Experiences with complex user profiles for approximate P2P community matching

Size: px
Start display at page:

Download "Experiences with complex user profiles for approximate P2P community matching"

Transcription

1 Experiences with coplex user profiles for approxiate PP counity atching Patrizio Dazzi ISTI-CNR Pisa, Italy Matteo Mordacchini IIT-CNR Pisa, Fabio Baglini University of Pisa Pisa, Italy Abstract The proble of defining PP overlays where peers characterized by siilar interests are directly connected is currently an iportant research issue. We have recently proposed a two layer PP architecture where the first layer exploits a gossip algorith for the detection of counities of peers characterized by siilar interests, while the second layer defines a DHT storing the profiles of the counities detected in the first layer. The DHT is exploited by peers joining the syste to find out a counity atching its interests. This paper investigates a DHT based approach supporting a siilarity based search of user profiles. Our approach exploits Locality Sensitive Hashing to support the siilarity indexing. The paper investigates several types of profiles to odel user interests and evaluates the indexing echaniss of the DHT with respect to the different types. Experiental evaluation has been conducted by considering a real data set. Keywords-distributed clustering; peer-to-peer; user profiles; I. INTRODUCTION The first recoender syste, dealing with artists and albus, based on the collaborative filtering technique has been proposed in [11]. After this contribution several tools have been proposed and realized, both fro acadeic counities and copanies. These solutions achieve a rearkable success for their ability to odel the behavior of huan exchange inforation by word-of-outh, which is a typical behavior of people sharing one or ore interests. Most of these systes are based on centralized architectures, an approach that on one hand siplifies the overall design, but on the other one presents a set of liitations. These liitations include the reduced scalability, the existence of single-point-of-failure and the concentration of data published by the users at a single authority which is potentially able to access to the whole set of data. The ost proising alternatives to current centralized systes are based on peer-to-peer (PP) architectures. PP architectures allow the ipleentation of systes able to dynaically scale and to be resilient to failures of groups of nodes, even significant ones. Moreover, their exploitation avoid the concentration of inforation in a single entity. Most of recoender systes, both centralized and PP, group hoogeneous users in counities. This siplify the exchange of pertinent recoendations aong users sharing coon interests. The creation of a PP syste able to support the aggregation of users in counities, identified on the basis of coon interests, has been the subject of a nuber of recent research works carried out by different research groups. These groups belong to different scientific counities and the proposed works start fro different points of view. However, the coon idea of all the proposed works is to associate with each user a profile, odeling user s interests, to exploit in order to aggregate the in counities. In a precedent position paper of ours [6], we proposed a syste structured according to two layers. The first one supports the creation and the aintenance of self-eerging user counities, by perforing a continuous exchange of inforation aong users. The other layer is devoted to the aintenance of a distributed index of existing counities. It should allow users to cheaply (in ters of transferred data) discover counities pertinent to their interests, even when does not exist any counity that exactly atches its profile. In this paper we ai at realizing such a distributed index. To allow it to support the entioned features, the index we propose is PP, supports siilarity searches and supports different ways to represent the user profile. We started fro a Distributed Hash Table (DHT). This kind of network provide the functionalities of a distributed data index, with an effective load balancing strategy, a careful anageent of the disconnection of the nodes and a logarithic coplexity routing both in the nuber of hops required to resolve a query and in the size of the routing tables. However, DHTs are not designed to support siilarity searches. Indeed, as with non-distributed hash tables, each value is calculated using an identifier associated with the application of a function designed to distribute the results, avoiding to preserve the locality of the original data. Therefore, in order to achieve the functionalities required by our envisioned distributed index, DHTs have to be extended with echaniss that allow to perfor not-exact searches. To do this, we exploit a probabilistic approach based on the use of Locality Sensitive Hash Functions (LSH), proposed in [13] to index the user profiles on a DHT. This leads to a drastically reduced resources usage. LSH approxiates the exact solution of the proble, issuing a very reduced aount

