IS-LABEL: an Independent-Set based Labeling Scheme for Point-to-Point Distance Querying

Size: px
Start display at page:

Download "IS-LABEL: an Independent-Set based Labeling Scheme for Point-to-Point Distance Querying"

Transcription

1 IS-LABEL: n Independent-Set bsed Lbeln Scheme for Pont-to-Pont Dstnce Queryn Ad W-Chee Fu, Hunhun Wu, Jmes Chen Dept. of Computer Scence nd Enneern The Chnese Unversty of Hon Kon ABSTRACT We study the problem of computn shortest pth or dstnce between two query vertces n rph, whch hs numerous mportnt pplctons. Qute number of ndexes hve been proposed to nswer such dstnce queres. However, ll of these ndexes cn only process rphs of sze brely up to 1 mllon vertces, whch s rther smll n vew of mny of the fst-rown rel-world rphs tody such s socl networks nd Web rphs. We propose n effcent ndex, whch s novel lbeln scheme bsed on the ndependent set of rph. We show tht our method cn hndle rphs of sze orders of mntude lrer thn exstn ndexes. 1. INTRODUCTION Computn the shortest pth or dstnce between two vertces s bsc operton n processn rph dt. The mportnce of the operton s not only becuse of ts role s key buldn block n mny lorthms but lso of ts numerous pplctons tself. In ddton to pplctons n trnsportton, VLSI desn, urbn plnnn, opertons reserch, robotcs, etc., the prolferton of network dt n recent yers hs ntroduced brod rne of new pplctons. For exmple, socl network nlyss, pe smlrty mesurement n Web rphs, entty reltonshp rnkn n semntc Web ontoloy, routn n telecommuncton networks, contextwre serch n socl networkn stes, to nme but few. In mny of these new pplctons, however, the sze of the underlyn rph s often n the scle of mllons to bllons of vertces nd edes. Such lre rphs re becomn more nd more common, some of the well-known ones nclude Web rphs, vrous socl networks (e.., Twtter, Fcebook, LnkedIn), RDF rphs, moble phone networks, SMS networks, etc. Computn shortest pth or dstnce n these lre rphs wth conventonl lorthms such s Djkstr s lorthm or smple BFS my result n lon runnn tme tht s not cceptble. For computn shortest pth or dstnce between two ponts n rod network, mny effcent ndexes hve been proposed [1, 2, 4, 9, 16, 18, 31, 32, 33]. However, these works pply unque propertes of rod networks nd hence re not pplcble for other rphs/networks tht re not smlr to rod networks. In recent Permsson to mke dtl or hrd copes of ll or prt of ths work for personl or clssroom use s rnted wthout fee provded tht copes re not mde or dstrbuted for proft or commercl dvnte nd tht copes ber ths notce nd the full ctton on the frst pe. To copy otherwse, to republsh, to post on servers or to redstrbute to lsts, requres pror specfc permsson nd/or fee. Artcles from ths volume were nvted to present ther results t The 39th Interntonl Conference on Very Lre Dt Bses, Auust 26th - 30th 2013, Rv del Grd, Trento, Itly. Proceedns of the VLDB Endowment, Vol. 6, No. 6. Copyrht 2013 VLDB Endowment /13/04... $ Rymond Ch-Wn Won Dept. of Computer Scence nd Enneern Hon Kon Unversty of Scence & Technoloy yers, number of ndexes hve been proposed to process dstnce queres n enerl sprse rphs [12, 15, 16, 23, 35, 39, 41]. However, s we wll dscuss n detls n Secton 7, these ndexes cn only hndle reltvely smll rphs due to hh ndex constructon cost nd lre ndex store spce. As reference, the lrest rel rphs tested n these works hve only 581K vertces wth vere deree 2.45 [12], nd 694K vertces wth vere deree 0.45 [23], whle most of the other rel rphs tested re snfcntly smller. We propose new ndex for computn shortest pth or dstnce between two query vertces nd our method cn hndle rphs wth hundreds of mllons of vertces nd edes. Our ndex, nmed s IS-Lbel[17], s desned bsed on novel pplcton of the ndependent set of rph, whch llows us to ornze the rph nto lyers tht form herrchcl structure. The herrchy cn be used to ude the shortest pth computton nd hence leds to the desn of effectve vertex lbels (.e., the ndex) for dstnce computton. We hhlht the mn contrbutons of our pper s follows. (1) We propose n effcent ndex for nswern shortest pth or dstnce queres, whch cn hndle rphs up to orders of mntude lrer thn those tested n the exstn works [12, 15, 16, 23, 35, 39, 41]. None of these exstn works cn hndle even the medum-szed rphs tht we tested. (2)We desn n effectve lbeln scheme such tht the lbel sze remns smll even f no optmzton (mostly NP-hrd) s ppled s n the exstn lbeln schemes. (3) Our ndex nturlly lends tself to the desn of smple nd effcent lorthms for both ndex constructon nd query processn. (4)We develop I/O-effcent lorthms to construct vertex lbels n lre rphs tht cnnot ft n mn memory. (5)We verfy both the effcency nd sclblty of our method for processn dstnce queres n lre rel-world rphs. Ornzton. Secton 2 defnes the problem nd bsc nottons. Sectons 3 nd 4 present the detls of ndex desn, nd Secton 5 descrbes the lorthms. Secton 6 reports the expermentl results. Secton 7 dscusses the lmttons of exstn works. Secton 8 dscusses hndln pth queres nd Secton 9 concludes the pper. 2. NOTATIONS We focus our dscusson on wehted, undrected smple rphs. Let G = (V G,E G,ω G) be such rph, where V G s the set of vertces, E G s the set of edes, nd ω G : E G N + s functon tht ssns to ech ede postve nteer s ts weht. We denote the weht of n ede (u,v) by ω(u,v). The sze of G s defned s G = ( V G + E G ). We defne the set of djcent vertces (or nehbors) of vertex v ngs dj G (v) = {u : (u,v) E G}, nd the deree of v ng s de G (v) = dj G (v). We ssume tht rph s stored n ts djcency lst representton, where ech vertex s ssned unque vertex ID nd vertces 457

2 re ordered n scendn order of ther vertex IDs. Gven pth p n G, the lenth of p s defned s len(p) = e pωg(e),.e., the sum of the wehts of the edes onp. Gven two vertces u,v V G, the shortest pth from u to v, denoted by SP G(u,v), s pth n G tht hs the mnmum lenth mon ll pths from u to v n G. We defne the dstnce from u to v n G s dst G(u,v) = len(sp G(u,v)). We defnedst G(v,v) = 0 for ny v V G. Problem defnton: we study the follown problem: ven sttc rph G = (V G,E G,ω G), construct dsk-bsed ndex for processn pont-to-pont (P2P) shortest pth dstnce queres,.e., ven ny pr of vertces (s,t) (V G V G), fnddst G(s,t). We focus on sprse rphs, whch re prevlent n rel world. We focus our dscusson on undrected rphs, nd wll lso show tht our ndex cn be extended to hndle drected rphs n Secton 4.3. We wll lso dscuss computn the ctul pth n Secton 8, whch s frly smple extenson wth some extr bookkeepn. 3. QUERYING DISTANCE BY VERTEX HI- ERARCHY In ths secton, we present our mn ndexn scheme, whch conssts of the follown components: A lyered structure of vertex herrchy constructed from the nput rph. A vertex lbeln scheme developed from the vertex herrchy. Query processn usn the set of vertex lbels. We dscuss ech of these three components n Sectons 3.1 to Constructon of Vertex Herrchy The mn de of our ndex s to ssn herrchy to vertces n n nput rph G so tht we cn use the vertex herrchy to compute the vertex lbels, whch re then used for queryn dstnce. To crete herrches for vertces n G, we construct lyered herrchcl structure from G. To formlly defne the herrchcl structure, we frst need to defne the follown two mportnt propertes tht re crucl n the desn of our ndex: Vertex ndependence: ven rph H = (V H,E H,ω H), nd set of vertces I, we sy tht I mntns the vertex ndependence property wth respect to H f I V H nd u,v I,(u,v) / E H,.e.,I s n ndependent set of H. Dstnce preservton: ven two rphs H 1 = (V H1,E H1,ω H1 ) nd H 2 = (V H2,E H2,ω H2 ), we sy tht H 2 mntns the dstnce preservton property wth respect toh 1 f u,v V H2,dst H2 (u,v) = dst H1 (u,v). Whle dstnce preservton s essentl for processn dstnce queres, vertex ndependence s crtcl for effcent ndex constructon s we wll see lter when we ntroduce the ndex. We now formlly defne the lyered herrchcl structure, followed by n llustrtn exmple. DEFINITION 1 (VERTEX HIERARCHY). Gven rph G = (V G,E G,ω G), vertex herrchy structure of G s defned by pr (L,G), where L = {L 1,...,L h } s set of vertex sets nd G = {G 1,...,G h } s set of rphs such tht: V G = L 1... L h, nd L L j = for 1 < j h; For 1 h, ech L mntns the vertex ndependence property wth respect to G,.e., L s n ndependent set of G ; G 1 = G, nd for 2 h, let G = (V G,E G,ω G ), thenv G = (V G L 1... L 1), wheres E G ndω G stsfy the condton tht G mntns the dstnce preservton property wth respect tog 1. Intutvely, L s prtton of the vertex set V G nd represents vertex herrchy, where L s t lower herrchcl level thn L j for < j. Menwhle, ech G G preserves the dstnce nformton n the ornl rph G, s shown by the follown lemm. LEMMA 1. For ll u,v V G, where 1 h, dst G (u,v) = dst G(u,v). PROOF. Snce for ny u,v V G, u,v V Gj for 1 j. Thus, we hve dst G (u,v) = dst G 1 (u,v) =... = dst G1 (u,v) = dst G(u,v) snce ech G mntns the dstnce preservton property wth respect tog 1 for 2 h. We use the follown exmple to llustrte the concept of vertex herrchy. EXAMPLE 1. Fure 1 shows ven rph G nd the vertex herrchy of G. We ssume tht ech ede n G hs unt weht except for (e, f), whch hs weht of 3. It s obvous tht the set {c,f,} forms n ndependent set n G, smlrly {b,d,h} n G 2 nd {e} n G 3. It s esy to see tht G 2 preserves ll dstnces n G, we shll expln the ddton of ede (e,h) lter. In order to preserve the dstnce n G 2, n ede (e,) of weht 2 s dded to G 3. G 4 conssts of snle ede (,) of weht 3. L 4 = {},G 5 conssts of snle vertex,l 5 = {}. b e d b c d e ( G = G 1, L 1 = c, f, 4 L 2 = b, d, h h 3 f h e 2 G 3, L 3 = e b d e G 2 Fure 1: A vertex herrchy 3 4 h G 4, L 4 = G 5 The dstnce preservton property cn be mntned ng wth respect tog 1 s follows. Frst, we requre the subrph of G 1 nduced by the vertex set V G to be n G (.e. (u,v) E G ff (u,v) E G 1 for u,v V G ). Then, we crete set of ddtonl edes, clled umentn edes, to be ncluded ntoe G s follows. For ny vertexv L 1 (thus v / V G ccordn to Defnton 1), f u,w V G, (u,v) E G 1 nd (v,w) E G 1, then n umentn ede(u,w) s creted ng wthω G (u,w) = ω G 1 (u,v) + ω G 1 (v,w). If (u,w) lredy exsts n G, then ω G (u,w) = mn(ω G 1 (u,w),ω G 1 (u,v) + ω G 1 (v,w)). An ede n G wth updted weht s lso clled n umentn 458

