Using Partial Probes to Infer Network States

Size: px
Start display at page:

Download "Using Partial Probes to Infer Network States"

Transcription

1 Using Prtil Proes to Infer Network Sttes Pvn Rngudu, Bijy Adhikri, B. Adity Prksh, Anil Vulliknti Deprtment of Computer Siene, Virgini Teh NDSSL, Bioomplexity Institute, Virgini Teh {ijy, ABSTRACT In mny pplitions, suh s the Internet nd infrstruture networks, nodes fil or get ongested dynmilly. We study the prolem of inferring ll the filed nodes, when only smple of the filures is known, nd there exist orreltions etween node filures/ongestion in networks. We formlize this s the Grph- StteInf prolem, using the the Minimum Desription Length (MDL priniple. We propose greedy lgorithm for minimizing the MDL ost, nd show tht it gives n dditive pproximtion, reltive to the optiml. We evlute our methods on syntheti nd rel dtsets, whih inludes one from WAZE whih gives trffi inident reports for the ity of Boston. We find tht our method gives promising results in reovering the missing filures. 1 INTRODUCTION Most network pplitions ssume the network is stti, nd is known hed of time. This is not true in prtie, nd networks re inferred y indiret mesurements, e.g., s in the se of the Internet router/as level grphs, whih re onstruted using treroutes, e.g., [5], or iologil networks, whih re inferred y experimentl orreltions, e.g., [16]. Further, network elements n fil dynmilly, or their stte my hnge with time. For instne, links in the Internet router network or the trnsporttion network n get ongested or fil. Reonstruting the network topology dynmilly nd inferring network sttes in suh settings re fundmentl prolems. Suh prolems hve een studied s prt of the re of network tomogrphy, espeilly in ommunition networks, e.g., [9, 11, 19]. Suh networks re not pulily essile, nd indiret proes re the only mens of otining informtion; exmples of proes inlude queries of the tivity sttes of seleted nodes nd end-to-end mesurements of delys etween seleted pirs of nodes. These eome very hllenging prolems, nd ll prior work in this diretion in network tomogrphy hs een foused on simple models of independent link filures nd delys, e.g., with exponentilly distriuted proilities [11]. In mny settings, suh s disster events in infrstruture networks, however, filures might e sptilly orrelted, s in [1, 3, 15]. For instne, in the model onsidered in [1], the proility tht node j fils deys with the distne from soure s. This motivtes the prolem GrphStteInf of inferring the network sttes under suh sptil orreltions, whih is the fous of our pper. A losely relted topi is the inferene of the soure of n infetion nd other missing infetions in the se of epidemi spred on networks these re typilly modeled s SI/SIR proesses, where the infetion spreds from one node to its neighors with some proility [12, 13, 17, 18]; see [8, 10] for introdution to epidemi models. An pproh sed on the Minimum Desription Length (MDL priniple [7, 14] ws introdued for missing infetion prolems in [12, 13, 18] for the SI proess. However, there re key differenes in our setting, nd the methods developed for missing node infetion in epidemi proesses do not seem to diretly work for the GrphStteInf prolem. Our ontriutions re summrized elow. (1 We develop novel formultion for the GrphStteInf prolem using the Minimum Desription Length (MDL priniple, whih tkes orrelted filures into ount. We present Greedy, n lgorithm for inferring the missing filed nodes, given smple of the filures. We prove tht the MDL ost of the solution omputed y Greedy is within n dditive pproximtion of the minimum ost MDL solution. Typilly, pprohes using MDL re sed on heuristis nd getting ounds is non trivil s MDL ost funtions re not onvex. To the est of our knowledge, our lgorithm is the first to otin rigorous ounds on the ojetive vlue mong MDL sed pprohes for network inferene. (2 We evlute our results on different kinds of syntheti nd rel dtsets, nmely, one week s worth of trffi sttus nd inident reports from WAZE for the ity of Boston, nd eletri disturne events in the power grid (desried in Setion 4.1. We study the preision, rell nd F1-sore for Greedy, ompred with seline. We oserve tht our lgorithm is quite effetive in inferring unknown/missing filures in the network, nd hs lower MDL ost thn the seline. The rest of the pper is orgnized in the usul wy, with the formultion first, then methods, nd experiments. We then finlly give the relted work nd onlusions. 2 OUR PROBLEM FORMULATION We re given n undireted grph G(V, E representing n infrstruture network. We ssume there is n initil filure t node, referred to s the seed node, whih uses other nodes to fil. Further, suset Q I of the tul filed nodes re ssumed to e known. The ojetive in the GrphStteInf prolem is to infer ll the missing filures. 2.1 Filure Model Next, we will disuss the filure model we use to desrie the filures in the given network G. This model is motivted y the geogrphilly orrelted filure model introdued y Agrwl et l [1], to pture filures in infrstruture networks due to lrge sle dissters. In suh events, there is n initil lolized filure, whih uses other nodes to fil with some proility tht deys with the distne from the soure.

2 ,, Pvn Rngudu, Bijy Adhikri, B. Adity Prksh, Anil Vulliknti Following [1], we ssume there is n initil single seed node s nd ll the filures I in G re used due to the influene of tht seed node. We ssume disrete proility distriution funtion p s : V [0, 1] tht gives the proility of eh node v V eing seed nd onditionl filure proility distriution funtion F : V V [0, 1] tht gives the filure proility of node v V given seed node s. Note tht the p s (v is the proility of v eing the only seed, i.e, v V p s (v = 1. These proility distriutions re preomputed from historilly oserved filures. We ssume tht the onditionl filure proilities given y F re independent i.e., for-ll v 1,v 2 V nd v 1 v 2, 2.2 Proes F(v 1 v 2 s = F(v 1 sf(v 2 s (1 Bsed on our model given ove, we ssume tht some seed filed using multiple orrelted filures ross the network G. The finl set of true filures is represented y I V. Further, we re lso given set of filed nodes represented y Q I, whih we will refer to s proes in rest of this pper. We ssume tht the given set of input proes Q re smpled uniformly t rndom from the true filure set I with proility γ. 2.3 MDL We formulte our prolem using the Minimum Desription Length (MDL priniple [6]. We will use two-prt MDL, or the senderreeiver frmework. Our gol here is to trnsmit the given set of proes Q from sender to reeiver y ssuming tht oth of them know the lyout of the network G. We do this y identifying the model tht est desries the given dt in terms of forml ojetive or ost funtion. This ost funtion onsists of two prts: (1 Model ost tht signifies the omplexity of the seleted model tht explins the filures in the network; nd (2 Dt ost tht represents the ost of oserving the given proe dt Q given the model. More formlly, given set of models M, MDL identifies the est model M s the model tht minimizes L(M + L(D M, in whih L(M is the model-ost (length in its to desrie model M, nd L(D M is the dt-ost (the length in its to desrie the dt using M. Note tht the dt we need to desrie in our sitution is the proes set Q (nd not the true filures set I. Next we desrie the model spe nd the model nd dt ost, whih we will optimize. 2.4 Model Spe nd Cost Model Spe: The most nturl model for our prolem would hve een M = (s, I (the soure s V nd the full filure set I V, s it diretly mimis the genertive proess of the filure model. However, this model hs severl disdvntges. Firstly, note tht this model spe is intuitively frgile : smll hnges in I or the soure s n hve vstly different osts. Hene due to dt sprsity, we expet it would e very hrd to lern the true soure whih generted the filures indeed, in our experiments, we find tht it ws not roustly lerning the true soure. As result, we lso found tht the solutions with minimum MDL ost were finding very few missing filed nodes (i.e. I Q, leding to very low rell. How to design etter model spe for our prolem? We oserve tht this model intuitively tries to explin more thn wht is needed. Note tht while our originl gol ws to mp the missing filures only, this pproh tries to explin the soure s well s the set of filures. Hene we dopt different pproh, where we try to mrginlize over the seeds, nd fous only on the filures. This mkes our model spe more roust s well. This motivtes our proposed model, whih onsists of three omponents, nmely, M = ( Q, I, I. In other words, we send the size of proes Q, the size of true filure set I, nd then identify the set itself. After sending the model, we will then identify the tul proes set Q s the dt. Model ost: The MDL model ost, L( Q, I, I hs three omponents L( Q, I, I = L( Q + L ( I ( Q + L I Q, I. ( We derive these elow. We hve L( Q = log Pr( Q, y using the Shnnon-Fno ode to enode Q. Similrly we hve: L ( I ( Q = log Pr ( I Q ( ( Pr Q I Pr ( I (2 = log Pr ( Q From the smpling ssumption for Q, we n get: Pr ( Q ( I I = γ Q (1 γ I \Q (3 Q Also oserve tht: L ( I Q, I = log ( Pr ( I Q, I = log ( Pr ( I ( Pr (I (4 I = log Pr ( I Comining ll of the ove, the omplete model ost is: L( Q, I, I =L( Q + L ( I Q + L ( I Q, I 2.5 Dt Cost ( ( ( Pr Q I Pr ( I = log Pr ( Q log Pr ( Q ( Pr (I log Pr ( I ( = log Pr ( Q ( ( Pr (I I log Pr ( I log Pr ( I ( ( I = log γ Q I (1 γ \Q Q ( log Pr (I sp(s s V ( I = log Q log(γ ( I Q log(1 γ Q ( ( log p s (s F (v s 1 F (v s s V v I v I (5 Now, we need to desrie the given input proes Q in terms of the model. Given model M = ( Q, I, I, desriing Q is the sme s speifying the djustments tht needs to e pplied to the filure set I in the model to reh Q, whih n e done y desriing the following sets: (1 Unoserved filures i.e., Q + = I \ Q (2 Oservtion errors i.e., Q = Q \ I

