Outline. Approximation: Theory and Algorithms. Reference Sets [GJK + 02] Illustration: Triangle Inequality. Pruning with Reference Sets
|
|
- Katrina Paul
- 5 years ago
- Views:
Transcription
1 Otine Approximation: Theory and Agorithms Prning with Nikoas Agsten Free University of Bozen-Bozano Facty of Compter Science DIS Unit 10 May 15, Upper and Lower Bond Exampe: 2 Concsion Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 [GJK + 02] Istration: Triange Ineqaity c c Reference sets take advantage of the triange ineqaity for metrics. An extended version of the triange ineqaity is: δ(a, b) δ(b, c) δ(a, c) δ(a, b) + δ(b, c), where δ() is a metric distance fnction compted between eements a, b, and c. a b a b δ(a, c) < δ(a, b) + δ(b, c) δ(a, b) δ(b, c) < δ(a, c) a b c a c b δ(a, c) = δ(a, b) + δ(b, c) δ(a, b) δ(b, c) = δ(a, c) Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24
2 Notation Reference Vector S 1 and S 2 are sets of trees (nordered forests) K S 1 S 2 is caed the reference set S 1 and S 2 are trees k K, 1 K, is a tree of the reference set v i is a vector of size K that stores the distance from S 1 to each tree k K the -th eement of v i stores the edit distance between and k : v i = δ t (, k ) v j is the respective vector for S 2 Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Metric Space Upper and Lower Bond Upper and Lower Bond Metric space of the reference set: the eements of the reference set define the basis of a metric space the vector v k represents tree T k as a point in this space v k is the coordinate of the point on the -th axis Exampe: Two trees and in the metric space defined by the reference set K = {k 1, k 2 }. v k2 v j2 v i2 v j1 v i1 v k1 From the triange ineqaity it foows that for a 1 K Upper bond: Lower bond: v i v δ t (, ) v i + v δ t (, ) δ t (, ) min v i + v = t (, ) max v i v = t (, ) Approximate join: match a trees with δ t (T 1, T 2 ) τ Upper bond: If t (, ) τ, then and match. Lower bond: If t (, ) > τ, then and do not match. Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24
3 Reference Set Tradeoff Upper and Lower Bond We Separated Csters Upper and Lower Bond Sma reference set: efficient reference vector comptation we have to compte S distances for each additiona tree in the reference set to constrct the vectors for sma reference sets the constrction of the vectors is cheaper Large reference set: effective fiters arge reference sets make t and t more effective ths, once the reference vectors are compted, ess distance comptations are needed Where is the optimm? We cster the set S = S 1 S 2. The csters are we separated for threshod τ if trees within a cster have sma distance (within τ 2 ) trees from different cster have arge distance (more than 3τ 2 ) Exampe: Two we separated csters C 1 and C 2. > 3τ 2 C 1 C 2 Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Upper and Lower Bond Trees within the Same Cster Upper Bond Appies Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Upper and Lower Bond Trees in Different Csters Lower Bond Appies Upper bond: δ t (, ) v i + v = δ t (, k ) + δ t (k, ) Assmption: S 1 and S 2 are in the same cster C. The csters are we separated. The cster C contains a reference tree k K. In this case v i and v δ t(, ) τ. Rest: If,, and k are in the same cster from v i and v we concde that T 1 and T 2 match ths we need not to compte δ t (, ) τ 2 Lower bond: δ t (, ) v i v = δ t (, k ) δ t (k, ) Assmption: S 1 is in cster C 1, S 2 is in cster C 2. The csters are we separated. The cster C 1 contains a reference tree k K. In this case v i and v > 3τ 2 δ t(, ) > τ. Rest: If and k are in the same cster, bt is in a different cster from v i and v we concde that T 1 and T 2 do not match ths we need not to compte δ t (, ) v i k δ t (, ) v v i > 3τ 2 C 1 C 2 k δ t (, ) v Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24
