Sparse Suffix Tree Construction in Small Space

Size: px
Start display at page:

Download "Sparse Suffix Tree Construction in Small Space"

Transcription

1 Spare Suffix Tree Contruction in Small Space Joint work with Philip Bille, Inge Li Gørtz, Hjalte Wedel Vildhøj (Technical Univerity of Denmark) Tvi Kopelowitz, (Weizmann Intitute of Science) Johanne Ficher (Karlruhe Intitute of Technology). to appear in ICALP 2013

2 The pare uffix tree (SST) T b a n a n a Suffix Tree a banana na na na na

3 The pare uffix tree (SST) T b a n a n a Suffix a banana na na na na

4 The pare uffix tree (SST) T b a n a n a a banana na na na na Can be built in O(n) time log 2 and O(n) extra pace

5 The pare uffix tree (SST) T b a n a n a a banana na na na na Can be built in O(n) time log 2 and O(n) extra pace What if we only care about a few of the uffixe?

6 The pare uffix tree (SST) n T b a n a n a a n a n a a banana na b n a a na na na Can be built in O(n) time log 2 and O(n) extra pace What if we only care about a few of the uffixe?

7 The pare uffix tree (SST) n T b a n a n a a n a n a a banana na b n a a na na na Can be built in O(n) time log 2 and O(n) extra pace What if we only care about a few of the uffixe?

8 The pare uffix tree (SST) n T b a n a n a a n a n a a banana na b n a a na na na Can be built in O(n) time log 2 and O(n) extra pace What if we only care about a few of the uffixe?

9 The pare uffix tree (SST) n T b a n a n a a n a n a a banana na b n a a na na na Can be built in O(n) time log 2 and O(n) extra pace What if we only care about a few of the uffixe?

10 The pare uffix tree (SST) n T b a n a n a a n a n a O(b) a banana na b n a a na na na Can be built in O(n) time log 2 and O(n) extra pace What if we only care about a few of the uffixe?

11 The pare uffix tree (SST) n T b a n a n a a n a n a O(b) a banana na b n a a na na na Beating the naive bound ha been open ince 1960 O(n log 2 b) time (Monte-Carlo) O((n + b 2 ) log 2 b) time with high probability (La-Vega) both in O(b) pace

12 n T b a n a n a The pare uffix array (SSA)

13 The pare uffix array (SSA) n 1 b a n a n a T b a n a n a 2 a n a n a 3 n a n a 4 a n a 5 n a 6 a 7

14 The pare uffix array (SSA) n 1 b a n a n a T b a n a n a 2 a n a n a 3 n a n a 4 a n a 5 n a 6 a 7

15 The pare uffix array (SSA) n 1 b a n a n a T b a n a n a 2 a n a n a 3 n a n a 4 a n a 5 n a 6 a 7

16 The pare uffix array (SSA) n 1 b a n a n a T b a n a n a 2 a n a n a Sort the uffixe lexicographically 3 n a n a 4 a n a 5 n a 6 a 7

17 The pare uffix array (SSA) n T b a n a n a Sort the uffixe lexicographically 2 a n a n a 4 a n a 6 a 1 b a n a n a 3 n a n a 5 n a 7

18 The pare uffix array (SSA) n T b a n a n a Sort the uffixe lexicographically n Suffix Array a n a n a 4 a n a 6 a 1 b a n a n a 3 n a n a 5 n a 7

19 The pare uffix array (SSA) n T b a n a n a Sort the uffixe lexicographically n Suffix Array a n a n a 4 a n a 6 a 1 b a n a n a 3 n a n a 5 n a 7 Can be built in O(n) time log 2 and O(n) extra pace

20 The pare uffix array (SSA) n T b a n a n a Sort the uffixe lexicographically n Suffix Array a n a n a 4 a n a 6 a 1 b a n a n a 3 n a n a 5 n a 7 Can be built in O(n) time log 2 and O(n) extra pace What if we only care about a few of the uffixe?

21 The pare uffix array (SSA) n T b a n a n a n Suffix Array a n a n a 4 a n a 6 a 1 b a n a n a 3 n a n a 5 n a 7 Can be built in O(n) time log 2 and O(n) extra pace What if we only care about a few of the uffixe?

22 The pare uffix array (SSA) n T b a n a n a a n a n a b n a a n Suffix Array a n a n a 4 a n a 6 a 1 b a n a n a 3 n a n a 5 n a 7 Can be built in O(n) time log 2 and O(n) extra pace What if we only care about a few of the uffixe?

23 The pare uffix array (SSA) n T b a n a n a a n a n a b n a a n Suffix Array a n a n a 4 a n a 6 a 1 b a n a n a 3 n a n a 5 n a 7 Can be built in O(n) time log 2 and O(n) extra pace What if we only care about a few of the uffixe?

24 The pare uffix array (SSA) n T b a n a n a a n a n a b n a a n Suffix Array a n a n a 4 a n a 6 a 1 b a n a n a 3 n a n a 5 n a 7 Can be built in O(n) time log 2 and O(n) extra pace What if we only care about a few of the uffixe?

25 The pare uffix array (SSA) n T b a n a n a a n a n a b n a a n Suffix Array Spare Suffix Array b 2 a n a n a 4 a n a 6 a 1 b a n a n a 3 n a n a 5 n a 7 Can be built in O(n) time log 2 and O(n) extra pace What if we only care about a few of the uffixe?

26 The pare uffix array (SSA) n T b a n a n a a n a n a b n a a n Suffix Array Spare Suffix Array b 2 a n a n a 4 a n a 6 a 1 b a n a n a 3 n a n a 5 n a 7 Converion between SSA and SST i imple and take O(n log b) time

27 n T b a n a n a b a n The pare uffix array (SSA) a n n a a a n Suffix Array Spare Suffix Array 2 6 b 5 2 a n a n a 4 a n a 6 a 1 b a n a n a 3 n a n a 5 n a 7 Converion between SSA and SST i imple and take O(n log b) time... o we will focu on building the pare uffix array

28 The pare uffix array (SSA) n T b a n a n a a n a n a b n a a n Suffix Array Spare Suffix Array b 2 a n a n a 4 a n a 6 a 1 b a n a n a 3 n a n a 5 n a 7 O(n log 2 b) time (Monte-Carlo) O((n + b 2 ) log 2 b) time with high probability (La-Vega) both in O(b) pace

