Top K Nearest Keyword Search on Large Graphs

Size: px
Start display at page:

Download "Top K Nearest Keyword Search on Large Graphs"

Transcription

1 Top K Neaest Keywod Seach on Lage Gaphs Miao Qiao, Lu Qin, Hong Cheng, Jeffey Xu Yu, Wentao Tian The Chinese Univesity of Hong Kong, Hong Kong, China {mqiao,lqin,hcheng,yu,wttian}@se.cuhk.edu.hk ABSTRACT It is quite common fo netwoks emeging nowadays to have labels o textual contents on the nodes. On such netwoks, we study the poblem of top-k neaest keywod (k-nk) seach. In a netwok G modeled as an undiected gaph, each node is attached with zeo o moe keywods, and each edge is assigned with a weight measuing its length. Given a quey node q in G and a keywod, a k-nk quey seeks k nodes which contain and ae neaest to q. k-nk is not only useful as a stand-alone quey but also as a building block fo tackling complex gaph patten matching poblems. The key to an accuate k-nk esult is a pecise shotest distance estimation in a gaph. Based on the latest distance oacle technique, we build a shotest path tee fo a distance oacle and use the tee distance as a moe accuate estimation. With such epesentation, the oiginal k-nk quey on a gaph can be educed to answeing the quey on a set of tees and then assembling the esults obtained fom the tees. We popose two efficient algoithms to epot the exact k-nk esult on a tee. One is quey time optimized fo a scenaio when a small numbe of esult nodes ae of inteest to uses. The othe handles k-nk queies fo an abitaily lage k efficiently. In obtaining a k-nk esult on a gaph fom that on tees, a global stoage technique is poposed to futhe educe the index size and the quey time. Extensive expeimental esults confom with ou theoetical findings, and demonstate the effectiveness and efficiency of ou k-nk algoithms on lage eal gaphs.. INTRODUCTION Many eal-wold netwoks emeging nowadays have labels o textual contents on the nodes. Fo example in a oad netwok, a location may have labels such as McDonald s, hospital, and kindegaten. In a social netwok, a peson may have infomation including name, inteests and skills, etc.. In a bibliogaphic netwok, a pape may have keywods and abstact, and an autho may have name, affiliation and addess. In this study, we conside the poblem of top-k neaest keywod (k-nk) seach on lage netwoks. In a netwok G modeled as an undiected gaph, each node is attached with zeo o moe keywods, and each edge is assigned with a weight measuing its length. Given a quey node Pemission to make digital o had copies of all o pat of this wok fo pesonal o classoom use is ganted without fee povided that copies ae not made o distibuted fo pofit o commecial advantage and that copies bea this notice and the full citation on the fist page. To copy othewise, to epublish, to post on seves o to edistibute to lists, equies pio specific pemission and/o a fee. Aticles fom this volume wee invited to pesent thei esults at The 9th Intenational Confeence on Vey Lage Data Bases, August 6th 0th 0, Riva del Gada, Tento, Italy. Poceedings of the VLDB Endowment, Vol. 6, No. 0 Copyight 0 VLDB Endowment //0... $ q in G and a keywod, a k-nk quey in the fom of Q = (q,, k) looks fo k nodes which contain and ae neaest to q. Diffeent fom a lage body of eseach on k-neaest neighbo (k-nn) seach on spatial netwoks [,, 6, 8, 9, 7], we define G as a geneal gaph without coodinates. Thus ou solution can apply to a wide ange of netwoks. Motivation. k-nk is an impotant and useful quey in gaph seach. As a stand-alone quey, it has a wide ange of applications. Futhemoe, it can seve as a building block fo tackling complex gaph patten matching poblems which impose both stuctual and textual constaints. Hee we list a few applications of k-nk queies. Conside the social netwok Facebook as an example, in which pesonalized seach based on gaph stuctue and textual contents has become inceasingly popula. A peson looks fo 0 fiends o potential fiends who like hiking to paticipate in a hiking activity. Intuitively, if two pesons shae some common fiends, i.e., they ae two hops away, they ae moe likely to become fiends. In contast, if they ae fa away fom each othe in the netwok, they ae less likely to establish a link. Thus the poblem is to find 0 pesons who like hiking and ae neaest to the peson who seves as the oganize. It can be answeed by a k-nk quey. Moe geneally, we also conside a quey containing multiple keywods connected by AND o OR opeatos to expess moe complex semantics, e.g., a peson looks fo k fiends o potential fiends who like hiking AND (OR) photogaphy and ae neaest to him. Take a oad netwok with locations associated with keywods as anothe example. Fo paents looking fo k kindegatens neaest to thei home fo thei childen, thei equiements can be expessed by a k-nk quey whee the quey node is the home location, and the keywod is kindegaten. In the thid example, we show how k-nk queies seve as a building block fo solving the gaph patten matching poblem. Conside a couple who wants to buy a house. They have some constaints like having a kindegaten and a hospital within km, and a supemaket within km of thei home. These constaints can be expessed as a sta patten, and the patten matching poblem can be decomposed into thee k-nk queies with keywods kindegaten, hospital and supemaket espectively and k = fo each potential house location to be consideed. Recently, Bahmani and Goel [] have designed a Patitioned Multi-Indexing () scheme to answe k-nk queies appoximately. is an inveted index built based on distance oacle [0] which is a distance estimation technique. Given a k-nk quey Q = (q,, k), it etuns k nodes containing keywod in ascending ode of thei appoximate distance fom the quey node q. inheits the log V appoximation facto fo distance estimation fom distance oacle [0], whee V is the set of nodes in the

2 gaph. The majo dawback of is that its distance estimation eo could be quite lage in pactice. This can geatly distot the anking of the candidate nodes caying the quey keywods, and thus lead to a low esult quality. In this wok, we study how to answe k-nk queies accuately and efficiently using compact index. The key to an accuate k-nk esult is a pecise shotest distance estimation in a gaph. As we use a geneal gaph model, existing k-nn solutions on spatial netwoks [,, 6, 8, 9, 7] cannot be applied, as they usually ely on specialized stuctues that leveage popeties of spatial data to optimize thei solutions. Instead we use distance oacle [0] as the fundamental distance estimation famewok. Fo each component of a distance oacle, we will build a shotest path tee, based on which we can estimate the shotest distance between two nodes by thei tee distance. The tee distance is moe accuate than the distance estimated by distance oacle, which we call witness distance to distinguish. As we tansfom a distance oacle on a gaph into a set of shotest path tees, the oiginal k-nk quey on the gaph can be educed to answeing the k-nk quey on a set of tees. Thus we fist focus on pocessing k-nk queies to find exact top-k answes on a tee. Then we study how to assemble the esults obtained fom the tees to fom the appoximate top-k answes on the gaph. Contibutions. Ou main contibutions in this wok ae summaized as follows. () Given a tee, we fist conside a common scenaio when uses ae inteested in a small numbe of answe nodes bounded by a small constant k, i.e., k k. We popose the fist algoithm tee- with quey time O(k + log V ), whee V is the numbe of nodes caying the quey keywod, and index size O(k doc(v ) ), whee doc(v ) is the total numbe of keywods on all the nodes in the gaph. () Next we emove the k estiction and handle k-nk queies fo an abitay k on a tee. We popose the second algoithm tee- with quey time O(k log V ) and index size O( doc(v ) log V ) which is independent of k, thus is moe scalable. () Based on ou poposed tee algoithms, we pesent ou algoithm fo appoximate k-nk quey on a gaph. We popose a global stoage technique to futhe educe the index size and the quey time. We also show how to extend ou methods to handle a quey with multiple keywods. () Ou expeimental evaluation demonstates the effectiveness and efficiency of ou k-nk algoithms on lage eal-wold netwoks. We show the supeioity of ou methods in anking top-k answe nodes accuately, when compaed with the state-of-the-at top-k keywod seach method []. Roadmap. The est of the pape is oganized as follows. Section fomally defines the poblem. Section discusses two existing elated studies and thei dawbacks. Section pesents ou famewok. Sections and 6 intoduce two poposed algoithms to answe k-nk queies on a tee fo a small k and an abitay k espectively using compact index stuctues. Section 7 elaboates on the way to answe k-nk queies on a gaph by appoximating the gaph with a bounded numbe of tees. Section 8 pesents extensive expeimental evaluation. Section 9 eviews the pevious woks elated to ous. Finally, Section 0 concludes the pape.. PROBLEM DEFINITION We model a weighted undiected gaph as G(V, E), whee V (G) epesents the set of nodes and E(G) epesents the set of edges in G. We use V and E to denote V (G) and E(G) if the context is obvious. Each edge (u, v) E has a positive weight, denoted,α b g d f u β α,β a h i,α j n e p β m k c t o Figue : A Gaph G with Keywods as weight(u, v). A path p = (v, v,, v l ) is a sequence of l nodes in V such that fo each v i( i < l), (v i, v i+) E. The weight of a path is the total weight of all edges on the path. Fo any two nodes u V and v V, the distance of u and v on G, dist(u, v), is the minimum weight of all paths fom u to v in G. Each node v V contains a set of zeo o moe keywods which is denoted as doc(v). The union of keywods fo all nodes in G is denoted as doc(v ). Note that doc(v ) is a multiset and doc(v ) = P v V doc(v). We use V V to denote the set of nodes caying keywod in V. DEFINITION. Given a gaph G(V, E), a top-k neaest keywod (k-nk) quey is a tiple Q = (q,, k), whee q V is a quey node in G, is a keywod, and k is a positive intege. Given a quey Q, a node v V is a keywod node w..t. Q if v contains keywod, i.e., v V. The esult is a set of k keywod nodes, denoted as R = {v, v,, v k } V, and thee does not exist a node u V \ R such that dist(q, u) < max v R dist(q, v). To futhe epot the distance in the top-k esult, we can use the fom R = {v : dist(q, v ), v : dist(q, v ),, v k : dist(q, v k )}. In this pape, we aim at answeing a k-nk quey Q = (q,, k) on a gaph G. Fo simplicity, we assume that thee is only one keywod in the quey. We will discuss how to answe a quey containing multiple keywods with AND and OR semantics. Example : Fig. shows a gaph G. Assume that the weight of each edge is. Fo a k-nk quey Q = (f,, ), the keywod node set is V = {b, c, k, n, t}. The esult of Q is R = {b :, n :, k : } since dist(f, b) =, dist(f, n) =, and dist(f, k) =.. EXISTING SOLUTIONS A staightfowad appoach to answeing a k-nk quey Q = (q,, k) on G is to use Dijksta s algoithm to seach fom the quey node q and output k neaest keywod nodes in nondeceasing ode of thei distances to q. The time complexity is O( E + V log V ). Obviously, Dijksta s algoithm is inefficient when the size of the gaph is lage o the keywod nodes ae fa away fom q. In the liteatue, [] and [] design diffeent indexing schemes to pocess (top-k) neaest keywod queies on a gaph o a tee. We intoduce the two methods in the following two subsections.. Appoximate k NK on a Gaph Bahmani and Goel [] find an appoximate answe to a k-nk quey in a gaph based on a distance oacle [0]. Distance Oacle: Distance oacle is a technique fo estimating the distance of two nodes in a gaph [0]. Given a gaph G, a distance oacle is a Voonoi patition of V (G) detemined by a set of andomly selected cente nodes. Moe specifically, given a numbe n c, we andomly select n c nodes fom V (G) as the cente nodes to constuct a distance oacle O. Then the patition is constucted by assigning each node v V (G) to its neaest cente node, denoted as wit O(v), which is called the witness node of v w..t. O. If v is a cente node, wit O(v) = v. Fo each node v V (G), the shotest distance fom v to its witness node, i.e., dist(v, wit O(v)), is pecomputed. Afte constucting O, given two nodes u and v in G, if u and v ae in the same patition in O, i.e., wit O(u) = s v