3 ede. For exmple, n Fure 1, n G 3, dst(e,) cn be preserved by cretn n umentn ede (e,) wth ω(e,) = 2. Ede(e,h) s lso dded ccordn to our process bove. Note tht dst G1 (e,h) = 3, whch cn be preserved n G 2 wthout ddn (e,h), but we leve (e,h) there to vod costly dstnce queryn needed to exclude (e, h). The follown lemm shows the correctness of constructn G from G 1 s dscussed bove. LEMMA 2. Constructn G from G 1, where 2 h, by ddn umentn edes to the nduced subrph ofg 1 byv G, mntns the dstnce preservton property wth respect tog 1. PROOF. Accordn to Defnton 1, L 1 s the only set of vertces tht re n G 1 but mssn n G. For ny two vertces s nd t n G, suppose tht the shortest pth (n G 1) from s to t, SP G 1 (s,t) does not pss throuh ny vertex n L 1, then the dstnce between s nd t n G 1 s trvlly preserved n G. Next suppose SP G 1 (s,t) psses throuh some vertex v L 1. Let SP G 1 (s,t) = s,...,u,v,w,...,t. Then, we must hve the umentn ede (u,w) creted n G wth ω G (u,w) = ω G 1 (u,v) + ω G 1 (v,w), or ω G (u,w) = mn(ω G 1 (u,w),ω G 1 (u,v)+ω G 1 (v,w)) f(u,w) lredy exsts n G. Therefore, the dstnce (n G 1) between ny two vertces s preserved ng. In ddton to the dstnce preservton property tht s requred for nswern dstnce queres, the proof lso ves hnt on why we requre ech L to be n ndependent set of G. Snce there s no ede n G 1 between ny two vertces n L 1, to crete n umentn ede (u,w) n G we only need to do self-jon on the nehbors of the vertex v L 1. Thus, the serch spce s lmted to 2 hops from ech vertex. On the contrry, f n ede cn exst between two vertces n L 1, then to preserve the dstnce the serch spce s t lest 3 hops from ech vertex, whch s snfcntly lrer thn the 2-hop serch spce n prctce. Ths s crucl for processn lre rph tht cnnot ft n mn memory s we my need to scn the rph mny tmes to perform the jon, s we wll see n Secton Vertex Lbeln Wth the vertex herrchy (L,G), we now descrbe lbeln scheme tht cn fcltte fst computton of P2P dstnce. We frst defne the follown concepts necessry for the lbeln. Level number: ech vertexv V G s ssned level number, denoted byl(v), whch s defned sl(v) = ffv L. Ancestor: vertex u V G s n ncestor of vertex v f there exsts sequence S = v = w 1,w 2,...,w p = u, such tht l(w 1) < l(w 2) <... < l(w p), nd for 1 < p, the ede (w,w +1) E Gj where j = l(w ). Note tht v s n ncestor of tself. If u s n ncestor of v, then v s descendnt of u. EXAMPLE 2. In our exmple n Fure 1, the level numbers of c,f, re 1, tht of b,d,h re 2, tht of e s 3. The ncestors of f wll be e, h,,, snce (f,e) nd (f,h) re n G 1, (h,) s n G 2, nd (e,), (e,) re n G 3. Note tht d s not n ncestor of f snce n the pth f,e,d, l(e) = 3 whle l(d) = 2. The ncestor-descendnt reltonshps re shown n Fure 2(). We now defne vertex lbel s follows. DEFINITION 2 (VERTEX LABEL). The lbel of vertex v V G, denoted by LABEL(v), s defned s LABEL(v) = {(u,dst G(v,u)) : u V G s n ncestor of v}. To compute LABEL(v) for ll v V G, we need to compute the dstnce from v to ech of v s ncestors. Ths s n expensve process whch cnnot be scled to process lre rphs. To ddress ths problem, we defne relxed vertex lbel tht requres only n upper-bound,d(v,u), ofdst G(v,u) nd show thtd(v,u) suffces for nswern dstnce queres. DEFINITION 3 (RELAXED VERTEX LABEL). The relxed lbel of vertex v V G, denoted by lbel(v), s set of (u, d(v, u)) prs computed by the follown procedure: For ech v V G, we frst nclude (v,0) n lbel(v) nd mrk v. Then, we dd more entres to lbel(v) recursvely s follows. Tke mrked vertex u tht hs the smllest level number l(u), nd unmrk u. Let l(u) = j. For ech w dj Gj (u), where l(w) > j nd (w,d(v,w)) / lbel(v), dd the entry (w,(d(v,u) + ω Gj (u,w))) to lbel(v), nd mrk w. If the entry (w, d(v, w)) s lredy n lbel(v), updte d(v,w) = mn(d(v,w),(d(v,u) + ω Gj (u,w))). Repet the bove recursve process untl no more vertex s mrked. As for LABEL(v), lbel(v) contns entres for ll ncestors of v. In Secton 5, we wll show tht the new defnton fclttes the desn of n I/O-effcent lorthm for hndln lre rphs. Here, we further llustrte the concept usn n exmple, nd then prove tht lbel(v) cn ndeed be used nsted of LABEL(v) to correctly nswer P2P dstnce queres n the follown subsecton. () lbel(c) {(,2),(b,1),(c,0),(e,2),(,4)} lbel(f) {(,4),(e,3),(f,0),(,5),(h,1)} lbel() {(,2),(e,1),(,3),(,0)} lbel(b) {(,1),(b,0),(e,1),(,3)} lbel(d) {(,2),(d,0),(e,1),(,1)} lbel(h) {(,5),(e,4),(,1),(h,0)} lbel(e) {(,1),(e,0),(,2)} lbel() {(,0),(,3)} lbel() {(,0)} (b) Fure 2: Lbeln for the exmple n Fure 1 EXAMPLE 3. For our exmple n Fure 1, the ncestor reltonshps re shown n Fure 2(), where ll edes hve unt wehts unless ndcted otherwse. The lbeln strts wth L 1, for vertces c,f,, next L 2 vertces b,d,h re lbeled, followed by L 3 = {e}, L 4 = {}, nd L 5 = {}. Consder the lbeln for vertex c, frst, (c,0) s ncluded, snce dj G(c) = {b}, (b,1) s dded to lbel(c) nd b s mrked. b s unmrked by checkn ts nehbors ndeng 2, nd we nclude both (,2),(e,2) nto lbel(c), nd e re mrked. e s t level 3 nd s unmrked next. dj G3 (e) ={,}, we dd(,4) tolbel(c). Thens unmrked, ts only nehbor n G 4 s lredy n lbel(c), d(c,) s not updted. s mrked. Fnlly s unmrked, snce hs no nehbor ng 5, no further processn s requred. The lbels for ll vertces re shown n Fure 2(b). Note tht d(h, e) = 4 n lbel(h), whle dst G(h,e) = 3, hence d(h,e) > dst G(h,e). In enerl the dstnce vlue n lbel entry cn be reter thn the true dstnce. 3.3 P2P Dstnce Queryn We now dscuss how we use the vertex lbels to nswer P2P dstnce queres. We frst defne the follown lbel opertons used n query processn. Vertex extrcton: V[lbel(v)] = {u : (u,d(v,u)) lbel(v)}. 459

4 Lbel ntersecton: lbel(u) lbel(v) = V[lbel(u)] V[lbel(v)]. The bove two opertons pply n the sme wy tolabel(.). Gven P2P dstnce query wth two nput vertces, s nd t, let X =lbel(s) lbel(t), the query nswer s ven s follows. { mnw X {d(s,w)+d(w,t)} f X dst G(s,t) = f X = In Equton 1, we retreve d(s,w) nd d(t,w) for ech w X from lbel(s) nd lbel(t), respectvely. We ve n exmple of nswern P2P dstnce queres usn the vertces lbels s follows. EXAMPLE 4. Consder the exmple n Fure 1, the lbeln s shown n Fure 2. Suppose we re nterested n dst G(h,e). We look up lbel(h) nd lbel(e). lbel(h) lbel(e) = {e,,}. Amon these vertces, hs the smllest sum ofd(h,)+d(,e) = 1+2 = 3. Hence we return 3 s dst G(h,e). Note tht lthouh the dstnced(h,e) recorded nlbel(h) s 4, whch s reter thn dst G(h,e), the correct dstnce s returned. If we wnt to fnd dst G(,), lbel() lbel() = {}. Hence dst G(,) s ven by d(,)+d(,) = 3+0 = 3. Query processn usn the vertex lbels s smple; however, t s not strhtforwrd to see how the nswer obtned s correct for every query. In the remnder of ths secton, we prove the correctness of the query nswer obtned usn the vertex lbels. We frst defne the concept of mx-level vertex, denoted by v mx, of shortest pth, whch s useful n our proofs. Gven shortest pth fromstotng,sp G(s,t) = s = v 1,v 2,...,v p = t, v mx s the mx-level vertex of SP G(s,t) f v mx s vertex on SP G(s,t) nd l(v mx) l(v ) for 1 p. The follown lemm shows tht v mx s unque n ny shortest pth. LEMMA 3. Gven two vertces s nd t, f s nd t re connected n G, then for ny shortest pth SP G(s,t) between s nd t, there exsts unque mx-level vertex,v mx, of SP G(s,t). PROOF. If s nd t re connected n G, then t lest one shortest pth exsts between s nd t. Consder ny such shortest pth SP G(s,t), v mx must exst on SP G(s,t). Now suppose to the contrry tht v mx s not unque,.e., there exsts t lest one other vertex v on SP G(s,t) such tht l(v mx) = l(v) = j, whch lso mens tht both v mx nd v re n L j nd G j. Snce L j s n ndependent set of G j, there s no ede between v mx nd v n G j. Snce v mx nd v re on the sme pth SP G(s,t), they must be connected n G j nd the pth connectn them must pss throuh some nehboruofv mx orv ng j, whereus lso onsp G(s,t). Thus, u cnnot be n L j (otherwse the vertex ndependence property s volted) nd hence l(u) > l(v mx), whch contrdcts tht v mx s the mx-level vertex of SP G(s,t). Next we prove tht LABEL(.) cn be used to correctly nswer P2P dstnce queres. Then, we show how lbel(.) possesses the essentl nformton of LABEL(.) for the processn of dstnce queres. THEOREM 1. Gven P2P dstnce query wth two nput vertces, s nd t, let X = LABEL(s) LABEL(t), then dst G(s,t) = mn w X {dst G(s,w) + dst G(t,w)} f X, or dst G(s,t) = fx =. PROOF. We frst show tht f SP G(s,t) exsts, then v mx X. Consder sequence of vertces, S = s = u 1,u 2,...,u α = (1) v mx = v β,...,v 2,v 1 = t, extrcted from SP G(s,t), such tht l(u 1) < l(u 2) <... < l(u α) = l(v mx), l(v 1) < l(v 2) <... < l(v β ) = l(v mx), nd for 1 < α, ny vertex w between u ndu +1 onsp G(s,t) hsl(w) < l(u ), nd sme for ny vertex betweenv ndv +1. Note tht snceu +1 s the next vertex fteru wth l(u +1) > l(u ), we hve l(w) l(u ), nd l(w) l(u ) by the vertex ndependence property. Snce u nd u +1 re connected, they must exst toether n G l(u ). Snce there exsts no other vertex w between u nd u +1 on SP G(s,t) such tht l(w) l(u ), u nd u +1 re not connected by ny such w n G l(u ). Thus, by Lemm 1, the ede (u,u +1) must exst n G l(u ) for G l(u ) to preserve the dstnce between u nd u +1, whch mens tht for 1 j α, u j s n ncestor of s nd hence u j LABEL(s). Note tht u 1 = s LABEL(s) f α = 1. Smlrly, we hve v LABEL(t), for 1 β. Thus, v mx = u α = v β X nd hence dst G(s,t) = dst G(s,v mx)+dst G(t,v mx). The other cse s tht SP G(s,t) does not exst,.e., s nd t re not connected, nd we wnt to show tht X =. Suppose on the contrry tht there exsts w X. Then, t mens tht there s pth from s to w nd from t to w, mplyn tht s nd t re connected, whch s contrdcton. Thus, X = nd dst G(s,t) = s correctly computed. Theorem 1 revels two peces of nformton tht re essentl for nswern dstnce queres: the ncestor set nd the dstnce to the ncestors mntned n LABEL(.). We frst show tht lbel(.) lso encodes the sme ncestor set of LABEL(.). LEMMA 4. For ech v V G,V[lbel(v)] = V[LABEL(v)]. PROOF. Frst, we show tht fw V[LABEL(v)],.e.,ws n ncestor of v, then w V[lbel(v)]. Accordn to the defnton of ncestor, there exsts sequence S = v = w 1,w 2,...,w p = w, such tht l(w 1) < l(w 2) <... < l(w p), nd for 1 < p, (w,w +1) E Gl(w. Ths defnton mples tht f w s ) currently n V[lbel(v)], w +1 wll lso be dded to V[lbel(v)] ccordn to Defnton 3. Snce w 1 = v must be n V[lbel(v)], t follows tht w = w p s lso nv[lbel(v)]. Next, we show tht f w V[lbel(v)], then w V[LABEL(v)]. Frst, we hve v V[lbel(v)], v s lso n V[LABEL(v)]. Then, ccordn to Defnton 3, vertex w s dded to V[lbel(v)] only f w dj Gl(u) (u) for some u currently n V[lbel(v)], nd l(w) > l(u), nd snce u s n ncestor of v, t mples tht w s n ncestor of v nd hence w V[LABEL(v)]. Next, we show thtlbel(.) lso possesses the essentl dstnce nformton for correct computton of P2P dstnce. LEMMA 5. Gven P2P dstnce query, s nd t, let X = lbel(s) lbel(t). If SP G(s,t) exsts, then v mx X, d(s,v mx) = dst G(s,v mx) nd d(t,v mx) = dst G(t,v mx). PROOF. It follows from Lemm 4 tht lbel(s) lbel(t) = LABEL(s) LABEL(t). As the proof of Theorem 1 shows tht v mx LABEL(s) LABEL(t), we lso hve v mx X. The proof of Theorem 1 defnes sequence, S = s = u 1,u 2,...,u α = v mx = v β,...,v 2,v 1 = t, extrcted from SP G(s,t). In prtculr, the proof shows tht the ede (u,u +1) exsts n G l(u ) nd l(u +1) > l(u ), for 1 < α. Thus, ccordn to Defnton 3, we dd the entry (u +1,(d(s,u ) + ω Gl(u (u,u+1))) to lbel(s). Snce ech ) ωg (u,u+1) l(u ) preserves the dstnce between u nd u +1, nd d(s,u 1) = dst G(s,u 1), t follows thtd(s,v mx = u α) = dst G(s,v mx = u α). Smlrly, we hve d(t,v mx) = dst G(t,v mx). 460

