Problem solving and search
|
|
|
- Joleen Kristina Wilkerson
- 9 years ago
- Views:
Transcription
1 Problem solving and search hapter 3 hapter 3 1
2 eminders ssignment 0 due 5pm today ssignment 1 posted, due 2/9 ection 105 will move to 9-10am starting next week hapter 3 2
3 Outline Problem-solving agents Problem types Problem formulation Example problems asic search algorithms hapter 3 3
4 estricted form of general agent: Problem-solving agents function imple-problem-olving-gent( percept) returns an action static: seq, an action sequence, initially empty state, some description of the current world state goal, a goal, initially null problem, a problem formulation state Update-tate(state, percept) if seq is empty then goal Formulate-Goal(state) problem Formulate-Problem(state, goal) seq earch( problem) action ecommendation(seq, state) seq emainder(seq, state) return action Note: this is offline problem solving; solution executed eyes closed. Online problem solving involves acting without complete knowledge. hapter 3 4
5 Example: omania On holiday in omania; currently in rad. Flight leaves tomorrow from ucharest Formulate goal: be in ucharest Formulate problem: states: various cities actions: drive between cities Find solution: sequence of cities, e.g., rad, ibiu, Fagaras, ucharest hapter 3 5
6 71 Oradea Example: omania Neamt Zerind 75 rad Timisoara Dobreta 151 ibiu 99 Fagaras 80 imnicu Vilcea ugoj Mehadia 120 Pitesti ucharest raiova 90 Giurgiu 87 Iasi Urziceni Vaslui Hirsova 86 Eforie hapter 3 6
7 Problem types Deterministic, fully observable = single-state problem gent knows exactly which state it will be in; solution is a sequence Non-observable = conformant problem gent may have no idea where it is; solution (if any) is a sequence Nondeterministic and/or partially observable = contingency problem percepts provide new information about current state solution is a contingent plan or a policy often interleave search, execution Unknown state space = exploration problem ( online ) hapter 3 7
8 Example: vacuum world ingle-state, start in #5. olution?? hapter 3 8
9 Example: vacuum world ingle-state, start in #5. olution?? [ight, uck] onformant, start in {1, 2, 3, 4, 5, 6, 7, 8} e.g., ight goes to {2, 4, 6, 8}. olution?? hapter 3 9
10 Example: vacuum world ingle-state, start in #5. olution?? [ight, uck] onformant, start in {1, 2, 3, 4, 5, 6, 7, 8} e.g., ight goes to {2, 4, 6, 8}. olution?? [ight, uck, ef t, uck] ontingency, start in #5 Murphy s aw: uck can dirty a clean carpet ocal sensing: dirt, location only. olution?? hapter 3 10
11 Example: vacuum world ingle-state, start in #5. olution?? [ight, uck] onformant, start in {1, 2, 3, 4, 5, 6, 7, 8} e.g., ight goes to {2, 4, 6, 8}. olution?? [ight, uck, ef t, uck] ontingency, start in #5 Murphy s aw: uck can dirty a clean carpet ocal sensing: dirt, location only. olution?? [ight, if dirt then uck] hapter 3 11
12 ingle-state problem formulation problem is defined by four items: initial state e.g., at rad successor function (x) = set of action state pairs e.g., (rad) = { rad Zerind, Zerind,...} goal test, can be explicit, e.g., x = at ucharest implicit, e.g., N odirt(x) path cost (additive) e.g., sum of distances, number of actions executed, etc. c(x, a, y) is the step cost, assumed to be 0 solution is a sequence of actions leading from the initial state to a goal state hapter 3 12
13 electing a state space eal world is absurdly complex state space must be abstracted for problem solving (bstract) state = set of real states (bstract) action = complex combination of real actions e.g., rad Zerind represents a complex set of possible routes, detours, rest stops, etc. For guaranteed realizability, any real state in rad must get to some real state in Zerind (bstract) solution = set of real paths that are solutions in the real world Each abstract action should be easier than the original problem! hapter 3 13
14 Example: vacuum world state space graph states?? actions?? goal test?? path cost?? hapter 3 14
15 Example: vacuum world state space graph states??: integer dirt and robot locations (ignore dirt amounts etc.) actions?? goal test?? path cost?? hapter 3 15
16 Example: vacuum world state space graph states??: integer dirt and robot locations (ignore dirt amounts etc.) actions??: eft, ight, uck, NoOp goal test?? path cost?? hapter 3 16
17 Example: vacuum world state space graph states??: integer dirt and robot locations (ignore dirt amounts etc.) actions??: eft, ight, uck, NoOp goal test??: no dirt path cost?? hapter 3 17
18 Example: vacuum world state space graph states??: integer dirt and robot locations (ignore dirt amounts etc.) actions??: eft, ight, uck, NoOp goal test??: no dirt path cost??: 1 per action (0 for NoOp) hapter 3 18
19 Example: The 8-puzzle tart tate Goal tate states?? actions?? goal test?? path cost?? hapter 3 19
