Meronymy-based Aggregation of Activities in Business Process Models
|
|
- Ross Pierce Mathews
- 6 years ago
- Views:
Transcription
1 Meronymy-based Aggregation of Activities in Business Process Models Sergey Smirnov 1, Remco Dijkman 2, Jan Mendling 3, and Mathias Weske 1 1 Hasso Plattner Institute, Germany 2 Eindhoven University of Technology, The Netherlands 3 Humboldt-Universität zu Berlin, Germany
2 Motivation 2 > 300 nodes > 150 activities Meronymy-based Aggregation of of Activities in in Business Process Models
3 Business Process Model Abstraction 3 is an operation on a business process model preserving essential process properties and leaving out insignificant process details in to retain information relevant for a particular purpose
4 BPMA Scenario 4 Abstraction objects = Activities Abstraction operation = Aggregation
5 Structural BPMA Challenges 5 P Candidate 2 Generate summary Review summary Update customer file Candidate 1? Candidate 1 Candidate 2
6 Activity Ontology 6 Create report Send otification Process summary Update customer profile Generate summary Review summary
7 Role of Activity Ontology in BPMA 7 P Candidate 2 Generate summary Review summary Update customer file Candidate 1? Candidate 1 Candidate 2 Send otification Generate summary Create report Process summary Review summary Update customer profile
8 Aggregation Mining Idea 8 Input: Process model + Ontology Output: Aggregations Algorithm Sketch: How to find an aggregation candidate efficiently? FOR each aggregation candidate map each aggregation candidate activity to an ontology activity IF (ontology activities are strongly related) aggregation candidate is an aggregation How to judge on ontology activity relatedness?
9 Activity Alphabet 9 Create report Send otification Process summary Update customer profile Generate summary Review summary
10 Process Model 10 is a process model, where: finite non-empty set of activities finite set of gateways finite set of nodes the flow relation a connected graph
11 Aggregation Candidate 11 In process model is an aggregation candidate.
12 Meronymy Tree 12 Meronymy tree is a tuple n 0
13 Meronymy Forest 13 Meronymy forest F is a disjoint union of meronymy trees n 0 n 1 n 2 g n 3 n 13 n 4 n 5 e f n 6 n 7 n 8 n 14 n 15 n 16 n 9 n 17 n 18 n 19 n 20 n 21 n 10 n 12
14 Aggregation Candidate Construction 14 Construction of aggregation candidates aggregation through aggregation candidate size increment start: k =2 i iteration: construct i-size aggregation candidates stop: from (i-1) aggregation candidates prune insignificant candidates prune candidates with large distance k= A, PM = (A, G, E) OR all the aggregation candidates of size k are pruned
15 Activity Match (1) 15 Process model Meronymy forest n 0 n 1 n 2 g n 3 n 4 n 5 e f n 6 n 7 n 8
16 Activity Match (2) 16 Process model Meronymy forest n 0 n 1 n 2 g n 3 n 4 n 5 e f n 6 n 7 n 8
17 Activity MixMatch 17 Process model Meronymy forest n 1 g n 0 n 1 n 14 n 15 g n 1 n 2 g n 3 n 14 n 15 n 4 n 5 e f n 6 n 7 n 8
18 Lowest Common Ancestor 18 Lowest common ancestor is a function n 0 maps a tree node set to its lowest common ancestor n 2 n 1 n 2 g n 3 n 4 n 5 e f n 6 n 7 n 8
19 Meronymy Leaves 19 Meronymy leaves is a function n 0 maps an activity to the leaves of the subtree rooted to this activity n 2 n 1 n 2 g n 3 n 4 n 5 e f n 6 n 7 n 8
20 Degree of Aggregation Coverage (1) 20 Degree of aggregation coverage is a function n 0 n 1 n 2 g n 3 n 4 n 5 e f n 6 n 7 n 8
21 Degree of Aggregation Coverage (2) 21 Degree of aggregation coverage is a function n 0 n 1 n 2 g n 3 n 4 n 5 e f n 6 n 7 n 8
22 Degree of Aggregation Coverage Properties 22 Shows if the LCA has other descendents, except aggregation candidate Ignores n 1 n 2 g n 3 aggregation candidate size the aggregation candidate n 4 n 5 e f n 6 n 7 n 8 depth in the LCA subtree ignore the LCA depth Possesses value between 0 and 1 n 0
23 Object Studied in Evaluation 23 Model collection 6 process models (42 activities on average) Meronymy forest MIT Process Handbook processes elicited in the interviews with process experts 5000 activities specifies meronymy and hyponymy spans several business domains
24 Evaluation Approach 24 Each activity aggregation is decomposed into a set of subsets of size 2, e.g.: {a, b, c} {a, b}, {a, c}, {b, c} Modeling expert evaluates pair relevance Experiments varying node distance, cover Observe the precision value
25 Evaluation Results 25 Observations precision 0.46 cover precision node distance precision cover threshold 0.3 cover threshold 0.2
26 Conclusion 26 Contributions Metric for relatedness of activity sets Activity aggregation mining algorithm Future work Improve activity matching technique Precise aggregation mining technique evaluation Investigate other information enabling activity aggregation
27 27 Thank you!
