An Introduction To Range Searching
|
|
- Phillip Stewart
- 6 years ago
- Views:
Transcription
1 An Introduction To Range Searching Jan Vahrenhold eartment of Comuter Science Westfälische Wilhelms-Universität Münster, Germany. Overview 1. Introduction: Problem Statement, Lower Bounds 2. Range Searching in 1 and 1.5 imensions 3. Range Searching in 2 imensions 4. Summary and Outlook Jan Vahrenhold Range Searching 1
2 Problem Setting Given: Collection S of n oints in d dimensions (S IR d ). Wanted: Algorithm for efficiently reorting all k oints in S falling into a given axis-arallel query range IR d. Alications: Geograhic Information Systems; atabases having relations in which the keys can be totally ordered. Gehalt Mayer Maier Eintrittsdatum Meier 1985 Ma Me Name Jan Vahrenhold Range Searching 2 A First Aroach Assume that S = { 0,..., n 1 } is stored in an array. Scan though the array and test for each i whether i Need to scan the whole array, regardless of how many oints are reorted. Comlexity: Θ (n) time and sace. Jan Vahrenhold Range Searching 3
3 Lower (and Uer) Bounds Change the model to also include k (the number of oints reorted) as a arameter. Algorithm on revious slide has comlexity O (n + k) = O (n). Time comlexity: rerocessing time query time Can disregard rerocessing time for many alications (one-time oeration). Query time comosed of two comonents: Search time: Time to locate the first element to be reorted. Retrieval time: Time to fetch and reort all k elements to be reorted. Sace requirement (lower bound for rerocessing time). Jan Vahrenhold Range Searching 4 Lower Bounds [Bentley & Maurer, 1980] Parameters: n oints, k oints reorted, d dimensions. Sace requirement: Ω (n). Retrieval time: Ω (k). Search time: Using binary decision tree ( sorting lower bound). Lower bound construction: (n =) 2ad oints, each with exactly one unique non-zero integer coordinate taken from [ a, a] \ {0}. = [b 1,..., b d ] [c 1,..., c d ], with b i [ a, 1], c i [1, a], 1 i d. Query ranges not-emty, each roduces a different answer. Overall: a 2d = (n/(2d)) 2d different answers. ( eth of decision tree: Ω log (n/(2d)) 2d) = Ω (d log n). Lower bound not tight for all d. Jan Vahrenhold Range Searching 5
4 Overview 1. Introduction: Problem Statement, Lower Bounds 2. Range Searching in 1 and 1.5 imensions 3. Range Searching in 2 imensions 4. Summary and Outlook Jan Vahrenhold Range Searching 6 One-imensional Range Searching Point set S = { 0,..., n 1 } IR, stored in an array. Query range = [x 1, x 2 ]. Scanning is sub-otimal; lower bound: Ω(1 log 2 n + k). Prerocessing: Sort the oints, e.g., using heasort in O (n log 2 n) time Query: Binary search for smallest i x 1... O (log 2 n)... scan forward until first i < x 2 (or end of array). O (k + 1) Jan Vahrenhold Range Searching 7
5 oes Sorting Hel in Two imensions? There is no total order on oints in two dimensions sorting according to which guarantees Θ (2 log 2 n + k) query time for range searching. Jan Vahrenhold Range Searching 8 Reca: One-imensional Range Searching Key ingredient: binary search (bisection). Relace (sorted) array by binary search tree Time Comlexity: Prerocessing time: O (n log n) Query time: O (log n + k) Sace Comlexity: O (n). Inserts/eletes ossible Jan Vahrenhold Range Searching 9
6 Three-sided (1.5-dim.) Range Searching Given: Point set S = { 0,..., n 1 } IR 2, stored in an array. Wanted: Method to efficiently retrieve all S that, for given (x 1, x 2, y), fall into [x 1, x 2 ] ], y]. Look at two subroblems: Reort all oints in [x 1, x 2 ] IR using, e.g., a threaded binary search tree. Reort all oints in IR ], y] using, e.g., a hea: Almost comlete binary tree. key(v) min{key(lson(v)), key(rson(v))} Jan Vahrenhold Range Searching 10 Combining the best of both worlds(?) Binary search tree with hea roerty: Binary search tree unique w.r.t. inorder -traversal. No (direct) way of incororating hea roerty. Hea with search tree roerty: Hea not unique. More recisely: Children of a node may be switched. Priority Search Tree: Binary tree H storing a two-dimensional oint at each node s.t. the hea roerty w.r.t. the y-coordinates is fulfilled. Additional requirement: v H : x v IR : l x v < r l LSUBTREE(v), r RSUBTREE(v). Jan Vahrenhold Range Searching 11