20 Example: The 8-puzzle tart tate Goal tate states??: integer locations of tiles (ignore intermediate positions) actions?? goal test?? path cost?? hapter 3 20
21 Example: The 8-puzzle tart tate Goal tate states??: integer locations of tiles (ignore intermediate positions) actions??: move blank left, right, up, down (ignore unjamming etc.) goal test?? path cost?? hapter 3 21
22 Example: The 8-puzzle tart tate Goal tate states??: integer locations of tiles (ignore intermediate positions) actions??: move blank left, right, up, down (ignore unjamming etc.) goal test??: = goal state (given) path cost?? hapter 3 22
23 Example: The 8-puzzle tart tate Goal tate states??: integer locations of tiles (ignore intermediate positions) actions??: move blank left, right, up, down (ignore unjamming etc.) goal test??: = goal state (given) path cost??: 1 per move [Note: optimal solution of n-puzzle family is NP-hard] hapter 3 23
24 Example: robotic assembly P states??: real-valued coordinates of robot joint angles parts of the object to be assembled actions??: continuous motions of robot joints goal test??: complete assembly with no robot included! path cost??: time to execute hapter 3 24
25 Tree search algorithms asic idea: offline, simulated exploration of state space by generating successors of already-explored states (a.k.a. expanding states) function Tree-earch( problem, strategy) returns a solution, or failure initialize the search tree using the initial state of problem loop do if there are no candidates for expansion then return failure choose a leaf node for expansion according to strategy if the node contains a goal state then return the corresponding solution else expand the node and add the resulting nodes to the search tree end hapter 3 25
26 Tree search example rad ibiu Timisoara Zerind rad Fagaras Oradea imnicu Vilcea rad ugoj rad Oradea hapter 3 26
27 Tree search example rad ibiu Timisoara Zerind rad Fagaras Oradea imnicu Vilcea rad ugoj rad Oradea hapter 3 27
28 Tree search example rad ibiu Timisoara Zerind rad Fagaras Oradea imnicu Vilcea rad ugoj rad Oradea hapter 3 28
29 Implementation: states vs. nodes state is a (representation of) a physical configuration node is a data structure constituting part of a search tree includes parent, children, depth, path cost g(x) tates do not have parents, children, depth, or path cost! parent, action tate Node depth = 6 g = state The Expand function creates new nodes, filling in the various fields and using the uccessorfn of the problem to create the corresponding states. hapter 3 29
30 Implementation: general tree search function Tree-earch( problem, fringe) returns a solution, or failure fringe Insert(Make-Node(Initial-tate[problem]), fringe) loop do if fringe is empty then return failure node emove-front(fringe) if Goal-Test(problem, tate(node)) then return node fringe Insertll(Expand(node, problem), fringe) function Expand( node, problem) returns a set of nodes successors the empty set for each action, result in uccessor-fn(problem, tate[node]) do s a new Node Parent-Node[s] node; ction[s] action; tate[s] result Path-ost[s] Path-ost[node] + tep-ost(node, action, s) Depth[s] Depth[node] + 1 add s to successors return successors hapter 3 30
31 earch strategies strategy is defined by picking the order of node expansion trategies are evaluated along the following dimensions: completeness does it always find a solution if one exists? time complexity number of nodes generated/expanded space complexity maximum number of nodes in memory optimality does it always find a least-cost solution? Time and space complexity are measured in terms of b maximum branching factor of the search tree d depth of the least-cost solution m maximum depth of the state space (may be ) hapter 3 31
32 Uninformed search strategies Uninformed strategies use only the information available in the problem definition readth-first search Uniform-cost search Depth-first search Depth-limited search Iterative deepening search hapter 3 32
33 Expand shallowest unexpanded node readth-first search Implementation: fringe is a FIFO queue, i.e., new successors go at end D E F G hapter 3 33
34 Expand shallowest unexpanded node readth-first search Implementation: fringe is a FIFO queue, i.e., new successors go at end D E F G hapter 3 34
35 Expand shallowest unexpanded node readth-first search Implementation: fringe is a FIFO queue, i.e., new successors go at end D E F G hapter 3 35
36 Expand shallowest unexpanded node readth-first search Implementation: fringe is a FIFO queue, i.e., new successors go at end D E F G hapter 3 36
37 Properties of breadth-first search omplete?? hapter 3 37
38 Properties of breadth-first search omplete?? Yes (if b is finite) Time?? hapter 3 38
