Outline. Approximation: Theory and Algorithms. Reference Sets [GJK + 02] Illustration: Triangle Inequality. Pruning with Reference Sets

Size: px
Start display at page:

Download "Outline. Approximation: Theory and Algorithms. Reference Sets [GJK + 02] Illustration: Triangle Inequality. Pruning with Reference Sets"

Transcription

1 Otine Approximation: Theory and Agorithms Prning with Nikoas Agsten Free University of Bozen-Bozano Facty of Compter Science DIS Unit 10 May 15, Upper and Lower Bond Exampe: 2 Concsion Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 [GJK + 02] Istration: Triange Ineqaity c c Reference sets take advantage of the triange ineqaity for metrics. An extended version of the triange ineqaity is: δ(a, b) δ(b, c) δ(a, c) δ(a, b) + δ(b, c), where δ() is a metric distance fnction compted between eements a, b, and c. a b a b δ(a, c) < δ(a, b) + δ(b, c) δ(a, b) δ(b, c) < δ(a, c) a b c a c b δ(a, c) = δ(a, b) + δ(b, c) δ(a, b) δ(b, c) = δ(a, c) Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24

2 Notation Reference Vector S 1 and S 2 are sets of trees (nordered forests) K S 1 S 2 is caed the reference set S 1 and S 2 are trees k K, 1 K, is a tree of the reference set v i is a vector of size K that stores the distance from S 1 to each tree k K the -th eement of v i stores the edit distance between and k : v i = δ t (, k ) v j is the respective vector for S 2 Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Metric Space Upper and Lower Bond Upper and Lower Bond Metric space of the reference set: the eements of the reference set define the basis of a metric space the vector v k represents tree T k as a point in this space v k is the coordinate of the point on the -th axis Exampe: Two trees and in the metric space defined by the reference set K = {k 1, k 2 }. v k2 v j2 v i2 v j1 v i1 v k1 From the triange ineqaity it foows that for a 1 K Upper bond: Lower bond: v i v δ t (, ) v i + v δ t (, ) δ t (, ) min v i + v = t (, ) max v i v = t (, ) Approximate join: match a trees with δ t (T 1, T 2 ) τ Upper bond: If t (, ) τ, then and match. Lower bond: If t (, ) > τ, then and do not match. Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24

3 Reference Set Tradeoff Upper and Lower Bond We Separated Csters Upper and Lower Bond Sma reference set: efficient reference vector comptation we have to compte S distances for each additiona tree in the reference set to constrct the vectors for sma reference sets the constrction of the vectors is cheaper Large reference set: effective fiters arge reference sets make t and t more effective ths, once the reference vectors are compted, ess distance comptations are needed Where is the optimm? We cster the set S = S 1 S 2. The csters are we separated for threshod τ if trees within a cster have sma distance (within τ 2 ) trees from different cster have arge distance (more than 3τ 2 ) Exampe: Two we separated csters C 1 and C 2. > 3τ 2 C 1 C 2 Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Upper and Lower Bond Trees within the Same Cster Upper Bond Appies Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Upper and Lower Bond Trees in Different Csters Lower Bond Appies Upper bond: δ t (, ) v i + v = δ t (, k ) + δ t (k, ) Assmption: S 1 and S 2 are in the same cster C. The csters are we separated. The cster C contains a reference tree k K. In this case v i and v δ t(, ) τ. Rest: If,, and k are in the same cster from v i and v we concde that T 1 and T 2 match ths we need not to compte δ t (, ) τ 2 Lower bond: δ t (, ) v i v = δ t (, k ) δ t (k, ) Assmption: S 1 is in cster C 1, S 2 is in cster C 2. The csters are we separated. The cster C 1 contains a reference tree k K. In this case v i and v > 3τ 2 δ t(, ) > τ. Rest: If and k are in the same cster, bt is in a different cster from v i and v we concde that T 1 and T 2 do not match ths we need not to compte δ t (, ) v i k δ t (, ) v v i > 3τ 2 C 1 C 2 k δ t (, ) v Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24

4 Upper and Lower Bond Bonds for We Separated Csters Upper and Lower Bond Optimm We Separated Csters Scenario: Cost: Assme that S = S 1 = S 2 is we separated into csters. Consider a cster of size n that contains a tree k K of the reference set. We need to compte S 1 distances to the tree k K Benefit: From the pper bond we concde that a trees within a cster match ( t τ) we save n (n 1)/2 edit distance comptations From the ower bond we concde that trees of different csters do not match ( t > τ) we save n ( S n ) edit distance comptations Optimm: csters are we separated the reference set contains one tree per cster Gha et a. [GJK + 02] find csters by samping and estimate a reference set size. Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Exampe Exampe: S 1 = {T 1, T 2, T 3 }, S 2 = {T 4, T 5, T 6 } Reference set K = {T 1 }, 1 K = 1 Distances: T 1 T 2 T 3 T 4 T 5 T 6 T T T T T T 6 0 Reference Vectors: v 1,1 = (0), v 2,1 = (4), v 3,1 = (1), v 4,1 = (1), v 5,1 = (4), v 6,1 = (1) The csters C 1 = {T 1, T 3, T 4, T 6 } and C 2 = {T 2, T 5 } are we separated. We combine the previos approaches: ower bond with traversa strings pper bond with constrained edit distance reference sets Instead of one vector v i we compte two vectors for each tree : ower bond: vi contains the traversa string distance pper bond: vi contains the constrained edit distance Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24

