A Parallel Algorithm for Minimization of Finite Automata

Size: px
Start display at page:

Download "A Parallel Algorithm for Minimization of Finite Automata"

Transcription

1 A Parallel Algorithm for Minimization of Finite Automata B. Ravikumar X. Xiong Deartment of Comuter Science University of Rhode Island Kingston, RI Abstract In this aer, we resent a arallel algorithm for the minimization of deterministic finite state automata (DFA's) and discuss its imlementation on a connection machine CM-5 using data arallel and message assing models. We show that its time comlexity on a rocessor EREW PRAM ( n) for inuts of size + log n log ) uniformly on almost all instances. The work done by our algorithm is thus within a factor of O(log n) of the best known sequential algorithm. The sace used by our algorithm is linear in the inut size. The actual resource requirements of our imlementations are consistent with these estimates. Although arallel algorithms have been roosed for this roblem in the ast, they are not ractical. We discuss the imlementation details and the exerimental results. n is O( n log2 n 1. Introduction Finite state machines are of fundamental imortance in theory as well as alications. Their alications range from classical ones such as comilers and sequential circuits to recent alications including neural networks, hidden Markov models, hyertext meta languages and rotocol verification. A central roblem in automata theory is to minimize a given Deterministic Finite Automaton (DFA). This roblem has a long history going back to the origins of automata theory. Huffman [7] and Moore [11] resented an algorithm for DFA minimization in 1950's. Their algorithm runs in time O(n 2 ) on DFA's with n state and was adequate for most of the classical alications. Many variations of this algorithm have aeared over the years; see [14] for a comrehensive summary. Hocroft [5] develoed a significantly faster algorithm of time comlexity O(n log n). Although Hocroft's algorithm is very efficient in ractice, it can' t handle DFA's with millions of states. But there are many alications involving such large DFA's. A arallel algorithm can handle such instances since the combined memory size of the rocessors is adequate to store and rocess such large DFA's. This work is art of a collection of arallel rograms we are develoing for many comutation-intensive testing roblems involving DFA's. we will briefly review the revious work on the design of arallel algorithms for DFA minimization roblem. The roblem has been studied extensively, [10, 12, 9, 2] etc. JáJá and Kosaraju [9] studied the secial case in which the inut alhabet size is 1 on a mesh-connected arallel comuter and obtained an efficient algorithm. Cho and Huynh [2] showed that the roblem is in NC 2 and that it is NLOGSPACEcomlete. The algorithm of [12] alies only to the case in which the inut alhabet is of size 1. In this case, the most efficient algorithm is due to JáJá and Ryu [10] which is a CRCW-PRAM algorithm of time comlexity O(log n) and total work O(n log log n). When the inut alhabet is of size greater than 1, no efficient arallel algorithm (i.e., one of time comlexity O(log k n)forsomefixedk) is known with a `reasonable' total work (say, O(n 2 ) or below). In fact, the only ublished NC algorithm for this roblem is due to [2] which has a time comlexity O(log 2 n) but requires (n 6 ) rocessors.

2 This aer differs from the work mentioned above in two ways: (i) Our goal is to imlement arallel algorithms for DFA minimization on actual arallel machines. (ii) Our figure of merit is the average case erformance, not the worst-case erformance. Here we reort on the imlementation of rograms for minimizing DFA's (with unrestricted inut alhabet size) on a CM-5 connection machine with 512 rocessors. We imlemented two classes of algorithms - one based on data arallel rogramming and the other based on message assing. Our rograms erform well in ractice They can minimize `tyical' DFA's with millions of states in a few minutes and their scalability is good. The rimary reason for their success is that they have very good erformance on almost all instances. We formally establish this using a robabilistic model of Traktenbrot and Barzdin. We also discuss the imlementation details and the exeriments we conducted with our rograms. We conclude with some new questions that arise from our study. In this abridged version, we omit the roofs of all the claims. They can be found in the full version. 2. Preliminaries We assume familiarity with basic concets about finite automata. To fix the notation, however, we will briefly introduce some of the central notions. For details, we refer the reader to [6]. A DFA M consists of a finite set Q of states, a finite inut alhabet, a start state q 0 2 Q and a set F Q of acceting states, and the transition function : Q! Q. An inut string x is a sequence of symbols over. On an inut string x = x 1 x 2 :::x m, the DFA will visit a sequence of states q 0 q 1 :::q m starting with the start state by successively alying the transition function. Thus q 1 = (q 0 ;x 1 ), q 2 = (q 1 ;x 2 ) etc. The language L(M ) acceted by a DFA is defined as the set of strings x that take the DFA to an acceting state. I.e., x will be in L(M ) if and only if q m 2 F. Such languages are called regular languages, a well-understood and imortant class. Two DFA's M 1 and M 2 are said to be equivalent if they accet the same set of strings. It is common to resent DFA minimization as an equivalent roblem called the coarsest set artition roblem [1] which is stated as follows: Given a set Q, an initial artition of Q into disjoint blocks fb 0 ; :::; B m 1 g, and a collection of functions f i : Q! Q, find the coarsest (having fewest blocks) artition of Q say fe 1 ;E 2 ; :::; E q g such that: (1) the final artition is consistent with the initial artition, i.e., each E i is a subset of some B j and (2) a and b in E i imlies for all j, f j (a) and f j (b) are in the same block E k. The connection to minimization of DFA is the following. Q is the set of states, f i is the ma induced by the symbol a i (this means, (q; a i )= f i (q)), the initial artition is the one that artitions Q into two sets, F the set of acceting states and QnF the nonacceting ones. It should be clear that the size of the minimal DFA is the number of equivalence classes in the coarsest artition. In the following, we will assume that the inut is a DFA with n states defined over a k-letter alhabet in which every state is reachable from the start state. This assumtion simlifies the resentation of our algorithm; otherwise a rerocessing ste should be added to delete the unreachable state. 3. Parallel Algorithm and Its Analysis A high level descrition of our arallel algorithm is given below: Algorithm ParallelMin1 inut: DF A with n states, k inuts, 2 blocks B 0;B 1. outut: minimized DF A. begin do for i =0to k 1 do for j =0to n 1 do in arallel Get the block number B of state q j; Get the block number B 0 of the state (q j;x i), label the state q j with the air (B; B 0 ); Re-arrange (e.g. by arallel sorting) the states into blocks so that the states with the same labels are contiguous; end arallel for; Assign to all states in the same block a new (unique) block number in arallel; end for; until no new block roduced; Deduce the minimal DFA from the final artition; end. The outer loo of the above algorithm aears inherently sequential and it seems very hard to arallelize it significantly. But this is not of great concern since exeriments show that the total number of iterations of the outer loo is very small (usually less than

