A Parallel Algorithm for Minimization of Finite Automata
|
|
- Lambert Carson
- 6 years ago
- Views:
Transcription
1 A Parallel Algorithm for Minimization of Finite Automata B. Ravikumar X. Xiong Deartment of Comuter Science University of Rhode Island Kingston, RI Abstract In this aer, we resent a arallel algorithm for the minimization of deterministic finite state automata (DFA's) and discuss its imlementation on a connection machine CM-5 using data arallel and message assing models. We show that its time comlexity on a rocessor EREW PRAM ( n) for inuts of size + log n log ) uniformly on almost all instances. The work done by our algorithm is thus within a factor of O(log n) of the best known sequential algorithm. The sace used by our algorithm is linear in the inut size. The actual resource requirements of our imlementations are consistent with these estimates. Although arallel algorithms have been roosed for this roblem in the ast, they are not ractical. We discuss the imlementation details and the exerimental results. n is O( n log2 n 1. Introduction Finite state machines are of fundamental imortance in theory as well as alications. Their alications range from classical ones such as comilers and sequential circuits to recent alications including neural networks, hidden Markov models, hyertext meta languages and rotocol verification. A central roblem in automata theory is to minimize a given Deterministic Finite Automaton (DFA). This roblem has a long history going back to the origins of automata theory. Huffman [7] and Moore [11] resented an algorithm for DFA minimization in 1950's. Their algorithm runs in time O(n 2 ) on DFA's with n state and was adequate for most of the classical alications. Many variations of this algorithm have aeared over the years; see [14] for a comrehensive summary. Hocroft [5] develoed a significantly faster algorithm of time comlexity O(n log n). Although Hocroft's algorithm is very efficient in ractice, it can' t handle DFA's with millions of states. But there are many alications involving such large DFA's. A arallel algorithm can handle such instances since the combined memory size of the rocessors is adequate to store and rocess such large DFA's. This work is art of a collection of arallel rograms we are develoing for many comutation-intensive testing roblems involving DFA's. we will briefly review the revious work on the design of arallel algorithms for DFA minimization roblem. The roblem has been studied extensively, [10, 12, 9, 2] etc. JáJá and Kosaraju [9] studied the secial case in which the inut alhabet size is 1 on a mesh-connected arallel comuter and obtained an efficient algorithm. Cho and Huynh [2] showed that the roblem is in NC 2 and that it is NLOGSPACEcomlete. The algorithm of [12] alies only to the case in which the inut alhabet is of size 1. In this case, the most efficient algorithm is due to JáJá and Ryu [10] which is a CRCW-PRAM algorithm of time comlexity O(log n) and total work O(n log log n). When the inut alhabet is of size greater than 1, no efficient arallel algorithm (i.e., one of time comlexity O(log k n)forsomefixedk) is known with a `reasonable' total work (say, O(n 2 ) or below). In fact, the only ublished NC algorithm for this roblem is due to [2] which has a time comlexity O(log 2 n) but requires (n 6 ) rocessors.
2 This aer differs from the work mentioned above in two ways: (i) Our goal is to imlement arallel algorithms for DFA minimization on actual arallel machines. (ii) Our figure of merit is the average case erformance, not the worst-case erformance. Here we reort on the imlementation of rograms for minimizing DFA's (with unrestricted inut alhabet size) on a CM-5 connection machine with 512 rocessors. We imlemented two classes of algorithms - one based on data arallel rogramming and the other based on message assing. Our rograms erform well in ractice They can minimize `tyical' DFA's with millions of states in a few minutes and their scalability is good. The rimary reason for their success is that they have very good erformance on almost all instances. We formally establish this using a robabilistic model of Traktenbrot and Barzdin. We also discuss the imlementation details and the exeriments we conducted with our rograms. We conclude with some new questions that arise from our study. In this abridged version, we omit the roofs of all the claims. They can be found in the full version. 2. Preliminaries We assume familiarity with basic concets about finite automata. To fix the notation, however, we will briefly introduce some of the central notions. For details, we refer the reader to [6]. A DFA M consists of a finite set Q of states, a finite inut alhabet, a start state q 0 2 Q and a set F Q of acceting states, and the transition function : Q! Q. An inut string x is a sequence of symbols over. On an inut string x = x 1 x 2 :::x m, the DFA will visit a sequence of states q 0 q 1 :::q m starting with the start state by successively alying the transition function. Thus q 1 = (q 0 ;x 1 ), q 2 = (q 1 ;x 2 ) etc. The language L(M ) acceted by a DFA is defined as the set of strings x that take the DFA to an acceting state. I.e., x will be in L(M ) if and only if q m 2 F. Such languages are called regular languages, a well-understood and imortant class. Two DFA's M 1 and M 2 are said to be equivalent if they accet the same set of strings. It is common to resent DFA minimization as an equivalent roblem called the coarsest set artition roblem [1] which is stated as follows: Given a set Q, an initial artition of Q into disjoint blocks fb 0 ; :::; B m 1 g, and a collection of functions f i : Q! Q, find the coarsest (having fewest blocks) artition of Q say fe 1 ;E 2 ; :::; E q g such that: (1) the final artition is consistent with the initial artition, i.e., each E i is a subset of some B j and (2) a and b in E i imlies for all j, f j (a) and f j (b) are in the same block E k. The connection to minimization of DFA is the following. Q is the set of states, f i is the ma induced by the symbol a i (this means, (q; a i )= f i (q)), the initial artition is the one that artitions Q into two sets, F the set of acceting states and QnF the nonacceting ones. It should be clear that the size of the minimal DFA is the number of equivalence classes in the coarsest artition. In the following, we will assume that the inut is a DFA with n states defined over a k-letter alhabet in which every state is reachable from the start state. This assumtion simlifies the resentation of our algorithm; otherwise a rerocessing ste should be added to delete the unreachable state. 