5 Metric Space : Triange Ineqaity Metric space of the reference set: the eements of the reference set define the basis of a metric space each tree T k is represented by a rectange in this metric space vk and v k are two opposite corners of this rectange Exampe: Two trees and in the metric space defined by the reference set K = {k 1, k 2 }. / k2 v j2 v i2 The triange eqations changes as foows: (a) For a 1 K δ t (, ) vi + v (b) For a 1 K v v i if v > vi δ t (, ) vi v if vi > v 0 otherwise j2 i2 j1 v j1 i1 v i1 / k1 Note: If v > vi or vi > v then [vi, v i ] and [v, v ] are disjoint intervas. In a other cases we can not give a ower bond (other than 0). Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 : Upper and Lower Bonds Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Istration: Cases for the Lower Bond Upper bond: Lower bond: t (, ) = t (, ) = max min v i + v v v i if v > vi vi v if vi > v 0 otherwise Case v > vi : ower bond is v v i i v i ower bond v v k Case vi > v : ower bond is v i v v ower bond i vi v k A other cases ([vi, v i ] and [v, v ] overap): no ower bond v i v vi v k Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24

6 Smmary Concsion What s Next? Concsion : Upper and Lower Bond Combination of reference sets with other bonds Binary Branch Distance ower bond proof compexity Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Sdipto Gha, H. V. Jagadish, Nick Kodas, Divesh Srivastava, and Ting Y. Approximate XML joins. In Proceedings of the ACM SIGMOD Internationa Conference on Management of Data, pages , Madison, Wisconsin, ACM Press. Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24

Small-bias sets from extended norm-trace codes

Small-bias sets from extended norm-trace codes Sma-bias sets from extended norm-trace codes Gretchen L Matthews Jstin D Peachey March 5, 0 Abstract As demonstrated by Naor and Naor [] among others [, ], the constrction of sma-bias probabiity spaces,

More information

Measurement vs. Analysis

Measurement vs. Analysis Embedded Systems 23-1 - Measrement vs. Anaysis REVIEW Probabiity Best Case Exection Time Unsafe: Exection Time Measrement Worst Case Exection Time Upper bond Exection Time typicay hge variations in ET

More information

Haar Decomposition and Reconstruction Algorithms

Haar Decomposition and Reconstruction Algorithms Jim Lambers MAT 773 Fa Semester 018-19 Lecture 15 and 16 Notes These notes correspond to Sections 4.3 and 4.4 in the text. Haar Decomposition and Reconstruction Agorithms Decomposition Suppose we approximate

More information

A Note on Irreducible Polynomials and Identity Testing

A Note on Irreducible Polynomials and Identity Testing A Note on Irrecible Polynomials an Ientity Testing Chanan Saha Department of Compter Science an Engineering Inian Institte of Technology Kanpr Abstract We show that, given a finite fiel F q an an integer

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and This artice appeared in a orna pbished by Esevier. The attached copy is frnished to the athor for interna non-commercia research and edcation se, incding for instrction at the athors instittion and sharing

More information

Upper Bounds on the Spanning Ratio of Constrained Theta-Graphs

Upper Bounds on the Spanning Ratio of Constrained Theta-Graphs Upper Bonds on the Spanning Ratio of Constrained Theta-Graphs Prosenjit Bose and André van Renssen School of Compter Science, Carleton University, Ottaa, Canada. jit@scs.carleton.ca, andre@cg.scs.carleton.ca

More information

Letting loose a SPIDER on a network of POMDPs: Generating quality guaranteed policies

Letting loose a SPIDER on a network of POMDPs: Generating quality guaranteed policies Letting oose a SPIDER on a network of POMDPs: Generating qaity garanteed poicies Pradeep Varakantham, Jansz Marecki, Yichi Yab, Miind Tambe, Makoto Yokoo University of Sothern Caifornia, Los Angees, CA

More information

BDD-Based Analysis of Gapped q-gram Filters

BDD-Based Analysis of Gapped q-gram Filters BDD-Based Anaysis of Gapped q-gram Fiters Marc Fontaine, Stefan Burkhardt 2 and Juha Kärkkäinen 2 Max-Panck-Institut für Informatik Stuhsatzenhausweg 85, 6623 Saarbrücken, Germany e-mai: stburk@mpi-sb.mpg.de

More information

Symmetric Range Assignment with Disjoint MST Constraints

Symmetric Range Assignment with Disjoint MST Constraints Symmetric Range Assignment with Disjoint MST Constraints Eric Schmtz Drexel University Philadelphia, Pa. 19104,USA Eric.Jonathan.Schmtz@drexel.ed ABSTRACT If V is a set of n points in the nit sqare [0,

More information

Department of Industrial Engineering Statistical Quality Control presented by Dr. Eng. Abed Schokry

Department of Industrial Engineering Statistical Quality Control presented by Dr. Eng. Abed Schokry Department of Indstrial Engineering Statistical Qality Control presented by Dr. Eng. Abed Schokry Department of Indstrial Engineering Statistical Qality Control C and U Chart presented by Dr. Eng. Abed

More information

FRÉCHET KERNELS AND THE ADJOINT METHOD

FRÉCHET KERNELS AND THE ADJOINT METHOD PART II FRÉCHET KERNES AND THE ADJOINT METHOD 1. Setp of the tomographic problem: Why gradients? 2. The adjoint method 3. Practical 4. Special topics (sorce imaging and time reversal) Setp of the tomographic

More information

Approximate Solution of Convection- Diffusion Equation by the Homotopy Perturbation Method

Approximate Solution of Convection- Diffusion Equation by the Homotopy Perturbation Method Gen. Math. Notes, Vol. 1, No., December 1, pp. 18-114 ISSN 19-7184; Copyright ICSRS Pblication, 1 www.i-csrs.org Available free online at http://www.geman.in Approximate Soltion of Convection- Diffsion

More information

Pairwise RNA Edit Distance

Pairwise RNA Edit Distance Pairwise RNA Edit Distance In the foowing: Sequences S 1 and S 2 associated structures P 1 and P 2 scoring of aignment: different edit operations arc atering arc removing 1) ACGUUGACUGACAACAC..(((...)))...

