Sequence Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fischer) January 21,
|
|
- Byron Merritt
- 6 years ago
- Views:
Transcription
1 Sequene Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fisher) January 21, Suffix Trees and Suffix Arrays This leture is based on the following soures, whih are all reommended reading: D. Gusfield, Algorithms on Strings, Trees and Sequenes, Cambridge UP, M. Crohemore, W. Rytter, Jewels of Stringology, World Sientifi, M. Crohemore, C. Hanart, T. Leroq, Algorithms on Strings, Cambridge UP, J. Kärkkäinen et al, Simple Linear Work Suffix Array Constrution, Journal of the ACM (JACM) Volume 53 Issue 6, November 2006 Pages S. Kurtz, Foundations of Sequene Analysis, Universität Bielefeld, Introdution Problem Assume we are given a long text T and many short queries Q 1,..., Q k. For eah query sequene Q i, find all its ourrenes in T. We would like to have a data-struture that allows us to solve this problem effiiently. Important appliations are in the omparison of genomes (in programs suh as MUMmer that omputes alignments between genomi sequenes, based on maximal unique mathes ) and in the analysis of repeats (in programs suh as REPuter). For example, the text T might be a genome and the queries might be short words suh as transription fator binding sites. Text T = tttttttgagaggagttgttgtgaggtggagtgagt gggggattggtatgaagtgtgggttaga tttgtagtaagtagtgggataagggga ggtaattttttgtatttttagtagagaggggtttagtttta gggatggttgatttgatgtgatggtggt aaagtgtgggattaagggt Query Q = tttta Find (all) ourrenes of the query Q in the text T 9.2 Basi definitions Definition (Prefix, suffix, fator) We use Σ to denote an alphabet and Σ for the set of all strings over Σ. We use ɛ to denote the empty string and Σ + = Σ \ {ɛ}. Let T = t 1 t 2... t n be a text. A prefix of T is a substring of T beginning at the first position in T. A suffix of T is a substring T i...n = t i t i+1... t n of T ending at the last position in T. A fator (or infix) of T is any substring T i...j = t i t i+1... t j of T.
2 12 Sequene Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fisher) January 21, 2015 In bioinformatis, the alphabet Σ is usually of size 4 or 20. In other appliations, the alphabet an be muh larger, for example, in the analysis of web-surfing patterns, Σ onsists of the set of all links ontained in a olletion of web sites. 9.3 The role of suffixes Consider the text abab It has the following suffixes: abab, bab, ab, b and. Queries are prefixes of suffixes: To determine whether a given query Q is ontained in the text, we ould simply hek whether Q is the prefix of one of the suffixes. 9.4 Sharing prefixes E.g., the query ab is the prefix of both abab and ab. To speed up the searh for all suffixes that have the query as a prefix, we use a tree struture to share ommon prefixes between the suffixes. (a) The suffixes abab and ab both share the prefix ab. (b) The suffixes bab and b both share the prefix b. () The suffix doesn t share a prefix. a b (a) b a b b a (b) Here is an example of how the idea of searhing the prefix of every suffix an be optimized by sharing prefixes whenever possible: () b a b abab ab bab b a b b a A suffix tree for abab is obtained by sharing prefixes whenever possible. The leaves are annotated by the positions of the orresponding suffixes in the text. 9.5 Σ + -tree Definition (Σ + -tree) A ompat Σ + -tree is a rooted tree S = (V, E) with edge labels from Σ + that fulfills the following two onstraints: For eah node v V, the labels of all outgoing edges eah starts with a different letter.
3 Sequene Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fisher) January 21, Apart from the root, all nodes have out-degree 1. You an think of a ompat Σ + -tree as a tree that looks like a trie data struture, but with degreeone-paths ontrated into a single edge. A leaf is a node with no hildren and an edge leading to a leaf is alled a leaf edge. A node with at least two hildren is alled a branhing node. Definition (Notations in Σ + -trees) Let S = (V, E) be a ompat Σ + -tree. Then v denotes the onatenation of all path labels from the root of S to node v. Then d(v) denotes the string-depth v of v. A string α ours in S, or S displays α, iff there exists a node v and a (not neessarily nonempty) string β with v = αβ. Then words(s) denotes the set of all all strings that our in S. If v = α for some node v and string α, then we also use α to denote v. root p For example u = pqr: The root is alled ɛ. q r u 9.6 Suffix tree Definition (Suffix tree) Let fator(t ) denote the set of all fators of T. The suffix tree of T is a ompat Σ + -tree S with words(s) = fator(t ). It is onvenient to ensure that eah suffix ends at a leaf of S. This an be aomplished by always assuming that the text T ends on a sentinel letter $ / Σ that is lexiographially smaller than all other letters. Then there is a one-to-one between suffixes of T $ and the leaves of S and we an label eah leaf v by the start index l(v) = i of the orresponding suffix T i...n, i.e. we set l(v) = i v = T i...n.