29 LCE - a fundamental tool for pattern matching T a b c b a b n a b c a b a b a For any (i, j), the longet common extenion i the larget l uch that T [i... i + l 1] = T [j... j + l 1] it the furthet you can go before hitting a mimatch

30 LCE - a fundamental tool for pattern matching T a b c b a b i n a b c a b a b a For any (i, j), the longet common extenion i the larget l uch that T [i... i + l 1] = T [j... j + l 1] it the furthet you can go before hitting a mimatch j

31 LCE - a fundamental tool for pattern matching T a b c b a b i n a b c a b a b a For any (i, j), the longet common extenion i the larget l uch that T [i... i + l 1] = T [j... j + l 1] it the furthet you can go before hitting a mimatch j

32 LCE - a fundamental tool for pattern matching T a b c b a b i n a b c a b a b a j For any (i, j), the longet common extenion i the larget l uch that T [i... i + l 1] = T [j... j + l 1] it the furthet you can go before hitting a mimatch

33 LCE - a fundamental tool for pattern matching T a b c b a b i n a b c a b a b a j For any (i, j), the longet common extenion i the larget l uch that T [i... i + l 1] = T [j... j + l 1] it the furthet you can go before hitting a mimatch LCE data tructure are typically baed on the uffix array or uffix tree.

34 LCE - a fundamental tool for pattern matching T a b c b a b i n a b c a b a b a j For any (i, j), the longet common extenion i the larget l uch that T [i... i + l 1] = T [j... j + l 1] it the furthet you can go before hitting a mimatch LCE data tructure are typically baed on the uffix array or uffix tree. We do the oppoite - we ue batched LCE querie to contruct the pare uffix array

35 LCE - a fundamental tool for pattern matching T a b c b a b i n a b c a b a b a j For any (i, j), the longet common extenion i the larget l uch that T [i... i + l 1] = T [j... j + l 1] it the furthet you can go before hitting a mimatch LCE data tructure are typically baed on the uffix array or uffix tree. We do the oppoite - we ue batched LCE querie to contruct the pare uffix array Thee LCE querie will be anwered uing Karp-Rabin fingerprint to enure that the pace remain mall

36 Karp-Rabin fingerprint of tring S a b a c c b a b c b φ(s) = S 1 k=0 S[k]rk mod p Here p = Θ(n 4 ) i a prime and 1 r < p i a random integer with high probability, S 1 = S 2 iff φ(s 1 ) = φ(s 2 )

37 Karp-Rabin fingerprint of tring S a b a c c b a b c b φ(s) = S 1 k=0 S[k]rk mod p Here p = Θ(n 4 ) i a prime and 1 r < p i a random integer with high probability, S 1 = S 2 iff φ(s 1 ) = φ(s 2 ) Oberve that φ(s) fit in an O(log n) bit word

38 Karp-Rabin fingerprint of tring S a b a c c b a b c b φ(s) = S 1 k=0 S[k]rk mod p Here p = Θ(n 4 ) i a prime and 1 r < p i a random integer with high probability, S 1 = S 2 iff φ(s 1 ) = φ(s 2 ) Oberve that φ(s) fit in an O(log n) bit word Given φ(s[0, l]) and φ(s[0, r]) we can compute φ(s[l + 1, r]) in O(1) time

39 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1]

40 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] T

41 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] T

42 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] T

43 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] T We find the larget l for each pair by binary earch (in parallel) comparion are performed uing fingerprint

44 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] 1 T b We find the larget l for each pair by binary earch (in parallel) comparion are performed uing fingerprint

45 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] T b We find the larget l for each pair by binary earch (in parallel) comparion are performed uing fingerprint

46 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] prefix fingerprint T b We find the larget l for each pair by binary earch (in parallel) comparion are performed uing fingerprint

47 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] prefix fingerprint T b We find the larget l for each pair by binary earch (in parallel) comparion are performed uing fingerprint

48 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] prefix fingerprint T b We find the larget l for each pair by binary earch (in parallel) comparion are performed uing fingerprint

49 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] prefix fingerprint T b We find the larget l for each pair by binary earch (in parallel) comparion are performed uing fingerprint

50 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] prefix fingerprint T b We find the larget l for each pair by binary earch (in parallel) comparion are performed uing fingerprint

51 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] prefix fingerprint T b We find the larget l for each pair by binary earch (in parallel) comparion are performed uing fingerprint

52 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] prefix fingerprint T b We find the larget l for each pair by binary earch (in parallel) comparion are performed uing fingerprint

53 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] prefix fingerprint T b We find the larget l for each pair by binary earch (in parallel) comparion are performed uing fingerprint

54 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] prefix fingerprint T b We find the larget l for each pair by binary earch (in parallel) comparion are performed uing fingerprint

55 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] prefix fingerprint T b We find the larget l for each pair by binary earch (in parallel) comparion are performed uing fingerprint In each pa we tore (at mot) 4b prefix fingerprint

56 Simple, Monte-Carlo batched LCE querie Input : a tring, T of length n and b pair, (i, j) Output : for each pair (i, j) output the larget l.t. T [i... i + l 1] = T [j... j + l 1] prefix fingerprint T b We find the larget l for each pair by binary earch (in parallel) comparion are performed uing fingerprint In each pa we tore (at mot) 4b prefix fingerprint thi take O(n log b) time, O(b) pace and i correct whp.

57 Building the pare uffix array uing batched LCE T b a n a n a

58 Building the pare uffix array uing batched LCE T b a n a n a 1 b a n a n a 2 a n a n a 3 n a n a 4 a n a 5 n a 6 a 7

59 Building the pare uffix array uing batched LCE T b a n a n a 1 b a n a n a 2 a n a n a 3 n a n a 4 a n a 5 n a 6 a 7

60 Building the pare uffix array uing batched LCE T b a n a n a The LCE of two uffixe give u their order 1 b a n a n a 2 a n a n a 3 n a n a 4 a n a 5 n a 6 a 7

61 Building the pare uffix array uing batched LCE T b a n a n a The LCE of two uffixe give u their order 1 b a n a n a 2 a n a n a 3 n a n a 4 a n a 5 n a 6 a 7

62 Building the pare uffix array uing batched LCE T b a n a n a The LCE of two uffixe give u their order 1 b a n a n a 2 a n a n a 3 n a n a 4 a n a 5 n a 6 a 7

63 Building the pare uffix array uing batched LCE T b a n a n a The LCE of two uffixe give u their order 2 < 4 becaue n < 1 b a n a n a 2 a n a n a 3 n a n a 4 a n a 5 n a 6 a 7