More information

ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK

ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK Aexander Arkhipov, Michae Schne German Aerospace Center DLR) Institute of Communications and Navigation Oberpfaffenhofen, 8224 Wessing, Germany

More information

Solutions to two problems in optimizing a bar

Solutions to two problems in optimizing a bar ectre 19b Sotions to two probems in optimizing a bar ME 56 at the Indian Institte of Science, Bengar Variationa Methods and Strctra Optimization G. K. Ananthasresh Professor, Mechanica Engineering, Indian

More information

Variational Optical Flow Estimation. ICCV 2009 Tutorial, Kyoto, Japan A 1 2 A 1 2. ICCV 2009 Kyoto University, September 27th.

Variational Optical Flow Estimation. ICCV 2009 Tutorial, Kyoto, Japan A 1 2 A 1 2. ICCV 2009 Kyoto University, September 27th. ICCV 2009 Kyoto University, September 27th Introdction () What is the Optica Fow Probem? Variationa Optica Fow Estimation Thomas Brox Mathematica Image naysis Grop Saarand University Saarbr cken, Germany

More information

Ascertainment of The Certain Fundamental Units in a Specific Type of Real Quadratic Fields

Ascertainment of The Certain Fundamental Units in a Specific Type of Real Quadratic Fields J. Ana. Nm. Theor. 5, No., 09-3 (07) 09 Jorna of Anaysis & Nmber Theory An Internationa Jorna http://x.oi.org/0.8576/jant/05004 Ascertainment of The Certain Fnamenta Units in a Specific Type of Rea Qaratic

More information

Outline. Approximation: Theory and Algorithms. Application Scenario. 3 The q-gram Distance. Nikolaus Augsten. Definition and Properties

Outline. Approximation: Theory and Algorithms. Application Scenario. 3 The q-gram Distance. Nikolaus Augsten. Definition and Properties Outline Approximation: Theory and Algorithms Nikolaus Augsten Free University of Bozen-Bolzano Faculty of Computer Science DIS Unit 3 March 13, 2009 2 3 Nikolaus Augsten (DIS) Approximation: Theory and

More information

SydU STAT3014 (2015) Second semester Dr. J. Chan 18

SydU STAT3014 (2015) Second semester Dr. J. Chan 18 STAT3014/3914 Appied Stat.-Samping C-Stratified rand. sampe Stratified Random Samping.1 Introduction Description The popuation of size N is divided into mutuay excusive and exhaustive subpopuations caed

More information

A High Throughput Pilot Allocation for M2M Communication in Crowded Massive MIMO Systems

A High Throughput Pilot Allocation for M2M Communication in Crowded Massive MIMO Systems 1 A High Throghpt Piot Aocation for M2M Commnication in Crowded Massive MIMO Systems Himei Han, Xdong Go, Ying Li arxiv:1611.00491v1 [cs.it] 2 Nov 2016 Abstract A new scheme to resove the intra-ce piot

More information

Discussion of The Forward Search: Theory and Data Analysis by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli

Discussion of The Forward Search: Theory and Data Analysis by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli 1 Introdction Discssion of The Forward Search: Theory and Data Analysis by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli Søren Johansen Department of Economics, University of Copenhagen and CREATES,

More information

Change of Variables. (f T) JT. f = U

Change of Variables. (f T) JT. f = U Change of Variables 4-5-8 The change of ariables formla for mltiple integrals is like -sbstittion for single-ariable integrals. I ll gie the general change of ariables formla first, and consider specific

More information

Decoder Error Probability of MRD Codes

Decoder Error Probability of MRD Codes Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehighed Zhiyan Yan Department of Electrical

More information

HRL-Local Infinite Triangular Array Languages

HRL-Local Infinite Triangular Array Languages 1 Engineering, echnoogy echniques Vo.59: e16161076, January-December 2016 http://dx.doi.org/10.1590/1678-4324-2016161076 ISSN 1678-4324 Onine Edition BRAZILIAN ARCHIVES OF BIOLOGY AND ECHNOLOGY A N I N

More information

4.2 First-Order Logic

4.2 First-Order Logic 64 First-Order Logic and Type Theory The problem can be seen in the two qestionable rles In the existential introdction, the term a has not yet been introdced into the derivation and its se can therefore

More information

Optimization via the Hamilton-Jacobi-Bellman Method: Theory and Applications

Optimization via the Hamilton-Jacobi-Bellman Method: Theory and Applications Optimization via the Hamilton-Jacobi-Bellman Method: Theory and Applications Navin Khaneja lectre notes taken by Christiane Koch Jne 24, 29 1 Variation yields a classical Hamiltonian system Sppose that