3 Using Prtil Proes to Infer Network Sttes,, In this pper, we ssume tht there re no oservtion errors, i.e., Q = (s Q I. Aording to the smpling ssumption we hve, Q is smpled uniformly t rndom from I with proility γ. This implies tht Q + = I \ Q is smpled from I with uniform proility (1 γ. Hene we n ompute the proility of seeing set Q + when smpled from I s follows Pr(Q + I = γ Q (1 γ Q+ Now, using this proility distriution of oserving the set Q + given the filure set I we n ompute the optiml numer of its required to trnsmit Q + enoded in terms of model M s follows (gin using the Shnnon-Fno ode: L(Q + I = log (γ Q (1 γ Q+ (7 = Q log(γ ( I Q log(1 γ 2.6 Our Forml Prolem Putting it ll together, we n stte our forml prolem: Given n undireted grph G(V, E, where node filures tken ple in the network s per the model desried in Setion-2.1, nd set of oserved filures Q V, whih re smpled independently from the true filure set I with uniform proility γ, find the omplete set of filures I V y minimizing the MDL ost funtion L ( Q, I, I, Q given y L ( Q, I, I, Q = L( Q +L ( I Q +L ( I ( Q, I + L Q Q, I, I ( I ( ( = log log p s (s F (v s 1 F (v s Q s V v I v I 2 Q log(γ 2( I Q log(1 γ (8 where p s (s is the seed proility of s nd F(v s is the filure proility of node v given seed node s. 3 PROPOSED METHODS Clerly the serh spe for the prolem is lrge, nd there exists no trivil struture for fst serh. We now desrie two pprohes for finding solutions with low MDL ost. The first, LolSerh, inrementlly dds node tht gives the most redution in MDL ost, till no further improvements our. The seond, Greedy, guesses the size k of the optiml solution, nd greedily piks the k nodes tht would minimize the ost. We show tht the ost of the solution produed y Greedy is within n dditive ftor of the optimum. 3.1 Algorithm LolSerh This is n intuitive lol serh lgorithm whih is populrly used in mny MDL optimztions. We initilize Î to Q, nd just repetedly dd node tht redues the MDL ost. This is desried formlly in Algorithm Algorithm Greedy In this setion we will disuss n effiient lgorithm for finding filure set I whih provides n dditive pproximtion gurntee on the MDL ost of the solution. (6 Algorithm 1 Algorithm LolSerh Input: Instne (V, Q,p, P,γ Output: Solution Î tht minimizes L( Q, Î, Î, Q 1: Î Q 2: while v V \Î : L( Q, Î, Î, Q L( Q, Î +1, Î {v}, Q > 0 do 3: u rg mx L( Q, Î, Î, Q L( Q, Î + 1, I {v}, Q v V \Î 4: Î Î {u} 5: end while 6: Return Î First, let A = log ( I Q 2 Q log(γ. We rewrite the MDL ost funtion in the following mnner: L ( Q, I, I, Q ( ( =A log p s (s F(v s 1 F(v s v I v I 2( I Q log(1 γ ( ( =A log p s (s 1 F(v s v V F(v s 2( I Q log (1 γ (1 F(v s v I ( ( =A log p s (s 1 F(v s (1 γ 2 Q v V F(v s(1 γ 2 I (1 F(v s v I ( =A log д(s f (s,v, v I (9 where д(s = (1 γ 2 Q p s (s ( v V 1 F(v s nd f (s,v = F (v s(1 γ 2 1 F (v s. Therefore, the prolem redues to finding set Î suh tht { ( I Î = rg min log I Q ( log д(s + 2 Q λ 1 v I } f (s, v. (10 The min ide of this lgorithm is to use the quntity f (s,v = F (v s(1 γ 2 1 F (v s defined ove s the weight for eh pir (s,v. For eh seed node s V, we guess the size of the solution I s, if the soure were to e s, nd pik the set of I s nodes whih minimizes the MDL ost. This is desried formlly in Algorithm 2, nd nlyzed in formlly Theorem 3.1. Theorem 3.1. Let I e the set minimizing the MDL ost, nd let I denote the solution omputed y Algorithm Greedy. Then, L( Q, I, I, Q L( Q, I, I, Q + log(n, where n is the numer of seed nodes. Proof. the definitions of д(s, f (s, v nd A ove. Then, ( L( Q, k, I, Q = log ϕ(s, I + A,

4 ,, Pvn Rngudu, Bijy Adhikri, B. Adity Prksh, Anil Vulliknti Algorithm 2 Algorithm Greedy Input: Instne (V, Q,p, P,γ Output: Solution Î tht minimizes L( Q, Î, Î, Q 1: for eh s V do 2: for eh k [ Q, V ] do 3: I s (k Top k Q nodes in V \ Q with highest weight f (s,v 4: I s (k I s (k Q 5: end for 6: end for 7: S {I s (k : s V &k [ Q, V ]} 8: Î rg min L( Q, I, I, Q I S 9: Return Î where ϕ(s, I = д(s v I f (s,v. Note tht ϕ(s, I is mximized for the set I s (k defined in Algorithm Greedy, sine this onsists of the set of top k Q nodes in V \ Q, with respet to the quntity f (s,v, long with ll nodes in Q. Therefore, we hve ϕ(s, I s (k ϕ(s, I Adding over ll possile seed nodes, we hve ϕ(s, I s ( I ϕ(s, I whih implies for some seed ŝ, we hve ϕ(ŝ, Iŝ (k 1 ϕ(s, I n ( ( 1 log ϕ(ŝ, Iŝ (k log ϕ(s, I n ( = log ϕ(s, I + log(n This, in turn, implies ( L( Q, k, Iŝ (k, Q = log ϕ(s, Iŝ (k + A ( log ϕ(ŝ, Iŝ (k + A ( log ϕ(s, I + log(n + A L( Q, k, I, Q + log(n, where the first inequlity follows euse ϕ(s, I 0 s, I, so tht ϕ(s, Iŝ (k ϕ(ŝ, Iŝ (k. Sine, the Algorithm 2 serhes over ll possile solution sizes k, the theorem follows. Lemm 3.2. Algorithm Greedy runs in O( V 3 time. Proof. The quntities д(s nd f (s,v defined erlier in (9 n e omputed for ll s,v in O( V 3 time. The lgorithm involves two for loops. The inner loop in lines 2-5 runs in O( V time, sine it finds solution I s (k for eh k. The set S hs size O( V 2. Step 8 of the lgorithm involves omputing L( Q, I s (k, I s (k, Q for eh set I s (k. Done nively, it tkes O( V 2 time to ompute this. However, y keeping the intermedite solutions, we n ompute L( Q, I s (k, I s (k, Q for given s nd for ll k inrementlly in O( V 2 time, leding to the time ound in the lemm. 4 EXPERIMENTS We evlute performne of our lgorithms on vrious syntheti nd rel networks, whih re disussed next. 4.1 Dtsets Syntheti Grid Dtset. We reted simple grid where eh ell is onsidered s node in rod network, leding to 3600 nodes. We ssumed n uniform seed proility distriution ross ll nodes. We omputed onditionl filure proilities (PlinCF etween pir of nodes (s, v sed on Geogrphilly Correlted Filure (GCF Model [1] i.e., if s is the seed node then F(v s = 1 d(s,v (11 where d(s,v is distne funtion d : V V [0, 1]. In our se, d(, is the Mnhttn distne etween the nodes normlized y the mximum distne. We will refer to this set of onditionl filure proilities s GCF. Rel Dtsets. We reted three dtsets from rel world node filure logs in trnsporttion nd power-grid networks. We use filure logs in rod networks from WAZE lerts dt, whih is pulily ville on the City of Boston s wesite 1. These lerts hve een reported y users vi the rowd soured pplition WAZE etween Mondy 23 rd Ferury, 2015 nd Sundy 1 st Mrh, The lerts in the dtset re sptilly distriuted ross Boston, Cmridge, nd Brook-line regions of Msshusetts. The lerts inlude different types filures suh s trffi jm, extreme wether, idents, nd rod losures. Additionlly, the ltitude nd longitude of the ffeted lotions, nd strt nd end time of the lert is lso given. From these lerts, we reted two dtsets sed on trffi jm (JAM nd extreme wether (WEATHER. Similrly, we use list of Eletri disturne events from Energy.gov 2 this list inludes reported events of eletri emergenies nd disturne in power supply from 2002 to Eh event log ontins informtion regrding dte nd time of the eginning nd restortion of the event, geogrphil res ffeted y the event, numer of ustomer ffeted, nd so on. We reted POWER-GRID dtset from the log of eletri emergenies nd disturnes. Dtset retion. As disussed in Setion 2.1, we need to define the seed proility nd pir-wise onditionl filure proility distriutions over ll nodes in the network. This is done in the following mnner. For WAZE lert dt, we hve prtitioned the omplete geogrphil region oupied y these filures y using grid s shown in Figure 1, where eh ell is squre nd ts s node in our virtul rod network. For the POWER-GRID dt, eh lotion referred in the dtset ts s node. Seed Proility. Let n v denote the ell/nodev, s disussed ove, nd let N = v n v denote the totl numer of filures ross ll nodes. We define the seed proilities s p s (v = n v (12 N Conditionl Filure Proilities. We onstrut Binry Filure Stte Time Series (BinTS for spn of 7 dys, y using the temporl informtion tht is ville from WAZE lerts dt. This time series

