Hierarchical CP-networks

Size: px
Start display at page:

Download "Hierarchical CP-networks"

Transcription

1 Hierarchical CP-networks Denis Mindolin Det. of Comuter Science and Engineering, Universit at Buffalo, Buffalo, NY Jan Chomicki Det. of Comuter Science and Engineering, Universit at Buffalo, Buffalo, NY ABSTRACT We resent here a variant of acclic CP-networks. It allows not onl finite but also infinite domain attributes. It also has the roert that a reference over each attribute in the network has higher riorit then all the descendants references. We rovide an algorithm of constructing a reference formula reresenting the order induced b a hierarchical CPnetwork, thus making it ossible to work with hierarchical CP-networks in the database context. We also rovide a coexit analsis of the size of reference formula constructed b the algorithm. 1. INTRODUCTION In making an kind of choice in the everda s life, the notion of reference alwas comes to mind. A number of reference handling models have been develoed. Two ver oular ones are the CP-network model[1] and the binar relation model[4, 9]. Being ver general, the binar relation framework can be used in different contexts like reference construction [9] or reference modification [6]. Moreover, the ower of relational databases can be used to find the otimal outcomes of references reresented as binar relations [4, 9]. At the same time, the CP-network model is ver sie and intuitive. It reresents a coex reference over objects using a set of atomic references each of which is a reference over a single object attribute given that the values of the other attributes are equal (the ceteris aribus rincile). This set of atomic references is reresented as a directed grah (sometimes called the reference grah) whose nodes are atomic references, and edges between nodes corresond to conditional references over attributes - i.e. the values of the arent attributes influence the references over the child attributes. The hierarchical CP-network model, which is introduced in this aer, addresses some semantical and reresentational limitations of CP-networks: 1) it allows continuous attributes b reresenting conditional reference tables as Permission to co without fee all or art of this material is granted rovided that the coies are not made or distributed for direct commercial advantage, the VLDB coright notice and the title of the ublication and its date aear, and notice is given that coing is b ermission of the Ver Large Data Base Endowment. To co otherwise, or to reublish, to ost on servers or to redistribute to lists, requires a fee and/or secial ermission from the ublisher, ACM. VLDB 07, Setember 23-28, 2007, Vienna, Austria. Coright 2007 VLDB Endowment, ACM /07/09. binar reference relations, 2) the attributes in hierarchical CP-networks are rioritized: an attribute in reference grah is more imortant than its descendants; 3) the ceteris aribus rincile can be selectivel relaxed. According to [1], in some CP-network instances edges between attributes in reference grah corresond to attribute riorities. Exae 1. Let a CP-net N 1 over the roblem with two attributes X = {X 1, } be defined as in Figure 1. X 1 x a 1 x b 1 x a 1 x a 2 x b 2 x b 1 x b 2 x a 2 (a) CP-network N 1 (x a 1, x a 2) (x a 1, x b 2) (x b 1, x a 2) (x b 1, x b 2) (b) The reference order iied b N 1. The references obtained from the CPTs are shown as solid arcs. The entailed references are shown as dashed arcs. Figure 1: CP-net N 1 from Exae 1 The CP-net N 1 induces a total ordering of all the outcomes (Figure 1.b) which iies that the most imortant is to satisf the references over the attribute X 1, then over the attribute (the outcomes with values X 1 = x a 1 are alwas referred to those with X 1 = x b 1). However, attribute rioritization does not hold for all CPnetwork instances. In articular, it is not alwas the case that violation of a reference is worse than violation of two or more descendant references. Exae 2. Let CP-net N 2 over the roblem with three attributes X = {X 1,, } be defined as in Figure 2. The entailed reference arcs are skied in Figure 2.b for siicit. However the can be obtained b erforming the transitive closure of the grah. Note that in N 2, (x a 1, x b 2, x a 3) is not referred to (x b 1, x b 2, x b 3) even though the the value x a 1 of X 1 is referred to x b 1.

2 X 1 x a 1 x b 1 x a 1 x a 2 x b 2 x b 1 x b 2 x a 2 x a 2 x a 3 x b 3 x b 2 x b 3 x a 3 (a) CP-network N 2 (x a 1, x a 2, x a 3) (x a 1, x a 2, x b 3) (x a 1, x b 2, x a 3) (x b 1, x a 2, x a 3) (x a 1, x b 2, x b 3) (x b 1, x a 2, x b 3) (x b 1, x b 2, x a 3) (x b 1, x b 2, x b 3) (b) The reference order iied b CPnetwork N 2 Figure 2: CP-net N 2 for Exae 2 Models in which descendant references are less imortant then their ancestors are natural for frameworks in which references are iterativel constructed b a user in a todown manner; namel, when a new reference is added as a leaf node or a node starting a new reference subgrah. In this case, the nodes added as less imortant references (leaf nodes) are guaranteed not to violate more imortant, alread introduced ancestor references. Another drawback of CP-networks [12] is that sometimes the ceteris aribus semantics is too strict, and when one introduces a reference over an attribute, it s not alwas ossible to sa that this reference has to be of the everthing else being equal kind. Exae 3. Assume a erson wants to bu a car. Let a car seller have a database of cars which are described b the attributes {make, ear, rice, mileage, engine-te}. At the same time, the erson onl cares about the attributes {make, ear, rice, mileage}. However, in the CP-network framework there is no wa to secif that engine-te is irrelevant: if a CP-network has a conditional reference table over engine-te, then engine-te is relevant; if it does not, then one outcome will be referred to another according to the CP-network onl if the engine-tes of the outcomes are the same. According to the definition of CP-networks [1], each attribute involved in a CP-network is categorical. At the same time, there are man roblems in which continuous attributes arise and for which it would be useful to have an aroach similar to CP-networks. Due to these limitations, the references from Exae 4 below cannot be reresented as a CP-network. However, the can be reresented using hierarchical CP-networks, as we show in Exae 5. Exae 4. Assume a user wants to bu a car, and her reference over make has the same imortance as the reference over ear, rice, and mileage. At the same time, assume that ear is more imortant than rice and mileage. Let the reference be constructed in a to-down manner from more to less imortant variables. So the first reference introduced b the user is over make: given two cars with the same age, rice and mileage, she refers VW to Kia, and Kia to all the other makes. The second reference is over ear: given two cars of the same make, she would bu the newer one. The third reference is over mileage: if the makes, ages, and rices are the same, but the cars are relativel new (ear 2004), she refers the one with less mileage (less than 60000). However, if the makes, ages, and rices are the same, but the cars are old (ear < 2004), she refers the one with the mileage less than The last reference is over rice: if two cars have the same make, age, and mileage, but are new (ear 2006), she refers the cheaer one. However, given two cars with the same make, age, and mileage, but not new (ear < 2006), she refers to send not more then on it. The aer is organized as follows. Section 2 contains the definition of hierarchical CP-networks and a discussion of some of their roerties. In Section 3, we describe an algorithm constructing a reference formula reresenting the order induced b a hierarchical CP-network. This allows to work with hierarchical CP-networks in the database context. Section 4 contains the coexit analsis of the reference formula constructed b the algorithm. Section 5 concludes the aer with a discussion of related and future work. 2. NOTIONS In this aer we adot the notations from both aroaches: CP-networks and binar reference relations. Assume we have a roblem over outcomes described b n attributes X = {X 1,..., X n} such that each attribute X i is associated with a domain D(X i) (categorical or continuous). Let us denote the set of all ossible outcomes as D D = D(X 1)... D(X n), and the set of all ossible assignments to the set of attributes U X as D(U) = X U D(X). Then given an outcome o D, we denote the value of an attribute X X of o as o.x. A relation instance is a finite set of outcomes. We limit our attention to reference relations that are strict artial orders (SPOs): transitive and irreflexive binar relations. 2.1 Hierarchical CP-network Let a conditional reference table CP T(X) associated with an attribute X X be defined as a trile CPT(X) = (Φ X, W X, U X) in which W X X, U X X such that U X W X =, X U X, X W X, and Φ X = {ϕ 1,..., ϕ k }. Let ϕ be defined as u ϕ : R ϕ where u ϕ is a relation such that u ϕ D(U X), R ϕ is a strict artial order over D(X), and for all airs of different ϕ 1, ϕ 2 Φ X, we have u ϕ1