3. Parallel Algorithm and Its Analysis A high level descrition of our arallel algorithm is given below: Algorithm ParallelMin1 inut: DF A with n states, k inuts, 2 blocks B 0;B 1. outut: minimized DF A. begin do for i =0to k 1 do for j =0to n 1 do in arallel Get the block number B of state q j; Get the block number B 0 of the state (q j;x i), label the state q j with the air (B; B 0 ); Re-arrange (e.g. by arallel sorting) the states into blocks so that the states with the same labels are contiguous; end arallel for; Assign to all states in the same block a new (unique) block number in arallel; end for; until no new block roduced; Deduce the minimal DFA from the final artition; end. The outer loo of the above algorithm aears inherently sequential and it seems very hard to arallelize it significantly. But this is not of great concern since exeriments show that the total number of iterations of the outer loo is very small (usually less than
3 10) for all the DFA's we tested of sizes ranging from 4 thousands to more than 1 million. This relative invariance of the number of iterations can be exlained theoretically; see the discussion below. Thus, in ractice, there is no real gain in attemting to arallelize the outer loo. In the remainder of this section, we will mainly discuss the high-level details of imlementing the above arallel algorithm on EREW-PRAM model and resent an analysis that holds for almost all instances in a recise sense. We start with a brief descrition of the model due to Traktenbrot and Barzdin [13]. Our notation will be similar to the one used by [3] who adated Traktenbrot-Barzdin model in their study of assive learning algorithms. Our model involves a slight generalization of theirs. Basically, the robability sace on which we base our average case is narrowed by fixing a DFA G arbitrarily excet for its set of acceting states. Thus an adversary can choose G (called the automaton grah) subject to the only condition that all states are reachable from the start state. The robability distribution is defined over all DFA's M G which can be derived from this automaton grah by randomly selecting the set F of acceting states. In our model, we will allow each state to be included in F indeendently with robability ( can be a function of n). Let P n;"; be any redicate on an n-state automaton which deends on n, a confidence arameter " (where 0 " 1) and (defined above). We say that uniformly almost all automata have roerty P n;"; if the following holds: for all " > 0, foralln > 0 and for any n-state underlying automaton grah G, if we randomly choose the set of acceting states where each state is included indeendently with robability, then with robability at least 1 ", the redicate P n;"; holds. Let M= < Q; ;q 0 ;;F > be a DFA. The outut associated with a string x = x 1 :::x m from state q defined as the sequence y 0 :::y m where y i = 1 if the state reached (starting at q) after alying the refix x 1 :::x i is an acceting state, 0 otherwise. (Note that y 0 is 1 or 0 according as q is acceting or not.) We denote this outut by q < x >. A string x 2 is a distinguishing string for q i and q j if q i <x>6=q j <x>. Finally define d(q i ;q j )as the length of the shortest distinguishing string for the states q i and q j.wearenow ready to resent our results about the exected erformance of ParallelMin1. In the following, lg will denote logarithm to base 2. Lemma 1. For uniformly almost all automata with n states, every air of states has a distinguishing string of length at most 2lg( n2 " ) 1 lg( ) : 1 2(1 ) Our next result resents the average time comlexity (in the above sense) of an EREW (exclusive-read, exclusive-write) PRAM imlementation of the arallel algorithm resented above. We will assume that the readers are familiar with the PRAM model. See [8] for a systematic treatment of the PRAM algorithms. Theorem 2. For uniformly almost all automata with n states, the algorithm ParallelMin1 can be imlemented on an EREW PRAM with q n rocessors with time n lg n lg(n comlexity O(k 2 =") +lgq lg n). The q lg(1=(1 2(1 ))) sace comlexity (= amount of shared memory used) is O(n). Thus the total work done by the algorithm is O(n log 2 n) if and k are constants. The next result exlains why Hocroft's algorithm does not arallelize well. Theorem 3. Let Q 0 be the set of states of a DFA after minimization, and i the iteration number of the Hocroft's algorithm, then i jj(jq 0 j 1): 4. Imlementation as Data Parallel Program Data-arallelism is the arallelism achievable through the simultaneous execution of the same oeration across a set of data [4]. Since each oeration is alied simultaneously to the data, a data-arallel rogram has only one rogram counter and is characterized by the absence of multi-threaded execution which makes the design, imlementation and testing of rograms very difficult. Although data arallel rogramming was originally develoed for SIMD (or vector) hardware, it has become a successful aradigm in all tyes of arallel rocessing systems such as