2 of queries while aintaining very high quality results. Beside supporting siilarity searches on DHTs, our distributed index is able to represent the interests of users in different ways. In particular, in this paper we present a study on three different characterizations of the user interests. The study is aied at finding a good trade-off between the accuracy and the network overhead. The three different types of profiles are based on sets of attributes defined in spaces ade of an arbitrary nuber of diensions and coparable by using siple siilarity etrics. This allows to build profiles fro objects of any kind (e.g. text stored by users, log browsing web, etadata about the edia, sets of coordinates about places visited, etc.). The three types of profiles are, respectively, a vector of ites, an adjacency atrix of ites occurrences and a set of connected coponents extracted profile by profile fro the adjacency atrixes. The index we propose has been studied fro the point of view of coplexity and evaluated experientally using a real dataset, consisting of a list of articles of edical literature consulted by users of PubMed [1], where each publication is identified by title, keywords and abstracts. Fro this dataset were extracted profiles fro over 700 users. The results obtained by searching for siilarities on our proposed DHT index has been copared against the ones obtained for the sae queries, indexing the profiles of individual attributes. This evaluation was carried out using various configurations of LSH indexing functions, for all types of profiles. The reaining of this paper is organized as follows: Section II reviews the state of the art in the field, Section III present the overall architecture of the syste describing the two layers it is ade of, with a particular focus on the indexing layer. Section IV describes both the three kind of profiles we propose in this paper. Section Vpresent the coplexity, both in ters of network usage and storage space required. Section VI shows the experiental results we obtained. Finally, in Section VII we derive our conclusions. A. P-RING II. RELATED WORK P-Ring [5] is a PP index structure that supports range queries. P-Ring is designed to support fault-tolerance and provides logarithic search perforance even for highly skewed data distributions. It supports large sets of data ites for each peer. The authors experientally tested P-Ring by using siulations as well as by using a real case of study they deployed on PlanetLab. According to theauthors achieveents, P-ring provide perforance coparable with Skip Graphs, Online Balancing and Chord. B. MAAN The Multi-Attribute Addressable Network, MAAN [4] is a structured PP syste targeted to the definition of a support for resource discovery in a large distributed systes that provides support for ulti-attribute range queries. It odifies the Chord hashing function by a locality preserving hashing function. In MAAN resources are identified by a set of attribute-value pairs, and each attribute is apped on a Chord ring through the locality preserving function. The node target of the hashing function stores the full resource description so that a resource is stored as any ties as its nuber of attributes. The resolution of a ulti-attribute range query consists in executing a single 1-diensional query on the doinant (i.e. ost selective) attribute, while the other attributes are checked using the replicated data. One of the ain drawbacks of MAAN is related to the large aount of eory required to store resource indices, and the cost to update the. C. Web Retrieval PP with high selective keys In this contribution [9] the authors foralize an indexing and retrieval odel designed to achieve high perforance, cost-efficient retrieval by exploiting highly discriinative keys (HDKs) stored in a distributed global index aintained in a structured PP network. HDKs are carefully selected ters that appear only in a sall set of collected docuents. The authors present both a theoretical analysis of the scalability of the odel and experiental results achieved by using the HDK-based PP retrieval engine. These results deonstrated that the total traffic generated exploiting the HDK approach is saller than the one obtained with distributed single-ter indexing strategies. The authors also perfored a deep scalability analysis that deonstrated that the HDK approach is able to scale to large networks of peers indexing very large docuent collections. D. Efficient seantic search on DHT overlays This paper [13] starts stating that distributed hash tables (DHTs) excel at exact-atch lookups, but they do not directly support coplex queries such as seantic search that is based on content. In this paper, the authors propose an approach to support seantic search on DHT overlays. Their idea is to place, with high probability, indexes of seantically close files into sae peer nodes by exploiting inforation retrieval algoriths and locality sensitive hashing. This approach adds only index inforation to peer nodes, causing an acceptable storage overhead. Via network siulations, the authors show that their approach is viable because the nuber of nodes visited for a query is about 100, independently fro the overlay size.

3 III. THE OVERALL ARCHITECTURE As in [6] the syste we propose (depicted in Figure 1) consists in a two-layered peer-to-peer (PP), fully decentralized architecture. This choice is due to a series of considerations about the syste goals. First of all, such systes allow to propose a service without any centralized authority (e.g., a single server that would store all user profiles), with the service ipleented through the collaboration of the peers. Figure 1. Overall Syste Architecture Moreover, PP systes allow to address the iportant issue of scalability, as they do not require the over- and proportional-provisioning of resources that would be required with a centralized approach. The ore peers participate, the ore power is added to the syste. If carefully designed, a PP approach scales up to hundred of thousands peers. Finally, PP systes are known to deal gracefully with syste dynais at no or very reduced additional cost, whereas centralized systes need expensive and coplex techniques to ensure continuous operation under node and link failures. Starting fro the peer-to-peer approach, we envision a two-layered solution. This solution ai is two-fold. Indeed, it is designed to support both a highly dynaic participation, aggregations of users and a stable and scalable aintenance of the description of the counities the users belong to. The lower layer is in charge for the foration processes of the user counities. It has to support the construction of a interest-based network, so that peers are effectively grouped with other peers that share siilar interest in their various interest doains. This requires to construct and aintain a representation of these interests (user profiling), to copare these profiles to deterine their siilarity (siilarity etrics), to propose distributed algoriths that cluster peers in interest-based groups based on this etric (clustering algorith) and to give a representation to the counities. Possible solutions for the constructions of this layer are beyond the scope of this paper, actually we are investigating possible solutions like [10] or []. The upper layer is a distributed index structure (we also refer as backbone layer). It has the responsibility to store the signature of each counity as well as the contact points needed to establish a connection with that counity. This allow new peers to rapidly find, aong the registered counities, the best ones that atch their interests. However, an index able to find only perfect atches between users and their interests could not be as effective as needed in a very dynaic and potentially heterogeneous environent. As an exaple consider a peer that has in coon with a certain counity the 90% of its characterizing ites. Even if they do not share all the interests, they are probably enough siilar to benefit fro inforation exchange flows. Hence, in order to provide a effective solution, the distributed structure ust be able to support the detection of the counities sharing a certain nuber of ites with the new joining peer. To this end the index structure have to provide a proper support for siilarity based searches. IV. THE PROPOSED SOLUTION As we introduced before (see Section I), a viable solution for obtaining a support to siilarity searches on DHTs has been proposed in [13]. In that paper the authors applied the in-wise independent perutations approach to user profiles built according the Vector Space Model (VSM). The VSM odel (also known as ter vector odel) is an algebraic odel for representing text docuents as vectors of identifiers. Docuents and queries are represented as vectors of ters. Each diension corresponds to a separate ter. If a ter occurs in the docuent, its value in the vector is nonzero. This ethod is widely used due to its effectiveness in situations where a query should be copared against a given docuent to easure its relevance. The ain drawback of this approach is its need to have a coplete knowledge on the existing ters in the considered set of docuents. This is not a big proble in centralized systes that can access to the whole set of docuents and, consequently, can built the whole dictionary of existing ters but is unfeasible in peer-to-peer systes where there is not a global knowledge on existing docuents and ters. In order to address this proble, soe coplex solutions have been presented in literature [1]. However, even sipler solutions, both fro the ipleentation and coputational coplexity point of view, deonstrated to achieve pretty good results [7]. One of the is the application of the