4 Upper and Lower Bond Bonds for We Separated Csters Upper and Lower Bond Optimm We Separated Csters Scenario: Cost: Assme that S = S 1 = S 2 is we separated into csters. Consider a cster of size n that contains a tree k K of the reference set. We need to compte S 1 distances to the tree k K Benefit: From the pper bond we concde that a trees within a cster match ( t τ) we save n (n 1)/2 edit distance comptations From the ower bond we concde that trees of different csters do not match ( t > τ) we save n ( S n ) edit distance comptations Optimm: csters are we separated the reference set contains one tree per cster Gha et a. [GJK + 02] find csters by samping and estimate a reference set size. Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Exampe Exampe: S 1 = {T 1, T 2, T 3 }, S 2 = {T 4, T 5, T 6 } Reference set K = {T 1 }, 1 K = 1 Distances: T 1 T 2 T 3 T 4 T 5 T 6 T T T T T T 6 0 Reference Vectors: v 1,1 = (0), v 2,1 = (4), v 3,1 = (1), v 4,1 = (1), v 5,1 = (4), v 6,1 = (1) The csters C 1 = {T 1, T 3, T 4, T 6 } and C 2 = {T 2, T 5 } are we separated. We combine the previos approaches: ower bond with traversa strings pper bond with constrained edit distance reference sets Instead of one vector v i we compte two vectors for each tree : ower bond: vi contains the traversa string distance pper bond: vi contains the constrained edit distance Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24
5 Metric Space : Triange Ineqaity Metric space of the reference set: the eements of the reference set define the basis of a metric space each tree T k is represented by a rectange in this metric space vk and v k are two opposite corners of this rectange Exampe: Two trees and in the metric space defined by the reference set K = {k 1, k 2 }. / k2 v j2 v i2 The triange eqations changes as foows: (a) For a 1 K δ t (, ) vi + v (b) For a 1 K v v i if v > vi δ t (, ) vi v if vi > v 0 otherwise j2 i2 j1 v j1 i1 v i1 / k1 Note: If v > vi or vi > v then [vi, v i ] and [v, v ] are disjoint intervas. In a other cases we can not give a ower bond (other than 0). Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 : Upper and Lower Bonds Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Istration: Cases for the Lower Bond Upper bond: Lower bond: t (, ) = t (, ) = max min v i + v v v i if v > vi vi v if vi > v 0 otherwise Case v > vi : ower bond is v v i i v i ower bond v v k Case vi > v : ower bond is v i v v ower bond i vi v k A other cases ([vi, v i ] and [v, v ] overap): no ower bond v i v vi v k Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24
6 Smmary Concsion What s Next? Concsion : Upper and Lower Bond Combination of reference sets with other bonds Binary Branch Distance ower bond proof compexity Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24 Sdipto Gha, H. V. Jagadish, Nick Kodas, Divesh Srivastava, and Ting Y. Approximate XML joins. In Proceedings of the ACM SIGMOD Internationa Conference on Management of Data, pages , Madison, Wisconsin, ACM Press. Nikoas Agsten (DIS) Approximation: Theory and Agorithms Unit 10 May 15, / 24
Small-bias sets from extended norm-trace codes
Sma-bias sets from extended norm-trace codes Gretchen L Matthews Jstin D Peachey March 5, 0 Abstract As demonstrated by Naor and Naor [] among others [, ], the constrction of sma-bias probabiity spaces,
More informationMeasurement vs. Analysis
Embedded Systems 23-1 - Measrement vs. Anaysis REVIEW Probabiity Best Case Exection Time Unsafe: Exection Time Measrement Worst Case Exection Time Upper bond Exection Time typicay hge variations in ET
More informationHaar Decomposition and Reconstruction Algorithms
Jim Lambers MAT 773 Fa Semester 018-19 Lecture 15 and 16 Notes These notes correspond to Sections 4.3 and 4.4 in the text. Haar Decomposition and Reconstruction Agorithms Decomposition Suppose we approximate
More informationA Note on Irreducible Polynomials and Identity Testing
A Note on Irrecible Polynomials an Ientity Testing Chanan Saha Department of Compter Science an Engineering Inian Institte of Technology Kanpr Abstract We show that, given a finite fiel F q an an integer
More informationThis article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and
This artice appeared in a orna pbished by Esevier. The attached copy is frnished to the athor for interna non-commercia research and edcation se, incding for instrction at the athors instittion and sharing
More informationUpper Bounds on the Spanning Ratio of Constrained Theta-Graphs
Upper Bonds on the Spanning Ratio of Constrained Theta-Graphs Prosenjit Bose and André van Renssen School of Compter Science, Carleton University, Ottaa, Canada. jit@scs.carleton.ca, andre@cg.scs.carleton.ca
More informationLetting loose a SPIDER on a network of POMDPs: Generating quality guaranteed policies
Letting oose a SPIDER on a network of POMDPs: Generating qaity garanteed poicies Pradeep Varakantham, Jansz Marecki, Yichi Yab, Miind Tambe, Makoto Yokoo University of Sothern Caifornia, Los Angees, CA
