Sparse Suffix Tree Construction in Small Space
|
|
- Posy Ramsey
- 7 years ago
- Views:
Transcription
1 Spare Suffix Tree Contruction in Small Space Joint work with Philip Bille, Inge Li Gørtz, Hjalte Wedel Vildhøj (Technical Univerity of Denmark) Tvi Kopelowitz, (Weizmann Intitute of Science) Johanne Ficher (Karlruhe Intitute of Technology). to appear in ICALP 2013
2 The pare uffix tree (SST) T b a n a n a Suffix Tree a banana na na na na
3 The pare uffix tree (SST) T b a n a n a Suffix a banana na na na na
4 The pare uffix tree (SST) T b a n a n a a banana na na na na Can be built in O(n) time log 2 and O(n) extra pace
5 The pare uffix tree (SST) T b a n a n a a banana na na na na Can be built in O(n) time log 2 and O(n) extra pace What if we only care about a few of the uffixe?
6 The pare uffix tree (SST) n T b a n a n a a n a n a a banana na b n a a na na na Can be built in O(n) time log 2 and O(n) extra pace What if we only care about a few of the uffixe?
7 The pare uffix tree (SST) n T b a n a n a a n a n a a banana na b n a a na na na Can be built in O(n) time log 2 and O(n) extra pace What if we only care about a few of the uffixe?
8 The pare uffix tree (SST) n T b a n a n a a n a n a a banana na b n a a na na na Can be built in O(n) time log 2 and O(n) extra pace What if we only care about a few of the uffixe?
9 The pare uffix tree (SST) n T b a n a n a a n a n a a banana na b n a a na na na Can be built in O(n) time log 2 and O(n) extra pace What if we only care about a few of the uffixe?
10 The pare uffix tree (SST) n T b a n a n a a n a n a O(b) a banana na b n a a na na na Can be built in O(n) time log 2 and O(n) extra pace What if we only care about a few of the uffixe?
11 The pare uffix tree (SST) n T b a n a n a a n a n a O(b) a banana na b n a a na na na Beating the naive bound ha been open ince 1960 O(n log 2 b) time (Monte-Carlo) O((n + b 2 ) log 2 b) time with high probability (La-Vega) both in O(b) pace
12 n T b a n a n a The pare uffix array (SSA)
13 The pare uffix array (SSA) n 1 b a n a n a T b a n a n a 2 a n a n a 3 n a n a 4 a n a 5 n a 6 a 7
14 The pare uffix array (SSA) n 1 b a n a n a T b a n a n a 2 a n a n a 3 n a n a 4 a n a 5 n a 6 a 7
15 The pare uffix array (SSA) n 1 b a n a n a T b a n a n a 2 a n a n a 3 n a n a 4 a n a 5 n a 6 a 7
16 The pare uffix array (SSA) n 1 b a n a n a T b a n a n a 2 a n a n a Sort the uffixe lexicographically 3 n a n a 4 a n a 5 n a 6 a 7
17 The pare uffix array (SSA) n T b a n a n a Sort the uffixe lexicographically 2 a n a n a 4 a n a 6 a 1 b a n a n a 3 n a n a 5 n a 7
18 The pare uffix array (SSA) n T b a n a n a Sort the uffixe lexicographically n Suffix Array a n a n a 4 a n a 6 a 1 b a n a n a 3 n a n a 5 n a 7
19 The pare uffix array (SSA) n T b a n a n a Sort the uffixe lexicographically n Suffix Array a n a n a 4 a n a 6 a 1 b a n a n a 3 n a n a 5 n a 7 Can be built in O(n) time log 2 and O(n) extra pace
20 The pare uffix array (SSA) n T b a n a n a Sort the uffixe lexicographically n Suffix Array a n a n a 4 a n a 6 a 1 b a n a n a 3 n a n a 5 n a 7 Can be built in O(n) time log 2 and O(n) extra pace What if we only care about a few of the uffixe?
21 The pare uffix array (SSA) n T b a n a n a n Suffix Array a n a n a 4 a n a 6 a 1 b a n a n a 3 n a n a 5 n a 7 Can be built in O(n) time log 2 and O(n) extra pace What if we only care about a few of the uffixe?
22 The pare uffix array (SSA) n T b a n a n a a n a n a b n a a n Suffix Array a n a n a 4 a n a 6 a 1 b a n a n a 3 n a n a 5 n a 7 Can be built in O(n) time log 2 and O(n) extra pace What if we only care about a few of the uffixe?
23 The pare uffix array (SSA) n T b a n a n a a n a n a b n a a n Suffix Array a n a n a 4 a n a 6 a 1 b a n a n a 3 n a n a 5 n a 7 Can be built in O(n) time log 2 and O(n) extra pace What if we only care about a few of the uffixe?
24 The pare uffix array (SSA) n T b a n a n a a n a n a b n a a n Suffix Array a n a n a 4 a n a 6 a 1 b a n a n a 3 n a n a 5 n a 7 Can be built in O(n) time log 2 and O(n) extra pace What if we only care about a few of the uffixe?
25 The pare uffix array (SSA) n T b a n a n a a n a n a b n a a n Suffix Array Spare Suffix Array b 2 a n a n a 4 a n a 6 a 1 b a n a n a 3 n a n a 5 n a 7 Can be built in O(n) time log 2 and O(n) extra pace What if we only care about a few of the uffixe?