4 shared-memory multirocessors, distributed memory machines, and networks of workstations. Since our arallel algorithm ParallelMin1 has a simle control structure and uses an uniform data structure (array), it is easy to imlement it as a data arallel rogram. We resent our data arallel version of the algorithm in the seudo code similar to C*, a data arallel extension of C rogramming language. We assume in our imlementation that the comutation begins with the inut DFA already stored as arallel variables. The data structures used are as follows. delta is an array of jj arallel variables, each is a arallel one of size n. The i-th element of the delta[j], [i]delta[j], stores the transition function of state i under inut symbol j (i.e., the next state of state i under inut symbol j, (i; j)), 0 i n 1, 0 j jj 1. block is a arallel variable to store artition numbers for all states. [i]block is the block number of state i. In ParallelMin2 below, statements like [arallel index]arallel var1 = arallel var2 are send oerations which send values of arallel variable (arallel var2) elements to other arallel variable (arallel var1) elements according to index maing arallel index. statements like arallel var1 =[arallel index]arallel var2 are get oerations which get values of arallel variable (arallel var1) elements from other arallel variable (arallel var2) elements. Algorithm ParallelMin2 inut: delta, array of arallel variables to store transition function; block, initial block numbers of the DFA; outut: block, (udated) block numbers denote state equivalence classes of the minimized DFA; begin q =2; do check =0; for k =0to jj 1do Get block numbers: stateindex = coord(0); fstateindex is used to kee track of movement of state indicesg outut[0] = block; outut[1] = [delta[k]]block; Sort according to oututs: sorted = rank(outut[0]); [sorted]stateindex = stateindex; [sorted]outut[0] = outut[0]; [sorted]outut[1] = outut[1]; sorted=rank(outut[1]); [sorted]stateindex = stateindex; [sorted]outut[0] = outut[0]; [sorted]outut[1]=outut[1]; Set new block names: link =0; where(outut[0]6=[.-1]outut[0]or outut[1]6=[.-1]outut[1]) link =1; newblock = refixsum(link); Check if new blocks roduced: if ( q equal to [n-1]newblock ) check++; continue; fconsistent for inut kg else [stateindex]block=newblock; q =[n-1]newblock; end of for; until (check equal to jj);fconsistent for all inutsg end. In our imlementation, sorting is done by finding ranks (a system library function) of elements and three get oerations to re-distribute them. The arallel refix comutation is erformed by a library function as well. The erformance characteristics of ParallelMin2 are discussed in section Imlementation as Message Passing Program Now we resent the message assing version of the basic arallel algorithm. It is a little more comlicated than the data arallel version because we have to control communication between rocessors exlicitly. Our aroach for storing the inut DFA is to divide the transition function and the final state information
5 equally among different rocessors. Storage of the intermediate results will also be distributed among the rocessors. This is a standard aroach used in distributed memory arallel algorithms. For simlicity, we assume that divides n, the number of states in the inut DFA. Processors will be identified by integers from 0 to 1. A detailed descrition of the various stes of this algorithm can be found in the full aer. Algorithm ParallelMin3 for the rocessor myadd inut: delta[0:: n 1] array to store art of the transition function. block[0:: n 1], initial block numbers of states stored in this rocessor. outut: (udated) block[0:: n 1] begin done = false; Initialization of indexedbuffer: indexedbuffer[0; 0:: n 1]= myadd n.. (myadd +1) n 1.Sofirstrowof indexedbuffer contains the state numbers associated with this rocessor. indexedbuffer[1; 0:: n 1] = block[0:: n 1], ut current block numbers of the states in this rocessor; Construct Message Passing Tables according to delta. These tables contain for each state q in the rocessor the address of the rocessor that contains (q; x j) and of the rocessors which contain the state(s) 1 (q; x j) for each j. while (not done) done = true; for k =0 to jj 1do Exchange oututs: All-to-all communication takes lace as follows: Suose a state s t belongs to a rocessor t and suose (s t;x j)belongs to myadd. The rocessor will send a message to t containing the block number of (s t;x j). The received messages will be ut the third row, namely indexedbuffer[2; 0::n= +1]. Parallel-sort: Sort indexedbuffer using the second and third row together as key. Note that After sorting, indexedbuffer's first row (state indices) may not be ordered and may not belong to this node. That is, the sorting will re-distribute data items. Rename blocks: If two states have the same `key', they are ut in the same block in the refined artition. Put new block numbers in indexedbuffer's second row. This is a global scanning oeration on indexedbuffer of all rocessors. Parallel-sort: Sort indexedbuffer using the first row as the key. This will bring the new block number of each state back to the rocessor to which it belongs. if (a new block roduced)done = false; end of for; end of while; block[0:: n end. 1]=indexedBuffer[1, 0:: n 6. Exerimental Results on CM-5 Next, we resent our exerimental results on CM-5. We ran the rograms described above for many DFA's of different sizes on a CM-5 with 32 nodes. Each node has 4 vector units. The instances of DFA's used in 1];
6 x : Message Passing o : Data Parallel Time (in Seconds) x : Message Passing o : Data Parallel Time (in Seconds) Size of DFAs Number of Processors Figure 2. Scalability Figure 1. Running Time vs. Problem Size this exeriment were constructed using four different methods. All of them have two inut symbols. In Figure 1, the number of rocessors is fixed at 32. When the inut size is less than about , the time comlexity is almost linear so that it takes about twice as much time to solve an instance twice as large. But when the inut size exceeds , nonlinearity shows u, esecially for the message assing rogram. To study the scalability of our rograms, we chose three DFA's (with , and states) and minimized them by using both rograms on a CM- 5 configured with 32, 64, 128 and 256 nodes. Figure 2 shows the results of average time. Both rograms seem to scale well; but the message assing rogram is the better one. 7. Acknowledgments Our rograms were imlemented and tested on a connection machine CM-5 at the National Center for Suercomuter Alications at Urbana-Chamaign. We thank A. Tridgell of Australian National University for his hel with the sorting routine used in the message assing rogram. References [1] A. Aho, J. Hocroft, and J. Ullman. The Design and Analysis of Algorithms. Addison-Wesley Publishing Co., Reading, MA, [2] S. Cho and D. Huynh. The arallel comlexity of coarsest set artition roblems. Information Processing Letters, 42:89 94, [3] Y. Freund