4 14 Sequene Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fisher) January 21, 2015 This explains the name suffix tree. A suffix tree S built for T without a sentinel $ is alled an impliit suffix tree. (Note that we did not define suffix trees in terms of suffixes, but rather in terms of fators.) We an use S to find ourrenes of a query Q Σ as follows. Starting at the root, attempt to math the letters of Q against the labels of the edges of S, along a path into the tree. If at some point the path annot be extended, then Q does not our in T. Otherwise, Q ours in T. In this ase, the mathing proedure ends at some loation p in S, either at a node or in an edge. To identify all ourrenes of Q in T, we traverse the subtree below p and report all leaf-labels. The deision query ( does Q our in T? ) takes O(m) time, with m the length of Q. The reporting query ( report all ourrenes of Q in T ) takes O(m + k) time, where k denotes the number of ourrenes of Q in T. The orretness of the two query algorithms follows from the fat that eah fator of T is a prefix of some suffix of T. For an alphabet of onstant size, finding the appropriate outgoing edge an be done in onstant time. An important implementation detail is that the edge labels in a suffix tree an be represented by a
5 Sequene Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fisher) January 21, pair (i, j), 1 i j n suh that T i...j equals the orresponding edge label. Hene, eah edge label uses only a onstant amount of memory. From this implementation detail and the fat that S ontains exatly n leaves and hene less than n branhing nodes, we get the following result: Theorem (Linear spae) A suffix tree requires only O(n) spae. 9.7 Suffix Array We will now introdue two arrays that are losely related to the suffix tree, the suffix array A and the LCP array. Definition (Suffix array) The suffix array A of T is a permutation of {1, 2,..., n} suh that A[i] is the i-th smallest suffix in lexiographi order: T A[i 1]...n < T A[i]...n for all 1 < i n. Let S be the assoiated suffix tree. If we do a traversal through S, visiting hildren in lexiographi order of the labels of the edges leading to them, then all leaves will be visited in the order given in the suffix array A. This links the onepts of suffix array A and suffix tree S. 9.8 LCP Array The LCP array is based on the suffix array: Definition (LCP array) The LCP array of T is defined as follows: set LCP[1] = 0, and for all i > 1, let LCP[i] equal the length of the longest ommon prefix (lp) of T A[i]...n and T A[i 1]...n. To relate the LCP array to the suffix tree S, we need to define the onept of lowest ommon anestors: Definition (Lowest ommon anestor) Given a tree S = (V, E) and two nodes v, w V, the lowest ommon anestor of v and w is the deepest node in S that is an anestor of both v and w, denoted by LCA(v, w).
6 16 Sequene Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fisher) January 21, 2015 Lemma (LCA and LCP) The string-depth of the lowest ommon anestor of the two leaves with labels A[i] and A[i 1], respetively, is given by the orresponding entry LCP[i] of the LCP array. In other words, for all i > 1 we have: LCP[i] = d(lca(t A[i]...n, T A[i 1]...n )). i A[i] suffix LCP[i] 0 9 $ ACCTTCCT$ CCT$ CCTTTCCT$ CT$ CTTCCT$ T$ TCCT$ TTCT$ Suffix Tree from Suffix- and LCP Array Assume we are given T, A, and LCP, and we wish to onstrut S, the suffix tree of T. We will show how to do this in O(n) time. (Later, we will also see how to onstrut A and LCP only from T in linear time. In total, this will give us an O(n)-time onstrution algorithm for suffix trees.) The idea of the algorithm is to insert the suffixes into S in the order of the suffix array: T A[1]...n, T A[2]...n,..., T A[n]...n. To this end, let S i denote the partial suffix tree for 0 i n, i.e. S i is the ompat Σ + -tree with In the end, we will have S = S n. words(s i ) = {T A[k]...j : 1 k i, A[k] j n}. We start with S 0, the tree onsisting only of the root (and displaying only ɛ). In step i + 1, we limb up the rightmost path of S i (i.e., the path from the leaf labeled A[i] to the root) until we meet the deepest node v with d(v) LCP[i + 1]. If d(v) = LCP[i + 1], we simply insert a new leaf x to S i as a hild of v, and label (v, x) by T A[i+1]+LCP[i+1]...n. Leaf x is labeled by A[i + 1]. This gives us S i+1. Otherwise (i.e., d(v) < LCP[i + 1]), let w be the hild of v on S i s rightmost path. In order to obtain S i+1, we split the edge (v, w) as follows: Delete (v, w). Add a new node y and a new edge (v, y), whih gets labeled by T A[i]+d(v)...A[i]+LCP[i+1] 1. Add (y, w) and label it by T A[i]+LCP[i+1]...A[i]+d(w) 1. Add a new leaf x (labeled A[i + 1]) and an edge (y, x). Label (y, x) by T A[i+1]+LCP[i+1]...n.
7 Sequene Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fisher) January 21, Corretness of Algorithm The orretness of this algorithm follows from results stated above. What is the exeution time of this algorithm? Although limbing up the rightmost path ould take O(n) time in a single step, the running time an be bounded by O(n) in total: Eah node traversed in step i (apart from the last) is removed from the rightmost path and will not be traversed again for all subsequent steps j > i. Hene, at most 2n nodes are traversed in total. Theorem (Suffix tree from arrays) We an onstrut T s suffix tree in linear time from T s suffix- and LCP array. This suffix tree onstrution algorithm is good in terms of memory loality; there is a high orrelation between how lose two piees of data are in the tree, and how lose they are in physial memory. Hene, an average query will produe only few ahe misses and leads to a good performane in pratie Linear-Time Constrution of Suffix Arrays For an easier presentation, we assume in this setion that T is indexed from 0 to n 1, T = t 0 t 1... t n 1. Also, we will assume that the end of T is padded by a suffiient number of $ s. We use T i to denote the suffix that starts at index i T = y a b b a d a b b a d o We want to obtain the following in linear time: A = (1, 6, 4, 9, 3, 8, 2, 7, 5, 10, 11, 0) We will desribe the DC3 algorithm 1, whih operates in three steps: (0) Extrat a sample that ontain 2/3 of all suffixes. (1) Reursively sort the extrated suffixes. (2) Use these to sort the other 1/3 of suffixes. (3) Merge the two sorted lists of suffixes to obtain the final suffix array. Step 0: Extrat sample. For k = 0, 1, 2 define B k = {i [0, n] i mod 3 = k}. Let C = B 1 B 2 be the set of sample positions and T C the set of sample suffixes. B 1 = {1, 4, 7, 10}, B 2 = {2, 5, 8, 11} and C = {1, 2, 4, 5, 7, 8, 10, 11}. Let max B k denote the maximum element in B k, in this example max B 1 = 10 and max B 2 = 11. Step 1: Sort sample suffixes. For k = 1, 2 onstrut the strings 1 J. Kärkkäinen et al 2006 R k = [t k t k+1 t k+2 ][t k+3 t k+4 t k+5 ]... [t max Bk t max bk +1t max Bk +2],
