Measuring Similarity between Graphs Based on the Levenshtein Distance
|
|
|
- Melvin Dean
- 9 years ago
- Views:
Transcription
1 Appl. Mth. Inf. Sci. 7, No. 1L, (01) 169 Applied Mthemtics & Informtion Sciences An Interntionl Journl Mesuring Similrity etween Grphs Bsed on the Levenshtein Distnce Bin Co, ing Li nd Jinwei in College of Computer Science nd Technology, hejing University, Hngzhou, Chin 1007 Received: 0 Oct. 01, Revised: 9 Nov. 01, Accepted: 11 Dec. 01 Pulished online: 1 Fe. 01 Astrct: Grph dt hs een commonly used nd widely reserched oth in cdemi nd industry for mny pplictions. And mesuring similrity etween grphs (i.e., grph mtching) is the essentil step for grph serching, pttern recognition nd mchine vision. At present, the most widely used pproch to ddress the grph mtching prolem is grph edit distnce (GED). However, the computtion complexity of GED is expensive nd it tkes uncceptle time when the grph ecomes lrger. Generlly, grph could e cnonicl leled y some sort of strings nd we use the depth-first serch (DFS) code s our cnonicl leling system. Bsed on DFS codes, comining the Levenshtein distnce (i.e., string edit distnce, SED), we proposed novel method for similrity mesurement of grphs. Processing nd clculting the distnce etween two DFS codes, we turned the grph mtching prolem into string mtching, which gins gret improvement on the mtching performnce. The experimentl results prove its usefulness. Keywords: Grph mtching, similrity, depth-first serch (DFS), Levenshtein distnce 1. Introduction As one of the most powerful structures, grphs cn contin richer informtion thn other dt structures nd they hve een widely investigted nd pplied in rod rnge of res. Especilly, grphs which re leled nd/or ttriuted cn e used to strct nd model mny complicted reltions mong dt. When using grphs for representtion, vertices usully represent regions (or fetures) of the ojects nd edges etween them represent the reltions etween region. For exmple, World Wide We (WWW) cn e viewed s grph in which vertices correspond to sttic pges nd edges correspond to links etween pges [1]. In usiness process, the leled grphs re commonly used to model the rel usiness opertions nd the usiness ctivities re represented y the vertices of the grphs. Since mny prolems could e solved more esily sed on grphs, people hve collected vst mounts of grph dt nd estlished grph dtse for different purposes. Menwhile, the cdemic communities hve pid lot of ttentions on grph relted reserches. Among which, mesuring the similrity etween grphs is one of the hottest topics nd it is the foundtion for mny other reserches or pplictions. For exmple, to support sclle grph serch over lrge grph dtses in ioinformtics [], chemicl informtics [], nd even in usiness process mngement [], it is essentil to mtch the grphs y mesuring their similrities. Up to now, the most widely ccepted method for grph similrity mesurement is grph edit distnce (GED) [5]. The sic ide of GED is to sum the cost of elementry error-correcting opertions: node sustitution, node insertion/deletion, edge insertion/deletion. And the miniml cost tken over ll opertions is the edit distnce etween two grphs. Bsed on GED, numer of pproches hve een proposed [6 9]. Unfortuntely, the prolem of GED is NP-hrd in generl nd its min drwck is the exponentil computtionl complexity in terms of the numer of grph edit vertices [8]. Thus,.eng et l.[8] introduce notion of so clled str representtion for grph structures nd propose three novel methods to otin lower nd upper ounds of GED in polynomil time. However, their lower ound of computtionl complexity is in O(n ) which is still kind of expensive for computtion involving lrge mount of grphs.. n et l. [9] propose feture-sed method for similrity serch in grph structures. They use indexed fetures in grph dtse to filter grphs without performing pirwise similrity Corresponding uthor e-mil: [email protected]