et al. Efficient learning of tyical finite automata from random walks. In 25th ACM Symosium on Theory of Comuting, ages , [4] P. Hatcher and M. Quinn. Data-arallel Programming on MIMD Comuters. MIT Press, Cambridge, Mass., [5] J. Hocroft. An n log n algorithm for minimizing states in a finite automaton. In Theory of Machines and Comutations, ages Academic Press, New York, [6] J. Hocroft and J. Ullman. Introduction to Automata Theory, Languages and Comutation. Addison- Wesley Co., Reading, Mass., [7] D. Huffman. The synthesis of sequential switching circuits. Journal of Franklin Institute, 257(3): , [8] J. JáJá. An Introduction to Parallel Algorithms. Addison-Wesley Publishing Co., Reading, Mass., [9] J. JáJá and S. Kosaraju. Parallel algorithms for lanar grah isomorhism and related roblems. IEEE Transactions on Circuits and Systems, 35(3), March [10] J. JáJá and K. Ryu. An efficient arallel algorithm for the single function coarsest artition roblem. ACM Symosium on Parallel Algorithms and Architectures, [11] E. Moore. Gedanken-exeriments on sequential circuits. In C. Shannon and J. McCarthy, editors, Automata Studies, ages Princeton University Press, Princeton, NJ, [12] Y. Srikant. A arallel algorithm for the minimization of finite state automata. Intern. J. Comuter Math., 32:1 11, 1990.
7 [13] B. Trakhtenbrot and Y. Barzdin'. Finite Automata: Behavior and Synthesis. North-Holland Publishing Comany, [14] B. Watson. A taxonomy of finite automaton minimization algorithms. Technical reort, Faculty of Mathematics and Comuter Science, Eindhoven University of Technology, The Netherlands, 1994.
The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule
The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca
More informationMatching Partition a Linked List and Its Optimization
Matching Partition a Linked List and Its Otimization Yijie Han Deartment of Comuter Science University of Kentucky Lexington, KY 40506 ABSTRACT We show the curve O( n log i + log (i) n + log i) for the
More informationParallelism and Locality in Priority Queues. A. Ranade S. Cheng E. Deprit J. Jones S. Shih. University of California. Berkeley, CA 94720
Parallelism and Locality in Priority Queues A. Ranade S. Cheng E. Derit J. Jones S. Shih Comuter Science Division University of California Berkeley, CA 94720 Abstract We exlore two ways of incororating
More information1-way quantum finite automata: strengths, weaknesses and generalizations
1-way quantum finite automata: strengths, weaknesses and generalizations arxiv:quant-h/9802062v3 30 Se 1998 Andris Ambainis UC Berkeley Abstract Rūsiņš Freivalds University of Latvia We study 1-way quantum
More informationComputer arithmetic. Intensive Computation. Annalisa Massini 2017/2018
Comuter arithmetic Intensive Comutation Annalisa Massini 7/8 Intensive Comutation - 7/8 References Comuter Architecture - A Quantitative Aroach Hennessy Patterson Aendix J Intensive Comutation - 7/8 3
More informationGIVEN an input sequence x 0,..., x n 1 and the
1 Running Max/Min Filters using 1 + o(1) Comarisons er Samle Hao Yuan, Member, IEEE, and Mikhail J. Atallah, Fellow, IEEE Abstract A running max (or min) filter asks for the maximum or (minimum) elements
More informationAnalysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel
Performance Analysis Introduction Analysis of execution time for arallel algorithm to dertmine if it is worth the effort to code and debug in arallel Understanding barriers to high erformance and redict
More informationFuzzy Automata Induction using Construction Method
Journal of Mathematics and Statistics 2 (2): 395-4, 26 ISSN 1549-3644 26 Science Publications Fuzzy Automata Induction using Construction Method 1,2 Mo Zhi Wen and 2 Wan Min 1 Center of Intelligent Control
More informationMODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL
Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management
More informationFeedback-error control
Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller
More informationMATH 2710: NOTES FOR ANALYSIS
MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite
More informationEvaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models
Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu
More informationA generalization of Amdahl's law and relative conditions of parallelism
A generalization of Amdahl's law and relative conditions of arallelism Author: Gianluca Argentini, New Technologies and Models, Riello Grou, Legnago (VR), Italy. E-mail: gianluca.argentini@riellogrou.com
More informationDFA Minimization in Map-Reduce
DFA Minimization in Ma-Reduce Gösta Grahne Concordia University Montreal, Canada, H3G M8 grahne@cs.concordia.ca Shahab Harrafi Concordia University Montreal, Canada, H3G M8 s harraf@alumni.concordia.ca
More informationConvex Optimization methods for Computing Channel Capacity
Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem
More information1 1 c (a) 1 (b) 1 Figure 1: (a) First ath followed by salesman in the stris method. (b) Alternative ath. 4. D = distance travelled closing the loo. Th
18.415/6.854 Advanced Algorithms ovember 7, 1996 Euclidean TSP (art I) Lecturer: Michel X. Goemans MIT These notes are based on scribe notes by Marios Paaefthymiou and Mike Klugerman. 1 Euclidean TSP Consider
More informationInformation collection on a graph
Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements
More informationUncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning
TNN-2009-P-1186.R2 1 Uncorrelated Multilinear Princial Comonent Analysis for Unsuervised Multilinear Subsace Learning Haiing Lu, K. N. Plataniotis and A. N. Venetsanooulos The Edward S. Rogers Sr. Deartment
More informationMATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK
Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment
More informationApproximating min-max k-clustering
Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost
More informationCombining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)
Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment
More informationLIMITATIONS OF RECEPTRON. XOR Problem The failure of the perceptron to successfully simple problem such as XOR (Minsky and Papert).