8 18 Sequene Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fisher) January 21, 2015 whose letters are triples [t i t i+1 t i+2 ]. Note that the last letter of R k is always unique beause it ends on $. Let R = R 1 R 2 be the onatenation of R 1 and R 2. Then the (nonempty) suffixes of R orrespond to the set T C of sample suffixes: [t i t i+1 t i+2 ][t i+3 t i+4 t i+5 ]... orresponds to T i. This orrespondene is order-preserving, so by sorting the suffixes of R we get the order of the sample suffixes T C. R = [abb][ada][bba][do$][bba][dab][bad][o$$]. To sort the suffixes of R, first radix sort the letters (whih are triples) of R and then rename them with their ranks to obtain a new string R. i = R = [abb] [ada] [bba] [do$] [bba] [dab] [bad] [o$$] R = If all the haraters are different, then the lexiographi ordering of the haraters determines the order of the suffixes. Otherwise, we reursively all Algorithm DC3 to sort the suffixes of R. A R = (0, 1, 6, 4, 2, 5, 3, 7). Now assign a rank to eah sample suffix based on A R. i = Index in T = R = rank= This sorts the set of suffixes in T C. T 1 < T 4 < T 8 < T 2 < T 7 < T 5 < T 10 < T 11. For i C let rank(t i ) denote the rank of suffix T i in the sample set T C, obtained from the rank of the orresponding suffix in R. Additionally, define rank(t n+1 ) = rank(t n+2 ) = 0. For i B 0, the value of rank(t i ) is undefined ( ). i rank(t i ) Step 2: Sort nonsample suffixes. Represent eah nonsample suffix T i T B0 as the pair (t i, rank(t i+1 )). Note that rank(t i+1 ) is defined for all i B 0. For all i, j B 0 we have: T i T j (t i, rank(t i+1 )) (t j, rank(t j+1 )). Using this and applying radix sort to the set of all pairs (t i, rank(t i+1 )), we sort all nonsample suffixes. T 12 < T 6 < T 9 < T 3 < T 0 beause ($, 0) < (a, 5) < (a, 7) < (b, 2) < (y, 1). Step 3: Merge. The two sorted sets of suffixes are merged in the straightforward way, omparing any sample suffix T i T C with a non-sample suffix T j T B0 as follows: if i B 1 then: else (i B 2 ): T i T j (t i, rank(t i+1 )) (t j, rank(t j+1 )), T i T j (t i, t i+1, rank(t i+2 )) (t j, t j+1, rank(t j+2 )).
9 Sequene Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fisher) January 21, T 1 < T 6 beause (a, 4) < (a, 5), and T 3 < T 8 beause (b, a, 6) < (b, a, 7). The time omplexity is given by the following result: Theorem (Linear time) The time omplexity of Algorithm DC3 is O(n). Proof Exluding the reursive all, everything an learly be done in linear time. The reursion is on a string of length 2n/3. Thus the time is given by the reurrene T (n) = T (2n/3) + O(n), whose solution is T (n) = O(n) Linear-Time Constrution of LCP Arrays It remains to be shown how the LCP array an be onstruted in O(n) time. Here, we assume that we are given T, A, and A 1, the latter being the inverse suffix array that maps the i-th suffix to its rank in the lexiographial ordering of all suffixes. We will onstrut the LCP in the original order of the suffixes, using A 1 to index the appropriate element of LCP. This is a good order in whih to proeed beause the following result states that in eah step the value an only derease by at most one: Lemma For all 1 i < n: LCP[A 1 [i + 1]] LCP[A 1 [i]] 1. Proof Let T j be the lexiographi predeessor of T i, i.e., T j < T i and there are no other suffixes between them in the lexiographial order. Then T j is diret predeessor of T i in A and so If h = 0, then the laim is trivially true. LCP [A 1 [i]] = lp(t i, T j ) =: h. If h > 0, then for some letter we have T i = T i+1 and T j = T j+1. Then T j+1 < T i+1 and lp(t i+1, T j+1 ) = h 1. Let T k be the lexiographial predeessor of T i+1. Then either T j+1 = T k or T j+1 < T k < T i+1. In either ase, LCP [A 1 [i + 1]] = lp(t i+1, T k ) lp(t i+1, T j+1 ) = h 1, based on the following argument: If T j+1 = T K, then equality holds in the equation above. Otherwise, T j+1 must ome before T k. Beause T k is the diret predeessor of T i+1, it follows that in the orresponding suffix tree we have that the leaf representing T k is immediately followed by the leaf representing T k+1, and both leaf edges have the same parent. Beause T j+1 is a predeessor of T k, it follows that T j+1 attahes diretly, or indiretly, to a node on the path from the root to T k. Thus the longest ommon prefix of T j+1 and T i+1 annot exeed lp(t k, T i+1 ), as seen here: lp(t k$,t i+1 )## # T j+1# T T i+1# k$ This gives rise to the following elegant algorithm to onstrut the LCP:
10 20 Sequene Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fisher) January 21, 2015 Algorithm (LCP from suffix array) begin 0 LCP[0] = 0 1 h 0 / length of lp for previous suffix / 2 for i = 1,..., n do 3 k A 1 [i] 4 j A[k 1] / T j is lexiographial predeessor of T i / 5 while t i+h = t j+h do 6 h h LCP[k] h 8 h max{0, h 1} end Theorem (Linear time onstrution of LCP) The LCP array for a text of length n an be onstruted in O(n) time. Proof This follows from the presented algorithm: The for loop (line 2) is exeuted n times. Note that h annot grow larger than n, is deremented at most n times, and is inremented in eah round of the while loop (line 5). It follows that line (6) is exeuted at most 2n times Summary and outlook The LCP array and suffix array A an be onstruted in linear time for any given sequene T. We an onstrut the suffix tree S from LCP and A in linear time. In total, this provides a linear time onstrution of S from T. Suffix array and LCP an be used together to replae a suffix tree, using less spae (not shown here).