28 Contact Details 28 Sergey Smirnov PhD Student Business Process Technology Group Hasso Plattner Institute Prof.-Dr.-Helmert-Str. 2-3, Potsdam, Germany Phone: +49 (0) Fax: +49(0)
Reducing Complexity of Large EPCs
Reducing Complexity of Large EPCs Artem Polyvyanyy, Sergey Smirnov, and Mathias Weske Business Process Technology Group Hasso Plattner Institute at the University of Potsdam D-14482 Potsdam, Germany (artem.polyvyanyy,sergey.smirnov,mathias.weske)@hpi.uni-potsdam.de
More informationEvent-based Monitoring of Process Execution Violations
Event-based Monitoring of Process Execution Violations M. Weidlich, H. Ziekow, J. Mendling, O. Günther, M. Weske, N. Desai Hasso Plattner Institute, University of Potsdam, Germany AGT Germany Humboldt-Universität
More informationEfficient Computation of Causal Behavioural Profiles using Structural Decomposition
Efficient Computation of Causal Behavioural Profiles using Structural Decomposition Matthias Weidlich 1, Artem Polyvyanyy 1, Jan Mendling 2, and Mathias Weske 1 1 Hasso Plattner Institute at the University
More informationEfficient Computation of Causal Behavioural Profiles using Structural Decomposition
Efficient Computation of Causal Behavioural Profiles using Structural Decomposition Matthias Weidlich 1, Artem Polyvyanyy 1, Jan Mendling 2, and Mathias Weske 1 1 Hasso Plattner Institute at the University
More informationDAG program (v0.12) Causal diagrams: A computer program to identify minimal sufficient adjustment sets. Sven Knüppel.
DAG program (v0.12) Causal diagrams: A computer program to identify minimal sufficient adjustment sets Sven Knüppel March 31, 2010 Developed by Sven Knüppel Deutsches Institut für Ernährungsforschung Potsdam-Rehbrücke
More informationBusiness Process Technology Master Seminar
Business Process Technology Master Seminar BPT Group Summer Semester 2008 Agenda 2 Official Information Seminar Timeline Tasks Outline Topics Sergey Smirnov 17 April 2008 Official Information 3 Title:
More informationTest sequencing in complex manufacturing systems
IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART A: SYSTEMS AND HUMANS, VOL..., NO...,... 1 Test sequencing in complex manufacturing systems R. Boumen, I.S.M. de Jong, J.W.H. Vermunt, J.M. van de
More informationSpeeding up the Dreyfus-Wagner Algorithm for minimum Steiner trees
Speeding up the Dreyfus-Wagner Algorithm for minimum Steiner trees Bernhard Fuchs Center for Applied Computer Science Cologne (ZAIK) University of Cologne, Weyertal 80, 50931 Köln, Germany Walter Kern
More informationQuestion Answering on Statistical Linked Data
Question Answering on Statistical Linked Data AKSW Colloquium paper presentation Konrad Höffner Universität Leipzig, AKSW/MOLE, PhD Student 2015-2-16 1 / 18 1 2 3 2 / 18 Motivation Statistical Linked Data
More informationCITS4211 Mid-semester test 2011
CITS4211 Mid-semester test 2011 Fifty minutes, answer all four questions, total marks 60 Question 1. (12 marks) Briefly describe the principles, operation, and performance issues of iterative deepening.