3 O j a m t p e h 6 g d b f i u n v c o k s u i h g d b f a n e j s v p m o O t k c Figue : Two Distance Oacles O and O wit O(v), we compute the estimated distance, called witness distance, as dist O(u, v) = dist(u, wit O(u)) + dist(v, wit O(v)). If u and v ae not in the same patition in O, dist O(u, v) = +. One distance oacle is usually not enough fo distance estimation in a gaph G. It cannot estimate the distance of two nodes in diffeent patitions. Even fo two nodes in the same patition, the estimation may have a lage eo. Theefoe, a set of = p log V distance oacles {O, O,, O } ae constucted, whee p can be consideed as a constant. The algoithm is pocessed in log V phases. In phase i (0 i < log V ), p distance oacles ae constucted whee each distance oacle contains i andomly selected cente nodes. Given distance oacles, the distance of two nodes u and v in G can be estimated as an uppe bound dist(u, v) = min i dist Oi (u, v). The time complexity to compute the estimated distance dist(u, v) fo any two nodes u and v in a gaph G is O(log V ). The distance oacles consume O( V log V ) space. Das Sama et al. [0] pove that when p = Θ( V / log V ), the estimated distance can be bounded by dist(u, v) dist(u, v) ( log V ) dist(u, v) with a high pobability. Example : Fig. shows two distance oacles O and O fo the gaph shown in Fig.. Thee is one cente node in O, and fou cente nodes, n, o and t in O. The distance of nodes j and s is estimated as dist(j, s) = min{dist O (j, s), dist O (j, s)} = min{dist(j, ) + dist(s, ), dist(j, n) + dist(s, n)} =. Answeing k-nk with Distance Oacle: [] designs a Patitioned Multi-Indexing () scheme which uses a set of distance oacles to answe a k-nk quey in a gaph. Fo each patition in a distance oacle O i, an inveted list is constucted fo each keywod in the patition. Specifically, fo a patition with a cente node c and a keywod, the inveted list contains all nodes in the patition that contain keywod anked in nondeceasing ode of thei distances to c. Given a k-nk quey Q = (q,, k) and a distance oacle O i, the algoithm fist finds the patition that q belongs to in O i. The esult w..t. O i is the fist k elements in the inveted list fo in the patition, denoted as R Oi = {u : dist(c, u ) + dist(c, q), u : dist(c, u ) + dist(c, q),, u k : dist(c, u k ) + dist(c, q)}. The final esult R is computed by meging the nodes in each R Oi and maintaining k nodes with the shotest distances to q. The quey time complexity is O(k log V ). We illustate the algoithm using the following example. Example : Conside the gaph in Fig. and two distance oacles in Fig.. Fo keywod, the inveted list fo the patition centeed at node in O has elements {b :, n :, k :, c :, t : 6}. The inveted list fo the patition centeed at node o in O has element {k : }. Given a k-nk quey Q = (m,, ), fom O, we can get a esult R O = {b : + dist(, m), n : + dist(, m)} = {b :, n : 7}, and fom O, we can get a esult R O = {k : + dist(o, m)} = {k : }. By meging R O and R O, the final answe is R = {k :, b : }. The exact answe is R = {c :, k : } accoding to Fig.. Limitation: Although in theoy, the witness distance used by [] can be bounded by a facto of log V of the exact distance with a high pobability, in pactice, howeve, we find the distance In [0], the set {O, O,, O } is defined as a distance oacle.,,[,0] g,,[,6] f,7,[7,8] d,9,[9,8] b,9,[9,0] a,,[,6] i,8,[8,8] h,0,[0,8] u,0,[0,0] j,,[,] n,6,[6,6] e,,[,8] p,, [,] m,, [,8] k,,[,] v,, [, ] s,,[,] c,6,[6,7] t,7,[7,7] o,8,[8,8] Figue : A Tee T with Peode and Inteval on Each Node k a n c CT t b j k a n 6 e c ECT 6 b t 9 7 Inteval [,] [,] 6 [7,0] Result b n k n b Inteval [,6] 7 8 Result c t c TVP [9,0] b Figue : CT(), ECT() and TVP() fo Keywod estimation eo can be quite lage. Fo example, fo the gaph G in Fig. and two distance oacles O and O in Fig., fo two nodes s and v, the witness distance in O is dist O (s, v) = dist(s, ) + dist(v, ) = 0, and that in O is dist O (s, v) = dist(s, n) + dist(v, n) = 6. Howeve, the exact distance is dist(s, v) = in G, which is much smalle than both dist O (s, v) and dist O (s, v). The inaccuate distance estimation can geatly distot the anking of the nodes caying the quey keywod, and thus lead to a low esult quality, as illustated in Example.. Exact NK on a Tee Tao et al. [] compute the exact answe to a -NK quey on a tee T(V, E). Given a quey Q = (q,, ), the esult is the neaest node in T that contains keywod, denoted as NN(q, ). The basic idea is as follows. We label a node v with the sequence numbe of v in the peode tavesal of T. Fo a cetain keywod, all nodes with the peode label in the inteval [, V ] can be patitioned into seveal disjointed intevals, such that any node v in the same inteval shaes an identical NN(v, ). The patition is called tee Voonoi patition of, denoted as TVP(). By pecomputing TVP() fo all keywods on the tee, a quey Q = (q,, ) can be answeed in O(log V ) time using a binay seach in TVP(). In ode to compute TVP() fo all keywods in T efficiently, two new data stuctues, namely, Compact Tee CT() and Extended Compact Tee ECT(), ae poposed in []. DEFINITION. (Compact Tee and Extended Compact Tee) Fo a tee T and a keywod, a compact tee CT() is a tee that keeps only two types of nodes in T : a keywod node that contains keywod, and a node that has at least two diect subtees containing nodes caying keywod. In the peode tavesal of T, fo two successive nodes u and v, if NN(u, ) NN(v, ), v is called a change node. An extended compact tee ECT() is a tee constucted by adding all change nodes into the compact tee CT(). Using ECT(), TVP() can be constucted easily. In [], the authos pove that the total size of all compact tees and all extended compact tees fo all keywods in the tee T(V, E) is bounded by O( doc(v ) ). The time to compute all compact tees and all extended compact tees fo all keywods in the tee T(V, E) is bounded by O( doc(v ) log V ). Example : Fig. shows a tee with the peode label fom to 0 on its nodes. Fo keywod, thee ae keywod nodes b, c, k, n, t. Fo node s, NN(s, ) = c. The compact tee of, CT(), is shown on the left pat of Fig.. Node is in CT() because has thee diect subtees with nodes caying keywod. e is not in CT() because e is not a keywod node and e has only one diect subtee ooted at m with nodes caying keywod. The extended compact tee of, ECT(), is shown in the middle pat of Fig. with the

4 peode label maked beside each node. Node e is in ECT(), because fo its paent node h, NN(h, ) = b NN(e, ) = c. The tee Voonoi patition of, TVP(), is shown on the ight pat of Fig.. Fo node s with peode label, it is in the inteval [, 6], thus NN(s, ) = c as listed in TVP().. SOLUTION OVERVIEW Answeing k-nk on a Gaph using Tee Distance: To addess the dawback of witness distance, in this pape, we popose to use tee distance in pocessing a k-nk quey. We obseve that fo a patition of a distance oacle, we can constuct a shotest path tee ooted at the cente node of the patition. Since a tee contains moe stuctual infomation than a sta, using tee distance will be moe accuate than using witness distance fo estimating the distance of two nodes. Fo a distance oacle O i, let the set of tees constucted in O i be T i. T i can be consideed as a tee by adding a vitual oot and seveal vitual edges with weight + that connect the new vitual oot to evey oot node in T i espectively. Let the k-nk esult on tee T be R T. Suppose we have an algoithm to compute R T on a tee T, we can solve the k-nk poblem in a gaph by meging R Ti fo each tee T i, i. Obviously, such a esult will be moe accuate than the esult by []. The following example illustates the k-nk quey pocessing based on tee distance. Example : Fo the distance oacles O and O shown in Fig., the coesponding shotest path tees T and T ae shown in Fig.. Fo T, thee is only tee ooted at because thee is only patition in O. Fo T, thee ae tees ooted at nodes n, o,, t espectively, because thee ae patitions in O. In each tee, the path fom any node to the oot node is a shotest path in the oiginal gaph. Fo two nodes s and v, thei tee distance is in both T and T, the same as the exact distance dist(s, v) in G. Fo a k-nk quey Q = (m,, ), we have R T = {c :, t : }, and R T = {k : }. By meging R T and R T, we get R = {c :, k : }. Such a esult is much bette than the esult in Example computed using witness distance fo the same quey. With the tee distance fomulation, the key opeation in answeing a k-nk quey on a gaph is to answe the k-nk quey on a tee. Theefoe, we stat with pocessing a k-nk quey on a tee. Answeing k-nk on a Tee: We show that it is nontivial to answe a k-nk quey on a tee efficiently even if k is bounded. Ou fist attempt is to extend the existing -NK solution on a tee T(V, E) in []. Recall that in [], fo a cetain keywod, the ange [, V ] is patitioned into seveal disjoint intevals, and nodes with the peode label in an identical inteval shae the same -NK esult. When k, each inteval needs to be futhe patitioned to ensue that all nodes with the peode label in the same inteval shae an identical k-nk esult. The numbe of intevals inceases exponentially w..t. the numbe of keywod nodes on the tee until it eaches V fo a keywod. Clealy, using such an appoach, the index size is too lage in pactice even fo a small k. Ou second attempt is that, fo each node v on the tee T(V, E) and each keywod, we pecompute its k neaest nodes that contain. When pocessing a quey Q = (q,, k) with k k, we can simply etieve the pecomputed esult on node q and output the fist k nodes diectly. Such an appoach is impactical because fo each keywod, we need O(k V ) space to stoe the pecomputed esults. In the following, we fist intoduce two algoithms fo answeing exact k-nk on a tee T(V, E). Ou fist algoithm tee- can only handle bounded k values with quey pocessing time O(k + log V ) and index size O(k doc(v ) ) fo all keywods whee k is an uppe bound value of k. Ou second algoithm tee- can handle an abitay k with quey pocessing time O(k log V ) T k g a j n v f d b i h u e p m s c o t k b g u a j n m f d h i e p o s v T c t Figue : Shotest Path Tees T and T Algoithm : tee- (Q,T ) Input: A k-nk quey Q = (q,, k), and a tee T. Output: Answe fo Q on T. R ; (u, u ) the enty edge of q on CT(); R R k (cand (u) dist(q, u)); R R k (cand (u ) dist(q, u )); etun R; and index size O( doc(v ) log V ) fo all keywods which is independent of k. We then show ou algoithm fo appoximate k-nk on a gaph by meging esults on a bounded numbe of tees. We popose a global stoage technique to futhe educe the index size and the quey time on a gaph. Finally we show how to extend ou method to handle a quey with multiple keywods.. K NK ON A TREE FOR A SMALL K In this section, we study how to answe a k-nk quey Q = (q,, k) on a tee T(V, E). We fist conside a common scenaio when uses ae inteested in a small numbe of answe nodes bounded by a small constant k, i.e., k k. Recall that fo a keywod, its compact tee CT() keeps all the stuctual infomation of on the tee T. Ou idea is to pecompute the top-k esults fo evey keywod and evey node on CT(). Since the total size of all compact tees is bounded by O( doc(v ) ), the total space to stoe the top-k esults of nodes on all compact tees is bounded by O(k doc(v ) ). Given a quey Q = (q,, k), if q is on CT(), we can simply epot the pecomputed answe on CT(). If q is not on CT(), we need to find a way to constuct the answe using the pecomputed esults as well as the stuctue of CT() and T. In the following, we fist intoduce how to answe a k-nk quey using CT(), followed by discussions on the constuction of the index.. Quey Pocessing Fo a keywod, and each node v in the compact tee CT(), we use a candidate list cand (v) to denote the pecomputed k-nk esults fo k = k on node v anked in nondeceasing ode of thei distances to v, in the fom of cand (v) = {v : dist(v, v ), v : dist(v, v ),, v k : dist(v, v k )} whee dist(v, v ) dist(v, v ) dist(v, v k ). Given a quey Q = (q,, k) on a tee T(V, E) whee k k, if q is in CT(), we can simply epot the fist k elements in cand (q) as the answe. The difficult case is when q is not in CT(). In ode to answe such a quey, we define an enty edge to be the edge in CT() that is neaest to q. Intuitively, the enty edge plays a ole of connecting the quey node q to the compact tee CT(). The fomal definition of enty edge is as follows. DEFINITION. (Enty Node and Enty Edge) Given a compact tee CT(), fo each edge (u, u ) on CT() with u being a child node of u, (u, u ) epesents a unique path fom u to u on the oiginal tee T. Fo any node v on T, we say v sticks to CT(), denoted as v s CT(), if and only if thee exists an edge (u, u ) on CT() such that v is on the path fom u to u on T, othewise v does not stick to CT(), denoted as v / s CT(). Fo a node q on T, let v be the fist node on the path fom q to the oot node of T such that v s CT(). v is called the Enty Node of q w..t.,