7 Building a riority search tree Use recursive definition [McCreight, 1985]: Build riority search tree H(S) for a given set S of oints in the lane. Assume w.l.o.g. that all coordinates are airwise distinct. If S =, construct H(S) as an (emty) leaf. Else let min be the oint in S having the minimum y-coordinate. Let x mid be the median of the x-coordinates in S \ { min }. Partition S \ { min }: S left := { S \ { min }.x x mid } S right := { S \ { min }.x > x mid } Construct search tree node v storing x mid and set (v) := min. Recursively comute v s children H(S left ) and H(S right ). Comlexity: O (n) sace; O (n log n) time (why?). Jan Vahrenhold Range Searching 12 Querying a riority search tree Query range [x 1, x 2 ] [, y]: Queries for x 1 and x 2 result in two search aths in H. Check all oints on these aths. All subtrees embraced by these aths contain oints in [x 1, x 2 ] IR. Query these subtrees a follows: x 1 x 2 SearchInSubtree(v, y) if v not a leaf and (v).y y then Reort (v); SearchInSubtree(LSON(v), y); SearchInSubtree(RSON(v), y); Query time: O (1 + k v ). Examle for y = 5. Jan Vahrenhold Range Searching 13
8 Summary Missing Comonents: A more detailed descrition of the query algorithm. Proof of correctness. [de Berg et al., 2000] Theorem 2.1 Priority search trees allow for answering three-sided range queries on oints in IR 2 with time and sace comlexities as follows: Prerocessing time: Θ (n log n) Query time: O (log n + k) Sace requirement: Θ (n) Jan Vahrenhold Range Searching 14 Overview 1. Introduction: Problem Statement, Lower Bounds 2. Range Searching in 1 and 1.5 imensions 3. Range Searching in 2 imensions 4. Summary and Outlook Jan Vahrenhold Range Searching 15
9 Multidimensional Binary Search Tree Extend the concet of binary search by bisection to higher dimensions. Instead of intervals, artition (hyer-)rectangles; do the artitioning alternating arallel to the coordinate axes. R i is artitioned into R j and R k R j R k 1 2 R i. Structure corresonding to artitioning: balanced binary tree (k-tree [Bentley, 1975]). Node v corresonds to hyerrectangle R(v), R(root) = IR d ; children corresond to sub-hyerrectangles. Each node v is augmented to store: S(v): oints contained in R(v) (imlicitly). l(v): reresentation of slit axis. P (v): median of S(v) w.r.t. l(v). Jan Vahrenhold Range Searching 16 Examle Alternating artitioning along the coordinate axes. Jan Vahrenhold Range Searching 17
10 Querying a 2-tree void search(node v, rectangle, list oint & result) double left, median, right; if v.tye == vertical then left =.x1; right =.x2; median = v.p.x; else left =.y1; right =.y2; median = v.p.y; if left median right and.contains(v.p) then result.aend(v.p); if!isleaf(v) then if left < median then search(leftson(v),, result); if median < right then search(rightson(v),, result); return; Jan Vahrenhold Range Searching 18 Comlexity of a 2-tree Sace requirement: R(v) = P (v) R(q) for any descendant q of v. O (1) sace requirement er node, exactly one oint stored at each node O (n) overall sace requirement. Construction time (rerocessing): Linear-time median finding er artitioning ste, i.e., recurrence: T (n) = 2 T ( n/2 ) + O (n) O (n log n) Alternative: Relace median-finding by re-sorting (coies of) the oint by their x- and y-coordinates, resectively. Can find median w.r.t. x-coordinate in O (1) time. Can construct sorted y-arrays to be assed to the children in linear time. Jan Vahrenhold Range Searching 19
11 Analysis of worst-case query time Query time roortional to number of nodes visited. v roductive P (v). Nodes visited: roductive and unroductive nodes. efinition 3.1 Let R(v) be a rectangle and let 0 i 4. and R(v) form a tyei situation i sides of R(v) intersect the interior of. R(v) R(v) R(v) R(v) Tye 0 Tye 1 Tye 2 R(v) Tye 3 Tye 4 Tye-4 situation always roductive, all other situations may be unroductive. Jan Vahrenhold Range Searching 20 Constructing a worst-case situation I Use self-relicating tye-2/tye-3 situations [Lee & Wong, 1977]. A E B C B Y A G H F I C E F G Y H I T (h-2) T(h-2) T (h-3) h Recurrence for worst-case query time: T (h) = }{{} 1 + }{{} 1 + }{{} 1 + T (h 2) + T (h 2) + }{{}}{{}}{{} 1 A B C G F + T (h 3) }{{} H Jan Vahrenhold Range Searching 21
12 Constructing a worst-case situation II A closer look at situation subtree rooted at node. E B Y A G H F I C T (h-2) T (h-2) Y h Recurrence for this situation: T (h) = }{{} 1 + }{{} 1 + }{{} 1 Y + 2 T (h 2) }{{} Children of and Y Jan Vahrenhold Range Searching 22 Constructing a worst-case situation III The following recurrence holds for T (h): Y T (h) = 2 T (h 2) + 3 h with T (0) = 0 and T (1) = 1. T (h-2) T (h-2) Solve recurrence for T (h), w.l.o.g. h = 2 i, i IN. T ( 2 i ) = T ( 2(i 1) ) = ( T ( 2(i 2) )) = i 1 j=0 Similarly: T (2 i + 1) = 4 2 i j = 3 2 i 3 Jan Vahrenhold Range Searching 23