5 Fnlly, the follown theorem sttes the correctness of query processn usn lbel(.). d d THEOREM 2. Gven P2P dstnce query,sndt,dst G(s,t) evluted by Equton 1 s correct. PROOF. The proof follows drectly from Theorem 1, Lemms 4 nd A K-LEVEL VERTEX HIERARCHY In Defnton 1, we do not lmt the heht h of the vertex herrchy,.e., the number of levels n the herrchy. Ths defnton ensures tht n ndependent setl cn lwys be obtned for ech G, for 1 h. However, when the ven rph s mssve, there re two problems ssocted wth the heht of the vertex herrchy. Frst, s the number of levels h ncreses, the lbel sze of the vertces t the lower levels (.e., vertces wth smller level number) lso ncreses. Snce vertex lbels requre store spce nd re drectly relted to query processn, there s need to lmt the vertex lbel sze. Second, s we wll dscuss n Secton 5, the complexty of constructn the vertex herrchy s lner n h. Thus, reducn h cn lso mprove the effcency of ndex constructon. In ths secton, we propose to lmt the heht h by k-level vertex herrchy, where k s normlly much smller thn h, nd dscuss how the bove-mentoned problems re resolved. 4.1 Lmtn the Heht of Vertex Herrchy The mn de s to termnte the constructon of the vertex herrchy erler t level when certn condton s met. We frst defne the k-level vertex herrchy. DEFINITION 4 (K-LEVEL VERTEX HIERARCHY). Gven rph G = (V G,E G,ω G), vertex herrchy structure H = (L,G) ofg, nd n nteer k, where 1 < k (h+1) nd h s the number of levels nh, k-level vertex herrchy structure of G s defned by pr (H <k,g k ), where H <k nd G k re defned s follows: H <k = (L <k,g <k ) conssts of the frst (k 1) levels of H,.e.,L <k = {L 1,...,L k 1 } ndg <k = {G 1,...,G k 1 }; G k s the sme G k s the G k ng. The k-level vertex herrchy smply tkes the frst (k 1) L L, for 1 < k, nd the frst k G G, for 1 k. We set the vlue of k s follows: let be the frst level such tht ( G / G 1 ) > σ, where σ (0 < σ 1) s threshold for the effect of G ; then, k =. Ifk = (h+1), thenh <k s smplyhndg k s n empty rph. In prctce, vlue of σ tht ttns resonble ndexn cost nd store use wll often ve k h. For the k-level vertex herrchy, we ssn the level number l(v) = for ech vertex v L(), where 1 (k 1), whle for ech vertex v V Gk, we ssn l(v) = k. In ths wy, we cn compute lbel(v) (or LABEL(v)) for ech vertex v V G n the sme wy s dscussed n Secton 3.2. Note tht lbel(v) = {(v,0)} for ech vertexv V Gk snce v hs the hhest level number mon ll vertces nv G. EXAMPLE 5. Let us consder our runnn exmple n Fure 1, f we set k = 2, there s only one level L 1 n L <k, the rph G 2 s the hhest level rph nd s not further decomposed. The k- level vertex herrchy s shown n Fure 3. The mxmum level of vertces s 2, snce ll vertces v ng 2 re ssned l(v) = 2. The lbels for the vertces nl 1 re shown n the follown tble. b c e f 1 1 h Fure 3: A k-level vertex herrchy (k = 2) lbel(c) {(b,1),(c,0)} lbel(f) {(e,3),(f,0),(h,1)} lbel() {(e,1),(,0)} 4.2 P2P Dstnce Queryn by k-level Vertex Herrchy Accordn to Secton 4.1, l(v) nd lbel(v) computed from the k-level vertex herrchy my be dfferent from those computed from the ornl vertex herrchy. However, we show lter n ths secton tht these lbels re hhly useful for they cpture ll the nformton tht s essentl fromg G k for contnued dstnce serch n G k. Gven P2P dstnce query, s nd t, we process the query ccordn to whether s nd t re n G k. We hve the follown two possble types of queres. Type 1: s / V Gk nd t / V Gk, nd ether (V[lbel(s)] V Gk ) = or (V[lbel(t)] V Gk ) =. Type 1 queres re evluted by Equton 1. Type 2: queres tht re not Type 1. Type 2 queres re evluted by lbel-bsed b-djkstr serch procedure. We hve dscussed query processn by Equton 1 n Secton 3.3. We now dscuss how we process Type 2 queres s follows Lbel-bsed b-djkstr Serch We descrbe bdrectonl Djkstr s lorthm tht utlzes vertex lbels for effectve prunn. The lorthm conssts of two mn stes: (1) ntlzton of dstnce queues nd prunn condton, nd (2) snle bdrectonl Djkstr serch. As shown n Alorthm 1, we frst ntlze forwrd nd reverse mn-prorty queue, FQ nd RQ, whch re to be used for runnn Djkstr s snle-source shortest pth lorthm from s nd t, respectvely. For ny vertex v V Gk, f (v,d(s,v)) lbel(s), we dd(v,d(s,v)) to FQ wthd(s,v) s the key. For ll other vertces n V Gk but not n lbel(s), we dd the record (v, ) to FQ. Smlrly, we ntlze RQ. The vertex lbels cn lso be used for prunn the serch spce. If there exsts pth between s nd t tht psses throuh some vertex w (V G V Gk {s,t}), then Lnes 5-6 ntlzes µ s the mnmum lenth of such pth. Note tht µ dst G(s,t). We now descrbe Ste 2 of the query processn. We run Djkstr s lorthm smultneously from s nd t by extrctn the vertex v wth the mnmum key from FQ or RQ (Lne 9). Let (v,d(x,v)) be the extrcted record, where x = s f the record s extrcted from FQ ndx = t otherwse. At ths pont, Djkstr s lorthm urntees tht the dstnce from x to v s found,.e., d(x,v) = dst G(x,v). Then, n Lnes 13-18, the dstnce from x to every nehbor u of v n G k s updted, f u s stll n FQ (f x = s) or RQ (fx = t). In ddton to strtn the serch n both drectons from s nd t n Djkstr s lorthm, we lso dd prunn condton n Lne b e 2 h 461

6 Alorthm 1: Lbel-bsed b-djkstr Serch Input :s,t,lbel(s), lbel(t), G k Output :dst G (s,t) // Ste 1: ntlzton of dstnce queues nd prunn condton // FQ (RQ): forwrd (reverse) mn-prorty queue 1 ntlze FQ wth the set{(v,d(s,v)) : v V Gk, (v, d(s, v)) lbel(s)}, wth d(s, v) s the key; 2 ntlze RQ wth the set{(v,d(t,v)) : v V Gk, (v,d(t,v)) lbel(t)}, wth d(t,v) s the key; 3 v V G nd v not n FQ(RQ), nsert (v, ) nto FQ(RQ); // µ: shortest dstnce from s to t found so fr // µ s used for prunn n Ste 2 4 µ ; 5 X lbel(s) lbel(t); 6 f X then µ mn w X {d(s,w)+d(w,t)}; // Ste 2: bdrectonl Djkstr serch 7 S ; 8 whle both FQ nd RQ re not empty, nd (mn(fq)+mn(rq)) < µ do 9 (v,d(x,v)) extrct-mn(fq,rq) ; // x = s or x = t 10 let x = t f x = s, nd x = s f x = t; 11 f v,dst G (x,v) s not n S then 12 nsert v,dst G (x,v) nto S; 13 forech u dj Gk (v) do 14 f d(x,u) > d(x,v)+ω Gk (v,u) then 15 d(x,u) d(x,v)+ω Gk (v,u); 16 updte d(x,u) n FQ (f x = s) or RQ (f x = t); 17 f u,dst G (x,u) s n S then 18 µ mn{µ,d(x,u)+dst G (x,u)}; 19 return µ; 8 tht requres the sum of the mnmum keys of FQ nd RQ to be less thn µ. If ths sum s not less thn µ, then t mens tht no pth from s to t of shorter dstnce thn µ cn be found (proved n Theorem 4) nd hence we returndst G(s,t) = µ. To mprove the prunn effect so s to convere the serch quckly, we keep updtn µ whenever d(x, u) s updted f dst G(x,u) hs been found (Lnes 17-18), snce u s potentl vertex on SP G(s,t). We use set S to keep set of vertces whose dstnce from s or t hs been found. Whenever dst G(x,v) s found for vertex v, f v s not yet n S, we nsert v, toether wthdst G(x,v), ntos. We ve n exmple to llustrte how queres re processed s follows. EXAMPLE 6. Let us consder Exmple 5. Suppose we need to process dstnce query between vertcescnd,.e. s = c,t =. In lbel(c), b s n G k, nd therefore we enter (b,d(c,b) = 1) nto FQ. In lbel(), e s n G k, hence we enter (e,d(,e) = 1) nto RQ. lbel(c) lbel() = φ, hence µ = fter Ste 1 of Alorthm 1. In Ste 2, let us extrct (b,1) from FQ frst, b, 1 s nserted nto S, nd we enter (, 2), (e, 2), nto F Q. Next we extrct (e,1) from RQ, nd nsert e,1 nto S. (,2), (d,2), (b,2) re entered nto RQ. Snce b s n S, we updte µ to = 3. At ths pont (mn(fq) + mn(rq)) > µ nd we return dst G(c,) = Correctness We now prove the correctness of query processn by thek-level vertex herrchy. We frst prove the correctness for processn Type 1 queres. THEOREM 3. Gven P2P dstnce query, s nd t, f the query belons to Type 1, thendst G(s,t) evluted by Equton 1 s correct. PROOF. Frst, we show tht f the query belons to Type 1, then SP G(s,t) does not contn ny vertex n V Gk. Suppose on the contrry tht SP G(s,t) contns vertex n V Gk. Then, consder the sub-pth of SP G(s,t) from s to x, where x s the only vertex on the sub-pth tht s nv Gk. SnceSP G(s,t) s shortest pth n G, ths sub-pth s shortest pth fromstoxng. LetSP G(s,x) be the sub-pth. Consder the query wth two nput vertces s nd x; then, by smlr rument s n the proof of Lemm 3 we hve v mx = x onsp G(s,x), nd by smlr rument s n the proof of Lemm 5 we hve x = v mx V[lbel(s)]. A symmetrc nlyss on the sub-pth from t to some vertexy, where y s the only vertex on the sub-pth tht s nv Gk, shows tht y = v mx on SP G(t,y) ndy V[lbel(t)]. Ths contrdcts the defnton of Type 1 query tht ether (V[lbel(s)] V Gk ) = or (V[lbel(t)] V Gk ) =. Now f SP G(s,t) does not contn ny vertex n V Gk, then the query cn be nswered usn only lbel entres of vertces from the frst (k 1) levels of the vertex herrchy. These entres wll hve dentcl occurrences nd contents n the vertex lbels t the frstk levels of ny vertex herrchy H <j, where k j h + 1, whch s formed by lmtn the heht of ven H. Thus, the correctness of query nswer follows from Theorem 2. Note tht Type 1 queres exst only f there exst more thn one connected component n G such tht ll vertces n some connected component(s) hve level number lower thn k. Next we prove the correctness for processn Type 2 queres. THEOREM 4. Gven P2P dstnce query, s nd t, f the query belons to Type 2, then dst G(s,t) evluted by the lbel-bsed b-djkstr serch procedure s correct. PROOF. We hve two cses: (1)SP G(s,t) does not contn ny vertex nv Gk, or (2) otherwse. If SP G(s,t) does not contn ny vertex n V Gk, then dst G(s,t) s computed n Lnes 5-6 of Alorthm 1, or n other words by Equton 1. As explned n the proof of Theorem 3, the correctness of query nswer follows from Theorem 2. If SP G(s,t) contns t lest one vertex n V Gk, then consder the two subpths,sp G(s,x) ndsp G(t,y), defned n the proof of Theorem 3 (note tht t s possble s = x nd/or x = y nd/or y = t). dst G(s,x) nd dst G(t,y) cn be nswered usn only lbel entres of vertces nl <k nd ther ncestors ng k for (H <k,g k ). From the lbeln mechnsm, the occurrences nd contents of such lbel entres wll be dentcl n the lbels of vertces n the frst k levels of ny vertex herrchy H <j, k j h + 1, whch s formed by lmtn the heht of ven H. Hence by Theorem 2, dst G(s,x) nd dst G(t,y) re correctly ntlzed n Lnes 1-3 of Alorthm 1. Thus, f we do not consder the prunn condton n Lne 8, then Djkstr s lorthm urntees the dstnce from s (ndt) to ny vertex ng k correctly computed, from whch we cn obtn dst G(s,t). Now we consder query processn wth prunn. Let µ = µ, nd mn f = mn(fq) nd mn r = mn(rq), when the serch stops. If µ s the vlue of µ ntlzed n Lne 6, then we must hve x = y (lbel(s) lbel(t)) nd hence µ = (dst G(s,x) + dst G(t,x)). Otherwse, µ s vlue ssned to µ n Lne 18 nd suppose to the contrry tht there exsts shorter pth between s nd t wth lenth p such tht p < µ. Snce the pth psses throuh vertces n G k, there must exst n ede (v,u) ng k such thtp = dst G(s,v)+ω Gk (v,u)+dst G(u,t), dst G(s,v) < mn f nd dst G(u,t) < mn r. The exstence of 462