64 Building the pare uffix array uing batched LCE T b a n a n a The LCE of two uffixe give u their order 2 < 4 becaue n < 1 b a n a n a 2 a n a n a 3 n a n a 4 a n a 5 n a 6 a 7 We perform randomied quickort on the b uffixe uing batched LCE for uffix comparion

65 Building the pare uffix array uing batched LCE T b a n a n a The LCE of two uffixe give u their order 1 b a n a n a 2 a n a n a 3 n a n a 4 a n a 5 n a 6 a 7 We perform randomied quickort on the b uffixe uing batched LCE for uffix comparion Pick a random pivot and compare each other uffix to it - Thi partition the uffixe in O(n log b) time and O(b) pace

66 Building the pare uffix array uing batched LCE T b a n a n a The LCE of two uffixe give u their order 1 b a n a n a 2 a n a n a 4 a n a 6 a 3 n a n a 5 n a 7 We perform randomied quickort on the b uffixe uing batched LCE for uffix comparion Pick a random pivot and compare each other uffix to it - Thi partition the uffixe in O(n log b) time and O(b) pace

67 Building the pare uffix array uing batched LCE T b a n a n a The LCE of two uffixe give u their order 1 b a n a n a 2 a n a n a 4 a n a 6 a 3 n a n a 5 n a 7 We perform randomied quickort on the b uffixe uing batched LCE for uffix comparion Pick a random pivot and compare each other uffix to it - Thi partition the uffixe in O(n log b) time and O(b) pace - Recure on each partition (the batch till contain b LCE)

68 Building the pare uffix array uing batched LCE T b a n a n a The LCE of two uffixe give u their order 1 b a n a n a 2 a n a n a 4 a n a 6 a 3 n a n a 5 n a 7 We perform randomied quickort on the b uffixe uing batched LCE for uffix comparion Pick a random pivot and compare each other uffix to it - Thi partition the uffixe in O(n log b) time and O(b) pace - Recure on each partition (the batch till contain b LCE)

69 Building the pare uffix array uing batched LCE T b a n a n a The LCE of two uffixe give u their order 1 b a n a n a 2 a n a n a 4 a n a 6 a 3 n a n a 5 n a 7 We perform randomied quickort on the b uffixe uing batched LCE for uffix comparion The depth of the recurion i O(log b) whp. o... The total time i O(n log 2 b) and the pace i O(b)

70 Building the pare uffix array uing batched LCE 1 b a n a n a n a a T b a n a n a 2 a n 4 a n a 6 a 3 n a n a 5 n a 7 We perform randomied quickort on the b uffixe uing batched LCE for uffix comparion The depth of the recurion i O(log b) whp. o... The total time i O(n log 2 b) and the pace i O(b)

71 Building the pare uffix array uing batched LCE T b a n a n a Thi algorithm i Monte-Carlo and La-Vega. It can be made Monte-Carlo only by aborting the quickort early 1 b a n a n a 2 a n a n a 4 a n a 6 a 3 n a n a 5 n a 7 We perform randomied quickort on the b uffixe uing batched LCE for uffix comparion The depth of the recurion i O(log b) whp. o... The total time i O(n log 2 b) and the pace i O(b)

72 The pare uffix array (SSA) n T b a n a n a a n a n a b n a a n Suffix Array Spare Suffix Array b 2 a n a n a 4 a n a 6 a 1 b a n a n a 3 n a n a 5 n a 7 O(n log 2 b) time (Monte-Carlo) O((n + b 2 ) log 2 b) time with high probability (La-Vega) both in O(b) pace

73 Verifying the pare uffix array T b a n a n a n Suffix Array How can we tell if thi uffix array i correct?

74 Verifying the pare uffix array T b a n a n a n Suffix Array How can we tell if thi uffix array i correct? Check that 2 < 4, 4 < 6, 6 < 1, 1 < 3...

75 Verifying the pare uffix array T b a n a n a n Suffix Array How can we tell if thi uffix array i correct? Check that 2 < 4, 4 < 6, 6 < 1, 1 < 3... Thi uffice becaue lexicographical ordering i tranitive

76 Verifying the pare uffix array T b a n a n a n Suffix Array How can we tell if thi uffix array i correct? Check that 2 < 4, 4 < 6, 6 < 1, 1 < 3... Thi uffice becaue lexicographical ordering i tranitive We could check 2 < 4 uing an LCE query if we verified it

77 Verifying the pare uffix array T b a n a n a n Suffix Array How can we tell if thi uffix array i correct? Check that 2 < 4, 4 < 6, 6 < 1, 1 < 3... Thi uffice becaue lexicographical ordering i tranitive We could check 2 < 4 uing an LCE query if we verified it So it uffice to verify a batch of b LCE querie

78 Verifying batched LCE querie Input : a tring, T of length n and b triple, (i, j, l) Output : for each triple (i, j, l) check that T [i + l] T [j + l] and T [i... i + l 1] = T [j... j + l 1] T b

79 Verifying batched LCE querie Input : a tring, T of length n and b triple, (i, j, l) Output : for each triple (i, j, l) check that T [i + l] T [j + l] and T [i... i + l 1] = T [j... j + l 1] eay! O(n) time T b

80 Verifying batched LCE querie Input : a tring, T of length n and b triple, (i, j, l) Output : for each triple (i, j, l) check that T [i... i + l 1] = T [j... j + l 1] T b

81 Verifying batched LCE querie Input : a tring, T of length n and b triple, (i, j, l) Output : for each triple (i, j, l) check that T [i... i + l 1] = T [j... j + l 1] T b We proceed in round in decending order... in the k-th round every l = 2 k

82 Verifying batched LCE querie Input : a tring, T of length n and b triple, (i, j, l) Output : for each triple (i, j, l) check that T [i... i + l 1] = T [j... j + l 1] T b We proceed in round in decending order... in the k-th round every l = 2 k Let focu on a ingle round

83 A firt example T 1 2 3

84 A firt example T 1 2 3

85 A firt example T 1 2 3

86 A firt example T 1 2 3

87 A firt example T 1 2 3

88 A firt example T If yellow (1) and blue (2) match then the right half of green (3) matche

89 A firt example T If yellow (1) and blue (2) match then the right half of green (3) matche Thi i a lock-tepped cycle

90 A econd example T 1 2 3

91 A econd example T 1 2 3

92 A econd example T 1 2 3

93 A econd example T 1 2 3

94 A econd example T 1 2 3

95 A econd example T If yellow (1),blue (2) and green (3) match then the right 3 /4 of green (3) i periodic

96 A econd example T If yellow (1),blue (2) and green (3) match then the right 3 /4 of green (3) i periodic

97 A econd example T If yellow (1),blue (2) and green (3) match then the right 3 /4 of green (3) i periodic Thi i an unlocked cycle