LIMITATIONS OF RECEPTRON XOR Problem The failure of the ercetron to successfully simle roblem such as XOR (Minsky and Paert). x y z x y z 0 0 0 0 0 0 Fig. 4. The exclusive-or logic symbol and function
More informationRadial Basis Function Networks: Algorithms
Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.
More informationFor q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i
Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:
More informationq-ary Symmetric Channel for Large q
List-Message Passing Achieves Caacity on the q-ary Symmetric Channel for Large q Fan Zhang and Henry D Pfister Deartment of Electrical and Comuter Engineering, Texas A&M University {fanzhang,hfister}@tamuedu
More informationShadow Computing: An Energy-Aware Fault Tolerant Computing Model
Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms
More informationSystem Reliability Estimation and Confidence Regions from Subsystem and Full System Tests
009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract
More informationTheory of Parallel Hardware May 11, 2004 Massachusetts Institute of Technology Charles Leiserson, Michael Bender, Bradley Kuszmaul
Theory of Parallel Hardware May 11, 2004 Massachusetts Institute of Technology 6.896 Charles Leiserson, Michael Bender, Bradley Kuszmaul Final Examination Final Examination ffl Do not oen this exam booklet
More informationA New Method of DDB Logical Structure Synthesis Using Distributed Tabu Search
A New Method of DDB Logical Structure Synthesis Using Distributed Tabu Search Eduard Babkin and Margarita Karunina 2, National Research University Higher School of Economics Det of nformation Systems and
More informationElliptic Curves and Cryptography
Ellitic Curves and Crytograhy Background in Ellitic Curves We'll now turn to the fascinating theory of ellitic curves. For simlicity, we'll restrict our discussion to ellitic curves over Z, where is a
More informationInformation collection on a graph
Information collection on a grah Ilya O. Ryzhov Warren Powell October 25, 2009 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements
More informationPARALLEL MATRIX MULTIPLICATION: A SYSTEMATIC JOURNEY
PARALLEL MATRIX MULTIPLICATION: A SYSTEMATIC JOURNEY MARTIN D SCHATZ, ROBERT A VAN DE GEIJN, AND JACK POULSON Abstract We exose a systematic aroach for develoing distributed memory arallel matrixmatrix
More informationPARALLEL MATRIX MULTIPLICATION: A SYSTEMATIC JOURNEY
PARALLEL MATRIX MULTIPLICATION: A SYSTEMATIC JOURNEY MARTIN D SCHATZ, ROBERT A VAN DE GEIJN, AND JACK POULSON Abstract We exose a systematic aroach for develoing distributed memory arallel matrix matrix
More informationA randomized sorting algorithm on the BSP model
A randomized sorting algorithm on the BSP model Alexandros V. Gerbessiotis a, Constantinos J. Siniolakis b a CS Deartment, New Jersey Institute of Technology, Newark, NJ 07102, USA b The American College
More informationState Estimation with ARMarkov Models
Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,
More informationPositive decomposition of transfer functions with multiple poles
Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.
More information4. Score normalization technical details We now discuss the technical details of the score normalization method.
SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules
More informationNew Schedulability Test Conditions for Non-preemptive Scheduling on Multiprocessor Platforms
New Schedulability Test Conditions for Non-reemtive Scheduling on Multirocessor Platforms Technical Reort May 2008 Nan Guan 1, Wang Yi 2, Zonghua Gu 3 and Ge Yu 1 1 Northeastern University, Shenyang, China
More informationCryptanalysis of Pseudorandom Generators
CSE 206A: Lattice Algorithms and Alications Fall 2017 Crytanalysis of Pseudorandom Generators Instructor: Daniele Micciancio UCSD CSE As a motivating alication for the study of lattice in crytograhy we
More informationLinear diophantine equations for discrete tomography
Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,
More informationThe Knuth-Yao Quadrangle-Inequality Speedup is a Consequence of Total-Monotonicity
The Knuth-Yao Quadrangle-Ineuality Seedu is a Conseuence of Total-Monotonicity Wolfgang W. Bein Mordecai J. Golin Lawrence L. Larmore Yan Zhang Abstract There exist several general techniues in the literature
More informationSolved Problems. (a) (b) (c) Figure P4.1 Simple Classification Problems First we draw a line between each set of dark and light data points.
