rest of the oardman-sauser (oardman and Sauser 2006) distinguishing characteristics of SoSs, as defined in ppendix, and potential categories measures. This can serve as a basis to create a omplexity Model for a SoS, and to define its operational boundaries. ppendix presents the first draft of a omplexity Model of a SoS showing how the characteristics will translate into a defined operational boundary. The diagram in ppendix represents the possible lower and upper boundaries for each of different categories, both of a SoS and it s polar opposite that could be represented as a ninenode graph shown on igure 3. References ar-yam, Y The haracteristics and merging ehaviors System of Systems. Paper read at NS: omplex Physical, iological and Social Systems Project. oardman, J., and. Sauser System of Systems: The Meaning of of. Paper read at nternational System of Systems onference, pril 24-26, at Los ngeles,. zerwinski, T oping with the bounds: speculations on nonlinearity in militaryaffairs, RP. elaurentis, Understanding Transportation as a System of Systems esign Problem. Paper read at 43rd erospace Sciences Meeting, January 0-3, at Reno, NV. ijkstra, Note on Two Problems in onnexion with raphs. Numerische Mathematik : orogovtsev, S., and J. Mendes volution of Networks: rom iological Nets to the nternet and WWW, Oxford Press. isner,., J. Marciniak, and R. McMillan. 99. omputer-ided System of Systems (S2) ngineering. Paper read at nternational onference on Systems, Man, ybernetics, October 3-6, at harlottesville, V. ven, S raph lgorithms, omputer Science Press, Rockville, M. redman, M., and R. Tarjan ubonacci heaps and their use in improved network optimization algorithms. Journal of M ell-mann, M n nlarged oncept of Sustainability. Talk at meeting of S usiness Network. ranovetter, M The Strength of Weak Ties. merican Journal of Sociology Jacob,. 99. lassification and categorization: rawing the line, Proceedings of the 2nd SS S/R lassification Research Workshop: dvances in lassification Research Kruskal, J On the shortest spanning tree of a graph and the travelling salesman problem. Proceedings of the merican Mathematics Society Maier, M rchitecting principles of systems-of-systems. Paper read at 6th nnual nternational Symposium of the 7 PRONS SR 2007, March 4-6, oboken, NJ, US

8 nternational ounsil on Systems ngineering, at oston, M. Moret,., and. Shapiro n empirical assessment of algorithms for constructing a minimum spanning tree. MS Series in iscrete Mathematics and Theoretical omputer Science Newman, M., -L.arabási, and. Watts The Structure and ynamics of Networks, Princeton University Press. Noshita, K theorem on the expected complexity of ijkstra s shortest path algorithm. Journal of lgorithms Pastor-Satorras, R., and. Vespignani volution and Structure of the nternet: Statistical Physics pproach, ambridge University Press. Prim, R Shortest connection networks and some generalizations. ell System Technical Journal Sauser,., and J. oardman rom Prescience to mergence: Taking old of System of Systems Management. Paper read at 27th nnual National onference of merican Society for ngineering Management, October 25-28, at untsville, L. Sauser, Toward Mission ssurance: ramework for Systems ngineering Management. Systems ngineering 9(3) Shenhar, New Systems ngineering Taxonomy. Paper read at 4th nternational Symposium of the National ouncil on System ngineering. Strogatz, S xploring complex networks. Nature iography lex orod received a.s. in nformation Systems and an M.S. in Telecommunications degrees from Pace University. Prior to the graduate studies he held a Research nalyst position at Salomon Smith arney. urrently he is a Research ssistant as well as a Ph. student of Systems ngineering and ngineering Management (SM) at Stevens nstitute of Technology. rian Sauser holds a.s. from Texas &M University in griculture evelopment with an emphasis in orticulture Technology, a M.S. from Rutgers University in ioresource ngineering, and a Ph.. from Stevens nstitute of Technology in Technology Management. e has worked in government, industry, and academia for more than 2 years as both a researcher/engineer and director of programs. e is currently an ssistant Professor at Stevens nstitute of Technology in the Systems ngineering and ngineering Management (SM) epartment and irector of the SM Systems ngineering Management Program. 8 PRONS SR 2007, March 4-6, oboken, NJ, US

9 PRONS SR 2007, March 4-6, oboken, NJ, US 9

10 ppendix. oundation and escriptions of the SoS haracteristics 0 PRONS SR 2007, March 4-6, oboken, NJ, US

System of Systems Complexity Identification and Control

System of Systems Complexity Identification and Control System of Systems Identification and ontrol Joseph J. Simpson Systems oncepts nd ve NW # Seattle, W jjs-sbw@eskimo.com Mary J. Simpson Systems oncepts nd ve NW # Seattle, W mjs-sbw@eskimo.com bstract System

More information

TCOM 501: Networking Theory & Fundamentals. Lecture 11 April 16, 2003 Prof. Yannis A. Korilis

TCOM 501: Networking Theory & Fundamentals. Lecture 11 April 16, 2003 Prof. Yannis A. Korilis TOM 50: Networking Theory & undamentals Lecture pril 6, 2003 Prof. Yannis. Korilis 2 Topics Routing in ata Network Graph Representation of a Network Undirected Graphs Spanning Trees and Minimum Weight

