Improved Hidden Clique Detection by Optimal Linear Fusion of Multiple Adjacency Matrices

Size: px
Start display at page:

Download "Improved Hidden Clique Detection by Optimal Linear Fusion of Multiple Adjacency Matrices"

Transcription

1 Iproed Hidden Clique Detection by Optial Linear Fusion of Multiple Adjacency Matrices Hianshu Nayar, Benjain A. Miller, Kelly Geyer, Rajonda S. Caceres, Steen T. Sith, and Raj Rao Nadakuditi Departent of Electrical Engineering and Coputer Science, Uniersity of Michigan Ann Arbor, Michigan 4809 Lincoln Laboratory, Massachusetts Institute of Technology Lexington, MA Abstract Graph fusion has eerged as a proising research area for addressing challenges associated with noisy, uncertain, ulti-source data. While any ad-hoc graph fusion techniques exist in the current literature, an analytical approach for analyzing the fundaentals of the graph fusion proble is lacking. We consider the setting where we are gien ultiple Erdős-Rényi odeled adjacency atrices containing a coon hidden or planted clique. The objectie is to cobine the linearly so that the principal eigenectors of the resulting atrix best reeal the ertices associated with the clique. We utilize recent results fro rando atrix theory to derie the optial weighting coefficients and use these insights to deelop a data-drien fusion algorith. We deonstrate the iproed perforance of the algorith relatie to other siple heuristics. I. INTRODUCTION In a wide ariety of applications, iportant data take the for of connections, relationships, or interactions between discrete entities. This relational structure proides additional context, iproing situational awareness and enhancing the inforation that can be inferred fro the data. A dataset rich in relational inforation is represented atheatically as a graph. One particular proble of interest when working with graph-based data is subgraph detection []. Gien a graph, the objectie is to deterine whether the relationships obsered are consistent with noral behaior in the network, or if there is a subset of ertices coprising a subgraph within the oerall graph that exhibits a topology that is contrary to the expectation. Seeral applications are focused on finding denser-than-usual subgraphs within larger graphs, such as detecting counities in social networks [2] and finding highly interactie subsets aong proteins [3]. A siplified for of this proble is planted clique detection, where the objectie is to detect a fully connected subgraph placed within a larger graph with edges that occur with equal probability. This subset of the ore general subgraph detection proble The Lincoln Laboratory portion of this work is sponsored by the Assistant Secretary of Defense for Research & Engineering under Air Force Contract FA C Opinions, interpretations, conclusions and recoendations are those of the authors and are not necessarily endorsed by the United States Goernent. The Uniersity of Michigan portion of this work was sponsored by the Office of the Assistant Secretary of Defense for Research and Engineering. proides atheatical tractability that enables analysis of the fundaental liits of subgraph detectability. Planted clique detection has a long history within theoretical coputer science. Algoriths hae been deeloped using a ariety of techniques, including cobinatorial search ethods [4], spectral ethods [5], and statistical query ethods [6]. Recent work has focused on deriing analytical bounds for subgraph detectability, including technique-independent bounds [7], and bounds on detection using spectral techniques [8]. Spectral ethods are particularly interesting, since they are coputationally efficient and yield principled analytical bounds using rando atrix theory. Siilar bounds for the planted partition odel hae also been shown to predict a detectability phase transition in other efficient detection ethods [9]. While the planted clique proble has traditionally been studied in the context of detection within a single graph, in practice, a network is often the result of fused inforation fro ultiple disparate sources. Understanding the iplications that the algoriths for a single obseration hae on ulti-source data is extreely iportant as data analysts are increasingly required to ake decisions in this setting. The objectie of this paper is to extend the recent spectral detection bounds to cases where ultiple graphs are obsered. In this setting, the clique exists in each graph, each of which has a different edge probability. We adopt a linear fusion odel in which we analyze a conex cobination of the adjacency atrices of the graphs. Within this context, we deonstrate that the optial fusion ethod is highly intuitie: weighting the graphs in inerse proportion to their expected background degrees. In a set of experients on rando graphs, we test subgraph detectability at seeral leels of difficulty, arying the relatie density of the background graphs, the clique size, and the weights. In all cases, the optiality of the solution we derie is erified. The reainder of this paper is organized as follows. In Section II, we define the proble odel and foralize the atheatical context in which the graphs are fused. Section III proides a deriation of the forula for optial fusion within this context. In Section IV, we outline seeral experients that epirically alidate the deried optial fusion ethod /5/$ IEEE 520 Asiloar 205