Solved Problems Solved Problems P Solve the three simle classification roblems shown in Figure P by drawing a decision boundary Find weight and bias values that result in single-neuron ercetrons with the
More informationFinite-State Verification or Model Checking. Finite State Verification (FSV) or Model Checking
Finite-State Verification or Model Checking Finite State Verification (FSV) or Model Checking Holds the romise of roviding a cost effective way of verifying imortant roerties about a system Not all faults
More informationRANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES
RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES AARON ZWIEBACH Abstract. In this aer we will analyze research that has been recently done in the field of discrete
More informationOutline. CS21 Decidability and Tractability. Regular expressions and FA. Regular expressions and FA. Regular expressions and FA
Outline CS21 Decidability and Tractability Lecture 4 January 14, 2019 FA and Regular Exressions Non-regular languages: Puming Lemma Pushdown Automata Context-Free Grammars and Languages January 14, 2019
More informationUniversal Finite Memory Coding of Binary Sequences
Deartment of Electrical Engineering Systems Universal Finite Memory Coding of Binary Sequences Thesis submitted towards the degree of Master of Science in Electrical and Electronic Engineering in Tel-Aviv
More informationFault Tolerant Quantum Computing Robert Rogers, Thomas Sylwester, Abe Pauls
CIS 410/510, Introduction to Quantum Information Theory Due: June 8th, 2016 Sring 2016, University of Oregon Date: June 7, 2016 Fault Tolerant Quantum Comuting Robert Rogers, Thomas Sylwester, Abe Pauls
More informationLilian Markenzon 1, Nair Maria Maia de Abreu 2* and Luciana Lee 3
Pesquisa Oeracional (2013) 33(1): 123-132 2013 Brazilian Oerations Research Society Printed version ISSN 0101-7438 / Online version ISSN 1678-5142 www.scielo.br/oe SOME RESULTS ABOUT THE CONNECTIVITY OF
More informationAn Introduction To Range Searching
An Introduction To Range Searching Jan Vahrenhold eartment of Comuter Science Westfälische Wilhelms-Universität Münster, Germany. Overview 1. Introduction: Problem Statement, Lower Bounds 2. Range Searching
More informationAn Analysis of Reliable Classifiers through ROC Isometrics
An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit
More informationHomework Set #3 Rates definitions, Channel Coding, Source-Channel coding
Homework Set # Rates definitions, Channel Coding, Source-Channel coding. Rates (a) Channels coding Rate: Assuming you are sending 4 different messages using usages of a channel. What is the rate (in bits
More informationChapter 1: PROBABILITY BASICS
Charles Boncelet, obability, Statistics, and Random Signals," Oxford University ess, 0. ISBN: 978-0-9-0005-0 Chater : PROBABILITY BASICS Sections. What Is obability?. Exeriments, Outcomes, and Events.
More informationDistributed Rule-Based Inference in the Presence of Redundant Information
istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced
More informationSolution: (Course X071570: Stochastic Processes)
Solution I (Course X071570: Stochastic Processes) October 24, 2013 Exercise 1.1: Find all functions f from the integers to the real numbers satisfying f(n) = 1 2 f(n + 1) + 1 f(n 1) 1. 2 A secial solution
More informationECE 534 Information Theory - Midterm 2
ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You
More informationDRAFT - do not circulate
An Introduction to Proofs about Concurrent Programs K. V. S. Prasad (for the course TDA383/DIT390) Deartment of Comuter Science Chalmers University Setember 26, 2016 Rough sketch of notes released since
More informationParallel Quantum-inspired Genetic Algorithm for Combinatorial Optimization Problem
Parallel Quantum-insired Genetic Algorithm for Combinatorial Otimization Problem Kuk-Hyun Han Kui-Hong Park Chi-Ho Lee Jong-Hwan Kim Det. of Electrical Engineering and Comuter Science, Korea Advanced Institute
More informationOn the capacity of the general trapdoor channel with feedback
On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:
More informationAdaptive estimation with change detection for streaming data
Adative estimation with change detection for streaming data A thesis resented for the degree of Doctor of Philosohy of the University of London and the Diloma of Imerial College by Dean Adam Bodenham Deartment
More informationDETC2003/DAC AN EFFICIENT ALGORITHM FOR CONSTRUCTING OPTIMAL DESIGN OF COMPUTER EXPERIMENTS
Proceedings of DETC 03 ASME 003 Design Engineering Technical Conferences and Comuters and Information in Engineering Conference Chicago, Illinois USA, Setember -6, 003 DETC003/DAC-48760 AN EFFICIENT ALGORITHM
More informationOn the Chvatál-Complexity of Knapsack Problems
R u t c o r Research R e o r t On the Chvatál-Comlexity of Knasack Problems Gergely Kovács a Béla Vizvári b RRR 5-08, October 008 RUTCOR Rutgers Center for Oerations Research Rutgers University 640 Bartholomew
More information2-D Analysis for Iterative Learning Controller for Discrete-Time Systems With Variable Initial Conditions Yong FANG 1, and Tommy W. S.
-D Analysis for Iterative Learning Controller for Discrete-ime Systems With Variable Initial Conditions Yong FANG, and ommy W. S. Chow Abstract In this aer, an iterative learning controller alying to linear
More informationJohn Weatherwax. Analysis of Parallel Depth First Search Algorithms
Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel
More informationDeriving Indicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V.