More information

A Dynamic Method of Constructing MST Based on OpenFlow Protocol

A Dynamic Method of Constructing MST Based on OpenFlow Protocol ynamic Method of onstructing MST ased on Openlow Protocol Haike Liu*, Jilin Li, Kai Yang eijing Institute of Satellite Information ngineering, No. 82, Zhichun Road, Haidian istrict, eijing, hina. * orresponding

More information

Lesson 5.5. Minimum Spanning Trees. Explore This

Lesson 5.5. Minimum Spanning Trees. Explore This Lesson. St harles ounty Minimum Spanning Trees s in many of the previous lessons, this lesson focuses on optimization. Problems and applications here center on two types of problems: finding ways of connecting

More information

Distributed Method Selection and Dispatching of Contingent, Temporally Flexible Plans

Distributed Method Selection and Dispatching of Contingent, Temporally Flexible Plans istributed ethod Selection and ispatching of ontingent, Temporally lexible Plans Stephen. lock and rian. Williams omputer Science and rtificial ntelligence Laboratory, assachusetts nstitute of Technology,

More information

The Need for a Process Mining Evaluation Framework in Research and Practice

The Need for a Process Mining Evaluation Framework in Research and Practice The Need for a Process Mining valuation ramework in Research and Practice Position Paper. Rozinat,.K. lves de Medeiros,.W. ünther,.j.m.m. Weijters, and W.M.P. van der alst indhoven University of Technology

More information

Alternate Algorithm for DSM Partitioning

Alternate Algorithm for DSM Partitioning lternate lgorithm for SM Partitioning Power of djacency Matrix pproach Using the power of the adjacency matrix approach, a binary SM is raised to its n th power to indicate which tasks can be traced back

More information

CS1800: Graph Algorithms (2nd Part) Professor Kevin Gold

CS1800: Graph Algorithms (2nd Part) Professor Kevin Gold S1800: raph lgorithms (2nd Part) Professor Kevin old Summary So ar readth-irst Search (S) and epth-irst Search (S) are two efficient algorithms for finding paths on graphs. S also finds the shortest path.

More information

CAD Algorithms. Shortest Path

CAD Algorithms. Shortest Path lgorithms Shortest Path lgorithms Mohammad Tehranipoor epartment September 00 Shortest Path Problem: ind the best way of getting from s to t where s and t are vertices in a graph. est: Min (sum of the

More information

A Geometric Approach to the Bisection Method

A Geometric Approach to the Bisection Method Geometric pproach to the isection Method laudio Gutierrez 1, Flavio Gutierrez 2, and Maria-ecilia Rivara 1 1 epartment of omputer Science, Universidad de hile lanco Encalada 2120, Santiago, hile {cgutierr,mcrivara}@dcc.uchile.cl

More information

New Optimal Layer Assignment for Bus-Oriented Escape Routing

New Optimal Layer Assignment for Bus-Oriented Escape Routing New Optimal Layer ssignment for us-oriented scape Routing in-tai Yan epartment of omputer Science and nformation ngineering, hung-ua University, sinchu, Taiwan, R. O.. STRT n this paper, based on the optimal

More information

arxiv: v2 [cs.ds] 9 Apr 2009

arxiv: v2 [cs.ds] 9 Apr 2009 Pairing Heaps with Costless Meld arxiv:09034130v2 [csds] 9 Apr 2009 Amr Elmasry Max-Planck Institut für Informatik Saarbrücken, Germany elmasry@mpi-infmpgde Abstract Improving the structure and analysis

More information

Supplement to. Logic and Computer Design Fundamentals 4th Edition 1

Supplement to. Logic and Computer Design Fundamentals 4th Edition 1 Supplement to Logic and Computer esign Fundamentals 4th Edition MORE OPTIMIZTION Selected topics not covered in the fourth edition of Logic and Computer esign Fundamentals are provided here for optional

More information

Comparative study between the proposed shape independent clustering method and the conventional methods (K-means and the other)

Comparative study between the proposed shape independent clustering method and the conventional methods (K-means and the other) (IJRI) International Journal of dvanced Research in rtificial Intelligence, omparative study between the proposed shape independent clustering method and the conventional methods (K-means and the other)

More information

SWEBOK. The Emerging Consensus on the Software Engineering Body of Knowledge. A. Abran, NSERC Ottawa, February 18, 2002

SWEBOK. The Emerging Consensus on the Software Engineering Body of Knowledge. A. Abran, NSERC Ottawa, February 18, 2002 SWEBOK The Emerging Consensus on the Software Engineering Body of Knowledge A. Abran, P. Bourque,, R. Dupuis, J. W. Moore, L. Tripp NSERC Ottawa, February 18, 2002 ÉTS 1 Corporate Support by: Project managed

More information

A comparison of computer science and software engineering programmes in English universities

A comparison of computer science and software engineering programmes in English universities A comparison of computer science and software engineering programmes in English universities Meziane, F and Vadera, S Title Authors Type URL Published Date 2004 A comparison of computer science and software