13 Constructing a worst-case situation IV The following recurrence holds for T (h): T (h) = T (h 2) + T (h 2) + T (h 3) + 4 T (h) = 4 2 i 3 for h = 2 i i 3 for h = 2 i with T (0) = T (0) = 0 and T (1) = T (1) = 1. A B C E F G Y H I T (h-2) T(h-2) T (h-3) h Solve recurrence for T (h), w.l.o.g. h = 2 i, i IN. T ( 2 i ) = 4 + T ( 2(i 1) ) i i 2 3 = T ( 2(i 1) ) i 1 2 = 5 (2 h/2 1 ) h Similarly: T (2 i + 1) = 7 (2 h/2 1 ) h + 2. Overall (for n 2 h 1): T (n) O ( 2 n 1/2). Jan Vahrenhold Range Searching 24 Summary Worst-case query time indeendent of the number of oints reorted. k-tree very relevant in ractice! Extension to higher dimensions (oints in IR d ): o artitioning in a round-robin manner of the coordinate axes x 1 x 2... x d x 1... Theorem 3.2 Multidimensional search trees (k-trees) allow for answering foursided range queries on oints in IR d, d 2 with time and sace comlexities as follows: Prerocessing time: Θ (d n log n) Query time: O ( d n 1 1/d + k ) Sace requirement: Θ (n) Jan Vahrenhold Range Searching 25
14 Overview 1. Introduction: Problem Statement, Lower Bounds 2. Range Searching in 1 and 1.5 imensions 3. Range Searching in 2 imensions 4. Summary and Outlook Jan Vahrenhold Range Searching 26 Summary Lower bounds: Ω (d log 2 n + k) time, Ω (n) sace. Results: One dimension: otimal O (log 2 n + k) algorithm, Θ (n) sace. 1.5 dimensions: otimal O (log 2 n + k) algorithm, Θ (n) sace. Two dimensions: sub-otimal O ( n + k ) algorithm, Θ (n) sace. d dimensions: sub-otimal O ( n 1 1/d + k ) algorithm, Θ (n) sace. Outlook: Otimal query time ossible of one is willing to send suerlinear sace [Chazelle, 1990]. Beware: choosing the adequate model of comutation is crucial. Jan Vahrenhold Range Searching 27
15 Bibliograhy [Bentley & Maurer, 1980] J. L. Bentley and H. A. Maurer. Efficient worst-case data structures for range searching. Acta Informatica, 13: , [Bentley, 1975] J. L. Bentley. Multidimensional binary search trees used for associative searching. Communications of the ACM, 18(9): , Setember [Chazelle, 1990] B. M. Chazelle. Lower bounds for orthogonal range searching. I: The reorting case. Journal of the ACM, 37(2): , Aril [de Berg et al., 2000] M. de Berg, M. J. van Kreveld, M. H. Overmars, and O. Schwarzkof. Comutational Geometry: Algorithms and Alications. Sringer, Berlin, second edition, [Lee & Wong, 1977].-T. Lee and C. K. Wong. Worst-case analysis for region and artial region searches in multidimensional binary search trees and balanced quad trees. Acta Informatica, 9:23 29, [McCreight, 1985] E. M. McCreight. Priority search trees. SIAM Journal on Comuting, 14(2): , May 1985.
16. Binary Search Trees
Dictionary imlementation 16. Binary Search Trees [Ottman/Widmayer, Ka..1, Cormen et al, Ka. 1.1-1.] Hashing: imlementation of dictionaries with exected very fast access times. Disadvantages of hashing:
More information16. Binary Search Trees
Dictionary imlementation 16. Binary Search Trees [Ottman/Widmayer, Ka..1, Cormen et al, Ka. 12.1-12.] Hashing: imlementation of dictionaries with exected very fast access times. Disadvantages of hashing:
More informationOn the Chvatál-Complexity of Knapsack Problems
R u t c o r Research R e o r t On the Chvatál-Comlexity of Knasack Problems Gergely Kovács a Béla Vizvári b RRR 5-08, October 008 RUTCOR Rutgers Center for Oerations Research Rutgers University 640 Bartholomew
More informationApproximating min-max k-clustering
Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost
More informationMODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL
Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management
More informationCombinatorics of topmost discs of multi-peg Tower of Hanoi problem
Combinatorics of tomost discs of multi-eg Tower of Hanoi roblem Sandi Klavžar Deartment of Mathematics, PEF, Unversity of Maribor Koroška cesta 160, 000 Maribor, Slovenia Uroš Milutinović Deartment of
More informationGIVEN an input sequence x 0,..., x n 1 and the
1 Running Max/Min Filters using 1 + o(1) Comarisons er Samle Hao Yuan, Member, IEEE, and Mikhail J. Atallah, Fellow, IEEE Abstract A running max (or min) filter asks for the maximum or (minimum) elements
More informationwhere x i is the ith coordinate of x R N. 1. Show that the following upper bound holds for the growth function of H:
Mehryar Mohri Foundations of Machine Learning Courant Institute of Mathematical Sciences Homework assignment 2 October 25, 2017 Due: November 08, 2017 A. Growth function Growth function of stum functions.