4 Jaccard siilarity coefficient to the ter vectors, that also the authors of [13] exploited in their work. Despite of its siplicity, the Jaccard Index is a very flexible easure and can be exploited to copare set of eleents without specific knowledge about spatial structure of data. In order to exploit this indexing echanis in the envisioned scenario, and pursuing the ai of finding an effective and efficient way to handle interest inforation, in this paper we propose three different types of profiles to odel user interests. All of the are build starting fro the collections of attributes that characterize a user. The three profile types are: Weighted attribute vector: this profile consists of collections of attributes properly weighted according to a certain nuerical weight indicating the attribute relevance with respect to the user profile. Attribute Adjacency Matrix: in this case the user profile is represented with a weighted attribute vector enriched with values estiating the correlation between attributes. The adjacency atrixes are squared and syetrical. Set of connected coponents extracted fro Attribute Adjacency Matrix: the profile is represented with a set of connected coponent obtained by applying to the Attribute Adjacency Matrix an algorith that extract a set of connected coponents. Each coponent describes a specific user interest. In order to analyze the advantages deriving fro the usage of all types of profiles, we perfored both a theoretical and experiental coparison between two different syste configurations. In the first one, we use the profiles in a DHT exploiting LSH based on the in-wise independent perutations. The second configuration consists a naive solution. As a naive solution we ean one like [4] or [3]. In those approaches, profiles are stored attribute per attribute and the query resolution process is perfored by finding all the atches for every attribute and by intersecting the. Obviously, this probabilistic ethod can lead to inexact query resolution but the network traffic is bounded and the storage space required is only a fraction with respect to the per attribute indexing. V. THEORETICAL ANALYSIS Tables I, II and III show the coparison between the two indexing approaches when applied to index the user profiles respectively in the for of Weighted attribute vector, Attribute Adjacency Matrix and Set of connected coponents extracted fro Attribute Adjacency Matrix. In this Analysis U and C indicate respectively the nuber of attributes coposing the profile of each user and each counity. A represents the nuber of access points for each counity. X indicates the nuber of nodes of the DHT, Co the nuber of existing counities. k is the axiu nuber of profiles requested to each node when it resolves a query. s indicates the axiu nuber of counity profiles following fro a store request for a new profile. R corresponds to the nuber of reoved attributes following to a profile update. When exploiting LSH indexing, n represents the nuber of identifiers associated with each profile. When the profiles are structured as Set of connected coponents I indicates the nuber of attributes describing the l -th user interest with P I apple U, whereas Int indicates the nuber of interests of a user. VI. EVALUATION The validation of the proposed solution was conducted using a real dataset of users sharing a subset of the PubMed [1] scientific publications. The dataset is part of a dataset released by the Mendeley group [8]. It contains inforation about 5,177 users and 11,878 docuents, with an average of 48.8 docuents consulted by each user. The profile of each user is characterized by the ters occurring in the title, keywords and abstracts of the papers she has accessed. In order to have a ore precise characterization of the users, the whole set of docuents contain 17,49 distinct ters have been filtered to eliinate the stop-words, getting 17,075 real ters. Finally, through a process of steing, 107,57 roots were extracted. The final set of,754 users exploited for the following evaluation was obtained by selecting the users with at least 150 root ters in their profiles. Vector-based user profiles are obtained directly by these ters. Adjacency atrixes are obtained by using the cooccurrences frequencies of ters within each user collection. Finally, the profiles built according the connected coponents odel have been extracted staring fro the adjacency atrices by identifying the connected coponents, obtained through the application of a pruning technique on the relationships occurring with a frequency less than a certain threshold infreq and selecting, aong the obtained coponents, those with a size greater than or equal to a certain, fixed value insize. The following tests ai to stress the ability of the proposed syste in finding a right counity for a user that is joining the network. We used a network of,000 nodes, each denoting a different counity representative. Users coing for the dataset are grouped in 300 different counities, obtained by using K-Means. The centroids obtained so far are used as counity representatives. Moreover, the syste is perturbed by the insertion of 1,700 other profiles, generated randoly in the sae vector space of the user profiles. These counities, identified using K-Means, have been used as references to copare against the ones we identified by exploiting the peer-to-peer approach. This has been perfored for all three kinds of profiles.