More information

CDS 110b: Lecture 1-2 Introduction to Optimal Control

CDS 110b: Lecture 1-2 Introduction to Optimal Control CDS 110b: Lectre 1-2 Introdction to Optimal Control Richard M. Mrray 4 Janary 2006 Goals: Introdce the problem of optimal control as method of trajectory generation State the maimm principle and give eamples

More information

A study on wave equation and solutions of shallow water on inclined channel

A study on wave equation and solutions of shallow water on inclined channel Advances in River Sediment Researc Fkoka et a. (eds Tayor & Francis Grop, London, ISBN 978--8-6-9 A stdy on wave eqation and sotions of saow water on incined canne M. Arai Facty of Science and Tecnoogy,

More information

Two Birds With One Stone: An Efficient Hierarchical Framework for Top-k and Threshold-based String Similarity Search

Two Birds With One Stone: An Efficient Hierarchical Framework for Top-k and Threshold-based String Similarity Search Two Birds With One Stone: An Efficient Hierarchica Framework for Top-k and Threshod-based String Simiarity Search Jin Wang Guoiang Li Dong Deng Yong Zhang Jianhua Feng Department of Computer Science and

More information

Approximate String Joins in a Database (Almost) for Free

Approximate String Joins in a Database (Almost) for Free Approximate String Joins in a Database (Almost) for Free Erratum Luis Gravano Panagiotis G. Ipeirotis H. V. Jagadish Columbia University Columbia University University of Michigan gravano@cs.columbia.edu

More information

HYDROGEN ATOM SELECTION RULES TRANSITION RATES

HYDROGEN ATOM SELECTION RULES TRANSITION RATES DOING PHYSICS WITH MATLAB QUANTUM PHYSICS Ian Cooper Schoo of Physics, University of Sydney ian.cooper@sydney.edu.au HYDROGEN ATOM SELECTION RULES TRANSITION RATES DOWNLOAD DIRECTORY FOR MATLAB SCRIPTS

More information

Decoder Error Probability of MRD Codes

Decoder Error Probability of MRD Codes Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehigh.ed Zhiyan Yan Department of Electrical

More information

On the Goal Value of a Boolean Function

On the Goal Value of a Boolean Function On the Goa Vaue of a Booean Function Eric Bach Dept. of CS University of Wisconsin 1210 W. Dayton St. Madison, WI 53706 Lisa Heerstein Dept of CSE NYU Schoo of Engineering 2 Metrotech Center, 10th Foor

More information

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c)

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c) A Simpe Efficient Agorithm of 3-D Singe-Source Locaization with Uniform Cross Array Bing Xue a * Guangyou Fang b Yicai Ji c Key Laboratory of Eectromagnetic Radiation Sensing Technoogy, Institute of Eectronics,

More information

Solving a System of Equations

Solving a System of Equations Solving a System of Eqations Objectives Understand how to solve a system of eqations with: - Gass Elimination Method - LU Decomposition Method - Gass-Seidel Method - Jacobi Method A system of linear algebraic

More information

Formal Methods for Deriving Element Equations

Formal Methods for Deriving Element Equations Formal Methods for Deriving Element Eqations And the importance of Shape Fnctions Formal Methods In previos lectres we obtained a bar element s stiffness eqations sing the Direct Method to obtain eact

More information

Discussion Papers Department of Economics University of Copenhagen

Discussion Papers Department of Economics University of Copenhagen Discssion Papers Department of Economics University of Copenhagen No. 10-06 Discssion of The Forward Search: Theory and Data Analysis, by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli Søren Johansen,

More information

The Scalar Conservation Law

The Scalar Conservation Law The Scalar Conservation Law t + f() = 0 = conserved qantity, f() =fl d dt Z b a (t, ) d = Z b a t (t, ) d = Z b a f (t, ) d = f (t, a) f (t, b) = [inflow at a] [otflow at b] f((a)) f((b)) a b Alberto Bressan

More information

A. Distribution of the test statistic

A. Distribution of the test statistic A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch

More information

Adaptive Realtime Control of a Nonlinear Throttle Unit

Adaptive Realtime Control of a Nonlinear Throttle Unit ISSN 8 536 ISRN LUTFD/TFRT--5638--SE Adaptive Reatime Contro of a Noninear Throtte Unit Johan Gagner Rickard Bondesson Department of Atomatic Contro Lnd Institte of Technoogy Febrary Department of Atomatic

More information

Cuckoo hashing: Further analysis

Cuckoo hashing: Further analysis Information Processing Letters 86 (2003) 215 219 www.elsevier.com/locate/ipl Cckoo hashing: Frther analysis Lc Devroye,PatMorin School of Compter Science, McGill University, 3480 University Street, Montreal,

More information

Universal Scheme for Optimal Search and Stop

Universal Scheme for Optimal Search and Stop Universal Scheme for Optimal Search and Stop Sirin Nitinawarat Qalcomm Technologies, Inc. 5775 Morehose Drive San Diego, CA 92121, USA Email: sirin.nitinawarat@gmail.com Vengopal V. Veeravalli Coordinated

More information

Restricted Three-Body Problem in Different Coordinate Systems

Restricted Three-Body Problem in Different Coordinate Systems Applied Mathematics 3 949-953 http://dx.doi.org/.436/am..394 Pblished Online September (http://www.scirp.org/jornal/am) Restricted Three-Body Problem in Different Coordinate Systems II-In Sidereal Spherical

More information

A Single Species in One Spatial Dimension

A Single Species in One Spatial Dimension Lectre 6 A Single Species in One Spatial Dimension Reading: Material similar to that in this section of the corse appears in Sections 1. and 13.5 of James D. Mrray (), Mathematical Biology I: An introction,