3 10) for all the DFA's we tested of sizes ranging from 4 thousands to more than 1 million. This relative invariance of the number of iterations can be exlained theoretically; see the discussion below. Thus, in ractice, there is no real gain in attemting to arallelize the outer loo. In the remainder of this section, we will mainly discuss the high-level details of imlementing the above arallel algorithm on EREW-PRAM model and resent an analysis that holds for almost all instances in a recise sense. We start with a brief descrition of the model due to Traktenbrot and Barzdin [13]. Our notation will be similar to the one used by [3] who adated Traktenbrot-Barzdin model in their study of assive learning algorithms. Our model involves a slight generalization of theirs. Basically, the robability sace on which we base our average case is narrowed by fixing a DFA G arbitrarily excet for its set of acceting states. Thus an adversary can choose G (called the automaton grah) subject to the only condition that all states are reachable from the start state. The robability distribution is defined over all DFA's M G which can be derived from this automaton grah by randomly selecting the set F of acceting states. In our model, we will allow each state to be included in F indeendently with robability ( can be a function of n). Let P n;"; be any redicate on an n-state automaton which deends on n, a confidence arameter " (where 0 " 1) and (defined above). We say that uniformly almost all automata have roerty P n;"; if the following holds: for all " > 0, foralln > 0 and for any n-state underlying automaton grah G, if we randomly choose the set of acceting states where each state is included indeendently with robability, then with robability at least 1 ", the redicate P n;"; holds. Let M= < Q; ;q 0 ;;F > be a DFA. The outut associated with a string x = x 1 :::x m from state q defined as the sequence y 0 :::y m where y i = 1 if the state reached (starting at q) after alying the refix x 1 :::x i is an acceting state, 0 otherwise. (Note that y 0 is 1 or 0 according as q is acceting or not.) We denote this outut by q < x >. A string x 2 is a distinguishing string for q i and q j if q i <x>6=q j <x>. Finally define d(q i ;q j )as the length of the shortest distinguishing string for the states q i and q j.wearenow ready to resent our results about the exected erformance of ParallelMin1. In the following, lg will denote logarithm to base 2. Lemma 1. For uniformly almost all automata with n states, every air of states has a distinguishing string of length at most 2lg( n2 " ) 1 lg( ) : 1 2(1 ) Our next result resents the average time comlexity (in the above sense) of an EREW (exclusive-read, exclusive-write) PRAM imlementation of the arallel algorithm resented above. We will assume that the readers are familiar with the PRAM model. See [8] for a systematic treatment of the PRAM algorithms. Theorem 2. For uniformly almost all automata with n states, the algorithm ParallelMin1 can be imlemented on an EREW PRAM with q n rocessors with time n lg n lg(n comlexity O(k 2 =") +lgq lg n). The q lg(1=(1 2(1 ))) sace comlexity (= amount of shared memory used) is O(n). Thus the total work done by the algorithm is O(n log 2 n) if and k are constants. The next result exlains why Hocroft's algorithm does not arallelize well. Theorem 3. Let Q 0 be the set of states of a DFA after minimization, and i the iteration number of the Hocroft's algorithm, then i jj(jq 0 j 1): 4. Imlementation as Data Parallel Program Data-arallelism is the arallelism achievable through the simultaneous execution of the same oeration across a set of data [4]. Since each oeration is alied simultaneously to the data, a data-arallel rogram has only one rogram counter and is characterized by the absence of multi-threaded execution which makes the design, imlementation and testing of rograms very difficult. Although data arallel rogramming was originally develoed for SIMD (or vector) hardware, it has become a successful aradigm in all tyes of arallel rocessing systems such as

4 shared-memory multirocessors, distributed memory machines, and networks of workstations. Since our arallel algorithm ParallelMin1 has a simle control structure and uses an uniform data structure (array), it is easy to imlement it as a data arallel rogram. We resent our data arallel version of the algorithm in the seudo code similar to C*, a data arallel extension of C rogramming language. We assume in our imlementation that the comutation begins with the inut DFA already stored as arallel variables. The data structures used are as follows. delta is an array of jj arallel variables, each is a arallel one of size n. The i-th element of the delta[j], [i]delta[j], stores the transition function of state i under inut symbol j (i.e., the next state of state i under inut symbol j, (i; j)), 0 i n 1, 0 j jj 1. block is a arallel variable to store artition numbers for all states. [i]block is the block number of state i. In ParallelMin2 below, statements like [arallel index]arallel var1 = arallel var2 are send oerations which send values of arallel variable (arallel var2) elements to other arallel variable (arallel var1) elements according to index maing arallel index. statements like arallel var1 =[arallel index]arallel var2 are get oerations which get values of arallel variable (arallel var1) elements from other arallel variable (arallel var2) elements. Algorithm ParallelMin2 inut: delta, array of arallel variables to store transition function; block, initial block numbers of the DFA; outut: block, (udated) block numbers denote state equivalence classes of the minimized DFA; begin q =2; do check =0; for k =0to jj 1do Get block numbers: stateindex = coord(0); fstateindex is used to kee track of movement of state indicesg outut[0] = block; outut[1] = [delta[k]]block; Sort according to oututs: sorted = rank(outut[0]); [sorted]stateindex = stateindex; [sorted]outut[0] = outut[0]; [sorted]outut[1] = outut[1]; sorted=rank(outut[1]); [sorted]stateindex = stateindex; [sorted]outut[0] = outut[0]; [sorted]outut[1]=outut[1]; Set new block names: link =0; where(outut[0]6=[.-1]outut[0]or outut[1]6=[.-1]outut[1]) link =1; newblock = refixsum(link); Check if new blocks roduced: if ( q equal to [n-1]newblock ) check++; continue; fconsistent for inut kg else [stateindex]block=newblock; q =[n-1]newblock; end of for; until (check equal to jj);fconsistent for all inutsg end. In our imlementation, sorting is done by finding ranks (a system library function) of elements and three get oerations to re-distribute them. The arallel refix comutation is erformed by a library function as well. The erformance characteristics of ParallelMin2 are discussed in section Imlementation as Message Passing Program Now we resent the message assing version of the basic arallel algorithm. It is a little more comlicated than the data arallel version because we have to control communication between rocessors exlicitly. Our aroach for storing the inut DFA is to divide the transition function and the final state information