More informationBDD-Based Analysis of Gapped q-gram Filters
BDD-Based Anaysis of Gapped q-gram Fiters Marc Fontaine, Stefan Burkhardt 2 and Juha Kärkkäinen 2 Max-Panck-Institut für Informatik Stuhsatzenhausweg 85, 6623 Saarbrücken, Germany e-mai: stburk@mpi-sb.mpg.de
More informationSymmetric Range Assignment with Disjoint MST Constraints
Symmetric Range Assignment with Disjoint MST Constraints Eric Schmtz Drexel University Philadelphia, Pa. 19104,USA Eric.Jonathan.Schmtz@drexel.ed ABSTRACT If V is a set of n points in the nit sqare [0,
More informationDepartment of Industrial Engineering Statistical Quality Control presented by Dr. Eng. Abed Schokry
Department of Indstrial Engineering Statistical Qality Control presented by Dr. Eng. Abed Schokry Department of Indstrial Engineering Statistical Qality Control C and U Chart presented by Dr. Eng. Abed
More informationFRÉCHET KERNELS AND THE ADJOINT METHOD
PART II FRÉCHET KERNES AND THE ADJOINT METHOD 1. Setp of the tomographic problem: Why gradients? 2. The adjoint method 3. Practical 4. Special topics (sorce imaging and time reversal) Setp of the tomographic
More informationApproximate Solution of Convection- Diffusion Equation by the Homotopy Perturbation Method
Gen. Math. Notes, Vol. 1, No., December 1, pp. 18-114 ISSN 19-7184; Copyright ICSRS Pblication, 1 www.i-csrs.org Available free online at http://www.geman.in Approximate Soltion of Convection- Diffsion
More informationPairwise RNA Edit Distance
Pairwise RNA Edit Distance In the foowing: Sequences S 1 and S 2 associated structures P 1 and P 2 scoring of aignment: different edit operations arc atering arc removing 1) ACGUUGACUGACAACAC..(((...)))...
More informationESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK
ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK Aexander Arkhipov, Michae Schne German Aerospace Center DLR) Institute of Communications and Navigation Oberpfaffenhofen, 8224 Wessing, Germany
More informationSolutions to two problems in optimizing a bar
ectre 19b Sotions to two probems in optimizing a bar ME 56 at the Indian Institte of Science, Bengar Variationa Methods and Strctra Optimization G. K. Ananthasresh Professor, Mechanica Engineering, Indian
More informationVariational Optical Flow Estimation. ICCV 2009 Tutorial, Kyoto, Japan A 1 2 A 1 2. ICCV 2009 Kyoto University, September 27th.
ICCV 2009 Kyoto University, September 27th Introdction () What is the Optica Fow Probem? Variationa Optica Fow Estimation Thomas Brox Mathematica Image naysis Grop Saarand University Saarbr cken, Germany
More informationAscertainment of The Certain Fundamental Units in a Specific Type of Real Quadratic Fields
J. Ana. Nm. Theor. 5, No., 09-3 (07) 09 Jorna of Anaysis & Nmber Theory An Internationa Jorna http://x.oi.org/0.8576/jant/05004 Ascertainment of The Certain Fnamenta Units in a Specific Type of Rea Qaratic
More informationOutline. Approximation: Theory and Algorithms. Application Scenario. 3 The q-gram Distance. Nikolaus Augsten. Definition and Properties
Outline Approximation: Theory and Algorithms Nikolaus Augsten Free University of Bozen-Bolzano Faculty of Computer Science DIS Unit 3 March 13, 2009 2 3 Nikolaus Augsten (DIS) Approximation: Theory and
More informationSydU STAT3014 (2015) Second semester Dr. J. Chan 18
STAT3014/3914 Appied Stat.-Samping C-Stratified rand. sampe Stratified Random Samping.1 Introduction Description The popuation of size N is divided into mutuay excusive and exhaustive subpopuations caed
More informationA High Throughput Pilot Allocation for M2M Communication in Crowded Massive MIMO Systems
1 A High Throghpt Piot Aocation for M2M Commnication in Crowded Massive MIMO Systems Himei Han, Xdong Go, Ying Li arxiv:1611.00491v1 [cs.it] 2 Nov 2016 Abstract A new scheme to resove the intra-ce piot
More informationDiscussion of The Forward Search: Theory and Data Analysis by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli
1 Introdction Discssion of The Forward Search: Theory and Data Analysis by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli Søren Johansen Department of Economics, University of Copenhagen and CREATES,
More informationChange of Variables. (f T) JT. f = U
Change of Variables 4-5-8 The change of ariables formla for mltiple integrals is like -sbstittion for single-ariable integrals. I ll gie the general change of ariables formla first, and consider specific