7 ths ede s urnteed becuse p < µ (mn f +mn r). Snce dst G(s,v) < mn f nd dst G(u,t) < mn r, by Djkstr s lorthm, bothdst G(s,v) nddst G(t,u) hve been computed when the serch stops. Thus, µ should hve been updted to vlue not reter thn p n Lne 18 when the ede (v, u) ws processed. Ths contrdcts our ssumpton nd hence µ = dst G(s,t). 4.3 Hndln Drected Grphs To hndle drected rphs, we need to mke the follown chnes. Let us use (u,v) to ndcte drected ede from u to v n ths subsecton. The concept of ndependent set cn be ppled n the sme wy by smply norn the drecton of the edes. However, for dstnce preservton, we crete n umentn ede (u,w) t G only f v L 1 such tht (u,v),(v,w) E G 1. We dstnush two types of ncestors for vertex v: n-ncestors nd out-ncestors. The defnton of n-ncestors s smlr to tht of ncestors n undrected rphs, except tht we only consder edes from hher-level vertces to lower-level vertces. Anloously, the defnton of out-ncestors concerns edes on from lower-level vertces to hher-level vertces. The lbeln needs to hndle two drectons. For ech vertex v, we need two types of lbels defned s follows. The n-lbel of vertex v V G, denoted by LABEL n(v), s defned s LABEL n(v) = {(u,dst G(u,v)) : u V G s n n-ncestor of v}. The out-lbel of vertex v V G, denoted by LABEL out(v), s defned s LABEL out(v) = {(u,dst G(v,u)) : u V G s n out-ncestor of v}. Gven P2P dstnce query wth two nput vertces, s nd t, we compute X = LABEL out(s) LABEL n(t) nd then nswer the query n the sme wy s ven n Equton ALGORITHMS In ths secton, we present the lorthms for ndex constructon (.e., vertex herrchy constructon nd vertex lbeln) nd query processn usn the vertex lbels. In recent yers, due to the prolferton of mny mssve rel world networks, there hs been n ncresn nterest n lorthms tht hndle lre rphs. For processn lre rphs tht cnnot ft n mn memory, I/O cost usully domntes. Thus, we propose I/O-effcent lorthms, from whch the n-memory lorthms cn lso be esly devsed. For the nlyss of the I/O complexty n ths secton, we defne the follown notton [5]. Let scn(n) = Θ(N/B) nd sort(n) = Θ( N lo B M/B N ), where N s the mount of dt ben red or wrtten from/to dsk, M s the mn memory sze, nd B B s the dsk block sze (1 B M/2). 5.1 Alorthm for Index Constructon Althouh the vertex herrchy, except G k, s not requred for query processn, t s needed for vertex lbeln. The vertex herrchy conssts of two components, L nd G; thus we hve two mn steps: (1) computn ech ndependent vertex set L L, nd (2) constructn ech dstnce-preservn rph G G. We frst descrbe these two steps, followed by the constructon of the overll vertex herrchy, nd fnlly the vertex lbeln Constructn L We wnt to mxmze the sze of ech L s ths helps to mnmze the number of levels h nd hence lso mnmzes the vertex lbel sze. However, mxmzn L mens computn the mxmum ndependent set of G, whch s n NP-hrd problem. We dopt reedy strtey to pproxmte the set of mxmum ndependent set ofg by selectn the vertex wth mnmum deree t ech step [21], snce smll deree vertces hve smller number Alorthm 2: Constructn L Input : A rph G = (V G,E G,ω G ) Output :L nd ADJ(L ) = {dj G (v) : v L } 1 llocte buffer for L nd ADJ(L ), nd buffer for L ; 2 G G ; 3 sortdj G (v) n G n scendn order of de G (v); 4 forech dj G (u) red n G do 5 f u L then 6 nsert u nto L, nd nsert dj G (u) nto ADJ(L ); 7 forech v dj G (u) do 8 f v L then nsert v nto L ; 9 f buffer for L nd ADJ(L ) s full then flush the buffer; 10 f buffer for L s full then 11 scn G to delete ll v L nd dj G (v), nd cler L ; Alorthm 3: Constructn G Input :G 1, L 1 nd ADJ(L 1 ) Output :G 1 G G 1 ; 2 remove fromg ll v L 1 nd dj G 1 (v); 3 E A ; 4 forech dj G 1 (v) ADJ(L 1 ) do 5 forech u,w dj G 1 (v), where u < w do 6 nsert nto E A the edes (u,w) nd (w,u), wth ω G (u,w) = ω G (w,u) = (ω G 1 (u,v)+ω G 1 (v,w)); 7 sort the edes n E A by vertex ID s; 8 scn E A nd G to dd ech ede (u,w) E A to G, or updte ω G (u,w) wth the smller weht f (u,w) lredy exsts n G ; of dependent (.e., djcent) vertces nd hence more vertces re left s cnddtes for ndependent set t the next step. Moreover, the reedy lorthm cn lso be esly extended to ve n I/Oeffcent lorthm tht hndles the cse when G s too lre to ft n mn memory, s descrbed n Alorthm 2. The lorthm computes n ndependent set L of G, toether wth the djcency lsts of the vertces nl, denoted byadj(l ). We use ADJ(L ) to construct G +1 n Secton To compute L, we lso keep those vertces tht hve been excluded froml n the lorthm, s denoted byl. We use buffer to keep the current L nd ADJ(L ), nd nother buffer to keep L. The lorthm frst mkes copy of G, let t be G, nd then sorts the djcency lsts n G n scendn order of the vertex derees (.e., the szes of the djcency lsts). Then, we red G n ths sorted order,.e., the djcency lsts of vertces wth smller derees re red frst. For ech dj G (u) red, f u s not n L, we nclude u ntol nd dd dj G (u) to ADJ(L ). Menwhle, we exclude ll vertces n dj G (u) from L becuse of ther dependence wth u,.e., we dd these vertces to L. The lorthm termntes when dj G (u) for llung re red. If G s very lre, t s possble tht L nd ADJ(L ) re too lre to be kept by memory buffer. We cn smply wrte the currentl ndadj(l ) n the buffer to dsk, nd then cler the buffer for new contents of L nd ADJ(L ). However, when the buffer for L s full, we cnnot smply flush the buffer snce t s possble tht u L, dj G (u) hs not been red yet. To tckle ths wthout ncurrn rndom dsk ccesses, we scn G to remove ll the vertces currently n L, toether wth ther djcency lsts, from G, becuse these vertces hve lredy been excluded from L. 463

8 Then, we cler the buffer for L. IfG cn be resdent n mn memory, Lnes of Alorthm 2 re not necessry nd we only need to scn G once. If G s resdent on dsk, t s esy to see tht only sequentl scns of G re needed nd expensve rndom dsk ccess s voded. Alorthm 2 tkes sort( G ) I/Os to sort G. If L < M, we need notherscn( G ) I/Os to redg. Otherwse,O( L /M) scn( G ) I/Os re requred Constructn G After obtnnl 1 ndadj(l 1), we use them to construct G. As shown n Alorthm 3, we frst ntlze G by removn the occurrences of ll vertces n L 1, toether wth ther djcency lsts, from G 1. However, the resultnt G my not stsfy the dstnce preservton property. As dscussed n Secton 3.1, the volton to ths property cn be fxed by the creton of set of umentn edes. We crete these umentn edes from ADJ(L 1) s follows. When vertexv L 1, toether wthdj G 1 (v), s removed from G 1 to form G, wht s mssn n G s the pth u,v,w for ny u,w dj G 1 (v), where u < w (.e., u s ordered before w). Thus, to preserve the dstnce we only need to crete the umentn ede (u, w), nd symmetrclly (w, u) for undrected rphs, wth weht (ω G 1 (u,v)+ω G 1 (v,w)). We crete ll such umentn edes n Lnes 4-6 of Alorthm 3 nd store them n n rry E A. Then, we sort the edes n E A frst n scendn order of the frst vertex nd then of the second vertex. Then, we scn both E A nd G (lredy sorted n ts djcency lst representton), so tht ech ede n E A s mered nto G. If n ede ne A s lredy ng, then ts weht s updted to the smller vlue of ts weht recorded n E A nd n G. In ddton we cn dopt the prunn method n [13] to prune umentn edes bsed on trnle nequlty. If mn memory s not suffcent, Lne 2 of Alorthm 3 uses O( L 1 /M) scn( G 1 ) I/Os, f E A < G then Lnes 3-6 nd 8 use scn( G ) I/Os, nd Lne 7 uses sort( G ) I/Os, else we my sort prtl E A ech tme t flls up memory nd then scn G, so the IO cost so( E A /M)scn( G ) Constructn (L, G) The overll scheme to construct the vertex herrchy, (L, G), s to strt wth the ven G 1 = G, nd keep repetn the two steps of computn L (Alorthm 2) nd constructn G (Alorthm 3) untl we rech level k (see Secton 4.1 for the vlue of k) Top-Down Vertex Lbeln Defnton 3 essentlly defnes procedure for computn lbel(v) for ech v V G. However, creful nlyss wll show tht such procedure, f mplemented drectly s t s descrbed, nvolves much redundnt processn s mpled by the follown corollry of Lemm 4. COROLLARY 1. Gven vertexv L, we hvev[lbel(v)] = {v} ( u dj G (v) V[lbel(u)]). PROOF. By Defnton 3, u dj G (v), u wll be ncluded nto V[lbel(v)]. From the result of Lemm 4, we hve u V[lbel(v)], u s n ncestor of v by Defnton 2. In the sme wy, we hve w V[lbel(u)], w V[lbel(v)] snce w s then lso n ncestor of v. Thus, u dj G (v), V[lbel(u)] V[lbel(v)]. Next, w V[lbel(v)]\{v}, w V[lbel(u)] for some u dj G (v) becuse w s ncluded nto V[lbel(v)] from some u by Alorthm 4: Top-Down Vertex Lbeln Input :(L,G) Output :lbel(v), v V G // Intlzton of vertex lbels 1 for = 1,...,k 1 do 2 forech v L do 3 lbel(v) {(v,0)} {(u,ω G (v,u)) : u dj G (v)}; 4 v V Gk : lbel(v) {(v,0)}; // Top-down vertex lbeln 5 for = k 1,...,1 do 6 llocte buffer B L nd lod lbel(v), for ech v L, n B L ; 7 llocte buffer B U nd lod lbel(v), for ech v L j for < j < k nd for ech v V Gk, n B U ; 8 forech block B L do 9 forech block B U do 10 forech lbel(v) n B L do 11 forech lbel(u) n B U do 12 f (u, d(v, u)) lbel(v) then 13 forech (w,d(u,w)) lbel(u) do 14 f (w, d(v, w)) lbel(v) then 15 dd (w,d(v,u)+d(u,w)) to lbel(v); 16 else 17 d(v,w) = mn(d(v, w), d(v, u)+d(u, w)); Defnton 3, nd by the sme procedure w wll be ncluded nto V[lbel(u)] when we compute lbel(u). Corollry 1 mples tht lbel(v) cn be computed from lbel(u), for ech u dj G (v), nsted of from scrtch. Bsed on ths, we desn more effcent top-down lorthm for vertex lbeln s shown n Alorthm 4. The lorthm conssts of two stes: ntlzton of vertex lbels nd top-down vertex lbeln by block nested loop jon, dscussed s follows. Accordn to Corollry 1, we only need to dd (v,0) nd (u,ω G (v,u)) for ll u dj G (v) to lbel(v), nd then derve other entres of lbel(v) from lbel(u) n the top-down process. For echv V Gk, however, we only need to dd(v,0) tolbel(v) snce ech v V Gk hs only one ncestor,.e.,v tself. After the ntlzton, we compute the lbels for the vertces strtn from the top levels to the bottom levels,.e., from level(k 1) down to level 1. We ssume tht the set of lbels t ech level my not be ble to ft n mn memory nd hence use block nested loop jon to fnd the mtchn lbels,.e., lbel(u) for ech u dj G (v) when we process v t level. Note tht fu dj G (v), then (u,d(v,u)) lbel(v) by the ntlzton. Thus, s shown n Lnes 11-16, we derve the entres of other ncestors of v from lbel(u) drectly, whch essentlly follows the rule specfed n Defnton 3. The complexty of the lorthm s pprently domnted by the top-down process. Let b L() = {lbel(v) : v L }, nd b U() = <j<k {lbel(v) : v Lj} {lbel(v) : v VG }. k The I/O complexty for the block nested loop jon s ven by (b L()/M) (b U()/B). Thus, the I/O complexty of Alorthm 4 s ven by O( k 1 =1 ((bl()/m) (bu()/b))). 5.2 Alorthm for Query Processn 464