15.12 Applications of Suffix Trees
248 Algorithms in Bioinformatis II, SoSe 07, ZBIT, D. Huson, May 14, 2007 15.12 Appliations of Suffix Trees 1. Searhing for exat patterns 2. Minimal unique substrings 3. Maximum unique mathes 4. Maximum
More informationMcCreight s Suffix Tree Construction Algorithm. Milko Izamski B.Sc. Informatics Instructor: Barbara König
1. Introution MCreight s Suffix Tree Constrution Algorithm Milko Izamski B.S. Informatis Instrutor: Barbara König The main goal of MCreight s algorithm is to buil a suffix tree in linear time. This is
More informationSearching All Approximate Covers and Their Distance using Finite Automata
Searhing All Approximate Covers and Their Distane using Finite Automata Ondřej Guth, Bořivoj Melihar, and Miroslav Balík České vysoké učení tehniké v Praze, Praha, CZ, {gutho1,melihar,alikm}@fel.vut.z
More informationComputer Science 786S - Statistical Methods in Natural Language Processing and Data Analysis Page 1
Computer Siene 786S - Statistial Methods in Natural Language Proessing and Data Analysis Page 1 Hypothesis Testing A statistial hypothesis is a statement about the nature of the distribution of a random
More informationState Diagrams. Margaret M. Fleck. 14 November 2011
State Diagrams Margaret M. Flek 14 November 2011 These notes over state diagrams. 1 Introdution State diagrams are a type of direted graph, in whih the graph nodes represent states and labels on the graph
More informationSkriptum VL Text Indexing Sommersemester 2012 Johannes Fischer (KIT)
Skriptum VL Text Indexing Sommersemester 2012 Johannes Fischer (KIT) Disclaimer Students attending my lectures are often astonished that I present the material in a much livelier form than in this script.
More informationFORMAL METHODS LECTURE VI BINARY DECISION DIAGRAMS (BDD S)
Alessandro Artale (FM First Semester 2009/2010) p. 1/38 FORMAL METHODS LECTURE VI BINARY DECISION DIAGRAMS (BDD S) Alessandro Artale Faulty of Computer Siene Free University of Bolzano artale@inf.unibz.it
More informationmax min z i i=1 x j k s.t. j=1 x j j:i T j
AM 221: Advaned Optimization Spring 2016 Prof. Yaron Singer Leture 22 April 18th 1 Overview In this leture, we will study the pipage rounding tehnique whih is a deterministi rounding proedure that an be
More informationCMSC 451: Lecture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017
CMSC 451: Leture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017 Reading: Chapt 11 of KT and Set 54 of DPV Set Cover: An important lass of optimization problems involves overing a ertain domain,
More informationFlexible Word Design and Graph Labeling
Flexible Word Design and Graph Labeling Ming-Yang Kao Manan Sanghi Robert Shweller Abstrat Motivated by emerging appliations for DNA ode word design, we onsider a generalization of the ode word design
More informationAdvanced Computational Fluid Dynamics AA215A Lecture 4
Advaned Computational Fluid Dynamis AA5A Leture 4 Antony Jameson Winter Quarter,, Stanford, CA Abstrat Leture 4 overs analysis of the equations of gas dynamis Contents Analysis of the equations of gas
More informationSkriptum VL Text-Indexierung Sommersemester 2010 Johannes Fischer (KIT)
1 Recommended Reading Skriptum VL Text-Indexierung Sommersemester 2010 Johannes Fischer (KIT) D. Gusfield: Algorithms on Strings, Trees, and Sequences. Cambridge University Press, 1997. M. Crochemore,
More informationThe Effectiveness of the Linear Hull Effect
The Effetiveness of the Linear Hull Effet S. Murphy Tehnial Report RHUL MA 009 9 6 Otober 009 Department of Mathematis Royal Holloway, University of London Egham, Surrey TW0 0EX, England http://www.rhul.a.uk/mathematis/tehreports
More informationNonreversibility of Multiple Unicast Networks
Nonreversibility of Multiple Uniast Networks Randall Dougherty and Kenneth Zeger September 27, 2005 Abstrat We prove that for any finite direted ayli network, there exists a orresponding multiple uniast
More informationComplexity of Regularization RBF Networks
Complexity of Regularization RBF Networks Mark A Kon Department of Mathematis and Statistis Boston University Boston, MA 02215 mkon@buedu Leszek Plaskota Institute of Applied Mathematis University of Warsaw
More informationHankel Optimal Model Order Reduction 1
Massahusetts Institute of Tehnology Department of Eletrial Engineering and Computer Siene 6.245: MULTIVARIABLE CONTROL SYSTEMS by A. Megretski Hankel Optimal Model Order Redution 1 This leture overs both
More informationc-perfect Hashing Schemes for Binary Trees, with Applications to Parallel Memories
-Perfet Hashing Shemes for Binary Trees, with Appliations to Parallel Memories (Extended Abstrat Gennaro Cordaso 1, Alberto Negro 1, Vittorio Sarano 1, and Arnold L.Rosenberg 2 1 Dipartimento di Informatia
More informationPacking Plane Spanning Trees into a Point Set
Paking Plane Spanning Trees into a Point Set Ahmad Biniaz Alfredo Garía Abstrat Let P be a set of n points in the plane in general position. We show that at least n/3 plane spanning trees an be paked into
More informationControl Theory association of mathematics and engineering
Control Theory assoiation of mathematis and engineering Wojieh Mitkowski Krzysztof Oprzedkiewiz Department of Automatis AGH Univ. of Siene & Tehnology, Craow, Poland, Abstrat In this paper a methodology
More informationA Metric Index for Approximate String Matching
A Metri Index for Approximate String Mathing Edgar Chávez 1 and Gonzalo Navarro 2 1 Esuela de Cienias Físio-Matemátias, Universidad Mihoaana. Edifiio B, Ciudad Universitaria, Morelia, Mih. Méxio 58000.