More informationMinmax Tree Cover in the Euclidean Space
Journal of Graph Algorithms and Applications http://jgaa.info/ vol. 15, no. 3, pp. 345 371 (2011) Minmax Tree Cover in the Euclidean Space Seigo Karakawa 1 Ehab Morsy 1 Hiroshi Nagamochi 1 1 Department
More informationClassification Based on Logical Concept Analysis
Classification Based on Logical Concept Analysis Yan Zhao and Yiyu Yao Department of Computer Science, University of Regina, Regina, Saskatchewan, Canada S4S 0A2 E-mail: {yanzhao, yyao}@cs.uregina.ca Abstract.
More informationCS 410/584, Algorithm Design & Analysis, Lecture Notes 4
CS 0/58,, Biconnectivity Let G = (N,E) be a connected A node a N is an articulation point if there are v and w different from a such that every path from 0 9 8 3 5 7 6 David Maier Biconnected Component
More informationCS60007 Algorithm Design and Analysis 2018 Assignment 1
CS60007 Algorithm Design and Analysis 2018 Assignment 1 Palash Dey and Swagato Sanyal Indian Institute of Technology, Kharagpur Please submit the solutions of the problems 6, 11, 12 and 13 (written in
More informationMatroids and submodular optimization
Matroids and submodular optimization Attila Bernáth Research fellow, Institute of Informatics, Warsaw University 23 May 2012 Attila Bernáth () Matroids and submodular optimization 23 May 2012 1 / 10 About
More informationAn implementation of deterministic tree automata minimization
An implementation of deterministic tree automata minimization Rafael C. Carrasco 1, Jan Daciuk 2, and Mikel L. Forcada 3 1 Dep. de Lenguajes y Sistemas Informáticos, Universidad de Alicante, E-03071 Alicante,
More informationUNIVERSITY OF YORK. MSc Examinations 2004 MATHEMATICS Networks. Time Allowed: 3 hours.
UNIVERSITY OF YORK MSc Examinations 2004 MATHEMATICS Networks Time Allowed: 3 hours. Answer 4 questions. Standard calculators will be provided but should be unnecessary. 1 Turn over 2 continued on next
More informationThe Projected TAR and its Application to Conformance Checking
The Projected TAR and its Application to Conformance Checking Johannes Prescher 1, Matthias Weidlich 2, Jan Mendling 1 1 Institute for Information Business, Wirtschaftsuniversität Wien, Austria [johannes.prescher
More informationOn Finding Subpaths With High Demand
Zuse Institute Berlin Takustr. 7 14195 Berlin Germany STEPHAN SCHWARTZ, LEONARDO BALESTRIERI, RALF BORNDÖRFER On Finding Subpaths With High Demand ZIB Report 18-27 (Juni 2018) Zuse Institute Berlin Takustr.
More informationData Mining and Analysis: Fundamental Concepts and Algorithms
Data Mining and Analysis: Fundamental Concepts and Algorithms dataminingbook.info Mohammed J. Zaki 1 Wagner Meira Jr. 2 1 Department of Computer Science Rensselaer Polytechnic Institute, Troy, NY, USA
More informationImplementation and Optimization Issues of the ROLAP Algebra
General Research Report Implementation and Optimization Issues of the ROLAP Algebra F. Ramsak, M.S. (UIUC) Dr. V. Markl Prof. R. Bayer, Ph.D. Contents Motivation ROLAP Algebra Recap Optimization Issues
More informationGeneralised Computation of Behavioural Profiles based on Petri-Net Unfoldings
Generalised Computation of Behavioural Profiles based on Petri-Net Unfoldings Matthias Weidlich, Felix Elliger, and Mathias Weske Hasso Plattner Institute at the University of Potsdam, Germany {Matthias.Weidlich,Mathias.Weske}@hpi.uni-potsdam.de
More informationArboricity and spanning-tree packing in random graphs with an application to load balancing
Arboricity and spanning-tree packing in random graphs with an application to load balancing Xavier Pérez-Giménez joint work with Jane (Pu) Gao and Cristiane M. Sato University of Waterloo University of
More informationIncremental Learning and Concept Drift: Overview
Incremental Learning and Concept Drift: Overview Incremental learning The algorithm ID5R Taxonomy of incremental learning Concept Drift Teil 5: Incremental Learning and Concept Drift (V. 1.0) 1 c G. Grieser
More informationMore on NP and Reductions