5 Algoithm : opeato R δ Input: Candidate list R = {u : d u, u : d u, }, distance δ. Output: A candidate list by adding δ to all distances in R. R ; fo i = to R do R R S {u i : d ui + δ}; etun R ; denoted as EN (q). The coesponding edge (u, u ) on CT() is called the Enty Edge of q w..t., denoted as EE (q). Note that fo a node q and a keywod, EE (q) is an edge on the compact tee CT(), and EN (q) is a node on the oiginal tee T. We use an example to illustate the enty node and enty edge. Example 6: Fo the tee T shown in Fig. and keywod, the compact tee CT() is shown on the left pat of Fig.. Fo ease of illustation, we also mak the nodes in CT() dak on the tee T in Fig.. Fo edge (, c) in CT(), h s CT() because h is on the path fom to c in T. p / s CT() since p is not on the tee path of any CT() edge. Fo node v, its enty node is EN (v) = e, as e is the fist node on the path (v, p, e, h, d, ) such that e s CT(). The enty edge fo v is EE (v) = (, c) since the enty node e fo v is on the path fom to c in T. The enty nodes and enty edges fo some othe nodes in T ae listed in the following table. Node g j d e p u EN g j d e e b EE (, a) (a, k) (, c) (, c) (, c) (, b) The Algoithm: Given a tee T(V, E), fo keywod, all keywod nodes ae contained in CT(). Fo any node q V, the path fom q to any keywod node will go though the enty node EN (q). Based on such popety, the esult of a quey Q = (q,, k) is identical with the esult of the quey Q = (EN (q),, k). Howeve, EN (q) may not be on CT(), thus the esult of Q is not necessaily pecomputed. Let (u, u ) = EE (q), since EN (q) is on the path fom u to u on the tee T, the path fom EN (q) to any keywod node in T will go though eithe u o u. Thus, the answe fo Q can be constucted by meging the pecomputed candidate lists cand (u) and cand (u ) on CT(). Ou algoithm fo pocessing a quey Q = (q,, k) on a tee T is shown in Algoithm. We assume that the compact tee CT() fo each keywod and the list cand (u) fo evey node u on CT() have been computed. Afte initializing the esult R in line, we find the enty edge (u, u ) fo q on CT() (line ). We add a distance dist(q, u) to evey node in cand (u) using the opeato, to eflect the distance fom q to a keywod node via u. We then mege the new esult into R using the k opeato (line ). Similaly we apply the two opeatos to cand (u ) with the distance dist(q, u ) (line ). We will descibe the opeatos and k late. We use the following example to illustate the algoithm. Example 7: Given the tee T shown in Fig. and CT() on the left pat of Fig., fo a quey Q = (o,, ), the enty edge EE (o) = (, c). Suppose the lists cand () = {b :, n : } and cand (c) = {c : 0, t : } ae pecomputed. By adding dist(o, ) = to cand (), and adding dist(o, c) = to cand (c), we get the new lists {b : 6, n : 8} fo and {c :, t : } fo c. We mege the two lists and get the final esult R = {c :, t : }. The efficiency of Algoithm depends on thee opeations. The fist opeation is to find the enty edge fo any node on T (line ). The second opeation is to calculate the distance of any two nodes on T, e.g., dist(q, u) and dist(q, u ) (line -). The thid opeation is to mege two soted lists into a new one using opeatos and k (line -). Next, we discuss the thee opeations sepaately Algoithm : opeato R k R Input: Two soted candidate lists R = {u : d u, u : d u, } R = {v : d v, v : d v, }, and esult size k. Output: The meged candidate list. R ; i ; j ; while (i < R o j < R ) and R k do if i < R and (d ui d vj o j R ) then if u i / R then R R S {u i : d ui }; i i + ; else if j < R and (d vj d ui o i R ) then if v j / R then R R S {v j : d vj }; j j + ; etun R; Finding the Enty Edge: Given a keywod, fo any node v on a tee T(V, E), ou idea of finding the enty edge EE (v) of v is simila to the idea of finding the -NK answe using the tee Voonoi patition TVP() in []. Fo the ange [, V ], we patition it into seveal disjoint intevals, such that nodes with the peode label in the same inteval shae an identical enty edge. We call such patition an enty edge patition fo, denoted as EEP(). Given EEP(), EE (v) can be computed easily using a binay seach in EEP() in O(log V ) time. In the next subsection, we show how to build EEP() fo all keywods efficiently and pove that the total size of EEP() fo all keywods in T is bounded by O(doc V ). Computing Tee Distance: Given a tee T(V, E) with oot, suppose the distance fom to evey node in T has been pecomputed. Fo any two nodes u and v on T, we denote LCA(u, v) as thei lowest common ancesto. The distance of u and v can be computed as dist(u, v) = dist(, u) + dist(, v) dist(, LCA(u, v)). Using the techniques in [], LCA(u, v) can be found in O() time using O( V ) index space. Thus dist(u, v) fo any two nodes u and v on T can be computed in O() time using O( V ) index space. Meging Results: The esults ae meged using two opeatos and k. Algoithm shows the opeato, which takes a candidate list R and a distance δ as input, and outputs a candidate list by adding δ to all distances in R. The time complexity fo the opeato is O( R ). Algoithm shows the opeato k, which takes two candidate lists R and R soted in nondeceasing ode of the distances, and a value k as input, and outputs the meged candidate list R. R contains at most k elements soted in nondeceasing ode of the distances. R can be constucted by visiting each element in R and R at most once. The time complexity fo the k opeato is O(min{ R + R, k}). The k and opeatos satisfy the commutative, associative and distibutive laws as follows. (Commutative Law) R k R = R k R. (Associative Law) (R k R ) k R = R k (R k R ). (Distibutive Law) (R k R ) d = (R d) k (R d). THEOREM. Algoithm computes the exact k-nk answe fo a quey Q = (q,, k) on a tee T(V, E) in O(k + log V ) time. Algoithm uses the novel idea of enty edge, and elegantly extends the -NK method [] to handle k-nk (k > ) with the same quey time complexity, except fo an exta linea cost O(k) indispensable fo epoting the esults. Given the tee T, fo evey keywod, besides the compact tee CT(), two moe indexes ae needed. The fist index, the enty edge patition EEP(), is to find the enty edge fo any node on T. The second index is the candidate list cand (v) fo evey node on CT(). Below we show how to constuct the two indexes.. Constuction of Enty Edge Patition Given a tee T(V, E), fo each keywod, shaing the simila idea with the tee Voonoi patition TVP(), we constuct an enty