More information

Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques

Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques Structural Analysis of Paper Citation and Co-Authorship Networks using Network Analysis Techniques Kouhei Sugiyama, Hiroyuki Ohsaki and Makoto Imase Graduate School of Information Science and Technology,

More information

ISO/IEC/ IEEE INTERNATIONAL STANDARD. Systems and software engineering Architecture description

ISO/IEC/ IEEE INTERNATIONAL STANDARD. Systems and software engineering Architecture description INTERNATIONAL STANDARD ISO/IEC/ IEEE 42010 First edition 2011-12-01 Systems and software engineering Architecture description Ingénierie des systèmes et des logiciels Description de l'architecture Reference

More information

Distributed minimum spanning tree problem

Distributed minimum spanning tree problem Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with

More information

We have already seen the transportation problem and the assignment problem. Let us take the transportation problem, first.

We have already seen the transportation problem and the assignment problem. Let us take the transportation problem, first. Advanced Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Lecture 19 Network Models In this lecture, we will discuss network models. (Refer

More information

Towards a Framework for Business Process Models Reuse

Towards a Framework for Business Process Models Reuse Towards a ramework for usiness Process Models Reuse Wassim erguech RI, igital nterprise Research Institute, National University of Ireland, Galway firstname.lastname@deri.org http://www.deri.ie bstract.

More information

A Generating Function Approach to Analyze Random Graphs

A Generating Function Approach to Analyze Random Graphs A Generating Function Approach to Analyze Random Graphs Presented by - Vilas Veeraraghavan Advisor - Dr. Steven Weber Department of Electrical and Computer Engineering Drexel University April 8, 2005 Presentation

More information

SECTION SIX Teaching/ Learning Geometry. General Overview

SECTION SIX Teaching/ Learning Geometry. General Overview SECTION SIX Teaching/ Learning Geometry General Overview The learning outcomes for Geometry focus on the development of an understanding of the properties of three-dimensional and plane shapes and how

More information

Academic Reference Standards (ARS) for Electronics and Electrical Communications Engineering, B. Sc. Program

Academic Reference Standards (ARS) for Electronics and Electrical Communications Engineering, B. Sc. Program Academic Reference Standards (ARS) for Electronics and Electrical Communications Engineering, B. Sc. Program Faculty of Electronic Engineering Menoufya University MARCH 2015 1 st Edition Contents Introduction.....2

More information

Routing. Effect of Routing in Flow Control. Relevant Graph Terms. Effect of Routing Path on Flow Control. Effect of Routing Path on Flow Control

Routing. Effect of Routing in Flow Control. Relevant Graph Terms. Effect of Routing Path on Flow Control. Effect of Routing Path on Flow Control Routing Third Topic of the course Read chapter of the text Read chapter of the reference Main functions of routing system Selection of routes between the origin/source-destination pairs nsure that the

More information

Efficient Rectilinear Steiner Tree Construction with Rectangular Obstacles

Efficient Rectilinear Steiner Tree Construction with Rectangular Obstacles Proceedings of the th WSES Int. onf. on IRUITS, SYSTEMS, ELETRONIS, ONTROL & SIGNL PROESSING, allas, US, November 1-3, 2006 204 Efficient Rectilinear Steiner Tree onstruction with Rectangular Obstacles

More information

Quality Software Requirements By J. Chris Gibson

Quality Software Requirements By J. Chris Gibson Quality Software Requirements By J. Chris Gibson The information contained within this document has been gathered from a variety of sources and practices observed by the development team at Protera Software

More information

Shortest Paths and Minimum Spanning Trees

Shortest Paths and Minimum Spanning Trees /9/ hortest Paths and Minimum panning Trees dmin avid Kauchak cs0 pring 0 ijkstra s algorithm What about ijkstra s on? 0-0 /9/ What about ijkstra s on? ijkstra s algorithm only works for positive edge

More information

Spanning Trees. CSE373: Data Structures & Algorithms Lecture 17: Minimum Spanning Trees. Motivation. Observations. Spanning tree via DFS

Spanning Trees. CSE373: Data Structures & Algorithms Lecture 17: Minimum Spanning Trees. Motivation. Observations. Spanning tree via DFS Spanning Trees S: ata Structures & lgorithms Lecture : Minimum Spanning Trees simple problem: iven a connected undirected graph =(V,), find a minimal subset of edges such that is still connected graph

More information

Modelling Software Evolution using Algebraic Graph Rewriting

Modelling Software Evolution using Algebraic Graph Rewriting Modelling Software Evolution using lgebraic Graph Rewriting Selim iraci and Pim van den roek Software Engineering Group aculty of Electrical Engineering, Mathematics and omputer Science University of Twente

More information

Comparing Two Program Contents with Computing Curricula 2005 Knowledge Areas

Comparing Two Program Contents with Computing Curricula 2005 Knowledge Areas Comparing Two Program Contents with Computing Curricula 2005 Knowledge Areas Azad Ali, Indiana University of Pennsylvania azad.ali@iup.edu Frederick G. Kohun, Robert Morris University kohun@rmu.edu David