2 Section V concludes the paper with a brief suary and directions for future work. A. Planted Clique Detection II. PROBLEM MODEL In the planted clique proble, we are gien a graph G = (V,E), where V is the set of ertices (representing the entities) and E is the set of edges (representing connections). We will denote N = V and M = E. The degree of a ertex is the nuber of edges connected to it. We will denote the aerage degree of the graph by c. A subset of ertices, V S V, coprise the clique, eaning that for all, u 2 V S, there is an edge between and u in E. We will denote the clique size by k = V S. In this paper, we will only consider graphs that are undirected (so edges are unordered pairs of ertices) and unweighted (so edges either exist or not, with no notion of connection strength). If either /2 V S or u/2 V S, then an edge exists between and u with probability p, which is constant across all pairs of ertices and independent of the existence of other edges. Spectral ethods ake use of atrix representations of a graph. The ost basic atrix representation of a graph is the adjacency atrix. For an unweighted, undirected graph, the adjacency atrix A = {a ij } is an N N binary atrix where a ij = if there is an edge between ertices i and j, and a ij =0otherwise. (This requires an arbitrary labeling of ertices with integers fro to N.) Since we consider undirected graphs, A will be syetric. A odification of the adjacency atrix used for counity detection is the odularity atrix [0]. The odularity atrix is a residuals atrix: the obsered adjacency atrix inus its expected alue. Since the planted clique proble assues a background with equal probability, we use the odularity atrix with respect to the Erdős-Rényi odel: B := A p N N. () This technique cancels out the effects of typical background behaior and allows the detection of deiations fro the expectation; in this case the planted clique. The for of () is a rank- perturbation of a Wigner atrix, and recent work has defined a sharp threshold for detectability of such a perturbation []. This analysis was applied to planted clique detection in [8], where a siple algorith was used to detect the clique: copute the (unit-noralized) principal eigenector of B, denoted by u. Since the entries in the principal eigenector of a Wigner atrix appear norally distributed, u is thresholded, with a false alar rate based on this distribution, and the estiate of the clique ertices is gien by: ˆV S = n i : p Nu i >F N (0,) o, (2) 2 where F N (0,) is the inerse cuulatie density function of a standard noral distribution and is the desired false alar probability. Using this algorith, the following bound was deried. Clai 2. (Nadakuditi [8]): Consider a k-ertex clique planted in an N-ertex graph with edge probability p, where the clique ertices are identified using (2) for a significance leel. Then, for fixed p, as k, N such that k/ p N 2 (0, ) we hae P(clique discoered) a.s. B. Multi-Source Graph Fusion ( if > crit. := otherwise. q p p Our objectie is to derie a bound analogous to Clai 2. for fusion of ultiple graphs. For the ulti-source setting, we assue we hae graphs G i =(V,E i ) for apple i apple. Note that the ertex set is the sae for all graphs (and, in atrix for, the indices are consistent across obserations). The nonclique edges are generated independently in each graph. To analyze the ultigraph in the sae context as the clai, we cobine the adjacency atrices of the graphs into a single atrix, and copute the principal eigenector of its residuals. We take a linear cobination of the adjacency atrices A i with weights w i to create a fused adjacency atrix: à = (3) w i A i. (4) We consider only positie weights that su to, eaning that à is a conex cobination of the adjacency atrices. Using this conention, the alue on the edges between clique ertices reains, since these edges exist in each obseration. Applying the sae weighting to the expected alues (p i being the background edge probability for G i ), we aintain a residuals atrix where the ajority of the entries (all of those not part of the clique) hae the sae zero-ean distribution. The fused residuals atrix is gien by: B := (A i p i N N )=à w i p i N N. (5) By applying the algorith defined in Section II-A to the principal eigenector of B, we can iproe detection perforance oer what would be possible with a single obseration. As deonstrated in the next section, we can derie analytically optial weights in this setting by iniizing the ariance of the entries. III. OPTIMAL LINEAR FUSION We begin by odeling the fused adjacency atrix à in a way that enables rando atrix theoretic analysis. Without 52

3 loss of generality, we can perute the ertex indices so that the clique ertices hae indices to k. We hae: apple à = w k k B k N 0(p i ) i B N 0 k(p i ) B N 0 N 0(p (6) apple P = w P P i k k w ib k N 0(p i ) w P ib N 0 k(p i ) w ib N 0 N 0(p (7) apple P = w P i k k w ip i k N 0 P w P ip i N 0 k w (8) ip i N 0 N apple P P k k w ib c k N 0(p w ib c N 0 k (p P w ib c N 0 N 0(p (9) i =E hã + X, (0) where B N N 2 (p) is an N N 2 atrix of Bernoulli rando ariables, each drawn independently with probability p, B c N N 2 (p) is the centered ersion of this atrix, where the rando ariables hae had their expected alue subtracted. For conenience, we define X to be the rando deiations fro the ean fro the atrix on line (9). Thus, E[Ã] is a rank-2 atrix, and à is a rando deiation fro this lowrank structure. The rando entries in X (i.e., those outside of the clique) hae ariance P w2 i p i( p i ). If k grows ore slowly than N, then X will tend toward a Wigner atrix, where the support of the eigenalue distribution (which deterines the noise power, and, thus, the detectability of the clique) scales with the standard deiation of these entries. Subtracting the expected alue of the fused atrix, we are left with a rank- perturbation of the P rando atrix. This rank- perturbation has alues of w ip i in the entries where both ertices are part of the clique, and 0 elsewhere. The nonzero eigenalue of this atrix is: = k w i p i. At this point, we hae a siilar setting as in [8]. In this case, the Wigner atrix has an eigenalue distribution that tends to a seicircle with radius: u X R = t 4N wi 2p u X i ( p i )= t 4 wi 2c i ( p i ), () whereas in the single-source case the radius is p 4Np( p). The rank- perturbation in the new setting is rather than siply k( p). We can apply siilar reasoning to deelop a new bound for planted clique detection using the fused odularity atrix with gien weights. First, we introduce an approxiation that will enhance the interpretability of the result. As graphs grow large, their density tends to decrease. That is, the aerage degree of the ertices grows slowly, not proportionally to N as it would if p reained constant. Thus, we will focus on a case where p 0 as N. Specifically, we consider the case where the aerage degree c reains constant. This allows us to express the detectability bound in ters of the aerage degrees of the graphs, c i, for large alues of N. The relationship between the axiu eigenalue of the rank- perturbation and the radius of the seicircle in Clai 2. is: k( p) > p Np( p). Thus, in the siilar setting for fused graphs, we want > R/2. Since we are assuing c i reains constant, we can use ( p i ) to approxiate the quantities of interest as k and R/2 p P w2 i c i. Since the approxiate eigenalue of the rank- perturbation is independent of the weights, the objectie to axiize detectability is equialent to that of iniizing R. To incorporate the constraint that the weights su to, we optiize the Lagrange function: ux L(w, )= t wi 2c i + w i. (2) j to zero yields: ux w j c j = t wi 2c i. (3) Since the right hand side of (3) is constant across weights, this critical point exists where each weight is inersely proportional to the aerage degree of its associated graph. Thus, the optial weighting schee for iniizing the support of the eigenalues is gien by: w j = /c P j /c = i + P i6=j c. (4) j/c i This result proides a atheatical justification for what would be an intuitie heuristic: giing the obserations that are noisier a proportionally lower weight. For exaple, if all graphs hae equal aerage degree, then they will be weighted equally. Conersely, if one graph has a uch saller aerage degree than the others, its weight will be close to while the others will be close to 0. In conjunction with the alue of R, this also deonstrates how additional inforation iproes detectability. Indeed, if G i has substantially lower degree than the other graphs, the detection threshold will reain approxiately p c i, since the other inforation is uch noisier and ost of the ephasis will be placed on the graph with the sparsest background. On the other hand, if all of the graphs hae equal aerage degree, the detection threshold will be reduced by p. As we show in the next section, the optiality of this weighting schee is erified by epirical detection perforance. IV. SIMULATION RESULTS In each of the following experients, we fuse two Erdős- Rényi graphs, each with a planted clique. The graphs each hae 0,000 ertices, and we ary the clique size, the aerage degrees of the backgrounds, and the weights to deonstrate the optiality of the solution deried in Section III. In each case, we set the false alars rate fro (2) to 0.05, and 522