5 equally among different rocessors. Storage of the intermediate results will also be distributed among the rocessors. This is a standard aroach used in distributed memory arallel algorithms. For simlicity, we assume that divides n, the number of states in the inut DFA. Processors will be identified by integers from 0 to 1. A detailed descrition of the various stes of this algorithm can be found in the full aer. Algorithm ParallelMin3 for the rocessor myadd inut: delta[0:: n 1] array to store art of the transition function. block[0:: n 1], initial block numbers of states stored in this rocessor. outut: (udated) block[0:: n 1] begin done = false; Initialization of indexedbuffer: indexedbuffer[0; 0:: n 1]= myadd n.. (myadd +1) n 1.Sofirstrowof indexedbuffer contains the state numbers associated with this rocessor. indexedbuffer[1; 0:: n 1] = block[0:: n 1], ut current block numbers of the states in this rocessor; Construct Message Passing Tables according to delta. These tables contain for each state q in the rocessor the address of the rocessor that contains (q; x j) and of the rocessors which contain the state(s) 1 (q; x j) for each j. while (not done) done = true; for k =0 to jj 1do Exchange oututs: All-to-all communication takes lace as follows: Suose a state s t belongs to a rocessor t and suose (s t;x j)belongs to myadd. The rocessor will send a message to t containing the block number of (s t;x j). The received messages will be ut the third row, namely indexedbuffer[2; 0::n= +1]. Parallel-sort: Sort indexedbuffer using the second and third row together as key. Note that After sorting, indexedbuffer's first row (state indices) may not be ordered and may not belong to this node. That is, the sorting will re-distribute data items. Rename blocks: If two states have the same `key', they are ut in the same block in the refined artition. Put new block numbers in indexedbuffer's second row. This is a global scanning oeration on indexedbuffer of all rocessors. Parallel-sort: Sort indexedbuffer using the first row as the key. This will bring the new block number of each state back to the rocessor to which it belongs. if (a new block roduced)done = false; end of for; end of while; block[0:: n end. 1]=indexedBuffer[1, 0:: n 6. Exerimental Results on CM-5 Next, we resent our exerimental results on CM-5. We ran the rograms described above for many DFA's of different sizes on a CM-5 with 32 nodes. Each node has 4 vector units. The instances of DFA's used in 1];

6 x : Message Passing o : Data Parallel Time (in Seconds) x : Message Passing o : Data Parallel Time (in Seconds) Size of DFAs Number of Processors Figure 2. Scalability Figure 1. Running Time vs. Problem Size this exeriment were constructed using four different methods. All of them have two inut symbols. In Figure 1, the number of rocessors is fixed at 32. When the inut size is less than about , the time comlexity is almost linear so that it takes about twice as much time to solve an instance twice as large. But when the inut size exceeds , nonlinearity shows u, esecially for the message assing rogram. To study the scalability of our rograms, we chose three DFA's (with , and states) and minimized them by using both rograms on a CM- 5 configured with 32, 64, 128 and 256 nodes. Figure 2 shows the results of average time. Both rograms seem to scale well; but the message assing rogram is the better one. 7. Acknowledgments Our rograms were imlemented and tested on a connection machine CM-5 at the National Center for Suercomuter Alications at Urbana-Chamaign. We thank A. Tridgell of Australian National University for his hel with the sorting routine used in the message assing rogram. References [1] A. Aho, J. Hocroft, and J. Ullman. The Design and Analysis of Algorithms. Addison-Wesley Publishing Co., Reading, MA, [2] S. Cho and D. Huynh. The arallel comlexity of coarsest set artition roblems. Information Processing Letters, 42:89 94, [3] Y. Freund et al. Efficient learning of tyical finite automata from random walks. In 25th ACM Symosium on Theory of Comuting, ages , [4] P. Hatcher and M. Quinn. Data-arallel Programming on MIMD Comuters. MIT Press, Cambridge, Mass., [5] J. Hocroft. An n log n algorithm for minimizing states in a finite automaton. In Theory of Machines and Comutations, ages Academic Press, New York, [6] J. Hocroft and J. Ullman. Introduction to Automata Theory, Languages and Comutation. Addison- Wesley Co., Reading, Mass., [7] D. Huffman. The synthesis of sequential switching circuits. Journal of Franklin Institute, 257(3): , [8] J. JáJá. An Introduction to Parallel Algorithms. Addison-Wesley Publishing Co., Reading, Mass., [9] J. JáJá and S. Kosaraju. Parallel algorithms for lanar grah isomorhism and related roblems. IEEE Transactions on Circuits and Systems, 35(3), March [10] J. JáJá and K. Ryu. An efficient arallel algorithm for the single function coarsest artition roblem. ACM Symosium on Parallel Algorithms and Architectures, [11] E. Moore. Gedanken-exeriments on sequential circuits. In C. Shannon and J. McCarthy, editors, Automata Studies, ages Princeton University Press, Princeton, NJ, [12] Y. Srikant. A arallel algorithm for the minimization of finite state automata. Intern. J. Comuter Math., 32:1 11, 1990.