More informationDecoder Error Probability of MRD Codes
Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehighed Zhiyan Yan Department of Electrical
More informationHRL-Local Infinite Triangular Array Languages
1 Engineering, echnoogy echniques Vo.59: e16161076, January-December 2016 http://dx.doi.org/10.1590/1678-4324-2016161076 ISSN 1678-4324 Onine Edition BRAZILIAN ARCHIVES OF BIOLOGY AND ECHNOLOGY A N I N
More information4.2 First-Order Logic
64 First-Order Logic and Type Theory The problem can be seen in the two qestionable rles In the existential introdction, the term a has not yet been introdced into the derivation and its se can therefore
More informationOptimization via the Hamilton-Jacobi-Bellman Method: Theory and Applications
Optimization via the Hamilton-Jacobi-Bellman Method: Theory and Applications Navin Khaneja lectre notes taken by Christiane Koch Jne 24, 29 1 Variation yields a classical Hamiltonian system Sppose that
More informationCDS 110b: Lecture 1-2 Introduction to Optimal Control
CDS 110b: Lectre 1-2 Introdction to Optimal Control Richard M. Mrray 4 Janary 2006 Goals: Introdce the problem of optimal control as method of trajectory generation State the maimm principle and give eamples
More informationA study on wave equation and solutions of shallow water on inclined channel
Advances in River Sediment Researc Fkoka et a. (eds Tayor & Francis Grop, London, ISBN 978--8-6-9 A stdy on wave eqation and sotions of saow water on incined canne M. Arai Facty of Science and Tecnoogy,
More informationTwo Birds With One Stone: An Efficient Hierarchical Framework for Top-k and Threshold-based String Similarity Search
Two Birds With One Stone: An Efficient Hierarchica Framework for Top-k and Threshod-based String Simiarity Search Jin Wang Guoiang Li Dong Deng Yong Zhang Jianhua Feng Department of Computer Science and
More informationApproximate String Joins in a Database (Almost) for Free
Approximate String Joins in a Database (Almost) for Free Erratum Luis Gravano Panagiotis G. Ipeirotis H. V. Jagadish Columbia University Columbia University University of Michigan gravano@cs.columbia.edu
More informationHYDROGEN ATOM SELECTION RULES TRANSITION RATES
DOING PHYSICS WITH MATLAB QUANTUM PHYSICS Ian Cooper Schoo of Physics, University of Sydney ian.cooper@sydney.edu.au HYDROGEN ATOM SELECTION RULES TRANSITION RATES DOWNLOAD DIRECTORY FOR MATLAB SCRIPTS
More informationDecoder Error Probability of MRD Codes
Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehigh.ed Zhiyan Yan Department of Electrical
More informationOn the Goal Value of a Boolean Function
On the Goa Vaue of a Booean Function Eric Bach Dept. of CS University of Wisconsin 1210 W. Dayton St. Madison, WI 53706 Lisa Heerstein Dept of CSE NYU Schoo of Engineering 2 Metrotech Center, 10th Foor
More informationA Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c)
A Simpe Efficient Agorithm of 3-D Singe-Source Locaization with Uniform Cross Array Bing Xue a * Guangyou Fang b Yicai Ji c Key Laboratory of Eectromagnetic Radiation Sensing Technoogy, Institute of Eectronics,
More informationSolving a System of Equations
Solving a System of Eqations Objectives Understand how to solve a system of eqations with: - Gass Elimination Method - LU Decomposition Method - Gass-Seidel Method - Jacobi Method A system of linear algebraic
More informationFormal Methods for Deriving Element Equations
Formal Methods for Deriving Element Eqations And the importance of Shape Fnctions Formal Methods In previos lectres we obtained a bar element s stiffness eqations sing the Direct Method to obtain eact
More informationDiscussion Papers Department of Economics University of Copenhagen
Discssion Papers Department of Economics University of Copenhagen No. 10-06 Discssion of The Forward Search: Theory and Data Analysis, by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli Søren Johansen,
More informationThe Scalar Conservation Law
The Scalar Conservation Law t + f() = 0 = conserved qantity, f() =fl d dt Z b a (t, ) d = Z b a t (t, ) d = Z b a f (t, ) d = f (t, a) f (t, b) = [inflow at a] [otflow at b] f((a)) f((b)) a b Alberto Bressan
More informationA. Distribution of the test statistic
A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch
More informationAdaptive Realtime Control of a Nonlinear Throttle Unit