39 Properties of breadth-first search omplete?? Yes (if b is finite) Time?? 1 + b + b 2 + b b d + b(b d 1) = O(b d+1 ), i.e., exp. in d pace?? hapter 3 39
40 Properties of breadth-first search omplete?? Yes (if b is finite) Time?? 1 + b + b 2 + b b d + b(b d 1) = O(b d+1 ), i.e., exp. in d pace?? O(b d+1 ) (keeps every node in memory) Optimal?? hapter 3 40
41 Properties of breadth-first search omplete?? Yes (if b is finite) Time?? 1 + b + b 2 + b b d + b(b d 1) = O(b d+1 ), i.e., exp. in d pace?? O(b d+1 ) (keeps every node in memory) Optimal?? Yes (if cost = 1 per step); not optimal in general pace is the big problem; can easily generate nodes at 100M/sec so 24hrs = 8640G. hapter 3 41
42 Expand least-cost unexpanded node Uniform-cost search Implementation: fringe = queue ordered by path cost, lowest first Equivalent to breadth-first if step costs all equal omplete?? Yes, if step cost ɛ Time?? # of nodes with g cost of optimal solution, O(b /ɛ ) where is the cost of the optimal solution pace?? # of nodes with g cost of optimal solution, O(b /ɛ ) Optimal?? Yes nodes expanded in increasing order of g(n) hapter 3 42
43 Expand deepest unexpanded node Depth-first search Implementation: fringe = IFO queue, i.e., put successors at front D E F G H I J K M N O hapter 3 43
44 Expand deepest unexpanded node Depth-first search Implementation: fringe = IFO queue, i.e., put successors at front D E F G H I J K M N O hapter 3 44
45 Expand deepest unexpanded node Depth-first search Implementation: fringe = IFO queue, i.e., put successors at front D E F G H I J K M N O hapter 3 45
46 Expand deepest unexpanded node Depth-first search Implementation: fringe = IFO queue, i.e., put successors at front D E F G H I J K M N O hapter 3 46
47 Expand deepest unexpanded node Depth-first search Implementation: fringe = IFO queue, i.e., put successors at front D E F G H I J K M N O hapter 3 47
48 Expand deepest unexpanded node Depth-first search Implementation: fringe = IFO queue, i.e., put successors at front D E F G H I J K M N O hapter 3 48
49 Expand deepest unexpanded node Depth-first search Implementation: fringe = IFO queue, i.e., put successors at front D E F G H I J K M N O hapter 3 49
50 Expand deepest unexpanded node Depth-first search Implementation: fringe = IFO queue, i.e., put successors at front D E F G H I J K M N O hapter 3 50
51 Expand deepest unexpanded node Depth-first search Implementation: fringe = IFO queue, i.e., put successors at front D E F G H I J K M N O hapter 3 51
52 Expand deepest unexpanded node Depth-first search Implementation: fringe = IFO queue, i.e., put successors at front D E F G H I J K M N O hapter 3 52
53 Expand deepest unexpanded node Depth-first search Implementation: fringe = IFO queue, i.e., put successors at front D E F G H I J K M N O hapter 3 53
54 Expand deepest unexpanded node Depth-first search Implementation: fringe = IFO queue, i.e., put successors at front D E F G H I J K M N O hapter 3 54
55 Properties of depth-first search omplete?? hapter 3 55
56 Properties of depth-first search omplete?? No: fails in infinite-depth spaces, spaces with loops Modify to avoid repeated states along path complete in finite spaces Time?? hapter 3 56
57 Properties of depth-first search omplete?? No: fails in infinite-depth spaces, spaces with loops Modify to avoid repeated states along path complete in finite spaces Time?? O(b m ): terrible if m is much larger than d but if solutions are dense, may be much faster than breadth-first pace?? hapter 3 57
58 Properties of depth-first search omplete?? No: fails in infinite-depth spaces, spaces with loops Modify to avoid repeated states along path complete in finite spaces Time?? O(b m ): terrible if m is much larger than d but if solutions are dense, may be much faster than breadth-first pace?? O(bm), i.e., linear space! Optimal?? hapter 3 58
59 Properties of depth-first search omplete?? No: fails in infinite-depth spaces, spaces with loops Modify to avoid repeated states along path complete in finite spaces Time?? O(b m ): terrible if m is much larger than d but if solutions are dense, may be much faster than breadth-first pace?? O(bm), i.e., linear space! Optimal?? No hapter 3 59
60 Depth-limited search = depth-first search with depth limit l, i.e., nodes at depth l have no successors ecursive implementation: function Depth-imited-earch( problem, limit) returns soln/fail/cutoff ecursive-d(make-node(initial-tate[problem]), problem, limit) function ecursive-d(node, problem, limit) returns soln/fail/cutoff cutoff-occurred? false if Goal-Test(problem, tate[node]) then return node else if Depth[node] = limit then return cutoff else for each successor in Expand(node, problem) do result ecursive-d(successor, problem, limit) if result = cutoff then cutoff-occurred? true else if result failure then return result if cutoff-occurred? then return cutoff else return failure hapter 3 60