26 The pare uffix array (SSA) n T b a n a n a a n a n a b n a a n Suffix Array Spare Suffix Array b 2 a n a n a 4 a n a 6 a 1 b a n a n a 3 n a n a 5 n a 7 Converion between SSA and SST i imple and take O(n log b) time
27 n T b a n a n a b a n The pare uffix array (SSA) a n n a a a n Suffix Array Spare Suffix Array 2 6 b 5 2 a n a n a 4 a n a 6 a 1 b a n a n a 3 n a n a 5 n a 7 Converion between SSA and SST i imple and take O(n log b) time... o we will focu on building the pare uffix array
28 The pare uffix array (SSA) n T b a n a n a a n a n a b n a a n Suffix Array Spare Suffix Array b 2 a n a n a 4 a n a 6 a 1 b a n a n a 3 n a n a 5 n a 7 O(n log 2 b) time (Monte-Carlo) O((n + b 2 ) log 2 b) time with high probability (La-Vega) both in O(b) pace
29 LCE - a fundamental tool for pattern matching T a b c b a b n a b c a b a b a For any (i, j), the longet common extenion i the larget l uch that T [i... i + l 1] = T [j... j + l 1] it the furthet you can go before hitting a mimatch
30 LCE - a fundamental tool for pattern matching T a b c b a b i n a b c a b a b a For any (i, j), the longet common extenion i the larget l uch that T [i... i + l 1] = T [j... j + l 1] it the furthet you can go before hitting a mimatch j
31 LCE - a fundamental tool for pattern matching T a b c b a b i n a b c a b a b a For any (i, j), the longet common extenion i the larget l uch that T [i... i + l 1] = T [j... j + l 1] it the furthet you can go before hitting a mimatch j
32 LCE - a fundamental tool for pattern matching T a b c b a b i n a b c a b a b a j For any (i, j), the longet common extenion i the larget l uch that T [i... i + l 1] = T [j... j + l 1] it the furthet you can go before hitting a mimatch
33 LCE - a fundamental tool for pattern matching T a b c b a b i n a b c a b a b a j For any (i, j), the longet common extenion i the larget l uch that T [i... i + l 1] = T [j... j + l 1] it the furthet you can go before hitting a mimatch LCE data tructure are typically baed on the uffix array or uffix tree.
34 LCE - a fundamental tool for pattern matching T a b c b a b i n a b c a b a b a j For any (i, j), the longet common extenion i the larget l uch that T [i... i + l 1] = T [j... j + l 1] it the furthet you can go before hitting a mimatch LCE data tructure are typically baed on the uffix array or uffix tree. We do the oppoite - we ue batched LCE querie to contruct the pare uffix array
35 LCE - a fundamental tool for pattern matching T a b c b a b i n a b c a b a b a j For any (i, j), the longet common extenion i the larget l uch that T [i... i + l 1] = T [j... j + l 1] it the furthet you can go before hitting a mimatch LCE data tructure are typically baed on the uffix array or uffix tree. We do the oppoite - we ue batched LCE querie to contruct the pare uffix array Thee LCE querie will be anwered uing Karp-Rabin fingerprint to enure that the pace remain mall
36 Karp-Rabin fingerprint of tring S a b a c c b a b c b φ(s) = S 1 k=0 S[k]rk mod p Here p = Θ(n 4 ) i a prime and 1 r < p i a random integer with high probability, S 1 = S 2 iff φ(s 1 ) = φ(s 2 )
37 Karp-Rabin fingerprint of tring S a b a c c b a b c b φ(s) = S 1 k=0 S[k]rk mod p Here p = Θ(n 4 ) i a prime and 1 r < p i a random integer with high probability, S 1 = S 2 iff φ(s 1 ) = φ(s 2 ) Oberve that φ(s) fit in an O(log n) bit word
38 Karp-Rabin fingerprint of tring S a b a c c b a b c b φ(s) = S 1 k=0 S[k]rk mod p Here p = Θ(n 4 ) i a prime and 1 r < p i a random integer with high probability, S 1 = S 2 iff φ(s 1 ) = φ(s 2 ) Oberve that φ(s) fit in an O(log n) bit word Given φ(s[0, l]) and φ(s[0, r]) we can compute φ(s[l + 1, r]) in O(1) time
39 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1]
40 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] T
41 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] T
42 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] T
43 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] T We find the larget l for each pair by binary earch (in parallel) comparion are performed uing fingerprint
44 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] 1 T b We find the larget l for each pair by binary earch (in parallel) comparion are performed uing fingerprint
45 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] T b We find the larget l for each pair by binary earch (in parallel) comparion are performed uing fingerprint
46 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] prefix fingerprint T b We find the larget l for each pair by binary earch (in parallel) comparion are performed uing fingerprint
47 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] prefix fingerprint T b We find the larget l for each pair by binary earch (in parallel) comparion are performed uing fingerprint
48 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] prefix fingerprint T b We find the larget l for each pair by binary earch (in parallel) comparion are performed uing fingerprint
49 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] prefix fingerprint T b We find the larget l for each pair by binary earch (in parallel) comparion are performed uing fingerprint
50 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] prefix fingerprint T b We find the larget l for each pair by binary earch (in parallel) comparion are performed uing fingerprint
51 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] prefix fingerprint T b We find the larget l for each pair by binary earch (in parallel) comparion are performed uing fingerprint
52 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] prefix fingerprint T b We find the larget l for each pair by binary earch (in parallel) comparion are performed uing fingerprint
53 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] prefix fingerprint T b We find the larget l for each pair by binary earch (in parallel) comparion are performed uing fingerprint
54 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] prefix fingerprint T b We find the larget l for each pair by binary earch (in parallel) comparion are performed uing fingerprint
55 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] prefix fingerprint T b We find the larget l for each pair by binary earch (in parallel) comparion are performed uing fingerprint In each pa we tore (at mot) 4b prefix fingerprint
56 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] prefix fingerprint T b We find the larget l for each pair by binary earch (in parallel) comparion are performed uing fingerprint In each pa we tore (at mot) 4b prefix fingerprint thi take O(n log b) time, O(b) pace and i correct whp.