More information

Hybrid Connection Simulation Using Dynamic Nodal Numbering Algorithm

Hybrid Connection Simulation Using Dynamic Nodal Numbering Algorithm merican Journal of pplied Sciences 7 (8): 1174-1181, 2010 ISSN 1546-9239 2010 Science Publications Hybrid onnection Simulation Using ynamic Nodal Numbering lgorithm 1 longkorn Lamom, 2 Thaksin Thepchatri

More information

Model-Solver Integration in Decision Support Systems: A Web Services Approach

Model-Solver Integration in Decision Support Systems: A Web Services Approach Model-Solver Integration in Decision Support Systems: A Web Services Approach Keun-Woo Lee a, *, Soon-Young Huh a a Graduate School of Management, Korea Advanced Institute of Science and Technology 207-43

More information

Highly Accurate Failure Detection System for Large-scale IP Networks

Highly Accurate Failure Detection System for Large-scale IP Networks ighly ccurate ailure etection System for Large-scale IP Networks ailure etection Silent ailure ll-ip Network Special rticles on ll-ip Network Technology volution of ore Network NTT OOMO Technical Journal

More information

Dynamic Maintenance of Majority Information in Constant Time per Update

Dynamic Maintenance of Majority Information in Constant Time per Update RIS RS-95-45 Frandsen & Skyum: ynamic Maintenance of Majority Information RIS asic Research in omputer Science ynamic Maintenance of Majority Information in onstant Time per pdate Gudmund Skovbjerg Frandsen

More information

Joint Application Design & Function Point Analysis the Perfect Match By Sherry Ferrell & Roger Heller

Joint Application Design & Function Point Analysis the Perfect Match By Sherry Ferrell & Roger Heller Joint Application Design & Function Point Analysis the Perfect Match By Sherry Ferrell & Roger Heller Introduction The old adage It s not what you know but when you know it that counts is certainly true

More information

Outline and Reading. Minimum Spanning Tree. Minimum Spanning Tree. Cycle Property. Minimum Spanning Trees ( 12.7)

Outline and Reading. Minimum Spanning Tree. Minimum Spanning Tree. Cycle Property. Minimum Spanning Trees ( 12.7) Outline and Reading Minimum Spanning Tree PV 1 1 1 1 JK 1 15 SO 11 1 LX 15 Minimum Spanning Trees ( 1.) efinitions crucial fact Prim-Jarnik s lgorithm ( 1..) Kruskal s lgorithm ( 1..1) 111 // :1 PM Minimum

More information

Maximal Prime Subgraph Decomposition of Bayesian Networks: A Relational Database Perspective

Maximal Prime Subgraph Decomposition of Bayesian Networks: A Relational Database Perspective Maximal Prime ubgraph ecomposition of ayesian Networks: Relational atabase Perspective an Wu chool of omputer cience University of Windsor Windsor Ontario anada N9 3P4 Michael Wong epartment of omputer

More information

An iteration of Branch and Bound One iteration of Branch and Bound consists of the following four steps: Some definitions. Branch and Bound.

An iteration of Branch and Bound One iteration of Branch and Bound consists of the following four steps: Some definitions. Branch and Bound. ranch and ound xamples and xtensions jesla@man.dtu.dk epartment of Management ngineering Technical University of enmark ounding ow do we get ourselves a bounding function? Relaxation. Leave out some constraints.

More information

Minimum Spanning Trees and Shortest Paths

Minimum Spanning Trees and Shortest Paths Minimum Spanning Trees and Shortest Paths Prim's algorithm ijkstra's algorithm November, 017 inda eeren / eoffrey Tien 1 Recall: S spanning tree Starting from vertex 16 9 1 6 10 13 4 3 17 5 11 7 16 13

More information

Response Network Emerging from Simple Perturbation

Response Network Emerging from Simple Perturbation Journal of the Korean Physical Society, Vol 44, No 3, March 2004, pp 628 632 Response Network Emerging from Simple Perturbation S-W Son, D-H Kim, Y-Y Ahn and H Jeong Department of Physics, Korea Advanced

More information

8.B. The result of Regiomontanus on tetrahedra

8.B. The result of Regiomontanus on tetrahedra 8.B. The result of Regiomontanus on tetrahedra We have already mentioned that Plato s theory that the five regular polyhedra represent the fundamental elements of nature, and in supplement (3.D) to the

More information

Title Core TIs Optional TIs Core Labs Optional Labs. All None 1.1.6, 1.1.7, and Network Math All None None 1.2.5, 1.2.6, and 1.2.