98 A econd example T 1 2 3

99 A econd example T offet Thee trick only work when the offet are mall

100 A econd example T l offet Thee trick only work when the offet are mall in particular when they um to at mot l/4

101 The overall idea T l We build a graph containing V 9 n/(l log b) node...

102 The overall idea T l We build a graph containing V 9 n/(l log b) node...

103 The overall idea T l We build a graph containing V 9 n/(l log b) node...

104 The overall idea T l l/(9 log b) We build a graph containing V 9 n/(l log b) node...

105 The overall idea T l l/(9 log b) We build a graph containing V 9 n/(l log b) node...

106 The overall idea T l > l/(9 log b) We build a graph containing V 9 n/(l log b) node...

107 The overall idea T l > l/(9 log b) We build a graph containing V 9 n/(l log b) node...

108 The overall idea T l We build a graph containing V 9 n/(l log b) node...

109 The overall idea T l We build a graph containing V 9 n/(l log b) node...

110 The overall idea T l We build a graph containing V 9 n/(l log b) node...

111 The overall idea T l We build a graph containing V 9 n/(l log b) node...

112 The overall idea T l We build a graph containing V 9 n/(l log b) node... and one edge per LCE query

113 The overall idea T l We build a graph containing V 9 n/(l log b) node... and one edge per LCE query

114 The overall idea T l We build a graph containing V 9 n/(l log b) node... and one edge per LCE query We can apply one of the two trick to any hort cycle

115 The overall idea T l We build a graph containing V 9 n/(l log b) node... and one edge per LCE query We can apply one of the two trick to any hort cycle (length at mot 2 log b + 1)

116 The overall idea T l We build a graph containing V 9 n/(l log b) node... and one edge per LCE query We can apply one of the two trick to any hort cycle (length at mot 2 log b + 1) Thi break the cycle (becaue we delete an edge)

117 The overall idea T l We build a graph containing V 9 n/(l log b) node... and one edge per LCE query We can apply one of the two trick to any hort cycle (length at mot 2 log b + 1) Thi break the cycle (becaue we delete an edge) Fact If every node ha degree at leat three there i a hort cycle

118 The overall idea T l We build a graph containing V 9 n/(l log b) node... and one edge per LCE query We can apply one of the two trick to any hort cycle (length at mot 2 log b + 1) Thi break the cycle (becaue we delete an edge) Fact If every node ha degree at leat three there i a hort cycle (low degree node are eaily handled)

119 The overall idea T l We build a graph containing V 9 n/(l log b) node... and one edge per LCE query Fact If every node ha degree at leat three there i a hort cycle We can find a hort cycle in the graph via a BFS in O( E ) = O(b) time Thi give the additive O(b 2 log b) term All other tep take O(n log b) time over all round (and ue O(b) pace)

120 Summary n T b a n a n a a n a n a b n a a n Suffix Array Spare Suffix Array b 2 a n a n a 4 a n a 6 a 1 b a n a n a 3 n a n a 5 n a 7 O(n log 2 b) time (Monte-Carlo) O((n + b 2 ) log 2 b) time with high probability (La-Vega) both in O(b) pace

Longest Common Extensions via Fingerprinting

Longest Common Extensions via Fingerprinting Longest Common Extensions via Fingerprinting Philip Bille Inge Li Gørtz Jesper Kristensen Technical University of Denmark DTU Informatics LATA, March 9, 2012 1 / 17 Contents Introduction The LCE Problem

More information

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME RADMILA KOCURKOVÁ Sileian Univerity in Opava School of Buine Adminitration in Karviná Department of Mathematical Method in Economic Czech Republic

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection

More information

A Spam Message Filtering Method: focus on run time

A Spam Message Filtering Method: focus on run time , pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department

More information

Persistent Data Structures and Planar Point Location

Persistent Data Structures and Planar Point Location Persistent Data Structures and Planar Point Location Inge Li Gørtz Persistent Data Structures Ephemeral Partial persistence Full persistence Confluent persistence V1 V1 V1 V1 V2 q ue V2 V2 V5 V2 V4 V4

More information

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems, MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com

More information

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada

More information

Performance of Multiple TFRC in Heterogeneous Wireless Networks

Performance of Multiple TFRC in Heterogeneous Wireless Networks Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding

More information

Sorting revisited. Build the binary search tree: O(n^2) Traverse the binary tree: O(n) Total: O(n^2) + O(n) = O(n^2)

Sorting revisited. Build the binary search tree: O(n^2) Traverse the binary tree: O(n) Total: O(n^2) + O(n) = O(n^2) Sorting revisited How did we use a binary search tree to sort an array of elements? Tree Sort Algorithm Given: An array of elements to sort 1. Build a binary search tree out of the elements 2. Traverse

More information

12.4 Problems. Excerpt from "Introduction to Geometry" 2014 AoPS Inc. Copyrighted Material CHAPTER 12. CIRCLES AND ANGLES

12.4 Problems. Excerpt from Introduction to Geometry 2014 AoPS Inc.  Copyrighted Material CHAPTER 12. CIRCLES AND ANGLES HTER 1. IRLES N NGLES Excerpt from "Introduction to Geometry" 014 os Inc. onider the circle with diameter O. all thi circle. Why mut hit O in at leat two di erent point? (b) Why i it impoible for to hit

More information

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test Report 4668-1b Meaurement report Sylomer - field tet Report 4668-1b 2(16) Contet 1 Introduction... 3 1.1 Cutomer... 3 1.2 The ite and purpoe of the meaurement... 3 2 Meaurement... 6 2.1 Attenuation of

More information

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4

More information

Scheduling of Jobs and Maintenance Activities on Parallel Machines

Scheduling of Jobs and Maintenance Activities on Parallel Machines Scheduling of Job and Maintenance Activitie on Parallel Machine Chung-Yee Lee* Department of Indutrial Engineering Texa A&M Univerity College Station, TX 77843-3131 cylee@ac.tamu.edu Zhi-Long Chen** Department

More information

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare

More information

1) Assume that the sample is an SRS. The problem state that the subjects were randomly selected.