Deriving ndicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V. Deutsch Centre for Comutational Geostatistics Deartment of Civil &
More informationBrownian Motion and Random Prime Factorization
Brownian Motion and Random Prime Factorization Kendrick Tang June 4, 202 Contents Introduction 2 2 Brownian Motion 2 2. Develoing Brownian Motion.................... 2 2.. Measure Saces and Borel Sigma-Algebras.........
More informationADAPTIVE CONTROL METHODS FOR EXCITED SYSTEMS
ADAPTIVE CONTROL METHODS FOR NON-LINEAR SELF-EXCI EXCITED SYSTEMS by Michael A. Vaudrey Dissertation submitted to the Faculty of the Virginia Polytechnic Institute and State University in artial fulfillment
More informationOn Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm
On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm Gabriel Noriega, José Restreo, Víctor Guzmán, Maribel Giménez and José Aller Universidad Simón Bolívar Valle de Sartenejas,
More information5. PRESSURE AND VELOCITY SPRING Each component of momentum satisfies its own scalar-transport equation. For one cell:
5. PRESSURE AND VELOCITY SPRING 2019 5.1 The momentum equation 5.2 Pressure-velocity couling 5.3 Pressure-correction methods Summary References Examles 5.1 The Momentum Equation Each comonent of momentum
More informationRecursive Estimation of the Preisach Density function for a Smart Actuator
Recursive Estimation of the Preisach Density function for a Smart Actuator Ram V. Iyer Deartment of Mathematics and Statistics, Texas Tech University, Lubbock, TX 7949-142. ABSTRACT The Preisach oerator
More informationThe non-stochastic multi-armed bandit problem
Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at
More informationAR PROCESSES AND SOURCES CAN BE RECONSTRUCTED FROM. Radu Balan, Alexander Jourjine, Justinian Rosca. Siemens Corporation Research
AR PROCESSES AND SOURCES CAN BE RECONSTRUCTED FROM DEGENERATE MIXTURES Radu Balan, Alexander Jourjine, Justinian Rosca Siemens Cororation Research 7 College Road East Princeton, NJ 8 fradu,jourjine,roscag@scr.siemens.com
More informationMultilayer Perceptron Neural Network (MLPs) For Analyzing the Properties of Jordan Oil Shale
World Alied Sciences Journal 5 (5): 546-552, 2008 ISSN 1818-4952 IDOSI Publications, 2008 Multilayer Percetron Neural Network (MLPs) For Analyzing the Proerties of Jordan Oil Shale 1 Jamal M. Nazzal, 2
More informationCombinatorics of topmost discs of multi-peg Tower of Hanoi problem
Combinatorics of tomost discs of multi-eg Tower of Hanoi roblem Sandi Klavžar Deartment of Mathematics, PEF, Unversity of Maribor Koroška cesta 160, 000 Maribor, Slovenia Uroš Milutinović Deartment of
More informationCalculation of MTTF values with Markov Models for Safety Instrumented Systems
7th WEA International Conference on APPLIE COMPUTE CIENCE, Venice, Italy, November -3, 7 3 Calculation of MTTF values with Markov Models for afety Instrumented ystems BÖCÖK J., UGLJEA E., MACHMU. University
More informationModel checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle]
Chater 5 Model checking, verification of CTL One must verify or exel... doubts, and convert them into the certainty of YES or NO. [Thomas Carlyle] 5. The verification setting Page 66 We introduce linear
More informationObserver/Kalman Filter Time Varying System Identification
Observer/Kalman Filter Time Varying System Identification Manoranjan Majji Texas A&M University, College Station, Texas, USA Jer-Nan Juang 2 National Cheng Kung University, Tainan, Taiwan and John L. Junins
More informationRotations in Curved Trajectories for Unconstrained Minimization
Rotations in Curved rajectories for Unconstrained Minimization Alberto J Jimenez Mathematics Deartment, California Polytechnic University, San Luis Obiso, CA, USA 9407 Abstract Curved rajectories Algorithm
More informationAn Ant Colony Optimization Approach to the Probabilistic Traveling Salesman Problem
An Ant Colony Otimization Aroach to the Probabilistic Traveling Salesman Problem Leonora Bianchi 1, Luca Maria Gambardella 1, and Marco Dorigo 2 1 IDSIA, Strada Cantonale Galleria 2, CH-6928 Manno, Switzerland
More informationProbability Estimates for Multi-class Classification by Pairwise Coupling
Probability Estimates for Multi-class Classification by Pairwise Couling Ting-Fan Wu Chih-Jen Lin Deartment of Comuter Science National Taiwan University Taiei 06, Taiwan Ruby C. Weng Deartment of Statistics
More informationOne step ahead prediction using Fuzzy Boolean Neural Networks 1
One ste ahead rediction using Fuzzy Boolean eural etworks 1 José A. B. Tomé IESC-ID, IST Rua Alves Redol, 9 1000 Lisboa jose.tome@inesc-id.t João Paulo Carvalho IESC-ID, IST Rua Alves Redol, 9 1000 Lisboa
More informationResearch of PMU Optimal Placement in Power Systems
Proceedings of the 5th WSEAS/IASME Int. Conf. on SYSTEMS THEORY and SCIENTIFIC COMPUTATION, Malta, Setember 15-17, 2005 (38-43) Research of PMU Otimal Placement in Power Systems TIAN-TIAN CAI, QIAN AI
More informationAI*IA 2003 Fusion of Multiple Pattern Classifiers PART III