7 [13] B. Trakhtenbrot and Y. Barzdin'. Finite Automata: Behavior and Synthesis. North-Holland Publishing Comany, [14] B. Watson. A taxonomy of finite automaton minimization algorithms. Technical reort, Faculty of Mathematics and Comuter Science, Eindhoven University of Technology, The Netherlands, 1994.

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca

More information

Matching Partition a Linked List and Its Optimization

Matching Partition a Linked List and Its Optimization Matching Partition a Linked List and Its Otimization Yijie Han Deartment of Comuter Science University of Kentucky Lexington, KY 40506 ABSTRACT We show the curve O( n log i + log (i) n + log i) for the

More information

Parallelism and Locality in Priority Queues. A. Ranade S. Cheng E. Deprit J. Jones S. Shih. University of California. Berkeley, CA 94720

Parallelism and Locality in Priority Queues. A. Ranade S. Cheng E. Deprit J. Jones S. Shih. University of California. Berkeley, CA 94720 Parallelism and Locality in Priority Queues A. Ranade S. Cheng E. Derit J. Jones S. Shih Comuter Science Division University of California Berkeley, CA 94720 Abstract We exlore two ways of incororating

More information

1-way quantum finite automata: strengths, weaknesses and generalizations

1-way quantum finite automata: strengths, weaknesses and generalizations 1-way quantum finite automata: strengths, weaknesses and generalizations arxiv:quant-h/9802062v3 30 Se 1998 Andris Ambainis UC Berkeley Abstract Rūsiņš Freivalds University of Latvia We study 1-way quantum

More information

Computer arithmetic. Intensive Computation. Annalisa Massini 2017/2018

Computer arithmetic. Intensive Computation. Annalisa Massini 2017/2018 Comuter arithmetic Intensive Comutation Annalisa Massini 7/8 Intensive Comutation - 7/8 References Comuter Architecture - A Quantitative Aroach Hennessy Patterson Aendix J Intensive Comutation - 7/8 3

More information

GIVEN an input sequence x 0,..., x n 1 and the

GIVEN an input sequence x 0,..., x n 1 and the 1 Running Max/Min Filters using 1 + o(1) Comarisons er Samle Hao Yuan, Member, IEEE, and Mikhail J. Atallah, Fellow, IEEE Abstract A running max (or min) filter asks for the maximum or (minimum) elements

More information

Analysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel

Analysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel Performance Analysis Introduction Analysis of execution time for arallel algorithm to dertmine if it is worth the effort to code and debug in arallel Understanding barriers to high erformance and redict

More information

Fuzzy Automata Induction using Construction Method

Fuzzy Automata Induction using Construction Method Journal of Mathematics and Statistics 2 (2): 395-4, 26 ISSN 1549-3644 26 Science Publications Fuzzy Automata Induction using Construction Method 1,2 Mo Zhi Wen and 2 Wan Min 1 Center of Intelligent Control

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

Feedback-error control

Feedback-error control Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu

More information

A generalization of Amdahl's law and relative conditions of parallelism

A generalization of Amdahl's law and relative conditions of parallelism A generalization of Amdahl's law and relative conditions of arallelism Author: Gianluca Argentini, New Technologies and Models, Riello Grou, Legnago (VR), Italy. E-mail: gianluca.argentini@riellogrou.com

More information

DFA Minimization in Map-Reduce

DFA Minimization in Map-Reduce DFA Minimization in Ma-Reduce Gösta Grahne Concordia University Montreal, Canada, H3G M8 grahne@cs.concordia.ca Shahab Harrafi Concordia University Montreal, Canada, H3G M8 s harraf@alumni.concordia.ca

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

1 1 c (a) 1 (b) 1 Figure 1: (a) First ath followed by salesman in the stris method. (b) Alternative ath. 4. D = distance travelled closing the loo. Th

1 1 c (a) 1 (b) 1 Figure 1: (a) First ath followed by salesman in the stris method. (b) Alternative ath. 4. D = distance travelled closing the loo. Th 18.415/6.854 Advanced Algorithms ovember 7, 1996 Euclidean TSP (art I) Lecturer: Michel X. Goemans MIT These notes are based on scribe notes by Marios Paaefthymiou and Mike Klugerman. 1 Euclidean TSP Consider

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning TNN-2009-P-1186.R2 1 Uncorrelated Multilinear Princial Comonent Analysis for Unsuervised Multilinear Subsace Learning Haiing Lu, K. N. Plataniotis and A. N. Venetsanooulos The Edward S. Rogers Sr. Deartment

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO) Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment

More information

LIMITATIONS OF RECEPTRON. XOR Problem The failure of the perceptron to successfully simple problem such as XOR (Minsky and Papert).

LIMITATIONS OF RECEPTRON. XOR Problem The failure of the perceptron to successfully simple problem such as XOR (Minsky and Papert). LIMITATIONS OF RECEPTRON XOR Problem The failure of the ercetron to successfully simle roblem such as XOR (Minsky and Paert). x y z x y z 0 0 0 0 0 0 Fig. 4. The exclusive-or logic symbol and function

More information

Radial Basis Function Networks: Algorithms

Radial Basis Function Networks: Algorithms Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.