3 u ϕ2 =. Let P uϕ be a finite formula reresenting the relation u ϕ, and a P Rϕ be a finite formula reresenting the relation R ϕ. In the coexit analsis, we will assume that P uϕ and P Rϕ are such that the can be evaluated in olnomial time for given valuations of the free variables. Define for each ϕ a binar relation over outcomes ϕ = {(uxw, ux w ) :u D(U X), u ϕ(u); w, w D(W X); D(Y X);(x, x ) R ϕ} where Y X = X ({X} W X U X). We define the binar relation induced b conditional reference table CP T(X) as CPT (X) = ϕ ΦX ϕ. Thus from the exression for ϕ it follows that the reference over attribute X is conditionall deendent on the attributes from U X. Moreover, the reference over the attribute X is indeendent of the attributes from W X. In other words, instead of the CP-network rincile everthing else being equal we use the everthing else being equal excet for the attributes W X rincile which was introduced in [12]. Summarizing the notation introduced so far: U X, W X, and Y X are such that 1) U X W X = ; 2) X U X, X W X; 3) Y X = X ({X} W X U X). Proosition 1. ϕ and CPT (X) are strict artial orders. Definition 1. Let Γ be a set of conditional reference tables for the attributes X Γ X Γ = {CPT(X) : X X Γ}. We define the reference order Γ induced b Γ as the transitive closure of CPT(X) Γ CPT (X) Γ TC( CPT(X) Γ CPT (X)). Note that our definition of the order induced b Γ is different from the definition of the order entailed b CP-network [1]. Definition 2. [1] Let Γ be a set of conditional reference tables. Let be a total order over D. Then is said to satisf CPT(X) if for all o, o D : (o, o ) CPT (X) iies o o. A total order is said to satisf Γ if it satisfies ever CP T(X) Γ. Proosition 2. Let the order Γ entailed b the hierarchical CP-network Γ be the intersection of all total orders satisfing Γ. Then the order Γ induced b Γ and the order Γ entailed b Γ are equivalent. Proof: Prove that ever linear extension of Γ is a total order satisfing Γ and vice versa. Let be a linear extension of Γ, i.e. TC( X XΓ CPT (X)). It iies X X Γ CPT (X). Thus satisfies Γ. Let be a total order satisfing Γ, i.e. X XΓ CPT (X). being an SPO iies TC( X XΓ CPT (X)). Therefore is a linear extension of Γ. We define now hierarchical CP-networks. Let H(X) = {(Y, X) : Y U X}, where H(X) can be viewed as a directed grah with incoming edges going from the attributes Y U X to a single attribute X. These edges corresond to the conditional reference of attribute X on attributes Y U X. Then we define the reference grah of Γ as H Γ = X XΓ H(X). Working with reference grah H Γ, let us use the following notation: Anc Γ(X) = { ancestors of X in H Γ }, Anc-self Γ(X) = { ancestors of X in H Γ or X }, Desc Γ(X) = { descendants of X in H Γ }, Sibl Γ(X) = X Γ (Desc Γ(X) Anc Γ(X) {X}), Pa Γ(X) = { arents of X in H Γ}, Ch Γ(X) = { children of X in H Γ }. Definition 3. A set of conditional reference tables Γ is called a hierarchical CP-network if 1. for ever X in X Γ, W X = Z ChΓ (X)({Z} WZ); 2. if an attribute X has no child attributes in H Γ, then W X = X X Γ. From Definition 3 it follows that for each attribute X in the reference grah of a hierarchical CP-network Γ, W X = Desc Γ(X) (X X Γ). As a result, a reference over an attribute is more imortant than the references over this attribute s descendants in H Γ. Definition 3 also iies that a reference grah H Γ of a hierarchical network is acclic, otherwise W X of some attribute X involved in a ccle would contain attribute X leading to a contradiction. The formula reresentation P ϕ of ϕ is defined as P ϕ (o, o ) = [ Z Anc(X) Sibl(X) o.z = o.z] P uϕ (o.u X) P uϕ (o.u X) P Rϕ (o.x, o.x), according to Definition 3. The formula reresentation P CPT (X) of CPT is defined as P CPT (X)(o, o ) = ϕ Φ X P ϕ (o, o ), or using the exression for P ϕ (o, o ), P CPT (X)(o, o ) = [ Z Anc(X) Sibl(X) o.z = o.z] ϕ Φ X P uϕ (o.u X) P uϕ (o.u X) P Rϕ (o.x, o.x). Let Q CPT (X)(o, o ) = ϕ Φ X P uϕ (o.u X) P uϕ (o.u X) P Rϕ (o.x, o.x). Then P CPT (X)(o, o ) = [ Z Anc(X) Sibl(X) o.z = o.z] Q CPT (X)(o, o ). Note that since P uϕ and P Rϕ are finite formulas and can be evaluated in olnomial time, P ϕ, P CPT (X), and Q CPT (X) are finite formulas and can be evaluated in olnomial time as well. We introduce formula Q CPT (X) here since it las an imortant role further in the aer. In our model, a conditional reference table CPT(X) is grahicall reresented as a two-column table in which a row corresonds to a single ϕ Φ X. The first column of each row holds the formula P uϕ, and the second column holds the formula P Rϕ. Comared to conditional reference tables of the traditional CP-network model, hierarchical CPTs differ in the following:

4 the first column of a CP-net CPT is required to store a single assignment to U X, while a hierarchical CPT has there a formula P uϕ. As a result, since P uϕ reresents the relation u ϕ, hierarchical CPTs can be defined for infinite domain attributes U X; the second column of a CP-net CPT(X) is required to store a total order of D(X). In our aroach, the second column holds a formula P Rϕ reresenting an SPO relation over D(X). Therefore hierarchical CPTs can be defined for infinite domain attributes X: Exae 5. Take Exae 4. A hierarchical CP-network Γ which corresonds to the reference from this exae is shown in Figure 3. Note that according to Exae 4 the references over the attributes and m are unconditional, i.e. there is no attribute in X Γ whose value influences the reference over or m. Therefore U = U m = and the first columns of CPT() and CPT(m) are skied (shown filled with dashes). CPT(m) - m - [o.m = vw o.m = kia] [o.m {kia, vw} o.m {kia, vw}] m CPT() CPT() 2006 o. < o. CPT() - - o. > o o. < o < 2004 o. < o < 2006 o o. > 8000 Figure 3: Hierarchical CP-net for Exae 5. Note that hierarchical CP-networks do not subsume CPnets, although it ma aear to be so. In CP-nets, W X = but this ma violate the first condition of Definition Subnet of a hierarchical CP-network Loosel seaking, a subnet of a hierarchical CP-network Γ is just a subset of the conditional reference tables from Γ. However not an subset of Γ is a subnet. Its formal definition is given further. Definition 4. Let and Γ be two hierarchical CP-networks such that 1. X X Γ: all attributes used in the network are also used in the network Γ; 2. if some attribute X from X Γ is in X then all ancestors of X from H Γ are in X ; 3. Given two conditional reference tables CPT (X) and CPT Γ(X) for an attribute X Γ corresondingl, the first and the third comonents (namel, Φ X and U X) of the two conditional reference tables are equal. The W X comonent of CPT (X) is set to Desc (X) (X X ), i.e. it is set according to the reference grah H of. Then is called a subnet of a hierarchical CP-network Γ. The notion of subnet of a hierarchical CP-network will be used further in the aer to construct a reference formula reresenting the order induced b a hierarchical reference network. 3. FROM HIERARCHICAL CP-NETS TO PREFERENCE FORMULAS Dealing with references, the two most common tasks are 1) given two outcomes, find the more referred one, and 2) find the otimal outcomes from the given set of outcomes. The first roblem is called dominance testing. In the CPnetwork aroach, this roblem can be solved in olnomial time in the number of attributes when a reference grah is a directed tree or oltree. If the grah is directed-ath singl-connected, dominance testing is NP-coete, and it is in NP if the number of aths between an air of nodes in the grah is olnomiall bounded [1]. In the hierarchical CP-network framework, this roblem can be solved in olnomial time in the size of the hierarchical CP-network descrition b the following roosition which is analogous to a result in [12]. Proosition 3. Let Γ be a hierarchical CP-net. Let o, o be two outcomes. Let Diff = {X 1,..., X l } X Γ be the attributes in whose values o and o are different, and To be the set of all nodes from Diff which have no ancestors in Diff. Then o Γ o X To : Q CPT (X)(o, o ) As shown in [12], the roblem of finding the otimal outcomes can be also solved b Proosition 3 b taking ever outcome and checking if there is an outcome dominating it. Thus the otimal outcomes can be comuted in time olnomial in the size of the network descrition and the number of outcomes. To find the otimal outcomes in the relational database framework, the winnow oerator [4] can be used. It is an algebraic oerator which icks from a given relation (containing all ossible outcomes) the set of the most referred outcomes, according to a given reference relation. Formall, it is defined as follows. Definition 5. If R is a relation schema and a reference relation over R, then the winnow oerator is written as ω (R), and for ever instance r of R: ω (r) = {t r t r. t t} From Definition 5, it follows that using the winnow oerator requires the order induced b a hierarchical CP-network to be reresented as a binar reference relation. According to Proosition 3, one of the was to construct a reference formula reresenting the order induced b a hierarchical CP-network Γ is b 1) taking ever nonemt subset Diff i of X Γ, 2) for ever Diff i, finding the corresonding To i, 3) for ever Diff i, writing down the formula D i(o, o ) = ( X X Diffi o.x = o.x) ( X Diffi To i o.x o.x) ( X Toi Q CPT (X)(o, o )),