61 Iterative deepening search function Iterative-Deepening-earch( problem) returns a solution inputs: problem, a problem for depth 0 to do result Depth-imited-earch( problem, depth) if result cutoff then return result end hapter 3 61
62 Iterative deepening search l = 0 imit = 0 hapter 3 62
63 Iterative deepening search l = 1 imit = 1 hapter 3 63
64 Iterative deepening search l = 2 imit = 2 D E F G D E F G D E F G D E F G D E F G D E F G D E F G D E F G hapter 3 64
65 Iterative deepening search l = 3 imit = 3 D E F G D E F G D E F G D E F G H I J K M N O H I J K M N O H I J K M N O H I J K M N O D E F G D E F G D E F G D E F G H I J K M N O H I J K M N O H I J K M N O H I J K M N O D E F G D E F G D E F G D E F G H I J K M N O H I J K M N O H I J K M N O H I J K M N O hapter 3 65
66 omplete?? Properties of iterative deepening search hapter 3 66
67 Properties of iterative deepening search omplete?? Yes Time?? hapter 3 67
68 Properties of iterative deepening search omplete?? Yes Time?? (d + 1)b 0 + db 1 + (d 1)b b d = O(b d ) pace?? hapter 3 68
69 Properties of iterative deepening search omplete?? Yes Time?? (d + 1)b 0 + db 1 + (d 1)b b d = O(b d ) pace?? O(bd) Optimal?? hapter 3 69
70 Properties of iterative deepening search omplete?? Yes Time?? (d + 1)b 0 + db 1 + (d 1)b b d = O(b d ) pace?? O(bd) Optimal?? Yes, if step cost = 1 an be modified to explore uniform-cost tree Numerical comparison for b = 10 and d = 5, solution at far right leaf: N(ID) = , , , 000 = 123, 450 N(F) = , , , , 990 = 1, 111, 100 ID does better because other nodes at depth d are not expanded F can be modified to apply goal test when a node is generated hapter 3 70
71 ummary of algorithms riterion readth- Uniform- Depth- Depth- Iterative First ost First imited Deepening omplete? Yes Yes No Yes, if l d Yes Time b d+1 b /ɛ b m b l b d pace b d+1 b /ɛ bm bl bd Optimal? Yes Yes No No Yes hapter 3 71
72 epeated states Failure to detect repeated states can turn a linear problem into an exponential one! D hapter 3 72
73 Graph search function Graph-earch( problem, fringe) returns a solution, or failure closed an empty set fringe Insert(Make-Node(Initial-tate[problem]), fringe) loop do if fringe is empty then return failure node emove-front(fringe) if Goal-Test(problem, tate[node]) then return node if tate[node] is not in closed then add tate[node] to closed fringe Insertll(Expand(node, problem), fringe) end hapter 3 73
74 ummary Problem formulation usually requires abstracting away real-world details to define a state space that can feasibly be explored Variety of uninformed search strategies Iterative deepening search uses only linear space and not much more time than other uninformed algorithms Graph search can be exponentially more efficient than tree search hapter 3 74
AI: A Modern Approach, Chpts. 3-4 Russell and Norvig
AI: A Modern Approach, Chpts. 3-4 Russell and Norvig Sequential Decision Making in Robotics CS 599 Geoffrey Hollinger and Gaurav Sukhatme (Some slide content from Stuart Russell and HweeTou Ng) Spring,
Informed search algorithms. Chapter 4, Sections 1 2 1
Informed search algorithms Chapter 4, Sections 1 2 Chapter 4, Sections 1 2 1 Outline Best-first search A search Heuristics Chapter 4, Sections 1 2 2 Review: Tree search function Tree-Search( problem, fringe)
Measuring the Performance of an Agent
25 Measuring the Performance of an Agent The rational agent that we are aiming at should be successful in the task it is performing To assess the success we need to have a performance measure What is rational
CS91.543 MidTerm Exam 4/1/2004 Name: KEY. Page Max Score 1 18 2 11 3 30 4 15 5 45 6 20 Total 139
CS91.543 MidTerm Exam 4/1/2004 Name: KEY Page Max Score 1 18 2 11 3 30 4 15 5 45 6 20 Total 139 % INTRODUCTION, AI HISTORY AND AGENTS 1. [4 pts. ea.] Briefly describe the following important AI programs.
SOLVING PROBLEMS BY SEARCHING
3 SOLVING PROBLEMS BY SEARCHING In which we see how an agent can find a sequence of actions that achieves its goals, when no single action will do. PROBLEM SOLVING AGENT The simplest agents discussed in
Home Page. Data Structures. Title Page. Page 1 of 24. Go Back. Full Screen. Close. Quit
Data Structures Page 1 of 24 A.1. Arrays (Vectors) n-element vector start address + ielementsize 0 +1 +2 +3 +4... +n-1 start address continuous memory block static, if size is known at compile time dynamic,
An Introduction to The A* Algorithm
An Introduction to The A* Algorithm Introduction The A* (A-Star) algorithm depicts one of the most popular AI methods used to identify the shortest path between 2 locations in a mapped area. The A* algorithm
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)
CSE 326, Data Structures. Sample Final Exam. Problem Max Points Score 1 14 (2x7) 2 18 (3x6) 3 4 4 7 5 9 6 16 7 8 8 4 9 8 10 4 Total 92.