AI*IA 23 Fusion of Multile Pattern Classifiers PART III AI*IA 23 Tutorial on Fusion of Multile Pattern Classifiers by F. Roli 49 Methods for fusing multile classifiers Methods for fusing multile classifiers
More informationOn Code Design for Simultaneous Energy and Information Transfer
On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Email: anshoo@nus.edu.sg Mehul Motani Electrical and Comuter
More informationA Simple Weight Decay Can Improve. Abstract. It has been observed in numerical simulations that a weight decay can improve
In Advances in Neural Information Processing Systems 4, J.E. Moody, S.J. Hanson and R.P. Limann, eds. Morgan Kaumann Publishers, San Mateo CA, 1995,. 950{957. A Simle Weight Decay Can Imrove Generalization
More informationA Bound on the Error of Cross Validation Using the Approximation and Estimation Rates, with Consequences for the Training-Test Split
A Bound on the Error of Cross Validation Using the Aroximation and Estimation Rates, with Consequences for the Training-Test Slit Michael Kearns AT&T Bell Laboratories Murray Hill, NJ 7974 mkearns@research.att.com
More informationTopic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar
15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider
More informationExamples from Elements of Theory of Computation. Abstract. Introduction
Examles from Elements of Theory of Comutation Mostafa Ghandehari Samee Ullah Khan Deartment of Comuter Science and Engineering University of Texas at Arlington, TX-7609, USA Tel: +(87)7-5688, Fax: +(87)7-784
More information16. Binary Search Trees
Dictionary imlementation 16. Binary Search Trees [Ottman/Widmayer, Ka..1, Cormen et al, Ka. 1.1-1.] Hashing: imlementation of dictionaries with exected very fast access times. Disadvantages of hashing:
More informationVerifying Two Conjectures on Generalized Elite Primes
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 12 (2009), Article 09.4.7 Verifying Two Conjectures on Generalized Elite Primes Xiaoqin Li 1 Mathematics Deartment Anhui Normal University Wuhu 241000,
More informationGeneration of Linear Models using Simulation Results
4. IMACS-Symosium MATHMOD, Wien, 5..003,. 436-443 Generation of Linear Models using Simulation Results Georg Otte, Sven Reitz, Joachim Haase Fraunhofer Institute for Integrated Circuits, Branch Lab Design
More informationDMS: Distributed Sparse Tensor Factorization with Alternating Least Squares
DMS: Distributed Sarse Tensor Factorization with Alternating Least Squares Shaden Smith, George Karyis Deartment of Comuter Science and Engineering, University of Minnesota {shaden, karyis}@cs.umn.edu
More informationMulti-Operation Multi-Machine Scheduling
Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job
More informationDIFFERENTIAL evolution (DE) [3] has become a popular
Self-adative Differential Evolution with Neighborhood Search Zhenyu Yang, Ke Tang and Xin Yao Abstract In this aer we investigate several self-adative mechanisms to imrove our revious work on [], which
More information16. Binary Search Trees
Dictionary imlementation 16. Binary Search Trees [Ottman/Widmayer, Ka..1, Cormen et al, Ka. 12.1-12.] Hashing: imlementation of dictionaries with exected very fast access times. Disadvantages of hashing:
More informationGOOD MODELS FOR CUBIC SURFACES. 1. Introduction
GOOD MODELS FOR CUBIC SURFACES ANDREAS-STEPHAN ELSENHANS Abstract. This article describes an algorithm for finding a model of a hyersurface with small coefficients. It is shown that the aroach works in
More informationEigenanalysis of Finite Element 3D Flow Models by Parallel Jacobi Davidson
Eigenanalysis of Finite Element 3D Flow Models by Parallel Jacobi Davidson Luca Bergamaschi 1, Angeles Martinez 1, Giorgio Pini 1, and Flavio Sartoretto 2 1 Diartimento di Metodi e Modelli Matematici er
More informationUPPAAL tutorial What s inside UPPAAL The UPPAAL input languages
UPPAAL tutorial What s inside UPPAAL The UPPAAL inut languages 1 UPPAAL tool Develoed jointly by Usala & Aalborg University >>8,000 downloads since 1999 1 UPPAAL Tool Simulation Modeling Verification 3
More informationBond Computing Systems: a Biologically Inspired and High-level Dynamics Model for Pervasive Computing
Bond Comuting Systems: a Biologically Insired and High-level Dynamics Model for Pervasive Comuting Linmin Yang 1, Zhe Dang 1, and Oscar H. Ibarra 2 1 School of Electrical Engineering and Comuter Science
More informationFormal Modeling in Cognitive Science Lecture 29: Noisy Channel Model and Applications;
Formal Modeling in Cognitive Science Lecture 9: and ; ; Frank Keller School of Informatics University of Edinburgh keller@inf.ed.ac.uk Proerties of 3 March, 6 Frank Keller Formal Modeling in Cognitive
More informationDetermining Momentum and Energy Corrections for g1c Using Kinematic Fitting
CLAS-NOTE 4-17 Determining Momentum and Energy Corrections for g1c Using Kinematic Fitting Mike Williams, Doug Alegate and Curtis A. Meyer Carnegie Mellon University June 7, 24 Abstract We have used the
More information