5 We perfored a series of tests by injecting,500 queries to the syste. Each query is coposed of a user profile. For each query, the syste returns as an answer, the ost siilar counity descriptor registered. In order to evaluate the perforances of our solution, we evaluated both its efficacy and efficiency. Efficacy is easured using both network requireents for query resolution and network and storage consuption for aintaining the distributed index structure. and network bandwidth, respectively, to create and to aintain the distributed index. Figure 4 depicts the global aount of network bandwidth consuption both to issue queries to the distributed index and to retrieve the results. In both the figures the results are related, respectively, to profiles built according to a vector of ters, an adjacency atrix and a set of connected coponents. 1e e Ter Vectors Adj. Matrixes Coponents LSH N=15 M=1 LSH N=15 M= LSH N=15 M=3 LSH N=0 M=1 LSH N=0 M= LSH N=0 M=3 Figure. Average difference between the ost siilar counity and the actual one Figure shows the average difference (Jaccard distance) between the ost siilar counity found by each query and the counity identified by the centralized ethod. As can be observed, the usage of co-occurrences data highly enhance the perforance of the syste. In particular, the connected coponents ethod achieves the best results. In this case, ethods with ore than one hashing function sees to perfor better than the others. On the other hand, such achieveents should be copared with the bandwidth and storage needs required to aintain indexes based on ore coplex profiles, like atrixes and connected coponents. 1e Figure 4. Ter Vector - Naive Ter Vector - LSH 0 ID Ter Vector - LSH 15 ID Query routing Adj. Matrixes - Naive Adj. Matrixes - LSH 0 ID Adj. Matrixes - LSH 15 ID Query resolution Coponents - Naive Coponents - LSH 0 ID Coponents - LSH 15 ID Network Bandwidth consuption for Query anageent It can be noticed that, even in this case, the connected coponents ethod is the ost perforing one, in every kind of etrics we considered. Moreover, we copared those results with the ones obtained by a naive approach. It can be observed that every profile approach obtains a considerable gain using the LSH indexing ethod with respect to the pure naive solution. VII. CONCLUSIONS This paper has presented a DHT based approach for storing the profiles of counities of users characterized by siilar interests. The siilarity search over the DHT exploits the Min Wise Independent Perutation approach. We have proposed several types of user s profiles and evaluated the indexing echaniss with respect to the different kind of profiles. Experiental results conducted by considering a real data set have shown the effectiveness of our approach ACKNOWLEDGEMENT We acknowledge the support of the S-CUBE (EU-FP ), CONTRAIL (EU-FP ) and RECOGNI- TION (EU-FP ) EU projects. 10 Ter Vector - Naive Ter Vector - LSH 0 ID Ter Vector - LSH 15 ID Index Maintenance Adj. Matrixes - Naive Adj. Matrixes - LSH 0 ID Adj. Matrixes - LSH 15 ID Overall Index Size Coponents - Naive Coponents - LSH 0 ID Coponents - LSH 15 ID Figure 3. Network Bandwidth and Storage Space required by the distributed index Figure 3 shows the global size in ters of storage space REFERENCES [1] Pubed central. [] Ranieri Baraglia, Patrizio Dazzi, Matteo Mordacchini, Laura Ricci, and Luca Alessi. Group: A gossip based building counity protocol. In Proc. of the 11th International Conference on Next Generation Wired/Wireless Networking, to appear.

6 [3] A.R. Bharabe, M. Agrawal, and S. Seshan. Mercury: supporting scalable ulti-attribute range queries. In ACM SIGCOMM Coputer Counication Review, volue 34, pages ACM, 004. [4] Min Cai, Martin Frank, Jinbo Chen, and Pedro Szekely. Maan: A ulti-attribute addressable network for grid inforation services. In Journal of Grid Coputing, page 184. IEEE Coputer Society, 003. [5] Adina Crainiceanu, Prakash Linga, Ashwin Machanavajjhala, Johannes Gehrke, and Jayavel Shanugasundara. P-ring: an efficient and robust pp range index structure. In Proceedings of the 007 ACM SIGMOD international conference on Manageent of data, SIGMOD 07, pages 3 34, New York, NY, USA, 007. ACM. [6] P. Dazzi, P. Felber, L.B. Anh, L. Leonini, M. Mordacchini, R. Perego, M. Rajan, and E. Riviere. Peer-to-peer clustering of web-browsing users. In C. Lucchese, G. Skobeltsyn, and W. G. Yee, editors, Proceedings of the 7th Workshop on Large-Scale Distributed Systes for Inforation Retrieval, co-located with ACM SIGIR 009, pages 71 78, 009. [7] Wa el Musa Hadi, Fadi A. Thabtah, and Hussein Abdel-jaber. A coparative study using vector space odel with k-nearest neighbor on text categorization data. In World Congress on Engineering, pages , 007. [8] Kris Jack, Jaes Haerton, Dan Harvey, Jason J Hoyt, Jan Reichelt, and Victor Henning. Mendeleys reply to the datatel challenge. Procedia Coputer Science, 1():1 3, 010. [9] Ivana Podnar, Martin Rajan, Toan Luu, Fabius Kle, and Karl Aberer. Scalable peer-to-peer web retrieval with highly discriinative keys. In ICDE, pages , 007. [10] Lakshish Raasway, Bugra Gedik, and Ling Liu. A distributed approach to node clustering in decentralized peer-topeer networks. IEEE Transactions on Parallel and Distributed Systes, 16:814 89, 005. [11] Upendra Shardanand and Pattie Maes. Social inforation filtering: algoriths for autoating word of outh. In Proc. of the SIGCHI conference on Huan factors in coputing systes, pages 10 17, New York, NY, USA, ACM, Addison-Wesley. [1] Chengxiang Zhai and John Lafferty. A study of soothing ethods for language odels applied to inforation retrieval. ACM Trans. Inf. Syst., :179 14, April 004. [13] Yingwu Zhu and Yiing Hu. Efficient seantic search on dht overlays. J. Parallel Distrib. Coput., 67(5): , 007. Type Cost Query Naive O( U log(x)) LSH O(n U log(x)) Query resolution Naive O(k C U ) LSH O(k C n) Counity insertion Naive O( C log(x)) LSH O(n C log(x)) Profile update Naive O( C log(x)+r log(x)) LSH O(n C log(x)+r log(x)) Descriptor reoval Naive O( C log(x)) LSH O(n log(x)) Index size Naive O( C Co) LSH O(n C Co) Table I COMPLEXITY ANALYSIS FOR INDEXING PROFILES STRUCTURED AS TERM VECTORS. Type Cost Query Naive O( U 3 log(x)) LSH O(n U log(x)) Query resolution Naive O(k C U ) LSH O(k C n) Counity insertion Naive O( C 3 log(x)) LSH O(n C log(x)) Profile update Naive O( C 3 log(x)+r log(x)) LSH O(n C log(x)+r log(x)) Descriptor reoval Naive O( C log(x)) LSH O(n log(x)) Index size Naive O( C 3 Co) LSH O(n C Co) Table II COMPLEXITY ANALYSIS FOR INDEXING PROFILES STRUCTURED AS ADJACENCY MATRIXES. Query Type Cost Naive O(( P I ) log(x)) LSH O(n Int P I log(x)) Query resolution Naive O(k C ( P I ) LSH O(k n Int C ) Counity insertion Naive O( C log(x)) LSH O(n C log(x)) Profile update Naive O( C log(x)+r log(x)) LSH O(n C log(x)+r log(x)) Descriptor reoval Naive O( C log(x)) LSH O(n log(x)) Index size Naive O( C Co) LSH O(n C Co) Table III COMPLEXITY ANALYSIS FOR INDEXING PROFILES STRUCTURED AS CONNECTED COMPONENTS.