Name: Email ID: CSE 326, Data Structures Section: Sample Final Exam Instructions: The exam is closed book, closed notes. Unless otherwise stated, N denotes the number of elements in the data structure
Optimizations. Optimization Safety. Optimization Safety. Control Flow Graphs. Code transformations to improve program
Optimizations Code transformations to improve program Mainly: improve execution time Also: reduce program size Control low Graphs Can be done at high level or low level E.g., constant folding Optimizations
1) The postfix expression for the infix expression A+B*(C+D)/F+D*E is ABCD+*F/DE*++
Answer the following 1) The postfix expression for the infix expression A+B*(C+D)/F+D*E is ABCD+*F/DE*++ 2) Which data structure is needed to convert infix notations to postfix notations? Stack 3) The
Integer Programming: Algorithms - 3
Week 9 Integer Programming: Algorithms - 3 OPR 992 Applied Mathematical Programming OPR 992 - Applied Mathematical Programming - p. 1/12 Dantzig-Wolfe Reformulation Example Strength of the Linear Programming
Cpt S 223. School of EECS, WSU
The Shortest Path Problem 1 Shortest-Path Algorithms Find the shortest path from point A to point B Shortest in time, distance, cost, Numerous applications Map navigation Flight itineraries Circuit wiring
CPSC 211 Data Structures & Implementations (c) Texas A&M University [ 313]
CPSC 211 Data Structures & Implementations (c) Texas A&M University [ 313] File Structures A file is a collection of data stored on mass storage (e.g., disk or tape) Why on mass storage? too big to fit
Smart Graphics: Methoden 3 Suche, Constraints
Smart Graphics: Methoden 3 Suche, Constraints Vorlesung Smart Graphics LMU München Medieninformatik Butz/Boring Smart Graphics SS2007 Methoden: Suche 2 Folie 1 Themen heute Suchverfahren Hillclimbing Simulated
Why? A central concept in Computer Science. Algorithms are ubiquitous.
Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online
Algorithms and Data Structures
Algorithms and Data Structures Part 2: Data Structures PD Dr. rer. nat. habil. Ralf-Peter Mundani Computation in Engineering (CiE) Summer Term 2016 Overview general linked lists stacks queues trees 2 2
2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8]
Code No: R05220502 Set No. 1 1. (a) Describe the performance analysis in detail. (b) Show that f 1 (n)+f 2 (n) = 0(max(g 1 (n), g 2 (n)) where f 1 (n) = 0(g 1 (n)) and f 2 (n) = 0(g 2 (n)). [8+8] 2. (a)
The sample space for a pair of die rolls is the set. The sample space for a random number between 0 and 1 is the interval [0, 1].
Probability Theory Probability Spaces and Events Consider a random experiment with several possible outcomes. For example, we might roll a pair of dice, flip a coin three times, or choose a random real
Search methods motivation 1
Suppose you are an independent software developer, and your software package Windows Defeater R, widely available on sourceforge under a GNU GPL license, is getting an international attention and acclaim.
CompSci-61B, Data Structures Final Exam
Your Name: CompSci-61B, Data Structures Final Exam Your 8-digit Student ID: Your CS61B Class Account Login: This is a final test for mastery of the material covered in our labs, lectures, and readings.
Classifying Large Data Sets Using SVMs with Hierarchical Clusters. Presented by :Limou Wang
Classifying Large Data Sets Using SVMs with Hierarchical Clusters Presented by :Limou Wang Overview SVM Overview Motivation Hierarchical micro-clustering algorithm Clustering-Based SVM (CB-SVM) Experimental
1. The memory address of the first element of an array is called A. floor address B. foundation addressc. first address D.