Title Core TIs Optional TIs Core Labs Optional Labs. All None 1.1.6, 1.1.7, and Network Math All None None 1.2.5, 1.2.6, and 1.2. CCNA 1 Plan for Academy Student Success (PASS) CCNA 1 v3.1 Instructional Update # 2006-1 This Instructional Update has been issued to provide guidance on the flexibility that Academy instructors now have

More information

CHAPTER VII INDEXED K TWIN NEIGHBOUR CLUSTERING ALGORITHM 7.1 INTRODUCTION

CHAPTER VII INDEXED K TWIN NEIGHBOUR CLUSTERING ALGORITHM 7.1 INTRODUCTION CHAPTER VII INDEXED K TWIN NEIGHBOUR CLUSTERING ALGORITHM 7.1 INTRODUCTION Cluster analysis or clustering is the task of grouping a set of objects in such a way that objects in the same group (called cluster)

More information

EXPLORING CYCLIC QUADRILATERALS WITH PERPENDICULAR DIAGONALS

EXPLORING CYCLIC QUADRILATERALS WITH PERPENDICULAR DIAGONALS North merican GeoGebra Journal Volume 4, Number 1, ISSN 2162-3856 XPLORING YLI QURILTRLS WITH PRPNIULR IGONLS lfinio lores University of elaware bstract fter a brief discussion of two preliminary activities,

More information

Chapter 14 Section 3 - Slide 1

Chapter 14 Section 3 - Slide 1 AND Chapter 14 Section 3 - Slide 1 Chapter 14 Graph Theory Chapter 14 Section 3 - Slide WHAT YOU WILL LEARN Graphs, paths and circuits The Königsberg bridge problem Euler paths and Euler circuits Hamilton

More information

Least Common Ancestor Based Method for Efficiently Constructing Rooted Supertrees

Least Common Ancestor Based Method for Efficiently Constructing Rooted Supertrees Least ommon ncestor ased Method for fficiently onstructing Rooted Supertrees M.. Hai Zahid, nkush Mittal, R.. Joshi epartment of lectronics and omputer ngineering, IIT-Roorkee Roorkee, Uttaranchal, INI

More information

The graph theory approach to analyze critical infrastructures of transportation systems

The graph theory approach to analyze critical infrastructures of transportation systems Gdynia Maritime University, Poland Journal of Polish Safety and Reliability Association Summer Safety and Reliability Seminars, Volume 5, Number 2, 2014 The graph theory approach to analyze critical infrastructures

More information

MATH 103: Contemporary Mathematics Study Guide for Chapter 6: Hamilton Circuits and the TSP

MATH 103: Contemporary Mathematics Study Guide for Chapter 6: Hamilton Circuits and the TSP MTH 3: ontemporary Mathematics Study Guide for hapter 6: Hamilton ircuits and the TSP. nswer the questions above each of the following graphs: (a) ind 3 different Hamilton circuits for the graph below.

More information

Analysis of Algorithms Prof. Karen Daniels

Analysis of Algorithms Prof. Karen Daniels UMass Lowell omputer Science 91.404 nalysis of lgorithms Prof. Karen aniels Spring, 2013 hapter 22: raph lgorithms & rief Introduction to Shortest Paths [Source: ormen et al. textbook except where noted]

More information

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile

More information

This Talk. 1) Node embeddings. Map nodes to low-dimensional embeddings. 2) Graph neural networks. Deep learning architectures for graphstructured

This Talk. 1) Node embeddings. Map nodes to low-dimensional embeddings. 2) Graph neural networks. Deep learning architectures for graphstructured Representation Learning on Networks, snap.stanford.edu/proj/embeddings-www, WWW 2018 1 This Talk 1) Node embeddings Map nodes to low-dimensional embeddings. 2) Graph neural networks Deep learning architectures

More information

Minimum Spanning Trees and Shortest Paths

Minimum Spanning Trees and Shortest Paths Minimum Spanning Trees and Shortest Paths Kruskal's lgorithm Prim's lgorithm Shortest Paths pril 04, 018 inda eeren / eoffrey Tien 1 Kruskal's algorithm ata types for implementation Kruskalslgorithm()

More information

Opportunities to Integrate Technology Into the Classroom. Presented by:

Opportunities to Integrate Technology Into the Classroom. Presented by: Opportunities to Integrate Technology Into the Classroom Presented by: Mark Salamasick, CIA, CISA, CRMA, CSP Executive Director of Audit University of Texas System Discussion Topics Internal Audit Textbook

More information

Internet Deployment of DPM-based IP Traceback

Internet Deployment of DPM-based IP Traceback Journal of omputing and nformation Technology - T 16, 2008, 2, 109 118 doi:10.2498/cit.1001131 109 nternet eployment of -based P Traceback ndrey elenky and Nirwan nsari dvanced Networking Laboratory, epartment,

More information

Pi at School. Arindama Singh Department of Mathematics Indian Institute of Technology Madras Chennai , India

Pi at School. Arindama Singh Department of Mathematics Indian Institute of Technology Madras Chennai , India Pi at School rindama Singh epartment of Mathematics Indian Institute of Technology Madras Chennai-600036, India Email: asingh@iitm.ac.in bstract: In this paper, an attempt has been made to define π by

More information

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...