More information

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:

More information

q-ary Symmetric Channel for Large q

q-ary Symmetric Channel for Large q List-Message Passing Achieves Caacity on the q-ary Symmetric Channel for Large q Fan Zhang and Henry D Pfister Deartment of Electrical and Comuter Engineering, Texas A&M University {fanzhang,hfister}@tamuedu

More information

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms

More information

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests 009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract

More information

Theory of Parallel Hardware May 11, 2004 Massachusetts Institute of Technology Charles Leiserson, Michael Bender, Bradley Kuszmaul

Theory of Parallel Hardware May 11, 2004 Massachusetts Institute of Technology Charles Leiserson, Michael Bender, Bradley Kuszmaul Theory of Parallel Hardware May 11, 2004 Massachusetts Institute of Technology 6.896 Charles Leiserson, Michael Bender, Bradley Kuszmaul Final Examination Final Examination ffl Do not oen this exam booklet

More information

A New Method of DDB Logical Structure Synthesis Using Distributed Tabu Search

A New Method of DDB Logical Structure Synthesis Using Distributed Tabu Search A New Method of DDB Logical Structure Synthesis Using Distributed Tabu Search Eduard Babkin and Margarita Karunina 2, National Research University Higher School of Economics Det of nformation Systems and

More information

Elliptic Curves and Cryptography

Elliptic Curves and Cryptography Ellitic Curves and Crytograhy Background in Ellitic Curves We'll now turn to the fascinating theory of ellitic curves. For simlicity, we'll restrict our discussion to ellitic curves over Z, where is a

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell October 25, 2009 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

PARALLEL MATRIX MULTIPLICATION: A SYSTEMATIC JOURNEY

PARALLEL MATRIX MULTIPLICATION: A SYSTEMATIC JOURNEY PARALLEL MATRIX MULTIPLICATION: A SYSTEMATIC JOURNEY MARTIN D SCHATZ, ROBERT A VAN DE GEIJN, AND JACK POULSON Abstract We exose a systematic aroach for develoing distributed memory arallel matrixmatrix

More information

PARALLEL MATRIX MULTIPLICATION: A SYSTEMATIC JOURNEY

PARALLEL MATRIX MULTIPLICATION: A SYSTEMATIC JOURNEY PARALLEL MATRIX MULTIPLICATION: A SYSTEMATIC JOURNEY MARTIN D SCHATZ, ROBERT A VAN DE GEIJN, AND JACK POULSON Abstract We exose a systematic aroach for develoing distributed memory arallel matrix matrix

More information

A randomized sorting algorithm on the BSP model

A randomized sorting algorithm on the BSP model A randomized sorting algorithm on the BSP model Alexandros V. Gerbessiotis a, Constantinos J. Siniolakis b a CS Deartment, New Jersey Institute of Technology, Newark, NJ 07102, USA b The American College

More information

State Estimation with ARMarkov Models

State Estimation with ARMarkov Models Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,

More information

Positive decomposition of transfer functions with multiple poles

Positive decomposition of transfer functions with multiple poles Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

New Schedulability Test Conditions for Non-preemptive Scheduling on Multiprocessor Platforms

New Schedulability Test Conditions for Non-preemptive Scheduling on Multiprocessor Platforms New Schedulability Test Conditions for Non-reemtive Scheduling on Multirocessor Platforms Technical Reort May 2008 Nan Guan 1, Wang Yi 2, Zonghua Gu 3 and Ge Yu 1 1 Northeastern University, Shenyang, China

More information

Cryptanalysis of Pseudorandom Generators

Cryptanalysis of Pseudorandom Generators CSE 206A: Lattice Algorithms and Alications Fall 2017 Crytanalysis of Pseudorandom Generators Instructor: Daniele Micciancio UCSD CSE As a motivating alication for the study of lattice in crytograhy we

More information

Linear diophantine equations for discrete tomography

Linear diophantine equations for discrete tomography Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,

More information

The Knuth-Yao Quadrangle-Inequality Speedup is a Consequence of Total-Monotonicity

The Knuth-Yao Quadrangle-Inequality Speedup is a Consequence of Total-Monotonicity The Knuth-Yao Quadrangle-Ineuality Seedu is a Conseuence of Total-Monotonicity Wolfgang W. Bein Mordecai J. Golin Lawrence L. Larmore Yan Zhang Abstract There exist several general techniues in the literature

More information

Solved Problems. (a) (b) (c) Figure P4.1 Simple Classification Problems First we draw a line between each set of dark and light data points.

Solved Problems. (a) (b) (c) Figure P4.1 Simple Classification Problems First we draw a line between each set of dark and light data points. Solved Problems Solved Problems P Solve the three simle classification roblems shown in Figure P by drawing a decision boundary Find weight and bias values that result in single-neuron ercetrons with the

More information

Finite-State Verification or Model Checking. Finite State Verification (FSV) or Model Checking

Finite-State Verification or Model Checking. Finite State Verification (FSV) or Model Checking Finite-State Verification or Model Checking Finite State Verification (FSV) or Model Checking Holds the romise of roviding a cost effective way of verifying imortant roerties about a system Not all faults

More information

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES AARON ZWIEBACH Abstract. In this aer we will analyze research that has been recently done in the field of discrete

More information

Outline. CS21 Decidability and Tractability. Regular expressions and FA. Regular expressions and FA. Regular expressions and FA

Outline. CS21 Decidability and Tractability. Regular expressions and FA. Regular expressions and FA. Regular expressions and FA Outline CS21 Decidability and Tractability Lecture 4 January 14, 2019 FA and Regular Exressions Non-regular languages: Puming Lemma Pushdown Automata Context-Free Grammars and Languages January 14, 2019

More information

Universal Finite Memory Coding of Binary Sequences

Universal Finite Memory Coding of Binary Sequences Deartment of Electrical Engineering Systems Universal Finite Memory Coding of Binary Sequences Thesis submitted towards the degree of Master of Science in Electrical and Electronic Engineering in Tel-Aviv

More information

Fault Tolerant Quantum Computing Robert Rogers, Thomas Sylwester, Abe Pauls

Fault Tolerant Quantum Computing Robert Rogers, Thomas Sylwester, Abe Pauls CIS 410/510, Introduction to Quantum Information Theory Due: June 8th, 2016 Sring 2016, University of Oregon Date: June 7, 2016 Fault Tolerant Quantum Comuting Robert Rogers, Thomas Sylwester, Abe Pauls