1. The memory address of the first element of an array is called A. floor address B. foundation addressc. first address D. base address 2. The memory address of fifth element of an array can be calculated
Binary Search Trees. A Generic Tree. Binary Trees. Nodes in a binary search tree ( B-S-T) are of the form. P parent. Key. Satellite data L R
Binary Search Trees A Generic Tree Nodes in a binary search tree ( B-S-T) are of the form P parent Key A Satellite data L R B C D E F G H I J The B-S-T has a root node which is the only node whose parent
Data Structure [Question Bank]
Unit I (Analysis of Algorithms) 1. What are algorithms and how they are useful? 2. Describe the factor on best algorithms depends on? 3. Differentiate: Correct & Incorrect Algorithms? 4. Write short note:
INTEGER PROGRAMMING. Integer Programming. Prototype example. BIP model. BIP models
Integer Programming INTEGER PROGRAMMING In many problems the decision variables must have integer values. Example: assign people, machines, and vehicles to activities in integer quantities. If this is
Decision Trees and Networks
Lecture 21: Uncertainty 6 Today s Lecture Victor R. Lesser CMPSCI 683 Fall 2010 Decision Trees and Networks Decision Trees A decision tree is an explicit representation of all the possible scenarios from
Data Structure with C
Subject: Data Structure with C Topic : Tree Tree A tree is a set of nodes that either:is empty or has a designated node, called the root, from which hierarchically descend zero or more subtrees, which
TORA : Temporally Ordered Routing Algorithm
TORA : Temporally Ordered Routing Algorithm Invented by Vincent Park and M.Scott Corson from University of Maryland. TORA is an on-demand routing protocol. The main objective of TORA is to limit control
AUTOMATED TEST GENERATION FOR SOFTWARE COMPONENTS
TKK Reports in Information and Computer Science Espoo 2009 TKK-ICS-R26 AUTOMATED TEST GENERATION FOR SOFTWARE COMPONENTS Kari Kähkönen ABTEKNILLINEN KORKEAKOULU TEKNISKA HÖGSKOLAN HELSINKI UNIVERSITY OF
Chapter 6. Decoding. Statistical Machine Translation
Chapter 6 Decoding Statistical Machine Translation Decoding We have a mathematical model for translation p(e f) Task of decoding: find the translation e best with highest probability Two types of error
The Classes P and NP
The Classes P and NP We now shift gears slightly and restrict our attention to the examination of two families of problems which are very important to computer scientists. These families constitute the
Approximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
LABEL PROPAGATION ON GRAPHS. SEMI-SUPERVISED LEARNING. ----Changsheng Liu 10-30-2014
LABEL PROPAGATION ON GRAPHS. SEMI-SUPERVISED LEARNING ----Changsheng Liu 10-30-2014 Agenda Semi Supervised Learning Topics in Semi Supervised Learning Label Propagation Local and global consistency Graph
Analysis of Micromouse Maze Solving Algorithms
1 Analysis of Micromouse Maze Solving Algorithms David M. Willardson ECE 557: Learning from Data, Spring 2001 Abstract This project involves a simulation of a mouse that is to find its way through a maze.
CIS 631 Database Management Systems Sample Final Exam
CIS 631 Database Management Systems Sample Final Exam 1. (25 points) Match the items from the left column with those in the right and place the letters in the empty slots. k 1. Single-level index files
Social Media Mining. Graph Essentials
Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures
2 SYSTEM DESCRIPTION TECHNIQUES
2 SYSTEM DESCRIPTION TECHNIQUES 2.1 INTRODUCTION Graphical representation of any process is always better and more meaningful than its representation in words. Moreover, it is very difficult to arrange
5. A full binary tree with n leaves contains [A] n nodes. [B] log n 2 nodes. [C] 2n 1 nodes. [D] n 2 nodes.
1. The advantage of.. is that they solve the problem if sequential storage representation. But disadvantage in that is they are sequential lists. [A] Lists [B] Linked Lists [A] Trees [A] Queues 2. The
Analysis of Algorithms, I
Analysis of Algorithms, I CSOR W4231.002 Eleni Drinea Computer Science Department Columbia University Thursday, February 26, 2015 Outline 1 Recap 2 Representing graphs 3 Breadth-first search (BFS) 4 Applications
2) Write in detail the issues in the design of code generator.
COMPUTER SCIENCE AND ENGINEERING VI SEM CSE Principles of Compiler Design Unit-IV Question and answers UNIT IV CODE GENERATION 9 Issues in the design of code generator The target machine Runtime Storage
Incremental Routing Algorithms For Dynamic Transportation Networks
UCGE Reports Number 20238 Department of Geomatics Engineering Incremental Routing Algorithms For Dynamic Transportation Networks (URL: http://www.geomatics.ucalgary.ca/research/publications/gradtheses.html)
Introduction to Artificial Intelligence. Intelligent Agents
Introduction to Artificial Intelligence Intelligent Agents Bernhard Beckert UNIVERSITÄT KOBLENZ-LANDAU Winter Term 2004/2005 B. Beckert: KI für IM p.1 Outline Agents and environments PEAS (Performance,
Network (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 [email protected],
Level 2 Routing: LAN Bridges and Switches
Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense
Any two nodes which are connected by an edge in a graph are called adjacent node.