5 and 4) finding the disjunction of all D i(o, o ), which will be the order induced b Γ. However, the formulas constructed b this algorithm will be clearl exonential in the size of the hierarchical CPnetwork descrition, since the algorithm requires enumerating all nonemt subsets of X Γ. At the end of this section, we resent another algorithm, Algorithm 1, for constructing a reference formula reresenting the order induced b a hierarchical CP-network. Algorithm 1 roduces olnomial-size reference formulas for a large class of hierarchical CP-networks. 3.1 Disassembling a hierarchical CP-network into a set of connectives and subnets To construct a reference formula for a hierarchical CPnet Γ, we consider its reference grah H Γ as a set of manto-one connectives and arallel subnets. The reference formula construction algorithm rovided at the end of this section is iterative. It starts from the set of arallel subnets each of which consists of a tomost node of H Γ. Each ste of the algorithm joins two or more arallel subnets of Γ and/or extends the existing subnets with a node from X Γ Parallel subnets P Γ (o, o ) (P 1 (o, o ) o. = o. o. = o. o. = o.) (P 2 (o, o ) o.m = o.m) [o. = o. o. = o. o. = o. o.m = o.m] where P 1 is a reference formula reresenting the order induced b 1, and P 2 is a reference formula reresenting the order induced b 2 which is defined as P 2 o.m = vw o.m = kia o.m {kia, vw} o.m {kia, vw} Man-to-one connectives Let 1,..., k be some subnets of Γ. Let also X e be such an attribute from X Γ (X 1... X k ) that each arent of X e in H Γ is in one of X 1,..., X k ; if an attribute Y X i is a arent of X e in H Γ, then all the other nodes in X i are the ancestors of Y in H i (i.e. Y is the bottom most node of H i ). Then the set of 1,..., k along with X e is called manto-one connective. 1 2 k k... Figure 4: Parallel subnets Proosition 4. Let 1,..., k be some subnets of Γ and 1,..., k be SPO relations reresenting the orders induced b 1,..., k corresondingl. Let P 1,..., P k be formula reresentations of 1,..., k corresondingl. Let also be a subnet of Γ such that X = X 1... X k. Then the formula P defined as P (o, o ) (P 1 (o, o ) Z X 1 o.z = o.z)... (P k (o, o ) Z X k o.z = o.z) Z X o.z = o.z defines an SPO, and P P. B Proosition 4, if we know reference formulas reresenting the orders induced b a set of arallel subnets, we can easil find a reference formula reresenting the order induced b the union of these subnets. Note that according to Proosition 4, the subnets 1,..., k are not required to be disjoint (i.e. if some subnet i contains an attribute, then the other subnets can also contain the same attribute). Exae 6. Take the hierarchical CP-network from Exae 5. It can be considered as a union of two subnets 1 consisting of the attributes {,, }, and 2 consisting of a single attribute {m}. Then according to Proosition 4, the reference formula reresenting the order induced b Γ is X e Figure 5: Man-to-one connective Proosition 5. Let a set of subnets 1,..., k of Γ and an attribute X e X Γ be a man-to-one connective and 1,..., k be SPO relations reresenting the orders induced b 1,..., k corresondingl. Let P 1,..., P k be formula reresentations of 1,..., k corresondingl. Let also be such a subnet of Γ that X = X 1... X k {X e}. Then the formula P defined as P (o, o ) (P 1 (o, o ) [ Z X 1 o.z = o.z])... (P k (o, o ) [ Z X k o.z = o.z]) [ X 1... X k o.z = o.z] [ Z X 1... X k o.z = o.z] Q CPT (X e)(o, o ) defines an SPO, and P P. B Proosition 5, if we know reference formulas reresenting the orders induced b all comonents of a manto-one connective, we can easil find a reference formula reresenting the order induced b the entire connective. Note that if the reference grah of a hierarchical CPnetwork Γ can be reresented as a set of DAGs in which each node has at most one outgoing edge, Proositions 4 and 5 are enough to iterativel construct a reference formula for Γ. Namel, for each DAG in the set, erform the following stes 1) start with the subnets each of which consists of a single tomost attribute of the DAG, 2) iterativel merge and extend the existing subnets b one child node in each iteration (i.e. al Proosition 5), 3) finall, al Proosition 4 to the arallel subnets with no descendant nodes. However this algorithm is not alwas alicable because a hierarchical CP-network can have attributes with more than one outgoing edge (e.g. Γ from Exae 5).