4 Fig.. Probability of detection for a clique of arying size, ebedded into one graph with aerage degree 70 and one with aerage degree that aries. The optiized weights are used to fuse the graphs. The detection probability is shown on a base-0 logarithic scale, and the detection threshold is drawn in white. copute the epirical probability of detection of the clique ertices when thresholding the principal eigenector of B at the corresponding leel. We begin by deonstrating that the iproed bound correctly predicts where the clique becoes detectable. In this experient, we set the aerage degree of one graph to 70, and ary the aerage degree of the other graph fro 0 to 20. We independently ary the size of the clique fro 2 to 2. For each trial, the optiized weights fro (4) are used. The epirical probability of detection is shown in Fig.. Probability of detection is copared to the detectability threshold: q k = w 2c + w2 2c 2. Once k becoes larger than the threshold, its detectability begins to increase until the probability of detection eentually reaches. Using only the graph with arying degree, the detection threshold would be the square root of the aerage degree on the horizontal axis (e.g., a clique of size 0 at an aerage degree of 00). Using the additional inforation proided by the other graph, the detection threshold is substantially lowered on the right side of the plot, where the graph with ariable aerage degree is the densest. Our second experient deonstrates the optiality of the deried solution. We again fix the aerage degree of one of the graphs (in this case c 2 = 80), and now fix the clique size to k = 7. We then ary the aerage degree of G and its corresponding weight w = w 2. We consider c 2 {20, 40, 60, 80}. Probability of detection is shown in Fig. 2, where the epirical results are copared to the deried optial weight w =/(+(c /70)). For all alues of c, the epirical detection rate is axiized at the deried weight. This is true when c is sall, and ost of the weight is placed on w, and when c is large and the weights are approxiately equal. This behaior holds for arious clique sizes. Fig. 3 illustrates detection probability for three cases. In each case, two graphs Fig. 2. Probability of detection for a 7-ertex clique, ebedded into one graph with aerage degree 80 and one with aerage degree that aries. The weights used for fusion are aried to deonstrate optiality of the deried solution, which is drawn in white. are fused, with a planted clique whose size is at the detection threshold for the sparser graph (i.e., k = p c, where c apple c 2 ). We choose a case where the optial weighting has w =0.5, one with w =0.7, and one with w =0.9. By siply aeraging the graphs, we would achiee the detection probability at w =0.5, and the only case where this is optial is the case where the aerage degrees are equal. In the other cases, while the iproeent oer only considering the sparser graph (the detection probability achieed at the extree right of the plot), is ore subtle, there is a substantial iproeent that is axiized at the theoretically deterined weighting. Finally, we consider a case where we ary the aerage degrees of both graphs independently, and use the optial weighting. In this experient, the size of the planted clique is k =9. Detection probabilities are shown in Fig. 4. First, note that the probability of detection increases as either graph gets sparser. Cures indicating the detection thresholds for cliques of size 5 to 8 are oerlayed in the plot. These cures follow the forula: c 2 = /k 2. /c As we expect, at the thresholds for saller cliques, the 9- ertex clique is ore likely to be detected. It is also noteworthy that, along the cure where the threshold is the sae, the epirical detection probability reains consistent. This proides additional alidation that the optial weighting is correct: Using the optial weighting at a gien threshold gies a consistent detection probability, regardless of the densities of the indiidual graphs. V. CONCLUSION This paper extends recent spectral bounds for planted clique detection to cases where ultiple graphs are obsered. Operating in a ulti-source setting has becoe extreely iportant in recent years, as correlating obserations fro ultiple datasets has becoe ore coon. We deonstrate that the intuitie approach of weighting each graph in inerse proportion to its aerage degree is, in fact, the optial technique 523