ISSN 8 536 ISRN LUTFD/TFRT--5638--SE Adaptive Reatime Contro of a Noninear Throtte Unit Johan Gagner Rickard Bondesson Department of Atomatic Contro Lnd Institte of Technoogy Febrary Department of Atomatic
More informationCuckoo hashing: Further analysis
Information Processing Letters 86 (2003) 215 219 www.elsevier.com/locate/ipl Cckoo hashing: Frther analysis Lc Devroye,PatMorin School of Compter Science, McGill University, 3480 University Street, Montreal,
More informationUniversal Scheme for Optimal Search and Stop
Universal Scheme for Optimal Search and Stop Sirin Nitinawarat Qalcomm Technologies, Inc. 5775 Morehose Drive San Diego, CA 92121, USA Email: sirin.nitinawarat@gmail.com Vengopal V. Veeravalli Coordinated
More informationRestricted Three-Body Problem in Different Coordinate Systems
Applied Mathematics 3 949-953 http://dx.doi.org/.436/am..394 Pblished Online September (http://www.scirp.org/jornal/am) Restricted Three-Body Problem in Different Coordinate Systems II-In Sidereal Spherical
More informationA Single Species in One Spatial Dimension
Lectre 6 A Single Species in One Spatial Dimension Reading: Material similar to that in this section of the corse appears in Sections 1. and 13.5 of James D. Mrray (), Mathematical Biology I: An introction,
More informationA generalized Alon-Boppana bound and weak Ramanujan graphs
A generalized Alon-Boppana bond and weak Ramanjan graphs Fan Chng Abstract A basic eigenvale bond de to Alon and Boppana holds only for reglar graphs. In this paper we give a generalized Alon-Boppana bond
More informationhttps://doi.org/ /epjconf/
HOW TO APPLY THE OPTIMAL ESTIMATION METHOD TO YOUR LIDAR MEASUREMENTS FOR IMPROVED RETRIEVALS OF TEMPERATURE AND COMPOSITION R. J. Sica 1,2,*, A. Haefee 2,1, A. Jaai 1, S. Gamage 1 and G. Farhani 1 1 Department
More informationOn the circuit complexity of the standard and the Karatsuba methods of multiplying integers
On the circit complexity of the standard and the Karatsba methods of mltiplying integers arxiv:1602.02362v1 [cs.ds] 7 Feb 2016 Igor S. Sergeev The goal of the present paper is to obtain accrate estimates
More informationTarget Location Estimation in Wireless Sensor Networks Using Binary Data
Target Location stimation in Wireess Sensor Networks Using Binary Data Ruixin Niu and Pramod K. Varshney Department of ectrica ngineering and Computer Science Link Ha Syracuse University Syracuse, NY 344
More informationInformation Source Detection in the SIR Model: A Sample Path Based Approach
Information Sorce Detection in the SIR Model: A Sample Path Based Approach Kai Zh and Lei Ying School of Electrical, Compter and Energy Engineering Arizona State University Tempe, AZ, United States, 85287
More informationInductive Bias: How to generalize on novel data. CS Inductive Bias 1
Inductive Bias: How to generaize on nove data CS 478 - Inductive Bias 1 Overfitting Noise vs. Exceptions CS 478 - Inductive Bias 2 Non-Linear Tasks Linear Regression wi not generaize we to the task beow
More information8 APPENDIX. E[m M] = (n S )(1 exp( exp(s min + c M))) (19) E[m M] n exp(s min + c M) (20) 8.1 EMPIRICAL EVALUATION OF SAMPLING
8 APPENDIX 8.1 EMPIRICAL EVALUATION OF SAMPLING We wish to evauate the empirica accuracy of our samping technique on concrete exampes. We do this in two ways. First, we can sort the eements by probabiity
More informationA generalized Alon-Boppana bound and weak Ramanujan graphs
A generalized Alon-Boppana bond and weak Ramanjan graphs Fan Chng Department of Mathematics University of California, San Diego La Jolla, CA, U.S.A. fan@csd.ed Sbmitted: Feb 0, 206; Accepted: Jne 22, 206;
More informationA Statistical Framework for Real-time Event Detection in Power Systems
1 A Statistica Framework for Rea-time Event Detection in Power Systems Noan Uhrich, Tim Christman, Phiip Swisher, and Xichen Jiang Abstract A quickest change detection (QCD) agorithm is appied to the probem
More informationMulti-Voltage Floorplan Design with Optimal Voltage Assignment
Mlti-Voltage Floorplan Design with Optimal Voltage Assignment ABSTRACT Qian Zaichen Department of CSE The Chinese University of Hong Kong Shatin,N.T., Hong Kong zcqian@cse.chk.ed.hk In this paper, we stdy
More informationON THE PERFORMANCE OF LOW
Monografías Matemáticas García de Galdeano, 77 86 (6) ON THE PERFORMANCE OF LOW STORAGE ADDITIVE RUNGE-KUTTA METHODS Inmaclada Higeras and Teo Roldán Abstract. Gien a differential system that inoles terms