6 3.1.3 One-to-man connectives In this section, we resent a method which allows to transform a hierarchical network whose reference grah contains nodes with more then one outgoing edge (one-to-man connective) to a set of arallel subnets whose reference grahs have no nodes with more than one outgoing edge. Let 1 be a subnet of a hierarchical CP-network of Γ and X s be such attribute in H 1 that all the other attributes in 1 are its ancestors (i.e. X s is the bottom most node in H 1 ). Let X s have k (where k 1) outgoing edges in H Γ. Formall, let there exist such attributes X j,..., X j+k X Γ that X s is their arent (ossibl one of man arents). In order to avoid the situation when a node has more than one outgoing edge, we will make k 1 coies of the subnet 1. As a result, we will make subnets 2,..., k each of which is a co of 1. Note that the order induced b the subnet which is a union of 1,..., k will be the same as the order induced b onl 1 (b Proosition 4). After that, we will make each attribute X s of each of 1,..., k a arent of onl one attribute X j,..., X j+k corresondingl. As a result, each co of X s now has onl one outgoing edge. Note also that this oeration does not violate the semantics of the hierarchical CP-network because the reference over each of X j,..., X j+k is still conditionall deendent on X s. We call this rocess one-to-man connective elimination. Exae 7. Take the subnet 1 from Exae 6. It consists of the attributes {,, } such that has two outgoing edges to and. The one-to-man connective elimination technique slits this subnet into two arallel subnets 3 and 4 as it is shown in Figure Figure 6: Eliminating the one-to-man connective from 1. The hierarchical CP-networks 3 and 4 are defined as in Figure 7. Given a hierarchical CP-network with man-to-one connectives, this technique roduces a set of subnets without one-to-man connectives. Each of the subnets is a hierarchical CP-network and thus one can al Proosition 5 to construct a reference formula for each of them. Finall, Proosition 4 can be used to merge the subnets back and roduce a reference formula for it. 3.2 Constructing reference formulas Below we rovide an algorithm for constructing an SPO reference formula reresenting the order induced b a hierarchical CP-network. It takes two arameters: a hierarchical CP-network Γ and the grah H Γ which is the result of erforming the one-to-man connective elimination on H Γ. Algorithm 1. FormulaCons( Γ, H Γ ) 1. S = toologicall sorted sequence of nodes H Γ; 2. For each node X in S, 3 = {CPT 3 (), CPT 3 ()} CPT 3 () : CPT 3 () : - - o. > o o. < o. < 2006 o o. > = {CPT 4 (), CPT 4 ()} CPT 4 () : CPT 4 () : - - o. > o o. < o < 2004 o. < o Figure 7: The hierarchical CP-networks 3 and if X has no arents in H Γ, PA[X] = {X}; 4. else PA[X] = PA[Y 1]... PA[Y k ] {X}, where 5. Y 1,..., Y k are the arents of X in H Γ; 6. For each node X from S do 7. If X has no arents in H Γ, then 8. P[X] = P CPT(X) 9. If X has arents Y 1,..., Y k, then 10. P[X] =(P[Y 1] [ Z PA[Y1 ] o.z = o.z]) (P[Y k ] [ Z PA[Yk ] o.z = o.z]) 13. ([ Z PA[Y1 ]... PA[Y k ] o.z = o.z] 14. P CPT(X)) 15. Let D be the sequence of all nodes from H Γ 16. with no outgoing edges 17. If D = 1, then 18. OUT = P[D[1]] 19. else ( D = k > 1) 20. OUT = (P[D[1]] [ Z PA[D[1]] o.z = o.z]) (P[D[k]] [ Z PA[D[k]] o.z = o.z]) 23. ( [ Z PA[D[1]]... PA[D[k]] o.z = o.z]) 24. return OUT; Since a reference grah H Γ is acclic, H Γ is also acclic. Therefore the sequence D constructed in line 15 is nonemt. The algorithm oututs relation OUT(o, o ) which is an SPO reference formula reresenting the order induced b Γ. Below we rovide an exae of aling the algorithm to the hierarchical CP-network from Exae 5. Exae 8. Given a hierarchical CP-network Γ and a reference grah from Exae 5, we al the one-to-man elimination technique and decomose the reference grah into two arallel subnets: 1 and 2 as it is in Exae 6. B aling one-to-man elimination technique, 1 was decomosed into 3 and 4 as it is in Exae 7. B roosition 5, the formula P 3 reresenting the order induced b 3 is P 3 (o, o ) o. > o. (o. = o. (o o o. < o. o. < 2006 o. < 2006 o o. > 8000)),

7 and the formula P 4 reresenting the order induced b 4 is P 4 (o, o ) o. > o. (o. = o. ( o o o. < o o. < 2004 o. < 2004 o. < o )). Thus b Proosition 4, the formula P 1 reresenting the order induced b 1 is P 1 (o, o ) (P 3 (o, o ) o. = o. o. = o.) (P 4 (o, o ) o. = o. o. = o.) (o. = o. o. = o. o. = o.). And finall, a reference formula reresenting the order induced b Γ can be comuted b the exression rovided in Exae 6, i.e. P Γ (o, o ) (P 1 (o, o ) o. = o. o. = o. o. = o.) (P 2 (o, o ) o.m = o.m) [o. = o. o. = o. o. = o. o.m = o.m] 4. COMPLEXITY ANALYSIS The urose of this section is to rovide an analsis of the size of the reference formula roduced b Algorithm 1. We divide this analsis into two arts: the analsis of the size of the constructed reference formula as a function of the number of nodes in its reference grah H Γ assuming that H Γ has no one-toman connectives; the analsis of size of a reference grah H Γ roduced b the one-to-man connective elimination technique alied to the original reference grah H Γ; According to Proosition 6 below, the size of the reference formula is olnomial in the number of conditional reference tables in a hierarchical CP-network, given its reference grah has no one-to-man connectives. Proosition 6. The size of the reference formula roduced b Algorithm 1 for a hierarchical CP-network Γ such that H Γ does not have one-to-man connectives is Θ( X Γ 2 + X Γ B max), where B max is the size of the longest formula Q CPT (X) among all X X Γ. However, given a reference grah H Γ, its version H Γ without one-to-man connectives ma have exonential size as shown below. Thus in general the size of the reference formula constructed b Algorithm 1 ma be exonential in the number of conditional reference tables in a hierarchical CP-network. Proosition 7. Given a hierarchical CP-network Γ, the size of the reference grah H Γ roduced from H Γ b the one-to-man elimination technique is Θ(2 X Γ ). The exonential number of nodes in the reference grah after eliminating one-to-man connectives is caused b the fact that the number of coies of each node in the modified grah (the grah without one-to-man connectives) is N (X) = N out(x) 1 + Y Ch Γ (X) N (Y ), where N out(x) is the number of outgoing edges from node X in H Γ. Therefore, in the worst case, eliminating one-toman connectives for each node of H Γ multilies b c (where c 2) the number of nodes in H Γ. Exae 9. Consider a hierarchical CP-network Γ n whose reference grah has n nodes (where n is an even number) connected as follows: the nodes X 1 and have no outgoing edges; and for an i [3, n], 1) X i is a arent of the nodes X i 3 and X i 2, if i is even, and 2) X i is a arent of the nodes X i 2 and X i 1, if i is odd. An exae of such network is shown below. X 1 X 6 Figure 8: Hierarchical CP-net for Exae 9. Since the nodes X 1 and have no outgoing edges, no new coies of them will be roduced b the one-to-man elimination. However, for each i [3, n], the number of coies of X i will be N (X i) = 1 + 2N (X i 2). Thus the total number of nodes in the network obtained from Γ n b eliminating one-to-man connectives is clearl exonential in n. However, b restricting the structure of a reference grah, the exonential blowu can be avoided. Proosition 8. Let Γ be such a hierarchical CP-network that ever node in H Γ has at most one child node with outgoing edges. Then the size of the reference grah H Γ roduced from H Γ b the one-to-man elimination technique is O( X Γ 3 ). X 1 (a) Figure 9: (a) A reference grah of a hierarchical CP-network satisfing Proosition 8, and (b) the network resulting from one-to-man connective elimination As it follows from the analsis, given an hierarchical CPnetwork, erforming dominance testing via reference formula constructed b our algorithm will require at most exonential time. At the same time, as it was discussed above, using Proosition 3 one can do it in olnomial time. The same alies to the roblem of finding the otimal outcomes. However, having constructed a reference formula, one can use hierarchical CP-networks in the relational framework, where using the winnow oerator creates oortunities for efficient evaluation and algebraic quer otimization [3, 4]. (b) X 1