More information

A generalized Alon-Boppana bound and weak Ramanujan graphs

A generalized Alon-Boppana bound and weak Ramanujan graphs A generalized Alon-Boppana bond and weak Ramanjan graphs Fan Chng Abstract A basic eigenvale bond de to Alon and Boppana holds only for reglar graphs. In this paper we give a generalized Alon-Boppana bond

More information

https://doi.org/ /epjconf/

https://doi.org/ /epjconf/ HOW TO APPLY THE OPTIMAL ESTIMATION METHOD TO YOUR LIDAR MEASUREMENTS FOR IMPROVED RETRIEVALS OF TEMPERATURE AND COMPOSITION R. J. Sica 1,2,*, A. Haefee 2,1, A. Jaai 1, S. Gamage 1 and G. Farhani 1 1 Department

More information

On the circuit complexity of the standard and the Karatsuba methods of multiplying integers

On the circuit complexity of the standard and the Karatsuba methods of multiplying integers On the circit complexity of the standard and the Karatsba methods of mltiplying integers arxiv:1602.02362v1 [cs.ds] 7 Feb 2016 Igor S. Sergeev The goal of the present paper is to obtain accrate estimates

More information

Target Location Estimation in Wireless Sensor Networks Using Binary Data

Target Location Estimation in Wireless Sensor Networks Using Binary Data Target Location stimation in Wireess Sensor Networks Using Binary Data Ruixin Niu and Pramod K. Varshney Department of ectrica ngineering and Computer Science Link Ha Syracuse University Syracuse, NY 344

More information

Information Source Detection in the SIR Model: A Sample Path Based Approach

Information Source Detection in the SIR Model: A Sample Path Based Approach Information Sorce Detection in the SIR Model: A Sample Path Based Approach Kai Zh and Lei Ying School of Electrical, Compter and Energy Engineering Arizona State University Tempe, AZ, United States, 85287

More information

Inductive Bias: How to generalize on novel data. CS Inductive Bias 1

Inductive Bias: How to generalize on novel data. CS Inductive Bias 1 Inductive Bias: How to generaize on nove data CS 478 - Inductive Bias 1 Overfitting Noise vs. Exceptions CS 478 - Inductive Bias 2 Non-Linear Tasks Linear Regression wi not generaize we to the task beow

More information

8 APPENDIX. E[m M] = (n S )(1 exp( exp(s min + c M))) (19) E[m M] n exp(s min + c M) (20) 8.1 EMPIRICAL EVALUATION OF SAMPLING

8 APPENDIX. E[m M] = (n S )(1 exp( exp(s min + c M))) (19) E[m M] n exp(s min + c M) (20) 8.1 EMPIRICAL EVALUATION OF SAMPLING 8 APPENDIX 8.1 EMPIRICAL EVALUATION OF SAMPLING We wish to evauate the empirica accuracy of our samping technique on concrete exampes. We do this in two ways. First, we can sort the eements by probabiity

More information

A generalized Alon-Boppana bound and weak Ramanujan graphs

A generalized Alon-Boppana bound and weak Ramanujan graphs A generalized Alon-Boppana bond and weak Ramanjan graphs Fan Chng Department of Mathematics University of California, San Diego La Jolla, CA, U.S.A. fan@csd.ed Sbmitted: Feb 0, 206; Accepted: Jne 22, 206;

More information

A Statistical Framework for Real-time Event Detection in Power Systems

A Statistical Framework for Real-time Event Detection in Power Systems 1 A Statistica Framework for Rea-time Event Detection in Power Systems Noan Uhrich, Tim Christman, Phiip Swisher, and Xichen Jiang Abstract A quickest change detection (QCD) agorithm is appied to the probem

More information

Multi-Voltage Floorplan Design with Optimal Voltage Assignment

Multi-Voltage Floorplan Design with Optimal Voltage Assignment Mlti-Voltage Floorplan Design with Optimal Voltage Assignment ABSTRACT Qian Zaichen Department of CSE The Chinese University of Hong Kong Shatin,N.T., Hong Kong zcqian@cse.chk.ed.hk In this paper, we stdy

More information

ON THE PERFORMANCE OF LOW

ON THE PERFORMANCE OF LOW Monografías Matemáticas García de Galdeano, 77 86 (6) ON THE PERFORMANCE OF LOW STORAGE ADDITIVE RUNGE-KUTTA METHODS Inmaclada Higeras and Teo Roldán Abstract. Gien a differential system that inoles terms

More information

Concepts Introduced. Digital Electronics. Logic Blocks. Truth Tables

Concepts Introduced. Digital Electronics. Logic Blocks. Truth Tables Concepts Introdced Digital Electronics trth tables, logic eqations, and gates combinational logic seqential logic Digital electronics operate at either high or low voltage. Compters se a binary representation

More information

Alberto Maydeu Olivares Instituto de Empresa Marketing Dept. C/Maria de Molina Madrid Spain

Alberto Maydeu Olivares Instituto de Empresa Marketing Dept. C/Maria de Molina Madrid Spain CORRECTIONS TO CLASSICAL PROCEDURES FOR ESTIMATING THURSTONE S CASE V MODEL FOR RANKING DATA Aberto Maydeu Oivares Instituto de Empresa Marketing Dept. C/Maria de Moina -5 28006 Madrid Spain Aberto.Maydeu@ie.edu