More information4. Score normalization technical details We now discuss the technical details of the score normalization method.
SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules
More informationParallelism and Locality in Priority Queues. A. Ranade S. Cheng E. Deprit J. Jones S. Shih. University of California. Berkeley, CA 94720
Parallelism and Locality in Priority Queues A. Ranade S. Cheng E. Derit J. Jones S. Shih Comuter Science Division University of California Berkeley, CA 94720 Abstract We exlore two ways of incororating
More information1 1 c (a) 1 (b) 1 Figure 1: (a) First ath followed by salesman in the stris method. (b) Alternative ath. 4. D = distance travelled closing the loo. Th
18.415/6.854 Advanced Algorithms ovember 7, 1996 Euclidean TSP (art I) Lecturer: Michel X. Goemans MIT These notes are based on scribe notes by Marios Paaefthymiou and Mike Klugerman. 1 Euclidean TSP Consider
More informationModel checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle]
Chater 5 Model checking, verification of CTL One must verify or exel... doubts, and convert them into the certainty of YES or NO. [Thomas Carlyle] 5. The verification setting Page 66 We introduce linear
More informationBest approximation by linear combinations of characteristic functions of half-spaces
Best aroximation by linear combinations of characteristic functions of half-saces Paul C. Kainen Deartment of Mathematics Georgetown University Washington, D.C. 20057-1233, USA Věra Kůrková Institute of
More informationTopic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar
15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider
More informationFinding Shortest Hamiltonian Path is in P. Abstract
Finding Shortest Hamiltonian Path is in P Dhananay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune, India bstract The roblem of finding shortest Hamiltonian ath in a eighted comlete grah belongs
More informationOpposite-quadrant depth in the plane
Oosite-quadrant deth in the lane Hervé Brönnimann Jonathan Lenchner János Pach Comuter and Information Science, Polytechnic University, Brooklyn, NY 1101, hbr@oly.edu IBM T. J. Watson Research Center,
More informationOptimal Approximate Polytope Membership
Otimal Aroximate Polytoe Membershi Sunil Arya Deartment of Comuter Science and Engineering The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong arya@cse.ust.hk Abstract
More informationA randomized sorting algorithm on the BSP model
A randomized sorting algorithm on the BSP model Alexandros V. Gerbessiotis a, Constantinos J. Siniolakis b a CS Deartment, New Jersey Institute of Technology, Newark, NJ 07102, USA b The American College
More informationTheoretically Optimal and Empirically Efficient R-trees with Strong Parallelizability
Theoretically Otimal and Emirically Efficient R-trees with Strong Parallelizability Jianzhong Qi, Yufei Tao, Yanchuan Chang, Rui Zhang School of Comuting and Information Systems, The University of Melbourne
More informationPeriodic scheduling 05/06/
Periodic scheduling T T or eriodic scheduling, the best that we can do is to design an algorithm which will always find a schedule if one exists. A scheduler is defined to be otimal iff it will find a
More informationSAT based Abstraction-Refinement using ILP and Machine Learning Techniques
SAT based Abstraction-Refinement using ILP and Machine Learning Techniques 1 SAT based Abstraction-Refinement using ILP and Machine Learning Techniques Edmund Clarke James Kukula Anubhav Guta Ofer Strichman
More informationComposition of Transformations: A Framework for Systems with Dynamic Topology
Comosition of Transformations: A Framework for Systems with Dynamic Toology Marnes Augusto Hoff, Karina Girardi Roggia, Paulo lauth Menezes Instituto de Informática, Universidade Federal do Rio Grande
More informationCorrespondence Between Fractal-Wavelet. Transforms and Iterated Function Systems. With Grey Level Maps. F. Mendivil and E.R.