More information

Module 5 Graph Algorithms

Module 5 Graph Algorithms Module 5 Graph lgorithms Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 97 E-mail: natarajan.meghanathan@jsums.edu 5. Graph Traversal lgorithms Depth First

More information

A TAXONOMY FOR REPRESENTING PRISMATIC CELLULAR MATERIALS

A TAXONOMY FOR REPRESENTING PRISMATIC CELLULAR MATERIALS Proceedings of the SME 2016 International esign Engineering Technical onferences and omputers and Information in Engineering onference IET/IE 2016 ugust 21-24, 2016, harlotte, North arolina ET2016-59081

More information

IP Forwarding Computer Networking. Routes from Node A. Graph Model. Lecture 10: Intra-Domain Routing

IP Forwarding Computer Networking. Routes from Node A. Graph Model. Lecture 10: Intra-Domain Routing IP orwarding - omputer Networking Lecture : Intra-omain Routing RIP (Routing Information Protocol) & OSP (Open Shortest Path irst) The Story So ar IP addresses are structure to reflect Internet structure

More information

These definitions cover some basic terms and concepts of graph theory and how they have been implemented as C++ classes.

These definitions cover some basic terms and concepts of graph theory and how they have been implemented as C++ classes. hapter 5. raph Theory *raph Theory, *Mathematics raph theory is an area of mathematics which has been incorporated into IS to solve some specific problems in oolean operations and sweeping. It may be also

More information

Eight units must be completed and passed to be awarded the Diploma.

Eight units must be completed and passed to be awarded the Diploma. Diploma of Computing Course Outline Campus Intake CRICOS Course Duration Teaching Methods Assessment Course Structure Units Melbourne Burwood Campus / Jakarta Campus, Indonesia March, June, October 022638B

More information

A Linear Programming Based Algorithm for Multiple Sequence Alignment by Using Markov Decision Process

A Linear Programming Based Algorithm for Multiple Sequence Alignment by Using Markov Decision Process inear rogramming Based lgorithm for ultiple equence lignment by Using arkov ecision rocess epartment of omputer cience University of aryland, ollege ark hirin ehraban dvisors: r. ern unt and r. hau-en

More information

An Experimental Study of k-splittable Scheduling for DNS-Based Traffic Allocation

An Experimental Study of k-splittable Scheduling for DNS-Based Traffic Allocation n xperimental Study of k-splittable Scheduling for NS-ased Traffic llocation mit garwal, Tarun garwal, Sumit hopra, nja eldmann, Nils Kammenhuber, Piotr Krysta, and erthold Vöcking Topic 3: Scheduling

More information

Data Models: The Center of the Business Information Systems Universe

Data Models: The Center of the Business Information Systems Universe Data s: The Center of the Business Information Systems Universe Whitemarsh Information Systems Corporation 2008 Althea Lane Bowie, Maryland 20716 Tele: 301-249-1142 Email: Whitemarsh@wiscorp.com Web: www.wiscorp.com

More information

Reading 1 : Introduction

Reading 1 : Introduction CS/Math 240: Introduction to Discrete Mathematics Fall 2015 Instructors: Beck Hasti and Gautam Prakriya Reading 1 : Introduction Welcome to CS 240, an introduction to discrete mathematics. This reading

More information

Single Source, Shortest Path Problem

Single Source, Shortest Path Problem Lecture : From ijkstra to Prim Today s Topics: ijkstra s Shortest Path lgorithm epth First Search Spanning Trees Minimum Spanning Trees Prim s lgorithm overed in hapter 9 in the textbook Some slides based

More information

Technical Note DDR2 Package Sizes and Layout Requirements

Technical Note DDR2 Package Sizes and Layout Requirements echnical ote 2 ackage Sizes and ayout equirements -47-08: 2 ackage Sizes and ayout equirements Introduction Introduction 2 breaks new ground in many areas, including its creativity in packaging solutions

More information

Centrality Measures to Identify Traffic Congestion on Road Networks: A Case Study of Sri Lanka

Centrality Measures to Identify Traffic Congestion on Road Networks: A Case Study of Sri Lanka IOSR Journal of Mathematics (IOSR-JM) e-issn: 2278-5728, p-issn: 2319-765X. Volume 13, Issue 2 Ver. I (Mar. - Apr. 2017), PP 13-19 www.iosrjournals.org Centrality Measures to Identify Traffic Congestion

More information

State Space Reduction for the SYMMETRIC Traveling Salesman Problem through Halves Tours Complement

State Space Reduction for the SYMMETRIC Traveling Salesman Problem through Halves Tours Complement T h e R e s e a r c h u l l e t i n o f J o r d a n M, V o l u m e I I ( I I ) P a g e 64 State Space Reduction for the SYMMTRI Traveling Salesman Problem through Halves Tours omplement Kamal R. l-rawi

More information

Design and Analysis of Algorithms

Design and Analysis of Algorithms S 101, Winter 2018 esign and nalysis of lgorithms Lecture 3: onnected omponents lass URL: http://vlsicad.ucsd.edu/courses/cse101-w18/ nd of Lecture 2: s, Topological Order irected cyclic raph.g., Vertices

More information

Chapter 4. Fundamental Concepts and Models

Chapter 4. Fundamental Concepts and Models Chapter 4. Fundamental Concepts and Models 4.1 Roles and Boundaries 4.2 Cloud Characteristics 4.3 Cloud Delivery Models 4.4 Cloud Deployment Models The upcoming sections cover introductory topic areas