57 Building the pare uffix array uing batched LCE T b a n a n a
58 Building the pare uffix array uing batched LCE T b a n a n a 1 b a n a n a 2 a n a n a 3 n a n a 4 a n a 5 n a 6 a 7
59 Building the pare uffix array uing batched LCE T b a n a n a 1 b a n a n a 2 a n a n a 3 n a n a 4 a n a 5 n a 6 a 7
60 Building the pare uffix array uing batched LCE T b a n a n a The LCE of two uffixe give u their order 1 b a n a n a 2 a n a n a 3 n a n a 4 a n a 5 n a 6 a 7
61 Building the pare uffix array uing batched LCE T b a n a n a The LCE of two uffixe give u their order 1 b a n a n a 2 a n a n a 3 n a n a 4 a n a 5 n a 6 a 7
62 Building the pare uffix array uing batched LCE T b a n a n a The LCE of two uffixe give u their order 1 b a n a n a 2 a n a n a 3 n a n a 4 a n a 5 n a 6 a 7
63 Building the pare uffix array uing batched LCE T b a n a n a The LCE of two uffixe give u their order 2 < 4 becaue n < 1 b a n a n a 2 a n a n a 3 n a n a 4 a n a 5 n a 6 a 7
64 Building the pare uffix array uing batched LCE T b a n a n a The LCE of two uffixe give u their order 2 < 4 becaue n < 1 b a n a n a 2 a n a n a 3 n a n a 4 a n a 5 n a 6 a 7 We perform randomied quickort on the b uffixe uing batched LCE for uffix comparion
65 Building the pare uffix array uing batched LCE T b a n a n a The LCE of two uffixe give u their order 1 b a n a n a 2 a n a n a 3 n a n a 4 a n a 5 n a 6 a 7 We perform randomied quickort on the b uffixe uing batched LCE for uffix comparion Pick a random pivot and compare each other uffix to it - Thi partition the uffixe in O(n log b) time and O(b) pace
66 Building the pare uffix array uing batched LCE T b a n a n a The LCE of two uffixe give u their order 1 b a n a n a 2 a n a n a 4 a n a 6 a 3 n a n a 5 n a 7 We perform randomied quickort on the b uffixe uing batched LCE for uffix comparion Pick a random pivot and compare each other uffix to it - Thi partition the uffixe in O(n log b) time and O(b) pace
67 Building the pare uffix array uing batched LCE T b a n a n a The LCE of two uffixe give u their order 1 b a n a n a 2 a n a n a 4 a n a 6 a 3 n a n a 5 n a 7 We perform randomied quickort on the b uffixe uing batched LCE for uffix comparion Pick a random pivot and compare each other uffix to it - Thi partition the uffixe in O(n log b) time and O(b) pace - Recure on each partition (the batch till contain b LCE)
68 Building the pare uffix array uing batched LCE T b a n a n a The LCE of two uffixe give u their order 1 b a n a n a 2 a n a n a 4 a n a 6 a 3 n a n a 5 n a 7 We perform randomied quickort on the b uffixe uing batched LCE for uffix comparion Pick a random pivot and compare each other uffix to it - Thi partition the uffixe in O(n log b) time and O(b) pace - Recure on each partition (the batch till contain b LCE)
69 Building the pare uffix array uing batched LCE T b a n a n a The LCE of two uffixe give u their order 1 b a n a n a 2 a n a n a 4 a n a 6 a 3 n a n a 5 n a 7 We perform randomied quickort on the b uffixe uing batched LCE for uffix comparion The depth of the recurion i O(log b) whp. o... The total time i O(n log 2 b) and the pace i O(b)
70 Building the pare uffix array uing batched LCE 1 b a n a n a n a a T b a n a n a 2 a n 4 a n a 6 a 3 n a n a 5 n a 7 We perform randomied quickort on the b uffixe uing batched LCE for uffix comparion The depth of the recurion i O(log b) whp. o... The total time i O(n log 2 b) and the pace i O(b)
71 Building the pare uffix array uing batched LCE T b a n a n a Thi algorithm i Monte-Carlo and La-Vega. It can be made Monte-Carlo only by aborting the quickort early 1 b a n a n a 2 a n a n a 4 a n a 6 a 3 n a n a 5 n a 7 We perform randomied quickort on the b uffixe uing batched LCE for uffix comparion The depth of the recurion i O(log b) whp. o... The total time i O(n log 2 b) and the pace i O(b)
72 The pare uffix array (SSA) n T b a n a n a a n a n a b n a a n Suffix Array Spare Suffix Array b 2 a n a n a 4 a n a 6 a 1 b a n a n a 3 n a n a 5 n a 7 O(n log 2 b) time (Monte-Carlo) O((n + b 2 ) log 2 b) time with high probability (La-Vega) both in O(b) pace
73 Verifying the pare uffix array T b a n a n a n Suffix Array How can we tell if thi uffix array i correct?
74 Verifying the pare uffix array T b a n a n a n Suffix Array How can we tell if thi uffix array i correct? Check that 2 < 4, 4 < 6, 6 < 1, 1 < 3...