5 Using Prtil Proes to Infer Network Sttes,, filure likelihood nd onditionl filure proilities re desried in Setions 4.1 nd Figure 1: Prtitions of Boston region oupied y WAZE lerts using grid gives inry (0 or 1 vlue for eh time step whih represents the filure stte of the respetive node i.e., BinT Sv (t = 1 implies tht there is t-lest one filure in v t time t. Using BinTS we were le to ompute the pir-wise onditionl filure proilities for our dtsets in the following mnner. For two nodes v 1 nd v 2, we define the Plin Conditionl Filure Proility (PlinCF of v 1 given v 2 s the rtio etween numer of time steps in whih oth v 1 nd v 2 re filed (i.e. with vlue 1 in BinTS to the numer of time steps in whih only v 2 is filed. Pl inc F (v 1 v 2 = {t t, BinT Sv1 (t = 1&BinT Sv2 (t = 1} (13 {t t, BinT Sv2 (t = 1} We study two more syntheti onditionl filure proilities, nmed URndCF nd NRndCF, for eh dtset; these re defined in the following mnner: URndCF is n ritrry smple from uniform distriution nd NRndCF is n ritrry smple from norml distriution ( N (5, 1 over the vlues [0, 1]. We follow the sme proedure to generte onditionl proility filures for the POWER-GRID dtset. Dtset desriptions. We onstrut three different dtsets following the ove steps. JAM: This is dtset tht we reted from WAZE lerts dt using dt of filure type JAM. The resultnt dtset onsists of rod network with 2650 nodes long with seed proility distriution nd onditionl filure proilities omputed s disussed in Setions 4.1 nd 4.1. Figure 2 presents sptil nd frequeny distriutions of the seed nd onditionl filure proilities of this dtset. WEATHER: Similr to the JAM dtset this dtset is reted y using WEATHERHAZARD filure dt from WAZE lerts dt. The resultnt dtset onsists of rod network with 1520 nodes long with seed proility distriution nd onditionl filure proilities omputed s disussed in Setions 4.1 nd 4.1. POWER-GRID: As mentioned erlier, we reted this dtset from the log of eletril emergenies nd disturnes. We filtered out the events in the log whih were not relted to loss of eletri servie. For this dtset, whih onsists of 24 nodes, we omputed Performne evlution In this setion we disuss the performne of our lgorithms ginst vrious dtsets tht re desried in Setion 4.1 ross vrious vlues of γ [, ]. We exmine the preision, rell nd F1-sore for Greedy, ompred with LolSerh. We oserve tht our MDL sed pproh does indeed llow us to infer unknown/missing filures in the network using the proes. The speifi MDL formultion we onsider in Setion 2.6, whih inludes I in the model seems to perform muh etter thn other nturl MDL formultions. Comprison of Greedy with LolSerh. Figure 3 presents omprison of the trends in performne of oth lgorithms on the JAM dtset with PlinCF proilities ross γ [, ] nd MDL ost of their respetive solutions. For oth lgorithms, the performne vries with the smpling rte, γ. We find tht the solution omputed y Greedy hs lower MDL ost, ompred to the seline. One interesting oservtion from Figure 3 is tht the rell for Greedy deys with γ till nd then inreses. Greedy hs higher F1-sore ompred to LolSerh, for most vlues of γ. In the rest of our evlution, we only onsider Greedy. Performne of Greedy for different dtsets. Figures 4, 5, 6 nd 7 present the performne of Algorithm Greedy for ll the dtsets from Setion 4.1, nd for the three different wys of defining onditionl proilities. Aross ll these results, on verge we re le to find 80% of the filed nodes with n verge preision of 79% ross vrious vlues of γ [, ]. In other words, we re suessful in inferring resonle frtion of unknown/missing filures in the network from prtil set of oservtions with resonle preision. 5 RELATED WORK Some of the different res relted to our work inlude network nd stte inferene in ommunition networks, reonstruting networks from sdes nd inferring missing infetions in the se of epidemis. We riefly disuss these elow. The re of network tomogrphy involves inferring link sttes, suh s delys nd filures, in the Internet nd other ommunition networks; see, e.g., [2, 4, 9, 11, 19]. Proes suh s end-to-end delys re the only mesurements tht re ville in suh networks. At n strt level, the prolem here involves solving for the link dely vetor x, given the mesured delys ross the proes. This eomes very hllenging prolem nd it is typilly ssumed tht link hrteristis suh s delys re modeled s independent rndom vriles with known distriutions, ut potentilly unknown prmeters. Xi et l. [19] solve this ssuming link delys re exponentilly distriuted. Ni et l. [11] study different kinds of proing models, inluding multist proes whih n give estimtes on tree, nd develop methods for inferring the topology in dynmi networks. There hs lso een work on designing proes to infer prt of the network struture, s in [2]. Another relted topi is the inferene of the soure of n infetion nd other missing infetions, in the se of epidemi spred on networks. Epidemis re modeled s stohsti proesses, e.g.,

6 Pvn Rngudu, Bijy Adhikri, B. Adity Prksh, Anil Vulliknti,, : Sptil distriution of seed proilities. : Sptil distriution of PlinCF for rndom seed node. (L(I, Q/L(I*, Q / / / / / / Figure 2: JAM dtset reted from WAZE lerts dt of Boston, Cmridge, Brook-line regions Quik Lol Greedy / / / / / / / / / Figure 3: Performne of the LolSerh ( nd Greedy ( on the JAM dtset with PlinCF proilities. The MDL osts of the solutions is shown in (. Figure 4: Performne of Greedy on the Syntheti Grid Dtset with GCF (, URndCF (, nd NRndCF ( onditionl proilities. SI/SIR, in whih the infetion spreds from n infeted node to its suseptile neighors. Usully, only prtil informtion out the infetions is known, nd some of the prolems tht hve een studied inlude identifying the soure of n infetion nd finding other missing nodes [12, 13, 17, 18]. The Minimum Desription Length (MDL priniple [7, 14] hs een suessfully used in [12, 13, 18] for these prolems, wheres [17] develop n MLE method. A different lss of filure models from the SI/SIR type of epidemis hs een studied extensively, motivted y settings suh s disster events, e.g., [1, 3, 15]. These studies ssume n initil filure, nd susequent filures whose proility is orrelted with the soure. For instne, in [1], the proility p(j i tht node j fils, given tht i is the soure is funtion of the distne from i to j, with the proilities deying with the distne. Our work is motivted y these models.