. iscuss following. Graph graph G consist of a non empty set V called the set of nodes (points, vertices) of the graph, a set which is the set of edges and a mapping from the set of edges to a set of pairs
Chapter 2: Intelligent Agents
Chapter 2: Intelligent Agents Outline Last class, introduced AI and rational agent Today s class, focus on intelligent agents Agent and environments Nature of environments influences agent design Basic
Previous Lectures. B-Trees. External storage. Two types of memory. B-trees. Main principles
B-Trees Algorithms and data structures for external memory as opposed to the main memory B-Trees Previous Lectures Height balanced binary search trees: AVL trees, red-black trees. Multiway search trees:
Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows
TECHNISCHE UNIVERSITEIT EINDHOVEN Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows Lloyd A. Fasting May 2014 Supervisors: dr. M. Firat dr.ir. M.A.A. Boon J. van Twist MSc. Contents
(Refer Slide Time: 2:03)
Control Engineering Prof. Madan Gopal Department of Electrical Engineering Indian Institute of Technology, Delhi Lecture - 11 Models of Industrial Control Devices and Systems (Contd.) Last time we were
Algorithms and Data S tructures Structures Stack, Queues, and Applications Applications Ulf Leser
Algorithms and Data Structures Stack, Queues, and Applications Ulf Leser Content of this Lecture Stacks and Queues Tree Traversal Towers of Hanoi Ulf Leser: Alg&DS, Summer semester 2011 2 Stacks and Queues
Introduction to LAN/WAN. Network Layer
Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services
Graph Theory Problems and Solutions
raph Theory Problems and Solutions Tom Davis [email protected] http://www.geometer.org/mathcircles November, 005 Problems. Prove that the sum of the degrees of the vertices of any finite graph is
B-Trees. Algorithms and data structures for external memory as opposed to the main memory B-Trees. B -trees
B-Trees Algorithms and data structures for external memory as opposed to the main memory B-Trees Previous Lectures Height balanced binary search trees: AVL trees, red-black trees. Multiway search trees:
6.080/6.089 GITCS Feb 12, 2008. Lecture 3
6.8/6.89 GITCS Feb 2, 28 Lecturer: Scott Aaronson Lecture 3 Scribe: Adam Rogal Administrivia. Scribe notes The purpose of scribe notes is to transcribe our lectures. Although I have formal notes of my
Random Map Generator v1.0 User s Guide
Random Map Generator v1.0 User s Guide Jonathan Teutenberg 2003 1 Map Generation Overview...4 1.1 Command Line...4 1.2 Operation Flow...4 2 Map Initialisation...5 2.1 Initialisation Parameters...5 -w xxxxxxx...5
6.852: Distributed Algorithms Fall, 2009. Class 2
.8: Distributed Algorithms Fall, 009 Class Today s plan Leader election in a synchronous ring: Lower bound for comparison-based algorithms. Basic computation in general synchronous networks: Leader election
Efficiency of algorithms. Algorithms. Efficiency of algorithms. Binary search and linear search. Best, worst and average case.
Algorithms Efficiency of algorithms Computational resources: time and space Best, worst and average case performance How to compare algorithms: machine-independent measure of efficiency Growth rate Complexity
Sources: On the Web: Slides will be available on:
C programming Introduction The basics of algorithms Structure of a C code, compilation step Constant, variable type, variable scope Expression and operators: assignment, arithmetic operators, comparison,
(IALC, Chapters 8 and 9) Introduction to Turing s life, Turing machines, universal machines, unsolvable problems.
3130CIT: Theory of Computation Turing machines and undecidability (IALC, Chapters 8 and 9) Introduction to Turing s life, Turing machines, universal machines, unsolvable problems. An undecidable problem
Compiler Construction
Compiler Construction Regular expressions Scanning Görel Hedin Reviderad 2013 01 23.a 2013 Compiler Construction 2013 F02-1 Compiler overview source code lexical analysis tokens intermediate code generation
Diagonalization. Ahto Buldas. Lecture 3 of Complexity Theory October 8, 2009. Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach.
Diagonalization Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach. Ahto Buldas [email protected] Background One basic goal in complexity theory is to separate interesting complexity
Regular Expressions and Automata using Haskell
Regular Expressions and Automata using Haskell Simon Thompson Computing Laboratory University of Kent at Canterbury January 2000 Contents 1 Introduction 2 2 Regular Expressions 2 3 Matching regular expressions
Krishna Institute of Engineering & Technology, Ghaziabad Department of Computer Application MCA-213 : DATA STRUCTURES USING C
Tutorial#1 Q 1:- Explain the terms data, elementary item, entity, primary key, domain, attribute and information? Also give examples in support of your answer? Q 2:- What is a Data Type? Differentiate
APP INVENTOR. Test Review
APP INVENTOR Test Review Main Concepts App Inventor Lists Creating Random Numbers Variables Searching and Sorting Data Linear Search Binary Search Selection Sort Quick Sort Abstraction Modulus Division
A Constraint Programming based Column Generation Approach to Nurse Rostering Problems
Abstract A Constraint Programming based Column Generation Approach to Nurse Rostering Problems Fang He and Rong Qu The Automated Scheduling, Optimisation and Planning (ASAP) Group School of Computer Science,
17.3.1 Follow the Perturbed Leader
CS787: Advanced Algorithms Topic: Online Learning Presenters: David He, Chris Hopman 17.3.1 Follow the Perturbed Leader 17.3.1.1 Prediction Problem Recall the prediction problem that we discussed in class.