6 Algoithm : EEP-constuct (T,CT()) Input: A tee T(V, E) and a labelled compact tee CT(). Output: Enty edge patition EEP(). the oiginal oot of CT(); EEP() ; patition(eep(), [, V ], (φ, ), CT()); etun EEP(); Pocedue patition(eep(), inteval [s, t], edge (u, u ), CT()) 6 foeach subnode u of u on CT() in inceasing peode do 7 [s, t ] inteval of (u, u ); 8 if s < s then add ([s, s ], (u, u )) to EEP(); 9 patition(eep(), [s, t ], (u, u ), CT()); 0 s t + ; if s t then add ([s, t], (u, u )) to EEP(); edge patition EEP(), which divides [, V ] into seveal disjoint intevals, such that nodes in V with peode in the same inteval shae an identical enty edge on CT(). In ode to constuct the enty edge patition, fo each edge (u, u ) on CT(), we label (u, u ) with an inteval accoding to the following definition. DEFINITION. (Labeled Compact Tee) Given a tee T, a node v on T has an inteval [s v, t v] whee s v is the peode label of v on T and t v is the maximum peode label fo all nodes in the subtee ooted at v. Given a compact tee CT(), fo any edge (u, u ) on CT(), let the banching node of (u, u ) be the fist node along the path fom u to u on T, and denote it as u b. We label edge (u, u ) with the inteval of u b. The label of evey edge on a compact tee CT() can be computed easily when constucting CT(). Given any node v on a tee T and an edge (u, u ) on a compact tee CT(), denote the banching node of (u, u ) as u b, then v is in the subtee ooted at u b if and only if the peode label of v on T is in the inteval of u b, which is identical with the label of edge (u, u ). Fo ease of pesentation, fo each labeled compact tee CT(), we add a vitual oot φ and an edge fom φ to the oiginal oot of CT(). We use the following example to illustate the labeled compact tee. Example 8: Fo the tee T shown in Fig., we mak the peode and the inteval of each node on the tee. Fo the node h, its inteval is [0, 8] because the peode of h on T is 0 and the maximum peode fo all nodes on the subtee ooted at h is 8. The labeled compact tee CT() fo keywod is shown on the left pat of Fig. 6. Fo the edge (, c) on CT(), its banching node is d because d is the fist node along the path (, d, h, e, m, c) on T. The label of edge (, c) is the inteval of node d, which is [9, 8]. Fo a compact tee CT() of tee T and a keywod, suppose (u, u ) on CT() is an enty edge of a node v on tee T, i.e., EE (v) = (u, u ). The peode of v is in the inteval of (u, u ), because the inteval of (u, u ) contains all nodes unde the subtee ooted at the banching node of (u, u ). Based on such an obsevation, by excluding the intevals of all edges unde the subtee ooted at u in CT() fom the inteval of (u, u ), nodes with peode in the emaining intevals will use (u, u ) as the enty edge. Fo example, in the compact tee CT() shown in Fig. 6, the edge (φ, ) has an inteval [, 0]. has thee banches with intevals [, 6], [9, 8] and [9, 0] espectively. By excluding the thee intevals fom [, 0], two intevals [, ] and [7, 8] ae left. Thus nodes with peode in eithe of the two intevals [, ] and [7, 8] shae the same enty edge (φ, ). Fo edge (, c) with inteval [9, 8], by excluding inteval [7, 7] of the only banch of c, nodes with peode in eithe of the two intevals [9, 6] and [8, 8] shae the same enty edge (, c). Algoithm shows the constuction of the enty edge patition EEP() on CT() fo a keywod. Afte initializing EEP() (line ), the main opeation is a ecusive pocedue patition (line ), Φ [,0] [,6] [9,0] a [9,8] b [,] [6,6] c [7,7] k n t CT Inteval [, ] [, ] [, ] [6, 6] [7, 8] EntyEdge (Φ,) (,a) (a,k) (a,n) (Φ,) Inteval [9,6] [7,7] [8,8] [9,0] EntyEdge (,c) (c,t) (,c) (,b) Enty Edge Patition Figue 6: Labeled Compact Tee and Enty Edge Patition to patition the inteval [, V ] to seveal disjoint intevals. Each enty in EEP() is in the fom of ([s, t], (u, u )) denoting that nodes with the peode label in the inteval [s, t] shae the same enty edge (u, u ). Fo an edge (u, u ) with inteval [s, t], the pocedue pocesses evey child node u of u on CT() in inceasing peode of u (line 6). Fo each edge (u, u ) with inteval [s, t ], the inteval [s, t] is patitioned into thee pats: [s, s ], [s, t ] and [t +, t]. The fist pat is added to EEP() with the enty edge (u, u ) if it is not empty (line 8). The second pat is pocessed ecusively fo edge (u, u ) (line 9), and the thid pat is left to be futhe patitioned by othe child nodes of u by simply setting s to be t + (line 0). Afte pocessing all child nodes of u, if [s, t] is still not empty, we add [s, t] to EEP() with the enty edge (u, u ) (line ). The time complexity of Algoithm is O( V (CT()) ) since evey node on CT() is visited once. Fo each edge (u, u ) on CT(), at most two intevals ae added into EEP(). One is added befoe invoking patition fo edge (u, u ) (line 8) and the othe is added at the end of patition fo (u, u ) (line ). Thus the total numbe of intevals in EEP() is no moe than V (CT()). Example 9: Fo the labeled compact tee CT() shown in Fig. 6, when invoking patition(eep(), [, 0], (φ, ), CT()), we pocess the thee child nodes a, c, b of in ode. We fist pocess edge (, a) with inteval [, 6], which divides the inteval [, 0] into thee pats: [, ], [, 6], and [7, 0]. [, ] is added into EEP() with the enty edge (φ, ). [, 6] is pocessed ecusively by invoking patition(eep(), [, 6], (, a), CT()), and [7, 0] is pocessed by the othe two child nodes c and b similaly. EEP() is shown on the ight pat of Fig. 6. THEOREM. Fo a tee T(V, E) with the compact tees fo all keywods constucted, the enty edge patition EEP() fo all keywods can be constucted in O( doc(v ) ) time and stoed in O( doc(v ) ) space.. Constuction of Candidate List Given a compact tee CT() fo a tee T and a keywod, we need to compute the candidate list cand (v) fo evey node v on CT(). Since CT() keeps the stuctual infomation of all keywod nodes in T, it is sufficient to seach only on CT() to calculate cand (v). A simple solution is to compute each cand (v) sepaately on CT(). This appoach may take O( V (CT()) ) time to calculate cand (v) fo a node v, thus O( V (CT()) ) time to compute all candidate lists in CT() fo one keywod, which is too slow. In ode to save the computational cost, we design a novel method to update the candidate list of a node using those of its neaby nodes on the tee CT(). Note that in CT(), the path between two nodes u, v is unique: fom node u to the lowest common ancesto of u and v, LCA(u, v), and then fom LCA(u, v) to v. Based on this obsevation, we can follow the path to popagate the candidate list on u to v. Using this idea, we just need to tavese the tee CT() twice to build the candidate lists fo all nodes on CT(). The fist tavesal on CT() is a bottom-up one, such that the candidate list on each node is popagated to all its ancestos on CT(). The second tavesal on CT() is a top-down one, such that the candidate list on each node is futhe popagated to all its descendants.

7 Algoithm : cand-constuct (T,CT(), k) Input: A tee T, a compact tee CT(), and the uppe bound of k, k. Output: cand (v) fo each v on CT(). cand (v) fo each node v on CT(); cand (v) {v : 0} fo each node v on CT() that contains ; foeach v on CT() in a bottom-up fashion do u the paent node of v on CT(); cand (u) cand (u) k (cand (v) dist(u, v)); 6 foeach v on CT() in a top-down fashion do 7 u the paent node of v on CT(); 8 cand (v) cand (v) k (cand (u) dist(u, v)); _ k = a {n:,k:} c {c:0,t:} b a {n:,k:} c {c:0,t:} b {b:0} {b:0,n:} k n t k n t {k:0} {n:0} {t:0} {k:0,n:} {n:0,k:} {t:0,c:} Bottom-up Phase Top-down Phase {b:, n:} {b:, n:} Figue 7: Constucting Candidate Lists Algoithm shows the constuction of the candidate lists on CT(). We fist initialize the candidate list fo each keywod node to be the node itself and initialize the candidate list fo each nonkeywod node to be (line -). We then tavese CT() in a bottom-up fashion, e.g., using postode tavesal. Fo each node v tavesed, we mege cand (v) into that of its paent node u by adding a distance dist(u, v) to the list cand (v) (line -). At last, we tavese CT() in a top-down fashion, e.g., using peode tavesal. Fo each node v tavesed, we mege the list of v s paent node u, cand (u), into that of v by adding a distance dist(u, v) to the list cand (u) (line 6-8). Since the k opeato takes O(k) time, the time complexity of Algoithm is O(k V (CT()) ) using O(k V (CT()) ) space. Example 0: Fig. 7 shows the candidate lists afte the bottom-up phase and the top-down phase fo the compact tee CT() shown on the left pat of Fig.. Initially, the candidate list fo t is {t : 0} and the candidate list fo c is {c : 0}. Since c is a paent node of t, in the bottom-up phase, the list of t is popagated and meged into that of c by adding a distance dist(c, t) =, thus cand (c) = {c : 0, t : } afte the bottom-up phase. In the top-down phase, the list of c is popagated and meged into that of t, thus cand (t) = {t : 0, c : } afte the top-down phase. THEOREM. Given a tee T, an uppe bound of k, k, and CT() fo all keywods, the candidate lists cand (v) fo all keywods and all nodes v on CT() can be constucted in O(k doc(v ) ) time and stoed in O(k doc(v ) ) space. 6. K NK ON A TREE FOR A LARGE K Algoithm can only pocess a k-nk quey Q = (q,, k) with a bounded k, i.e., k k, on a tee T. If k can be abitaily lage, the index size cannot be bounded. In this section, we will emove the estiction on k and intoduce an algoithm to handle a k-nk quey fo an abitay k, with an index size independent of k. 6. A Basic Pivot Appoach Recall that fo a node u that contains keywod and an abitay node v in a tee T, the path fom v to u is unique on T, and can be divided into two segments: the fist segment is fom v to thei lowest common ancesto LCA(u, v), and the second segment is fom LCA(u, v) to u. Ou basic idea is to compute the fist segment online and pecompute the esults egading the second segment offline. Thus, in the pecomputing phase, instead of popagating a keywod node u to all nodes in T to update thei candidate lists, we just need to popagate u to its ancestos in T. In the quey pocessing phase, we do not seach the whole tee to get the answe fo a g {n:,k:} a {n:, k:} j {k:} k {k:0} f i n {n:0} v {b:, n:, k:, c:, t:6} d {c:,t:} h {c:,t:} b {b:0} u e {c:,t:} p m {c:, t:} s c {c:0, t:} o t {t:0} Figue 8: Basic Pivot Appoach quey, but instead, we just need to mege the pecomputed candidates along the path fom the quey node to the oot node of the tee T. Using this method, the size of the index to keep the candidate nodes can be lagely educed at the expense of longe quey time. We use depth(t) to denote the depth of tee T, and depth(u, T) to denote the depth of node u on tee T. Fo any two nodes u and v on T, u is a of v if and only if u is an ancesto of v on T. Fo each node v, we denote the set of s of v on T as PV(v, T). We have PV(v, T) = depth(v, T). Given a keywod, fo each node u on tee T, we use the candidate list cand (u) to denote the set of nodes that contain keywod on the subtee ooted at u on tee T, soted in nondeceasing ode of thei distances to u. The candidate list is in the fom of cand (u) = {u : dist T(u, u ), u : dist T(u, u ), } whee dist T(u, u ) dist T(u, u ). In ode to handle an abitay k, the size of cand (u) is not bounded by any pedefined k. Clealy, a node v cand (u) if and only if v contains keywod and u PV(v, T). In othe wods, a keywod node v only appeas in the candidate lists of its s. As a P esult, fo any keywod, the total size of all candidate lists fo is v V PV(v, T) = P v V depth(v, T). We use the following example to illustate the based appoach. Example : Fig. 8 shows a tee T with depth(t) = 6. Fo keywod, the nodes that contain ae maked with bold cicles. Fo evey node v, we ceate a candidate list cand (v) that contains all keywod nodes in its subtee, soted in nondeceasing distances to v. Fo example, cand (g) = {n :, k : } means thee ae two keywod nodes n and k in the subtee ooted at g with distances and to g espectively. Fo node p, PV(p, T) = {, d, h, e}. Fo a k-nk quey Q = (d,, ), the path fom d to the oot contains two nodes d and. We mege the lists cand (d) and cand () by adding a distance dist(, d) = to all elements in cand (). The final answe fo Q is {b :, c :, n : }. 6. Pivot Appoach with Tee Balancing The poblem is not pefectly solved using the basic appoach above. The easons ae twofold. Fist, in the pecomputing phase, the index size fo each keywod is P v V depth(v, T), which can be lage if depth(v, T) is lage. Second, when pocessing a quey Q = (q,, k), we need to tavese all nodes fom the quey node q to the oot of T. This is also costly if depth(q, T) is lage. Thus the key to optimizing both index space and quey time is to educe the aveage depth of nodes on the tee. A simple solution is to otate the tee T to find a pope oot such that the aveage depth of nodes is minimized. Howeve, such an appoach cannot essentially solve the poblem, as illustated by the following example. Let T(V, E) be a chain of n+ nodes whee evey node contains keywod. The best way is to select the middle node on the chain as the oot to minimize the aveage depth of nodes. The total index size is P v V depth(v, T) = P v V (T) depth(v, T) = n(n ), which is O(n ). Futhemoe, we need to tavese n nodes to answe a quey when the quey node q is at one end of the chain, leading to O(n) quey time. This example shows that both the index space and quey pocessing can still be vey costly, even though we otate the tee.