More information

Control Systems Design

Control Systems Design ELEC4410 Control Systems Design Lectre 16: Controllability and Observability Canonical Decompositions Jlio H. Braslavsky jlio@ee.newcastle.ed.a School of Electrical Engineering and Compter Science Lectre

More information

Efficient Similarity Search across Top-k Lists under the Kendall s Tau Distance

Efficient Similarity Search across Top-k Lists under the Kendall s Tau Distance Efficient Simiarity Search across Top-k Lists under the Kenda s Tau Distance Koninika Pa TU Kaisersautern Kaisersautern, Germany pa@cs.uni-k.de Sebastian Miche TU Kaisersautern Kaisersautern, Germany smiche@cs.uni-k.de

More information

Approach to Identifying Raindrop Vibration Signal Detected by Optical Fiber

Approach to Identifying Raindrop Vibration Signal Detected by Optical Fiber Sensors & Transducers, o. 6, Issue, December 3, pp. 85-9 Sensors & Transducers 3 by IFSA http://www.sensorsporta.com Approach to Identifying Raindrop ibration Signa Detected by Optica Fiber ongquan QU,

More information

Moreau-Yosida Regularization for Grouped Tree Structure Learning

Moreau-Yosida Regularization for Grouped Tree Structure Learning Moreau-Yosida Reguarization for Grouped Tree Structure Learning Jun Liu Computer Science and Engineering Arizona State University J.Liu@asu.edu Jieping Ye Computer Science and Engineering Arizona State

More information

TENSOR-BASED FRAMEWORK FOR THE PREDICTION OF FREQUENCY-SELECTIVE TIME-VARIANT MIMO CHANNELS

TENSOR-BASED FRAMEWORK FOR THE PREDICTION OF FREQUENCY-SELECTIVE TIME-VARIANT MIMO CHANNELS TENSOR-BASED FRAMEWORK FOR THE PREDICTION OF FREQUENCY-SELECTIVE TIME-VARIANT MIMO CHANNELS Marko Miojević, Giovanni De Gado, and Martin Haardt Imenau University of Technoogy, Communications Research Laboratory,

More information

Lecture Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2

Lecture Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2 BIJU PATNAIK UNIVERSITY OF TECHNOLOGY, ODISHA Lectre Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2 Prepared by, Dr. Sbhend Kmar Rath, BPUT, Odisha. Tring Machine- Miscellany UNIT 2 TURING MACHINE

More information

Simplified analysis of EXAFS data and determination of bond lengths

Simplified analysis of EXAFS data and determination of bond lengths Indian Journa of Pure & Appied Physics Vo. 49, January 0, pp. 5-9 Simpified anaysis of EXAFS data and determination of bond engths A Mishra, N Parsai & B D Shrivastava * Schoo of Physics, Devi Ahiya University,

More information

Fast Blind Recognition of Channel Codes

Fast Blind Recognition of Channel Codes Fast Bind Recognition of Channe Codes Reza Moosavi and Erik G. Larsson Linköping University Post Print N.B.: When citing this work, cite the origina artice. 213 IEEE. Persona use of this materia is permitted.

More information

Weak ε-nets for Axis-Parallel Boxes in d-space

Weak ε-nets for Axis-Parallel Boxes in d-space Weak ε-nets for Axis-Parallel Boxes in d-space Esther Ezra May 25, 2009 Abstract In this note we show the existence of weak ε-nets of size O /ε loglog /ε for point sets and axis-parallel boxes in R d.

More information

High Spectral Resolution Infrared Radiance Modeling Using Optimal Spectral Sampling (OSS) Method

High Spectral Resolution Infrared Radiance Modeling Using Optimal Spectral Sampling (OSS) Method High Spectra Resoution Infrared Radiance Modeing Using Optima Spectra Samping (OSS) Method J.-L. Moncet and G. Uymin Background Optima Spectra Samping (OSS) method is a fast and accurate monochromatic

More information

Discontinuous Fluctuation Distribution for Time-Dependent Problems

Discontinuous Fluctuation Distribution for Time-Dependent Problems Discontinos Flctation Distribtion for Time-Dependent Problems Matthew Hbbard School of Compting, University of Leeds, Leeds, LS2 9JT, UK meh@comp.leeds.ac.k Introdction For some years now, the flctation

More information

Designing MIPS Processor

Designing MIPS Processor CSE 675.: Introdction to Compter Architectre Designing IPS Processor (lti-cycle) Presentation H Reading Assignment: 5.5,5.6 lti-cycle Design Principles Break p eection of each instrction into steps. The

More information

arxiv: v1 [math.co] 17 Dec 2018

arxiv: v1 [math.co] 17 Dec 2018 On the Extrema Maximum Agreement Subtree Probem arxiv:1812.06951v1 [math.o] 17 Dec 2018 Aexey Markin Department of omputer Science, Iowa State University, USA amarkin@iastate.edu Abstract Given two phyogenetic

More information

Classify by number of ports and examine the possible structures that result. Using only one-port elements, no more than two elements can be assembled.