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of

More information

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3 2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

Survivability Function A Measure of Disaster-Based Routing Performance

Survivability Function A Measure of Disaster-Based Routing Performance Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

Adaptive Holistic Scheduling for In-Network Sensor Query Processing

Adaptive Holistic Scheduling for In-Network Sensor Query Processing Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES. Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou

MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES. Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou Departent of Coputer Science and Inforation Engineering, National Chiayi

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches Efficient Estiation of Inclusion Coefficient using HyperLogLog Sketches Azade Nazi, Bolin Ding, Vivek Narasayya, Surajit Chaudhuri Microsoft Research {aznazi, bolind, viveknar, surajitc}@icrosoft.co ABSTRACT

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

The Internal Conflict of a Belief Function

The Internal Conflict of a Belief Function The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of

More information

Identifying Converging Pairs of Nodes on a Budget

Identifying Converging Pairs of Nodes on a Budget Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering

More information

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

Generating Mechanisms for Evolving Software Mirror Graph

Generating Mechanisms for Evolving Software Mirror Graph Journal of Modern Physics, 2012, 3, 1050-1059 http://dx.doi.org/10.4236/jp.2012.39139 Published Online Septeber 2012 (http://www.scirp.org/journal/jp) Generating Mechaniss for Evolving Software Mirror

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

Rule Extraction using Artificial Neural Networks

Rule Extraction using Artificial Neural Networks Rule Extraction using Artificial Neural Networks S. M. Karuzzaan 1 Ahed Ryadh Hasan 2 Abstract Artificial neural networks have been successfully applied to a variety of business application probles involving

More information

News Events Clustering Method Based on Staging Incremental Single-Pass Technique

News Events Clustering Method Based on Staging Incremental Single-Pass Technique News Events Clustering Method Based on Staging Increental Single-Pass Technique LI Yongyi 1,a *, Gao Yin 2 1 School of Electronics and Inforation Engineering QinZhou University 535099 Guangxi, China 2

More information

Feature Based Registration for Panoramic Image Generation

Feature Based Registration for Panoramic Image Generation IJCSI International Journal of Coputer Science Issues, Vol. 10, Issue 6, No, Noveber 013 www.ijcsi.org 13 Feature Based Registration for Panoraic Iage Generation Kawther Abbas Sallal 1, Abdul-Mone Saleh

More information

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se

More information

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH Kulapraote Prathuchai Geoinforatics Center, Asian Institute of Technology, 58 Moo9, Klong Luang, Pathuthani, Thailand.

More information

Image Filter Using with Gaussian Curvature and Total Variation Model

Image Filter Using with Gaussian Curvature and Total Variation Model IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.