More informationMethods of evaluating tests
Methods of evaluating tests Let X,, 1 Xn be i.i.d. Bernoulli( p ). Then 5 j= 1 j ( 5, ) T = X Binomial p. We test 1 H : p vs. 1 1 H : p>. We saw that a LRT is 1 if t k* φ ( x ) =. otherwise (t is the observed
More informationWhere as discussed previously we interpret solutions to this partial differential equation in the weak sense: b
Consider the pure initial value problem for a homogeneous system of onservation laws with no soure terms in one spae dimension: Where as disussed previously we interpret solutions to this partial differential
More informationParallel disrete-event simulation is an attempt to speed-up the simulation proess through the use of multiple proessors. In some sense parallel disret
Exploiting intra-objet dependenies in parallel simulation Franeso Quaglia a;1 Roberto Baldoni a;2 a Dipartimento di Informatia e Sistemistia Universita \La Sapienza" Via Salaria 113, 198 Roma, Italy Abstrat
More information7.1 Roots of a Polynomial
7.1 Roots of a Polynomial A. Purpose Given the oeffiients a i of a polynomial of degree n = NDEG > 0, a 1 z n + a 2 z n 1 +... + a n z + a n+1 with a 1 0, this subroutine omputes the NDEG roots of the
More informationLightpath routing for maximum reliability in optical mesh networks
Vol. 7, No. 5 / May 2008 / JOURNAL OF OPTICAL NETWORKING 449 Lightpath routing for maximum reliability in optial mesh networks Shengli Yuan, 1, * Saket Varma, 2 and Jason P. Jue 2 1 Department of Computer
More informationTight bounds for selfish and greedy load balancing
Tight bounds for selfish and greedy load balaning Ioannis Caragiannis Mihele Flammini Christos Kaklamanis Panagiotis Kanellopoulos Lua Mosardelli Deember, 009 Abstrat We study the load balaning problem
More informationA NETWORK SIMPLEX ALGORITHM FOR THE MINIMUM COST-BENEFIT NETWORK FLOW PROBLEM
NETWORK SIMPLEX LGORITHM FOR THE MINIMUM COST-BENEFIT NETWORK FLOW PROBLEM Cen Çalışan, Utah Valley University, 800 W. University Parway, Orem, UT 84058, 801-863-6487, en.alisan@uvu.edu BSTRCT The minimum
More informationThe Hanging Chain. John McCuan. January 19, 2006
The Hanging Chain John MCuan January 19, 2006 1 Introdution We onsider a hain of length L attahed to two points (a, u a and (b, u b in the plane. It is assumed that the hain hangs in the plane under a
More informationChapter 8 Hypothesis Testing
Leture 5 for BST 63: Statistial Theory II Kui Zhang, Spring Chapter 8 Hypothesis Testing Setion 8 Introdution Definition 8 A hypothesis is a statement about a population parameter Definition 8 The two
More informationSupplementary Materials
Supplementary Materials Neural population partitioning and a onurrent brain-mahine interfae for sequential motor funtion Maryam M. Shanehi, Rollin C. Hu, Marissa Powers, Gregory W. Wornell, Emery N. Brown
More information7 Max-Flow Problems. Business Computing and Operations Research 608
7 Max-Flow Problems Business Computing and Operations Researh 68 7. Max-Flow Problems In what follows, we onsider a somewhat modified problem onstellation Instead of osts of transmission, vetor now indiates
More informationQUANTUM MECHANICS II PHYS 517. Solutions to Problem Set # 1
QUANTUM MECHANICS II PHYS 57 Solutions to Problem Set #. The hamiltonian for a lassial harmoni osillator an be written in many different forms, suh as use ω = k/m H = p m + kx H = P + Q hω a. Find a anonial
More informationA Queueing Model for Call Blending in Call Centers
A Queueing Model for Call Blending in Call Centers Sandjai Bhulai and Ger Koole Vrije Universiteit Amsterdam Faulty of Sienes De Boelelaan 1081a 1081 HV Amsterdam The Netherlands E-mail: {sbhulai, koole}@s.vu.nl
More informationNext: Pushdown automata. Pushdown Automata. Informal Description PDA (1) Informal Description PDA (2) Formal Description PDA
CE 2001: Introdution to Theor of Computation ummer 2007 uprakash Datta datta@s.orku.a Net: Pushdown automata dd stak to definition of Finite utomata Can serve as tpe of memor or ounter More powerful than
More informationViewing the Rings of a Tree: Minimum Distortion Embeddings into Trees
Viewing the Rings of a Tree: Minimum Distortion Embeddings into Trees Amir Nayyeri Benjamin Raihel Abstrat We desribe a 1+ε) approximation algorithm for finding the minimum distortion embedding of an n-point
More informationarxiv: v2 [math.pr] 9 Dec 2016
Omnithermal Perfet Simulation for Multi-server Queues Stephen B. Connor 3th Deember 206 arxiv:60.0602v2 [math.pr] 9 De 206 Abstrat A number of perfet simulation algorithms for multi-server First Come First
More informationModes are solutions, of Maxwell s equation applied to a specific device.
Mirowave Integrated Ciruits Prof. Jayanta Mukherjee Department of Eletrial Engineering Indian Institute of Tehnology, Bombay Mod 01, Le 06 Mirowave omponents Welome to another module of this NPTEL mok
More informationSome facts you should know that would be convenient when evaluating a limit:
Some fats you should know that would be onvenient when evaluating a it: When evaluating a it of fration of two funtions, f(x) x a g(x) If f and g are both ontinuous inside an open interval that ontains
More informationAharonov-Bohm effect. Dan Solomon.
Aharonov-Bohm effet. Dan Solomon. In the figure the magneti field is onfined to a solenoid of radius r 0 and is direted in the z- diretion, out of the paper. The solenoid is surrounded by a barrier that
More informationSensitivity Analysis in Markov Networks
Sensitivity Analysis in Markov Networks Hei Chan and Adnan Darwihe Computer Siene Department University of California, Los Angeles Los Angeles, CA 90095 {hei,darwihe}@s.ula.edu Abstrat This paper explores
More informationA simple expression for radial distribution functions of pure fluids and mixtures
A simple expression for radial distribution funtions of pure fluids and mixtures Enrio Matteoli a) Istituto di Chimia Quantistia ed Energetia Moleolare, CNR, Via Risorgimento, 35, 56126 Pisa, Italy G.