Classify by number of ports and examine the possible structures that result. Using only one-port elements, no more than two elements can be assembled. Jnction elements in network models. Classify by nmber of ports and examine the possible strctres that reslt. Using only one-port elements, no more than two elements can be assembled. Combining two two-ports

More information

Radar/ESM Tracking of Constant Velocity Target : Comparison of Batch (MLE) and EKF Performance

Radar/ESM Tracking of Constant Velocity Target : Comparison of Batch (MLE) and EKF Performance adar/ racing of Constant Veocity arget : Comparison of Batch (LE) and EKF Performance I. Leibowicz homson-csf Deteis/IISA La cef de Saint-Pierre 1 Bd Jean ouin 7885 Eancourt Cede France Isabee.Leibowicz

More information

Color Seamlessness in Multi-Projector Displays using Constrained Gamut Morphing

Color Seamlessness in Multi-Projector Displays using Constrained Gamut Morphing Coor Seamessness in Muti-Projector Dispays using Constrained Gamut Morphing IEEE Transactions on Visuaization and Computer Graphics, Vo. 15, No. 6, 2009 Behzad Sajadi, Maxim Lazarov, Aditi Majumder, and

More information

Model Predictive Control Lecture VIa: Impulse Response Models

Model Predictive Control Lecture VIa: Impulse Response Models Moel Preictive Control Lectre VIa: Implse Response Moels Niet S. Kaisare Department of Chemical Engineering Inian Institte of Technolog Maras Ingreients of Moel Preictive Control Dnamic Moel Ftre preictions

More information

Remarks on strongly convex stochastic processes

Remarks on strongly convex stochastic processes Aeqat. Math. 86 (01), 91 98 c The Athor(s) 01. This article is pblished with open access at Springerlink.com 0001-9054/1/010091-8 pblished online November 7, 01 DOI 10.1007/s00010-01-016-9 Aeqationes Mathematicae

More information

Università degli Studi di Roma Tre Dipartimento di Informatica e Automazione. Via della Vasca Navale, Roma, Italy

Università degli Studi di Roma Tre Dipartimento di Informatica e Automazione. Via della Vasca Navale, Roma, Italy R O M A TRE DIA Uniersità degi Stdi di Roma Tre Dipartimento di Informatica e Atomazione Via dea Vasca Naae, 00 Roma, Itay Compting a Minimm-Depth Panar Graph Embedding in O(n ) Time Patrizio Angeini,

More information

How the backpropagation algorithm works Srikumar Ramalingam School of Computing University of Utah

How the backpropagation algorithm works Srikumar Ramalingam School of Computing University of Utah How the backpropagation agorithm works Srikumar Ramaingam Schoo of Computing University of Utah Reference Most of the sides are taken from the second chapter of the onine book by Michae Nieson: neuranetworksanddeepearning.com

More information

Data Search Algorithms based on Quantum Walk

Data Search Algorithms based on Quantum Walk Data Search Agorithms based on Quantum Wak Masataka Fujisaki, Hiromi Miyajima, oritaka Shigei Abstract For searching any item in an unsorted database with items, a cassica computer takes O() steps but

More information

Tight Bounds for Distributed Functional Monitoring

Tight Bounds for Distributed Functional Monitoring Tight Bounds for Distributed Functiona Monitoring David P. Woodruff IBM Amaden dpwoodru@us.ibm.com Qin Zhang IBM Amaden qinzhang@cse.ust.hk Abstract We resove severa fundamenta questions in the area of

More information

Unimodality and Log-Concavity of Polynomials

Unimodality and Log-Concavity of Polynomials Uniodaity and Log-Concavity of Poynoias Jenny Avarez University of Caifornia Santa Barbara Leobardo Rosaes University of Caifornia San Diego Agst 10, 2000 Mige Aadis Nyack Coege New York Abstract A poynoia

More information

CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK. Wassim Jouini and Christophe Moy

CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK. Wassim Jouini and Christophe Moy CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK Wassim Joini and Christophe Moy SUPELEC, IETR, SCEE, Avene de la Bolaie, CS 47601, 5576 Cesson Sévigné, France. INSERM U96 - IFR140-

More information

Introduction to Simulation - Lecture 13. Convergence of Multistep Methods. Jacob White. Thanks to Deepak Ramaswamy, Michal Rewienski, and Karen Veroy

Introduction to Simulation - Lecture 13. Convergence of Multistep Methods. Jacob White. Thanks to Deepak Ramaswamy, Michal Rewienski, and Karen Veroy Introduction to Simuation - Lecture 13 Convergence of Mutistep Methods Jacob White Thans to Deepa Ramaswamy, Micha Rewiensi, and Karen Veroy Outine Sma Timestep issues for Mutistep Methods Loca truncation

More information

Advanced topics in Finite Element Method 3D truss structures. Jerzy Podgórski

Advanced topics in Finite Element Method 3D truss structures. Jerzy Podgórski Advanced topics in Finite Element Method 3D trss strctres Jerzy Podgórski Introdction Althogh 3D trss strctres have been arond for a long time, they have been sed very rarely ntil now. They are difficlt

More information

Graph-Modeled Data Clustering: Fixed-Parameter Algorithms for Clique Generation

Graph-Modeled Data Clustering: Fixed-Parameter Algorithms for Clique Generation Graph-Modeled Data Clstering: Fied-Parameter Algorithms for Cliqe Generation Jens Gramm Jiong Go Falk Hüffner Rolf Niedermeier Wilhelm-Schickard-Institt für Informatik, Universität Tübingen, Sand 13, D-72076

More information

On the tree cover number of a graph

On the tree cover number of a graph On the tree cover nmber of a graph Chassidy Bozeman Minerva Catral Brendan Cook Oscar E. González Carolyn Reinhart Abstract Given a graph G, the tree cover nmber of the graph, denoted T (G), is the minimm