Indian Institute of Information Technology Design and Manufacturing, Kancheepuram Chennai 600 127, India An Autonomous Institute under MHRD, Govt of India http://www.iiitdm.ac.in COM 501 Advanced Data
More informationParikh s theorem. Håkan Lindqvist
Parikh s theorem Håkan Lindqvist Abstract This chapter will discuss Parikh s theorem and provide a proof for it. The proof is done by induction over a set of derivation trees, and using the Parikh mappings
More informationNested Differentiation and Symmetric Hessian Graphs with ADTAGEO
Nested Differentiation and Symmetric Hessian Graphs with ADTAGEO ADjoints and TAngents by Graph Elimination Ordering Jan Riehme Andreas Griewank Institute for Applied Mathematics Humboldt Universität zu
More informationECLT 5810 Classification Neural Networks. Reference: Data Mining: Concepts and Techniques By J. Hand, M. Kamber, and J. Pei, Morgan Kaufmann
ECLT 5810 Classification Neural Networks Reference: Data Mining: Concepts and Techniques By J. Hand, M. Kamber, and J. Pei, Morgan Kaufmann Neural Networks A neural network is a set of connected input/output
More informationOptimal Planning for Delete-free Tasks with Incremental LM-cut
Theoretical Background Contributions Experiments Conclusion Optimal Planning for Delete-free Tasks with Incremental LM-cut Florian Pommerening and Malte Helmert Universität Basel Departement Informatik
More informationAn 1.75 approximation algorithm for the leaf-to-leaf tree augmentation problem
An 1.75 approximation algorithm for the leaf-to-leaf tree augmentation problem Zeev Nutov, László A. Végh January 12, 2016 We study the tree augmentation problem: Tree Augmentation Problem (TAP) Instance:
More informationBreadth-First Search of Graphs
Breadth-First Search of Graphs Analysis of Algorithms Prepared by John Reif, Ph.D. Distinguished Professor of Computer Science Duke University Applications of Breadth-First Search of Graphs a) Single Source
More informationStatistical Machine Learning from Data
Samy Bengio Statistical Machine Learning from Data 1 Statistical Machine Learning from Data Ensembles Samy Bengio IDIAP Research Institute, Martigny, Switzerland, and Ecole Polytechnique Fédérale de Lausanne
More informationDecision Trees. Each internal node : an attribute Branch: Outcome of the test Leaf node or terminal node: class label.
Decision Trees Supervised approach Used for Classification (Categorical values) or regression (continuous values). The learning of decision trees is from class-labeled training tuples. Flowchart like structure.
More information25. Minimum Spanning Trees
695 25. Minimum Spanning Trees Motivation, Greedy, Algorithm Kruskal, General Rules, ADT Union-Find, Algorithm Jarnik, Prim, Dijkstra, Fibonacci Heaps [Ottman/Widmayer, Kap. 9.6, 6.2, 6.1, Cormen et al,
More information25. Minimum Spanning Trees
Problem Given: Undirected, weighted, connected graph G = (V, E, c). 5. Minimum Spanning Trees Motivation, Greedy, Algorithm Kruskal, General Rules, ADT Union-Find, Algorithm Jarnik, Prim, Dijkstra, Fibonacci
More informationCMPSCI611: The Matroid Theorem Lecture 5
CMPSCI611: The Matroid Theorem Lecture 5 We first review our definitions: A subset system is a set E together with a set of subsets of E, called I, such that I is closed under inclusion. This means that
More informationUniversität Potsdam Institut für Informatik Lehrstuhl Maschinelles Lernen. Decision Trees. Tobias Scheffer
Universität Potsdam Institut für Informatik Lehrstuhl Maschinelles Lernen Decision Trees Tobias Scheffer Decision Trees One of many applications: credit risk Employed longer than 3 months Positive credit
More informationGroupoids and Faà di Bruno Formulae for Green Functions
Groupoids and Faà di Bruno Formulae for Green Functions UPC UAB London Metropolitan U. September 22, 2011 Bialgebras of trees Connes-Kreimer bialgebra of rooted trees: is the free C-algebra H on the set
More informationA note on three water cups