More information

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm roceedings of the 7th International Conference on Innovation & Manageent 893 Research on a Kind of QoS-Sensitive Seantic Web Services Coposition Method Based on Genetic Algorith Cao Hongjiang, Nie Guihua,

More information

Closing The Performance Gap between Causal Consistency and Eventual Consistency

Closing The Performance Gap between Causal Consistency and Eventual Consistency Closing The Perforance Gap between Causal Consistency and Eventual Consistency Jiaqing Du Călin Iorgulescu Aitabha Roy Willy Zwaenepoel EPFL ABSTRACT It is well known that causal consistency is ore expensive

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

LOSSLESS COMPRESSION OF BAYER MASK IMAGES USING AN OPTIMAL VECTOR PREDICTION TECHNIQUE

LOSSLESS COMPRESSION OF BAYER MASK IMAGES USING AN OPTIMAL VECTOR PREDICTION TECHNIQUE 1th European Signal Processing Conference (EUSIPCO 2006), Florence, Italy, Septeber -8, 2006, copyright by EUASIP LOSSLESS COMPESSION OF AYE MASK IMAES USIN AN OPTIMAL VECTO PEDICTION TECHNIQUE Stefano

More information

Novel Image Representation and Description Technique using Density Histogram of Feature Points

Novel Image Representation and Description Technique using Density Histogram of Feature Points Novel Iage Representation and Description Technique using Density Histogra of Feature Points Keneilwe ZUVA Departent of Coputer Science, University of Botswana, P/Bag 00704 UB, Gaborone, Botswana and Tranos

More information

Design and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design

Design and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design Design and Ipleentation of Business Logic Layer Object-Oriented Design versus Relational Design Ali Alharthy Faculty of Engineering and IT University of Technology, Sydney Sydney, Australia Eail: Ali.a.alharthy@student.uts.edu.au

More information

A Periodic Dynamic Load Balancing Method

A Periodic Dynamic Load Balancing Method 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation

More information

Collaborative Web Caching Based on Proxy Affinities

Collaborative Web Caching Based on Proxy Affinities Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA

More information

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13 Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical

More information

A simplified approach to merging partial plane images

A simplified approach to merging partial plane images A siplified approach to erging partial plane iages Mária Kruláková 1 This paper introduces a ethod of iage recognition based on the gradual generating and analysis of data structure consisting of the 2D

More information

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University

More information

Privacy-preserving String-Matching With PRAM Algorithms

Privacy-preserving String-Matching With PRAM Algorithms Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,

More information

ACNS: Adaptive Complementary Neighbor Selection in BitTorrent-like Applications

ACNS: Adaptive Complementary Neighbor Selection in BitTorrent-like Applications ACNS: Adaptive Copleentary Neighbor Selection in BitTorrent-like Applications Zhenbao Zhou 1, 2, Zhenyu Li 1, 2, Gaogang Xie 1 1 Institute of Coputing Technology, Chinese Acadey of Sciences, Beijing 100190,

More information

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San

More information

Leveraging Relevance Cues for Improved Spoken Document Retrieval

Leveraging Relevance Cues for Improved Spoken Document Retrieval Leveraging Relevance Cues for Iproved Spoken Docuent Retrieval Pei-Ning Chen 1, Kuan-Yu Chen 2 and Berlin Chen 1 National Taiwan Noral University, Taiwan 1 Institute of Inforation Science, Acadeia Sinica,

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang IEEE International Conference on ultiedia and Expo POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION Junjun Jiang, Ruiin Hu, Zhen Han, Tao Lu, and Kebin Huang National Engineering

More information

Affine Invariant Texture Analysis Based on Structural Properties 1

Affine Invariant Texture Analysis Based on Structural Properties 1 ACCV: The 5th Asian Conference on Coputer Vision, --5 January, Melbourne, Australia Affine Invariant Texture Analysis Based on tructural Properties Jianguo Zhang, Tieniu Tan National Laboratory of Pattern

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

Optimal Route Queries with Arbitrary Order Constraints

Optimal Route Queries with Arbitrary Order Constraints IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL.?, NO.?,? 20?? 1 Optial Route Queries with Arbitrary Order Constraints Jing Li, Yin Yang, Nikos Maoulis Abstract Given a set of spatial points DS,

More information

Massive amounts of high-dimensional data are pervasive in multiple domains,

Massive amounts of high-dimensional data are pervasive in multiple domains, Challenges of Feature Selection for Big Data Analytics Jundong Li and Huan Liu, Arizona State University Massive aounts of high-diensional data are pervasive in ultiple doains, ranging fro social edia,

More information

Comparative Evaluation of Color-Based Video Signatures in the Presence of Various Distortion Types

Comparative Evaluation of Color-Based Video Signatures in the Presence of Various Distortion Types Coparative Evaluation of Color-Based Video Signatures in the Presence of Various Distortion Types Aritz Sánchez de la Fuente, Patrick Ndjiki-Nya, Karsten Sühring, Tobias Hinz, Karsten üller, and Thoas

More information

Feature Selection to Relate Words and Images

Feature Selection to Relate Words and Images The Open Inforation Systes Journal, 2009, 3, 9-13 9 Feature Selection to Relate Words and Iages Wei-Chao Lin 1 and Chih-Fong Tsai*,2 Open Access 1 Departent of Coputing, Engineering and Technology, University

More information

A Novel 2D Texture Classifier For Gray Level Images

A Novel 2D Texture Classifier For Gray Level Images 2012, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.co A Novel 2D Texture Classifier For Gray Level Iages B.S. Mousavi 1 Young Researchers Club, Zahedan

More information

Improve Peer Cooperation using Social Networks

Improve Peer Cooperation using Social Networks Iprove Peer Cooperation using Social Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Noveber 5, 2007 Corresponding

More information

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

3D Building Detection and Reconstruction from Aerial Images Using Perceptual Organization and Fast Graph Search