More information

Topics: A multiple cycle implementation. Distributed Notes

Topics: A multiple cycle implementation. Distributed Notes COSC 22: Compter Organization Instrctor: Dr. Amir Asif Department of Compter Science York University Handot # lticycle Implementation of a IPS Processor Topics: A mltiple cycle implementation Distribted

More information

Improving the Accuracy of Boolean Tomography by Exploiting Path Congestion Degrees

Improving the Accuracy of Boolean Tomography by Exploiting Path Congestion Degrees Improving the Accuracy of Booean Tomography by Expoiting Path Congestion Degrees Zhiyong Zhang, Gaoei Fei, Fucai Yu, Guangmin Hu Schoo of Communication and Information Engineering, University of Eectronic

More information

Nonlinear parametric optimization using cylindrical algebraic decomposition

Nonlinear parametric optimization using cylindrical algebraic decomposition Proceedings of the 44th IEEE Conference on Decision and Control, and the Eropean Control Conference 2005 Seville, Spain, December 12-15, 2005 TC08.5 Nonlinear parametric optimization sing cylindrical algebraic

More information

Effective Appearance Model and Similarity Measure for Particle Filtering and Visual Tracking

Effective Appearance Model and Similarity Measure for Particle Filtering and Visual Tracking Effective Appearance Mode and Simiarity Measure for Partice Fitering and Visua Tracking Hanzi Wang David Suter and Konrad Schinder Institute for Vision Systems Engineering Department of Eectrica and Computer

More information

Computing Spherical Transform and Convolution on the 2-Sphere

Computing Spherical Transform and Convolution on the 2-Sphere Computing Spherica Transform and Convoution on the 2-Sphere Boon Thye Thomas Yeo ythomas@mit.edu May, 25 Abstract We propose a simpe extension to the Least-Squares method of projecting sampes of an unknown

More information

Determining The Degree of Generalization Using An Incremental Learning Algorithm

Determining The Degree of Generalization Using An Incremental Learning Algorithm Determining The Degree of Generaization Using An Incrementa Learning Agorithm Pabo Zegers Facutad de Ingeniería, Universidad de os Andes San Caros de Apoquindo 22, Las Condes, Santiago, Chie pzegers@uandes.c

More information

Paragraph Topic Classification

Paragraph Topic Classification Paragraph Topic Cassification Eugene Nho Graduate Schoo of Business Stanford University Stanford, CA 94305 enho@stanford.edu Edward Ng Department of Eectrica Engineering Stanford University Stanford, CA

More information

An H 2 type Riemannian metric on the space of planar curves

An H 2 type Riemannian metric on the space of planar curves An H 2 type Riemannian metric on the space of panar curves Jayant hah Mathematics Department, Northeastern University, Boston MA emai: shah@neu.edu Abstract An H 2 type metric on the space of panar curves

More information

08.06 Shooting Method for Ordinary Differential Equations

08.06 Shooting Method for Ordinary Differential Equations 8.6 Shooting Method for Ordinary Differential Eqations After reading this chapter, yo shold be able to 1. learn the shooting method algorithm to solve bondary vale problems, and. apply shooting method

More information

CONCERT: A Concurrent Transient Fault Simulator for Nonlinear Analog Circuits *

CONCERT: A Concurrent Transient Fault Simulator for Nonlinear Analog Circuits * CONCERT: A Concurrent Transient Faut Simuator for Noninear Anaog Circuits * Junwei Hou and Abhijit Chatterjee Schoo of Eectrica and Compute Engineering, Georgia Institute of Technoogy, Atanta, GA {jhou,

More information

Algorithms to solve massively under-defined systems of multivariate quadratic equations

Algorithms to solve massively under-defined systems of multivariate quadratic equations Agorithms to sove massivey under-defined systems of mutivariate quadratic equations Yasufumi Hashimoto Abstract It is we known that the probem to sove a set of randomy chosen mutivariate quadratic equations

More information

LambdaMF: Learning Nonsmooth Ranking Functions in Matrix Factorization Using Lambda

LambdaMF: Learning Nonsmooth Ranking Functions in Matrix Factorization Using Lambda 2015 IEEE International Conference on Data Mining LambdaMF: Learning Nonsmooth Ranking Fnctions in Matrix Factorization Using Lambda Gang-He Lee Department of Compter Science and Information Engineering

More information

A Cryptographic Proof of Regularity Lemmas: Simpler Unified Proofs and Refined Bounds

A Cryptographic Proof of Regularity Lemmas: Simpler Unified Proofs and Refined Bounds A Cryptographic Proof of Reguarity Lemmas: Simper Unified Proofs and Refined Bounds Maciej Skórski IST Austria maciej.skorski@gmai.com Abstract. In this work we present a short and unified proof for the

More information

i=1 y i 1fd i = dg= P N i=1 1fd i = dg.

i=1 y i 1fd i = dg= P N i=1 1fd i = dg. ECOOMETRICS II (ECO 240S) University of Toronto. Department of Economics. Winter 208 Instrctor: Victor Agirregabiria SOLUTIO TO FIAL EXAM Tesday, April 0, 208. From 9:00am-2:00pm (3 hors) ISTRUCTIOS: -

More information

Math 273b: Calculus of Variations

Math 273b: Calculus of Variations Math 273b: Calcls of Variations Yacob Kreh Homework #3 [1] Consier the 1D length fnctional minimization problem min F 1 1 L, or min 1 + 2, for twice ifferentiable fnctions : [, 1] R with bonary conitions,

More information