7 Using Prtil Proes to Infer Network Sttes,, / / / / / / / / / Figure 5: Performne of Greedy on the JAM Dtset with PlinCF (, URndCF (, nd NRndCF ( onditionl proilities. / / / / / / / / / Figure 6: Performne of Greedy on the WEATHER Dtset with PlinCF (, URndCF (, nd NRndCF ( onditionl proilities. / / / / / / / / / Figure 7: Performne of Greedy on the Power Grid Dtset with PlinCF (, URndCF (, nd NRndCF ( onditionl proilities. 6 CONCLUSIONS Our results show tht n MDL sed pproh is quite useful in the prolem of inferring missing filures in settings with orrelted filures. This motivtes its use in other inferene prolems with prtil informtion. We hve onsidered the simplest notion of proe here informtion out speifi nodes whih hve filed. Extending our work to other kinds of proes (like onnetivity queries is n interesting nd nturl prolem. Inferring the stte of the network using suh proes, nd supporting dditionl queries re interesting prolems. Further we hve ssumed there re no oservtionl errors designing roust lgorithms in fe of errors is lso interesting future work. Aknowledgements This pper is sed on work prtilly supported y the NSF (IIS , the NEH (HG , ORNL (Order nd from the Mrylnd Prourement Offie (H C-0127, Feook fulty gift, DTRA CNIMS Contrt HDTRA1-11-D , NSF BIG DATA Grnt IIS nd NSF DIBBS Grnt ACI REFERENCES [1] Pnkj K. Agrwl, Alon Efrt, Shshidhr K. Gnjugunte, Dvid Hy, Swminthn Snkrrmn, nd Gil Zussmn The Resiliene of WDM Networks to Proilisti Geogrphil Filures. IEEE/ACM Trns. Netw. 21, 5 (Ot. 2013, DOI: [2] Animshree Anndkumr, Avintn Hssidim, nd Jonthn Kelner Topology Disovery of Sprse Rndom Grphs with Few Prtiipnts. SIGMETRICS Perform. Evl. Rev. 39, 1 (June 2011, DOI:

8 ,, Pvn Rngudu, Bijy Adhikri, B. Adity Prksh, Anil Vulliknti [3] Yehiel Berezin, Amir Bshn, Mihel M. Dnziger, Dqing Li, nd Shlomo Hvlin Lolized ttks on sptilly emedded networks with dependenies. Sientifi Reports (2015. [4] N. G. Duffield, J. Horowitz, F. L. Presti, nd D. Towsley Multist topology inferene from mesured end-to-end loss. IEEE Trns. Inf. Theory (2002. [5] M. Floutsos, P. Floutsos, nd C. Floutsos On power-lw reltionships of the internet topology. In SIGCOMM, Vol [6] Peter Grnwld A Tutoril Introdution to the Minimum Desription Length Priniple. In Advnes in Minimum Desription Length: Theory nd Applitions. MIT Press. [7] Peter Grünwld A tutoril introdution to the minimum desription length priniple. In Advnes in Minimum Desription Length: Theory nd Applitions. MIT Press. [8] Herert W. Hethote The Mthemtis of Infetious Diseses. SIAM Rev. 42, 4 (2000, DOI: leenheer/hethote.pdf. [9] X. Jin, W. Yiu, S. Chn, nd Y. Wng Network Topology Inferene Bsed on End-to-End Mesurements. IEEE Journl on Seleted res in Communitions (2006. [10] M. Mrthe nd A. Vulliknti Computtionl Epidemiology. Commun. ACM 56, 7 (2013, [11] J. Ni, H. Xie, S. Ttikond, nd Y. Yng Effiient nd Dynmi Routing Topology Inferene From End-to-End Mesurements. IEEE/ACM Trnstions on Networking (2010. [12] B. Adity Prksh, Jilles Vreeken, nd Christos Floutsos Spotting Culprits in Epidemis: How mny nd Whih ones?. In ICDM. [13] B. Adity Prksh, Jilles Vreeken, nd Christos Floutsos Effiiently Spotting the Strting Points of n Epidemi in Lrge Grph. Knowledge nd Informtion Systems Journl (2013. [14] J. Rissnen Minimum Desription Length Priniple. In Enylopedi of Sttistil Sienes, S. Kotz nd N. L. Johnson (Eds.. Vol. V. John Wiley nd Sons, New York, [15] Hiroshi Sito Anlysis of Geometri Disster Evlution Model for Physil Networks. IEEE/ACM Trnstions on Networking (2015. [16] Dvid J Shw, Roijn F Bruinsm, Jk L Feldmn, nd Alex J Levine Rhythmogeni neuronl networks, emergent leders, nd k-ores. Physil Review E 82, 5 (2010, [17] Devvrt Shh nd Tuhid Zmn Deteting soures of omputer viruses in networks: theory nd experiment. In Proeedings of the ACM Interntionl Conferene on Performne Evlution (SIGMETRICS [18] Shshidhr Sundreisn, Jilles Vreeken, nd B. Adity Prksh Hidden Hzrds: Finding Missing Nodes in Lrge Grph Epidemis. In Pro. of SIAM Interntionl Conferene on Dt Mining (SDM. [19] Ye Xi nd Dvid Tse Inferene of Link Dely in Communition Networks. IEEE Journl on Seleted res in Communitions (2006.

Lecture Notes No. 10

Lecture Notes No. 10 2.6 System Identifition, Estimtion, nd Lerning Leture otes o. Mrh 3, 26 6 Model Struture of Liner ime Invrint Systems 6. Model Struture In representing dynmil system, the first step is to find n pproprite

More information

ANALYSIS AND MODELLING OF RAINFALL EVENTS

ANALYSIS AND MODELLING OF RAINFALL EVENTS Proeedings of the 14 th Interntionl Conferene on Environmentl Siene nd Tehnology Athens, Greee, 3-5 Septemer 215 ANALYSIS AND MODELLING OF RAINFALL EVENTS IOANNIDIS K., KARAGRIGORIOU A. nd LEKKAS D.F.

More information

Project 6: Minigoals Towards Simplifying and Rewriting Expressions

Project 6: Minigoals Towards Simplifying and Rewriting Expressions MAT 51 Wldis Projet 6: Minigols Towrds Simplifying nd Rewriting Expressions The distriutive property nd like terms You hve proly lerned in previous lsses out dding like terms ut one prolem with the wy

More information

Learning Partially Observable Markov Models from First Passage Times

Learning Partially Observable Markov Models from First Passage Times Lerning Prtilly Oservle Mrkov s from First Pssge s Jérôme Cllut nd Pierre Dupont Europen Conferene on Mhine Lerning (ECML) 8 Septemer 7 Outline. FPT in models nd sequenes. Prtilly Oservle Mrkov s (POMMs).

More information

Review Topic 14: Relationships between two numerical variables

Review Topic 14: Relationships between two numerical variables Review Topi 14: Reltionships etween two numeril vriles Multiple hoie 1. Whih of the following stterplots est demonstrtes line of est fit? A B C D E 2. The regression line eqution for the following grph

More information

Chapter 4 State-Space Planning

Chapter 4 State-Space Planning Leture slides for Automted Plnning: Theory nd Prtie Chpter 4 Stte-Spe Plnning Dn S. Nu CMSC 722, AI Plnning University of Mrylnd, Spring 2008 1 Motivtion Nerly ll plnning proedures re serh proedures Different

More information

A Lower Bound for the Length of a Partial Transversal in a Latin Square, Revised Version

A Lower Bound for the Length of a Partial Transversal in a Latin Square, Revised Version A Lower Bound for the Length of Prtil Trnsversl in Ltin Squre, Revised Version Pooy Htmi nd Peter W. Shor Deprtment of Mthemtil Sienes, Shrif University of Tehnology, P.O.Bo 11365-9415, Tehrn, Irn Deprtment

More information

Lecture 6: Coding theory

Lecture 6: Coding theory Leture 6: Coing theory Biology 429 Crl Bergstrom Ferury 4, 2008 Soures: This leture loosely follows Cover n Thoms Chpter 5 n Yeung Chpter 3. As usul, some of the text n equtions re tken iretly from those

More information

Modeling of Catastrophic Failures in Power Systems

Modeling of Catastrophic Failures in Power Systems Modeling of tstrophi Filures in Power Systems hnn Singh nd lex Sprintson Deprtment of Eletril nd omputer Engineering Texs &M hnn Singh nd lex Sprintson Modeling of tstrophi Filures Motivtion Reent events

More information

1 PYTHAGORAS THEOREM 1. Given a right angled triangle, the square of the hypotenuse is equal to the sum of the squares of the other two sides.