1 Corresondence Between Fractal-Wavelet Transforms and Iterated Function Systems With Grey Level Mas F. Mendivil and E.R. Vrscay Deartment of Alied Mathematics Faculty of Mathematics University of Waterloo
More information1/25/2018 LINEAR INDEPENDENCE LINEAR INDEPENDENCE LINEAR INDEPENDENCE LINEAR INDEPENDENCE
/25/28 Definition: An indexed set of vectors {v,, v } in R n is said to be linearly indeendent if the vector equation x v x v... x v 2 2 has only the trivial solution. The set {v,, v } is said to be linearly
More informationPaper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation
Paer C Exact Volume Balance Versus Exact Mass Balance in Comositional Reservoir Simulation Submitted to Comutational Geosciences, December 2005. Exact Volume Balance Versus Exact Mass Balance in Comositional
More informationMulti-Operation Multi-Machine Scheduling
Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job
More informationStatics and dynamics: some elementary concepts
1 Statics and dynamics: some elementary concets Dynamics is the study of the movement through time of variables such as heartbeat, temerature, secies oulation, voltage, roduction, emloyment, rices and
More informationMatching Partition a Linked List and Its Optimization
Matching Partition a Linked List and Its Otimization Yijie Han Deartment of Comuter Science University of Kentucky Lexington, KY 40506 ABSTRACT We show the curve O( n log i + log (i) n + log i) for the
More informationDiscrete-time Geo/Geo/1 Queue with Negative Customers and Working Breakdowns
Discrete-time GeoGeo1 Queue with Negative Customers and Working Breakdowns Tao Li and Liyuan Zhang Abstract This aer considers a discrete-time GeoGeo1 queue with server breakdowns and reairs. If the server
More informationRecursive Estimation of the Preisach Density function for a Smart Actuator
Recursive Estimation of the Preisach Density function for a Smart Actuator Ram V. Iyer Deartment of Mathematics and Statistics, Texas Tech University, Lubbock, TX 7949-142. ABSTRACT The Preisach oerator
More informationOn split sample and randomized confidence intervals for binomial proportions
On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have
More informationPrinciples of Computed Tomography (CT)
Page 298 Princiles of Comuted Tomograhy (CT) The theoretical foundation of CT dates back to Johann Radon, a mathematician from Vienna who derived a method in 1907 for rojecting a 2-D object along arallel
More informationLinear diophantine equations for discrete tomography
Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,
More informationFor q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i
Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:
More informationIntroduction Consider a set of jobs that are created in an on-line fashion and should be assigned to disks. Each job has a weight which is the frequen
Ancient and new algorithms for load balancing in the L norm Adi Avidor Yossi Azar y Jir Sgall z July 7, 997 Abstract We consider the on-line load balancing roblem where there are m identical machines (servers)
More informationRound-off Errors and Computer Arithmetic - (1.2)
Round-off Errors and Comuter Arithmetic - (.). Round-off Errors: Round-off errors is roduced when a calculator or comuter is used to erform real number calculations. That is because the arithmetic erformed
More informationA Parallel Algorithm for Minimization of Finite Automata
A Parallel Algorithm for Minimization of Finite Automata B. Ravikumar X. Xiong Deartment of Comuter Science University of Rhode Island Kingston, RI 02881 E-mail: fravi,xiongg@cs.uri.edu Abstract In this
More informationRANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES
RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES AARON ZWIEBACH Abstract. In this aer we will analyze research that has been recently done in the field of discrete
More informationLilian Markenzon 1, Nair Maria Maia de Abreu 2* and Luciana Lee 3
Pesquisa Oeracional (2013) 33(1): 123-132 2013 Brazilian Oerations Research Society Printed version ISSN 0101-7438 / Online version ISSN 1678-5142 www.scielo.br/oe SOME RESULTS ABOUT THE CONNECTIVITY OF
More informationBrownian Motion and Random Prime Factorization
Brownian Motion and Random Prime Factorization Kendrick Tang June 4, 202 Contents Introduction 2 2 Brownian Motion 2 2. Develoing Brownian Motion.................... 2 2.. Measure Saces and Borel Sigma-Algebras.........
More informationCombining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)
Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment
More informationNumerical Linear Algebra
Numerical Linear Algebra Numerous alications in statistics, articularly in the fitting of linear models. Notation and conventions: Elements of a matrix A are denoted by a ij, where i indexes the rows and
More informationRadial Basis Function Networks: Algorithms
Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.