3D Building Detection and Reconstruction from Aerial Images Using Perceptual Organization and Fast Graph Search 436 Journal of Electrical Engineering & Technology, Vol. 3, No. 3, pp. 436~443, 008 3D Building Detection and Reconstruction fro Aerial Iages Using Perceptual Organization and Fast Graph Search Dong-Min

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University

More information

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions *

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 607-626 (2005) A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Mebership Functions * SHIH-HSU HUANG AND JIAN-YUAN LAI + Departent of

More information

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant

More information

Data Caching for Enhancing Anonymity

Data Caching for Enhancing Anonymity Data Caching for Enhancing Anonyity Rajiv Bagai and Bin Tang Departent of Electrical Engineering and Coputer Science Wichita State University Wichita, Kansas 67260 0083, USA Eail: {rajiv.bagai, bin.tang}@wichita.edu

More information

A Novel Fuzzy Chinese Address Matching Engine Based on Full-text Search Technology

A Novel Fuzzy Chinese Address Matching Engine Based on Full-text Search Technology Based on Full-text Search Technology 12 Institute of Reote Sensing and Digital Earth National Engineering Research Center for Reote Sensing Applications,Beijing,100101, China E-ail: yaoxj@radi.ac.cn Xiang

More information

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses International Journal of Industrial Engineering & Production Research Septeber 03, Volue 4, Nuber 3 pp. 9-35 ISSN: 008-4889 http://ijiepr.iust.ac.ir/ Using Iperialist Copetitive Algorith in Optiization

More information

Research on the Classification and Selection of Archive Texts with the Improved C4.5 Algorithm

Research on the Classification and Selection of Archive Texts with the Improved C4.5 Algorithm INTERNATIONAL JOURNAL OF IRUITS, SYSTEMS AND SIGNAL PROESSING Volue 2, 208 Research on the lassification and Selection of Archive Texts with the Iproved 4.5 Algorith Xianbin Lv Abstract In the age of inforation

More information

6.1 Topological relations between two simple geometric objects

6.1 Topological relations between two simple geometric objects Chapter 5 proposed a spatial odel to represent the spatial extent of objects in urban areas. The purpose of the odel, as was clarified in Chapter 3, is ultifunctional, i.e. it has to be capable of supplying

More information

On the Computation and Application of Prototype Point Patterns

On the Computation and Application of Prototype Point Patterns On the Coputation and Application of Prototype Point Patterns Katherine E. Tranbarger Freier 1 and Frederic Paik Schoenberg 2 Abstract This work addresses coputational probles related to the ipleentation

More information

A wireless sensor network for visual detection and classification of intrusions

A wireless sensor network for visual detection and classification of intrusions A wireless sensor network for visual detection and classification of intrusions ANDRZEJ SLUZEK 1,3, PALANIAPPAN ANNAMALAI 2, MD SAIFUL ISLAM 1 1 School of Coputer Engineering, 2 IntelliSys Centre Nanyang

More information

Collection Selection Based on Historical Performance for Efficient Processing

Collection Selection Based on Historical Performance for Efficient Processing Collection Selection Based on Historical Perforance for Efficient Processing Christopher T. Fallen and Gregory B. Newby Arctic Region Supercoputing Center University of Alaska Fairbanks Fairbanks, Alaska

More information

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.5, Septeber 205 AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM Xie Yang and Cheng Wushan College of Mechanical Engineering,

More information

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao

More information

A Model Free Automatic Tuning Method for a Restricted Structured Controller. by using Simultaneous Perturbation Stochastic Approximation

A Model Free Automatic Tuning Method for a Restricted Structured Controller. by using Simultaneous Perturbation Stochastic Approximation 28 Aerican Control Conference Westin Seattle Hotel, Seattle, Washington, USA June -3, 28 WeC9.5 A Model Free Autoatic Tuning Method for a Restricted Structured Controller by Using Siultaneous Perturbation

More information

Verifying the structure and behavior in UML/OCL models using satisfiability solvers

Verifying the structure and behavior in UML/OCL models using satisfiability solvers IET Cyber-Physical Systes: Theory & Applications Review Article Verifying the structure and behavior in UML/OCL odels using satisfiability solvers ISSN 2398-3396 Received on 20th October 2016 Revised on

More information

AN APPROACH ON BIMODAL BIOMETRIC SYSTEMS

AN APPROACH ON BIMODAL BIOMETRIC SYSTEMS AN APPROACH ON BIODAL BIOETRIC SYSTES Eugen LUPU, Siina EERICH Technical University of Cluj-Napoca, 26-28 Baritiu str. Cluj-Napoca phone: +40-264-40-266; fax: +40-264-592-055; e-ail: Eugen.Lupu @co.utcluj.ro

More information

Verdict Accuracy of Quick Reduct Algorithm using Clustering, Classification Techniques for Gene Expression Data

Verdict Accuracy of Quick Reduct Algorithm using Clustering, Classification Techniques for Gene Expression Data Verdict Accuracy of Quick Reduct Algorith using Clustering, Classification Techniques for Gene Expression Data T.Chandrasekhar 1, K.Thangavel 2 and E.N.Sathishkuar 3 1 Departent of Coputer Science, eriyar

More information

Threshold Analysis of Non-Binary Spatially-Coupled LDPC Codes with Windowed Decoding