1 PYTHAGORAS THEOREM 1. Given a right angled triangle, the square of the hypotenuse is equal to the sum of the squares of the other two sides. 1 PYTHAGORAS THEOREM 1 1 Pythgors Theorem In this setion we will present geometri proof of the fmous theorem of Pythgors. Given right ngled tringle, the squre of the hypotenuse is equl to the sum of the

More information

Near-Optimal Mapping of Network States using Probes

Near-Optimal Mapping of Network States using Probes Near-Optimal Mapping of Network States using Probes Bijaya Adhikari Pavan Rangudu B. Aditya Prakash Anil Vullikanti Abstract In many applications, such as the Internet and infrastructure networks, nodes

More information

Generalization of 2-Corner Frequency Source Models Used in SMSIM

Generalization of 2-Corner Frequency Source Models Used in SMSIM Generliztion o 2-Corner Frequeny Soure Models Used in SMSIM Dvid M. Boore 26 Mrh 213, orreted Figure 1 nd 2 legends on 5 April 213, dditionl smll orretions on 29 My 213 Mny o the soure spetr models ville

More information

6.5 Improper integrals

6.5 Improper integrals Eerpt from "Clulus" 3 AoPS In. www.rtofprolemsolving.om 6.5. IMPROPER INTEGRALS 6.5 Improper integrls As we ve seen, we use the definite integrl R f to ompute the re of the region under the grph of y =

More information

Exercise 3 Logic Control

Exercise 3 Logic Control Exerise 3 Logi Control OBJECTIVE The ojetive of this exerise is giving n introdution to pplition of Logi Control System (LCS). Tody, LCS is implemented through Progrmmle Logi Controller (PLC) whih is lled

More information

Outline. Theory-based Bayesian framework for property induction Causal structure induction

Outline. Theory-based Bayesian framework for property induction Causal structure induction Outline Theory-sed Byesin frmework for property indution Cusl struture indution Constrint-sed (ottom-up) lerning Theory-sed Byesin lerning The origins of usl knowledge Question: how do people relily ome

More information

1B40 Practical Skills

1B40 Practical Skills B40 Prcticl Skills Comining uncertinties from severl quntities error propgtion We usully encounter situtions where the result of n experiment is given in terms of two (or more) quntities. We then need

More information

Bayesian Networks: Approximate Inference

Bayesian Networks: Approximate Inference pproches to inference yesin Networks: pproximte Inference xct inference Vrillimintion Join tree lgorithm pproximte inference Simplify the structure of the network to mkxct inferencfficient (vritionl methods,

More information

Spacetime and the Quantum World Questions Fall 2010

Spacetime and the Quantum World Questions Fall 2010 Spetime nd the Quntum World Questions Fll 2010 1. Cliker Questions from Clss: (1) In toss of two die, wht is the proility tht the sum of the outomes is 6? () P (x 1 + x 2 = 6) = 1 36 - out 3% () P (x 1

More information

Discrete Structures Lecture 11

Discrete Structures Lecture 11 Introdution Good morning. In this setion we study funtions. A funtion is mpping from one set to nother set or, perhps, from one set to itself. We study the properties of funtions. A mpping my not e funtion.

More information

Alpha Algorithm: Limitations

Alpha Algorithm: Limitations Proess Mining: Dt Siene in Ation Alph Algorithm: Limittions prof.dr.ir. Wil vn der Alst www.proessmining.org Let L e n event log over T. α(l) is defined s follows. 1. T L = { t T σ L t σ}, 2. T I = { t

More information

CS 573 Automata Theory and Formal Languages

CS 573 Automata Theory and Formal Languages Non-determinism Automt Theory nd Forml Lnguges Professor Leslie Lnder Leture # 3 Septemer 6, 2 To hieve our gol, we need the onept of Non-deterministi Finite Automton with -moves (NFA) An NFA is tuple

More information

Discrete Mathematics and Probability Theory Spring 2013 Anant Sahai Lecture 17

Discrete Mathematics and Probability Theory Spring 2013 Anant Sahai Lecture 17 EECS 70 Discrete Mthemtics nd Proility Theory Spring 2013 Annt Shi Lecture 17 I.I.D. Rndom Vriles Estimting the is of coin Question: We wnt to estimte the proportion p of Democrts in the US popultion,

More information

Math 32B Discussion Session Week 8 Notes February 28 and March 2, f(b) f(a) = f (t)dt (1)

Math 32B Discussion Session Week 8 Notes February 28 and March 2, f(b) f(a) = f (t)dt (1) Green s Theorem Mth 3B isussion Session Week 8 Notes Februry 8 nd Mrh, 7 Very shortly fter you lerned how to integrte single-vrible funtions, you lerned the Fundmentl Theorem of lulus the wy most integrtion

More information

NON-DETERMINISTIC FSA

NON-DETERMINISTIC FSA Tw o types of non-determinism: NON-DETERMINISTIC FS () Multiple strt-sttes; strt-sttes S Q. The lnguge L(M) ={x:x tkes M from some strt-stte to some finl-stte nd ll of x is proessed}. The string x = is

More information

Activities. 4.1 Pythagoras' Theorem 4.2 Spirals 4.3 Clinometers 4.4 Radar 4.5 Posting Parcels 4.6 Interlocking Pipes 4.7 Sine Rule Notes and Solutions

Activities. 4.1 Pythagoras' Theorem 4.2 Spirals 4.3 Clinometers 4.4 Radar 4.5 Posting Parcels 4.6 Interlocking Pipes 4.7 Sine Rule Notes and Solutions MEP: Demonstrtion Projet UNIT 4: Trigonometry UNIT 4 Trigonometry tivities tivities 4. Pythgors' Theorem 4.2 Spirls 4.3 linometers 4.4 Rdr 4.5 Posting Prels 4.6 Interloking Pipes 4.7 Sine Rule Notes nd

More information

THE PYTHAGOREAN THEOREM

THE PYTHAGOREAN THEOREM THE PYTHAGOREAN THEOREM The Pythgoren Theorem is one of the most well-known nd widely used theorems in mthemtis. We will first look t n informl investigtion of the Pythgoren Theorem, nd then pply this

More information

PAIR OF LINEAR EQUATIONS IN TWO VARIABLES

PAIR OF LINEAR EQUATIONS IN TWO VARIABLES PAIR OF LINEAR EQUATIONS IN TWO VARIABLES. Two liner equtions in the sme two vriles re lled pir of liner equtions in two vriles. The most generl form of pir of liner equtions is x + y + 0 x + y + 0 where,,,,,,

More information

A Non-parametric Approach in Testing Higher Order Interactions

A Non-parametric Approach in Testing Higher Order Interactions A Non-prmetri Approh in Testing igher Order Intertions G. Bkeerthn Deprtment of Mthemtis, Fulty of Siene Estern University, Chenkldy, Sri Lnk nd S. Smit Deprtment of Crop Siene, Fulty of Agriulture University

More information

Lesson 2: The Pythagorean Theorem and Similar Triangles. A Brief Review of the Pythagorean Theorem.

Lesson 2: The Pythagorean Theorem and Similar Triangles. A Brief Review of the Pythagorean Theorem. 27 Lesson 2: The Pythgoren Theorem nd Similr Tringles A Brief Review of the Pythgoren Theorem. Rell tht n ngle whih mesures 90º is lled right ngle. If one of the ngles of tringle is right ngle, then we

More information

Comparing the Pre-image and Image of a Dilation

Comparing the Pre-image and Image of a Dilation hpter Summry Key Terms Postultes nd Theorems similr tringles (.1) inluded ngle (.2) inluded side (.2) geometri men (.) indiret mesurement (.6) ngle-ngle Similrity Theorem (.2) Side-Side-Side Similrity

More information

Nondeterministic Automata vs Deterministic Automata

Nondeterministic Automata vs Deterministic Automata Nondeterministi Automt vs Deterministi Automt We lerned tht NFA is onvenient model for showing the reltionships mong regulr grmmrs, FA, nd regulr expressions, nd designing them. However, we know tht n

More information

Symmetrical Components 1

Symmetrical Components 1 Symmetril Components. Introdution These notes should e red together with Setion. of your text. When performing stedy-stte nlysis of high voltge trnsmission systems, we mke use of the per-phse equivlent

More information

Maintaining Mathematical Proficiency

Maintaining Mathematical Proficiency Nme Dte hpter 9 Mintining Mthemtil Profiieny Simplify the epression. 1. 500. 189 3. 5 4. 4 3 5. 11 5 6. 8 Solve the proportion. 9 3 14 7. = 8. = 9. 1 7 5 4 = 4 10. 0 6 = 11. 7 4 10 = 1. 5 9 15 3 = 5 +

More information

12.4 Similarity in Right Triangles

12.4 Similarity in Right Triangles Nme lss Dte 12.4 Similrit in Right Tringles Essentil Question: How does the ltitude to the hpotenuse of right tringle help ou use similr right tringles to solve prolems? Eplore Identifing Similrit in Right

More information

Discrete Mathematics and Probability Theory Summer 2014 James Cook Note 17

Discrete Mathematics and Probability Theory Summer 2014 James Cook Note 17 CS 70 Discrete Mthemtics nd Proility Theory Summer 2014 Jmes Cook Note 17 I.I.D. Rndom Vriles Estimting the is of coin Question: We wnt to estimte the proportion p of Democrts in the US popultion, y tking

More information

April 8, 2017 Math 9. Geometry. Solving vector problems. Problem. Prove that if vectors and satisfy, then.