8 5. RELATED AND FUTURE WORK In this aer, we roose a variant of CP-networks[1] that addresses some of the limitations of the original roosal. Namel, reference riorit can be exressed i.e. an edge in a reference grah catures not onl conditional deendence between different attributes but also the relative reference imortance - the higher an attribute is in the reference grah, the higher riorit it has. Moreover, our framework can be used with infinite domain attributes. We also believe that the everthing else being equal semantics is too strict and sometimes might not be alicable. B introducing a new reference with the ceteris aribus semantics, the user is required to consider all ossible values of all other attributes, which is not alwas feasible. Thus in such situations, using our framework will be referred to using CP-networks. TCP-networks [2] is an extension of CP-networks which adds attribute imortance to them. In TCP-networks, two secial kinds of arcs are added to reference grahs: 1) an i-arc from one attribute to another iies that the first attribute is more imortant than the second; 2) a ci-arc between two attributes iies that relative imortance of the connected attributes is deendent on the values of some other attributes. In contrast to that, relative imortance of attributes in hierarchical CP-networks is dictated b the reference grah structure, thus i-arcs would be redundant here. However, to reresent conditional attribute imortance, the hierarchical CP-network model needs to be extended. The idea of extending CP-networks with irrelevant attributes was introduced in [12]. The class of networks considered in [12] is more general than hierarchical CP-networks. In this model, W X is not limited to the set of siblings and descendants of X and can be an subset of X {X} Pa(X). However, [12] does not consider how to deal with infinite domain attributes, and it does not have the notion of conditional reference table, which is essential for CP-networks. [12] roves that the orders induced b some classes of the extended CP-networks are strict artial orders. However, it does not rovide an algorithm of constructing reference formulas for them. The observation that the semantics of CP-nets can be catured using Constraint Datalog rograms was first made in [6]. It was further develoed into a method of bridging the TCP-network framework and the framework of reference relations in [7]. In [7] a binar reference formula is constructed for a given TCP-network using a set of reference constructors. The reference order is essentiall comuted as transitive closure of the union of all relations reresenting the orders induced b each conditional reference table. The transitive closure is comuted using Constraint Datalog. When Constraint Datalog is used to comute transitive closure, one needs to show that the evaluation terminates (which is the case onl for some constraint theories [8]). Moreover, one ticall obtains at best exonential bounds on the resulting formula size. In contrast to that, we describe classes of hierarchical CP-networks for which our algorithm can construct olnomial-size reference formula reresentations. [7] also gives an exae of embedding references over infinite domain attributes into TCP-networks, namel it shows how can one reresent CPT(X) of an infinite domain attribute X using a limited set of reference constructors for which a transitive closure Datalog rogram terminates. In our work we have no limitations on the class of SPO references formulas used in CPT(X) reresentation. In this aer, we define hierarchical CP-networks that are based on a relaxed ceteris aribus rincile (i.e. some other attributes being equal). An interesting direction of the future work is to extend our semantics using the some other attributes being equivalent rincile where instead of equalit attribute values are considered to be equivalent according to some indifference relation [11]. One should also consider aling the existing reference modification and construction techniques [5, 10] to hierarchical CP-networks. 6. ACKNOWLEDGMENT Research suorted b NSF grant IIS REFERENCES [1] C. Boutilier, R. Brafman, C. Domshlak, H. Hoos, and D. Poole. CP-nets: A tool for reresenting and reasoning with conditional ceteris aribus reference statements. Journal of Artificial Intelligence Research (JAIR), 21: , [2] R. I. Brafman, C. Domshlak, and E. Shimon. Introducing variable imortance tradeoffs into CP-nets. Proceedings of the Eighteenth Conference on Uncertaint in Artificial Intelligence (UAI02), ages 69 76, [3] J. Chomicki. Semantic otimization techniques for reference queries. Information Sstems, 32(5), Jul 2007, ages [4] J. Chomicki. Preference formulas in relational queries. ACM Transactions on Database Sstems, ages , [5] J. Chomicki. Iterative modification and incremental evaluation of reference queries. Proc. 4th International Smosium on Foundations of Information and Knowledge Sstems (FoIKS), LNCS 3861, ages 63 82, 2006, full version to aear in Annals of Mathematics and Artificial Intelligence. [6] J. Chomicki and J. Song. Monotonic and nonmonotonic reference revision. arxiv:cs.db/ , 31 Mar [7] M. Endres and W. Kießling. Transformation of TCP-net queries into reference database queries. Proceedings of the ECAI 2006 Multidiscilinar Worksho on Advances in Preference Handling, [8] Paris C. Kanellakis, Gabriel M. Kuer, and Peter Z. Revesz. Constraint quer languages. Journal of Comuter and Sstem Sciences, ages 26 52, [9] W. Kießling. Foundations of references in database sstems. International Conference on Ver Large Data Bases (VLDB), ages , [10] W. Kießling. Preference constructors for deel ersonalized database queries. Technical Reort, Institute of Comuter Science, Universit of Augsburg, [11] W. Kießling. Preference queries with SV-semantics. 11th International Conference on Management of Data (COMAD 2005), ages 15 26, [12] N. Wilson. Extending CP-nets with stronger conditional reference statements. Proc. AAAI 2004, ages , 2004.

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

Micro I. Lesson 5 : Consumer Equilibrium

Micro I. Lesson 5 : Consumer Equilibrium Microecono mics I. Antonio Zabalza. Universit of Valencia 1 Micro I. Lesson 5 : Consumer Equilibrium 5.1 Otimal Choice If references are well behaved (smooth, conve, continuous and negativel sloed), then

More information

Transformation of TCP-Net Queries into Preference Database Queries

Transformation of TCP-Net Queries into Preference Database Queries Transformation of TCP-Net Queries into Preference Database Queries Markus Endres and W. Kießling University of Augsburg Institute for Computer Science ECAI 2006 - Advances in Preference Handling Preference

More information

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle]

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle] Chater 5 Model checking, verification of CTL One must verify or exel... doubts, and convert them into the certainty of YES or NO. [Thomas Carlyle] 5. The verification setting Page 66 We introduce linear

More information

An Introduction To Range Searching

An Introduction To Range Searching An Introduction To Range Searching Jan Vahrenhold eartment of Comuter Science Westfälische Wilhelms-Universität Münster, Germany. Overview 1. Introduction: Problem Statement, Lower Bounds 2. Range Searching

More information

ALTERNATIVE SOLUTION TO THE QUARTIC EQUATION by Farid A. Chouery 1, P.E. 2006, All rights reserved

ALTERNATIVE SOLUTION TO THE QUARTIC EQUATION by Farid A. Chouery 1, P.E. 2006, All rights reserved ALTERNATIVE SOLUTION TO THE QUARTIC EQUATION b Farid A. Chouer, P.E. 006, All rights reserved Abstract A new method to obtain a closed form solution of the fourth order olnomial equation is roosed in this

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

Preferences over Objects, Sets and Sequences

Preferences over Objects, Sets and Sequences Preferences over Objects, Sets and Sequences 4 Sandra de Amo and Arnaud Giacometti Universidade Federal de Uberlândia Université de Tours Brazil France 1. Introduction Recently, a lot of interest arose

More information

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar 15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider

More information

Profiling Sets for Preference Querying

Profiling Sets for Preference Querying Profiling Sets for Preference Querying Xi Zhang and Jan Chomicki Department of Computer Science and Engineering University at Buffalo, SUNY, U.S.A. {xizhang,chomicki}@cse.buffalo.edu Abstract. We propose

More information

Combinatorics of topmost discs of multi-peg Tower of Hanoi problem

Combinatorics of topmost discs of multi-peg Tower of Hanoi problem Combinatorics of tomost discs of multi-eg Tower of Hanoi roblem Sandi Klavžar Deartment of Mathematics, PEF, Unversity of Maribor Koroška cesta 160, 000 Maribor, Slovenia Uroš Milutinović Deartment of

More information

Preference Elicitation in Prioritized Skyline Queries

Preference Elicitation in Prioritized Skyline Queries Noname manuscript No. (will be inserted by the editor) Preference Elicitation in Prioritized Skyline Queries Denis Mindolin Jan Chomicki Received: date / Accepted: date Abstract Preference queries incorporate

More information

16. Binary Search Trees

16. Binary Search Trees Dictionary imlementation 16. Binary Search Trees [Ottman/Widmayer, Ka..1, Cormen et al, Ka. 1.1-1.] Hashing: imlementation of dictionaries with exected very fast access times. Disadvantages of hashing:

More information

16. Binary Search Trees

16. Binary Search Trees Dictionary imlementation 16. Binary Search Trees [Ottman/Widmayer, Ka..1, Cormen et al, Ka. 12.1-12.] Hashing: imlementation of dictionaries with exected very fast access times. Disadvantages of hashing:

More information

Finite-State Verification or Model Checking. Finite State Verification (FSV) or Model Checking

Finite-State Verification or Model Checking. Finite State Verification (FSV) or Model Checking Finite-State Verification or Model Checking Finite State Verification (FSV) or Model Checking Holds the romise of roviding a cost effective way of verifying imortant roerties about a system Not all faults

More information

Optimization of Gear Design and Manufacture. Vilmos SIMON *

Optimization of Gear Design and Manufacture. Vilmos SIMON * 7 International Conference on Mechanical and Mechatronics Engineering (ICMME 7) ISBN: 978--6595-44- timization of Gear Design and Manufacture Vilmos SIMN * Budaest Universit of Technolog and Economics,

More information

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests 009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract

More information

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO) Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment

More information

Lilian Markenzon 1, Nair Maria Maia de Abreu 2* and Luciana Lee 3

Lilian Markenzon 1, Nair Maria Maia de Abreu 2* and Luciana Lee 3 Pesquisa Oeracional (2013) 33(1): 123-132 2013 Brazilian Oerations Research Society Printed version ISSN 0101-7438 / Online version ISSN 1678-5142 www.scielo.br/oe SOME RESULTS ABOUT THE CONNECTIVITY OF

More information

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca

More information

Paper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation

Paper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation Paer C Exact Volume Balance Versus Exact Mass Balance in Comositional Reservoir Simulation Submitted to Comutational Geosciences, December 2005. Exact Volume Balance Versus Exact Mass Balance in Comositional

More information

Casimir Force Between the Two Moving Conductive Plates.

Casimir Force Between the Two Moving Conductive Plates. Casimir Force Between the Two Moving Conductive Plates. Jaroslav Hynecek 1 Isetex, Inc., 95 Pama Drive, Allen, TX 751 ABSTRACT This article resents the derivation of the Casimir force for the two moving

More information

PROFIT MAXIMIZATION. π = p y Σ n i=1 w i x i (2)

PROFIT MAXIMIZATION. π = p y Σ n i=1 w i x i (2) PROFIT MAXIMIZATION DEFINITION OF A NEOCLASSICAL FIRM A neoclassical firm is an organization that controls the transformation of inuts (resources it owns or urchases into oututs or roducts (valued roducts

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning TNN-2009-P-1186.R2 1 Uncorrelated Multilinear Princial Comonent Analysis for Unsuervised Multilinear Subsace Learning Haiing Lu, K. N. Plataniotis and A. N. Venetsanooulos The Edward S. Rogers Sr. Deartment

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

Solved Problems. (a) (b) (c) Figure P4.1 Simple Classification Problems First we draw a line between each set of dark and light data points.

Solved Problems. (a) (b) (c) Figure P4.1 Simple Classification Problems First we draw a line between each set of dark and light data points. Solved Problems Solved Problems P Solve the three simle classification roblems shown in Figure P by drawing a decision boundary Find weight and bias values that result in single-neuron ercetrons with the

More information

Game Specification in the Trias Politica

Game Specification in the Trias Politica Game Secification in the Trias Politica Guido Boella a Leendert van der Torre b a Diartimento di Informatica - Università di Torino - Italy b CWI - Amsterdam - The Netherlands Abstract In this aer we formalize

More information

Elliptic Curves and Cryptography

Elliptic Curves and Cryptography Ellitic Curves and Crytograhy Background in Ellitic Curves We'll now turn to the fascinating theory of ellitic curves. For simlicity, we'll restrict our discussion to ellitic curves over Z, where is a

More information

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

Bayesian Networks Practice

Bayesian Networks Practice Bayesian Networks Practice Part 2 2016-03-17 Byoung-Hee Kim, Seong-Ho Son Biointelligence Lab, CSE, Seoul National University Agenda Probabilistic Inference in Bayesian networks Probability basics D-searation

More information

A New Method of DDB Logical Structure Synthesis Using Distributed Tabu Search

A New Method of DDB Logical Structure Synthesis Using Distributed Tabu Search A New Method of DDB Logical Structure Synthesis Using Distributed Tabu Search Eduard Babkin and Margarita Karunina 2, National Research University Higher School of Economics Det of nformation Systems and

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

XReason: A Semantic Approach that Reasons with Patterns to Answer XML Keyword Queries

XReason: A Semantic Approach that Reasons with Patterns to Answer XML Keyword Queries XReason: A Semantic Aroach that Reasons with Patterns to Answer XML Keyword Queries Cem Aksoy 1, Aggeliki Dimitriou 2, Dimitri Theodoratos 1, Xiaoying Wu 3 1 New Jersey Institute of Technology, Newark,

More information

Bayesian Model Averaging Kriging Jize Zhang and Alexandros Taflanidis

Bayesian Model Averaging Kriging Jize Zhang and Alexandros Taflanidis HIPAD LAB: HIGH PERFORMANCE SYSTEMS LABORATORY DEPARTMENT OF CIVIL AND ENVIRONMENTAL ENGINEERING AND EARTH SCIENCES Bayesian Model Averaging Kriging Jize Zhang and Alexandros Taflanidis Why use metamodeling

More information

Brownian Motion and Random Prime Factorization

Brownian Motion and Random Prime Factorization Brownian Motion and Random Prime Factorization Kendrick Tang June 4, 202 Contents Introduction 2 2 Brownian Motion 2 2. Develoing Brownian Motion.................... 2 2.. Measure Saces and Borel Sigma-Algebras.........

More information

Multiplicative group law on the folium of Descartes

Multiplicative group law on the folium of Descartes Multilicative grou law on the folium of Descartes Steluţa Pricoie and Constantin Udrişte Abstract. The folium of Descartes is still studied and understood today. Not only did it rovide for the roof of

More information

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES AARON ZWIEBACH Abstract. In this aer we will analyze research that has been recently done in the field of discrete

More information

Planar Transformations and Displacements

Planar Transformations and Displacements Chater Planar Transformations and Dislacements Kinematics is concerned with the roerties of the motion of oints. These oints are on objects in the environment or on a robot maniulator. Two features that

More information

Cryptanalysis of Pseudorandom Generators

Cryptanalysis of Pseudorandom Generators CSE 206A: Lattice Algorithms and Alications Fall 2017 Crytanalysis of Pseudorandom Generators Instructor: Daniele Micciancio UCSD CSE As a motivating alication for the study of lattice in crytograhy we

More information

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction GOOD MODELS FOR CUBIC SURFACES ANDREAS-STEPHAN ELSENHANS Abstract. This article describes an algorithm for finding a model of a hyersurface with small coefficients. It is shown that the aroach works in

More information

Nearly Tight Linear Programming Bounds for Demand Matching in Bipartite Graphs

Nearly Tight Linear Programming Bounds for Demand Matching in Bipartite Graphs Nearly Tight Linear Programming Bounds for Demand Matching in Biartite Grahs Mohit Singh Hehui Wu Setember 23, 212 Abstract We consider the demand matching roblem which is a generalization of the maximum

More information

Optimal Design of Truss Structures Using a Neutrosophic Number Optimization Model under an Indeterminate Environment

Optimal Design of Truss Structures Using a Neutrosophic Number Optimization Model under an Indeterminate Environment Neutrosohic Sets and Systems Vol 14 016 93 University of New Mexico Otimal Design of Truss Structures Using a Neutrosohic Number Otimization Model under an Indeterminate Environment Wenzhong Jiang & Jun

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell October 25, 2009 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

Network Configuration Control Via Connectivity Graph Processes

Network Configuration Control Via Connectivity Graph Processes Network Configuration Control Via Connectivity Grah Processes Abubakr Muhammad Deartment of Electrical and Systems Engineering University of Pennsylvania Philadelhia, PA 90 abubakr@seas.uenn.edu Magnus

More information

Position Control of Induction Motors by Exact Feedback Linearization *

Position Control of Induction Motors by Exact Feedback Linearization * BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 8 No Sofia 008 Position Control of Induction Motors by Exact Feedback Linearization * Kostadin Kostov Stanislav Enev Farhat