A note on three water cups Piotr Zieliński March 14, 2015 1 Problem Statement We have three cups of water of sizes A B C respectively. We start with cup A full and cups B and C empty. If we pour water
More informationOnline Sorted Range Reporting and Approximating the Mode
Online Sorted Range Reporting and Approximating the Mode Mark Greve Progress Report Department of Computer Science Aarhus University Denmark January 4, 2010 Supervisor: Gerth Stølting Brodal Online Sorted
More informationAssociation Rules. Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION. Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION
CHAPTER2 Association Rules 2.1 Introduction Many large retail organizations are interested in instituting information-driven marketing processes, managed by database technology, that enable them to Jones
More informationAn Optimized Interestingness Hotspot Discovery Framework for Large Gridded Spatio-temporal Datasets
IEEE Big Data 2015 Big Data in Geosciences Workshop An Optimized Interestingness Hotspot Discovery Framework for Large Gridded Spatio-temporal Datasets Fatih Akdag and Christoph F. Eick Department of Computer
More information1 Matroid intersection
CS 369P: Polyhedral techniques in combinatorial optimization Instructor: Jan Vondrák Lecture date: October 21st, 2010 Scribe: Bernd Bandemer 1 Matroid intersection Given two matroids M 1 = (E, I 1 ) and
More informationICS141: Discrete Mathematics for Computer Science I
ICS141: Discrete Mathematics for Computer Science I Dept. Information & Computer Sci., Jan Stelovsky based on slides by Dr. Baek and Dr. Still Originals by Dr. M. P. Frank and Dr. J.L. Gross Provided by
More informationUniversität Augsburg
Universität Augsburg Properties of Overwriting for Updates in Typed Kleene Algebras Thorsten Ehm Report 2000-7 Dezember 2000 Institut für Informatik D-86135 Augsburg Copyright c Thorsten Ehm Institut für
More informationEfficient discovery of the top-k optimal dependency rules with Fisher s exact test of significance
Efficient discovery of the top-k optimal dependency rules with Fisher s exact test of significance Wilhelmiina Hämäläinen epartment of omputer Science University of Helsinki Finland whamalai@cs.helsinki.fi
More informationD B M G Data Base and Data Mining Group of Politecnico di Torino
Data Base and Data Mining Group of Politecnico di Torino Politecnico di Torino Association rules Objective extraction of frequent correlations or pattern from a transactional database Tickets at a supermarket
More informationAlgorithm Design Strategies V
Algorithm Design Strategies V Joaquim Madeira Version 0.0 October 2016 U. Aveiro, October 2016 1 Overview The 0-1 Knapsack Problem Revisited The Fractional Knapsack Problem Greedy Algorithms Example Coin
More informationAssociation Rules. Fundamentals
Politecnico di Torino Politecnico di Torino 1 Association rules Objective extraction of frequent correlations or pattern from a transactional database Tickets at a supermarket counter Association rule
More informationSymmetric Network Computation
Symmetric Network Computation and the Finite-State Symmetric Graph Automaton (FSSGA) Model David Pritchard, with Santosh Vempala Theory of Distributed Systems Group at MIT, July 7 2006 David Pritchard
More informationPractice Final Solutions. 1. Consider the following algorithm. Assume that n 1. line code 1 alg(n) { 2 j = 0 3 if (n = 0) { 4 return j
Practice Final Solutions 1. Consider the following algorithm. Assume that n 1. line code 1 alg(n) 2 j = 0 3 if (n = 0) 4 return j } 5 else 6 j = 2n+ alg(n 1) 7 return j } } Set up a recurrence relation
More information1.1 Introduction to Sets
Math 166 Lecture Notes - S. Nite 8/29/2012 Page 1 of 5 1.1 Introduction to Sets Set Terminology and Notation A set is a well-defined collection of objects. The objects are called the elements and are usually
More informationD B M G. Association Rules. Fundamentals. Fundamentals. Elena Baralis, Silvia Chiusano. Politecnico di Torino 1. Definitions.