Threshold Analysis of Non-Binary Spatially-Coupled LDPC Codes with Windowed Decoding 1 Threshold Analysis of Non-Binary Spatially-Coupled LDPC Codes with Windowed Decoding Lai Wei, Toshiaki Koike-Akino, David G. M. Mitchell, Thoas E. Fuja, and Daniel J. Costello, Jr. Departent of Electrical

More information

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade

More information

A Learning Framework for Nearest Neighbor Search

A Learning Framework for Nearest Neighbor Search A Learning Fraework for Nearest Neighbor Search Lawrence Cayton Departent of Coputer Science University of California, San Diego lcayton@cs.ucsd.edu Sanjoy Dasgupta Departent of Coputer Science University

More information

Set Theoretic Estimation for Problems in Subtractive Color

Set Theoretic Estimation for Problems in Subtractive Color Set Theoretic Estiation for Probles in Subtractive Color Gaurav Shara Digital Iaging Technology Center, Xerox Corporation, MS0128-27E, 800 Phillips Rd, Webster, NY 14580 Received 25 March 1999; accepted

More information

Author. Published. Journal Title DOI. Copyright Statement. Downloaded from. Griffith Research Online. Kandjani, Hadi, Wen, Larry, Bernus, Peter

Author. Published. Journal Title DOI. Copyright Statement. Downloaded from. Griffith Research Online. Kandjani, Hadi, Wen, Larry, Bernus, Peter Enterprise Architecture Cybernetics for Global Mining Projects: Reducing the Structural Coplexity of Global Mining Supply Networks via Virtual Brokerage Author Kandjani, Hadi, Wen, Larry, Bernus, Peter

More information

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural

More information

On computing global similarity in images

On computing global similarity in images On coputing global siilarity in iages S Ravela and R Manatha Coputer Science Departent University of Massachusetts, Aherst, MA 01003 Eail: ravela,anatha @csuassedu Abstract The retrieval of iages based

More information

Data & Knowledge Engineering

Data & Knowledge Engineering Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID

More information

Galois Homomorphic Fractal Approach for the Recognition of Emotion

Galois Homomorphic Fractal Approach for the Recognition of Emotion Galois Hooorphic Fractal Approach for the Recognition of Eotion T. G. Grace Elizabeth Rani 1, G. Jayalalitha 1 Research Scholar, Bharathiar University, India, Associate Professor, Departent of Matheatics,

More information

Grid Density Based Clustering Algorithm

Grid Density Based Clustering Algorithm Grid Density Based Clustering Algorith Aandeep Kaur Mann, Navneet Kaur Abstract Clustering is the one of the ost iportant task of the data ining. Clustering is the unsupervised ethod to find the relations

More information

A Learning Framework for Nearest Neighbor Search

A Learning Framework for Nearest Neighbor Search A Learning Fraework for Nearest Neighbor Search Lawrence Cayton Departent of Coputer Science University of California, San Diego lcayton@cs.ucsd.edu Sanjoy Dasgupta Departent of Coputer Science University

More information

Gromov-Hausdorff Distance Between Metric Graphs

Gromov-Hausdorff Distance Between Metric Graphs Groov-Hausdorff Distance Between Metric Graphs Jiwon Choi St Mark s School January, 019 Abstract In this paper we study the Groov-Hausdorff distance between two etric graphs We copute the precise value

More information

Boosted Detection of Objects and Attributes

Boosted Detection of Objects and Attributes L M M Boosted Detection of Objects and Attributes Abstract We present a new fraework for detection of object and attributes in iages based on boosted cobination of priitive classifiers. The fraework directly

More information

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl. Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable

More information

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Navodaya Garepalli Kartik Gopalan Ping Yang Coputer Science, Binghaton University (State University of New York) Contact:

More information

Integrating fast mobility in the OLSR routing protocol

Integrating fast mobility in the OLSR routing protocol Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr

More information

A New Generic Model for Vision Based Tracking in Robotics Systems

A New Generic Model for Vision Based Tracking in Robotics Systems A New Generic Model for Vision Based Tracking in Robotics Systes Yanfei Liu, Ada Hoover, Ian Walker, Ben Judy, Mathew Joseph and Charly Heranson lectrical and Coputer ngineering Departent Cleson University

More information

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan

More information

Distributed Multicast Tree Construction in Wireless Sensor Networks

Distributed Multicast Tree Construction in Wireless Sensor Networks Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,

More information

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute

More information

3 Conference on Inforation Sciences and Systes, The Johns Hopkins University, March, 3 Sensitivity Characteristics of Cross-Correlation Distance Metric and Model Function F. Porikli Mitsubishi Electric

More information

A P2P REcommender system based on Gossip Overlays (PREGO)

A P2P REcommender system based on Gossip Overlays (PREGO) 10 th IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY Bradford,UK, 29 June - 1 July, 2010 Ranieri Baraglia, Patrizio Dazzi, Matteo Mordacchini ISTI,CNR, Pisa,Italy Laura Ricci University

More information

An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured from Different Viewpoints

An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured from Different Viewpoints 519 An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured fro Different Viewpoints Yousuke Kawauchi 1, Shin Usuki, Kenjiro T. Miura 3, Hiroshi Masuda 4 and Ichiro Tanaka 5 1 Shizuoka

More information