More informationConcepts Introduced. Digital Electronics. Logic Blocks. Truth Tables
Concepts Introdced Digital Electronics trth tables, logic eqations, and gates combinational logic seqential logic Digital electronics operate at either high or low voltage. Compters se a binary representation
More informationAlberto Maydeu Olivares Instituto de Empresa Marketing Dept. C/Maria de Molina Madrid Spain
CORRECTIONS TO CLASSICAL PROCEDURES FOR ESTIMATING THURSTONE S CASE V MODEL FOR RANKING DATA Aberto Maydeu Oivares Instituto de Empresa Marketing Dept. C/Maria de Moina -5 28006 Madrid Spain Aberto.Maydeu@ie.edu
More informationControl Systems Design
ELEC4410 Control Systems Design Lectre 16: Controllability and Observability Canonical Decompositions Jlio H. Braslavsky jlio@ee.newcastle.ed.a School of Electrical Engineering and Compter Science Lectre
More informationEfficient Similarity Search across Top-k Lists under the Kendall s Tau Distance
Efficient Simiarity Search across Top-k Lists under the Kenda s Tau Distance Koninika Pa TU Kaisersautern Kaisersautern, Germany pa@cs.uni-k.de Sebastian Miche TU Kaisersautern Kaisersautern, Germany smiche@cs.uni-k.de
More informationApproach to Identifying Raindrop Vibration Signal Detected by Optical Fiber
Sensors & Transducers, o. 6, Issue, December 3, pp. 85-9 Sensors & Transducers 3 by IFSA http://www.sensorsporta.com Approach to Identifying Raindrop ibration Signa Detected by Optica Fiber ongquan QU,
More informationMoreau-Yosida Regularization for Grouped Tree Structure Learning
Moreau-Yosida Reguarization for Grouped Tree Structure Learning Jun Liu Computer Science and Engineering Arizona State University J.Liu@asu.edu Jieping Ye Computer Science and Engineering Arizona State
More informationTENSOR-BASED FRAMEWORK FOR THE PREDICTION OF FREQUENCY-SELECTIVE TIME-VARIANT MIMO CHANNELS
TENSOR-BASED FRAMEWORK FOR THE PREDICTION OF FREQUENCY-SELECTIVE TIME-VARIANT MIMO CHANNELS Marko Miojević, Giovanni De Gado, and Martin Haardt Imenau University of Technoogy, Communications Research Laboratory,
More informationLecture Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2
BIJU PATNAIK UNIVERSITY OF TECHNOLOGY, ODISHA Lectre Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2 Prepared by, Dr. Sbhend Kmar Rath, BPUT, Odisha. Tring Machine- Miscellany UNIT 2 TURING MACHINE
More informationSimplified analysis of EXAFS data and determination of bond lengths
Indian Journa of Pure & Appied Physics Vo. 49, January 0, pp. 5-9 Simpified anaysis of EXAFS data and determination of bond engths A Mishra, N Parsai & B D Shrivastava * Schoo of Physics, Devi Ahiya University,
More informationFast Blind Recognition of Channel Codes
Fast Bind Recognition of Channe Codes Reza Moosavi and Erik G. Larsson Linköping University Post Print N.B.: When citing this work, cite the origina artice. 213 IEEE. Persona use of this materia is permitted.
More informationWeak ε-nets for Axis-Parallel Boxes in d-space
Weak ε-nets for Axis-Parallel Boxes in d-space Esther Ezra May 25, 2009 Abstract In this note we show the existence of weak ε-nets of size O /ε loglog /ε for point sets and axis-parallel boxes in R d.
More informationHigh Spectral Resolution Infrared Radiance Modeling Using Optimal Spectral Sampling (OSS) Method
High Spectra Resoution Infrared Radiance Modeing Using Optima Spectra Samping (OSS) Method J.-L. Moncet and G. Uymin Background Optima Spectra Samping (OSS) method is a fast and accurate monochromatic
More informationDiscontinuous Fluctuation Distribution for Time-Dependent Problems
Discontinos Flctation Distribtion for Time-Dependent Problems Matthew Hbbard School of Compting, University of Leeds, Leeds, LS2 9JT, UK meh@comp.leeds.ac.k Introdction For some years now, the flctation
More informationDesigning MIPS Processor
CSE 675.: Introdction to Compter Architectre Designing IPS Processor (lti-cycle) Presentation H Reading Assignment: 5.5,5.6 lti-cycle Design Principles Break p eection of each instrction into steps. The
More informationarxiv: v1 [math.co] 17 Dec 2018
On the Extrema Maximum Agreement Subtree Probem arxiv:1812.06951v1 [math.o] 17 Dec 2018 Aexey Markin Department of omputer Science, Iowa State University, USA amarkin@iastate.edu Abstract Given two phyogenetic
More informationClassify by number of ports and examine the possible structures that result. Using only one-port elements, no more than two elements can be assembled.