April 8, 2017 Math 9. Geometry. Solving vector problems. Problem. Prove that if vectors and satisfy, then. pril 8, 2017 Mth 9 Geometry Solving vetor prolems Prolem Prove tht if vetors nd stisfy, then Solution 1 onsider the vetor ddition prllelogrm shown in the Figure Sine its digonls hve equl length,, the prllelogrm

More information

Algorithms & Data Structures Homework 8 HS 18 Exercise Class (Room & TA): Submitted by: Peer Feedback by: Points:

Algorithms & Data Structures Homework 8 HS 18 Exercise Class (Room & TA): Submitted by: Peer Feedback by: Points: Eidgenössishe Tehnishe Hohshule Zürih Eole polytehnique fédérle de Zurih Politenio federle di Zurigo Federl Institute of Tehnology t Zurih Deprtement of Computer Siene. Novemer 0 Mrkus Püshel, Dvid Steurer

More information

p-adic Egyptian Fractions

p-adic Egyptian Fractions p-adic Egyptin Frctions Contents 1 Introduction 1 2 Trditionl Egyptin Frctions nd Greedy Algorithm 2 3 Set-up 3 4 p-greedy Algorithm 5 5 p-egyptin Trditionl 10 6 Conclusion 1 Introduction An Egyptin frction

More information

Introduction to Olympiad Inequalities

Introduction to Olympiad Inequalities Introdution to Olympid Inequlities Edutionl Studies Progrm HSSP Msshusetts Institute of Tehnology Snj Simonovikj Spring 207 Contents Wrm up nd Am-Gm inequlity 2. Elementry inequlities......................

More information

Section 1.3 Triangles

Section 1.3 Triangles Se 1.3 Tringles 21 Setion 1.3 Tringles LELING TRINGLE The line segments tht form tringle re lled the sides of the tringle. Eh pir of sides forms n ngle, lled n interior ngle, nd eh tringle hs three interior

More information

Section 4.4. Green s Theorem

Section 4.4. Green s Theorem The Clulus of Funtions of Severl Vriles Setion 4.4 Green s Theorem Green s theorem is n exmple from fmily of theorems whih onnet line integrls (nd their higher-dimensionl nlogues) with the definite integrls

More information

Probability. b a b. a b 32.

Probability. b a b. a b 32. Proility If n event n hppen in '' wys nd fil in '' wys, nd eh of these wys is eqully likely, then proility or the hne, or its hppening is, nd tht of its filing is eg, If in lottery there re prizes nd lnks,

More information

8 THREE PHASE A.C. CIRCUITS

8 THREE PHASE A.C. CIRCUITS 8 THREE PHSE.. IRUITS The signls in hpter 7 were sinusoidl lternting voltges nd urrents of the so-lled single se type. n emf of suh type n e esily generted y rotting single loop of ondutor (or single winding),

More information

Algorithm Design and Analysis

Algorithm Design and Analysis Algorithm Design nd Anlysis LECTURE 5 Supplement Greedy Algorithms Cont d Minimizing lteness Ching (NOT overed in leture) Adm Smith 9/8/10 A. Smith; sed on slides y E. Demine, C. Leiserson, S. Rskhodnikov,

More information

Linear Algebra Introduction

Linear Algebra Introduction Introdution Wht is Liner Alger out? Liner Alger is rnh of mthemtis whih emerged yers k nd ws one of the pioneer rnhes of mthemtis Though, initilly it strted with solving of the simple liner eqution x +

More information

AP Calculus BC Chapter 8: Integration Techniques, L Hopital s Rule and Improper Integrals

AP Calculus BC Chapter 8: Integration Techniques, L Hopital s Rule and Improper Integrals AP Clulus BC Chpter 8: Integrtion Tehniques, L Hopitl s Rule nd Improper Integrls 8. Bsi Integrtion Rules In this setion we will review vrious integrtion strtegies. Strtegies: I. Seprte the integrnd into

More information

Algorithm Design and Analysis

Algorithm Design and Analysis Algorithm Design nd Anlysis LECTURE 8 Mx. lteness ont d Optiml Ching Adm Smith 9/12/2008 A. Smith; sed on slides y E. Demine, C. Leiserson, S. Rskhodnikov, K. Wyne Sheduling to Minimizing Lteness Minimizing

More information

Part 4. Integration (with Proofs)

Part 4. Integration (with Proofs) Prt 4. Integrtion (with Proofs) 4.1 Definition Definition A prtition P of [, b] is finite set of points {x 0, x 1,..., x n } with = x 0 < x 1

More information

Counting Paths Between Vertices. Isomorphism of Graphs. Isomorphism of Graphs. Isomorphism of Graphs. Isomorphism of Graphs. Isomorphism of Graphs

Counting Paths Between Vertices. Isomorphism of Graphs. Isomorphism of Graphs. Isomorphism of Graphs. Isomorphism of Graphs. Isomorphism of Graphs Isomorphism of Grphs Definition The simple grphs G 1 = (V 1, E 1 ) n G = (V, E ) re isomorphi if there is ijetion (n oneto-one n onto funtion) f from V 1 to V with the property tht n re jent in G 1 if

More information

Part I: Study the theorem statement.

Part I: Study the theorem statement. Nme 1 Nme 2 Nme 3 A STUDY OF PYTHAGORAS THEOREM Instrutions: Together in groups of 2 or 3, fill out the following worksheet. You my lift nswers from the reding, or nswer on your own. Turn in one pket for

More information

University of Sioux Falls. MAT204/205 Calculus I/II

University of Sioux Falls. MAT204/205 Calculus I/II University of Sioux Flls MAT204/205 Clulus I/II Conepts ddressed: Clulus Textook: Thoms Clulus, 11 th ed., Weir, Hss, Giordno 1. Use stndrd differentition nd integrtion tehniques. Differentition tehniques

More information

TIME AND STATE IN DISTRIBUTED SYSTEMS

TIME AND STATE IN DISTRIBUTED SYSTEMS Distriuted Systems Fö 5-1 Distriuted Systems Fö 5-2 TIME ND STTE IN DISTRIUTED SYSTEMS 1. Time in Distriuted Systems Time in Distriuted Systems euse eh mhine in distriuted system hs its own lok there is

More information

Precomputation for Multi-constrained QoS Routing in High-speed Networks

Precomputation for Multi-constrained QoS Routing in High-speed Networks Preomputtion for Multi-onstrined QoS Routing in High-speed Networs Yong Cui, Ke Xu, Jinping Wu Deprtment of Computer Siene, Tsinghu University, Beijing, PRChin, 100084 {y, xue}@snet1stsinghuedun; jinping@ernetedun

More information

where the box contains a finite number of gates from the given collection. Examples of gates that are commonly used are the following: a b

where the box contains a finite number of gates from the given collection. Examples of gates that are commonly used are the following: a b CS 294-2 9/11/04 Quntum Ciruit Model, Solovy-Kitev Theorem, BQP Fll 2004 Leture 4 1 Quntum Ciruit Model 1.1 Clssil Ciruits - Universl Gte Sets A lssil iruit implements multi-output oolen funtion f : {0,1}

More information

Data Structures LECTURE 10. Huffman coding. Example. Coding: problem definition

Data Structures LECTURE 10. Huffman coding. Example. Coding: problem definition Dt Strutures, Spring 24 L. Joskowiz Dt Strutures LEURE Humn oing Motivtion Uniquel eipherle oes Prei oes Humn oe onstrution Etensions n pplitions hpter 6.3 pp 385 392 in tetook Motivtion Suppose we wnt

More information

Appendix C Partial discharges. 1. Relationship Between Measured and Actual Discharge Quantities

Appendix C Partial discharges. 1. Relationship Between Measured and Actual Discharge Quantities Appendi Prtil dishrges. Reltionship Between Mesured nd Atul Dishrge Quntities A dishrging smple my e simply represented y the euilent iruit in Figure. The pplied lternting oltge V is inresed until the

More information

Intermediate Math Circles Wednesday 17 October 2012 Geometry II: Side Lengths

Intermediate Math Circles Wednesday 17 October 2012 Geometry II: Side Lengths Intermedite Mth Cirles Wednesdy 17 Otoer 01 Geometry II: Side Lengths Lst week we disussed vrious ngle properties. As we progressed through the evening, we proved mny results. This week, we will look t

More information

System Validation (IN4387) November 2, 2012, 14:00-17:00

System Validation (IN4387) November 2, 2012, 14:00-17:00 System Vlidtion (IN4387) Novemer 2, 2012, 14:00-17:00 Importnt Notes. The exmintion omprises 5 question in 4 pges. Give omplete explntion nd do not onfine yourself to giving the finl nswer. Good luk! Exerise

More information

Dorf, R.C., Wan, Z. T- Equivalent Networks The Electrical Engineering Handbook Ed. Richard C. Dorf Boca Raton: CRC Press LLC, 2000

Dorf, R.C., Wan, Z. T- Equivalent Networks The Electrical Engineering Handbook Ed. Richard C. Dorf Boca Raton: CRC Press LLC, 2000 orf, R.C., Wn,. T- Equivlent Networks The Eletril Engineering Hndook Ed. Rihrd C. orf Bo Rton: CRC Press LLC, 000 9 T P Equivlent Networks hen Wn University of Cliforni, vis Rihrd C. orf University of

More information

Lossless Compression Lossy Compression

Lossless Compression Lossy Compression Administrivi CSE 39 Introdution to Dt Compression Spring 23 Leture : Introdution to Dt Compression Entropy Prefix Codes Instrutor Prof. Alexnder Mohr mohr@s.sunys.edu offie hours: TBA We http://mnl.s.sunys.edu/lss/se39/24-fll/

More information

(a) A partition P of [a, b] is a finite subset of [a, b] containing a and b. If Q is another partition and P Q, then Q is a refinement of P.