More informationA Note on Guaranteed Sparse Recovery via l 1 -Minimization
A Note on Guaranteed Sarse Recovery via l -Minimization Simon Foucart, Université Pierre et Marie Curie Abstract It is roved that every s-sarse vector x C N can be recovered from the measurement vector
More informationGOOD MODELS FOR CUBIC SURFACES. 1. Introduction
GOOD MODELS FOR CUBIC SURFACES ANDREAS-STEPHAN ELSENHANS Abstract. This article describes an algorithm for finding a model of a hyersurface with small coefficients. It is shown that the aroach works in
More informationUncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning
TNN-2009-P-1186.R2 1 Uncorrelated Multilinear Princial Comonent Analysis for Unsuervised Multilinear Subsace Learning Haiing Lu, K. N. Plataniotis and A. N. Venetsanooulos The Edward S. Rogers Sr. Deartment
More informationEstimation of the large covariance matrix with two-step monotone missing data
Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo
More informationSums of independent random variables
3 Sums of indeendent random variables This lecture collects a number of estimates for sums of indeendent random variables with values in a Banach sace E. We concentrate on sums of the form N γ nx n, where
More informationUniform Law on the Unit Sphere of a Banach Space
Uniform Law on the Unit Shere of a Banach Sace by Bernard Beauzamy Société de Calcul Mathématique SA Faubourg Saint Honoré 75008 Paris France Setember 008 Abstract We investigate the construction of a
More informationMemoryfull Branching-Time Logic
Memoryfull Branching-Time Logic Orna Kuferman 1 and Moshe Y. Vardi 2 1 Hebrew University, School of Engineering and Comuter Science, Jerusalem 91904, Israel Email: orna@cs.huji.ac.il, URL: htt://www.cs.huji.ac.il/
More informationSome results of convex programming complexity
2012c12 $ Ê Æ Æ 116ò 14Ï Dec., 2012 Oerations Research Transactions Vol.16 No.4 Some results of convex rogramming comlexity LOU Ye 1,2 GAO Yuetian 1 Abstract Recently a number of aers were written that
More informationNew Schedulability Test Conditions for Non-preemptive Scheduling on Multiprocessor Platforms
New Schedulability Test Conditions for Non-reemtive Scheduling on Multirocessor Platforms Technical Reort May 2008 Nan Guan 1, Wang Yi 2, Zonghua Gu 3 and Ge Yu 1 1 Northeastern University, Shenyang, China
More informationFeedback-error control
Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller
More informationThe Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule
The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca
More informationMATH 2710: NOTES FOR ANALYSIS
MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite
More informationA Game Theoretic Investigation of Selection Methods in Two Population Coevolution
A Game Theoretic Investigation of Selection Methods in Two Poulation Coevolution Sevan G. Ficici Division of Engineering and Alied Sciences Harvard University Cambridge, Massachusetts 238 USA sevan@eecs.harvard.edu
More informationOXFORD UNIVERSITY. MATHEMATICS, JOINT SCHOOLS AND COMPUTER SCIENCE WEDNESDAY 4 NOVEMBER 2009 Time allowed: hours
OXFORD UNIVERSITY MATHEMATICS, JOINT SCHOOLS AND COMPUTER SCIENCE WEDNESDAY 4 NOVEMBER 2009 Time allowed: 2 1 2 hours For candidates alying for Mathematics, Mathematics & Statistics, Comuter Science, Mathematics
More informationJohn Weatherwax. Analysis of Parallel Depth First Search Algorithms
Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel
More informationStatic Dictionaries on AC 0 RAMs: Query time ( log n= log log n) is necessary and sufficient
q Static Dictionaries on AC 0 RAMs: Query time ( = log ) is necessary and sufficient Arne Andersson Lund University arne@dna.lth.se Peter Bro Miltersen y University of Toronto bmilter@cs.toronto.edu Søren
More informationA Spectral-Factorization Combinatorial-Search Algorithm Unifying the Systematized Collection of Daubechies Wavelets. Abstract.
A Sectral-Factorization Combinatorial-Search Algorithm Unifying the Systematized Collection of Daubechies Wavelets Carl Taswell UCSD School of Medicine, La Jolla, CA 92093-0603 Comutational Toolsmiths,
More informationRough Sets in Approximate Spatial Reasoning
ough Sets in Aroximate Satial easoning Thomas Bittner and John G. Stell Centre de recherche en geomatique, Laval University, Quebec, Canada. Thomas.Bittner@scg.ulaval.ca Deartment of Comuter Science, Keele
More informationCMSC 425: Lecture 4 Geometry and Geometric Programming
CMSC 425: Lecture 4 Geometry and Geometric Programming Geometry for Game Programming and Grahics: For the next few lectures, we will discuss some of the basic elements of geometry. There are many areas
More informationSystem Reliability Estimation and Confidence Regions from Subsystem and Full System Tests
009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract
More informationA generalization of Amdahl's law and relative conditions of parallelism
A generalization of Amdahl's law and relative conditions of arallelism Author: Gianluca Argentini, New Technologies and Models, Riello Grou, Legnago (VR), Italy. E-mail: gianluca.argentini@riellogrou.com
More informationResearch of PMU Optimal Placement in Power Systems
Proceedings of the 5th WSEAS/IASME Int. Conf. on SYSTEMS THEORY and SCIENTIFIC COMPUTATION, Malta, Setember 15-17, 2005 (38-43) Research of PMU Otimal Placement in Power Systems TIAN-TIAN CAI, QIAN AI
More informationEfficient Approximations for Call Admission Control Performance Evaluations in Multi-Service Networks
Efficient Aroximations for Call Admission Control Performance Evaluations in Multi-Service Networks Emre A. Yavuz, and Victor C. M. Leung Deartment of Electrical and Comuter Engineering The University
More informationPreconditioning techniques for Newton s method for the incompressible Navier Stokes equations