More information

Lilian Markenzon 1, Nair Maria Maia de Abreu 2* and Luciana Lee 3

Lilian Markenzon 1, Nair Maria Maia de Abreu 2* and Luciana Lee 3 Pesquisa Oeracional (2013) 33(1): 123-132 2013 Brazilian Oerations Research Society Printed version ISSN 0101-7438 / Online version ISSN 1678-5142 www.scielo.br/oe SOME RESULTS ABOUT THE CONNECTIVITY OF

More information

An Introduction To Range Searching

An Introduction To Range Searching An Introduction To Range Searching Jan Vahrenhold eartment of Comuter Science Westfälische Wilhelms-Universität Münster, Germany. Overview 1. Introduction: Problem Statement, Lower Bounds 2. Range Searching

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

Homework Set #3 Rates definitions, Channel Coding, Source-Channel coding

Homework Set #3 Rates definitions, Channel Coding, Source-Channel coding Homework Set # Rates definitions, Channel Coding, Source-Channel coding. Rates (a) Channels coding Rate: Assuming you are sending 4 different messages using usages of a channel. What is the rate (in bits

More information

Chapter 1: PROBABILITY BASICS

Chapter 1: PROBABILITY BASICS Charles Boncelet, obability, Statistics, and Random Signals," Oxford University ess, 0. ISBN: 978-0-9-0005-0 Chater : PROBABILITY BASICS Sections. What Is obability?. Exeriments, Outcomes, and Events.

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

Solution: (Course X071570: Stochastic Processes)

Solution: (Course X071570: Stochastic Processes) Solution I (Course X071570: Stochastic Processes) October 24, 2013 Exercise 1.1: Find all functions f from the integers to the real numbers satisfying f(n) = 1 2 f(n + 1) + 1 f(n 1) 1. 2 A secial solution

More information

ECE 534 Information Theory - Midterm 2

ECE 534 Information Theory - Midterm 2 ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You

More information

DRAFT - do not circulate

DRAFT - do not circulate An Introduction to Proofs about Concurrent Programs K. V. S. Prasad (for the course TDA383/DIT390) Deartment of Comuter Science Chalmers University Setember 26, 2016 Rough sketch of notes released since

More information

Parallel Quantum-inspired Genetic Algorithm for Combinatorial Optimization Problem

Parallel Quantum-inspired Genetic Algorithm for Combinatorial Optimization Problem Parallel Quantum-insired Genetic Algorithm for Combinatorial Otimization Problem Kuk-Hyun Han Kui-Hong Park Chi-Ho Lee Jong-Hwan Kim Det. of Electrical Engineering and Comuter Science, Korea Advanced Institute

More information

On the capacity of the general trapdoor channel with feedback

On the capacity of the general trapdoor channel with feedback On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:

More information

Adaptive estimation with change detection for streaming data

Adaptive estimation with change detection for streaming data Adative estimation with change detection for streaming data A thesis resented for the degree of Doctor of Philosohy of the University of London and the Diloma of Imerial College by Dean Adam Bodenham Deartment

More information

DETC2003/DAC AN EFFICIENT ALGORITHM FOR CONSTRUCTING OPTIMAL DESIGN OF COMPUTER EXPERIMENTS

DETC2003/DAC AN EFFICIENT ALGORITHM FOR CONSTRUCTING OPTIMAL DESIGN OF COMPUTER EXPERIMENTS Proceedings of DETC 03 ASME 003 Design Engineering Technical Conferences and Comuters and Information in Engineering Conference Chicago, Illinois USA, Setember -6, 003 DETC003/DAC-48760 AN EFFICIENT ALGORITHM

More information

On the Chvatál-Complexity of Knapsack Problems

On the Chvatál-Complexity of Knapsack Problems R u t c o r Research R e o r t On the Chvatál-Comlexity of Knasack Problems Gergely Kovács a Béla Vizvári b RRR 5-08, October 008 RUTCOR Rutgers Center for Oerations Research Rutgers University 640 Bartholomew

More information

2-D Analysis for Iterative Learning Controller for Discrete-Time Systems With Variable Initial Conditions Yong FANG 1, and Tommy W. S.

2-D Analysis for Iterative Learning Controller for Discrete-Time Systems With Variable Initial Conditions Yong FANG 1, and Tommy W. S. -D Analysis for Iterative Learning Controller for Discrete-ime Systems With Variable Initial Conditions Yong FANG, and ommy W. S. Chow Abstract In this aer, an iterative learning controller alying to linear

More information

John Weatherwax. Analysis of Parallel Depth First Search Algorithms

John Weatherwax. Analysis of Parallel Depth First Search Algorithms Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel

More information

Deriving Indicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V.

Deriving Indicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V. Deriving ndicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V. Deutsch Centre for Comutational Geostatistics Deartment of Civil &

More information

Brownian Motion and Random Prime Factorization

Brownian Motion and Random Prime Factorization Brownian Motion and Random Prime Factorization Kendrick Tang June 4, 202 Contents Introduction 2 2 Brownian Motion 2 2. Develoing Brownian Motion.................... 2 2.. Measure Saces and Borel Sigma-Algebras.........