9 For processn lre dtsets, the vertex lbels my not ft n mn memory nd re stored on dsk. The entres n ech lbel(v) re stored sequentlly on dsk nd re sorted by the vertex ID s of the ncestors of v. Thus, lbel(s) lbel(t) nvolves smple sequentl scnnn of the entres n lbel(s) nd lbel(t). From our experments, the vertex lbels re smll n sze nd retrevn vertex lbel from dsk tkes only one I/O. The CPU tme for query processn comes mostly from the b-djkstr serch. For rph G = (V,E), bnry hep cn be used nd Djkstr s lorthms runs no(( E + V )lo V ) tme. 6. EXPERIMENTAL EVALUATION We evlute the performnce of our method nd compre wth other relted methods for processn P2P dstnce queres [23, 39]. All methods tested were prormmed n C++ nd compled wth the sme compler. All experments were run on computer wth n Intel 3.3 GHz CPU, 4GB RAM nd 7200 RPM SATA hrd dsk, runnn Ubuntu Lnux OS. We use both undrected nd drected rel dtsets. For the undrected dtsets: BTC s semntc rph converted from the Bllon Trple Chllene 2009 RDF dtset (vmlon25.der.e/), where ech vertex represents n object such s person, document, nd n event, nd ech ede represents the reltonshp between two nodes such s hs-uthor, lnks-to, nd hs-ttle. Web (brcelon.reserch.yhoo.net/webspm) s subrph of the UK Web rph, where vertces re pes nd edes re hyperlnks. The ornl rph G s drected nd converted nto undrected rph G s follows: f two vertces re rechble from ech other wthn w hops n G, where w {1,2}, they hve n undrected ede wth weht w n G. Snce there re mny connected components n G, we extrct the lrest connected component. As- Sktter s n Internet topoloy rph from trceroutes run dly n 2005 (www.cd.or/tools/mesurement/sktter). Eml-Enron s the communcton network from Enron. C-Astroph s the collborton network of Arxv Astro Physcs. The homo nd erdos dtsets re bolocl network nd socl network from [39]. For the drected rphs: ukweb s subrph of the UK Web rph. The wk-tlk rph s communcton network from Wkped. Eml-EuAll s the eml network from EU reserch nsttuton. Soc-sn-slshdot nd soc-epnons re socl networks. The p2p rph s the Gnutell peer to peer network. Ct-HepPh s the Arxv Hh Enery Physcs pper ctton network. The wk-vote rph s the Wkped who-votes-on-whom network. More detls of the follown dtsets cn be found n (snp.stnford.edu): s- Sktter, eml-enron, -Astroph, wk-tlk, eml-euall, soc-snslshdot, soc-epnons, p2p, ct-hepph, nd wk-vote. We lst the dtsets n Tble Comprson wth Other Methods We compre wth two most recent works on pont-to-pont dstnce queryn, HCL [23] for drected rphs nd TEDI [39] for undrected rphs. In [23, 39], HCL nd TEDI were shown to outperform other exstn methods for dstnce queryn n drected nd undrected rphs, respectvely. Snce IS-Lbel uses bdrectonl Djkstr serch (BDIJ) n G k, we lso report the results of BDIJ on the ornl rph G s reference. We use σ = 0.95 s our defult threshold n IS-Lbel to obtn G k,.e., when ( G / G 1 ) > σ, we set k =. To ssess query performnce, we rndomly enerte 1000 queres n ech dtset nd compute the vere query tme. Tble 2 reports both the ndexn performnce nd query performnce of ll the methods. The results clerly show tht IS-Lbel snfcntly outperforms both HCL nd TEDI n ll spects. Frst, V E Av. de Mx. de Dsk sze Undrected rphs BTC 164.7M 361.1M , GB Web 6.9M 113.0M , GB s-sktter 1.7M 22.2M , MB Eml-Enron 37K 368K , MB c-astroph 19K 396K MB homo 7K 40K MB erdos 7K 24K MB Drected rphs ukweb 105.9M 297.4M , GB wk-tlk 2.4M 5.0M , MB Eml-EuAll 265K 419K , MB soc-sn-slshdot 77K 517K ,532 8MB soc-epnons 76K 509K , MB p2p 63K 148K MB ct-hepph 35K 421K MB wk-vote 7K 104K MB Tble 1: Rel dtsets IS-Lbel s fr more sclble thn HCL nd TEDI. IS-Lbel cn process rphs up to three nd four orders of mntude lrer thn those HCL nd TEDI cn hndle. For most of the rphs tested, we were not ble to obtn the result for HCL nd TEDI due to the prohbtvely hh cost of ll-prs shortest pth computton. Second, even for processn those smll rphs whch HCL nd TEDI cn hndle, both the ndexn tme nd queryn tme of IS-Lbel re up to orders of mntude shorter thn those of HCL n ll cses. TEDI s fster n ndexn thn IS-Lbel but TEDI s only ble to hndle very smll rphs wth only 7K vertces. For the reltvely smller rphs, IS-Lbel obtns complete vertex herrchy,.e.,k = (h+1) ndg k s n empty rph, but the ndexn process s stll very fst. The lbel sze s n enerl lrer thn when we hve non-empty G k, but the lrest overll lbel sze s only round 1 GB whch s certnly cceptble. Note tht f store spce s crtcl, we cn esly lmt the heht of the vertex herrchy to obtn smller lbel sze, s we hve done for the lre rphs. Ths shows the flexblty of our lbeln scheme for processn rphs of dfferent szes nd/or computn resources. Compred wth BDIJ, IS-Lbel s snfcntly fster for processn ll dtsets. The need for n ndex becomes clerer for processn lrer rphs. For processn the dtsets BTC nd ukweb, we could not obtn the result for BDIJ snce the memory consumpton of BDIJ exceeds the mn memory cpcty. In concluson, our lbeln scheme s b step forwrd n the development of n effcent ndex for nswern pont-to-pont dstnce queres n rel world enerl rphs (both drected nd undrected). Ths s evdent from the results tht IS-Lbel s ble to hndle rphs up to three nd four orders of mntude lrer thn the lrest rphs used to test HCL [23] nd TEDI [39], respectvely. Furthermore, even for processn smll rphs, IS-Lbel lso snfcntly outperforms the most recent work, HCL [23], n ll spects. 6.2 Effect of Grph Densty In ths experment, we exmne the effect of densty on the performnce of IS-Lbel. We enerte two types of synthetc rphs usn the rph enertor provded by [40]: the preferentl ttchment model (modeln rphs wth power-lw deree dstrbuton) [10], nd the smll world model (modeln rphs wth short vere dstnce nd smll communtes) [38]. We fx the rph sze to 1 mllon vertces nd vry the vere deree of the vertces from 5 to 80. We report the totl lbel sze for ech vere deree vlue n Fure 4. The ndexn tme nd query tme follow smlr trend s the lbel sze. 465

10 k V Gk E Gk lbel Index sze Indexn tme (s) Query tme (ms) Dt rphs IS-Lbel HCL TEDI IS-Lbel HCL TEDI IS-Lbel HCL TEDI BDIJ Undrected BTC 6 134K 16.4M GB Web K 14.5M GB s-sktter 6 86K 8.5M MB Eml-Enron MB 46.4MB c-astroph MB 78.4MB homo MB 9.4MB 27.9MB erdos MB 2.2MB 1.9MB Drected ukweb M 54.5M GB n n n.. wk-tlk 4 14K 1.1M MB n n n Eml-EuAll K MB n n n soc-sn-slshdot GB n n n soc-epnons GB n n n p2p MB n n n ct-hepph MB 63.9MB n n n wk-vote MB 2.6MB n n n Tble 2: Performnce results of IS-Lbel, HCL, TEDI, nd B-Djkstr (BDIJ): the sze of G k nd vere number of entres per lbel, lbel, of IS-Lbel; nd the totl ndex sze, totl ndexn tme, nd vere query tme of ll methods. The results show tht our lbel sze s not snfcntly ncresed when the densty ncreses for both preferentl ttchment nd smll-world models. The more rpd ncrese n the lbel sze when the deree ncreses from 5 to 20 s becuse lrer k,.e., more levels n the vertex herrchy, s computed for smller rphs. However, when the densty becomes lrer, the ncrese n the lbel sze becomes smll. Lbel sze (MB) Preferentl Attchment Smll World Avere deree Fure 4: Performnce results of densty chne 6.3 Effect of k-level Vertex Herrchy For hndln lre rphs, IS-Lbel restrcts the number of levels n the vertex herrchy to k n order to combt the ncresn lbel sze, nd then run the b-djsktr lorthm ong k. In ths experment, we test the effect of k on the performnce. In prtculr, we exmne whether G k s too dense for the b-djsktr lorthm to be effcent. We report the results n Tble 3, where we use the two lrer rphs BTC nd Web to demonstrte the effect of k (the results on other dtsets re smlr). The vlue of k computed by our lorthm s 6 nd 19 for BTC nd Web, respectvely. And we mnully set 4 k 8 nd 15 k 23 to test the effect. The results show tht for ny two level numberk1 ndk2, where k1 < k2, G k2 s denser thn tht of G k1. The ncrese n densty s lrely due to the decrese n the vertex number, but the overll sze (n terms of both ede number nd vertex number) of G k2 s smller thn tht of G k1. Thus, s k ncreses, b-djkstr runs on denser but smller rph G k2. As shown by Qtme-2 n Tble 3, b-djkstr s stll fster ng k2 thn ng k1, thouh G k2 s denser. The overll query tme,.e., the sum of Qtme-1 nd Qtme-2, ncreses s k ncreses. Ths s mnly due to the fct tht the lbel sze ncreses when k ncreses,.e., the number of levels n k V Gk E Gk Lbel Indexn Qtme-1 Qtme-2 sze tme (s) (ms) (ms) BTC 4 232K 18.7M 3.8 GB BTC 5 167K 17.2M 4.9 GB BTC 6 134K 16.4M 7.1 GB BTC 7 114K 15.8M 11.2 GB BTC 8 100K 15.4M 18.1 GB Web K 17.8M 5.8 GB Web K 16.0M 7.1 GB Web K 14.5M 8.1 GB Web K 13.2M 9.0 GB Web K 12.2M 9.9 GB Tble 3: Performnce results of dfferent k: the sze of G k nd lbel, ndexn tme, Qtme-1 for the tme tken to process the lbels nd Qtme-2 for the tme to run b-djsktr ng k the vertex herrchy ncreses. Thus, the tme to retreve the lbels from dsk (ledn to hh I/O cost) nd to ntersect the lbel sets,.e., Qtme-1, becomes more expensve. However, we note tht fk s too smll, t becomes very costly to run b-djkstr n G k. For exmple, t tkes ms to run b-djkstr n G 0 = G for the Web rph, whch s lrer thn the sum of Qtme-1 nd Qtme-2 for nyk shown n Tble 3. Fnlly, we cn lso see from the tble tht the vlue of k computed by our lorthm s effectve. In fct, for the Web rph, k = 19 computed by our lorthm s the optml vlue. 7. LIMITATIONS OF EXISTING WORK We hhlht the chllenes of computn P2P dstnce by dscussn exstn pproches nd ther lmttons. 7.1 Indexn Approches Cohen et l. [16] proposed the 2-hop lbeln tht computes for ech vertex v two sets, L n(v) nd L out(v), where for ech vertex u L n(v) nd w L out(v), there s pth from u to v nd from v to w. The dstnces dst G(u,v) nd dst G(v,w) re pre-computed. Gven dstnce query, s nd t, the ndex ensures tht dst G(s,t) cn be nswered s mn v (Lout(s) Ln (t)){dst G(s,v)+dst G(v,t)}. However, computn the 2-hop lbeln, ncludn the heurstc lorthms [15, 35], s very costly for lre rphs. Xo et l. [41] explot symmetrc structures n n unwehted undrected rph to compress BFS trees to nswer dstnce queres. However, the overll sze of ll the compressed BFS trees s prohbtvely lre even for medum szed rphs. 466