1) Assume that the sample is an SRS. The problem state that the subjects were randomly selected. 12.1 Homework for t Hypothei Tet 1) Below are the etimate of the daily intake of calcium in milligram for 38 randomly elected women between the age of 18 and 24 year who agreed to participate in a tudy

More information

A technical guide to 2014 key stage 2 to key stage 4 value added measures

A technical guide to 2014 key stage 2 to key stage 4 value added measures A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool

More information

Module 8. Three-phase Induction Motor. Version 2 EE IIT, Kharagpur

Module 8. Three-phase Induction Motor. Version 2 EE IIT, Kharagpur Module 8 Three-phae Induction Motor Verion EE IIT, Kharagpur Leon 33 Different Type of Starter for Induction Motor (IM Verion EE IIT, Kharagpur Inructional Objective Need of uing arter for Induction motor

More information

CASE STUDY BRIDGE. www.future-processing.com

CASE STUDY BRIDGE. www.future-processing.com CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION

More information

SCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto

More information

A note on profit maximization and monotonicity for inbound call centers

A note on profit maximization and monotonicity for inbound call centers A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an

More information

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding

More information

Chapter 10 Velocity, Acceleration, and Calculus

Chapter 10 Velocity, Acceleration, and Calculus Chapter 10 Velocity, Acceleration, and Calculu The firt derivative of poition i velocity, and the econd derivative i acceleration. Thee derivative can be viewed in four way: phyically, numerically, ymbolically,

More information

Partial optimal labeling search for a NP-hard subclass of (max,+) problems

Partial optimal labeling search for a NP-hard subclass of (max,+) problems Partial optimal labeling earch for a NP-hard ubcla of (max,+) problem Ivan Kovtun International Reearch and Training Center of Information Technologie and Sytem, Kiev, Uraine, ovtun@image.iev.ua Dreden

More information

Longest Common Extensions via Fingerprinting

Longest Common Extensions via Fingerprinting Longest Common Extensions via Fingerprinting Philip Bille, Inge Li Gørtz, and Jesper Kristensen Technical University of Denmark, DTU Informatics, Copenhagen, Denmark Abstract. The longest common extension

More information

Efficiency of algorithms. Algorithms. Efficiency of algorithms. Binary search and linear search. Best, worst and average case.

Efficiency of algorithms. Algorithms. Efficiency of algorithms. Binary search and linear search. Best, worst and average case. Algorithms Efficiency of algorithms Computational resources: time and space Best, worst and average case performance How to compare algorithms: machine-independent measure of efficiency Growth rate Complexity

More information

On Reference RIAA Networks by Jim Hagerman

On Reference RIAA Networks by Jim Hagerman On eference IAA Network by Jim Hagerman You d think there would be nothing left to ay. Everything you need to know about IAA network ha already been publihed. However, a few year back I came acro an intereting

More information

Lecture 1: Course overview, circuits, and formulas

Lecture 1: Course overview, circuits, and formulas Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik

More information

Data Streams A Tutorial

Data Streams A Tutorial Data Streams A Tutorial Nicole Schweikardt Goethe-Universität Frankfurt am Main DEIS 10: GI-Dagstuhl Seminar on Data Exchange, Integration, and Streams Schloss Dagstuhl, November 8, 2010 Data Streams Situation:

More information

Abstract parsing: static analysis of dynamically generated string output using LR-parsing technology

Abstract parsing: static analysis of dynamically generated string output using LR-parsing technology Abtract paring: tatic analyi of dynamically generated tring output uing LR-paring technology Kyung-Goo Doh 1, Hyunha Kim 1, David A. Schmidt 2 1 Hanyang Univerity, Anan, South Korea 2 Kana State Univerity,

More information

Review of Multiple Regression Richard Williams, University of Notre Dame, http://www3.nd.edu/~rwilliam/ Last revised January 13, 2015

Review of Multiple Regression Richard Williams, University of Notre Dame, http://www3.nd.edu/~rwilliam/ Last revised January 13, 2015 Review of Multiple Regreion Richard William, Univerity of Notre Dame, http://www3.nd.edu/~rwilliam/ Lat revied January 13, 015 Aumption about prior nowledge. Thi handout attempt to ummarize and yntheize

More information

TRADING rules are widely used in financial market as

TRADING rules are widely used in financial market as Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a

More information

Simple Modular Half-Bridge

Simple Modular Half-Bridge Simple Modular HalfBridge Shane Colton Email: colton@mit.edu Maachuett Intitute of Technology Rev.1.1 13 March, 2009 Simple Modular HalfBridge Module Overview V i V i Iolated DCDC Supply: Supplied by 12V

More information

T-test for dependent Samples. Difference Scores. The t Test for Dependent Samples. The t Test for Dependent Samples. s D

T-test for dependent Samples. Difference Scores. The t Test for Dependent Samples. The t Test for Dependent Samples. s D The t Tet for ependent Sample T-tet for dependent Sample (ak.a., Paired ample t-tet, Correlated Group eign, Within- Subject eign, Repeated Meaure,.. Repeated-Meaure eign When you have two et of core from

More information

Chapter Objectives. Chapter 9. Sequential Search. Search Algorithms. Search Algorithms. Binary Search

Chapter Objectives. Chapter 9. Sequential Search. Search Algorithms. Search Algorithms. Binary Search Chapter Objectives Chapter 9 Search Algorithms Data Structures Using C++ 1 Learn the various search algorithms Explore how to implement the sequential and binary search algorithms Discover how the sequential

More information

Trusted Document Signing based on use of biometric (Face) keys

Trusted Document Signing based on use of biometric (Face) keys Truted Document Signing baed on ue of biometric (Face) Ahmed B. Elmadani Department of Computer Science Faculty of Science Sebha Univerity Sebha Libya www.ebhau.edu.ly elmadan@yahoo.com ABSTRACT An online

More information

COMP 250 Fall 2012 lecture 2 binary representations Sept. 11, 2012

COMP 250 Fall 2012 lecture 2 binary representations Sept. 11, 2012 Binary numbers The reason humans represent numbers using decimal (the ten digits from 0,1,... 9) is that we have ten fingers. There is no other reason than that. There is nothing special otherwise about

More information

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms Tap Into Smartphone Demand: Mobile-izing Enterprie Webite by Uing Flexible, Open Source Platform acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Tap Into Smartphone Demand:

More information

CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON MAPREDUCE FRAMEWORK

CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON MAPREDUCE FRAMEWORK CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON MAPREDUCE FRAMEWORK Sheela Gole 1 and Bharat Tidke 2 1 Department of Computer Engineering, Flora Intitute of Technology, Pune,