8 Oiginal Tee T DT(T) v PV(v, DT(T)) a {b : 8, f : } d {b :, f : } e {b : 8, f : } c {b :, g : } h {b : 0, g : } f {b : 6} g {b : 6} Figue 9: Distance Peseving Balanced Tee In ode to educe the aveage depth of nodes to optimize both index space and quey pocessing time, we intoduce a new stuctue called distance peseving balanced tee fo T(V, E), denoted as DT(T). Geneally speaking, DT(T) peseves all distance infomation fo any node pai on T and the height of DT(T) is at most log V. The fomal definition of DT(T) is as follows. DEFINITION. (Distance Peseving Balanced Tee) Given a tee T(V, E) with a positive weight on each edge, a Distance Peseving Balanced Tee of T, denoted as DT(T), is an unweighted tee with the following thee popeties. P : V (DT(T)) = V (T). P : depth(dt(t)) log V. P : Fo any two nodes u and v, let the lowest common ancesto of u and v on DT(T) be o = LCA DT(T) (u, v). The following equation always holds: dist T(u, v) = dist T(u, o) + dist T(v, o). Note that DT(T) is unweighted and the distances dist T(u, v), dist T(u, o) and dist T(v, o) in P ae calculated on the oiginal tee T, but not DT(T). The lowest common ancesto LCA DT(T) (u, v) is not necessaily the ancesto of u o v on the oiginal tee T. Based on P, we can also divide ou algoithm into two phases using DT(T). In the pepocessing phase, fo each keywod, and each node v that contains keywod, we popagate v into the candidate lists of its s on DT(T). In the quey pocessing phase, we tavese fom the quey node q to the oot node on DT(T). Using the balanced tee DT(T), the total size of the candidate lists fo a keywod is bounded by P v V depth(v, DT(T)) P v V log V, and the total size fo all keywods is bounded by O( doc(v ) log V ). Fo pocessing a quey, we need to tavese at most log V + nodes on the path fom the quey node to the oot of DT(T). Example : A tee T with depth(t) = and a distance peseving balanced tee of T, DT(T) with depth(dt(t)) = ae shown in Fig. 9. The weight of each edge is maked on T. Edge (b, d) is on T but not on DT(T), and edge (b, f) is on DT(T) but not on T. Fo two nodes a and d, LCA DT(T) (a, d) = f, thus dist T(a, d) = dist T(a, f) + dist T(d, f) = + =. Note that f is not an ancesto of d on the oiginal tee T. PV(v, DT(T)) fo each node v in DT(T) is listed on the ight pat of Fig. 9. Hee we intoduce ou algoithm of pocessing a k-nk quey on a tee T using DT(T), and in the next subsection, we will show that DT(T) always exists fo any tee T. We will also descibe how to constuct DT(T) fo a tee T and how to compute all candidate lists cand (v) fo all keywods and all nodes v on the tee DT(T). Quey Pocessing: Given a tee T and DT(T), Algoithm 6 shows how to pocess a quey Q = (q,, k). We tavese all nodes on the path fom q to the oot of DT(T), which is PV(q, DT(T)) S {q} (line ). Fo each tavesed node v, we add dist T(q, v) to all elements in cand (v) and then mege the list into the cuent esult R, since we need to fist go fom node q to node v (the fist segment), and then go fom v to the keywod nodes in cand (v) (the second segment). Note that the time complexity of the opeato in line is O( cand (v) ). Howeve, by combining with k, it is easy to educe the time complexity of line to O(k). {b:, n:, k:, c:, t:6} a f b {b:0} {n:, k:} e {c:,t:} g j n i m {c:, t:} u {k:} {n:0} h p c {c:0, t:} o k {k:0} d v s t {t:0} Figue 0: Pivot Appoach with Tee Balancing Algoithm 6: tee- (Q,T ) Input: A k-nk quey Q = (q,, k), and a tee T. Output: Answe fo Q on T. R ; foeach v PV(q, DT(T)) S {q} do R R k (cand (v) dist T (q, v)); etun R; Example : Fig. 0 shows a distance peseving balanced tee DT(T) fo the tee T shown in Fig. 8, with depth. Fo keywod, the nodes that contain ae maked with bold cicles in Fig. 0. Fo a quey Q = (e,, ), we just need to mege candidate lists cand (e) and cand () by adding a distance dist T(e, ) = to all elements in cand (). Howeve, if we use the basic appoach on the oiginal tee T without tee balancing, we need to mege candidate lists fo nodes e, h, d and espectively. The answe fo Q is {c :, t :, b : }. THEOREM. The time complexity fo answeing a k-nk quey on a tee T(V, E) using Algoithm 6 is O(k log V ). 6. Index Constuction Given a tee T, in ode to answe a quey Q = (q,, k) using Algoithm 6, we need to build two indexes. The fist index is the distance peseving balanced tee DT(T) fo T and the second index is the candidate list cand (v) fo each keywod and each node v on DT(T). We intoduce them sepaately in the following. Constucting DT(T): Befoe intoducing how to constuct a tee DT(T) to satisfy the thee popeties in Definition, we fist pesent an appoach to constucting a tee T fom T, which satisfies popeties P and P. In othe wods, T is distance peseving but not necessaily balanced. Let the initial T be T. We change T by pefoming the following steps. () Randomly select a node on T as the new oot and otate T accodingly. () Fo each diect subtee T c of on T, pefom steps () and () on T c ecusively. Clealy, afte steps () and (), T may not be isomophic to T. We have the following two obsevations on T. O : Afte pefoming step () on T, two nodes u and v ae in diffeent diect subtees of if and only if LCA T (u, v) =. Such a popety also holds afte pefoming step () on T because step () only changes the stuctue within a subtee of. O : Since the stuctue of T is not changed afte step (), we have dist T(u, v) = dist T(u, ) + dist T(v, ) on the oiginal tee T. Fom O and O, we have dist T(u, v) = dist T(u, LCA T (u, v))+dist T(v, LCA T (u, v)) afte step () on T. Such a popety also holds fo any subtee of T because it is pocessed using steps () and () ecusively. As a esult, T satisfies popety P. Ou DT(T) is constucted in a simila way as T. In ode to constuct a balanced tee, in step (), the oot node should be selected moe caefully, instead of andom selection. In ou method, we select a median node to be the oot node in step (), which is defined as follows. DEFINITION 6. (Median Node) Given a tee T, the Median Node of T is a node on T such that when using as the oot of T, fo each diect subtee T c of on T, V (T c) V (T) holds.

A Bijective Approach to the Permutational Power of a Priority Queue

A Bijective Approach to the Permutational Power of a Priority Queue A Bijective Appoach to the Pemutational Powe of a Pioity Queue Ia M. Gessel Kuang-Yeh Wang Depatment of Mathematics Bandeis Univesity Waltham, MA 02254-9110 Abstact A pioity queue tansfoms an input pemutation

More information

Pearson s Chi-Square Test Modifications for Comparison of Unweighted and Weighted Histograms and Two Weighted Histograms

Pearson s Chi-Square Test Modifications for Comparison of Unweighted and Weighted Histograms and Two Weighted Histograms Peason s Chi-Squae Test Modifications fo Compaison of Unweighted and Weighted Histogams and Two Weighted Histogams Univesity of Akueyi, Bogi, v/noduslód, IS-6 Akueyi, Iceland E-mail: nikolai@unak.is Two

More information

Duality between Statical and Kinematical Engineering Systems

Duality between Statical and Kinematical Engineering Systems Pape 00, Civil-Comp Ltd., Stiling, Scotland Poceedings of the Sixth Intenational Confeence on Computational Stuctues Technology, B.H.V. Topping and Z. Bittna (Editos), Civil-Comp Pess, Stiling, Scotland.

More information

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012 Stanfod Univesity CS59Q: Quantum Computing Handout 8 Luca Tevisan Octobe 8, 0 Lectue 8 In which we use the quantum Fouie tansfom to solve the peiod-finding poblem. The Peiod Finding Poblem Let f : {0,...,

More information

Supplementary information Efficient Enumeration of Monocyclic Chemical Graphs with Given Path Frequencies

Supplementary information Efficient Enumeration of Monocyclic Chemical Graphs with Given Path Frequencies Supplementay infomation Efficient Enumeation of Monocyclic Chemical Gaphs with Given Path Fequencies Masaki Suzuki, Hioshi Nagamochi Gaduate School of Infomatics, Kyoto Univesity {m suzuki,nag}@amp.i.kyoto-u.ac.jp

More information

Central Coverage Bayes Prediction Intervals for the Generalized Pareto Distribution

Central Coverage Bayes Prediction Intervals for the Generalized Pareto Distribution Statistics Reseach Lettes Vol. Iss., Novembe Cental Coveage Bayes Pediction Intevals fo the Genealized Paeto Distibution Gyan Pakash Depatment of Community Medicine S. N. Medical College, Aga, U. P., India

More information

Encapsulation theory: radial encapsulation. Edmund Kirwan *

Encapsulation theory: radial encapsulation. Edmund Kirwan * Encapsulation theoy: adial encapsulation. Edmund Kiwan * www.edmundkiwan.com Abstact This pape intoduces the concept of adial encapsulation, wheeby dependencies ae constained to act fom subsets towads

More information

The Substring Search Problem

The Substring Search Problem The Substing Seach Poblem One algoithm which is used in a vaiety of applications is the family of substing seach algoithms. These algoithms allow a use to detemine if, given two chaacte stings, one is

More information

Math 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs

Math 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs Math 30: The Edős-Stone-Simonovitz Theoem and Extemal Numbes fo Bipatite Gaphs May Radcliffe The Edős-Stone-Simonovitz Theoem Recall, in class we poved Tuán s Gaph Theoem, namely Theoem Tuán s Theoem Let

More information

4/18/2005. Statistical Learning Theory

4/18/2005. Statistical Learning Theory Statistical Leaning Theoy Statistical Leaning Theoy A model of supevised leaning consists of: a Envionment - Supplying a vecto x with a fixed but unknown pdf F x (x b Teache. It povides a desied esponse

More information

Classical Worm algorithms (WA)

Classical Worm algorithms (WA) Classical Wom algoithms (WA) WA was oiginally intoduced fo quantum statistical models by Pokof ev, Svistunov and Tupitsyn (997), and late genealized to classical models by Pokof ev and Svistunov (200).