11 We [39] proposed n ndex bsed on tree decomposton of n undrected rph G, where ech node n the tree stores set of vertces n G. The dstnce between ech pr of vertces stored n ech tree node s pre-computed, so tht queres cn be nswered by consdern the mnmum dstnce between vertces stored on smple pth n the tree. However, the number of vertces stored n the root node s lre nd thus the pr-wse dstnces for these vertces re expensve to compute nd requre hue store spce. As result, the method cnnot scle to hndle lre rphs. The lbeln method n [16] s very costly. Jn et l. [23] proposed to use spnnn tree s hhwy structure n drected rph, so tht dstnce from s tots computed s the lenth of the shortest pth from s to some vertex u nd v the hhwy (.e., pth n the spnnn tree) to some vertex v, nd from v to t. Every vertex s ven lbel so tht set of entry ponts n the hhwy (e..,u) nd set of ext ponts (e..,v) cn be obtned. However, the lbeln requres ll prs shortest pths to be computed nd s too costly for processn lre rphs. Chen et l. [13] proposed the VC-ndex for computn the dstnces from source vertex to ll other vertces. The use of vertex cover n [13] hs nspred the use of ndependent set n our method. An ndependent set s the complement of vertex cover n rph. VC-ndex cn be used to nswer P2P dstnce queres f we force the serch from source s to stop when httn tret t. However, ther method s not lbeln technque nd much computton wll be wsted n computn the dstnces from the source to mny rrelevnt vertces. Vertex cover hs lso been used for nswern k-hop rechblty queres [14], t s lso not lbeln method. The problem of P2P dstnce queryn hs been well studed for rod networks. Abrhm et l. [2] recently proposed hub-bsed lbeln lorthm, whch s the fstest known lorthm n the rod network settn. Other fst lorthms such s [32], [18], nd [9] re lso bsed on the concept of hhwys to reduce the serch spce. However, t hs been shown n [4] nd [1] tht the effectveness of these methods reles on propertes such s low VC dmensons nd low hhwy dmensons, whch re typcl n rod networks but my not hold for other types of rphs. Another pproch s bsed on concse representton of ll prs shortest pths [31, 33]. However, ths pproch hevly depends on the sptl coherence of vertces nd ther nter-connectvty. To et l. [36] proposed the k-skp shortest pth on rod networks, whch s to return t lest one out of every k consecutve vertces n shortest pth. Whle P2P dstnce queryn hs been qute successfully resolved for rod networks, these methods re n enerl not pplcble to rphs from other sources. 7.2 Other Approches When the nput rph s too lre to ft n mn memory, externl memory lorthms cn be used to reduce the hh dsk I/O cost. Exstn externl memory lorthms re mnly for computn snle-source shortest pths [24, 28, 26, 27] or BFS [6, 7, 11, 25, 29], whch re wsteful for computn P2P dstnce. There re lso number of pproxmton methods [8, 20, 30, 34, 37] proposed to compute P2P dstnce. Althouh these methods hve lower complexty thn the exct methods n enerl, they re stll qute costly for processn lre rphs, n terms of both preprocessn tme nd store spce. We focus on exct dstnce queryn but remrk tht pproxmton cn be ppled on top of our method (e.., on the rph G k defned n Secton 4). 7.3 Methods wth Smlr Chrcterstcs We lso wnt to specfclly compre nd contrst wth severl methods for rod-networks tht shre some smlr chrcterstcs wth IS-Lbel. Frst, we consder the lndmrk pproch proposed n [19], n whch set of lndmrks L re selected nd for ech vertex, the dstnce to nd from ech lndmrk x L s precomputed. By trnle nequlty, dst G(s,t) s lower bounded by mx x L{ dst G(s,x) dst G(t,x) }, whch helps speed up b-djkstr serch. Wth the full vertex herrchy n IS-Lbel, we lso store pre-computed dstnces n lbels, except tht the lbels cn lwys ve the exct vlue of dst G(s,t) nsted of lower bound. Next, we compre wth the multlevel overly rphs n [22] for rod networks, where overly rphs re bult on top of shrnkn sets S of vertces, preservn the dstnces mon vertces n S. The overly rphs cn lmt the serch n rph smller thn G. However, n buldn overly rph for vertex set S, ech vertex n S underoes Djkstr s snle source shortest pth serch n G. The complexty s hh nd the emprcl studes n [22] hndled rphs wth less thn 500,000 vertces. Whle ll overly rphs re mntned n [22] for queryn, we do not keep ny rph for full vertex herrchy nd keep onlyg k for k-level herrchy. Lbeln technque s lso used n the hub-bsed lbeln lorthm (HL) [2], whch s the fstest known lorthm for dstnce queryn n rod networks. As ponted out by the sme uthors n [3], for rphs other thn rod networks, the contrcton herrchy (CH) preprocessn n HL s not effectve for enerl rphs. To ddress ths problem they proposed herrchcl hub lbeln (HHL) for other rph types [3]. Insted of the bottom up CH method, top-down method ws proposed for HHL, s nspred by [16]. HHL mntns shortest pth tree for every vertex to represent ll uncovered shortest pths strtn t ech vertex. The computton nd store complextes of HHL re not sclble for hndln lre rphs. Wth RAM of 96GB, HHL ws tested only on preferentl ttchment rphs nd smll world rphs wth V = 100,000 nd vere deree 10. In contrst, our lbeln technque ccommodtes I/O effcent lorthms tht work wth smll RAM szes, such s 4GB, nd we cn hndle preferentl ttchment rphs nd smll world rphs wth V = 1,000,000 nd much hher vere deree. 8. PATH QUERIES In ths secton, we dscuss the extenson of our method to nswer shortest-pth queres. To nswer P2P shortest-pth query, we need to keep some extr nformton n the vertex lbels. When n umentn ede (u,w) s creted n G wth ω G (u,w) = ω G 1 (u,v)+ω G 1 (v,w), we lso keep the ntermedte vertex v lon wth the umentn ede to ndcte tht the ede represents the pth u,v,w. Note tht (u,v) nd (v,w) re edes n G 1, whch n turn cn be umentn edes. In the lbeln process, nsted of ddn the entry (w,d(u,w)) to lbel(u), we lso ttch the ntermedte vertex v (f ny) for (u,w). Thus, the entry becomes trple (w,d(u,w),v) (or (w,d(u,w),φ), f there s no ntermedte vertex). Note tht we keep the rph G k, nd thus the ntermedte vertex of ny umentn ede n G k s drectly ttched to the ede. Gven query,s ndt, f the query s of Type 1, the nswer s determned by two lbel entres, (w,d(s,w),v) nd (w,d(t,w),v ). If v φ (smlrly for v ), we form two new queres (s,v) nd (v, w). In ths wy, we recursvely form queres untl the ntermedte vertex n lbel entry s φ. It s then strhtforwrd to obtn the resultn pth by lnkn ll the ntermedte vertces. If the query s of Type 2, then the nswer s determned by two lbel entres nd pth n G k. The subpths from the two lbel entres re derved n the sme wy s we do for Type 1 query. The pth n 467

12 G k s expnded nto the ornl pth ngby formn new queres, u nd v nd v nd w, for ny umentn ede (u,w) wth the ntermedte vertex v. For ech such query, the correspondn subpth s obtned s dscussed bove. The I/O complexty of the overll process s ven by O( SP G(s,t) ), where SP G(s,t) s the number of edes onsp G(s,t). 9. CONCLUSIONS We ntroduced n effectve dsk-bsed lbel ndexn method for dstnce nd shortest pth queryn n lre rel-world rphs. Our vertex lbeln process s uded by n ndependent-set bsed vertex herrchy. For mssve rphs, we cn lmt the heht of the herrchy to control the the lbel sze, our theoretcl nlyss show tht we need t most one n-memory b-djkstr s serch on the resdul rph to obtn the fnl soluton. Our method smultneously solves the problem of rechblty. Gven the low costs of IS-LABEL n ndex constructon nd queryn, t s expected to hndle very lrer rphs for rechblty queres. Ths s to be confrmed n our future work. 10. ACKNOWLEDGEMENTS We thnk Ynyn Hsu for her help n the mplementton of the drected verson of the IS-Lbel lorthm. We thnk Shumo Chu for hs help n the use of the dtsets BTC nd Web. Ths work ws supported by the CUHK RGC Drect Grnt Allocton REFERENCES [1] I. Abrhm, D. Delln, A. Ft, A. V. Goldber, nd R. F. F. Werneck. Vc-dmenson nd shortest pth lorthms. In ICALP (1), pes , [2] I. Abrhm, D. Delln, A. V. Goldber, nd R. F. F. Werneck. A hub-bsed lbeln lorthm for shortest pths n rod networks. In SEA, pes , [3] I. Abrhm, D. Delln, A. V. Goldber, nd R. F. F. Werneck. Herrchcl hub lbelns for shortest pths. In Proceedns of the 20th Annul Europen Conference on Alorthms (ESA), pes 24 35, [4] I. Abrhm, A. Ft, A. V. Goldber, nd R. F. F. Werneck. Hhwy dmenson, shortest pths, nd provbly effcent lorthms. In SODA, pes , [5] A. Arwl nd J. S. Vtter. The nput/output complexty of sortn nd relted problems. Commun. ACM, 31(9): , [6] D. Ajwn, R. Dementev, nd U. Meyer. A computtonl study of externl-memory BFS lorthms. In SODA, pes , [7] D. Ajwn, U. Meyer, nd V. Ospov. Improved externl memory bfs mplementton. In ALENEX, [8] S. Bswn nd S. Sen. Approxmte dstnce orcles for unwehted rphs n expected o(n 2 ) tme. ACM Trnsctons on Alorthms, 2(4): , [9] R. Buer, D. Delln, P. Snders, D. Scheferdecker, D. Schultes, nd D. Wner. Combnn herrchcl nd ol-drected speed-up technques for djkstr s lorthm. ACM Journl of Expermentl Alorthmcs, 15, [10] T. Bu nd D. F. Towsley. On dstnushn between nternet power lw topoloy enertors. In INFOCOM, [11] A. L. Buchsbum, M. H. Goldwsser, S. Venktsubrmnn, nd J. Westbrook. On externl memory rph trversl. In SODA, pes , [12] L. Chn, J. Yu, L. Qn, H. Chen, nd M. Qo. The exct dstnce to destnton n undrected world. The VLDB Journl, pes 1 20, 2012 (Onlne Frst). [13] J. Chen, Y. Ke, S. Chu, nd C. Chen. Effcent processn of dstnce queres n lre rphs: vertex cover pproch. In SIGMOD Conference, pes , [14] J. Chen, Z. Shn, H. Chen, H. Wn, nd J. X. Yu. K-rech: Who s n your smll world. PVLDB, 5(11): , [15] J. Chen nd J. X. Yu. On-lne exct shortest dstnce query processn. In EDBT, pes , [16] E. Cohen, E. Hlpern, H. Kpln, nd U. Zwck. Rechblty nd dstnce queres v 2-hop lbels. SIAM J. Comput., 32(5): , [17] A. W.-C. Fu, H. Wu, J. Chen, S. Cho, nd R. C.-W. Won. Is-lbel: n ndependent-set lbeln scheme for pont-to-pont dstnce queryn on lre rphs. rxv: , [18] R. Gesberer, P. Snders, D. Schultes, nd D. Delln. Contrcton herrches: Fster nd smpler herrchcl routn n rod networks. In WEA, pes , [19] A. V. Goldber nd C. Hrrelson. Computn the shortest pth: A* serch meets rph theory. In Proceedns of the Annul ACM-SIAM Symposum on Dscrete Alorthms (SODA), pes , [20] A. Gubchev, S. J. Bedthur, S. Seufert, nd G. Wekum. Fst nd ccurte estmton of shortest pths n lre rphs. In CIKM, pes , [21] M. M. Hlldórsson nd J. Rdhkrshnn. Greed s ood: Approxmtn ndependent sets n sprse nd bounded-deree rphs. Alorthmc, 18(1): , [22] M. Holzer, F. Schulz, nd D. Wner. Enneern multlevel overly rphs for shortest-pth queres. ACM Journl of Expermentl Alorthmcs, 13(2.5), [23] R. Jn, N. Run, Y. Xn, nd V. E. Lee. A hhwy-centrc lbeln pproch for nswern dstnce queres on lre sprse rphs. In SIGMOD Conference, pes , [24] V. Kumr nd E. J. Schwbe. Improved lorthms nd dt structures for solvn rph problems n externl memory. In IEEE Symp. on Prllel nd Dstrbuted Processn, pes , [25] K. Mehlhorn nd U. Meyer. Externl-memory bredth-frst serch wth sublner I/O. In ESA, pes , [26] U. Meyer. V detours to I/O-effcent shortest pths. In Effcent Alorthms, pes , [27] U. Meyer nd V. Ospov. Desn nd mplementton of prctcl /o-effcent shortest pths lorthm. In ALENEX, pes 85 96, [28] U. Meyer nd N. Zeh. I/O-effcent undrected shortest pths wth unbounded ede lenths. In ESA, pes , [29] K. Munl nd A. G. Rnde. I/o-complexty of rph lorthms. In SODA, pes , [30] M. Potms, F. Bonch, C. Cstllo, nd A. Gons. Fst shortest pth dstnce estmton n lre networks. In CIKM, pes , [31] H. Smet, J. Snkrnrynn, nd H. Alborz. Sclble network dstnce browsn n sptl dtbses. In SIGMOD Conference, pes 43 54, [32] P. Snders nd D. Schultes. Hhwy herrches hsten exct shortest pth queres. In ESA, pes , [33] J. Snkrnrynn, H. Smet, nd H. Alborz. Pth orcles for sptl networks. PVLDB, 2(1): , [34] A. D. Srm, S. Gollpud, M. Njork, nd R. Pnrhy. A sketch-bsed dstnce orcle for web-scle rphs. In WSDM, pes , [35] R. Schenkel, A. Theobld, nd G. Wekum. Hop: An effcent connecton ndex for complex xml document collectons. In EDBT, pes , [36] Y. To, C. Shen, nd J. Pe. On k-skp shortest pths. In SIGMOD Conference, pes 43 54, [37] M. Thorup nd U. Zwck. Approxmte dstnce orcles. J. ACM, 52(1):1 24, [38] D. Wtts nd S. Strotz. Collectve dynmcs of smll-world networks. Nture, 393(6684): , [39] F. We. Ted: effcent shortest pth query nswern on rphs. In SIGMOD Conference, pes , [40] H. Wu, J. Chen, A. W.-C. Fu, nd S. Chu. Genertn mssve rphs wth lmted memory. Techncl Report, Deprtment of Computer Scence nd Enneern, The Chnese Unversty of Hon Kon, (CS-TR ):1 9, [41] Y. Xo, W. Wu, J. Pe, W. Wn, nd Z. He. Effcently ndexn shortest pths by explotn symmetry n rphs. In EDBT, pes ,