More information

Online story scheduling in web advertising

Online story scheduling in web advertising Online tory cheduling in web advertiing Anirban Dagupta Arpita Ghoh Hamid Nazerzadeh Prabhakar Raghavan Abtract We tudy an online job cheduling problem motivated by toryboarding in web advertiing, where

More information

Data Structures and Algorithms Written Examination

Data Structures and Algorithms Written Examination Data Structures and Algorithms Written Examination 22 February 2013 FIRST NAME STUDENT NUMBER LAST NAME SIGNATURE Instructions for students: Write First Name, Last Name, Student Number and Signature where

More information

Sample Questions Csci 1112 A. Bellaachia

Sample Questions Csci 1112 A. Bellaachia Sample Questions Csci 1112 A. Bellaachia Important Series : o S( N) 1 2 N N i N(1 N) / 2 i 1 o Sum of squares: N 2 N( N 1)(2N 1) N i for large N i 1 6 o Sum of exponents: N k 1 k N i for large N and k

More information

Unit 11 Using Linear Regression to Describe Relationships

Unit 11 Using Linear Regression to Describe Relationships Unit 11 Uing Linear Regreion to Decribe Relationhip Objective: To obtain and interpret the lope and intercept of the leat quare line for predicting a quantitative repone variable from a quantitative explanatory

More information

Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem

Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem Digital Signatures Murat Kantarcioglu Based on Prof. Li s Slides Digital Signatures: The Problem Consider the real-life example where a person pays by credit card and signs a bill; the seller verifies

More information

Topological Properties

Topological Properties Advanced Computer Architecture Topological Properties Routing Distance: Number of links on route Node degree: Number of channels per node Network diameter: Longest minimum routing distance between any

More information

Question 2 Naïve Bayes (16 points)

Question 2 Naïve Bayes (16 points) Question 2 Naïve Bayes (16 points) About 2/3 of your email is spam so you downloaded an open source spam filter based on word occurrences that uses the Naive Bayes classifier. Assume you collected the

More information

Piracy in two-sided markets

Piracy in two-sided markets Technical Workhop on the Economic of Regulation Piracy in two-ided market Paul Belleflamme, CORE & LSM Univerité catholique de Louvain 07/12/2011 OECD, Pari Outline Piracy in one-ided market o Baic model

More information

Project Management Basics

Project Management Basics Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management

More information

Arithmetic Coding: Introduction

Arithmetic Coding: Introduction Data Compression Arithmetic coding Arithmetic Coding: Introduction Allows using fractional parts of bits!! Used in PPM, JPEG/MPEG (as option), Bzip More time costly than Huffman, but integer implementation

More information

Name: SID: Instructions

Name: SID: Instructions CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/

More information

A Note on Profit Maximization and Monotonicity for Inbound Call Centers

A Note on Profit Maximization and Monotonicity for Inbound Call Centers OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright

More information

Binary Search Trees. A Generic Tree. Binary Trees. Nodes in a binary search tree ( B-S-T) are of the form. P parent. Key. Satellite data L R

Binary Search Trees. A Generic Tree. Binary Trees. Nodes in a binary search tree ( B-S-T) are of the form. P parent. Key. Satellite data L R Binary Search Trees A Generic Tree Nodes in a binary search tree ( B-S-T) are of the form P parent Key A Satellite data L R B C D E F G H I J The B-S-T has a root node which is the only node whose parent

More information

v = x t = x 2 x 1 t 2 t 1 The average speed of the particle is absolute value of the average velocity and is given Distance travelled t

v = x t = x 2 x 1 t 2 t 1 The average speed of the particle is absolute value of the average velocity and is given Distance travelled t Chapter 2 Motion in One Dimenion 2.1 The Important Stuff 2.1.1 Poition, Time and Diplacement We begin our tudy of motion by conidering object which are very mall in comparion to the ize of their movement

More information

The Butterfly, Cube-Connected-Cycles and Benes Networks

The Butterfly, Cube-Connected-Cycles and Benes Networks The Butterfly, Cube-Connected-Cycles and Benes Networks Michael Lampis mlambis@softlab.ntua.gr NTUA The Butterfly, Cube-Connected-Cycles and Benes Networks p.1/16 Introduction Hypercubes are computationally

More information

Please read the information that follows before beginning. Incomplete applications will delay the review and approval process.

Please read the information that follows before beginning. Incomplete applications will delay the review and approval process. Certified Manager Certification Application Intruction Completing the Application Congratulation on chooing to purue the Certified Manager (CM ) certification. The application i the tarting point toward

More information

INTERSECTION OF LINE-SEGMENTS

INTERSECTION OF LINE-SEGMENTS INTERSECTION OF LINE-SEGMENTS Vera Sacristán Discrete and Algorithmic Geometry Facultat de Matemàtiques i Estadística Universitat Politècnica de Catalunya Problem Input: n line-segments in the plane,

More information

Teaching Rank-Based Tests by Emphasizing Structural Similarities to Corresponding Parametric Tests

Teaching Rank-Based Tests by Emphasizing Structural Similarities to Corresponding Parametric Tests Journal of Statitic Education, Volume 8, Number (00) Teaching Rank-Baed Tet by Emphaizing Structural Similaritie to Correponding Parametric Tet ewayne R. erryberry Sue B. Schou Idaho State Univerity W.

More information

Randomized algorithms

Randomized algorithms Randomized algorithms March 10, 2005 1 What are randomized algorithms? Algorithms which use random numbers to make decisions during the executions of the algorithm. Why would we want to do this?? Deterministic

More information

Binary Heap Algorithms

Binary Heap Algorithms CS Data Structures and Algorithms Lecture Slides Wednesday, April 5, 2009 Glenn G. Chappell Department of Computer Science University of Alaska Fairbanks CHAPPELLG@member.ams.org 2005 2009 Glenn G. Chappell

More information

Schmid Peoplemover Overpass and Revolution. The Discovery of a New Way.