More information

Graph Sampling Approach for Reducing. Computational Complexity of. Large-Scale Social Network

Graph Sampling Approach for Reducing. Computational Complexity of. Large-Scale Social Network Journal of Innovative Technology and Education, Vol. 3, 216, no. 1, 131-137 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/1.12988/jite.216.6828 Graph Sampling Approach for Reducing Computational Complexity

More information

Online Graph Exploration

Online Graph Exploration Distributed Computing Online Graph Exploration Semester thesis Simon Hungerbühler simonhu@ethz.ch Distributed Computing Group Computer Engineering and Networks Laboratory ETH Zürich Supervisors: Sebastian

More information

Shortest Paths and Minimum Spanning Trees

Shortest Paths and Minimum Spanning Trees // hortest Paths and Minimum panning Trees avid Kauchak cs pring dmin an resubmit homeworks - for up to half credit back l ue by the end of the week Read book // // // // // Is ijkstra s algorithm correct?

More information

Topic 10 Part 2 [474 marks]

Topic 10 Part 2 [474 marks] Topic Part 2 [474 marks] The complete graph H has the following cost adjacency matrix Consider the travelling salesman problem for H a By first finding a minimum spanning tree on the subgraph of H formed

More information

V1.0: Seth Gilbert, V1.1: Steven Halim August 30, Abstract. d(e), and we assume that the distance function is non-negative (i.e., d(x, y) 0).

V1.0: Seth Gilbert, V1.1: Steven Halim August 30, Abstract. d(e), and we assume that the distance function is non-negative (i.e., d(x, y) 0). CS4234: Optimisation Algorithms Lecture 4 TRAVELLING-SALESMAN-PROBLEM (4 variants) V1.0: Seth Gilbert, V1.1: Steven Halim August 30, 2016 Abstract The goal of the TRAVELLING-SALESMAN-PROBLEM is to find

More information

Computing Curricula 2005

Computing Curricula 2005 Computing Curricula Santiago, Chile 6 March John Impagliazzo Computing Curricula An Overview Report John Impagliazzo Computer Science Hofstra University New York John Impagliazzo Computing Curricula Santiago,

More information

A Study of Connectivity Metrics for Wireless Ad Hoc Networks. Samuel C. Nelson. A Proposal Submitted to the Honors Council

A Study of Connectivity Metrics for Wireless Ad Hoc Networks. Samuel C. Nelson. A Proposal Submitted to the Honors Council A Study of Connectivity Metrics for Wireless Ad Hoc Networks by Samuel C. Nelson A Proposal Submitted to the Honors Council For Honors in Computer Science 15 October 2005 1 Introduction Imagine the following

More information

744 Motooka Nishi-ku Fukuoka , Japan Phone/Fax:

744 Motooka Nishi-ku Fukuoka , Japan Phone/Fax: September 12, 2009 To whom it may concern: I am Dr. Masafumi Yamashita, a professor at the Department of Informatics, Graduate School of Information Science and Electrical Engineering, Kyushu University,

More information

CS 5114: Theory of Algorithms. Graph Algorithms. A Tree Proof. Graph Traversals. Clifford A. Shaffer. Spring 2014

CS 5114: Theory of Algorithms. Graph Algorithms. A Tree Proof. Graph Traversals. Clifford A. Shaffer. Spring 2014 epartment of omputer Science Virginia Tech lacksburg, Virginia opyright c 04 by lifford. Shaffer : Theory of lgorithms Title page : Theory of lgorithms lifford. Shaffer Spring 04 lifford. Shaffer epartment

More information

Abstract objective function graphs on the 3-cube a classification by realizability

Abstract objective function graphs on the 3-cube a classification by realizability Research ollection Report bstract objective function graphs on the 3-cube a classification by realizability uthor(s): ärtner, ernd; Kaibel, Volker Publication ate: 1998 Permanent Link: https://doi.org/10.3929/ethz-a-006652780

More information

Data Organization: Creating Order Out Of Chaos

Data Organization: Creating Order Out Of Chaos ata Organization: reating Order Out Of haos 3 Non-linear data structures 5-5 Principles of omputation, arnegie Mellon University - ORTIN Trees tree is a hierarchical (usually non-linear) data structure.

More information

Combined Code and Data Minimization Algorithms

Combined Code and Data Minimization Algorithms Problem Statement ombined ode and ata Minimization lgorithms March, 995 Mini onference on Ptolemy Praveen K Murthy (U erkeley, Shuvra S hattacharyya (Hitachi merica Ltd, dward Lee (U erkeley {murthy,shuvra,eal}@eecsberkeleyedu

More information

Title Core TIs Optional TIs Core Labs Optional Labs. 1.1 WANs All None None None. All None None None. All None 2.2.1, 2.2.4, 2.2.