Jnction elements in network models. Classify by nmber of ports and examine the possible strctres that reslt. Using only one-port elements, no more than two elements can be assembled. Combining two two-ports
More informationRadar/ESM Tracking of Constant Velocity Target : Comparison of Batch (MLE) and EKF Performance
adar/ racing of Constant Veocity arget : Comparison of Batch (LE) and EKF Performance I. Leibowicz homson-csf Deteis/IISA La cef de Saint-Pierre 1 Bd Jean ouin 7885 Eancourt Cede France Isabee.Leibowicz
More informationColor Seamlessness in Multi-Projector Displays using Constrained Gamut Morphing
Coor Seamessness in Muti-Projector Dispays using Constrained Gamut Morphing IEEE Transactions on Visuaization and Computer Graphics, Vo. 15, No. 6, 2009 Behzad Sajadi, Maxim Lazarov, Aditi Majumder, and
More informationModel Predictive Control Lecture VIa: Impulse Response Models
Moel Preictive Control Lectre VIa: Implse Response Moels Niet S. Kaisare Department of Chemical Engineering Inian Institte of Technolog Maras Ingreients of Moel Preictive Control Dnamic Moel Ftre preictions
More informationRemarks on strongly convex stochastic processes
Aeqat. Math. 86 (01), 91 98 c The Athor(s) 01. This article is pblished with open access at Springerlink.com 0001-9054/1/010091-8 pblished online November 7, 01 DOI 10.1007/s00010-01-016-9 Aeqationes Mathematicae
More informationUniversità degli Studi di Roma Tre Dipartimento di Informatica e Automazione. Via della Vasca Navale, Roma, Italy
R O M A TRE DIA Uniersità degi Stdi di Roma Tre Dipartimento di Informatica e Atomazione Via dea Vasca Naae, 00 Roma, Itay Compting a Minimm-Depth Panar Graph Embedding in O(n ) Time Patrizio Angeini,
More informationHow the backpropagation algorithm works Srikumar Ramalingam School of Computing University of Utah
How the backpropagation agorithm works Srikumar Ramaingam Schoo of Computing University of Utah Reference Most of the sides are taken from the second chapter of the onine book by Michae Nieson: neuranetworksanddeepearning.com
More informationData Search Algorithms based on Quantum Walk
Data Search Agorithms based on Quantum Wak Masataka Fujisaki, Hiromi Miyajima, oritaka Shigei Abstract For searching any item in an unsorted database with items, a cassica computer takes O() steps but
More informationTight Bounds for Distributed Functional Monitoring
Tight Bounds for Distributed Functiona Monitoring David P. Woodruff IBM Amaden dpwoodru@us.ibm.com Qin Zhang IBM Amaden qinzhang@cse.ust.hk Abstract We resove severa fundamenta questions in the area of
More informationUnimodality and Log-Concavity of Polynomials
Uniodaity and Log-Concavity of Poynoias Jenny Avarez University of Caifornia Santa Barbara Leobardo Rosaes University of Caifornia San Diego Agst 10, 2000 Mige Aadis Nyack Coege New York Abstract A poynoia
More informationCHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK. Wassim Jouini and Christophe Moy
CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK Wassim Joini and Christophe Moy SUPELEC, IETR, SCEE, Avene de la Bolaie, CS 47601, 5576 Cesson Sévigné, France. INSERM U96 - IFR140-
More informationIntroduction to Simulation - Lecture 13. Convergence of Multistep Methods. Jacob White. Thanks to Deepak Ramaswamy, Michal Rewienski, and Karen Veroy
Introduction to Simuation - Lecture 13 Convergence of Mutistep Methods Jacob White Thans to Deepa Ramaswamy, Micha Rewiensi, and Karen Veroy Outine Sma Timestep issues for Mutistep Methods Loca truncation
More informationAdvanced topics in Finite Element Method 3D truss structures. Jerzy Podgórski
Advanced topics in Finite Element Method 3D trss strctres Jerzy Podgórski Introdction Althogh 3D trss strctres have been arond for a long time, they have been sed very rarely ntil now. They are difficlt
More informationGraph-Modeled Data Clustering: Fixed-Parameter Algorithms for Clique Generation
Graph-Modeled Data Clstering: Fied-Parameter Algorithms for Cliqe Generation Jens Gramm Jiong Go Falk Hüffner Rolf Niedermeier Wilhelm-Schickard-Institt für Informatik, Universität Tübingen, Sand 13, D-72076
More informationOn the tree cover number of a graph
On the tree cover nmber of a graph Chassidy Bozeman Minerva Catral Brendan Cook Oscar E. González Carolyn Reinhart Abstract Given a graph G, the tree cover nmber of the graph, denoted T (G), is the minimm