Preconditioning techniques for Newton s method for the incomressible Navier Stokes equations H. C. ELMAN 1, D. LOGHIN 2 and A. J. WATHEN 3 1 Deartment of Comuter Science, University of Maryland, College
More informationCHAPTER 2: SMOOTH MAPS. 1. Introduction In this chapter we introduce smooth maps between manifolds, and some important
CHAPTER 2: SMOOTH MAPS DAVID GLICKENSTEIN 1. Introduction In this chater we introduce smooth mas between manifolds, and some imortant concets. De nition 1. A function f : M! R k is a smooth function if
More informationUnderstanding and Using Availability
Understanding and Using Availability Jorge Luis Romeu, Ph.D. ASQ CQE/CRE, & Senior Member Email: romeu@cortland.edu htt://myrofile.cos.com/romeu ASQ/RD Webinar Series Noviembre 5, J. L. Romeu - Consultant
More informationImprovement on the Decay of Crossing Numbers
Grahs and Combinatorics 2013) 29:365 371 DOI 10.1007/s00373-012-1137-3 ORIGINAL PAPER Imrovement on the Decay of Crossing Numbers Jakub Černý Jan Kynčl Géza Tóth Received: 24 Aril 2007 / Revised: 1 November
More informationRobust hamiltonicity of random directed graphs
Robust hamiltonicity of random directed grahs Asaf Ferber Rajko Nenadov Andreas Noever asaf.ferber@inf.ethz.ch rnenadov@inf.ethz.ch anoever@inf.ethz.ch Ueli Peter ueter@inf.ethz.ch Nemanja Škorić nskoric@inf.ethz.ch
More informationEvaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models
Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu
More informationTheory of Parallel Hardware May 11, 2004 Massachusetts Institute of Technology Charles Leiserson, Michael Bender, Bradley Kuszmaul
Theory of Parallel Hardware May 11, 2004 Massachusetts Institute of Technology 6.896 Charles Leiserson, Michael Bender, Bradley Kuszmaul Final Examination Final Examination ffl Do not oen this exam booklet
More informationMultiplicative group law on the folium of Descartes
Multilicative grou law on the folium of Descartes Steluţa Pricoie and Constantin Udrişte Abstract. The folium of Descartes is still studied and understood today. Not only did it rovide for the roof of
More informationAnalysis of M/M/n/K Queue with Multiple Priorities
Analysis of M/M/n/K Queue with Multile Priorities Coyright, Sanjay K. Bose For a P-riority system, class P of highest riority Indeendent, Poisson arrival rocesses for each class with i as average arrival
More informationStrong Matching of Points with Geometric Shapes
Strong Matching of Points with Geometric Shaes Ahmad Biniaz Anil Maheshwari Michiel Smid School of Comuter Science, Carleton University, Ottawa, Canada December 9, 05 In memory of Ferran Hurtado. Abstract
More informationMatching Transversal Edge Domination in Graphs
Available at htt://vamuedu/aam Al Al Math ISSN: 19-9466 Vol 11, Issue (December 016), 919-99 Alications and Alied Mathematics: An International Journal (AAM) Matching Transversal Edge Domination in Grahs
More informationFig. 21: Architecture of PeerSim [44]
Sulementary Aendix A: Modeling HPP with PeerSim Fig. : Architecture of PeerSim [] In PeerSim, every comonent can be relaced by another comonent imlementing the same interface, and the general simulation
More informationAn Analysis of Reliable Classifiers through ROC Isometrics
An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit
More informationFinite-State Verification or Model Checking. Finite State Verification (FSV) or Model Checking
Finite-State Verification or Model Checking Finite State Verification (FSV) or Model Checking Holds the romise of roviding a cost effective way of verifying imortant roerties about a system Not all faults
More informationSTABILITY ANALYSIS AND CONTROL OF STOCHASTIC DYNAMIC SYSTEMS USING POLYNOMIAL CHAOS. A Dissertation JAMES ROBERT FISHER
STABILITY ANALYSIS AND CONTROL OF STOCHASTIC DYNAMIC SYSTEMS USING POLYNOMIAL CHAOS A Dissertation by JAMES ROBERT FISHER Submitted to the Office of Graduate Studies of Texas A&M University in artial fulfillment
More informationChapter 7 Sampling and Sampling Distributions. Introduction. Selecting a Sample. Introduction. Sampling from a Finite Population
Chater 7 and s Selecting a Samle Point Estimation Introduction to s of Proerties of Point Estimators Other Methods Introduction An element is the entity on which data are collected. A oulation is a collection
More informationNUMERICAL AND THEORETICAL INVESTIGATIONS ON DETONATION- INERT CONFINEMENT INTERACTIONS
NUMERICAL AND THEORETICAL INVESTIGATIONS ON DETONATION- INERT CONFINEMENT INTERACTIONS Tariq D. Aslam and John B. Bdzil Los Alamos National Laboratory Los Alamos, NM 87545 hone: 1-55-667-1367, fax: 1-55-667-6372
More informationUncorrelated Multilinear Discriminant Analysis with Regularization and Aggregation for Tensor Object Recognition
TNN-2007-P-0332.R1 1 Uncorrelated Multilinear Discriminant Analysis with Regularization and Aggregation for Tensor Object Recognition Haiing Lu, K.N. Plataniotis and A.N. Venetsanooulos The Edward S. Rogers
More informationSession 5: Review of Classical Astrodynamics
Session 5: Review of Classical Astrodynamics In revious lectures we described in detail the rocess to find the otimal secific imulse for a articular situation. Among the mission requirements that serve
More informationCalculation of MTTF values with Markov Models for Safety Instrumented Systems
7th WEA International Conference on APPLIE COMPUTE CIENCE, Venice, Italy, November -3, 7 3 Calculation of MTTF values with Markov Models for afety Instrumented ystems BÖCÖK J., UGLJEA E., MACHMU. University
More informationUnderstanding DPMFoam/MPPICFoam
Understanding DPMFoam/MPPICFoam Jeroen Hofman March 18, 2015 In this document I intend to clarify the flow solver and at a later stage, the article-fluid and article-article interaction forces as imlemented
More informationε i (E j )=δj i = 0, if i j, form a basis for V, called the dual basis to (E i ). Therefore, dim V =dim V.