75 Verifying the pare uffix array T b a n a n a n Suffix Array How can we tell if thi uffix array i correct? Check that 2 < 4, 4 < 6, 6 < 1, 1 < 3... Thi uffice becaue lexicographical ordering i tranitive
76 Verifying the pare uffix array T b a n a n a n Suffix Array How can we tell if thi uffix array i correct? Check that 2 < 4, 4 < 6, 6 < 1, 1 < 3... Thi uffice becaue lexicographical ordering i tranitive We could check 2 < 4 uing an LCE query if we verified it
77 Verifying the pare uffix array T b a n a n a n Suffix Array How can we tell if thi uffix array i correct? Check that 2 < 4, 4 < 6, 6 < 1, 1 < 3... Thi uffice becaue lexicographical ordering i tranitive We could check 2 < 4 uing an LCE query if we verified it So it uffice to verify a batch of b LCE querie
78 Verifying batched LCE querie Input : a tring, T of length n and b triple, (i, j, l) Output : for each triple (i, j, l) check that T [i + l] T [j + l] and T [i... i + l 1] = T [j... j + l 1] T b
79 Verifying batched LCE querie Input : a tring, T of length n and b triple, (i, j, l) Output : for each triple (i, j, l) check that T [i + l] T [j + l] and T [i... i + l 1] = T [j... j + l 1] eay! O(n) time T b
80 Verifying batched LCE querie Input : a tring, T of length n and b triple, (i, j, l) Output : for each triple (i, j, l) check that T [i... i + l 1] = T [j... j + l 1] T b
81 Verifying batched LCE querie Input : a tring, T of length n and b triple, (i, j, l) Output : for each triple (i, j, l) check that T [i... i + l 1] = T [j... j + l 1] T b We proceed in round in decending order... in the k-th round every l = 2 k
82 Verifying batched LCE querie Input : a tring, T of length n and b triple, (i, j, l) Output : for each triple (i, j, l) check that T [i... i + l 1] = T [j... j + l 1] T b We proceed in round in decending order... in the k-th round every l = 2 k Let focu on a ingle round
83 A firt example T 1 2 3
84 A firt example T 1 2 3
85 A firt example T 1 2 3
86 A firt example T 1 2 3
87 A firt example T 1 2 3
88 A firt example T If yellow (1) and blue (2) match then the right half of green (3) matche
89 A firt example T If yellow (1) and blue (2) match then the right half of green (3) matche Thi i a lock-tepped cycle
90 A econd example T 1 2 3
91 A econd example T 1 2 3
92 A econd example T 1 2 3
93 A econd example T 1 2 3
94 A econd example T 1 2 3
95 A econd example T If yellow (1),blue (2) and green (3) match then the right 3 /4 of green (3) i periodic
96 A econd example T If yellow (1),blue (2) and green (3) match then the right 3 /4 of green (3) i periodic
97 A econd example T If yellow (1),blue (2) and green (3) match then the right 3 /4 of green (3) i periodic Thi i an unlocked cycle
98 A econd example T 1 2 3
99 A econd example T offet Thee trick only work when the offet are mall
100 A econd example T l offet Thee trick only work when the offet are mall in particular when they um to at mot l/4
101 The overall idea T l We build a graph containing V 9 n/(l log b) node...
102 The overall idea T l We build a graph containing V 9 n/(l log b) node...
103 The overall idea T l We build a graph containing V 9 n/(l log b) node...
104 The overall idea T l l/(9 log b) We build a graph containing V 9 n/(l log b) node...
105 The overall idea T l l/(9 log b) We build a graph containing V 9 n/(l log b) node...
106 The overall idea T l > l/(9 log b) We build a graph containing V 9 n/(l log b) node...
107 The overall idea T l > l/(9 log b) We build a graph containing V 9 n/(l log b) node...
108 The overall idea T l We build a graph containing V 9 n/(l log b) node...
109 The overall idea T l We build a graph containing V 9 n/(l log b) node...
110 The overall idea T l We build a graph containing V 9 n/(l log b) node...
111 The overall idea T l We build a graph containing V 9 n/(l log b) node...
112 The overall idea T l We build a graph containing V 9 n/(l log b) node... and one edge per LCE query
113 The overall idea T l We build a graph containing V 9 n/(l log b) node... and one edge per LCE query
114 The overall idea T l We build a graph containing V 9 n/(l log b) node... and one edge per LCE query We can apply one of the two trick to any hort cycle
115 The overall idea T l We build a graph containing V 9 n/(l log b) node... and one edge per LCE query We can apply one of the two trick to any hort cycle (length at mot 2 log b + 1)
116 The overall idea T l We build a graph containing V 9 n/(l log b) node... and one edge per LCE query We can apply one of the two trick to any hort cycle (length at mot 2 log b + 1) Thi break the cycle (becaue we delete an edge)
117 The overall idea T l We build a graph containing V 9 n/(l log b) node... and one edge per LCE query We can apply one of the two trick to any hort cycle (length at mot 2 log b + 1) Thi break the cycle (becaue we delete an edge) Fact If every node ha degree at leat three there i a hort cycle
118 The overall idea T l We build a graph containing V 9 n/(l log b) node... and one edge per LCE query We can apply one of the two trick to any hort cycle (length at mot 2 log b + 1) Thi break the cycle (becaue we delete an edge) Fact If every node ha degree at leat three there i a hort cycle (low degree node are eaily handled)
119 The overall idea T l We build a graph containing V 9 n/(l log b) node... and one edge per LCE query Fact If every node ha degree at leat three there i a hort cycle We can find a hort cycle in the graph via a BFS in O( E ) = O(b) time Thi give the additive O(b 2 log b) term All other tep take O(n log b) time over all round (and ue O(b) pace)
120 Summary n T b a n a n a a n a n a b n a a n Suffix Array Spare Suffix Array b 2 a n a n a 4 a n a 6 a 1 b a n a n a 3 n a n a 5 n a 7 O(n log 2 b) time (Monte-Carlo) O((n + b 2 ) log 2 b) time with high probability (La-Vega) both in O(b) pace
Longest Common Extensions via Fingerprinting
Longest Common Extensions via Fingerprinting Philip Bille Inge Li Gørtz Jesper Kristensen Technical University of Denmark DTU Informatics LATA, March 9, 2012 1 / 17 Contents Introduction The LCE Problem
More informationTIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME
TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME RADMILA KOCURKOVÁ Sileian Univerity in Opava School of Buine Adminitration in Karviná Department of Mathematical Method in Economic Czech Republic
More informationDISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection
More informationA Spam Message Filtering Method: focus on run time
, pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department
More informationPersistent Data Structures and Planar Point Location
Persistent Data Structures and Planar Point Location Inge Li Gørtz Persistent Data Structures Ephemeral Partial persistence Full persistence Confluent persistence V1 V1 V1 V1 V2 q ue V2 V2 V5 V2 V4 V4
More informationQueueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,
MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS
More informationDISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com
More informationControl of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling
Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada
More informationPerformance of Multiple TFRC in Heterogeneous Wireless Networks
Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding
More informationSorting revisited. Build the binary search tree: O(n^2) Traverse the binary tree: O(n) Total: O(n^2) + O(n) = O(n^2)
Sorting revisited How did we use a binary search tree to sort an array of elements? Tree Sort Algorithm Given: An array of elements to sort 1. Build a binary search tree out of the elements 2. Traverse
More information12.4 Problems. Excerpt from "Introduction to Geometry" 2014 AoPS Inc. Copyrighted Material CHAPTER 12. CIRCLES AND ANGLES
HTER 1. IRLES N NGLES Excerpt from "Introduction to Geometry" 014 os Inc. onider the circle with diameter O. all thi circle. Why mut hit O in at leat two di erent point? (b) Why i it impoible for to hit
More informationReport 4668-1b 30.10.2010. Measurement report. Sylomer - field test
Report 4668-1b Meaurement report Sylomer - field tet Report 4668-1b 2(16) Contet 1 Introduction... 3 1.1 Cutomer... 3 1.2 The ite and purpoe of the meaurement... 3 2 Meaurement... 6 2.1 Attenuation of
More informationApigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management
Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4
More informationScheduling of Jobs and Maintenance Activities on Parallel Machines
Scheduling of Job and Maintenance Activitie on Parallel Machine Chung-Yee Lee* Department of Indutrial Engineering Texa A&M Univerity College Station, TX 77843-3131 cylee@ac.tamu.edu Zhi-Long Chen** Department
More informationOptical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng
Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare
More information1) Assume that the sample is an SRS. The problem state that the subjects were randomly selected.
12.1 Homework for t Hypothei Tet 1) Below are the etimate of the daily intake of calcium in milligram for 38 randomly elected women between the age of 18 and 24 year who agreed to participate in a tudy
More informationA technical guide to 2014 key stage 2 to key stage 4 value added measures
A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool
More informationModule 8. Three-phase Induction Motor. Version 2 EE IIT, Kharagpur
Module 8 Three-phae Induction Motor Verion EE IIT, Kharagpur Leon 33 Different Type of Starter for Induction Motor (IM Verion EE IIT, Kharagpur Inructional Objective Need of uing arter for Induction motor
More informationCASE STUDY BRIDGE. www.future-processing.com
CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION
More informationSCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto
More informationA note on profit maximization and monotonicity for inbound call centers
A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an
More informationInformation Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding
More informationChapter 10 Velocity, Acceleration, and Calculus
Chapter 10 Velocity, Acceleration, and Calculu The firt derivative of poition i velocity, and the econd derivative i acceleration. Thee derivative can be viewed in four way: phyically, numerically, ymbolically,
More informationPartial optimal labeling search for a NP-hard subclass of (max,+) problems
Partial optimal labeling earch for a NP-hard ubcla of (max,+) problem Ivan Kovtun International Reearch and Training Center of Information Technologie and Sytem, Kiev, Uraine, ovtun@image.iev.ua Dreden
More informationLongest Common Extensions via Fingerprinting
Longest Common Extensions via Fingerprinting Philip Bille, Inge Li Gørtz, and Jesper Kristensen Technical University of Denmark, DTU Informatics, Copenhagen, Denmark Abstract. The longest common extension
More informationEfficiency of algorithms. Algorithms. Efficiency of algorithms. Binary search and linear search. Best, worst and average case.
Algorithms Efficiency of algorithms Computational resources: time and space Best, worst and average case performance How to compare algorithms: machine-independent measure of efficiency Growth rate Complexity
More informationOn Reference RIAA Networks by Jim Hagerman
On eference IAA Network by Jim Hagerman You d think there would be nothing left to ay. Everything you need to know about IAA network ha already been publihed. However, a few year back I came acro an intereting
More informationLecture 1: Course overview, circuits, and formulas
Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik
More informationData Streams A Tutorial
Data Streams A Tutorial Nicole Schweikardt Goethe-Universität Frankfurt am Main DEIS 10: GI-Dagstuhl Seminar on Data Exchange, Integration, and Streams Schloss Dagstuhl, November 8, 2010 Data Streams Situation:
More informationAbstract parsing: static analysis of dynamically generated string output using LR-parsing technology
Abtract paring: tatic analyi of dynamically generated tring output uing LR-paring technology Kyung-Goo Doh 1, Hyunha Kim 1, David A. Schmidt 2 1 Hanyang Univerity, Anan, South Korea 2 Kana State Univerity,
More informationReview of Multiple Regression Richard Williams, University of Notre Dame, http://www3.nd.edu/~rwilliam/ Last revised January 13, 2015
Review of Multiple Regreion Richard William, Univerity of Notre Dame, http://www3.nd.edu/~rwilliam/ Lat revied January 13, 015 Aumption about prior nowledge. Thi handout attempt to ummarize and yntheize
More informationTRADING rules are widely used in financial market as
Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a
More informationSimple Modular Half-Bridge
Simple Modular HalfBridge Shane Colton Email: colton@mit.edu Maachuett Intitute of Technology Rev.1.1 13 March, 2009 Simple Modular HalfBridge Module Overview V i V i Iolated DCDC Supply: Supplied by 12V