(a) A partition P of [a, b] is a finite subset of [a, b] containing a and b. If Q is another partition and P Q, then Q is a refinement of P. Chpter 7: The Riemnn Integrl When the derivtive is introdued, it is not hrd to see tht the it of the differene quotient should be equl to the slope of the tngent line, or when the horizontl xis is time

More information

Engr354: Digital Logic Circuits

Engr354: Digital Logic Circuits Engr354: Digitl Logi Ciruits Chpter 4: Logi Optimiztion Curtis Nelson Logi Optimiztion In hpter 4 you will lern out: Synthesis of logi funtions; Anlysis of logi iruits; Tehniques for deriving minimum-ost

More information

Chapter 8 Roots and Radicals

Chapter 8 Roots and Radicals Chpter 8 Roots nd Rdils 7 ROOTS AND RADICALS 8 Figure 8. Grphene is n inredily strong nd flexile mteril mde from ron. It n lso ondut eletriity. Notie the hexgonl grid pttern. (redit: AlexnderAIUS / Wikimedi

More information

A Study on the Properties of Rational Triangles

A Study on the Properties of Rational Triangles Interntionl Journl of Mthemtis Reserh. ISSN 0976-5840 Volume 6, Numer (04), pp. 8-9 Interntionl Reserh Pulition House http://www.irphouse.om Study on the Properties of Rtionl Tringles M. Q. lm, M.R. Hssn

More information

CS 491G Combinatorial Optimization Lecture Notes

CS 491G Combinatorial Optimization Lecture Notes CS 491G Comintoril Optimiztion Leture Notes Dvi Owen July 30, August 1 1 Mthings Figure 1: two possile mthings in simple grph. Definition 1 Given grph G = V, E, mthing is olletion of eges M suh tht e i,

More information

Test Generation from Timed Input Output Automata

Test Generation from Timed Input Output Automata Chpter 8 Test Genertion from Timed Input Output Automt The purpose of this hpter is to introdue tehniques for the genertion of test dt from models of softwre sed on vrints of timed utomt. The tests generted

More information

Chapter 3. Vector Spaces. 3.1 Images and Image Arithmetic

Chapter 3. Vector Spaces. 3.1 Images and Image Arithmetic Chpter 3 Vetor Spes In Chpter 2, we sw tht the set of imges possessed numer of onvenient properties. It turns out tht ny set tht possesses similr onvenient properties n e nlyzed in similr wy. In liner

More information

Table of Content. c 1 / 5

Table of Content. c 1 / 5 Tehnil Informtion - t nd t Temperture for Controlger 03-2018 en Tble of Content Introdution....................................................................... 2 Definitions for t nd t..............................................................

More information

Distributed Generation Placement in Unbalanced Distribution System with Seasonal Load Variation

Distributed Generation Placement in Unbalanced Distribution System with Seasonal Load Variation Distriuted Genertion Plement in Unlned Distriution System with Sesonl Lod Vrition Rvi Tej Bhimrsetti Dept. of Eletril Engg., NT Kurukshetr Kurukshetr, ndi svrtej@gmil.om Ashwni Kumr, Memer, EEE Dept. of

More information

Review of Gaussian Quadrature method

Review of Gaussian Quadrature method Review of Gussin Qudrture method Nsser M. Asi Spring 006 compiled on Sundy Decemer 1, 017 t 09:1 PM 1 The prolem To find numericl vlue for the integrl of rel vlued function of rel vrile over specific rnge

More information

22: Union Find. CS 473u - Algorithms - Spring April 14, We want to maintain a collection of sets, under the operations of:

22: Union Find. CS 473u - Algorithms - Spring April 14, We want to maintain a collection of sets, under the operations of: 22: Union Fin CS 473u - Algorithms - Spring 2005 April 14, 2005 1 Union-Fin We wnt to mintin olletion of sets, uner the opertions of: 1. MkeSet(x) - rete set tht ontins the single element x. 2. Fin(x)

More information

1.3 SCALARS AND VECTORS

1.3 SCALARS AND VECTORS Bridge Course Phy I PUC 24 1.3 SCLRS ND VECTORS Introdution: Physis is the study of nturl phenomen. The study of ny nturl phenomenon involves mesurements. For exmple, the distne etween the plnet erth nd

More information

a) Read over steps (1)- (4) below and sketch the path of the cycle on a P V plot on the graph below. Label all appropriate points.

a) Read over steps (1)- (4) below and sketch the path of the cycle on a P V plot on the graph below. Label all appropriate points. Prole 3: Crnot Cyle of n Idel Gs In this prole, the strting pressure P nd volue of n idel gs in stte, re given he rtio R = / > of the volues of the sttes nd is given Finlly onstnt γ = 5/3 is given You

More information

SECTION A STUDENT MATERIAL. Part 1. What and Why.?

SECTION A STUDENT MATERIAL. Part 1. What and Why.? SECTION A STUDENT MATERIAL Prt Wht nd Wh.? Student Mteril Prt Prolem n > 0 n > 0 Is the onverse true? Prolem If n is even then n is even. If n is even then n is even. Wht nd Wh? Eploring Pure Mths Are

More information

Technische Universität München Winter term 2009/10 I7 Prof. J. Esparza / J. Křetínský / M. Luttenberger 11. Februar Solution

Technische Universität München Winter term 2009/10 I7 Prof. J. Esparza / J. Křetínský / M. Luttenberger 11. Februar Solution Tehnishe Universität Münhen Winter term 29/ I7 Prof. J. Esprz / J. Křetínský / M. Luttenerger. Ferur 2 Solution Automt nd Forml Lnguges Homework 2 Due 5..29. Exerise 2. Let A e the following finite utomton:

More information

A Differential Approach to Inference in Bayesian Networks

A Differential Approach to Inference in Bayesian Networks Dierentil pproh to Inerene in Byesin Networks esented y Ynn Shen shenyn@mi.pitt.edu Outline Introdution Oeriew o lgorithms or inerene in Byesin networks (BN) oposed new pproh How to represent BN s multi-rite

More information

Unit 4. Combinational Circuits

Unit 4. Combinational Circuits Unit 4. Comintionl Ciruits Digitl Eletroni Ciruits (Ciruitos Eletrónios Digitles) E.T.S.I. Informáti Universidd de Sevill 5/10/2012 Jorge Jun 2010, 2011, 2012 You re free to opy, distriute

More information

Derivations for maximum likelihood estimation of particle size distribution using in situ video imaging

Derivations for maximum likelihood estimation of particle size distribution using in situ video imaging 2 TWMCC Texs-Wisconsin Modeling nd Control Consortium 1 Technicl report numer 27-1 Derivtions for mximum likelihood estimtion of prticle size distriution using in situ video imging Pul A. Lrsen nd Jmes

More information

Alpha Algorithm: A Process Discovery Algorithm

Alpha Algorithm: A Process Discovery Algorithm Proess Mining: Dt Siene in Ation Alph Algorithm: A Proess Disovery Algorithm prof.dr.ir. Wil vn der Alst www.proessmining.org Proess disovery = Ply-In Ply-In event log proess model Ply-Out Reply proess

More information

1 Nondeterministic Finite Automata

1 Nondeterministic Finite Automata 1 Nondeterministic Finite Automt Suppose in life, whenever you hd choice, you could try oth possiilities nd live your life. At the end, you would go ck nd choose the one tht worked out the est. Then you

More information

Nondeterministic Finite Automata

Nondeterministic Finite Automata Nondeterministi Finite utomt The Power of Guessing Tuesdy, Otoer 4, 2 Reding: Sipser.2 (first prt); Stoughton 3.3 3.5 S235 Lnguges nd utomt eprtment of omputer Siene Wellesley ollege Finite utomton (F)