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( ) Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +

More information

Optimal Pricing Scheme for Information Services

Optimal Pricing Scheme for Information Services Optml rcng Scheme for Informton Servces Shn-y Wu Opertons nd Informton Mngement The Whrton School Unversty of ennsylvn E-ml: shnwu@whrton.upenn.edu e-yu (Shron) Chen Grdute School of Industrl Admnstrton

More information

Irregular Repeat Accumulate Codes 1

Irregular Repeat Accumulate Codes 1 Irregulr epet Accumulte Codes 1 Hu Jn, Amod Khndekr, nd obert McElece Deprtment of Electrcl Engneerng, Clforn Insttute of Technology Psden, CA 9115 USA E-ml: {hu, mod, rjm}@systems.cltech.edu Abstrct:

More information

Vector Geometry for Computer Graphics

Vector Geometry for Computer Graphics Vector Geometry for Computer Grphcs Bo Getz Jnury, 7 Contents Prt I: Bsc Defntons Coordnte Systems... Ponts nd Vectors Mtrces nd Determnnts.. 4 Prt II: Opertons Vector ddton nd sclr multplcton... 5 The

More information

A Hadoop Job Scheduling Model Based on Uncategorized Slot

A Hadoop Job Scheduling Model Based on Uncategorized Slot Journl of Communctons Vol. 10, No. 10, October 2015 A Hdoop Job Schedulng Model Bsed on Unctegored Slot To Xue nd Tng-tng L Deprtment of Computer Scence, X n Polytechnc Unversty, X n 710048, Chn Eml: xt73@163.com;

More information

WiMAX DBA Algorithm Using a 2-Tier Max-Min Fair Sharing Policy

WiMAX DBA Algorithm Using a 2-Tier Max-Min Fair Sharing Policy WMAX DBA Algorthm Usng 2-Ter Mx-Mn Fr Shrng Polcy Pe-Chen Tseng 1, J-Yn Ts 2, nd Wen-Shyng Hwng 2,* 1 Deprtment of Informton Engneerng nd Informtcs, Tzu Ch College of Technology, Hulen, Twn pechen@tccn.edu.tw

More information

Experiment 6: Friction

Experiment 6: Friction Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht

More information

WHAT HAPPENS WHEN YOU MIX COMPLEX NUMBERS WITH PRIME NUMBERS?

WHAT HAPPENS WHEN YOU MIX COMPLEX NUMBERS WITH PRIME NUMBERS? WHAT HAPPES WHE YOU MIX COMPLEX UMBERS WITH PRIME UMBERS? There s n ol syng, you n t pples n ornges. Mthemtns hte n t; they love to throw pples n ornges nto foo proessor n see wht hppens. Sometmes they

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Newton-Raphson Method of Solving a Nonlinear Equation Autar Kaw

Newton-Raphson Method of Solving a Nonlinear Equation Autar Kaw Newton-Rphson Method o Solvng Nonlner Equton Autr Kw Ater redng ths chpter, you should be ble to:. derve the Newton-Rphson method ormul,. develop the lgorthm o the Newton-Rphson method,. use the Newton-Rphson

More information

Resistive Network Analysis. The Node Voltage Method - 1

Resistive Network Analysis. The Node Voltage Method - 1 esste Network Anlyss he nlyss of n electrcl network conssts of determnng ech of the unknown rnch currents nd node oltges. A numer of methods for network nlyss he een deeloped, sed on Ohm s Lw nd Krchoff

More information

Factoring Polynomials

Factoring Polynomials Fctoring Polynomils Some definitions (not necessrily ll for secondry school mthemtics): A polynomil is the sum of one or more terms, in which ech term consists of product of constnt nd one or more vribles

More information

ORIGIN DESTINATION DISAGGREGATION USING FRATAR BIPROPORTIONAL LEAST SQUARES ESTIMATION FOR TRUCK FORECASTING

ORIGIN DESTINATION DISAGGREGATION USING FRATAR BIPROPORTIONAL LEAST SQUARES ESTIMATION FOR TRUCK FORECASTING ORIGIN DESTINATION DISAGGREGATION USING FRATAR BIPROPORTIONAL LEAST SQUARES ESTIMATION FOR TRUCK FORECASTING Unversty of Wsconsn Mlwukee Pper No. 09-1 Ntonl Center for Freght & Infrstructure Reserch &

More information

Vehicle Navigation System Integration with GPS/INS/GSM

Vehicle Navigation System Integration with GPS/INS/GSM Chun Hu Journl of Scence nd Enneern, ol.,no., pp.3-(3) ehcle Nvton System Interton wth GPS/INS/GSM Jum-Mn Ln Chen-Wen Hun, nd Fon-Lon Ts Insttute of Aeronutcs nd Astronutcs Chun-Hw Unversty Hsn-Chu 3,

More information

Reasoning to Solve Equations and Inequalities

Reasoning to Solve Equations and Inequalities Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing

More information

Boolean Algebra. ECE 152A Winter 2012

Boolean Algebra. ECE 152A Winter 2012 Boolen Algebr ECE 52A Wnter 22 Redng Assgnent Brown nd Vrnesc 2 Introducton to Logc Crcuts 2.5 Boolen Algebr 2.5. The Venn Dgr 2.5.2 Notton nd Ternology 2.5.3 Precedence of Opertons 2.6 Synthess Usng AND,

More information

Integration by Substitution

Integration by Substitution Integrtion by Substitution Dr. Philippe B. Lvl Kennesw Stte University August, 8 Abstrct This hndout contins mteril on very importnt integrtion method clled integrtion by substitution. Substitution is

More information

Helicopter Theme and Variations

Helicopter Theme and Variations Helicopter Theme nd Vritions Or, Some Experimentl Designs Employing Pper Helicopters Some possible explntory vribles re: Who drops the helicopter The length of the rotor bldes The height from which the

More information

Small Business Cloud Services

Small Business Cloud Services Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Econ 4721 Money and Banking Problem Set 2 Answer Key

Econ 4721 Money and Banking Problem Set 2 Answer Key Econ 472 Money nd Bnking Problem Set 2 Answer Key Problem (35 points) Consider n overlpping genertions model in which consumers live for two periods. The number of people born in ech genertion grows in

More information

Example A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding

Example A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding 1 Exmple A rectngulr box without lid is to be mde from squre crdbord of sides 18 cm by cutting equl squres from ech corner nd then folding up the sides. 1 Exmple A rectngulr box without lid is to be mde

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of

More information

AntiSpyware Enterprise Module 8.5

AntiSpyware Enterprise Module 8.5 AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility

More information

Generalizing the degree sequence problem

Generalizing the degree sequence problem Mddlebury College March 2009 Arzona State Unversty Dscrete Mathematcs Semnar The degree sequence problem Problem: Gven an nteger sequence d = (d 1,...,d n ) determne f there exsts a graph G wth d as ts

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

Finite Automata. Informatics 2A: Lecture 3. John Longley. 25 September School of Informatics University of Edinburgh

Finite Automata. Informatics 2A: Lecture 3. John Longley. 25 September School of Informatics University of Edinburgh Lnguges nd Automt Finite Automt Informtics 2A: Lecture 3 John Longley School of Informtics University of Edinburgh jrl@inf.ed.c.uk 25 September 2015 1 / 30 Lnguges nd Automt 1 Lnguges nd Automt Wht is

More information

Positive Integral Operators With Analytic Kernels

Positive Integral Operators With Analytic Kernels Çnky Ünverte Fen-Edeyt Fkülte, Journl of Art nd Scence Sy : 6 / Arl k 006 Potve ntegrl Opertor Wth Anlytc Kernel Cn Murt D KMEN Atrct n th pper we contruct exmple of potve defnte ntegrl kernel whch re

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

MATH 150 HOMEWORK 4 SOLUTIONS

MATH 150 HOMEWORK 4 SOLUTIONS MATH 150 HOMEWORK 4 SOLUTIONS Section 1.8 Show tht the product of two of the numbers 65 1000 8 2001 + 3 177, 79 1212 9 2399 + 2 2001, nd 24 4493 5 8192 + 7 1777 is nonnegtive. Is your proof constructive

More information

Mathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100

Mathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100 hsn.uk.net Higher Mthemtics UNIT 3 OUTCOME 1 Vectors Contents Vectors 18 1 Vectors nd Sclrs 18 Components 18 3 Mgnitude 130 4 Equl Vectors 131 5 Addition nd Subtrction of Vectors 13 6 Multipliction by

More information

Math 135 Circles and Completing the Square Examples

Math 135 Circles and Completing the Square Examples Mth 135 Circles nd Completing the Squre Exmples A perfect squre is number such tht = b 2 for some rel number b. Some exmples of perfect squres re 4 = 2 2, 16 = 4 2, 169 = 13 2. We wish to hve method for

More information

Lesson 28 Psychrometric Processes

Lesson 28 Psychrometric Processes 1 Lesson 28 Psychrometrc Processes Verson 1 ME, IIT Khrgpur 1 2 The specfc objectves of ths lecture re to: 1. Introducton to psychrometrc processes nd ther representton (Secton 28.1) 2. Importnt psychrometrc

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Graphs on Logarithmic and Semilogarithmic Paper

Graphs on Logarithmic and Semilogarithmic Paper 0CH_PHClter_TMSETE_ 3//00 :3 PM Pge Grphs on Logrithmic nd Semilogrithmic Pper OBJECTIVES When ou hve completed this chpter, ou should be ble to: Mke grphs on logrithmic nd semilogrithmic pper. Grph empiricl

More information

Algebra Review. How well do you remember your algebra?

Algebra Review. How well do you remember your algebra? Algebr Review How well do you remember your lgebr? 1 The Order of Opertions Wht do we men when we write + 4? If we multiply we get 6 nd dding 4 gives 10. But, if we dd + 4 = 7 first, then multiply by then

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

Lecture 3 Gaussian Probability Distribution

Lecture 3 Gaussian Probability Distribution Lecture 3 Gussin Probbility Distribution Introduction l Gussin probbility distribution is perhps the most used distribution in ll of science. u lso clled bell shped curve or norml distribution l Unlike

More information

Models and Software for Urban and Regional Transportation Planning : The Contributions of the Center for Research on Transportation

Models and Software for Urban and Regional Transportation Planning : The Contributions of the Center for Research on Transportation Models nd Softwre for Urbn nd Regonl Plnnng : The Contrbutons of the Center for Reserch on Mchel Florn Aprl 2008 CIRRELT-2008-11 Models nd Softwre for Urbn Regonl Plnnng: The Contrbutons of the Center

More information

Incorporating Negative Values in AHP Using Rule- Based Scoring Methodology for Ranking of Sustainable Chemical Process Design Options

Incorporating Negative Values in AHP Using Rule- Based Scoring Methodology for Ranking of Sustainable Chemical Process Design Options 20 th Europen ymposum on Computer Aded Process Engneerng ECAPE20. Perucc nd G. Buzz Ferrrs (Edtors) 2010 Elsever B.V. All rghts reserved. Incorportng Negtve Vlues n AHP Usng Rule- Bsed corng Methodology

More information

Lecture 3: Force of Interest, Real Interest Rate, Annuity

Lecture 3: Force of Interest, Real Interest Rate, Annuity Lecture 3: Force of Interest, Real Interest Rate, Annuty Goals: Study contnuous compoundng and force of nterest Dscuss real nterest rate Learn annuty-mmedate, and ts present value Study annuty-due, and

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY

PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY MAT 0630 INTERNET RESOURCES, REVIEW OF CONCEPTS AND COMMON MISTAKES PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY Contents 1. ACT Compss Prctice Tests 1 2. Common Mistkes 2 3. Distributive

More information

Graph Calculus: Scalable Shortest Path Analytics for Large Social Graphs through Core Net

Graph Calculus: Scalable Shortest Path Analytics for Large Social Graphs through Core Net Graph Calculus: Scalable Shortest Path Analytcs for Large Socal Graphs through Core Net Lxn Fu Department of Computer Scence Unversty of North Carolna at Greensboro Greensboro, NC, U.S.A. lfu@uncg.edu

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

APPLICATION OF QUEUING THEORY TO DYNAMIC VEHICLE ROUTING PROBLEM Wei-Ning Chen, Kainan University Taiwan

APPLICATION OF QUEUING THEORY TO DYNAMIC VEHICLE ROUTING PROBLEM Wei-Ning Chen, Kainan University Taiwan GLOBAL JOURNAL OF BUSINESS RESEARCH VOLUME 3 NUMBER 009 APPLICATION OF QUEUING THEORY TO DYNAMIC VEHICLE ROUTING PROBLEM We-Nng Chen Knn Unersty Twn ABSTRACT In ths pper we eelope n nlyze ynmc moel of

More information

Optimal Order Processing Policies for E- commerce Servers

Optimal Order Processing Policies for E- commerce Servers Optml Order Processn Polces or E- commerce Servers Yon Tn Vy S Mooeree Kmrn Monzde Unversty o Wsnton Busness Scool Box 353 Settle Wsnton 9895-3 USA Unversty o Texs t Dlls Scool o Mnement PO Box 83688 JO44

More information

Sequences and Series

Sequences and Series Secto 9. Sequeces d Seres You c thk of sequece s fucto whose dom s the set of postve tegers. f ( ), f (), f (),... f ( ),... Defto of Sequece A fte sequece s fucto whose dom s the set of postve tegers.