More information

ADAPTIVE CONTROL METHODS FOR EXCITED SYSTEMS

ADAPTIVE CONTROL METHODS FOR EXCITED SYSTEMS ADAPTIVE CONTROL METHODS FOR NON-LINEAR SELF-EXCI EXCITED SYSTEMS by Michael A. Vaudrey Dissertation submitted to the Faculty of the Virginia Polytechnic Institute and State University in artial fulfillment

More information

On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm

On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm Gabriel Noriega, José Restreo, Víctor Guzmán, Maribel Giménez and José Aller Universidad Simón Bolívar Valle de Sartenejas,

More information

5. PRESSURE AND VELOCITY SPRING Each component of momentum satisfies its own scalar-transport equation. For one cell:

5. PRESSURE AND VELOCITY SPRING Each component of momentum satisfies its own scalar-transport equation. For one cell: 5. PRESSURE AND VELOCITY SPRING 2019 5.1 The momentum equation 5.2 Pressure-velocity couling 5.3 Pressure-correction methods Summary References Examles 5.1 The Momentum Equation Each comonent of momentum

More information

Recursive Estimation of the Preisach Density function for a Smart Actuator

Recursive Estimation of the Preisach Density function for a Smart Actuator Recursive Estimation of the Preisach Density function for a Smart Actuator Ram V. Iyer Deartment of Mathematics and Statistics, Texas Tech University, Lubbock, TX 7949-142. ABSTRACT The Preisach oerator

More information

The non-stochastic multi-armed bandit problem

The non-stochastic multi-armed bandit problem Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at

More information

AR PROCESSES AND SOURCES CAN BE RECONSTRUCTED FROM. Radu Balan, Alexander Jourjine, Justinian Rosca. Siemens Corporation Research

AR PROCESSES AND SOURCES CAN BE RECONSTRUCTED FROM. Radu Balan, Alexander Jourjine, Justinian Rosca. Siemens Corporation Research AR PROCESSES AND SOURCES CAN BE RECONSTRUCTED FROM DEGENERATE MIXTURES Radu Balan, Alexander Jourjine, Justinian Rosca Siemens Cororation Research 7 College Road East Princeton, NJ 8 fradu,jourjine,roscag@scr.siemens.com

More information

Multilayer Perceptron Neural Network (MLPs) For Analyzing the Properties of Jordan Oil Shale

Multilayer Perceptron Neural Network (MLPs) For Analyzing the Properties of Jordan Oil Shale World Alied Sciences Journal 5 (5): 546-552, 2008 ISSN 1818-4952 IDOSI Publications, 2008 Multilayer Percetron Neural Network (MLPs) For Analyzing the Proerties of Jordan Oil Shale 1 Jamal M. Nazzal, 2

More information

Combinatorics of topmost discs of multi-peg Tower of Hanoi problem

Combinatorics of topmost discs of multi-peg Tower of Hanoi problem Combinatorics of tomost discs of multi-eg Tower of Hanoi roblem Sandi Klavžar Deartment of Mathematics, PEF, Unversity of Maribor Koroška cesta 160, 000 Maribor, Slovenia Uroš Milutinović Deartment of

More information

Calculation of MTTF values with Markov Models for Safety Instrumented Systems

Calculation of MTTF values with Markov Models for Safety Instrumented Systems 7th WEA International Conference on APPLIE COMPUTE CIENCE, Venice, Italy, November -3, 7 3 Calculation of MTTF values with Markov Models for afety Instrumented ystems BÖCÖK J., UGLJEA E., MACHMU. University

More information

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle]

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle] Chater 5 Model checking, verification of CTL One must verify or exel... doubts, and convert them into the certainty of YES or NO. [Thomas Carlyle] 5. The verification setting Page 66 We introduce linear

More information

Observer/Kalman Filter Time Varying System Identification

Observer/Kalman Filter Time Varying System Identification Observer/Kalman Filter Time Varying System Identification Manoranjan Majji Texas A&M University, College Station, Texas, USA Jer-Nan Juang 2 National Cheng Kung University, Tainan, Taiwan and John L. Junins

More information

Rotations in Curved Trajectories for Unconstrained Minimization

Rotations in Curved Trajectories for Unconstrained Minimization Rotations in Curved rajectories for Unconstrained Minimization Alberto J Jimenez Mathematics Deartment, California Polytechnic University, San Luis Obiso, CA, USA 9407 Abstract Curved rajectories Algorithm

More information

An Ant Colony Optimization Approach to the Probabilistic Traveling Salesman Problem

An Ant Colony Optimization Approach to the Probabilistic Traveling Salesman Problem An Ant Colony Otimization Aroach to the Probabilistic Traveling Salesman Problem Leonora Bianchi 1, Luca Maria Gambardella 1, and Marco Dorigo 2 1 IDSIA, Strada Cantonale Galleria 2, CH-6928 Manno, Switzerland

More information

Probability Estimates for Multi-class Classification by Pairwise Coupling

Probability Estimates for Multi-class Classification by Pairwise Coupling Probability Estimates for Multi-class Classification by Pairwise Couling Ting-Fan Wu Chih-Jen Lin Deartment of Comuter Science National Taiwan University Taiei 06, Taiwan Ruby C. Weng Deartment of Statistics

More information

One step ahead prediction using Fuzzy Boolean Neural Networks 1

One step ahead prediction using Fuzzy Boolean Neural Networks 1 One ste ahead rediction using Fuzzy Boolean eural etworks 1 José A. B. Tomé IESC-ID, IST Rua Alves Redol, 9 1000 Lisboa jose.tome@inesc-id.t João Paulo Carvalho IESC-ID, IST Rua Alves Redol, 9 1000 Lisboa

More information

Research of PMU Optimal Placement in Power Systems

Research of PMU Optimal Placement in Power Systems Proceedings of the 5th WSEAS/IASME Int. Conf. on SYSTEMS THEORY and SCIENTIFIC COMPUTATION, Malta, Setember 15-17, 2005 (38-43) Research of PMU Otimal Placement in Power Systems TIAN-TIAN CAI, QIAN AI

More information

AI*IA 2003 Fusion of Multiple Pattern Classifiers PART III

AI*IA 2003 Fusion of Multiple Pattern Classifiers PART III AI*IA 23 Fusion of Multile Pattern Classifiers PART III AI*IA 23 Tutorial on Fusion of Multile Pattern Classifiers by F. Roli 49 Methods for fusing multile classifiers Methods for fusing multile classifiers