Schmid Peoplemover Overpass and Revolution. The Discovery of a New Way. Schmid Peoplemover Overpa and Revolution. The Dicovery of a New Way. A Company of ThyenKrupp Elevator ThyenKrupp Aufzüge TK Creating New Way Demand New Way of Thinking. The Schmid Peoplemover Remove the

More information

Availability of WDM Multi Ring Networks

Availability of WDM Multi Ring Networks Paper Availability of WDM Multi Ring Network Ivan Rado and Katarina Rado H d.o.o. Motar, Motar, Bonia and Herzegovina Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, Univerity

More information

Optimizing a Semantic Comparator using CUDA-enabled Graphics Hardware

Optimizing a Semantic Comparator using CUDA-enabled Graphics Hardware Optimizing a Semantic Comparator uing CUDA-enabled Graphic Hardware Aalap Tripathy Suneil Mohan, Rabi Mahapatra Embedded Sytem and Codeign Lab codeign.ce.tamu.edu (Preented at ICSC 0, September 9, 0 in

More information

Algorithm Design and Analysis Homework #1 Due: 5pm, Friday, October 4, 2013 TA email: ada@csie.ntu.edu.tw. === Homework submission instructions ===

Algorithm Design and Analysis Homework #1 Due: 5pm, Friday, October 4, 2013 TA email: ada@csie.ntu.edu.tw. === Homework submission instructions === Algorithm Design and Analysis Homework #1 Due: 5pm, Friday, October 4, 2013 TA email: ada@csie.ntu.edu.tw === Homework submission instructions === For Problem 1, commit your source code and a brief documentation

More information

User Behavior Analysis Using Alignment Based Grammatical Inference from Web Server Access Log

User Behavior Analysis Using Alignment Based Grammatical Inference from Web Server Access Log Uer Behavior Analyi Uing Alignment Baed Grammatical Inference from Web Server Acce Log Rameh Thakur, Sureh Jain, and Narendra S. Chaudhari Abtract Application of data mining technique to the World Wide

More information

Free Enterprise, the Economy and Monetary Policy

Free Enterprise, the Economy and Monetary Policy Free Enterprie, the Economy and Monetary Policy free (fre) adj. not cont Free enterprie i the freedom of individual and buinee to power of another; at regulation. It enable individual and buinee to create,

More information

Assessing the Discriminatory Power of Credit Scores

Assessing the Discriminatory Power of Credit Scores Aeing the Dicriminatory Power of Credit Score Holger Kraft 1, Gerald Kroiandt 1, Marlene Müller 1,2 1 Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Gottlieb-Daimler-Str. 49, 67663 Kaierlautern,

More information

Find-The-Number. 1 Find-The-Number With Comps

Find-The-Number. 1 Find-The-Number With Comps Find-The-Number 1 Find-The-Number With Comps Consider the following two-person game, which we call Find-The-Number with Comps. Player A (for answerer) has a number x between 1 and 1000. Player Q (for questioner)

More information

Every tree contains a large induced subgraph with all degrees odd

Every tree contains a large induced subgraph with all degrees odd Every tree contains a large induced subgraph with all degrees odd A.J. Radcliffe Carnegie Mellon University, Pittsburgh, PA A.D. Scott Department of Pure Mathematics and Mathematical Statistics University

More information

Introduction to Algorithms. Part 3: P, NP Hard Problems

Introduction to Algorithms. Part 3: P, NP Hard Problems Introduction to Algorithms Part 3: P, NP Hard Problems 1) Polynomial Time: P and NP 2) NP-Completeness 3) Dealing with Hard Problems 4) Lower Bounds 5) Books c Wayne Goddard, Clemson University, 2004 Chapter

More information

DATABASE DESIGN - 1DL400

DATABASE DESIGN - 1DL400 DATABASE DESIGN - 1DL400 Spring 2015 A course on modern database systems!! http://www.it.uu.se/research/group/udbl/kurser/dbii_vt15/ Kjell Orsborn! Uppsala Database Laboratory! Department of Information

More information

Discuss the size of the instance for the minimum spanning tree problem.

Discuss the size of the instance for the minimum spanning tree problem. 3.1 Algorithm complexity The algorithms A, B are given. The former has complexity O(n 2 ), the latter O(2 n ), where n is the size of the instance. Let n A 0 be the size of the largest instance that can

More information

A Note on Maximum Independent Sets in Rectangle Intersection Graphs

A Note on Maximum Independent Sets in Rectangle Intersection Graphs A Note on Maximum Independent Sets in Rectangle Intersection Graphs Timothy M. Chan School of Computer Science University of Waterloo Waterloo, Ontario N2L 3G1, Canada tmchan@uwaterloo.ca September 12,

More information

Solution of the Heat Equation for transient conduction by LaPlace Transform

Solution of the Heat Equation for transient conduction by LaPlace Transform Solution of the Heat Equation for tranient conduction by LaPlace Tranform Thi notebook ha been written in Mathematica by Mark J. McCready Profeor and Chair of Chemical Engineering Univerity of Notre Dame

More information

MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research

MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research MapReduce and Distributed Data Analysis Google Research 1 Dealing With Massive Data 2 2 Dealing With Massive Data Polynomial Memory Sublinear RAM Sketches External Memory Property Testing 3 3 Dealing With

More information

Quantum Computing Lecture 7. Quantum Factoring. Anuj Dawar

Quantum Computing Lecture 7. Quantum Factoring. Anuj Dawar Quantum Computing Lecture 7 Quantum Factoring Anuj Dawar Quantum Factoring A polynomial time quantum algorithm for factoring numbers was published by Peter Shor in 1994. polynomial time here means that

More information

Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits

Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique

More information

σ m using Equation 8.1 given that σ

σ m using Equation 8.1 given that σ 8. Etimate the theoretical fracture trength of a brittle material if it i known that fracture occur by the propagation of an elliptically haped urface crack of length 0.8 mm and having a tip radiu of curvature

More information

INFORMATION Technology (IT) infrastructure management

INFORMATION Technology (IT) infrastructure management IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, MAY 214 1 Buine-Driven Long-term Capacity Planning for SaaS Application David Candeia, Ricardo Araújo Santo and Raquel Lope Abtract Capacity Planning

More information

Queueing Models for Multiclass Call Centers with Real-Time Anticipated Delays

Queueing Models for Multiclass Call Centers with Real-Time Anticipated Delays Queueing Model for Multicla Call Center with Real-Time Anticipated Delay Oualid Jouini Yve Dallery Zeynep Akşin Ecole Centrale Pari Koç Univerity Laboratoire Génie Indutriel College of Adminitrative Science

More information

Converting a Number from Decimal to Binary

Converting a Number from Decimal to Binary Converting a Number from Decimal to Binary Convert nonnegative integer in decimal format (base 10) into equivalent binary number (base 2) Rightmost bit of x Remainder of x after division by two Recursive