More informationTopics: A multiple cycle implementation. Distributed Notes
COSC 22: Compter Organization Instrctor: Dr. Amir Asif Department of Compter Science York University Handot # lticycle Implementation of a IPS Processor Topics: A mltiple cycle implementation Distribted
More informationImproving the Accuracy of Boolean Tomography by Exploiting Path Congestion Degrees
Improving the Accuracy of Booean Tomography by Expoiting Path Congestion Degrees Zhiyong Zhang, Gaoei Fei, Fucai Yu, Guangmin Hu Schoo of Communication and Information Engineering, University of Eectronic
More informationNonlinear parametric optimization using cylindrical algebraic decomposition
Proceedings of the 44th IEEE Conference on Decision and Control, and the Eropean Control Conference 2005 Seville, Spain, December 12-15, 2005 TC08.5 Nonlinear parametric optimization sing cylindrical algebraic
More informationEffective Appearance Model and Similarity Measure for Particle Filtering and Visual Tracking
Effective Appearance Mode and Simiarity Measure for Partice Fitering and Visua Tracking Hanzi Wang David Suter and Konrad Schinder Institute for Vision Systems Engineering Department of Eectrica and Computer
More informationComputing Spherical Transform and Convolution on the 2-Sphere
Computing Spherica Transform and Convoution on the 2-Sphere Boon Thye Thomas Yeo ythomas@mit.edu May, 25 Abstract We propose a simpe extension to the Least-Squares method of projecting sampes of an unknown
More informationDetermining The Degree of Generalization Using An Incremental Learning Algorithm
Determining The Degree of Generaization Using An Incrementa Learning Agorithm Pabo Zegers Facutad de Ingeniería, Universidad de os Andes San Caros de Apoquindo 22, Las Condes, Santiago, Chie pzegers@uandes.c
More informationParagraph Topic Classification
Paragraph Topic Cassification Eugene Nho Graduate Schoo of Business Stanford University Stanford, CA 94305 enho@stanford.edu Edward Ng Department of Eectrica Engineering Stanford University Stanford, CA
More informationAn H 2 type Riemannian metric on the space of planar curves
An H 2 type Riemannian metric on the space of panar curves Jayant hah Mathematics Department, Northeastern University, Boston MA emai: shah@neu.edu Abstract An H 2 type metric on the space of panar curves
More information08.06 Shooting Method for Ordinary Differential Equations
8.6 Shooting Method for Ordinary Differential Eqations After reading this chapter, yo shold be able to 1. learn the shooting method algorithm to solve bondary vale problems, and. apply shooting method
More informationCONCERT: A Concurrent Transient Fault Simulator for Nonlinear Analog Circuits *
CONCERT: A Concurrent Transient Faut Simuator for Noninear Anaog Circuits * Junwei Hou and Abhijit Chatterjee Schoo of Eectrica and Compute Engineering, Georgia Institute of Technoogy, Atanta, GA {jhou,
More informationAlgorithms to solve massively under-defined systems of multivariate quadratic equations
Agorithms to sove massivey under-defined systems of mutivariate quadratic equations Yasufumi Hashimoto Abstract It is we known that the probem to sove a set of randomy chosen mutivariate quadratic equations
More informationLambdaMF: Learning Nonsmooth Ranking Functions in Matrix Factorization Using Lambda
2015 IEEE International Conference on Data Mining LambdaMF: Learning Nonsmooth Ranking Fnctions in Matrix Factorization Using Lambda Gang-He Lee Department of Compter Science and Information Engineering
More informationA Cryptographic Proof of Regularity Lemmas: Simpler Unified Proofs and Refined Bounds
A Cryptographic Proof of Reguarity Lemmas: Simper Unified Proofs and Refined Bounds Maciej Skórski IST Austria maciej.skorski@gmai.com Abstract. In this work we present a short and unified proof for the
More informationi=1 y i 1fd i = dg= P N i=1 1fd i = dg.
ECOOMETRICS II (ECO 240S) University of Toronto. Department of Economics. Winter 208 Instrctor: Victor Agirregabiria SOLUTIO TO FIAL EXAM Tesday, April 0, 208. From 9:00am-2:00pm (3 hors) ISTRUCTIOS: -
More informationMath 273b: Calculus of Variations
Math 273b: Calcls of Variations Yacob Kreh Homework #3 [1] Consier the 1D length fnctional minimization problem min F 1 1 L, or min 1 + 2, for twice ifferentiable fnctions : [, 1] R with bonary conitions,
More information