More information

THE INFLUENCE OF MODEL RESOLUTION ON AN EXPRESSION OF THE ATMOSPHERIC BOUNDARY LAYER IN A SINGLE-COLUMN MODEL

THE INFLUENCE OF MODEL RESOLUTION ON AN EXPRESSION OF THE ATMOSPHERIC BOUNDARY LAYER IN A SINGLE-COLUMN MODEL THE INFLUENCE OF MODEL RESOLUTION ON AN EXPRESSION OF THE ATMOSPHERIC BOUNDARY LAYER IN A SINGLE-COLUMN MODEL P3.1 Kot Iwmur*, Hiroto Kitgw Jpn Meteorologil Ageny 1. INTRODUCTION Jpn Meteorologil Ageny

More information

Estimation of Global Solar Radiation in Onitsha and Calabar Using Empirical Models

Estimation of Global Solar Radiation in Onitsha and Calabar Using Empirical Models Communitions in Applied Sienes ISS 0-77 Volume, umer, 0, 5-7 Estimtion of Glol Solr dition in Onitsh nd Clr Using Empiril Models M.. nuhi, J. E. Ekpe nd G. F Ieh Deprtment of Industril Physis, Eonyi Stte

More information

Finite State Automata and Determinisation

Finite State Automata and Determinisation Finite Stte Automt nd Deterministion Tim Dworn Jnury, 2016 Lnguges fs nf re df Deterministion 2 Outline 1 Lnguges 2 Finite Stte Automt (fs) 3 Non-deterministi Finite Stte Automt (nf) 4 Regulr Expressions

More information

Homework Solution - Set 5 Due: Friday 10/03/08

Homework Solution - Set 5 Due: Friday 10/03/08 CE 96 Introduction to the Theory of Computtion ll 2008 Homework olution - et 5 Due: ridy 10/0/08 1. Textook, Pge 86, Exercise 1.21. () 1 2 Add new strt stte nd finl stte. Mke originl finl stte non-finl.

More information

Compression of Palindromes and Regularity.

Compression of Palindromes and Regularity. Compression of Plinromes n Regulrity. Kyoko Shikishim-Tsuji Center for Lierl Arts Eution n Reserh Tenri University 1 Introution In [1], property of likstrem t t view of tse is isusse n it is shown tht

More information

The Minimum Label Spanning Tree Problem: Illustrating the Utility of Genetic Algorithms

The Minimum Label Spanning Tree Problem: Illustrating the Utility of Genetic Algorithms The Minimum Lel Spnning Tree Prolem: Illustrting the Utility of Genetic Algorithms Yupei Xiong, Univ. of Mrylnd Bruce Golden, Univ. of Mrylnd Edwrd Wsil, Americn Univ. Presented t BAE Systems Distinguished

More information

GM1 Consolidation Worksheet

GM1 Consolidation Worksheet Cmridge Essentils Mthemtis Core 8 GM1 Consolidtion Worksheet GM1 Consolidtion Worksheet 1 Clulte the size of eh ngle mrked y letter. Give resons for your nswers. or exmple, ngles on stright line dd up

More information

arxiv: v1 [cond-mat.mtrl-sci] 10 Aug 2017

arxiv: v1 [cond-mat.mtrl-sci] 10 Aug 2017 rxiv:178.313v1 [ond-mt.mtrl-si] 1 Aug 217 Knowledge-Trnsfer sed Cost-effetive Serh for Interfe Strutures: A Cse Study on f-al [11] Tilt Grin Boundry Tomohiro Yonezu 1, Tomoyuki Tmur 2,3, Ihiro Tkeuhi 1,3,

More information

Compiler Design. Spring Lexical Analysis. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Lexical Analysis. Sample Exercises and Solutions. Prof. Pedro C. Diniz University of Southern Cliforni Computer Siene Deprtment Compiler Design Spring 7 Lexil Anlysis Smple Exerises nd Solutions Prof. Pedro C. Diniz USC / Informtion Sienes Institute 47 Admirlty Wy, Suite

More information

I1 = I2 I1 = I2 + I3 I1 + I2 = I3 + I4 I 3

I1 = I2 I1 = I2 + I3 I1 + I2 = I3 + I4 I 3 2 The Prllel Circuit Electric Circuits: Figure 2- elow show ttery nd multiple resistors rrnged in prllel. Ech resistor receives portion of the current from the ttery sed on its resistnce. The split is

More information

CHENG Chun Chor Litwin The Hong Kong Institute of Education

CHENG Chun Chor Litwin The Hong Kong Institute of Education PE-hing Mi terntionl onferene IV: novtion of Mthemtis Tehing nd Lerning through Lesson Study- onnetion etween ssessment nd Sujet Mtter HENG hun hor Litwin The Hong Kong stitute of Edution Report on using

More information

A Mathematical Model for Unemployment-Taking an Action without Delay

A Mathematical Model for Unemployment-Taking an Action without Delay Advnes in Dynmil Systems nd Applitions. ISSN 973-53 Volume Number (7) pp. -8 Reserh Indi Publitions http://www.ripublition.om A Mthemtil Model for Unemployment-Tking n Ation without Dely Gulbnu Pthn Diretorte

More information

Statistical models for record linkage

Statistical models for record linkage Sttistil models for reord linge Trining ourse on reord linge Mro Fortini Istt fortini@istt.it Estimtion prolems Prmeters estimtion for reord linge Use of dt from prior studies Use of urrent smples (leril

More information

SECOND HARMONIC GENERATION OF Bi 4 Ti 3 O 12 FILMS

SECOND HARMONIC GENERATION OF Bi 4 Ti 3 O 12 FILMS SECOND HARMONIC GENERATION OF Bi 4 Ti 3 O 12 FILMS IN-SITU PROBING OF DOMAIN POLING IN Bi 4 Ti 3 O 12 THIN FILMS BY OPTICAL SECOND HARMONIC GENERATION YANIV BARAD, VENKATRAMAN GOPALAN Mterils Reserh Lortory

More information

NEW CIRCUITS OF HIGH-VOLTAGE PULSE GENERATORS WITH INDUCTIVE-CAPACITIVE ENERGY STORAGE

NEW CIRCUITS OF HIGH-VOLTAGE PULSE GENERATORS WITH INDUCTIVE-CAPACITIVE ENERGY STORAGE NEW CIRCUITS OF HIGH-VOLTAGE PULSE GENERATORS WITH INDUCTIVE-CAPACITIVE ENERGY STORAGE V.S. Gordeev, G.A. Myskov Russin Federl Nuler Center All-Russi Sientifi Reserh Institute of Experimentl Physis (RFNC-VNIIEF)

More information

Håkan Lennerstad, Lars Lundberg

Håkan Lennerstad, Lars Lundberg GENERALIZATIONS OF THE FLOOR AND CEILING FUNCTIONS USING THE STERN-BROCOT TREE Håkn Lennerstd, Lrs Lunderg Blekinge Institute of Tehnology Reserh report No. 2006:02 Generliztions of the floor nd eiling

More information

21.1 Using Formulae Construct and Use Simple Formulae Revision of Negative Numbers Substitution into Formulae

21.1 Using Formulae Construct and Use Simple Formulae Revision of Negative Numbers Substitution into Formulae MEP Jmi: STRAND G UNIT 1 Formule: Student Tet Contents STRAND G: Alger Unit 1 Formule Student Tet Contents Setion 1.1 Using Formule 1. Construt nd Use Simple Formule 1.3 Revision of Negtive Numers 1.4

More information

PYTHAGORAS THEOREM WHAT S IN CHAPTER 1? IN THIS CHAPTER YOU WILL:

PYTHAGORAS THEOREM WHAT S IN CHAPTER 1? IN THIS CHAPTER YOU WILL: PYTHAGORAS THEOREM 1 WHAT S IN CHAPTER 1? 1 01 Squres, squre roots nd surds 1 02 Pythgors theorem 1 03 Finding the hypotenuse 1 04 Finding shorter side 1 05 Mixed prolems 1 06 Testing for right-ngled tringles

More information

SOME INTEGRAL INEQUALITIES FOR HARMONICALLY CONVEX STOCHASTIC PROCESSES ON THE CO-ORDINATES

SOME INTEGRAL INEQUALITIES FOR HARMONICALLY CONVEX STOCHASTIC PROCESSES ON THE CO-ORDINATES Avne Mth Moels & Applitions Vol3 No 8 pp63-75 SOME INTEGRAL INEQUALITIES FOR HARMONICALLY CONVE STOCHASTIC PROCESSES ON THE CO-ORDINATES Nurgül Okur * Imt Işn Yusuf Ust 3 3 Giresun University Deprtment

More information