More informationChapter 3 Church-Turing Thesis. CS 341: Foundations of CS II
CS 341: Foundations of CS II Marvin K. Nakayama Computer Siene Department New Jersey Institute of Tehnology Newark, NJ 07102 CS 341: Chapter 3 3-2 Contents Turing Mahines Turing-reognizable Turing-deidable
More informationLECTURE NOTES FOR , FALL 2004
LECTURE NOTES FOR 18.155, FALL 2004 83 12. Cone support and wavefront set In disussing the singular support of a tempered distibution above, notie that singsupp(u) = only implies that u C (R n ), not as
More informationWavetech, LLC. Ultrafast Pulses and GVD. John O Hara Created: Dec. 6, 2013
Ultrafast Pulses and GVD John O Hara Created: De. 6, 3 Introdution This doument overs the basi onepts of group veloity dispersion (GVD) and ultrafast pulse propagation in an optial fiber. Neessarily, it
More informationarxiv: v1 [cs.cc] 27 Jul 2014
DMVP: Foremost Waypoint Coverage of Time-Varying Graphs Eri Aaron 1, Danny Krizan 2, and Elliot Meyerson 2 arxiv:1407.7279v1 [s.cc] 27 Jul 2014 1 Computer Siene Department, Vassar College, Poughkeepsie,
More information( ) ( ) Volumetric Properties of Pure Fluids, part 4. The generic cubic equation of state:
CE304, Spring 2004 Leture 6 Volumetri roperties of ure Fluids, part 4 The generi ubi equation of state: There are many possible equations of state (and many have been proposed) that have the same general
More informationLikelihood-confidence intervals for quantiles in Extreme Value Distributions
Likelihood-onfidene intervals for quantiles in Extreme Value Distributions A. Bolívar, E. Díaz-Franés, J. Ortega, and E. Vilhis. Centro de Investigaión en Matemátias; A.P. 42, Guanajuato, Gto. 36; Méxio
More informationDanielle Maddix AA238 Final Project December 9, 2016
Struture and Parameter Learning in Bayesian Networks with Appliations to Prediting Breast Caner Tumor Malignany in a Lower Dimension Feature Spae Danielle Maddix AA238 Final Projet Deember 9, 2016 Abstrat
More informationThe coefficients a and b are expressed in terms of three other parameters. b = exp
T73S04 Session 34: elaxation & Elasti Follow-Up Last Update: 5/4/2015 elates to Knowledge & Skills items 1.22, 1.28, 1.29, 1.30, 1.31 Evaluation of relaxation: integration of forward reep and limitations
More informationProduct Policy in Markets with Word-of-Mouth Communication. Technical Appendix
rodut oliy in Markets with Word-of-Mouth Communiation Tehnial Appendix August 05 Miro-Model for Inreasing Awareness In the paper, we make the assumption that awareness is inreasing in ustomer type. I.e.,
More informationarxiv:math/ v1 [math.ca] 27 Nov 2003
arxiv:math/011510v1 [math.ca] 27 Nov 200 Counting Integral Lamé Equations by Means of Dessins d Enfants Sander Dahmen November 27, 200 Abstrat We obtain an expliit formula for the number of Lamé equations
More informationSURFACE WAVES OF NON-RAYLEIGH TYPE
SURFACE WAVES OF NON-RAYLEIGH TYPE by SERGEY V. KUZNETSOV Institute for Problems in Mehanis Prosp. Vernadskogo, 0, Mosow, 75 Russia e-mail: sv@kuznetsov.msk.ru Abstrat. Existene of surfae waves of non-rayleigh
More informationConcerning the Numbers 22p + 1, p Prime
Conerning the Numbers 22p + 1, p Prime By John Brillhart 1. Introdution. In a reent investigation [7] the problem of fatoring numbers of the form 22p + 1, p a, was enountered. Sine 22p + 1 = (2P - 2*
More informationAn I-Vector Backend for Speaker Verification
An I-Vetor Bakend for Speaker Verifiation Patrik Kenny, 1 Themos Stafylakis, 1 Jahangir Alam, 1 and Marel Kokmann 2 1 CRIM, Canada, {patrik.kenny, themos.stafylakis, jahangir.alam}@rim.a 2 VoieTrust, Canada,
More informationConvergence of reinforcement learning with general function approximators
Convergene of reinforement learning with general funtion approximators assilis A. Papavassiliou and Stuart Russell Computer Siene Division, U. of California, Berkeley, CA 94720-1776 fvassilis,russellg@s.berkeley.edu
More informationCOMPARISON OF GEOMETRIC FIGURES
COMPARISON OF GEOMETRIC FIGURES Spyros Glenis M.Ed University of Athens, Department of Mathematis, e-mail spyros_glenis@sh.gr Introdution the figures: In Eulid, the geometri equality is based on the apability
More informationOrdered fields and the ultrafilter theorem
F U N D A M E N T A MATHEMATICAE 59 (999) Ordered fields and the ultrafilter theorem by R. B e r r (Dortmund), F. D e l o n (Paris) and J. S h m i d (Dortmund) Abstrat. We prove that on the basis of ZF
More informationMillennium Relativity Acceleration Composition. The Relativistic Relationship between Acceleration and Uniform Motion
Millennium Relativity Aeleration Composition he Relativisti Relationship between Aeleration and niform Motion Copyright 003 Joseph A. Rybzyk Abstrat he relativisti priniples developed throughout the six
More informationThe Concept of Mass as Interfering Photons, and the Originating Mechanism of Gravitation D.T. Froedge
The Conept of Mass as Interfering Photons, and the Originating Mehanism of Gravitation D.T. Froedge V04 Formerly Auburn University Phys-dtfroedge@glasgow-ky.om Abstrat For most purposes in physis the onept
More informationReliability Guaranteed Energy-Aware Frame-Based Task Set Execution Strategy for Hard Real-Time Systems
Reliability Guaranteed Energy-Aware Frame-Based ask Set Exeution Strategy for Hard Real-ime Systems Zheng Li a, Li Wang a, Shuhui Li a, Shangping Ren a, Gang Quan b a Illinois Institute of ehnology, Chiago,
More informationModel-based mixture discriminant analysis an experimental study
Model-based mixture disriminant analysis an experimental study Zohar Halbe and Mayer Aladjem Department of Eletrial and Computer Engineering, Ben-Gurion University of the Negev P.O.Box 653, Beer-Sheva,
More informationCryptography, winter term 16/17: Sample solution to assignment 2
U N S A R I V E R S A V I E I T A S N I S S Cryptography, winter term 6/7: Sample solution to assignment Cornelius Brand, Mar Roth Exerise. (Messing up the one-time pad) Consider the following modifiation
More informationChapter 2 Linear Elastic Fracture Mechanics
Chapter 2 Linear Elasti Frature Mehanis 2.1 Introdution Beginning with the fabriation of stone-age axes, instint and experiene about the strength of various materials (as well as appearane, ost, availability
More informationI F I G R e s e a r c h R e p o r t. Minimal and Hyper-Minimal Biautomata. IFIG Research Report 1401 March Institut für Informatik
I F I G R e s e a r h R e p o r t Institut für Informatik Minimal and Hyper-Minimal Biautomata Markus Holzer Seastian Jakoi IFIG Researh Report 1401 Marh 2014 Institut für Informatik JLU Gießen Arndtstraße
More informationA Characterization of Wavelet Convergence in Sobolev Spaces
A Charaterization of Wavelet Convergene in Sobolev Spaes Mark A. Kon 1 oston University Louise Arakelian Raphael Howard University Dediated to Prof. Robert Carroll on the oasion of his 70th birthday. Abstrat
More informationLecture 7: Sampling/Projections for Least-squares Approximation, Cont. 7 Sampling/Projections for Least-squares Approximation, Cont.