Title Core TIs Optional TIs Core Labs Optional Labs. 1.1 WANs All None None None. All None None None. All None 2.2.1, 2.2.4, 2.2. CCNA 2 Plan for Academy Student Success (PASS) CCNA 2 v3.1 Instructional Update # 2006-1 This Instructional Update has been issued to provide guidance on the flexibility that Academy instructors now have

More information

Coursework Completion

Coursework Completion Half Term 1 5 th September 12 th September 19 th September 26 th September 3 rd October 10 th October 17 th October Coursework Completion This first half term will be dedicated to ensuring that all students

More information

BUSINESS CONTINUITY AND DISASTER RECOVERY POLICY

BUSINESS CONTINUITY AND DISASTER RECOVERY POLICY BUSINESS CONTINUITY AND DISASTER RECOVERY POLICY Manual OCTOBER 2, 2016 CHILDREN IN FREEDOM (CIF) CIF P.O.Box 25286-00100, Kenya, Africa, NY, USA (c) 2016 Page 1 Contents ACKNOWLEDGEMENT... 0 1.0 STATEMENT...

More information

Review of Graph Theory. Gregory Provan

Review of Graph Theory. Gregory Provan Review of Graph Theory Gregory Provan Overview Need for graphical models of computation Cloud computing Data centres Telecommunications networks Graph theory Graph Models for Cloud Computing Integration

More information

An Early Problem in Graph Theory. Clicker Question 1. Konigsberg and the River Pregel

An Early Problem in Graph Theory. Clicker Question 1. Konigsberg and the River Pregel raphs Topic " Hopefully, you've played around a bit with The Oracle of acon at Virginia and discovered how few steps are necessary to link just about anybody who has ever been in a movie to Kevin acon,

More information

Taxonomy Dimensions of Complexity Metrics

Taxonomy Dimensions of Complexity Metrics 96 Int'l Conf. Software Eng. Research and Practice SERP'15 Taxonomy Dimensions of Complexity Metrics Bouchaib Falah 1, Kenneth Magel 2 1 Al Akhawayn University, Ifrane, Morocco, 2 North Dakota State University,

More information

Initial Assumptions. Modern Distributed Computing. Network Topology. Initial Input

Initial Assumptions. Modern Distributed Computing. Network Topology. Initial Input Initial Assumptions Modern Distributed Computing Theory and Applications Ioannis Chatzigiannakis Sapienza University of Rome Lecture 4 Tuesday, March 6, 03 Exercises correspond to problems studied during

More information

Growing Agents - An Investigation of Architectural Mechanisms for the Specification of Developing Agent Architectures

Growing Agents - An Investigation of Architectural Mechanisms for the Specification of Developing Agent Architectures Growing Agents - An Investigation of Architectural Mechanisms for the Specification of Developing Agent Architectures Abstract In this paper we investigate various aspects of developing agent architectures,

More information

Campus Tour. 1/18/2005 4:08 AM Campus Tour 1

Campus Tour. 1/18/2005 4:08 AM Campus Tour 1 ampus Tour //00 :0 M ampus Tour Outline and Reading Overview of the assignment Review djacency matrix structure (..) Kruskal s MST algorithm (..) Partition T and implementation (..) The decorator pattern

More information

Multi-Optical Network on Chip for Large Scale MPSoC

Multi-Optical Network on Chip for Large Scale MPSoC Multi-Optical Network on hip for Large Scale MPSo bstract Optical Network on hip (ONo) architectures are emerging as promising contenders to solve bandwidth and latency issues in MPSo. owever, current

More information

PROGRAMME SYLLABUS Information Architecture and Innovation (Two Years), 120

PROGRAMME SYLLABUS Information Architecture and Innovation (Two Years), 120 PROGRAMME SYLLABUS Information Architecture and Innovation (Two Years), 120 credits Programmestart: Autumn 2018 Jönköping International Business School, Box 1026, SE-551 11 Jönköping VISIT Gjuterigatan

More information

Localized Algorithm for Precise Boundary Detection in 3D Wireless Networks

Localized Algorithm for Precise Boundary Detection in 3D Wireless Networks Localized lgorithm for Precise oundary etection in 3 Wireless Networks Hongyu Zhou, Su Xia, Miao Jin and Hongyi Wu integrated Wireless Information Network (iwin) Lab The enter for dvanced omputer Studies(S)

More information

An Empirical Analysis of Communities in Real-World Networks

An Empirical Analysis of Communities in Real-World Networks An Empirical Analysis of Communities in Real-World Networks Chuan Sheng Foo Computer Science Department Stanford University csfoo@cs.stanford.edu ABSTRACT Little work has been done on the characterization

More information

Spanning Trees 4/19/17. Prelim 2, assignments. Undirected trees

Spanning Trees 4/19/17. Prelim 2, assignments. Undirected trees /9/7 Prelim, assignments Prelim is Tuesday. See the course webpage for details. Scope: up to but not including today s lecture. See the review guide for details. Deadline for submitting conflicts has passed.

More information

Spanning Trees. Lecture 22 CS2110 Spring 2017

Spanning Trees. Lecture 22 CS2110 Spring 2017 1 Spanning Trees Lecture 22 CS2110 Spring 2017 1 Prelim 2, assignments Prelim 2 is Tuesday. See the course webpage for details. Scope: up to but not including today s lecture. See the review guide for

More information

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Greedy Algorithms (continued) The best known application where the greedy algorithm is optimal is surely

More information