More information

The decision-feedback equalizer optimization for Gaussian noise

The decision-feedback equalizer optimization for Gaussian noise Journal of Theoretical and Alied Comuter Science Vol. 8 No. 4 4. 5- ISSN 99-634 (rinted 3-5653 (online htt://www.jtacs.org The decision-feedback eualizer otimization for Gaussian noise Arkadiusz Grzbowski

More information

Some Results on the Generalized Gaussian Distribution

Some Results on the Generalized Gaussian Distribution Some Results on the Generalized Gaussian Distribution Alex Dytso, Ronit Bustin, H. Vincent Poor, Daniela Tuninetti 3, Natasha Devroye 3, and Shlomo Shamai (Shitz) Abstract The aer considers information-theoretic

More information

Theoretically Optimal and Empirically Efficient R-trees with Strong Parallelizability

Theoretically Optimal and Empirically Efficient R-trees with Strong Parallelizability Theoretically Otimal and Emirically Efficient R-trees with Strong Parallelizability Jianzhong Qi, Yufei Tao, Yanchuan Chang, Rui Zhang School of Comuting and Information Systems, The University of Melbourne

More information

1 1 c (a) 1 (b) 1 Figure 1: (a) First ath followed by salesman in the stris method. (b) Alternative ath. 4. D = distance travelled closing the loo. Th

1 1 c (a) 1 (b) 1 Figure 1: (a) First ath followed by salesman in the stris method. (b) Alternative ath. 4. D = distance travelled closing the loo. Th 18.415/6.854 Advanced Algorithms ovember 7, 1996 Euclidean TSP (art I) Lecturer: Michel X. Goemans MIT These notes are based on scribe notes by Marios Paaefthymiou and Mike Klugerman. 1 Euclidean TSP Consider

More information

DIFFERENTIAL evolution (DE) [3] has become a popular

DIFFERENTIAL evolution (DE) [3] has become a popular Self-adative Differential Evolution with Neighborhood Search Zhenyu Yang, Ke Tang and Xin Yao Abstract In this aer we investigate several self-adative mechanisms to imrove our revious work on [], which

More information

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu

More information

Approximate Dynamic Programming for Dynamic Capacity Allocation with Multiple Priority Levels

Approximate Dynamic Programming for Dynamic Capacity Allocation with Multiple Priority Levels Aroximate Dynamic Programming for Dynamic Caacity Allocation with Multile Priority Levels Alexander Erdelyi School of Oerations Research and Information Engineering, Cornell University, Ithaca, NY 14853,

More information

How to Estimate Expected Shortfall When Probabilities Are Known with Interval or Fuzzy Uncertainty

How to Estimate Expected Shortfall When Probabilities Are Known with Interval or Fuzzy Uncertainty How to Estimate Exected Shortfall When Probabilities Are Known with Interval or Fuzzy Uncertainty Christian Servin Information Technology Deartment El Paso Community College El Paso, TX 7995, USA cservin@gmail.com

More information

Dialectical Theory for Multi-Agent Assumption-based Planning

Dialectical Theory for Multi-Agent Assumption-based Planning Dialectical Theory for Multi-Agent Assumtion-based Planning Damien Pellier, Humbert Fiorino Laboratoire Leibniz, 46 avenue Félix Viallet F-38000 Grenboble, France {Damien.Pellier,Humbert.Fiorino}.imag.fr

More information

Feedback-error control

Feedback-error control Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller

More information

A Unified 2D Representation of Fuzzy Reasoning, CBR, and Experience Based Reasoning

A Unified 2D Representation of Fuzzy Reasoning, CBR, and Experience Based Reasoning University of Wollongong Research Online Faculty of Commerce - aers (Archive) Faculty of Business 26 A Unified 2D Reresentation of Fuzzy Reasoning, CBR, and Exerience Based Reasoning Zhaohao Sun University

More information

GRACEFUL NUMBERS. KIRAN R. BHUTANI and ALEXANDER B. LEVIN. Received 14 May 2001

GRACEFUL NUMBERS. KIRAN R. BHUTANI and ALEXANDER B. LEVIN. Received 14 May 2001 IJMMS 29:8 2002 495 499 PII S06720200765 htt://immshindawicom Hindawi Publishing Cor GRACEFUL NUMBERS KIRAN R BHUTANI and ALEXANDER B LEVIN Received 4 May 200 We construct a labeled grah Dn that reflects

More information

DIFFERENTIAL GEOMETRY. LECTURES 9-10,

DIFFERENTIAL GEOMETRY. LECTURES 9-10, DIFFERENTIAL GEOMETRY. LECTURES 9-10, 23-26.06.08 Let us rovide some more details to the definintion of the de Rham differential. Let V, W be two vector bundles and assume we want to define an oerator

More information

New Information Measures for the Generalized Normal Distribution

New Information Measures for the Generalized Normal Distribution Information,, 3-7; doi:.339/info3 OPEN ACCESS information ISSN 75-7 www.mdi.com/journal/information Article New Information Measures for the Generalized Normal Distribution Christos P. Kitsos * and Thomas

More information

Proof Nets and Boolean Circuits

Proof Nets and Boolean Circuits Proof Nets and Boolean Circuits Kazushige Terui terui@nii.ac.j National Institute of Informatics, Tokyo 14/07/04, Turku.1/44 Motivation (1) Proofs-as-Programs (Curry-Howard) corresondence: Proofs = Programs

More information

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators S. K. Mallik, Student Member, IEEE, S. Chakrabarti, Senior Member, IEEE, S. N. Singh, Senior Member, IEEE Deartment of Electrical

More information

A Closed-Form Solution to the Minimum V 2

A Closed-Form Solution to the Minimum V 2 Celestial Mechanics and Dynamical Astronomy manuscrit No. (will be inserted by the editor) Martín Avendaño Daniele Mortari A Closed-Form Solution to the Minimum V tot Lambert s Problem Received: Month

More information

Metrics Performance Evaluation: Application to Face Recognition

Metrics Performance Evaluation: Application to Face Recognition Metrics Performance Evaluation: Alication to Face Recognition Naser Zaeri, Abeer AlSadeq, and Abdallah Cherri Electrical Engineering Det., Kuwait University, P.O. Box 5969, Safat 6, Kuwait {zaery, abeer,

More information

Parallelism and Locality in Priority Queues. A. Ranade S. Cheng E. Deprit J. Jones S. Shih. University of California. Berkeley, CA 94720

Parallelism and Locality in Priority Queues. A. Ranade S. Cheng E. Deprit J. Jones S. Shih. University of California. Berkeley, CA 94720 Parallelism and Locality in Priority Queues A. Ranade S. Cheng E. Derit J. Jones S. Shih Comuter Science Division University of California Berkeley, CA 94720 Abstract We exlore two ways of incororating

More information

COMMUNICATION BETWEEN SHAREHOLDERS 1

COMMUNICATION BETWEEN SHAREHOLDERS 1 COMMUNICATION BTWN SHARHOLDRS 1 A B. O A : A D Lemma B.1. U to µ Z r 2 σ2 Z + σ2 X 2r ω 2 an additive constant that does not deend on a or θ, the agents ayoffs can be written as: 2r rθa ω2 + θ µ Y rcov

More information

State Estimation with ARMarkov Models

State Estimation with ARMarkov Models Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,

More information

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition A Qualitative Event-based Aroach to Multile Fault Diagnosis in Continuous Systems using Structural Model Decomosition Matthew J. Daigle a,,, Anibal Bregon b,, Xenofon Koutsoukos c, Gautam Biswas c, Belarmino

More information

Numerical Linear Algebra

Numerical Linear Algebra Numerical Linear Algebra Numerous alications in statistics, articularly in the fitting of linear models. Notation and conventions: Elements of a matrix A are denoted by a ij, where i indexes the rows and