Definitions Data Base and Data Mining Group of Politecnico di Torino Politecnico di Torino Itemset is a set including one or more items Example: {Beer, Diapers} k-itemset is an itemset that contains k
More informationD B M G. Association Rules. Fundamentals. Fundamentals. Association rules. Association rule mining. Definitions. Rule quality metrics: example
Association rules Data Base and Data Mining Group of Politecnico di Torino Politecnico di Torino Objective extraction of frequent correlations or pattern from a transactional database Tickets at a supermarket
More informationRelation between Graphs
Max Planck Intitute for Math. in the Sciences, Leipzig, Germany Joint work with Jan Hubička, Jürgen Jost, Peter F. Stadler and Ling Yang SCAC2012, SJTU, Shanghai Outline Motivation and Background 1 Motivation
More informationProblem. Problem Given a dictionary and a word. Which page (if any) contains the given word? 3 / 26
Binary Search Introduction Problem Problem Given a dictionary and a word. Which page (if any) contains the given word? 3 / 26 Strategy 1: Random Search Randomly select a page until the page containing
More informationLocating the Source of Diffusion in Large-Scale Networks
Locating the Source of Diffusion in Large-Scale Networks Supplemental Material Pedro C. Pinto, Patrick Thiran, Martin Vetterli Contents S1. Detailed Proof of Proposition 1..................................
More informationLearning Large-Alphabet and Analog Circuits with Value Injection Queries
Learning Large-Alphabet and Analog Circuits with Value Injection Queries Dana Angluin 1 James Aspnes 1, Jiang Chen 2, Lev Reyzin 1,, 1 Computer Science Department, Yale University {angluin,aspnes}@cs.yale.edu,
More informationLower Bounds for Dynamic Connectivity (2004; Pǎtraşcu, Demaine)
Lower Bounds for Dynamic Connectivity (2004; Pǎtraşcu, Demaine) Mihai Pǎtraşcu, MIT, web.mit.edu/ mip/www/ Index terms: partial-sums problem, prefix sums, dynamic lower bounds Synonyms: dynamic trees 1
More informationCS 581 Paper Presentation
CS 581 Paper Presentation Muhammad Samir Khan Recovering the Treelike Trend of Evolution Despite Extensive Lateral Genetic Transfer: A Probabilistic Analysis by Sebastien Roch and Sagi Snir Overview Introduction
More informationON QUADRATIC ORBITAL NETWORKS
ON QUADRATIC ORBITAL NETWORKS OLIVER KNILL Abstract. These are some informal remarks on quadratic orbital networks over finite fields Z p. We discuss connectivity, Euler characteristic, number of cliques,
More informationNew techniques for trail bounds and application to differential trails in Keccak
New techniques for trail bounds and application to differential trails in Keccak Silvia Mella 1,2 Joan Daemen 1,3 Gilles Van Assche 1 1 STMicroelectronics 2 University of Milan 3 Radboud University Fast
More informationDisjoint-Set Forests
Disjoint-Set Forests Thanks for Showing Up! Outline for Today Incremental Connectivity Maintaining connectivity as edges are added to a graph. Disjoint-Set Forests A simple data structure for incremental
More informationSection Notes 8. Integer Programming II. Applied Math 121. Week of April 5, expand your knowledge of big M s and logical constraints.
Section Notes 8 Integer Programming II Applied Math 121 Week of April 5, 2010 Goals for the week understand IP relaxations be able to determine the relative strength of formulations understand the branch
More information(tree searching technique) (Boolean formulas) satisfying assignment: (X 1, X 2 )
Algorithms Chapter 5: The Tree Searching Strategy - Examples 1 / 11 Chapter 5: The Tree Searching Strategy 1. Ex 5.1Determine the satisfiability of the following Boolean formulas by depth-first search
More information1. (12 points) Give a table-driven parse table for the following grammar: 1) X ax 2) X P 3) P DT 4) T P 5) T ε 7) D 1
1. (12 points) Give a table-driven parse table for the following grammar: 1) X ax 2) X P 3) P DT 4) T P 5) T ε 6) D 0 7) D 1 4. Recall that our class database has the following schemas: SNAP(StudentID,
More informationSMALL SUBSETS OF THE REALS AND TREE FORCING NOTIONS
SMALL SUBSETS OF THE REALS AND TREE FORCING NOTIONS MARCIN KYSIAK AND TOMASZ WEISS Abstract. We discuss the question which properties of smallness in the sense of measure and category (e.g. being a universally
More informationDecision Tree Learning
Decision Tree Learning Berlin Chen Department of Computer Science & Information Engineering National Taiwan Normal University References: 1. Machine Learning, Chapter 3 2. Data Mining: Concepts, Models,