More information

On Code Design for Simultaneous Energy and Information Transfer

On Code Design for Simultaneous Energy and Information Transfer On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Email: anshoo@nus.edu.sg Mehul Motani Electrical and Comuter

More information

A Simple Weight Decay Can Improve. Abstract. It has been observed in numerical simulations that a weight decay can improve

A Simple Weight Decay Can Improve. Abstract. It has been observed in numerical simulations that a weight decay can improve In Advances in Neural Information Processing Systems 4, J.E. Moody, S.J. Hanson and R.P. Limann, eds. Morgan Kaumann Publishers, San Mateo CA, 1995,. 950{957. A Simle Weight Decay Can Imrove Generalization

More information

A Bound on the Error of Cross Validation Using the Approximation and Estimation Rates, with Consequences for the Training-Test Split

A Bound on the Error of Cross Validation Using the Approximation and Estimation Rates, with Consequences for the Training-Test Split A Bound on the Error of Cross Validation Using the Aroximation and Estimation Rates, with Consequences for the Training-Test Slit Michael Kearns AT&T Bell Laboratories Murray Hill, NJ 7974 mkearns@research.att.com

More information

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar 15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider

More information

Examples from Elements of Theory of Computation. Abstract. Introduction

Examples from Elements of Theory of Computation. Abstract. Introduction Examles from Elements of Theory of Comutation Mostafa Ghandehari Samee Ullah Khan Deartment of Comuter Science and Engineering University of Texas at Arlington, TX-7609, USA Tel: +(87)7-5688, Fax: +(87)7-784

More information

16. Binary Search Trees

16. Binary Search Trees Dictionary imlementation 16. Binary Search Trees [Ottman/Widmayer, Ka..1, Cormen et al, Ka. 1.1-1.] Hashing: imlementation of dictionaries with exected very fast access times. Disadvantages of hashing:

More information

Verifying Two Conjectures on Generalized Elite Primes

Verifying Two Conjectures on Generalized Elite Primes 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 12 (2009), Article 09.4.7 Verifying Two Conjectures on Generalized Elite Primes Xiaoqin Li 1 Mathematics Deartment Anhui Normal University Wuhu 241000,

More information

Generation of Linear Models using Simulation Results

Generation of Linear Models using Simulation Results 4. IMACS-Symosium MATHMOD, Wien, 5..003,. 436-443 Generation of Linear Models using Simulation Results Georg Otte, Sven Reitz, Joachim Haase Fraunhofer Institute for Integrated Circuits, Branch Lab Design

More information

DMS: Distributed Sparse Tensor Factorization with Alternating Least Squares

DMS: Distributed Sparse Tensor Factorization with Alternating Least Squares DMS: Distributed Sarse Tensor Factorization with Alternating Least Squares Shaden Smith, George Karyis Deartment of Comuter Science and Engineering, University of Minnesota {shaden, karyis}@cs.umn.edu

More information

Multi-Operation Multi-Machine Scheduling

Multi-Operation Multi-Machine Scheduling Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job

More information

DIFFERENTIAL evolution (DE) [3] has become a popular

DIFFERENTIAL evolution (DE) [3] has become a popular Self-adative Differential Evolution with Neighborhood Search Zhenyu Yang, Ke Tang and Xin Yao Abstract In this aer we investigate several self-adative mechanisms to imrove our revious work on [], which

More information

16. Binary Search Trees

16. Binary Search Trees Dictionary imlementation 16. Binary Search Trees [Ottman/Widmayer, Ka..1, Cormen et al, Ka. 12.1-12.] Hashing: imlementation of dictionaries with exected very fast access times. Disadvantages of hashing:

More information

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction GOOD MODELS FOR CUBIC SURFACES ANDREAS-STEPHAN ELSENHANS Abstract. This article describes an algorithm for finding a model of a hyersurface with small coefficients. It is shown that the aroach works in

More information

Eigenanalysis of Finite Element 3D Flow Models by Parallel Jacobi Davidson

Eigenanalysis of Finite Element 3D Flow Models by Parallel Jacobi Davidson Eigenanalysis of Finite Element 3D Flow Models by Parallel Jacobi Davidson Luca Bergamaschi 1, Angeles Martinez 1, Giorgio Pini 1, and Flavio Sartoretto 2 1 Diartimento di Metodi e Modelli Matematici er

More information

UPPAAL tutorial What s inside UPPAAL The UPPAAL input languages

UPPAAL tutorial What s inside UPPAAL The UPPAAL input languages UPPAAL tutorial What s inside UPPAAL The UPPAAL inut languages 1 UPPAAL tool Develoed jointly by Usala & Aalborg University >>8,000 downloads since 1999 1 UPPAAL Tool Simulation Modeling Verification 3

More information

Bond Computing Systems: a Biologically Inspired and High-level Dynamics Model for Pervasive Computing

Bond Computing Systems: a Biologically Inspired and High-level Dynamics Model for Pervasive Computing Bond Comuting Systems: a Biologically Insired and High-level Dynamics Model for Pervasive Comuting Linmin Yang 1, Zhe Dang 1, and Oscar H. Ibarra 2 1 School of Electrical Engineering and Comuter Science

More information

Formal Modeling in Cognitive Science Lecture 29: Noisy Channel Model and Applications;

Formal Modeling in Cognitive Science Lecture 29: Noisy Channel Model and Applications; Formal Modeling in Cognitive Science Lecture 9: and ; ; Frank Keller School of Informatics University of Edinburgh keller@inf.ed.ac.uk Proerties of 3 March, 6 Frank Keller Formal Modeling in Cognitive

More information

Determining Momentum and Energy Corrections for g1c Using Kinematic Fitting

Determining Momentum and Energy Corrections for g1c Using Kinematic Fitting CLAS-NOTE 4-17 Determining Momentum and Energy Corrections for g1c Using Kinematic Fitting Mike Williams, Doug Alegate and Curtis A. Meyer Carnegie Mellon University June 7, 24 Abstract We have used the

More information