Stat60/CS94: Randomized Algorithms for Matries and Data Leture 7-09/5/013 Leture 7: Sampling/Projetions for Least-squares Approximation, Cont. Leturer: Mihael Mahoney Sribe: Mihael Mahoney Warning: these
More informationFrugality Ratios And Improved Truthful Mechanisms for Vertex Cover
Frugality Ratios And Improved Truthful Mehanisms for Vertex Cover Edith Elkind Hebrew University of Jerusalem, Israel, and University of Southampton, Southampton, SO17 1BJ, U.K. Leslie Ann Goldberg University
More informationOn Component Order Edge Reliability and the Existence of Uniformly Most Reliable Unicycles
Daniel Gross, Lakshmi Iswara, L. William Kazmierzak, Kristi Luttrell, John T. Saoman, Charles Suffel On Component Order Edge Reliability and the Existene of Uniformly Most Reliable Uniyles DANIEL GROSS
More informationMAC Calculus II Summer All you need to know on partial fractions and more
MC -75-Calulus II Summer 00 ll you need to know on partial frations and more What are partial frations? following forms:.... where, α are onstants. Partial frations are frations of one of the + α, ( +
More informationA Functional Representation of Fuzzy Preferences
Theoretial Eonomis Letters, 017, 7, 13- http://wwwsirporg/journal/tel ISSN Online: 16-086 ISSN Print: 16-078 A Funtional Representation of Fuzzy Preferenes Susheng Wang Department of Eonomis, Hong Kong
More informationDIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS
CHAPTER 4 DIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS 4.1 INTRODUCTION Around the world, environmental and ost onsiousness are foring utilities to install
More informationLecture 3 - Lorentz Transformations
Leture - Lorentz Transformations A Puzzle... Example A ruler is positioned perpendiular to a wall. A stik of length L flies by at speed v. It travels in front of the ruler, so that it obsures part of the
More informationThis document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.
This doument is downloaded from DR-NTU, Nanyang Tehnologial University Library, Singapore. Title Extrating Threshold Coneptual Strutures from Web Douments Author(s) Ciobanu, Gabriel; Horne, Ross; Vaideanu,
More informationIMPEDANCE EFFECTS OF LEFT TURNERS FROM THE MAJOR STREET AT A TWSC INTERSECTION
09-1289 Citation: Brilon, W. (2009): Impedane Effets of Left Turners from the Major Street at A TWSC Intersetion. Transportation Researh Reord Nr. 2130, pp. 2-8 IMPEDANCE EFFECTS OF LEFT TURNERS FROM THE
More informationSome Properties on Nano Topology Induced by Graphs
AASCIT Journal of anosiene 2017; 3(4): 19-23 http://wwwaasitorg/journal/nanosiene ISS: 2381-1234 (Print); ISS: 2381-1242 (Online) Some Properties on ano Topology Indued by Graphs Arafa asef 1 Abd El Fattah
More informationarxiv:math/ v4 [math.ca] 29 Jul 2006
arxiv:math/0109v4 [math.ca] 9 Jul 006 Contiguous relations of hypergeometri series Raimundas Vidūnas University of Amsterdam Abstrat The 15 Gauss ontiguous relations for F 1 hypergeometri series imply
More informationLecture 18: Identification Schemes, Schnorr Signatures
CS 7880 Graduate Cryptography November 8, 2017 Leture 18: Identifiation Shemes, Shnorr Signatures Leturer: Daniel Wihs Sribe: Vikrant Singhal 1 Topi Covered Identifiation Shemes Shnorr Identifiation Sheme
More informationMoments and Wavelets in Signal Estimation
Moments and Wavelets in Signal Estimation Edward J. Wegman 1 Center for Computational Statistis George Mason University Hung T. Le 2 International usiness Mahines Abstrat: The problem of generalized nonparametri
More informationG /G Advanced Cryptography 10/21/2009. Lecture 7
G22.3220-001/G63.2180 Advaned Cryptography 10/21/2009 Leturer: Yevgeniy Dodis Leture 7 Sribe: Aris Tentes In this leture we will over the following topis: Witness Hiding Σ-protools Alternative Constrution
More informationSensor management for PRF selection in the track-before-detect context
Sensor management for PRF seletion in the tra-before-detet ontext Fotios Katsilieris, Yvo Boers, and Hans Driessen Thales Nederland B.V. Haasbergerstraat 49, 7554 PA Hengelo, the Netherlands Email: {Fotios.Katsilieris,
More informationCoding for Random Projections and Approximate Near Neighbor Search
Coding for Random Projetions and Approximate Near Neighbor Searh Ping Li Department of Statistis & Biostatistis Department of Computer Siene Rutgers University Pisataay, NJ 8854, USA pingli@stat.rutgers.edu
More informationMetric of Universe The Causes of Red Shift.