More informationT-test for dependent Samples. Difference Scores. The t Test for Dependent Samples. The t Test for Dependent Samples. s D
The t Tet for ependent Sample T-tet for dependent Sample (ak.a., Paired ample t-tet, Correlated Group eign, Within- Subject eign, Repeated Meaure,.. Repeated-Meaure eign When you have two et of core from
More informationChapter Objectives. Chapter 9. Sequential Search. Search Algorithms. Search Algorithms. Binary Search
Chapter Objectives Chapter 9 Search Algorithms Data Structures Using C++ 1 Learn the various search algorithms Explore how to implement the sequential and binary search algorithms Discover how the sequential
More informationTrusted Document Signing based on use of biometric (Face) keys
Truted Document Signing baed on ue of biometric (Face) Ahmed B. Elmadani Department of Computer Science Faculty of Science Sebha Univerity Sebha Libya www.ebhau.edu.ly elmadan@yahoo.com ABSTRACT An online
More informationCOMP 250 Fall 2012 lecture 2 binary representations Sept. 11, 2012
Binary numbers The reason humans represent numbers using decimal (the ten digits from 0,1,... 9) is that we have ten fingers. There is no other reason than that. There is nothing special otherwise about
More informationTap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms
Tap Into Smartphone Demand: Mobile-izing Enterprie Webite by Uing Flexible, Open Source Platform acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Tap Into Smartphone Demand:
More informationCLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON MAPREDUCE FRAMEWORK
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON MAPREDUCE FRAMEWORK Sheela Gole 1 and Bharat Tidke 2 1 Department of Computer Engineering, Flora Intitute of Technology, Pune,
More informationOnline story scheduling in web advertising
Online tory cheduling in web advertiing Anirban Dagupta Arpita Ghoh Hamid Nazerzadeh Prabhakar Raghavan Abtract We tudy an online job cheduling problem motivated by toryboarding in web advertiing, where
More informationData Structures and Algorithms Written Examination
Data Structures and Algorithms Written Examination 22 February 2013 FIRST NAME STUDENT NUMBER LAST NAME SIGNATURE Instructions for students: Write First Name, Last Name, Student Number and Signature where
More informationSample Questions Csci 1112 A. Bellaachia
Sample Questions Csci 1112 A. Bellaachia Important Series : o S( N) 1 2 N N i N(1 N) / 2 i 1 o Sum of squares: N 2 N( N 1)(2N 1) N i for large N i 1 6 o Sum of exponents: N k 1 k N i for large N and k
More informationUnit 11 Using Linear Regression to Describe Relationships
Unit 11 Uing Linear Regreion to Decribe Relationhip Objective: To obtain and interpret the lope and intercept of the leat quare line for predicting a quantitative repone variable from a quantitative explanatory
More informationDigital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem
Digital Signatures Murat Kantarcioglu Based on Prof. Li s Slides Digital Signatures: The Problem Consider the real-life example where a person pays by credit card and signs a bill; the seller verifies
More informationTopological Properties
Advanced Computer Architecture Topological Properties Routing Distance: Number of links on route Node degree: Number of channels per node Network diameter: Longest minimum routing distance between any
More informationQuestion 2 Naïve Bayes (16 points)
Question 2 Naïve Bayes (16 points) About 2/3 of your email is spam so you downloaded an open source spam filter based on word occurrences that uses the Naive Bayes classifier. Assume you collected the
More informationPiracy in two-sided markets
Technical Workhop on the Economic of Regulation Piracy in two-ided market Paul Belleflamme, CORE & LSM Univerité catholique de Louvain 07/12/2011 OECD, Pari Outline Piracy in one-ided market o Baic model
More informationProject Management Basics
Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management
More informationArithmetic Coding: Introduction
Data Compression Arithmetic coding Arithmetic Coding: Introduction Allows using fractional parts of bits!! Used in PPM, JPEG/MPEG (as option), Bzip More time costly than Huffman, but integer implementation
More informationName: SID: Instructions
CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/
More informationA Note on Profit Maximization and Monotonicity for Inbound Call Centers
OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright
More informationBinary Search Trees. A Generic Tree. Binary Trees. Nodes in a binary search tree ( B-S-T) are of the form. P parent. Key. Satellite data L R
Binary Search Trees A Generic Tree Nodes in a binary search tree ( B-S-T) are of the form P parent Key A Satellite data L R B C D E F G H I J The B-S-T has a root node which is the only node whose parent
More informationv = x t = x 2 x 1 t 2 t 1 The average speed of the particle is absolute value of the average velocity and is given Distance travelled t
Chapter 2 Motion in One Dimenion 2.1 The Important Stuff 2.1.1 Poition, Time and Diplacement We begin our tudy of motion by conidering object which are very mall in comparion to the ize of their movement
More informationThe Butterfly, Cube-Connected-Cycles and Benes Networks
The Butterfly, Cube-Connected-Cycles and Benes Networks Michael Lampis mlambis@softlab.ntua.gr NTUA The Butterfly, Cube-Connected-Cycles and Benes Networks p.1/16 Introduction Hypercubes are computationally
More informationPlease read the information that follows before beginning. Incomplete applications will delay the review and approval process.
Certified Manager Certification Application Intruction Completing the Application Congratulation on chooing to purue the Certified Manager (CM ) certification. The application i the tarting point toward
More informationINTERSECTION OF LINE-SEGMENTS
INTERSECTION OF LINE-SEGMENTS Vera Sacristán Discrete and Algorithmic Geometry Facultat de Matemàtiques i Estadística Universitat Politècnica de Catalunya Problem Input: n line-segments in the plane,
More informationTeaching Rank-Based Tests by Emphasizing Structural Similarities to Corresponding Parametric Tests
Journal of Statitic Education, Volume 8, Number (00) Teaching Rank-Baed Tet by Emphaizing Structural Similaritie to Correponding Parametric Tet ewayne R. erryberry Sue B. Schou Idaho State Univerity W.