More information

Binary Representation of Numbers Autar Kaw

Binary Representation of Numbers Autar Kaw Binry Representtion of Numbers Autr Kw After reding this chpter, you should be ble to: 1. convert bse- rel number to its binry representtion,. convert binry number to n equivlent bse- number. In everydy

More information

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions.

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions. Lerning Objectives Loci nd Conics Lesson 3: The Ellipse Level: Preclculus Time required: 120 minutes In this lesson, students will generlize their knowledge of the circle to the ellipse. The prmetric nd

More information

and thus, they are similar. If k = 3 then the Jordan form of both matrices is

and thus, they are similar. If k = 3 then the Jordan form of both matrices is Homework ssignment 11 Section 7. pp. 249-25 Exercise 1. Let N 1 nd N 2 be nilpotent mtrices over the field F. Prove tht N 1 nd N 2 re similr if nd only if they hve the sme miniml polynomil. Solution: If

More information

NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia

NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia To appear n Journal o Appled Probablty June 2007 O-COSTAT SUM RED-AD-BLACK GAMES WITH BET-DEPEDET WI PROBABILITY FUCTIO LAURA POTIGGIA, Unversty o the Scences n Phladelpha Abstract In ths paper we nvestgate

More information

+ + + - - This circuit than can be reduced to a planar circuit

+ + + - - This circuit than can be reduced to a planar circuit MeshCurrent Method The meshcurrent s analog of the nodeoltage method. We sole for a new set of arables, mesh currents, that automatcally satsfy KCLs. As such, meshcurrent method reduces crcut soluton to

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

5.2. LINE INTEGRALS 265. Let us quickly review the kind of integrals we have studied so far before we introduce a new one.

5.2. LINE INTEGRALS 265. Let us quickly review the kind of integrals we have studied so far before we introduce a new one. 5.2. LINE INTEGRALS 265 5.2 Line Integrls 5.2.1 Introduction Let us quickly review the kind of integrls we hve studied so fr before we introduce new one. 1. Definite integrl. Given continuous rel-vlued

More information

Assuming all values are initially zero, what are the values of A and B after executing this Verilog code inside an always block? C=1; A <= C; B = C;

Assuming all values are initially zero, what are the values of A and B after executing this Verilog code inside an always block? C=1; A <= C; B = C; B-26 Appendix B The Bsics of Logic Design Check Yourself ALU n [Arthritic Logic Unit or (rre) Arithmetic Logic Unit] A rndom-numer genertor supplied s stndrd with ll computer systems Stn Kelly-Bootle,

More information

v a 1 b 1 i, a 2 b 2 i,..., a n b n i.

v a 1 b 1 i, a 2 b 2 i,..., a n b n i. SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Multi-Market Trading and Liquidity: Theory and Evidence

Multi-Market Trading and Liquidity: Theory and Evidence Mult-Mrket Trdng nd Lqudty: Theory nd Evdence Shmuel Bruch, G. Andrew Kroly, b* Mchel L. Lemmon Eccles School of Busness, Unversty of Uth, Slt Lke Cty, UT 84, USA b Fsher College of Busness, Oho Stte Unversty,

More information

Artificial Intelligence Approach to Evaluate Students Answerscripts Based on the Similarity Measure between Vague Sets

Artificial Intelligence Approach to Evaluate Students Answerscripts Based on the Similarity Measure between Vague Sets Wan, H.-Y., & Chen, S. M. (007). rtfcal Intellence pproach to Evaluate Students nswerscrpts ased on the Smlarty Measure between Vaue Sets. Educatonal Technoloy & Socety, 0 (), -. rtfcal Intellence pproach

More information

n + d + q = 24 and.05n +.1d +.25q = 2 { n + d + q = 24 (3) n + 2d + 5q = 40 (2)

n + d + q = 24 and.05n +.1d +.25q = 2 { n + d + q = 24 (3) n + 2d + 5q = 40 (2) MATH 16T Exam 1 : Part I (In-Class) Solutons 1. (0 pts) A pggy bank contans 4 cons, all of whch are nckels (5 ), dmes (10 ) or quarters (5 ). The pggy bank also contans a con of each denomnaton. The total

More information

Physics 110 Spring 2006 2-D Motion Problems: Projectile Motion Their Solutions

Physics 110 Spring 2006 2-D Motion Problems: Projectile Motion Their Solutions Physcs 110 Sprn 006 -D Moton Problems: Projectle Moton Ther Solutons 1. A place-kcker must kck a football from a pont 36 m (about 40 yards) from the oal, and half the crowd hopes the ball wll clear the

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Operations with Polynomials

Operations with Polynomials 38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: Write polynomils in stndrd form nd identify the leding coefficients nd degrees of polynomils Add nd subtrct polynomils Multiply

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

Supplementary material: Assessing the relevance of node features for network structure

Supplementary material: Assessing the relevance of node features for network structure Supplementary materal: Assessng the relevance of node features for network structure Gnestra Bancon, 1 Paolo Pn,, 3 and Matteo Marsl 1 1 The Abdus Salam Internatonal Center for Theoretcal Physcs, Strada

More information

Quick Reference Guide: One-time Account Update

Quick Reference Guide: One-time Account Update Quick Reference Guide: One-time Account Updte How to complete The Quick Reference Guide shows wht existing SingPss users need to do when logging in to the enhnced SingPss service for the first time. 1)

More information

Small Business Networking

Small Business Networking Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Network Configuration Independence Mechanism

Network Configuration Independence Mechanism 3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting

More information

EN3: Introduction to Engineering. Teach Yourself Vectors. 1. Definition. Problems

EN3: Introduction to Engineering. Teach Yourself Vectors. 1. Definition. Problems EN3: Introducton to Engneerng Tech Yourself Vectors Dvson of Engneerng Brown Unversty. Defnton vector s mthemtcl obect tht hs mgntude nd drecton, nd stsfes the lws of vector ddton. Vectors re used to represent

More information

Double Integrals over General Regions

Double Integrals over General Regions Double Integrls over Generl egions. Let be the region in the plne bounded b the lines, x, nd x. Evlute the double integrl x dx d. Solution. We cn either slice the region verticll or horizontll. ( x x Slicing

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of

More information

Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor

Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor INL/CON-10-20411 PREPRINT Fuzzy Logc Bsed Anomly Detecton for Embedded Network Securty Cyber Sensor 2011 IEEE Symposum on Computtonl Intellgence n Cyber Securty Ondre Lnd Mlos Mnc Todd Vollmer Json Wrght

More information

Vendor Rating for Service Desk Selection

Vendor Rating for Service Desk Selection Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl

More information

YOU FINALLY FINISHED YOUR FILM. NOW WHAT? Distributor...? Sales agent...? GOT IT: SELF DISTRIBUTION

YOU FINALLY FINISHED YOUR FILM. NOW WHAT? Distributor...? Sales agent...? GOT IT: SELF DISTRIBUTION YOU FINALLY FINISHED YOUR FILM. NOW WHAT? Dstrbutor...? Sles gent...? GOT IT: SELF DISTRIBUTION THE ADVANTAGES OF SELF DISTRIBUTION: A gurnteed openng n NY / LA prme theter nd you keep 100% of the boxoffce.

More information

Or more simply put, when adding or subtracting quantities, their uncertainties add.

Or more simply put, when adding or subtracting quantities, their uncertainties add. Propgtion of Uncertint through Mthemticl Opertions Since the untit of interest in n eperiment is rrel otined mesuring tht untit directl, we must understnd how error propgtes when mthemticl opertions re

More information

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers.

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers. 2 Rtionl Numbers Integers such s 5 were importnt when solving the eqution x+5 = 0. In similr wy, frctions re importnt for solving equtions like 2x = 1. Wht bout equtions like 2x + 1 = 0? Equtions of this

More information

ALABAMA ASSOCIATION of EMERGENCY MANAGERS

ALABAMA ASSOCIATION of EMERGENCY MANAGERS LBM SSOCTON of EMERGENCY MNGERS ON O PCE C BELLO MER E T R O CD NCY M N G L R PROFESSONL CERTFCTON PROGRM .. E. M. CERTFCTON PROGRM 2014 RULES ND REGULTONS 1. THERE WLL BE FOUR LEVELS OF CERTFCTON. BSC,

More information

The Velocity Factor of an Insulated Two-Wire Transmission Line

The Velocity Factor of an Insulated Two-Wire Transmission Line The Velocity Fctor of n Insulted Two-Wire Trnsmission Line Problem Kirk T. McDonld Joseph Henry Lbortories, Princeton University, Princeton, NJ 08544 Mrch 7, 008 Estimte the velocity fctor F = v/c nd the

More information

Health insurance marketplace What to expect in 2014

Health insurance marketplace What to expect in 2014 Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum

More information

EQUATIONS OF LINES AND PLANES

EQUATIONS OF LINES AND PLANES EQUATIONS OF LINES AND PLANES MATH 195, SECTION 59 (VIPUL NAIK) Corresponding mteril in the ook: Section 12.5. Wht students should definitely get: Prmetric eqution of line given in point-direction nd twopoint

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

19. The Fermat-Euler Prime Number Theorem

19. The Fermat-Euler Prime Number Theorem 19. The Fermt-Euler Prime Number Theorem Every prime number of the form 4n 1 cn be written s sum of two squres in only one wy (side from the order of the summnds). This fmous theorem ws discovered bout

More information

Joint Opaque booking systems for online travel agencies

Joint Opaque booking systems for online travel agencies Jont Opque bookng systems for onlne trvel gences Mlgorzt OGOOWSKA nd Domnque TORRE Mrch 2010 Abstrct Ths pper nlyzes the propertes of the dvnced Opque bookng systems used by the onlne trvel gences n conjuncton

More information

6.2 Volumes of Revolution: The Disk Method

6.2 Volumes of Revolution: The Disk Method mth ppliction: volumes of revolution, prt ii Volumes of Revolution: The Disk Method One of the simplest pplictions of integrtion (Theorem ) nd the ccumultion process is to determine so-clled volumes of

More information

Fuzzy Clustering for TV Program Classification

Fuzzy Clustering for TV Program Classification Fuzzy Clusterng for TV rogrm Clssfcton Yu Zhwen Northwestern olytechncl Unversty X n,.r.chn, 7007 yuzhwen77@yhoo.com.cn Gu Jnhu Northwestern olytechncl Unversty X n,.r.chn, 7007 guh@nwpu.edu.cn Zhou Xngshe

More information

Bayesian Updating with Continuous Priors Class 13, 18.05, Spring 2014 Jeremy Orloff and Jonathan Bloom

Bayesian Updating with Continuous Priors Class 13, 18.05, Spring 2014 Jeremy Orloff and Jonathan Bloom Byesin Updting with Continuous Priors Clss 3, 8.05, Spring 04 Jeremy Orloff nd Jonthn Bloom Lerning Gols. Understnd prmeterized fmily of distriutions s representing continuous rnge of hypotheses for the

More information

Health insurance exchanges What to expect in 2014

Health insurance exchanges What to expect in 2014 Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount

More information

Vectors 2. 1. Recap of vectors

Vectors 2. 1. Recap of vectors Vectors 2. Recp of vectors Vectors re directed line segments - they cn be represented in component form or by direction nd mgnitude. We cn use trigonometry nd Pythgors theorem to switch between the forms

More information