5 Fig. 3. Probability of detection with respect to the weight of G in three scenarios. In each case, the theoretically optial weighting is indicated by a ertical dashed line of the sae color as the cure. beneficial. Fig. 4. Probability of detection for a 9-ertex clique, ebedded into two graphs of arying degree. Optiized weights are used to fuse the graphs. Detection thresholds for saller cliques (5 to 8 ertices) are drawn in white. under a linear weighting schee. Epirical results confir the theory in a wide range of settings. There are any possible future directions for this work. A siple extension of the result to dense subgraphs, rather than cliques, follows rather directly. Extending results to ore coplicated background odels such as Chung-Lu odels, with arbitrary aerage degree, or stochastic blockodels, with inherent counity structure would be another natural progression. This could also apply to cases where the subgraph changes oer the obserations, as in [2]. As data are often correlated across sources, extending to a setting where there are dependencies across the obserations would also be REFERENCES [] B. A. Miller, M. S. Beard, P. J. Wolfe, and N. T. Bliss, A spectral fraework for anoalous subgraph detection, IEEE Trans. Signal Process., ol. 63, no. 6, pp , Aug 205. [2] M. E. J. Newan and M. Giran, Finding and ealuating counity structure in networks, Phys. Re. E, ol. 69, no. 2, [3] D. Bu, Y. Zhao, L. Cai, H. Xue, X. Zhu, H. Lu, J. Zhang, S. Sun, L. Ling, N. Zhang, G. Li, and R. Chen, Topological structure analysis of the protein protein interaction network in budding yeast, Nucleic Acids Research, ol. 3, no. 9, pp , [4] M. Jerru, Large cliques elude the Metropolis process, Rando Structures & Algoriths, ol. 3, pp , 992. [5] N. Alon, M. Krieleich, and B. Sudako, Finding a large hidden clique in a rando graph, in Proc. ACM-SIAM Syp. Discrete Algoriths, 998, pp [6] V. Feldan, E. Grigorescu, L. Reyzin, S. Vepala, and Y. Xiao, Statistical algoriths and a lower bound for detecting planted clique, 205, preprint: arxi.org: [7] E. Arias-Castro and N. Verzelen, Counity detection in rando networks, 203, preprint: arxi.org: [8] R. R. Nadakuditi, On hard liits of eigen-analysis based planted clique detection, in Proc. IEEE Statistical Signal Process. Workshop, 202, pp [9] R. R. Nadakuditi and M. E. J. Newan, Graph spectra and the detectability of counity structure in networks, Phys. Re. Lett., ol. 08, p. 8870, May 202. [Online]. Aailable: [0] M. E. J. Newan, Finding counity structure in networks using the eigenectors of atrices, Phys. Re. E, ol. 74, no. 3, [] F. Benaych-Georges and R. R. Nadakuditi, The eigenalues and eigenectors of finite, low rank perturbations of large rando atrices, Adances in Math., ol. 227, no., pp , May 20. [2] B. A. Miller and N. T. Bliss, Toward atched filter optiization for subgraph detection in dynaic networks, in Proc. IEEE Statistical Signal Process. Workshop, 202, pp

Kinetic Molecular Theory of Ideal Gases

Kinetic Molecular Theory of Ideal Gases Lecture -3. Kinetic Molecular Theory of Ideal Gases Last Lecture. IGL is a purely epirical law - solely the consequence of experiental obserations Explains the behaior of gases oer a liited range of conditions.

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

arxiv: v1 [cs.ds] 3 Feb 2014

arxiv: v1 [cs.ds] 3 Feb 2014 arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

Kinetic Molecular Theory of. IGL is a purely empirical law - solely the

Kinetic Molecular Theory of. IGL is a purely empirical law - solely the Lecture -3. Kinetic Molecular Theory of Ideal Gases Last Lecture. IGL is a purely epirical law - solely the consequence of experiental obserations Explains the behaior of gases oer a liited range of conditions.

More information

Interactive Markov Models of Evolutionary Algorithms

Interactive Markov Models of Evolutionary Algorithms Cleveland State University EngagedScholarship@CSU Electrical Engineering & Coputer Science Faculty Publications Electrical Engineering & Coputer Science Departent 2015 Interactive Markov Models of Evolutionary

More information

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering

More information

A nonstandard cubic equation

A nonstandard cubic equation MATH-Jan-05-0 A nonstandard cubic euation J S Markoitch PO Box West Brattleboro, VT 050 Dated: January, 05 A nonstandard cubic euation is shown to hae an unusually econoical solution, this solution incorporates

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

A Simple Regression Problem

A Simple Regression Problem A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where

More information

SF Chemical Kinetics.

SF Chemical Kinetics. SF Cheical Kinetics. Lecture 5. Microscopic theory of cheical reaction inetics. Microscopic theories of cheical reaction inetics. basic ai is to calculate the rate constant for a cheical reaction fro first

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

arxiv: v1 [stat.me] 1 Aug 2016

arxiv: v1 [stat.me] 1 Aug 2016 Null Models and Modularity Based Counity Detection in Multi-Layer Networks Subhadeep Paul and Yuguo Chen University of Illinois at Urbana-Chapaign Abstract arxiv:168.623v1 [stat.me] 1 Aug 16 Multi-layer

More information

HORIZONTAL MOTION WITH RESISTANCE

HORIZONTAL MOTION WITH RESISTANCE DOING PHYSICS WITH MATLAB MECHANICS HORIZONTAL MOTION WITH RESISTANCE Ian Cooper School of Physics, Uniersity of Sydney ian.cooper@sydney.edu.au DOWNLOAD DIRECTORY FOR MATLAB SCRIPTS ec_fr_b. This script

More information

Lower Bounds for Quantized Matrix Completion

Lower Bounds for Quantized Matrix Completion Lower Bounds for Quantized Matrix Copletion Mary Wootters and Yaniv Plan Departent of Matheatics University of Michigan Ann Arbor, MI Eail: wootters, yplan}@uich.edu Mark A. Davenport School of Elec. &