ECE 250 Data Structures and Algorithms MIDTERM EXAMINATION 2008-10-23/5:15-6:45 REC-200, EVI-350, RCH-106, HH-139
ECE 250 Data Structures and Algorithms MIDTERM EXAMINATION 2008-10-23/5:15-6:45 REC-200, EVI-350, RCH-106, HH-139 Instructions: No aides. Turn off all electronic media and store them under your desk. If
Scheduling Shop Scheduling. Tim Nieberg
Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations
Class Overview. CSE 326: Data Structures. Goals. Goals. Data Structures. Goals. Introduction
Class Overview CSE 326: Data Structures Introduction Introduction to many of the basic data structures used in computer software Understand the data structures Analyze the algorithms that use them Know
Symbol Tables. Introduction
Symbol Tables Introduction A compiler needs to collect and use information about the names appearing in the source program. This information is entered into a data structure called a symbol table. The
Common Data Structures
Data Structures 1 Common Data Structures Arrays (single and multiple dimensional) Linked Lists Stacks Queues Trees Graphs You should already be familiar with arrays, so they will not be discussed. Trees
fakultät für informatik informatik 12 technische universität dortmund Data flow models Peter Marwedel Informatik 12 TU Dortmund Germany
12 Data flow models Peter Marwedel Informatik 12 TU Dortmund Germany Models of computation considered in this course Communication/ local computations Communicating finite state machines Data flow model
VISUAL ALGEBRA FOR COLLEGE STUDENTS. Laurie J. Burton Western Oregon University
VISUAL ALGEBRA FOR COLLEGE STUDENTS Laurie J. Burton Western Oregon University VISUAL ALGEBRA FOR COLLEGE STUDENTS TABLE OF CONTENTS Welcome and Introduction 1 Chapter 1: INTEGERS AND INTEGER OPERATIONS
Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits
Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique
Fast Sequential Summation Algorithms Using Augmented Data Structures
Fast Sequential Summation Algorithms Using Augmented Data Structures Vadim Stadnik [email protected] Abstract This paper provides an introduction to the design of augmented data structures that offer
Automata-based Verification - I
CS3172: Advanced Algorithms Automata-based Verification - I Howard Barringer Room KB2.20: email: [email protected] March 2006 Supporting and Background Material Copies of key slides (already
Game playing. Chapter 6. Chapter 6 1
Game playing Chapter 6 Chapter 6 1 Outline Games Perfect play minimax decisions α β pruning Resource limits and approximate evaluation Games of chance Games of imperfect information Chapter 6 2 Games vs.
Chapter 2 Intelligent Agents
1 Chapter 2 Intelligent Agents CS 461 Artificial Intelligence Pinar Duygulu Bilkent University, Spring 2008 Slides are mostly adapted from AIMA Outline 2 Agents and environments Rationality PEAS (Performance
KEYWORD SEARCH OVER PROBABILISTIC RDF GRAPHS
ABSTRACT KEYWORD SEARCH OVER PROBABILISTIC RDF GRAPHS In many real applications, RDF (Resource Description Framework) has been widely used as a W3C standard to describe data in the Semantic Web. In practice,
Decision Trees from large Databases: SLIQ
Decision Trees from large Databases: SLIQ C4.5 often iterates over the training set How often? If the training set does not fit into main memory, swapping makes C4.5 unpractical! SLIQ: Sort the values
Course Outline Department of Computing Science Faculty of Science. COMP 3710-3 Applied Artificial Intelligence (3,1,0) Fall 2015
Course Outline Department of Computing Science Faculty of Science COMP 710 - Applied Artificial Intelligence (,1,0) Fall 2015 Instructor: Office: Phone/Voice Mail: E-Mail: Course Description : Students
Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams
Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams André Ciré University of Toronto John Hooker Carnegie Mellon University INFORMS 2014 Home Health Care Home health care delivery
Current Standard: Mathematical Concepts and Applications Shape, Space, and Measurement- Primary
Shape, Space, and Measurement- Primary A student shall apply concepts of shape, space, and measurement to solve problems involving two- and three-dimensional shapes by demonstrating an understanding of:
6. Standard Algorithms
6. Standard Algorithms The algorithms we will examine perform Searching and Sorting. 6.1 Searching Algorithms Two algorithms will be studied. These are: 6.1.1. inear Search The inear Search The Binary
Random graphs with a given degree sequence
Sourav Chatterjee (NYU) Persi Diaconis (Stanford) Allan Sly (Microsoft) Let G be an undirected simple graph on n vertices. Let d 1,..., d n be the degrees of the vertices of G arranged in descending order.
Lecture 1: Course overview, circuits, and formulas
Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik
Answer Key for California State Standards: Algebra I
Algebra I: Symbolic reasoning and calculations with symbols are central in algebra. Through the study of algebra, a student develops an understanding of the symbolic language of mathematics and the sciences.
Y. Xiang, Constraint Satisfaction Problems
Constraint Satisfaction Problems Objectives Constraint satisfaction problems Backtracking Iterative improvement Constraint propagation Reference Russell & Norvig: Chapter 5. 1 Constraints Constraints are
6 Creating the Animation
6 Creating the Animation Now that the animation can be represented, stored, and played back, all that is left to do is understand how it is created. This is where we will use genetic algorithms, and this
Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li
Computer Algorithms NP-Complete Problems NP-completeness The quest for efficient algorithms is about finding clever ways to bypass the process of exhaustive search, using clues from the input in order
Curriculum Map. Discipline: Computer Science Course: C++
Curriculum Map Discipline: Computer Science Course: C++ August/September: How can computer programs make problem solving easier and more efficient? In what order does a computer execute the lines of code