More informationRandomized algorithms
Randomized algorithms March 10, 2005 1 What are randomized algorithms? Algorithms which use random numbers to make decisions during the executions of the algorithm. Why would we want to do this?? Deterministic
More informationBinary Heap Algorithms
CS Data Structures and Algorithms Lecture Slides Wednesday, April 5, 2009 Glenn G. Chappell Department of Computer Science University of Alaska Fairbanks CHAPPELLG@member.ams.org 2005 2009 Glenn G. Chappell
More informationSchmid Peoplemover Overpass and Revolution. The Discovery of a New Way.
Schmid Peoplemover Overpa and Revolution. The Dicovery of a New Way. A Company of ThyenKrupp Elevator ThyenKrupp Aufzüge TK Creating New Way Demand New Way of Thinking. The Schmid Peoplemover Remove the
More informationAvailability of WDM Multi Ring Networks
Paper Availability of WDM Multi Ring Network Ivan Rado and Katarina Rado H d.o.o. Motar, Motar, Bonia and Herzegovina Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, Univerity
More informationOptimizing a Semantic Comparator using CUDA-enabled Graphics Hardware
Optimizing a Semantic Comparator uing CUDA-enabled Graphic Hardware Aalap Tripathy Suneil Mohan, Rabi Mahapatra Embedded Sytem and Codeign Lab codeign.ce.tamu.edu (Preented at ICSC 0, September 9, 0 in
More informationAlgorithm Design and Analysis Homework #1 Due: 5pm, Friday, October 4, 2013 TA email: ada@csie.ntu.edu.tw. === Homework submission instructions ===
Algorithm Design and Analysis Homework #1 Due: 5pm, Friday, October 4, 2013 TA email: ada@csie.ntu.edu.tw === Homework submission instructions === For Problem 1, commit your source code and a brief documentation
More informationUser Behavior Analysis Using Alignment Based Grammatical Inference from Web Server Access Log
Uer Behavior Analyi Uing Alignment Baed Grammatical Inference from Web Server Acce Log Rameh Thakur, Sureh Jain, and Narendra S. Chaudhari Abtract Application of data mining technique to the World Wide
More informationFree Enterprise, the Economy and Monetary Policy
Free Enterprie, the Economy and Monetary Policy free (fre) adj. not cont Free enterprie i the freedom of individual and buinee to power of another; at regulation. It enable individual and buinee to create,
More informationAssessing the Discriminatory Power of Credit Scores
Aeing the Dicriminatory Power of Credit Score Holger Kraft 1, Gerald Kroiandt 1, Marlene Müller 1,2 1 Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Gottlieb-Daimler-Str. 49, 67663 Kaierlautern,
More informationFind-The-Number. 1 Find-The-Number With Comps
Find-The-Number 1 Find-The-Number With Comps Consider the following two-person game, which we call Find-The-Number with Comps. Player A (for answerer) has a number x between 1 and 1000. Player Q (for questioner)
More informationEvery tree contains a large induced subgraph with all degrees odd
Every tree contains a large induced subgraph with all degrees odd A.J. Radcliffe Carnegie Mellon University, Pittsburgh, PA A.D. Scott Department of Pure Mathematics and Mathematical Statistics University
More informationIntroduction to Algorithms. Part 3: P, NP Hard Problems
Introduction to Algorithms Part 3: P, NP Hard Problems 1) Polynomial Time: P and NP 2) NP-Completeness 3) Dealing with Hard Problems 4) Lower Bounds 5) Books c Wayne Goddard, Clemson University, 2004 Chapter
More informationDATABASE DESIGN - 1DL400
DATABASE DESIGN - 1DL400 Spring 2015 A course on modern database systems!! http://www.it.uu.se/research/group/udbl/kurser/dbii_vt15/ Kjell Orsborn! Uppsala Database Laboratory! Department of Information
More informationDiscuss the size of the instance for the minimum spanning tree problem.
3.1 Algorithm complexity The algorithms A, B are given. The former has complexity O(n 2 ), the latter O(2 n ), where n is the size of the instance. Let n A 0 be the size of the largest instance that can
More informationA Note on Maximum Independent Sets in Rectangle Intersection Graphs
A Note on Maximum Independent Sets in Rectangle Intersection Graphs Timothy M. Chan School of Computer Science University of Waterloo Waterloo, Ontario N2L 3G1, Canada tmchan@uwaterloo.ca September 12,
More informationSolution of the Heat Equation for transient conduction by LaPlace Transform
Solution of the Heat Equation for tranient conduction by LaPlace Tranform Thi notebook ha been written in Mathematica by Mark J. McCready Profeor and Chair of Chemical Engineering Univerity of Notre Dame
More informationMapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research
MapReduce and Distributed Data Analysis Google Research 1 Dealing With Massive Data 2 2 Dealing With Massive Data Polynomial Memory Sublinear RAM Sketches External Memory Property Testing 3 3 Dealing With
More informationQuantum Computing Lecture 7. Quantum Factoring. Anuj Dawar
Quantum Computing Lecture 7 Quantum Factoring Anuj Dawar Quantum Factoring A polynomial time quantum algorithm for factoring numbers was published by Peter Shor in 1994. polynomial time here means that
More informationOutline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits
Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique
More informationσ m using Equation 8.1 given that σ
8. Etimate the theoretical fracture trength of a brittle material if it i known that fracture occur by the propagation of an elliptically haped urface crack of length 0.8 mm and having a tip radiu of curvature
More informationINFORMATION Technology (IT) infrastructure management
IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, MAY 214 1 Buine-Driven Long-term Capacity Planning for SaaS Application David Candeia, Ricardo Araújo Santo and Raquel Lope Abtract Capacity Planning