More information

MBA 570x Homework 1 Due 9/24/2014 Solution

MBA 570x Homework 1 Due 9/24/2014 Solution MA 570x Homework 1 Due 9/24/2014 olution Individual work: 1. Quetion related to Chapter 11, T Why do you think i a fund of fund market for hedge fund, but not for mutual fund? Anwer: Invetor can inexpenively

More information

DUE to the small size and low cost of a sensor node, a

DUE to the small size and low cost of a sensor node, a 1992 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 10, OCTOBER 2015 A Networ Coding Baed Energy Efficient Data Bacup in Survivability-Heterogeneou Senor Networ Jie Tian, Tan Yan, and Guiling Wang

More information

Shortest Inspection-Path. Queries in Simple Polygons

Shortest Inspection-Path. Queries in Simple Polygons Shortest Inspection-Path Queries in Simple Polygons Christian Knauer, Günter Rote B 05-05 April 2005 Shortest Inspection-Path Queries in Simple Polygons Christian Knauer, Günter Rote Institut für Informatik,

More information

Analysis of Binary Search algorithm and Selection Sort algorithm

Analysis of Binary Search algorithm and Selection Sort algorithm Analysis of Binary Search algorithm and Selection Sort algorithm In this section we shall take up two representative problems in computer science, work out the algorithms based on the best strategy to

More information

Ohm s Law. Ohmic relationship V=IR. Electric Power. Non Ohmic devises. Schematic representation. Electric Power

Ohm s Law. Ohmic relationship V=IR. Electric Power. Non Ohmic devises. Schematic representation. Electric Power Ohm Law Ohmic relationhip V=IR Ohm law tate that current through the conductor i directly proportional to the voltage acro it if temperature and other phyical condition do not change. In many material,

More information

MECH 2110 - Statics & Dynamics

MECH 2110 - Statics & Dynamics Chapter D Problem 3 Solution 1/7/8 1:8 PM MECH 11 - Static & Dynamic Chapter D Problem 3 Solution Page 7, Engineering Mechanic - Dynamic, 4th Edition, Meriam and Kraige Given: Particle moving along a traight

More information

1) The postfix expression for the infix expression A+B*(C+D)/F+D*E is ABCD+*F/DE*++

1) The postfix expression for the infix expression A+B*(C+D)/F+D*E is ABCD+*F/DE*++ Answer the following 1) The postfix expression for the infix expression A+B*(C+D)/F+D*E is ABCD+*F/DE*++ 2) Which data structure is needed to convert infix notations to postfix notations? Stack 3) The

More information

Lecture 3: Finding integer solutions to systems of linear equations

Lecture 3: Finding integer solutions to systems of linear equations Lecture 3: Finding integer solutions to systems of linear equations Algorithmic Number Theory (Fall 2014) Rutgers University Swastik Kopparty Scribe: Abhishek Bhrushundi 1 Overview The goal of this lecture

More information

8.1 Min Degree Spanning Tree

8.1 Min Degree Spanning Tree CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree

More information

A Catalogue of the Steiner Triple Systems of Order 19

A Catalogue of the Steiner Triple Systems of Order 19 A Catalogue of the Steiner Triple Systems of Order 19 Petteri Kaski 1, Patric R. J. Östergård 2, Olli Pottonen 2, and Lasse Kiviluoto 3 1 Helsinki Institute for Information Technology HIIT University of

More information

License & SW Asset Management at CES Design Services

License & SW Asset Management at CES Design Services Licene & SW Aet Management at CES Deign Service johann.poechl@iemen.com www.ces-deignservice.com 2003 Siemen AG Öterreich Overview 1. Introduction CES Deign Service 2. Objective and Motivation 3. What

More information

CIS 700: algorithms for Big Data

CIS 700: algorithms for Big Data CIS 700: algorithms for Big Data Lecture 6: Graph Sketching Slides at http://grigory.us/big-data-class.html Grigory Yaroslavtsev http://grigory.us Sketching Graphs? We know how to sketch vectors: v Mv

More information

Cluster-Aware Cache for Network Attached Storage *

Cluster-Aware Cache for Network Attached Storage * Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,

More information

Why? A central concept in Computer Science. Algorithms are ubiquitous.

Why? A central concept in Computer Science. Algorithms are ubiquitous. Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online

More information

Turbulent Mixing and Chemical Reaction in Stirred Tanks

Turbulent Mixing and Chemical Reaction in Stirred Tanks Turbulent Mixing and Chemical Reaction in Stirred Tank André Bakker Julian B. Faano Blend time and chemical product ditribution in turbulent agitated veel can be predicted with the aid of Computational

More information

Analysis of Mesostructure Unit Cells Comprised of Octet-truss Structures

Analysis of Mesostructure Unit Cells Comprised of Octet-truss Structures Analyi of Meotructure Unit Cell Compried of Octet-tru Structure Scott R. Johnton *, Marque Reed *, Hongqing V. Wang, and David W. Roen * * The George W. Woodruff School of Mechanical Engineering, Georgia

More information

Transmission Scheduling for Multi-Channel Satellite and Wireless Networks

Transmission Scheduling for Multi-Channel Satellite and Wireless Networks Tranmiion Scheduling for ulti-channel Satellite and Wirele Network Anand Ganti, Eytan odiano, John N. Titikli aachuett Intitute of Technology e-mail: aganti@mit.edu, modiano@mit.edu, jnt@mit.edu Abtract

More information

Performance of a Browser-Based JavaScript Bandwidth Test

Performance of a Browser-Based JavaScript Bandwidth Test Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further

More information

INTERACTIVE TOOL FOR ANALYSIS OF TIME-DELAY SYSTEMS WITH DEAD-TIME COMPENSATORS

INTERACTIVE TOOL FOR ANALYSIS OF TIME-DELAY SYSTEMS WITH DEAD-TIME COMPENSATORS INTERACTIVE TOOL FOR ANALYSIS OF TIMEDELAY SYSTEMS WITH DEADTIME COMPENSATORS Joé Lui Guzmán, Pedro García, Tore Hägglund, Sebatián Dormido, Pedro Alberto, Manuel Berenguel Dep. de Lenguaje y Computación,

More information

Bio-Plex Analysis Software

Bio-Plex Analysis Software Multiplex Supenion Array Bio-Plex Analyi Software The Leader in Multiplex Immunoaay Analyi Bio-Plex Analyi Software If making ene of your multiplex data i your challenge, then Bio-Plex data analyi oftware

More information