More information

New problems in universal algebraic geometry illustrated by boolean equations

New problems in universal algebraic geometry illustrated by boolean equations New poblems in univesal algebaic geomety illustated by boolean equations axiv:1611.00152v2 [math.ra] 25 Nov 2016 Atem N. Shevlyakov Novembe 28, 2016 Abstact We discuss new poblems in univesal algebaic

More information

The Chromatic Villainy of Complete Multipartite Graphs

The Chromatic Villainy of Complete Multipartite Graphs Rocheste Institute of Technology RIT Schola Wos Theses Thesis/Dissetation Collections 8--08 The Chomatic Villainy of Complete Multipatite Gaphs Anna Raleigh an9@it.edu Follow this and additional wos at:

More information

Determining solar characteristics using planetary data

Determining solar characteristics using planetary data Detemining sola chaacteistics using planetay data Intoduction The Sun is a G-type main sequence sta at the cente of the Sola System aound which the planets, including ou Eath, obit. In this investigation

More information

Merging Uncertain Multi-Version XML Documents

Merging Uncertain Multi-Version XML Documents Meging Uncetain Multi-Vesion XML Documents M. Lamine BA, Talel Abdessalem & Piee Senellat ACM DocEng 2013-1st Intenational Wokshop on Document Changes (Floence, Italy) Septembe 10 th, 2013 M. L. Ba, T.

More information

Surveillance Points in High Dimensional Spaces

Surveillance Points in High Dimensional Spaces Société de Calcul Mathématique SA Tools fo decision help since 995 Suveillance Points in High Dimensional Spaces by Benad Beauzamy Januay 06 Abstact Let us conside any compute softwae, elying upon a lage

More information

Information Retrieval Advanced IR models. Luca Bondi

Information Retrieval Advanced IR models. Luca Bondi Advanced IR models Luca Bondi Advanced IR models 2 (LSI) Pobabilistic Latent Semantic Analysis (plsa) Vecto Space Model 3 Stating point: Vecto Space Model Documents and queies epesented as vectos in the

More information

To Feel a Force Chapter 7 Static equilibrium - torque and friction

To Feel a Force Chapter 7 Static equilibrium - torque and friction To eel a oce Chapte 7 Chapte 7: Static fiction, toque and static equilibium A. Review of foce vectos Between the eath and a small mass, gavitational foces of equal magnitude and opposite diection act on

More information

Lifting Private Information Retrieval from Two to any Number of Messages

Lifting Private Information Retrieval from Two to any Number of Messages Lifting Pivate Infomation Retieval fom Two to any umbe of Messages Rafael G.L. D Oliveia, Salim El Rouayheb ECE, Rutges Univesity, Piscataway, J Emails: d746@scaletmail.utges.edu, salim.elouayheb@utges.edu

More information

Relating Branching Program Size and. Formula Size over the Full Binary Basis. FB Informatik, LS II, Univ. Dortmund, Dortmund, Germany

Relating Branching Program Size and. Formula Size over the Full Binary Basis. FB Informatik, LS II, Univ. Dortmund, Dortmund, Germany Relating Banching Pogam Size and omula Size ove the ull Binay Basis Matin Saueho y Ingo Wegene y Ralph Wechne z y B Infomatik, LS II, Univ. Dotmund, 44 Dotmund, Gemany z ankfut, Gemany sauehof/wegene@ls.cs.uni-dotmund.de

More information

3.1 Random variables

3.1 Random variables 3 Chapte III Random Vaiables 3 Random vaiables A sample space S may be difficult to descibe if the elements of S ae not numbes discuss how we can use a ule by which an element s of S may be associated

More information

Fractional Zero Forcing via Three-color Forcing Games

Fractional Zero Forcing via Three-color Forcing Games Factional Zeo Focing via Thee-colo Focing Games Leslie Hogben Kevin F. Palmowski David E. Robeson Michael Young May 13, 2015 Abstact An -fold analogue of the positive semidefinite zeo focing pocess that

More information

arxiv: v1 [cs.si] 4 Jul 2012

arxiv: v1 [cs.si] 4 Jul 2012 A Estimating Node Influenceability in Social Netwoks Rong-Hua Li, The Chinese Univesity of Hong Kong Jeffey Xu Yu, The Chinese Univesity of Hong Kong Zechao Shang, The Chinese Univesity of Hong Kong axiv:1207.0913v1

More information

Encapsulation theory: the transformation equations of absolute information hiding.

Encapsulation theory: the transformation equations of absolute information hiding. 1 Encapsulation theoy: the tansfomation equations of absolute infomation hiding. Edmund Kiwan * www.edmundkiwan.com Abstact This pape descibes how the potential coupling of a set vaies as the set is tansfomed,

More information

Chapter 3 Optical Systems with Annular Pupils

Chapter 3 Optical Systems with Annular Pupils Chapte 3 Optical Systems with Annula Pupils 3 INTRODUCTION In this chapte, we discuss the imaging popeties of a system with an annula pupil in a manne simila to those fo a system with a cicula pupil The

More information

ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE

ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE THE p-adic VALUATION OF STIRLING NUMBERS ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE Abstact. Let p > 2 be a pime. The p-adic valuation of Stiling numbes of the

More information

NOTE. Some New Bounds for Cover-Free Families

NOTE. Some New Bounds for Cover-Free Families Jounal of Combinatoial Theoy, Seies A 90, 224234 (2000) doi:10.1006jcta.1999.3036, available online at http:.idealibay.com on NOTE Some Ne Bounds fo Cove-Fee Families D. R. Stinson 1 and R. Wei Depatment

More information

Reduced Implicant Tries

Reduced Implicant Tries Reduced Implicant Ties Technical Repot SUNYA-CS-07-01 Novembe, 2007 Neil V. Muay Depatment of Compute Science Univesity at Albany Albany, NY 12222 email: nvm@cs.albany.edu Eik Rosenthal Depatment of Mathematics

More information

FUSE Fusion Utility Sequence Estimator

FUSE Fusion Utility Sequence Estimator FUSE Fusion Utility Sequence Estimato Belu V. Dasaathy Dynetics, Inc. P. O. Box 5500 Huntsville, AL 3584-5500 belu.d@dynetics.com Sean D. Townsend Dynetics, Inc. P. O. Box 5500 Huntsville, AL 3584-5500

More information

Centripetal Force OBJECTIVE INTRODUCTION APPARATUS THEORY

Centripetal Force OBJECTIVE INTRODUCTION APPARATUS THEORY Centipetal Foce OBJECTIVE To veify that a mass moving in cicula motion expeiences a foce diected towad the cente of its cicula path. To detemine how the mass, velocity, and adius affect a paticle's centipetal

More information

arxiv: v1 [physics.pop-ph] 3 Jun 2013

arxiv: v1 [physics.pop-ph] 3 Jun 2013 A note on the electostatic enegy of two point chages axiv:1306.0401v1 [physics.pop-ph] 3 Jun 013 A C Tot Instituto de Física Univesidade Fedeal do io de Janeio Caixa Postal 68.58; CEP 1941-97 io de Janeio,

More information

Plug-and-Play Dual-Tree Algorithm Runtime Analysis

Plug-and-Play Dual-Tree Algorithm Runtime Analysis Jounal of Machine Leaning Reseach 16 (2015) 3269-3297 Submitted 1/15; Published 12/15 Plug-and-Play Dual-Tee Algoithm Runtime Analysis Ryan R. Cutin School of Computational Science and Engineeing Geogia

More information

CSCE 478/878 Lecture 4: Experimental Design and Analysis. Stephen Scott. 3 Building a tree on the training set Introduction. Outline.

CSCE 478/878 Lecture 4: Experimental Design and Analysis. Stephen Scott. 3 Building a tree on the training set Introduction. Outline. In Homewok, you ae (supposedly) Choosing a data set 2 Extacting a test set of size > 3 3 Building a tee on the taining set 4 Testing on the test set 5 Repoting the accuacy (Adapted fom Ethem Alpaydin and

More information

gr0 GRAPHS Hanan Samet

gr0 GRAPHS Hanan Samet g0 GRPHS Hanan Samet ompute Science epatment and ente fo utomation Reseach and Institute fo dvanced ompute Studies Univesity of Mayland ollege Pak, Mayland 074 e-mail: hjs@umiacs.umd.edu opyight 1997 Hanan

More information

6 PROBABILITY GENERATING FUNCTIONS

6 PROBABILITY GENERATING FUNCTIONS 6 PROBABILITY GENERATING FUNCTIONS Cetain deivations pesented in this couse have been somewhat heavy on algeba. Fo example, detemining the expectation of the Binomial distibution (page 5.1 tuned out to

More information

A NEW VARIABLE STIFFNESS SPRING USING A PRESTRESSED MECHANISM

A NEW VARIABLE STIFFNESS SPRING USING A PRESTRESSED MECHANISM Poceedings of the ASME 2010 Intenational Design Engineeing Technical Confeences & Computes and Infomation in Engineeing Confeence IDETC/CIE 2010 August 15-18, 2010, Monteal, Quebec, Canada DETC2010-28496

More information

ASTR415: Problem Set #6

ASTR415: Problem Set #6 ASTR45: Poblem Set #6 Cuan D. Muhlbege Univesity of Mayland (Dated: May 7, 27) Using existing implementations of the leapfog and Runge-Kutta methods fo solving coupled odinay diffeential equations, seveal

More information

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0},

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0}, ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION E. J. IONASCU and A. A. STANCU Abstact. We ae inteested in constucting concete independent events in puely atomic pobability

More information

QIP Course 10: Quantum Factorization Algorithm (Part 3)

QIP Course 10: Quantum Factorization Algorithm (Part 3) QIP Couse 10: Quantum Factoization Algoithm (Pat 3 Ryutaoh Matsumoto Nagoya Univesity, Japan Send you comments to yutaoh.matsumoto@nagoya-u.jp Septembe 2018 @ Tokyo Tech. Matsumoto (Nagoya U. QIP Couse

More information

On the integration of the equations of hydrodynamics

On the integration of the equations of hydrodynamics Uebe die Integation de hydodynamischen Gleichungen J f eine u angew Math 56 (859) -0 On the integation of the equations of hydodynamics (By A Clebsch at Calsuhe) Tanslated by D H Delphenich In a pevious

More information

Compactly Supported Radial Basis Functions

Compactly Supported Radial Basis Functions Chapte 4 Compactly Suppoted Radial Basis Functions As we saw ealie, compactly suppoted functions Φ that ae tuly stictly conditionally positive definite of ode m > do not exist The compact suppot automatically

More information

Lecture 8 - Gauss s Law

Lecture 8 - Gauss s Law Lectue 8 - Gauss s Law A Puzzle... Example Calculate the potential enegy, pe ion, fo an infinite 1D ionic cystal with sepaation a; that is, a ow of equally spaced chages of magnitude e and altenating sign.