More informationQueueing Models for Multiclass Call Centers with Real-Time Anticipated Delays
Queueing Model for Multicla Call Center with Real-Time Anticipated Delay Oualid Jouini Yve Dallery Zeynep Akşin Ecole Centrale Pari Koç Univerity Laboratoire Génie Indutriel College of Adminitrative Science
More informationConverting a Number from Decimal to Binary
Converting a Number from Decimal to Binary Convert nonnegative integer in decimal format (base 10) into equivalent binary number (base 2) Rightmost bit of x Remainder of x after division by two Recursive
More informationMBA 570x Homework 1 Due 9/24/2014 Solution
MA 570x Homework 1 Due 9/24/2014 olution Individual work: 1. Quetion related to Chapter 11, T Why do you think i a fund of fund market for hedge fund, but not for mutual fund? Anwer: Invetor can inexpenively
More informationDUE to the small size and low cost of a sensor node, a
1992 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 10, OCTOBER 2015 A Networ Coding Baed Energy Efficient Data Bacup in Survivability-Heterogeneou Senor Networ Jie Tian, Tan Yan, and Guiling Wang
More informationShortest Inspection-Path. Queries in Simple Polygons
Shortest Inspection-Path Queries in Simple Polygons Christian Knauer, Günter Rote B 05-05 April 2005 Shortest Inspection-Path Queries in Simple Polygons Christian Knauer, Günter Rote Institut für Informatik,
More informationAnalysis of Binary Search algorithm and Selection Sort algorithm
Analysis of Binary Search algorithm and Selection Sort algorithm In this section we shall take up two representative problems in computer science, work out the algorithms based on the best strategy to
More informationOhm s Law. Ohmic relationship V=IR. Electric Power. Non Ohmic devises. Schematic representation. Electric Power
Ohm Law Ohmic relationhip V=IR Ohm law tate that current through the conductor i directly proportional to the voltage acro it if temperature and other phyical condition do not change. In many material,
More informationMECH 2110 - Statics & Dynamics
Chapter D Problem 3 Solution 1/7/8 1:8 PM MECH 11 - Static & Dynamic Chapter D Problem 3 Solution Page 7, Engineering Mechanic - Dynamic, 4th Edition, Meriam and Kraige Given: Particle moving along a traight
More information1) The postfix expression for the infix expression A+B*(C+D)/F+D*E is ABCD+*F/DE*++
Answer the following 1) The postfix expression for the infix expression A+B*(C+D)/F+D*E is ABCD+*F/DE*++ 2) Which data structure is needed to convert infix notations to postfix notations? Stack 3) The
More informationLecture 3: Finding integer solutions to systems of linear equations
Lecture 3: Finding integer solutions to systems of linear equations Algorithmic Number Theory (Fall 2014) Rutgers University Swastik Kopparty Scribe: Abhishek Bhrushundi 1 Overview The goal of this lecture
More information8.1 Min Degree Spanning Tree
CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree
More informationA Catalogue of the Steiner Triple Systems of Order 19
A Catalogue of the Steiner Triple Systems of Order 19 Petteri Kaski 1, Patric R. J. Östergård 2, Olli Pottonen 2, and Lasse Kiviluoto 3 1 Helsinki Institute for Information Technology HIIT University of
More informationLicense & SW Asset Management at CES Design Services
Licene & SW Aet Management at CES Deign Service johann.poechl@iemen.com www.ces-deignservice.com 2003 Siemen AG Öterreich Overview 1. Introduction CES Deign Service 2. Objective and Motivation 3. What
More informationCIS 700: algorithms for Big Data
CIS 700: algorithms for Big Data Lecture 6: Graph Sketching Slides at http://grigory.us/big-data-class.html Grigory Yaroslavtsev http://grigory.us Sketching Graphs? We know how to sketch vectors: v Mv
More informationCluster-Aware Cache for Network Attached Storage *
Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,
More informationWhy? A central concept in Computer Science. Algorithms are ubiquitous.
Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online
More informationTurbulent Mixing and Chemical Reaction in Stirred Tanks
Turbulent Mixing and Chemical Reaction in Stirred Tank André Bakker Julian B. Faano Blend time and chemical product ditribution in turbulent agitated veel can be predicted with the aid of Computational
More informationAnalysis of Mesostructure Unit Cells Comprised of Octet-truss Structures
Analyi of Meotructure Unit Cell Compried of Octet-tru Structure Scott R. Johnton *, Marque Reed *, Hongqing V. Wang, and David W. Roen * * The George W. Woodruff School of Mechanical Engineering, Georgia
More informationTransmission Scheduling for Multi-Channel Satellite and Wireless Networks
Tranmiion Scheduling for ulti-channel Satellite and Wirele Network Anand Ganti, Eytan odiano, John N. Titikli aachuett Intitute of Technology e-mail: aganti@mit.edu, modiano@mit.edu, jnt@mit.edu Abtract
More informationPerformance of a Browser-Based JavaScript Bandwidth Test
Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further
More informationINTERACTIVE TOOL FOR ANALYSIS OF TIME-DELAY SYSTEMS WITH DEAD-TIME COMPENSATORS
INTERACTIVE TOOL FOR ANALYSIS OF TIMEDELAY SYSTEMS WITH DEADTIME COMPENSATORS Joé Lui Guzmán, Pedro García, Tore Hägglund, Sebatián Dormido, Pedro Alberto, Manuel Berenguel Dep. de Lenguaje y Computación,
More informationBio-Plex Analysis Software
Multiplex Supenion Array Bio-Plex Analyi Software The Leader in Multiplex Immunoaay Analyi Bio-Plex Analyi Software If making ene of your multiplex data i your challenge, then Bio-Plex data analyi oftware
More information