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

Sequence Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson) February 5,

Sequence Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson) February 5, Sequence Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson) February 5, 2015 31 11 Motif Finding Sources for this section: Rouchka, 1997, A Brief Overview of Gibbs Sapling. J. Buhler, M. Topa:

More information

Upper bound on false alarm rate for landmine detection and classification using syntactic pattern recognition

Upper bound on false alarm rate for landmine detection and classification using syntactic pattern recognition Upper bound on false alar rate for landine detection and classification using syntactic pattern recognition Ahed O. Nasif, Brian L. Mark, Kenneth J. Hintz, and Nathalia Peixoto Dept. of Electrical and

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China 6th International Conference on Machinery, Materials, Environent, Biotechnology and Coputer (MMEBC 06) Solving Multi-Sensor Multi-Target Assignent Proble Based on Copositive Cobat Efficiency and QPSO Algorith

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

Correlated Bayesian Model Fusion: Efficient Performance Modeling of Large-Scale Tunable Analog/RF Integrated Circuits

Correlated Bayesian Model Fusion: Efficient Performance Modeling of Large-Scale Tunable Analog/RF Integrated Circuits Correlated Bayesian odel Fusion: Efficient Perforance odeling of Large-Scale unable Analog/RF Integrated Circuits Fa Wang and Xin Li ECE Departent, Carnegie ellon University, Pittsburgh, PA 53 {fwang,

More information

Fractional Order Ship Tracking Correlation Algorithm

Fractional Order Ship Tracking Correlation Algorithm 2894 JOURNAL OF SOFTWARE VOL. 7 NO. 12 DECEMBER 2012 Fractional Order Ship Tracking Correlation Algorith Mingliang Hou School of Coputer Engineering /Huaihai Institute of Technology LianyungangChina Eail:

More information

In this chapter, we consider several graph-theoretic and probabilistic models

In this chapter, we consider several graph-theoretic and probabilistic models THREE ONE GRAPH-THEORETIC AND STATISTICAL MODELS 3.1 INTRODUCTION In this chapter, we consider several graph-theoretic and probabilistic odels for a social network, which we do under different assuptions

More information

On Constant Power Water-filling

On Constant Power Water-filling On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives

More information

Fast Structural Similarity Search of Noncoding RNAs Based on Matched Filtering of Stem Patterns

Fast Structural Similarity Search of Noncoding RNAs Based on Matched Filtering of Stem Patterns Fast Structural Siilarity Search of Noncoding RNs Based on Matched Filtering of Ste Patterns Byung-Jun Yoon Dept. of Electrical Engineering alifornia Institute of Technology Pasadena, 91125, S Eail: bjyoon@caltech.edu

More information

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Proc. of the IEEE/OES Seventh Working Conference on Current Measureent Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Belinda Lipa Codar Ocean Sensors 15 La Sandra Way, Portola Valley, CA 98 blipa@pogo.co

More information

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words)

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words) 1 A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine (1900 words) Contact: Jerry Farlow Dept of Matheatics Univeristy of Maine Orono, ME 04469 Tel (07) 866-3540 Eail: farlow@ath.uaine.edu

More information

Compressive Distilled Sensing: Sparse Recovery Using Adaptivity in Compressive Measurements

Compressive Distilled Sensing: Sparse Recovery Using Adaptivity in Compressive Measurements 1 Copressive Distilled Sensing: Sparse Recovery Using Adaptivity in Copressive Measureents Jarvis D. Haupt 1 Richard G. Baraniuk 1 Rui M. Castro 2 and Robert D. Nowak 3 1 Dept. of Electrical and Coputer

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

Pattern Recognition and Machine Learning. Artificial Neural networks

Pattern Recognition and Machine Learning. Artificial Neural networks Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2016 Lessons 7 14 Dec 2016 Outline Artificial Neural networks Notation...2 1. Introduction...3... 3 The Artificial

More information

EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS

EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS Jochen Till, Sebastian Engell, Sebastian Panek, and Olaf Stursberg Process Control Lab (CT-AST), University of Dortund,

More information

CS Lecture 13. More Maximum Likelihood

CS Lecture 13. More Maximum Likelihood CS 6347 Lecture 13 More Maxiu Likelihood Recap Last tie: Introduction to axiu likelihood estiation MLE for Bayesian networks Optial CPTs correspond to epirical counts Today: MLE for CRFs 2 Maxiu Likelihood

More information

Pattern Recognition and Machine Learning. Artificial Neural networks

Pattern Recognition and Machine Learning. Artificial Neural networks Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lessons 7 20 Dec 2017 Outline Artificial Neural networks Notation...2 Introduction...3 Key Equations... 3 Artificial

More information

The Weierstrass Approximation Theorem

The Weierstrass Approximation Theorem 36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined

More information

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Soft Coputing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Beverly Rivera 1,2, Irbis Gallegos 1, and Vladik Kreinovich 2 1 Regional Cyber and Energy Security Center RCES

More information

ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD

ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical and Matheatical Sciences 04,, p. 7 5 ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD M a t h e a t i c s Yu. A. HAKOPIAN, R. Z. HOVHANNISYAN

More information

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna

More information

Bipartite subgraphs and the smallest eigenvalue

Bipartite subgraphs and the smallest eigenvalue Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

Probability Distributions

Probability Distributions Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples

More information

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation Course Notes for EE227C (Spring 2018): Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee227c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee227c@berkeley.edu October

More information

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul

More information

MSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE

MSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE Proceeding of the ASME 9 International Manufacturing Science and Engineering Conference MSEC9 October 4-7, 9, West Lafayette, Indiana, USA MSEC9-8466 MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL

More information

A Link Between Integrals and Higher-Order Integrals of SPN Ciphers

A Link Between Integrals and Higher-Order Integrals of SPN Ciphers Link Between Integrals and Higher-Order Integrals of SPN Ciphers Ruilin Li, Bing Sun, and Chao Li Integral cryptanalysis, which is based on the existence of (higher-order) integral distinguishers, is a

More information

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair Proceedings of the 6th SEAS International Conference on Siulation, Modelling and Optiization, Lisbon, Portugal, Septeber -4, 006 0 A Siplified Analytical Approach for Efficiency Evaluation of the eaving

More information

Order Recursion Introduction Order versus Time Updates Matrix Inversion by Partitioning Lemma Levinson Algorithm Interpretations Examples

Order Recursion Introduction Order versus Time Updates Matrix Inversion by Partitioning Lemma Levinson Algorithm Interpretations Examples Order Recursion Introduction Order versus Tie Updates Matrix Inversion by Partitioning Lea Levinson Algorith Interpretations Exaples Introduction Rc d There are any ways to solve the noral equations Solutions

More information

Distributed Subgradient Methods for Multi-agent Optimization

Distributed Subgradient Methods for Multi-agent Optimization 1 Distributed Subgradient Methods for Multi-agent Optiization Angelia Nedić and Asuan Ozdaglar October 29, 2007 Abstract We study a distributed coputation odel for optiizing a su of convex objective functions

More information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information Cite as: Straub D. (2014). Value of inforation analysis with structural reliability ethods. Structural Safety, 49: 75-86. Value of Inforation Analysis with Structural Reliability Methods Daniel Straub

More information

Tabu Programming for Multiobjective Optimization Problems

Tabu Programming for Multiobjective Optimization Problems 44 IJCSNS International Journal of Coputer Science and Network Security, VOL.7 No.0, October 2007 Tabu Prograing for Multiobjectie Optiization Probles Jerzy Balicki, Naal Uniersity of Gdynia, ul. Sidowicza

More information

PULSE-TRAIN BASED TIME-DELAY ESTIMATION IMPROVES RESILIENCY TO NOISE

PULSE-TRAIN BASED TIME-DELAY ESTIMATION IMPROVES RESILIENCY TO NOISE PULSE-TRAIN BASED TIME-DELAY ESTIMATION IMPROVES RESILIENCY TO NOISE 1 Nicola Neretti, 1 Nathan Intrator and 1,2 Leon N Cooper 1 Institute for Brain and Neural Systes, Brown University, Providence RI 02912.

More information

Error Exponents in Asynchronous Communication

Error Exponents in Asynchronous Communication IEEE International Syposiu on Inforation Theory Proceedings Error Exponents in Asynchronous Counication Da Wang EECS Dept., MIT Cabridge, MA, USA Eail: dawang@it.edu Venkat Chandar Lincoln Laboratory,

More information

Pattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition

Pattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lesson 1 4 October 2017 Outline Learning and Evaluation for Pattern Recognition Notation...2 1. The Pattern Recognition

More information

A Smoothed Boosting Algorithm Using Probabilistic Output Codes

A Smoothed Boosting Algorithm Using Probabilistic Output Codes A Soothed Boosting Algorith Using Probabilistic Output Codes Rong Jin rongjin@cse.su.edu Dept. of Coputer Science and Engineering, Michigan State University, MI 48824, USA Jian Zhang jian.zhang@cs.cu.edu

More information

Gaussians. Andrew W. Moore Professor School of Computer Science Carnegie Mellon University.

Gaussians. Andrew W. Moore Professor School of Computer Science Carnegie Mellon University. Note to other teachers and users of these slides. Andrew would be delighted if you found this source aterial useful in giing your own lectures. Feel free to use these slides erbati, or to odify the to

More information

A spectral Turán theorem

A spectral Turán theorem A spectral Turán theorem Fan Chung Abstract If all nonzero eigenalues of the (normalized) Laplacian of a graph G are close to, then G is t-turán in the sense that any subgraph of G containing no K t+ contains

More information

Extension of CSRSM for the Parametric Study of the Face Stability of Pressurized Tunnels

Extension of CSRSM for the Parametric Study of the Face Stability of Pressurized Tunnels Extension of CSRSM for the Paraetric Study of the Face Stability of Pressurized Tunnels Guilhe Mollon 1, Daniel Dias 2, and Abdul-Haid Soubra 3, M.ASCE 1 LGCIE, INSA Lyon, Université de Lyon, Doaine scientifique

More information

Lecture 2: Differential-Delay equations.

Lecture 2: Differential-Delay equations. Lecture : Differential-Delay equations. D. Gurarie A differential equation, or syste:, ; of the syste:, 0 0 0 0 y f y t y t y, predicts a (near) future state 0 0 y t dt y f y t dt, fro its current state,

More information

A remark on a success rate model for DPA and CPA

A remark on a success rate model for DPA and CPA A reark on a success rate odel for DPA and CPA A. Wieers, BSI Version 0.5 andreas.wieers@bsi.bund.de Septeber 5, 2018 Abstract The success rate is the ost coon evaluation etric for easuring the perforance

More information

Due to Fabrication Errors in AWGs

Due to Fabrication Errors in AWGs An Estiation of Perforance Degradation Due to Fabrication Errors in AWGs Thoas Kaalais, Thoas Sphicopoulos and Diitris Syridis The authors are with the departent of Inforatics and Telecounications of the

More information

Condition Monitoring and Fault Detection of Railway Vehicle Suspension using Multiple-Model Approach