More information

Functions Defined on Fuzzy Real Numbers According to Zadeh s Extension

Functions Defined on Fuzzy Real Numbers According to Zadeh s Extension Intenational Mathematical Foum, 3, 2008, no. 16, 763-776 Functions Defined on Fuzzy Real Numbes Accoding to Zadeh s Extension Oma A. AbuAaqob, Nabil T. Shawagfeh and Oma A. AbuGhneim 1 Mathematics Depatment,

More information

( ) [ ] [ ] [ ] δf φ = F φ+δφ F. xdx.

( ) [ ] [ ] [ ] δf φ = F φ+δφ F. xdx. 9. LAGRANGIAN OF THE ELECTROMAGNETIC FIELD In the pevious section the Lagangian and Hamiltonian of an ensemble of point paticles was developed. This appoach is based on a qt. This discete fomulation can

More information

Multiple Criteria Secretary Problem: A New Approach

Multiple Criteria Secretary Problem: A New Approach J. Stat. Appl. Po. 3, o., 9-38 (04 9 Jounal of Statistics Applications & Pobability An Intenational Jounal http://dx.doi.og/0.785/jsap/0303 Multiple Citeia Secetay Poblem: A ew Appoach Alaka Padhye, and

More information

B. Spherical Wave Propagation

B. Spherical Wave Propagation 11/8/007 Spheical Wave Popagation notes 1/1 B. Spheical Wave Popagation Evey antenna launches a spheical wave, thus its powe density educes as a function of 1, whee is the distance fom the antenna. We

More information

Psychometric Methods: Theory into Practice Larry R. Price

Psychometric Methods: Theory into Practice Larry R. Price ERRATA Psychometic Methods: Theoy into Pactice Lay R. Pice Eos wee made in Equations 3.5a and 3.5b, Figue 3., equations and text on pages 76 80, and Table 9.1. Vesions of the elevant pages that include

More information

Unobserved Correlation in Ascending Auctions: Example And Extensions

Unobserved Correlation in Ascending Auctions: Example And Extensions Unobseved Coelation in Ascending Auctions: Example And Extensions Daniel Quint Univesity of Wisconsin Novembe 2009 Intoduction In pivate-value ascending auctions, the winning bidde s willingness to pay

More information

Quantum Fourier Transform

Quantum Fourier Transform Chapte 5 Quantum Fouie Tansfom Many poblems in physics and mathematics ae solved by tansfoming a poblem into some othe poblem with a known solution. Some notable examples ae Laplace tansfom, Legende tansfom,

More information

Probablistically Checkable Proofs

Probablistically Checkable Proofs Lectue 12 Pobablistically Checkable Poofs May 13, 2004 Lectue: Paul Beame Notes: Chis Re 12.1 Pobablisitically Checkable Poofs Oveview We know that IP = PSPACE. This means thee is an inteactive potocol

More information

C/CS/Phys C191 Shor s order (period) finding algorithm and factoring 11/12/14 Fall 2014 Lecture 22

C/CS/Phys C191 Shor s order (period) finding algorithm and factoring 11/12/14 Fall 2014 Lecture 22 C/CS/Phys C9 Sho s ode (peiod) finding algoithm and factoing /2/4 Fall 204 Lectue 22 With a fast algoithm fo the uantum Fouie Tansfom in hand, it is clea that many useful applications should be possible.

More information

7.2. Coulomb s Law. The Electric Force

7.2. Coulomb s Law. The Electric Force Coulomb s aw Recall that chaged objects attact some objects and epel othes at a distance, without making any contact with those objects Electic foce,, o the foce acting between two chaged objects, is somewhat

More information

ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi

ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi Opuscula Math. 37, no. 3 (017), 447 456 http://dx.doi.og/10.7494/opmath.017.37.3.447 Opuscula Mathematica ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS D.A. Mojdeh and B. Samadi Communicated

More information

A Converse to Low-Rank Matrix Completion

A Converse to Low-Rank Matrix Completion A Convese to Low-Rank Matix Completion Daniel L. Pimentel-Alacón, Robet D. Nowak Univesity of Wisconsin-Madison Abstact In many pactical applications, one is given a subset Ω of the enties in a d N data

More information

A Metric on the Space of Reduced Phylogenetic Networks

A Metric on the Space of Reduced Phylogenetic Networks 1 A Metic on the Space of Reduced Phylogenetic Netwoks Luay Nakhleh Abstact Phylogenetic netwoks ae leaf-labeled, ooted, acyclic, diected gaphs, that ae used to model eticulate evolutionay histoies. Seveal

More information

Chem 453/544 Fall /08/03. Exam #1 Solutions

Chem 453/544 Fall /08/03. Exam #1 Solutions Chem 453/544 Fall 3 /8/3 Exam # Solutions. ( points) Use the genealized compessibility diagam povided on the last page to estimate ove what ange of pessues A at oom tempeatue confoms to the ideal gas law

More information

COMPUTATIONS OF ELECTROMAGNETIC FIELDS RADIATED FROM COMPLEX LIGHTNING CHANNELS

COMPUTATIONS OF ELECTROMAGNETIC FIELDS RADIATED FROM COMPLEX LIGHTNING CHANNELS Pogess In Electomagnetics Reseach, PIER 73, 93 105, 2007 COMPUTATIONS OF ELECTROMAGNETIC FIELDS RADIATED FROM COMPLEX LIGHTNING CHANNELS T.-X. Song, Y.-H. Liu, and J.-M. Xiong School of Mechanical Engineeing

More information

A Comparison and Contrast of Some Methods for Sample Quartiles

A Comparison and Contrast of Some Methods for Sample Quartiles A Compaison and Contast of Some Methods fo Sample Quatiles Anwa H. Joade and aja M. Latif King Fahd Univesity of Petoleum & Mineals ABSTACT A emainde epesentation of the sample size n = 4m ( =, 1, 2, 3)

More information

Computers and Mathematics with Applications

Computers and Mathematics with Applications Computes and Mathematics with Applications 58 (009) 9 7 Contents lists available at ScienceDiect Computes and Mathematics with Applications jounal homepage: www.elsevie.com/locate/camwa Bi-citeia single

More information

Chapter 5 Linear Equations: Basic Theory and Practice

Chapter 5 Linear Equations: Basic Theory and Practice Chapte 5 inea Equations: Basic Theoy and actice In this chapte and the next, we ae inteested in the linea algebaic equation AX = b, (5-1) whee A is an m n matix, X is an n 1 vecto to be solved fo, and

More information

Analysis of simple branching trees with TI-92

Analysis of simple branching trees with TI-92 Analysis of simple banching tees with TI-9 Dušan Pagon, Univesity of Maibo, Slovenia Abstact. In the complex plane we stat at the cente of the coodinate system with a vetical segment of the length one

More information

The Strain Compatibility Equations in Polar Coordinates RAWB, Last Update 27/12/07

The Strain Compatibility Equations in Polar Coordinates RAWB, Last Update 27/12/07 The Stain Compatibility Equations in Pola Coodinates RAWB Last Update 7//7 In D thee is just one compatibility equation. In D polas it is (Equ.) whee denotes the enineein shea (twice the tensoial shea)

More information

HQuad: Statistics of Hamiltonian Cycles in Wireless Rechargeable Sensor Networks

HQuad: Statistics of Hamiltonian Cycles in Wireless Rechargeable Sensor Networks HQuad: Statistics of Hamiltonian Cycles in Wieless Rechageable Senso Netwoks Yanmao Man Dept. of ECE Univesity of Aizona Tucson, AZ, U.S.A. yman@email.aizona.edu Jing Deng Dept. of CS UNC at Geensboo Geensboo,

More information

APPLICATION OF MAC IN THE FREQUENCY DOMAIN

APPLICATION OF MAC IN THE FREQUENCY DOMAIN PPLICION OF MC IN HE FREQUENCY DOMIN D. Fotsch and D. J. Ewins Dynamics Section, Mechanical Engineeing Depatment Impeial College of Science, echnology and Medicine London SW7 2B, United Kingdom BSRC he

More information

Lab #4: Newton s Second Law

Lab #4: Newton s Second Law Lab #4: Newton s Second Law Si Isaac Newton Reading Assignment: bon: Januay 4, 1643 Chapte 5 died: Mach 31, 1727 Chapte 9, Section 9-7 Intoduction: Potait of Isaac Newton by Si Godfey Knelle http://www.newton.cam.ac.uk/at/potait.html

More information

arxiv: v2 [astro-ph] 16 May 2008

arxiv: v2 [astro-ph] 16 May 2008 New Anomalies in Cosmic Micowave Backgound Anisotopy: Violation of the Isotopic Gaussian Hypothesis in Low-l Modes Shi Chun, Su and M.-C., Chu Depatment of Physics and Institute of Theoetical Physics,

More information

ON THE TWO-BODY PROBLEM IN QUANTUM MECHANICS

ON THE TWO-BODY PROBLEM IN QUANTUM MECHANICS ON THE TWO-BODY PROBLEM IN QUANTUM MECHANICS L. MICU Hoia Hulubei National Institute fo Physics and Nuclea Engineeing, P.O. Box MG-6, RO-0775 Buchaest-Maguele, Romania, E-mail: lmicu@theoy.nipne.o (Received

More information

10/04/18. P [P(x)] 1 negl(n).