Metri of Universe The Causes of Red Shift. ELKIN IGOR. ielkin@yande.ru Annotation Poinare and Einstein supposed that it is pratially impossible to determine one-way speed of light, that s why speed of
More informationQ2. [40 points] Bishop-Hill Model: Calculation of Taylor Factors for Multiple Slip
27-750, A.D. Rollett Due: 20 th Ot., 2011. Homework 5, Volume Frations, Single and Multiple Slip Crystal Plastiity Note the 2 extra redit questions (at the end). Q1. [40 points] Single Slip: Calulating
More informationRobust Recovery of Signals From a Structured Union of Subspaces
Robust Reovery of Signals From a Strutured Union of Subspaes 1 Yonina C. Eldar, Senior Member, IEEE and Moshe Mishali, Student Member, IEEE arxiv:87.4581v2 [nlin.cg] 3 Mar 29 Abstrat Traditional sampling
More informationA Spatiotemporal Approach to Passive Sound Source Localization
A Spatiotemporal Approah Passive Sound Soure Loalization Pasi Pertilä, Mikko Parviainen, Teemu Korhonen and Ari Visa Institute of Signal Proessing Tampere University of Tehnology, P.O.Box 553, FIN-330,
More informationOn the density of languages representing finite set partitions
On the density of languages representing finite set partitions Nelma Moreira Rogério Reis Tehnial Report Series: DCC-04-07 Departamento de Ciênia de Computadores Fauldade de Ciênias & Laboratório de Inteligênia
More informationCombined Electric and Magnetic Dipoles for Mesoband Radiation, Part 2
Sensor and Simulation Notes Note 53 3 May 8 Combined Eletri and Magneti Dipoles for Mesoband Radiation, Part Carl E. Baum University of New Mexio Department of Eletrial and Computer Engineering Albuquerque
More informationStructural Reconfiguration of Systems under Behavioral Adaptation
Strutural Reonfiguration of Systems under Behavioral Adaptation Carlos Canal a, Javier Cámara b, Gwen Salaün a Department of Computer Siene, University of Málaga, Spain b Department of Informatis Engineering,
More informationCounting Idempotent Relations
Counting Idempotent Relations Beriht-Nr. 2008-15 Florian Kammüller ISSN 1436-9915 2 Abstrat This artile introdues and motivates idempotent relations. It summarizes haraterizations of idempotents and their
More informationFair Integrated Scheduling of Soft Real-time Tardiness Classes on Multiprocessors
Fair Integrated Sheduling of Soft Real-time Tardiness Classes on Multiproessors UmaMaheswari C. Devi and James H. Anderson Department of Computer Siene, The University of North Carolina, Chapel Hill, NC
More informationVector Field Theory (E&M)
Physis 4 Leture 2 Vetor Field Theory (E&M) Leture 2 Physis 4 Classial Mehanis II Otober 22nd, 2007 We now move from first-order salar field Lagrange densities to the equivalent form for a vetor field.
More informationarxiv:physics/ v1 [physics.class-ph] 8 Aug 2003
arxiv:physis/0308036v1 [physis.lass-ph] 8 Aug 003 On the meaning of Lorentz ovariane Lszl E. Szab Theoretial Physis Researh Group of the Hungarian Aademy of Sienes Department of History and Philosophy
More informationPushdown Specifications
Orna Kupferman Hebrew University Pushdown Speifiations Nir Piterman Weizmann Institute of Siene une 9, 2002 Moshe Y Vardi Rie University Abstrat Traditionally, model heking is applied to finite-state systems
More informationFailure Assessment Diagram Analysis of Creep Crack Initiation in 316H Stainless Steel
Failure Assessment Diagram Analysis of Creep Crak Initiation in 316H Stainless Steel C. M. Davies *, N. P. O Dowd, D. W. Dean, K. M. Nikbin, R. A. Ainsworth Department of Mehanial Engineering, Imperial
More informationGog and GOGAm pentagons
Gog and GOGAm pentagons Philippe Biane, Hayat Cheballah To ite this version: Philippe Biane, Hayat Cheballah. Gog and GOGAm pentagons. Journal of Combinatorial Theory, Series A, Elsevier, 06, .
More informationPhysics 523, General Relativity Homework 4 Due Wednesday, 25 th October 2006
Physis 523, General Relativity Homework 4 Due Wednesday, 25 th Otober 2006 Jaob Lewis Bourjaily Problem Reall that the worldline of a ontinuously aelerated observer in flat spae relative to some inertial
More informationEinstein s Three Mistakes in Special Relativity Revealed. Copyright Joseph A. Rybczyk
Einstein s Three Mistakes in Speial Relativity Revealed Copyright Joseph A. Rybzyk Abstrat When the evidene supported priniples of eletromagneti propagation are properly applied, the derived theory is
More informationJan Van den Bussche. Departement WNI, Limburgs Universitair Centrum (LUC), Universitaire Campus, B-3590 Diepenbeek, Belgium
Theoretial Computer Siene 254 (2001) 363 377 www.elsevier.om/loate/ts Simulation of the nested relational algera y the at relational algera, with an appliation to the omplexity of evaluating powerset algera
More informationONLINE APPENDICES for Cost-Effective Quality Assurance in Crowd Labeling
ONLINE APPENDICES for Cost-Effetive Quality Assurane in Crowd Labeling Jing Wang Shool of Business and Management Hong Kong University of Siene and Tehnology Clear Water Bay Kowloon Hong Kong jwang@usthk
More informationFinal Review. A Puzzle... Special Relativity. Direction of the Force. Moving at the Speed of Light
Final Review A Puzzle... Diretion of the Fore A point harge q is loated a fixed height h above an infinite horizontal onduting plane. Another point harge q is loated a height z (with z > h) above the plane.
More information