Condition Monitoring and Fault Detection of Railway Vehicle Suspension using Multiple-Model Approach Proceedings of the 17th World Congress The International Federation of Autoatic Control Condition Monitoring and Fault Detection of Railway Vehicle Suspension using Multiple-Model Approach Hitoshi Tsunashia

More information

arxiv: v1 [cs.ds] 17 Mar 2016

arxiv: v1 [cs.ds] 17 Mar 2016 Tight Bounds for Single-Pass Streaing Coplexity of the Set Cover Proble Sepehr Assadi Sanjeev Khanna Yang Li Abstract arxiv:1603.05715v1 [cs.ds] 17 Mar 2016 We resolve the space coplexity of single-pass

More information

Intelligent Systems: Reasoning and Recognition. Artificial Neural Networks

Intelligent Systems: Reasoning and Recognition. Artificial Neural Networks Intelligent Systes: Reasoning and Recognition Jaes L. Crowley MOSIG M1 Winter Seester 2018 Lesson 7 1 March 2018 Outline Artificial Neural Networks Notation...2 Introduction...3 Key Equations... 3 Artificial

More information

OBJECTIVES INTRODUCTION

OBJECTIVES INTRODUCTION M7 Chapter 3 Section 1 OBJECTIVES Suarize data using easures of central tendency, such as the ean, edian, ode, and idrange. Describe data using the easures of variation, such as the range, variance, and

More information

Hybrid System Identification: An SDP Approach

Hybrid System Identification: An SDP Approach 49th IEEE Conference on Decision and Control Deceber 15-17, 2010 Hilton Atlanta Hotel, Atlanta, GA, USA Hybrid Syste Identification: An SDP Approach C Feng, C M Lagoa, N Ozay and M Sznaier Abstract The

More information

TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES

TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES S. E. Ahed, R. J. Tokins and A. I. Volodin Departent of Matheatics and Statistics University of Regina Regina,

More information

Prediction by random-walk perturbation

Prediction by random-walk perturbation Prediction by rando-walk perturbation Luc Devroye School of Coputer Science McGill University Gábor Lugosi ICREA and Departent of Econoics Universitat Popeu Fabra lucdevroye@gail.co gabor.lugosi@gail.co

More information

LONG-TERM PREDICTIVE VALUE INTERVAL WITH THE FUZZY TIME SERIES

LONG-TERM PREDICTIVE VALUE INTERVAL WITH THE FUZZY TIME SERIES Journal of Marine Science and Technology, Vol 19, No 5, pp 509-513 (2011) 509 LONG-TERM PREDICTIVE VALUE INTERVAL WITH THE FUZZY TIME SERIES Ming-Tao Chou* Key words: fuzzy tie series, fuzzy forecasting,

More information

Research Article On the Isolated Vertices and Connectivity in Random Intersection Graphs

Research Article On the Isolated Vertices and Connectivity in Random Intersection Graphs International Cobinatorics Volue 2011, Article ID 872703, 9 pages doi:10.1155/2011/872703 Research Article On the Isolated Vertices and Connectivity in Rando Intersection Graphs Yilun Shang Institute for

More information

Sharp Time Data Tradeoffs for Linear Inverse Problems

Sharp Time Data Tradeoffs for Linear Inverse Problems Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used

More information

3.3 Variational Characterization of Singular Values

3.3 Variational Characterization of Singular Values 3.3. Variational Characterization of Singular Values 61 3.3 Variational Characterization of Singular Values Since the singular values are square roots of the eigenvalues of the Heritian atrices A A and

More information

Ensemble Based on Data Envelopment Analysis

Ensemble Based on Data Envelopment Analysis Enseble Based on Data Envelopent Analysis So Young Sohn & Hong Choi Departent of Coputer Science & Industrial Systes Engineering, Yonsei University, Seoul, Korea Tel) 82-2-223-404, Fax) 82-2- 364-7807

More information

Combining Classifiers

Combining Classifiers Cobining Classifiers Generic ethods of generating and cobining ultiple classifiers Bagging Boosting References: Duda, Hart & Stork, pg 475-480. Hastie, Tibsharini, Friedan, pg 246-256 and Chapter 10. http://www.boosting.org/

More information

Topic 5a Introduction to Curve Fitting & Linear Regression

Topic 5a Introduction to Curve Fitting & Linear Regression /7/08 Course Instructor Dr. Rayond C. Rup Oice: A 337 Phone: (95) 747 6958 E ail: rcrup@utep.edu opic 5a Introduction to Curve Fitting & Linear Regression EE 4386/530 Coputational ethods in EE Outline

More information

Boosting with log-loss

Boosting with log-loss Boosting with log-loss Marco Cusuano-Towner Septeber 2, 202 The proble Suppose we have data exaples {x i, y i ) i =... } for a two-class proble with y i {, }. Let F x) be the predictor function with the

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths

More information

When Short Runs Beat Long Runs

When Short Runs Beat Long Runs When Short Runs Beat Long Runs Sean Luke George Mason University http://www.cs.gu.edu/ sean/ Abstract What will yield the best results: doing one run n generations long or doing runs n/ generations long

More information

Maximizing Modularity Density for Exploring Modular Organization of Protein Interaction Networks

Maximizing Modularity Density for Exploring Modular Organization of Protein Interaction Networks The Third International Syposiu on Optiization and Systes Biology (OSB 09) Zhangjiajie, China, Septeber 20 22, 2009 Copyright 2009 ORSC & APORC, pp. 361 370 Maxiizing Modularity Density for Exploring Modular