More informationLinear Classifiers (Kernels)
Universität Potsdam Institut für Informatik Lehrstuhl Linear Classifiers (Kernels) Blaine Nelson, Christoph Sawade, Tobias Scheffer Exam Dates & Course Conclusion There are 2 Exam dates: Feb 20 th March
More informationA set theoretic view of the ISA hierarchy
Loughborough University Institutional Repository A set theoretic view of the ISA hierarchy This item was submitted to Loughborough University's Institutional Repository by the/an author. Citation: CHEUNG,
More informationSkylines. Yufei Tao. ITEE University of Queensland. INFS4205/7205, Uni of Queensland
Yufei Tao ITEE University of Queensland Today we will discuss problems closely related to the topic of multi-criteria optimization, where one aims to identify objects that strike a good balance often optimal
More informationThe Generalized Regenerator Location Problem
The Generalized Regenerator Location Problem Si Chen Ivana Ljubić S. Raghavan College of Business and Public Affairs, Murray State University Murray, KY 42071, USA Faculty of Business, Economics, and Statistics,
More informationAlpha-Beta Pruning: Algorithm and Analysis
Alpha-Beta Pruning: Algorithm and Analysis Tsan-sheng Hsu tshsu@iis.sinica.edu.tw http://www.iis.sinica.edu.tw/~tshsu 1 Introduction Alpha-beta pruning is the standard searching procedure used for 2-person
More informationCOS597D: Information Theory in Computer Science October 19, Lecture 10
COS597D: Information Theory in Computer Science October 9, 20 Lecture 0 Lecturer: Mark Braverman Scribe: Andrej Risteski Kolmogorov Complexity In the previous lectures, we became acquainted with the concept
More informationSpatial Database. Ahmad Alhilal, Dimitris Tsaras
Spatial Database Ahmad Alhilal, Dimitris Tsaras Content What is Spatial DB Modeling Spatial DB Spatial Queries The R-tree Range Query NN Query Aggregation Query RNN Query NN Queries with Validity Information
More informationHW8. Due: November 1, 2018
CSCI 1010 Theory of Computation HW8 Due: November 1, 2018 Attach a fully filled-in cover sheet to the front of your printed homework Your name should not appear anywhere; the cover sheet and each individual
More informationDecision Trees: Overfitting
Decision Trees: Overfitting Emily Fox University of Washington January 30, 2017 Decision tree recap Loan status: Root 22 18 poor 4 14 Credit? Income? excellent 9 0 3 years 0 4 Fair 9 4 Term? 5 years 9
More informationCMPSCI 611 Advanced Algorithms Midterm Exam Fall 2015
NAME: CMPSCI 611 Advanced Algorithms Midterm Exam Fall 015 A. McGregor 1 October 015 DIRECTIONS: Do not turn over the page until you are told to do so. This is a closed book exam. No communicating with
More informationAlpha-Beta Pruning: Algorithm and Analysis
Alpha-Beta Pruning: Algorithm and Analysis Tsan-sheng Hsu tshsu@iis.sinica.edu.tw http://www.iis.sinica.edu.tw/~tshsu 1 Introduction Alpha-beta pruning is the standard searching procedure used for 2-person
More informationML techniques. symbolic techniques different types of representation value attribute representation representation of the first order
MACHINE LEARNING Definition 1: Learning is constructing or modifying representations of what is being experienced [Michalski 1986], p. 10 Definition 2: Learning denotes changes in the system That are adaptive
More informationDistributed Systems Gossip Algorithms
Distributed Systems Gossip Algorithms He Sun School of Informatics University of Edinburgh What is Gossip? Gossip algorithms In a gossip algorithm, each node in the network periodically exchanges information
More informationInformation theoretical approach for domain ontology exploration in large Earth observation image archives
Information theoretical approach for domain ontology exploration in large Earth observation image archives Mihai Datcu, Mariana Ciucu DLR Oberpfaffenhofen IGARSS 2004 KIM - Knowledge driven Information
More informationGraph Transformations T1 and T2
Graph Transformations T1 and T2 We now introduce two graph transformations T1 and T2. Reducibility by successive application of these two transformations is equivalent to reducibility by intervals. The
More informationState of the art Image Compression Techniques
Chapter 4 State of the art Image Compression Techniques In this thesis we focus mainly on the adaption of state of the art wavelet based image compression techniques to programmable hardware. Thus, an