Covectors Definition. Let V be a finite-dimensional vector sace. A covector on V is real-valued linear functional on V, that is, a linear ma ω : V R. The sace of all covectors on V is itself a real vector
More informationNotes on duality in second order and -order cone otimization E. D. Andersen Λ, C. Roos y, and T. Terlaky z Aril 6, 000 Abstract Recently, the so-calle
McMaster University Advanced Otimization Laboratory Title: Notes on duality in second order and -order cone otimization Author: Erling D. Andersen, Cornelis Roos and Tamás Terlaky AdvOl-Reort No. 000/8
More informationA Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition
A Qualitative Event-based Aroach to Multile Fault Diagnosis in Continuous Systems using Structural Model Decomosition Matthew J. Daigle a,,, Anibal Bregon b,, Xenofon Koutsoukos c, Gautam Biswas c, Belarmino
More informationc Copyright by Helen J. Elwood December, 2011
c Coyright by Helen J. Elwood December, 2011 CONSTRUCTING COMPLEX EQUIANGULAR PARSEVAL FRAMES A Dissertation Presented to the Faculty of the Deartment of Mathematics University of Houston In Partial Fulfillment
More informationUnderstanding and Using Availability
Understanding and Using Availability Jorge Luis Romeu, Ph.D. ASQ CQE/CRE, & Senior Member C. Stat Fellow, Royal Statistical Society Past Director, Region II (NY & PA) Director: Juarez Lincoln Marti Int
More informationHermite subdivision on manifolds via parallel transport
Adances in Comutational Mathematics manuscrit No. (will be inserted by the editor Hermite subdiision on manifolds ia arallel transort Caroline Moosmüller Receied: date / Acceted: date Abstract We roose
More informationSynthesis Method for Hierarchical Interface-based Supervisory Control
Synthesis Method for Hierarchical Interface-based Suervisory Control Ryan J. Leduc and Pengcheng Dai Det. of Comuting and Software, McMaster University email: leduc, dai@mcmaster.ca Abstract Hierarchical
More informationA Network-Flow Based Cell Sizing Algorithm
A Networ-Flow Based Cell Sizing Algorithm Huan Ren and Shantanu Dutt Det. of ECE, University of Illinois-Chicago Abstract We roose a networ flow based algorithm for the area-constrained timing-driven discrete
More informationLEIBNIZ SEMINORMS IN PROBABILITY SPACES
LEIBNIZ SEMINORMS IN PROBABILITY SPACES ÁDÁM BESENYEI AND ZOLTÁN LÉKA Abstract. In this aer we study the (strong) Leibniz roerty of centered moments of bounded random variables. We shall answer a question
More informationSTART Selected Topics in Assurance
START Selected Toics in Assurance Related Technologies Table of Contents Introduction Statistical Models for Simle Systems (U/Down) and Interretation Markov Models for Simle Systems (U/Down) and Interretation
More informationGraph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations
Grah-Decomosition-Based Frameworks for Subset-Cover Broadcast Encrytion and Efficient Instantiations Nuttaong Attraadung and Hideki Imai Imai Laboratory, Institute of Industrial Science, University of
More informationMATH 6210: SOLUTIONS TO PROBLEM SET #3
MATH 6210: SOLUTIONS TO PROBLEM SET #3 Rudin, Chater 4, Problem #3. The sace L (T) is searable since the trigonometric olynomials with comlex coefficients whose real and imaginary arts are rational form
More informationStone Duality for Skew Boolean Algebras with Intersections
Stone Duality for Skew Boolean Algebras with Intersections Andrej Bauer Faculty of Mathematics and Physics University of Ljubljana Andrej.Bauer@andrej.com Karin Cvetko-Vah Faculty of Mathematics and Physics
More information