More information

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS A Thesis Presented to The Faculty of the Departent of Matheatics San Jose State University In Partial Fulfillent of the Requireents

More information

Optical Properties of Plasmas of High-Z Elements

Optical Properties of Plasmas of High-Z Elements Forschungszentru Karlsruhe Techni und Uwelt Wissenschaftlishe Berichte FZK Optical Properties of Plasas of High-Z Eleents V.Tolach 1, G.Miloshevsy 1, H.Würz Project Kernfusion 1 Heat and Mass Transfer

More information

Graphical Models in Local, Asymmetric Multi-Agent Markov Decision Processes

Graphical Models in Local, Asymmetric Multi-Agent Markov Decision Processes Graphical Models in Local, Asyetric Multi-Agent Markov Decision Processes Ditri Dolgov and Edund Durfee Departent of Electrical Engineering and Coputer Science University of Michigan Ann Arbor, MI 48109

More information

Notes on Linear Minimum Mean Square Error Estimators

Notes on Linear Minimum Mean Square Error Estimators Notes on Linear Minimum Mean Square Error Estimators Ça gatay Candan January, 0 Abstract Some connections between linear minimum mean square error estimators, maximum output SNR filters and the least square

More information

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13 CSE55: Randoied Algoriths and obabilistic Analysis May 6, Lecture Lecturer: Anna Karlin Scribe: Noah Siegel, Jonathan Shi Rando walks and Markov chains This lecture discusses Markov chains, which capture

More information

Fixed-to-Variable Length Distribution Matching

Fixed-to-Variable Length Distribution Matching Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de

More information

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding Lai Wei, Student Meber, IEEE, David G. M. Mitchell, Meber, IEEE, Thoas

More information

Pattern Recognition and Machine Learning. Artificial Neural networks

Pattern Recognition and Machine Learning. Artificial Neural networks Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2016/2017 Lessons 9 11 Jan 2017 Outline Artificial Neural networks Notation...2 Convolutional Neural Networks...3

More information

Fokker-Planck Description of Conductance-Based Integrate-and-Fire Neuronal Networks

Fokker-Planck Description of Conductance-Based Integrate-and-Fire Neuronal Networks Fokker-Planck Description of Conductance-Based Integrate-and-Fire Neuronal Networks Gregor Koačič, Louis Tao, Aaditya V. Rangan, 3 and Daid Cai 3,4 Matheatical Sciences Departent, Rensselaer Polytechnic

More information

Generalized Alignment Chain: Improved Converse Results for Index Coding

Generalized Alignment Chain: Improved Converse Results for Index Coding Generalized Alignent Chain: Iproved Converse Results for Index Coding Yucheng Liu and Parastoo Sadeghi Research School of Electrical, Energy and Materials Engineering Australian National University, Canberra,

More information

Community detection in complex networks has attracted a lot

Community detection in complex networks has attracted a lot Resolution liit in counity detection Santo Fortunato and Marc Barthéley School of Inforatics and Center for Biocoplexity, Indiana University, Blooington, IN 47406; Fakultät für Physik, Universität Bielefeld,

More information

A method to determine relative stroke detection efficiencies from multiplicity distributions

A method to determine relative stroke detection efficiencies from multiplicity distributions A ethod to deterine relative stroke detection eiciencies ro ultiplicity distributions Schulz W. and Cuins K. 2. Austrian Lightning Detection and Inoration Syste (ALDIS), Kahlenberger Str.2A, 90 Vienna,

More information

arxiv: v2 [cs.lg] 30 Mar 2017

arxiv: v2 [cs.lg] 30 Mar 2017 Batch Renoralization: Towards Reducing Minibatch Dependence in Batch-Noralized Models Sergey Ioffe Google Inc., sioffe@google.co arxiv:1702.03275v2 [cs.lg] 30 Mar 2017 Abstract Batch Noralization is quite

More information

Optimizing energy potentials for success in protein tertiary structure prediction Ting-Lan Chiu 1 and Richard A Goldstein 1,2

Optimizing energy potentials for success in protein tertiary structure prediction Ting-Lan Chiu 1 and Richard A Goldstein 1,2 Research Paper 223 Optiizing energy potentials for success in protein tertiary structure prediction Ting-Lan Chiu 1 and Richard A Goldstein 1,2 Background: Success in solving the protein structure prediction

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

COS 424: Interacting with Data. Written Exercises

COS 424: Interacting with Data. Written Exercises COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well

More information

Mixed Robust/Average Submodular Partitioning

Mixed Robust/Average Submodular Partitioning Mixed Robust/Average Subodular Partitioning Kai Wei 1 Rishabh Iyer 1 Shengjie Wang 2 Wenruo Bai 1 Jeff Biles 1 1 Departent of Electrical Engineering, University of Washington 2 Departent of Coputer Science,

More information

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and

More information

Algebraic Montgomery-Yang problem: the log del Pezzo surface case

Algebraic Montgomery-Yang problem: the log del Pezzo surface case c 2014 The Matheatical Society of Japan J. Math. Soc. Japan Vol. 66, No. 4 (2014) pp. 1073 1089 doi: 10.2969/jsj/06641073 Algebraic Montgoery-Yang proble: the log del Pezzo surface case By DongSeon Hwang

More information

Low-complexity, Low-memory EMS algorithm for non-binary LDPC codes

Low-complexity, Low-memory EMS algorithm for non-binary LDPC codes Low-coplexity, Low-eory EMS algorith for non-binary LDPC codes Adrian Voicila,David Declercq, François Verdier ETIS ENSEA/CP/CNRS MR-85 954 Cergy-Pontoise, (France) Marc Fossorier Dept. Electrical Engineering

More information