More informationMining Positive and Negative Fuzzy Association Rules
Mining Positive and Negative Fuzzy Association Rules Peng Yan 1, Guoqing Chen 1, Chris Cornelis 2, Martine De Cock 2, and Etienne Kerre 2 1 School of Economics and Management, Tsinghua University, Beijing
More informationImplementation of Lossless Huffman Coding: Image compression using K-Means algorithm and comparison vs. Random numbers and Message source
Implementation of Lossless Huffman Coding: Image compression using K-Means algorithm and comparison vs. Random numbers and Message source Ali Tariq Bhatti 1, Dr. Jung Kim 2 1,2 Department of Electrical
More informationOdd independent transversals are odd
Odd independent transversals are odd Penny Haxell Tibor Szabó Dedicated to Béla Bollobás on the occasion of his 60th birthday Abstract We put the final piece into a puzzle first introduced by Bollobás,
More informationMatroid Secretary for Regular and Decomposable Matroids
Matroid Secretary for Regular and Decomposable Matroids Michael Dinitz Weizmann Institute of Science mdinitz@cs.cmu.edu Guy Kortsarz Rutgers University, Camden guyk@camden.rutgers.edu Abstract In the matroid
More informationAalborg Universitet. All P3-equipackable graphs Randerath, Bert; Vestergaard, Preben Dahl. Publication date: 2008
Aalborg Universitet All P-equipackable graphs Randerath, Bert; Vestergaard, Preben Dahl Publication date: 2008 Document Version Publisher's PD, also known as Version of record Link to publication from
More informationChapter 7. Network Flow. Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved.
Chapter 7 Network Flow Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved. 7.5 Bipartite Matching Matching Matching. Input: undirected graph G = (V, E). M E is a matching
More information1 Approximate Quantiles and Summaries
CS 598CSC: Algorithms for Big Data Lecture date: Sept 25, 2014 Instructor: Chandra Chekuri Scribe: Chandra Chekuri Suppose we have a stream a 1, a 2,..., a n of objects from an ordered universe. For simplicity
More informationFinite Automata. Seungjin Choi
Finite Automata Seungjin Choi Department of Computer Science and Engineering Pohang University of Science and Technology 77 Cheongam-ro, Nam-gu, Pohang 37673, Korea seungjin@postech.ac.kr 1 / 28 Outline
More informationClass President: A Network Approach to Popularity. Due July 18, 2014
Class President: A Network Approach to Popularity Due July 8, 24 Instructions. Due Fri, July 8 at :59 PM 2. Work in groups of up to 3 3. Type up the report, and submit as a pdf on D2L 4. Attach the code
More informationPredicting the Performance of IDA* with Conditional Distributions
Predicting the Performance of IDA* with Conditional Distributions Uzi Zahavi Computer Science Bar-Ilan University Ramat-Gan, Israel 92500 zahaviu@cs.biu.ac.il Ariel Felner Information Systems Engineering
More informationTransportation Problem
Transportation Problem Alireza Ghaffari-Hadigheh Azarbaijan Shahid Madani University (ASMU) hadigheha@azaruniv.edu Spring 2017 Alireza Ghaffari-Hadigheh (ASMU) Transportation Problem Spring 2017 1 / 34
More informationFrequent Pattern Mining: Exercises
Frequent Pattern Mining: Exercises Christian Borgelt School of Computer Science tto-von-guericke-university of Magdeburg Universitätsplatz 2, 39106 Magdeburg, Germany christian@borgelt.net http://www.borgelt.net/
More informationSolving fixed-point equations over semirings
Solving fixed-point equations over semirings Javier Esparza Technische Universität München Joint work with Michael Luttenberger and Maximilian Schlund Fixed-point equations We study systems of equations
More informationSublinear Algorithms for Big Data
Sublinear Algorithms for Big Data Qin Zhang 1-1 2-1 Part 2: Sublinear in Communication Sublinear in communication The model x 1 = 010011 x 2 = 111011 x 3 = 111111 x k = 100011 Applicaitons They want to
More informationcs/ee/ids 143 Communication Networks
cs/ee/ids 143 Communication Networks Chapter 5 Routing Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Warning These notes are not self-contained, probably not understandable, unless you also
More informationLecture 12 Scribe Notes
6.890: Algorithmic Lower Bounds: Fun With Hardness Proofs Fall 04 Prof. Erik Demaine Lecture Scribe Notes Recap For the past two classes, we ve been covering inapproximability, some of its reduction styles,
More information