More information

Topic 7: Using identity types

Topic 7: Using identity types Toic 7: Using identity tyes June 10, 2014 Now we would like to learn how to use identity tyes and how to do some actual mathematics with them. By now we have essentially introduced all inference rules

More information

Outline. Markov Chains and Markov Models. Outline. Markov Chains. Markov Chains Definitions Huizhen Yu

Outline. Markov Chains and Markov Models. Outline. Markov Chains. Markov Chains Definitions Huizhen Yu and Markov Models Huizhen Yu janey.yu@cs.helsinki.fi Det. Comuter Science, Univ. of Helsinki Some Proerties of Probabilistic Models, Sring, 200 Huizhen Yu (U.H.) and Markov Models Jan. 2 / 32 Huizhen Yu

More information

A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS. 1. Abstract

A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS. 1. Abstract A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS CASEY BRUCK 1. Abstract The goal of this aer is to rovide a concise way for undergraduate mathematics students to learn about how rime numbers behave

More information

A Network-Flow Based Cell Sizing Algorithm

A Network-Flow Based Cell Sizing Algorithm A Networ-Flow Based Cell Sizing Algorithm Huan Ren and Shantanu Dutt Det. of ECE, University of Illinois-Chicago Abstract We roose a networ flow based algorithm for the area-constrained timing-driven discrete

More information

arxiv: v1 [math-ph] 29 Apr 2016

arxiv: v1 [math-ph] 29 Apr 2016 INFORMATION THEORY AND STATISTICAL MECHANICS REVISITED arxiv:64.8739v [math-h] 29 Ar 26 JIAN ZHOU Abstract. We derive Bose-Einstein statistics and Fermi-Dirac statistics by Princile of Maximum Entroy alied

More information

INTRODUCTION. Please write to us at if you have any comments or ideas. We love to hear from you.

INTRODUCTION. Please write to us at if you have any comments or ideas. We love to hear from you. Casio FX-570ES One-Page Wonder INTRODUCTION Welcome to the world of Casio s Natural Dislay scientific calculators. Our exeriences of working with eole have us understand more about obstacles eole face

More information

A Model for Randomly Correlated Deposition

A Model for Randomly Correlated Deposition A Model for Randomly Correlated Deosition B. Karadjov and A. Proykova Faculty of Physics, University of Sofia, 5 J. Bourchier Blvd. Sofia-116, Bulgaria ana@hys.uni-sofia.bg Abstract: A simle, discrete,

More information

Linear diophantine equations for discrete tomography

Linear diophantine equations for discrete tomography Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,

More information

Temporal Conditional Preferences over Sequences of Objects

Temporal Conditional Preferences over Sequences of Objects Temporal Conditional Preferences over Sequences of Objects Sandra de Amo Universidade Federal de Uberlândia Faculdade de Computação Av. João Naves de Avila, 2121 Uberlândia, Brazil deamo@ufu.br Arnaud

More information

Distributed K-means over Compressed Binary Data

Distributed K-means over Compressed Binary Data 1 Distributed K-means over Comressed Binary Data Elsa DUPRAZ Telecom Bretagne; UMR CNRS 6285 Lab-STICC, Brest, France arxiv:1701.03403v1 [cs.it] 12 Jan 2017 Abstract We consider a networ of binary-valued

More information

Finite Mixture EFA in Mplus

Finite Mixture EFA in Mplus Finite Mixture EFA in Mlus November 16, 2007 In this document we describe the Mixture EFA model estimated in Mlus. Four tyes of deendent variables are ossible in this model: normally distributed, ordered

More information

Limiting Price Discrimination when Selling Products with Positive Network Externalities

Limiting Price Discrimination when Selling Products with Positive Network Externalities Limiting Price Discrimination when Selling Products with Positive Network Externalities Luděk Cigler, Wolfgang Dvořák, Monika Henzinger, Martin Starnberger University of Vienna, Faculty of Comuter Science,

More information

Periodic scheduling 05/06/

Periodic scheduling 05/06/ Periodic scheduling T T or eriodic scheduling, the best that we can do is to design an algorithm which will always find a schedule if one exists. A scheduler is defined to be otimal iff it will find a

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

Bayesian System for Differential Cryptanalysis of DES

Bayesian System for Differential Cryptanalysis of DES Available online at www.sciencedirect.com ScienceDirect IERI Procedia 7 (014 ) 15 0 013 International Conference on Alied Comuting, Comuter Science, and Comuter Engineering Bayesian System for Differential

More information

ABSTRACT MODEL REPAIR

ABSTRACT MODEL REPAIR Logical Methods in Comuter Science Vol. 11(3:11)2015,. 1 43 www.lmcs-online.org Submitted Jul. 2, 2014 Published Se. 17, 2015 ABSTRACT MODEL REPAIR GEORGE CHATZIELEFTHERIOU a, BORZOO BONAKDARPOUR b, PANAGIOTIS

More information

Principles of Computed Tomography (CT)

Principles of Computed Tomography (CT) Page 298 Princiles of Comuted Tomograhy (CT) The theoretical foundation of CT dates back to Johann Radon, a mathematician from Vienna who derived a method in 1907 for rojecting a 2-D object along arallel

More information

Chapter 1 Fundamentals

Chapter 1 Fundamentals Chater Fundamentals. Overview of Thermodynamics Industrial Revolution brought in large scale automation of many tedious tasks which were earlier being erformed through manual or animal labour. Inventors

More information

On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm

On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm Gabriel Noriega, José Restreo, Víctor Guzmán, Maribel Giménez and José Aller Universidad Simón Bolívar Valle de Sartenejas,

More information

Modeling and Estimation of Full-Chip Leakage Current Considering Within-Die Correlation

Modeling and Estimation of Full-Chip Leakage Current Considering Within-Die Correlation 6.3 Modeling and Estimation of Full-Chi Leaage Current Considering Within-Die Correlation Khaled R. eloue, Navid Azizi, Farid N. Najm Deartment of ECE, University of Toronto,Toronto, Ontario, Canada {haled,nazizi,najm}@eecg.utoronto.ca

More information

CTL, the branching-time temporal logic

CTL, the branching-time temporal logic CTL, the branching-time temoral logic Cătălin Dima Université Paris-Est Créteil Cătălin Dima (UPEC) CTL 1 / 29 Temoral roerties CNIL Safety, termination, mutual exclusion LTL. Liveness, reactiveness, resonsiveness,

More information

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their

More information

Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations

Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations Grah-Decomosition-Based Frameworks for Subset-Cover Broadcast Encrytion and Efficient Instantiations Nuttaong Attraadung and Hideki Imai Imai Laboratory, Institute of Industrial Science, University of

More information

Composition of Transformations: A Framework for Systems with Dynamic Topology

Composition of Transformations: A Framework for Systems with Dynamic Topology Comosition of Transformations: A Framework for Systems with Dynamic Toology Marnes Augusto Hoff, Karina Girardi Roggia, Paulo lauth Menezes Instituto de Informática, Universidade Federal do Rio Grande

More information

Matching Partition a Linked List and Its Optimization

Matching Partition a Linked List and Its Optimization Matching Partition a Linked List and Its Otimization Yijie Han Deartment of Comuter Science University of Kentucky Lexington, KY 40506 ABSTRACT We show the curve O( n log i + log (i) n + log i) for the

More information

Analysis of M/M/n/K Queue with Multiple Priorities

Analysis of M/M/n/K Queue with Multiple Priorities Analysis of M/M/n/K Queue with Multile Priorities Coyright, Sanjay K. Bose For a P-riority system, class P of highest riority Indeendent, Poisson arrival rocesses for each class with i as average arrival

More information

Fibration of Toposes PSSL 101, Leeds

Fibration of Toposes PSSL 101, Leeds Fibration of Tooses PSSL 101, Leeds Sina Hazratour sinahazratour@gmail.com Setember 2017 AUs AUs as finitary aroximation of Grothendieck tooses Pretooses 1 finite limits 2 stable finite disjoint coroducts

More information