10/04/18. P [P(x)] 1 negl(n). Mastemath, Sping 208 Into to Lattice lgs & Cypto Lectue 0 0/04/8 Lectues: D. Dadush, L. Ducas Scibe: K. de Boe Intoduction In this lectue, we will teat two main pats. Duing the fist pat we continue the

More information

Lab 10: Newton s Second Law in Rotation

Lab 10: Newton s Second Law in Rotation Lab 10: Newton s Second Law in Rotation We can descibe the motion of objects that otate (i.e. spin on an axis, like a popelle o a doo) using the same definitions, adapted fo otational motion, that we have

More information

Deterministic vs Non-deterministic Graph Property Testing

Deterministic vs Non-deterministic Graph Property Testing Deteministic vs Non-deteministic Gaph Popety Testing Lio Gishboline Asaf Shapia Abstact A gaph popety P is said to be testable if one can check whethe a gaph is close o fa fom satisfying P using few andom

More information

SMT 2013 Team Test Solutions February 2, 2013

SMT 2013 Team Test Solutions February 2, 2013 1 Let f 1 (n) be the numbe of divisos that n has, and define f k (n) = f 1 (f k 1 (n)) Compute the smallest intege k such that f k (013 013 ) = Answe: 4 Solution: We know that 013 013 = 3 013 11 013 61

More information

Physics 211: Newton s Second Law

Physics 211: Newton s Second Law Physics 211: Newton s Second Law Reading Assignment: Chapte 5, Sections 5-9 Chapte 6, Section 2-3 Si Isaac Newton Bon: Januay 4, 1643 Died: Mach 31, 1727 Intoduction: Kinematics is the study of how objects

More information

An intersection theorem for four sets

An intersection theorem for four sets An intesection theoem fo fou sets Dhuv Mubayi Novembe 22, 2006 Abstact Fix integes n, 4 and let F denote a family of -sets of an n-element set Suppose that fo evey fou distinct A, B, C, D F with A B C

More information

Do Managers Do Good With Other People s Money? Online Appendix

Do Managers Do Good With Other People s Money? Online Appendix Do Manages Do Good With Othe People s Money? Online Appendix Ing-Haw Cheng Haison Hong Kelly Shue Abstact This is the Online Appendix fo Cheng, Hong and Shue 2013) containing details of the model. Datmouth

More information

Matrix Colorings of P 4 -sparse Graphs

Matrix Colorings of P 4 -sparse Graphs Diplomabeit Matix Coloings of P 4 -spase Gaphs Chistoph Hannnebaue Januay 23, 2010 Beteue: Pof. D. Winfied Hochstättle FenUnivesität in Hagen Fakultät fü Mathematik und Infomatik Contents Intoduction iii

More information

Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q

Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q Secet Exponent Attacks on RSA-type Schemes with Moduli N = p q Alexande May Faculty of Compute Science, Electical Engineeing and Mathematics Univesity of Padebon 33102 Padebon, Gemany alexx@uni-padebon.de

More information

Geometry of the homogeneous and isotropic spaces

Geometry of the homogeneous and isotropic spaces Geomety of the homogeneous and isotopic spaces H. Sonoda Septembe 2000; last evised Octobe 2009 Abstact We summaize the aspects of the geomety of the homogeneous and isotopic spaces which ae most elevant

More information

High Dimensional Clustering with r-nets

High Dimensional Clustering with r-nets High Dimensional Clusteing with -nets Geogia Avaikioti, Alain Ryse, Yuyi Wang, Roge Wattenhofe ETH Zuich, Switzeland {zetava,ayse,yuwang,wattenhofe}@ethz.ch Abstact Clusteing, a fundamental task in data

More information

CENTER FOR MULTIMODAL SOLUTIONS FOR CONGESTION MITIGATION (CMS)

CENTER FOR MULTIMODAL SOLUTIONS FOR CONGESTION MITIGATION (CMS) Final Repot to the CENTER FOR MULTIMODAL SOLUTIONS FOR CONGESTION MITIGATION (CMS) CMS Poect Numbe: _8-4_ Title: Chaacteizing the Tadeoffs and Costs Associated with Tanspotation Congestion in Supply Chains

More information

Fresnel Diffraction. monchromatic light source

Fresnel Diffraction. monchromatic light source Fesnel Diffaction Equipment Helium-Neon lase (632.8 nm) on 2 axis tanslation stage, Concave lens (focal length 3.80 cm) mounted on slide holde, iis mounted on slide holde, m optical bench, micoscope slide

More information

AMC 10 Contest B. Solutions Pamphlet. Wednesday, FEBRUARY 21, American Mathematics Competitions

AMC 10 Contest B. Solutions Pamphlet. Wednesday, FEBRUARY 21, American Mathematics Competitions The MATHEMATICAL ASSOCIATION of AMERICA Ameican Mathematics Competitions 8 th Annual Ameican Mathematics Contest 10 AMC 10 Contest B Solutions Pamphlet Wednesday, FEBRUARY 21, 2007 This Pamphlet gives

More information

COMP Parallel Computing SMM (3) OpenMP Case Study: The Barnes-Hut N-body Algorithm

COMP Parallel Computing SMM (3) OpenMP Case Study: The Barnes-Hut N-body Algorithm COMP 633 - Paallel Computing Lectue 8 Septembe 14, 2017 SMM (3) OpenMP Case Study: The Banes-Hut N-body Algoithm Topics Case study: the Banes-Hut algoithm Study an impotant algoithm in scientific computing»

More information

On the ratio of maximum and minimum degree in maximal intersecting families

On the ratio of maximum and minimum degree in maximal intersecting families On the atio of maximum and minimum degee in maximal intesecting families Zoltán Lóánt Nagy Lale Özkahya Balázs Patkós Máté Vize Mach 6, 013 Abstact To study how balanced o unbalanced a maximal intesecting

More information

Gradient-based Neural Network for Online Solution of Lyapunov Matrix Equation with Li Activation Function

Gradient-based Neural Network for Online Solution of Lyapunov Matrix Equation with Li Activation Function Intenational Confeence on Infomation echnology and Management Innovation (ICIMI 05) Gadient-based Neual Netwok fo Online Solution of Lyapunov Matix Equation with Li Activation unction Shiheng Wang, Shidong

More information

An Application of Fuzzy Linear System of Equations in Economic Sciences

An Application of Fuzzy Linear System of Equations in Economic Sciences Austalian Jounal of Basic and Applied Sciences, 5(7): 7-14, 2011 ISSN 1991-8178 An Application of Fuzzy Linea System of Equations in Economic Sciences 1 S.H. Nassei, 2 M. Abdi and 3 B. Khabii 1 Depatment

More information

A quadratic algorithm for road coloring

A quadratic algorithm for road coloring A quadatic algoithm fo oad coloing Maie-Piee Béal and Dominique Pein Octobe 6, 0 axiv:080.076v9 [cs.ds] 0 May 01 Abstact The Road Coloing Theoem states that evey apeiodic diected gaph with constant out-degee

More information

Localization of Eigenvalues in Small Specified Regions of Complex Plane by State Feedback Matrix

Localization of Eigenvalues in Small Specified Regions of Complex Plane by State Feedback Matrix Jounal of Sciences, Islamic Republic of Ian (): - () Univesity of Tehan, ISSN - http://sciencesutaci Localization of Eigenvalues in Small Specified Regions of Complex Plane by State Feedback Matix H Ahsani

More information

arxiv:physics/ v2 [physics.soc-ph] 11 Mar 2005

arxiv:physics/ v2 [physics.soc-ph] 11 Mar 2005 Heide Balance in Human Netwoks P. Gawoński and K. Ku lakowski axiv:physics/5385v2 [physics.soc-ph] 11 Ma 25 Depatment of Applied Compute Science, Faculty of Physics and Applied Compute Science, AGH Univesity

More information

Additive Approximation for Edge-Deletion Problems

Additive Approximation for Edge-Deletion Problems Additive Appoximation fo Edge-Deletion Poblems Noga Alon Asaf Shapia Benny Sudakov Abstact A gaph popety is monotone if it is closed unde emoval of vetices and edges. In this pape we conside the following

More information

Aalborg Universitet. Load Estimation from Natural input Modal Analysis Aenlle, Manuel López; Brincker, Rune; Canteli, Alfonso Fernández

Aalborg Universitet. Load Estimation from Natural input Modal Analysis Aenlle, Manuel López; Brincker, Rune; Canteli, Alfonso Fernández Aalbog Univesitet Load Estimation fom atual input Modal Analysis Aenlle, Manuel López; Bincke, Rune; Canteli, Alfonso Fenández Published in: Confeence Poceedings Publication date: 005 Document Vesion Publishe's

More information

Macro Theory B. The Permanent Income Hypothesis

Macro Theory B. The Permanent Income Hypothesis Maco Theoy B The Pemanent Income Hypothesis Ofe Setty The Eitan Beglas School of Economics - Tel Aviv Univesity May 15, 2015 1 1 Motivation 1.1 An econometic check We want to build an empiical model with

More information

Computers & Operations Research

Computers & Operations Research Computes & Opeations Reseach 37 (2010) 72 -- 82 Contents lists available at ScienceDiect Computes & Opeations Reseach jounal homepage: www.elsevie.com/locate/co Min-degee constained minimum spanning tee

More information

The Persistence of Most Probable Explanations in Bayesian Networks

The Persistence of Most Probable Explanations in Bayesian Networks EAI 2014 T. Schaub et al. (Eds.) 2014 The Authos and IOS Pess. This aticle is published online with Open Access by IOS Pess and distibuted unde the tems of the eative ommons Attibution Non-ommecial License.

More information

Research Article On Alzer and Qiu s Conjecture for Complete Elliptic Integral and Inverse Hyperbolic Tangent Function

Research Article On Alzer and Qiu s Conjecture for Complete Elliptic Integral and Inverse Hyperbolic Tangent Function Abstact and Applied Analysis Volume 011, Aticle ID 697547, 7 pages doi:10.1155/011/697547 Reseach Aticle On Alze and Qiu s Conjectue fo Complete Elliptic Integal and Invese Hypebolic Tangent Function Yu-Ming

More information

working pages for Paul Richards class notes; do not copy or circulate without permission from PGR 2004/11/3 10:50

working pages for Paul Richards class notes; do not copy or circulate without permission from PGR 2004/11/3 10:50 woking pages fo Paul Richads class notes; do not copy o ciculate without pemission fom PGR 2004/11/3 10:50 CHAPTER7 Solid angle, 3D integals, Gauss s Theoem, and a Delta Function We define the solid angle,

More information

Exploration of the three-person duel

Exploration of the three-person duel Exploation of the thee-peson duel Andy Paish 15 August 2006 1 The duel Pictue a duel: two shootes facing one anothe, taking tuns fiing at one anothe, each with a fixed pobability of hitting his opponent.

More information

On the ratio of maximum and minimum degree in maximal intersecting families

On the ratio of maximum and minimum degree in maximal intersecting families On the atio of maximum and minimum degee in maximal intesecting families Zoltán Lóánt Nagy Lale Özkahya Balázs Patkós Máté Vize Septembe 5, 011 Abstact To study how balanced o unbalanced a maximal intesecting

More information

Efficient Algorithms for Adaptive Influence Maximization

Efficient Algorithms for Adaptive Influence Maximization Efficient Algoithms fo Adaptive Influence Maximization Kai Han Univesity of Science and Technology of China hankai@ustc.edu.cn Jing Tang National Univesity of Singapoe isejtang@nus.edu.sg Keke Huang Nanyang

More information

MATH 415, WEEK 3: Parameter-Dependence and Bifurcations

MATH 415, WEEK 3: Parameter-Dependence and Bifurcations MATH 415, WEEK 3: Paamete-Dependence and Bifucations 1 A Note on Paamete Dependence We should pause to make a bief note about the ole played in the study of dynamical systems by the system s paametes.

More information

Answering Queries Using Views with Arithmetic. comparisons.

Answering Queries Using Views with Arithmetic. comparisons. Answeing Queies Using Views with Aithmetic Compaisons Foto Afati Electical and Computing Engineeing National Technical Univesity 157 73 Athens, Geece afati@cs.ece.ntua.g Chen Li Infomation and Compute

More information