2 170 B. Co,. Li, J. in: Mesuring similrity etween grphs... computtion. But they still turn to GED for mesuring similrity when grph mtching is needed. In order to improve the efficiency of grph mtching prolem, in this pper we propose novel method for mesuring the similrity etween two grphs. The strt point of our method is the depth-first serch code (DFS code)[10] nd insted of GED mesurements, we use Levenshtein [11] distnce (i.e., string edit distnce, SED) to mesure the similrity etween two grphs. The computtion for SED is in O(n ) time which mkes our method pplicle in prctice. The rest of this pper is orgnized s follows. Section will formlly present some sic definitions for ccurte description of grphs, DFS code, SED, nd etc. Then the implementtion detils will e presented in Section. The experimentl evlutions re studied in Section. Section 5 concludes the pper nd presents some future work.. Bsic Definitions In our pper, we consider grphs with leled nodes nd edges. And we present some sic definitions s follows. Definition 1(Leled Grph). A leled grph is tuple G=(V,E,L V,L E,l), where V is set of finite vertices nd E V V is set of edges.l V nd L E denote the finite sets of vertex nd edge lels. l is the mpping function for lels. From Definition 1, since the edge is denoted y two nodes, if there is n order etween these two nodes then this is directed grph, otherwise, n undirected grph. Besides, if V(G 1 ) = V(G ) nd E(G 1 ) = E(G ), we consider grph G 1 nd G re the sme. And G 1 is isomorphic to G (i.e., G 1 = G ) if they shre the sme structure. Definition (Grph Isomorphism). Let G nd G e two grphs. A grph isomorphism etween G nd G is ijective mpping f : V(G) V(G ) such tht: u V,(l(u)=l ( f(u))) u,v V,((u,v) E ( f(u), f(v)) E ) nd (u,v) E,(l(u,v)=l ( f(u), f(v))) As shown in Figure 1, G 1, G nd G hve the sme numer of nodes nd edges. Besides, ech edge in G 1, G nd G is sme since their corresponding strt nd end nodes re sme. Through replcing the nodes in G 1, G 1 could e redrwn to G. Clerly, the difference mong G 1, G nd G is the wy of leling nd drwing the grphs. Tht is to sy, they hve the sme structure nd they re merely different forms of certin grph which is just -circles grph. From Figure 1, we cn see tht: (1) x in G corresponds to y 1 in G, () y 1 in G corresponds to x in G. Apprently, since the mpping etween nodes in G nd G is not unique, there re other mppings existed. And other drwings for G could e found. x 1 x x 1 x 1 G 1 y y G G 1 y 1 y x y Figure 1 Three isomorphic grphs In other words, if the topology of two grphs is sme, then these two grphs re isomorphic. The isomorphism is very common in grph dt. Under some circumstnces, such s frequent sugrph mining, the isomorphic grphs should e pruned for the reson of efficiency. As for our work, since isomorphic grphs could e viewed s the sme grphs, we needn t mtch ll the grphs one y one. Insted, choosing one of the sme grphs to mesure is resonle. Thus, efore mesuring the similrity, we hve to exmine the grph isomorphism. In order to solve the isomorphism prolem, we need to clculte the cnonicl lels of two grphs. The cnonicl lel for grph (denoted s cl(g)) is unique code which is sequence of ytes, chrcters or numers. It is irreltive with the order of vertices nd edges of the grph G nd totlly depends on the topology of G. If the cnonicl lels of two grphs re the sme, then these grphs re isomorphic to ech other. There re few cnonicl leling methods tht hve een pplied, for exmple, conctenting rows or columns of the djcency mtrix of grph. In our work, we introduce the depth-first serch code (DFS code), which first mentioned in gspn [10] lgorithm, s the foundtion of our cnonicl leling system. Next, we present the necessry informtion of DFS code nd more detils refer to gspn [10]. Depth-first serch is well-known nd populrly pplied in grph lgorithms nd it consumes less memory thn redth-first serch (BFS). When performing depth-first serch in grph, DFS tree would e constructed. The DFS trees of one grph mye vrious, which is determined y the visiting order of the vertices in the grph. Thus, we cn t exmine the isomorphism of two grphs y DFS sequences. Adopting the DFS lexicogrphic order nd the minimum DFS code s the cnonicl leling cn solve this prolem. First of ll, we present the definition of DFS suscripting s follows. Definition (DFS Suscripting). When uilding DFS tree T, the depth-first discovery of the vertices forms liner order. The suscripts re used to record this order, where i< j mens v i is visited efore v j when the DFS is performed. G T represents grph G suscripted with T. T is clled DFS suscripting of G. We cll v 0, the strting vertex in T, the root. The vertex v n which visited lst is clled the rightmost vertex. The stright pth from v 0 to v n is clled the rightmost pth. As shown in Figure, the vertex lels re, nd while the edges lels re nd. The drkened edges in x y 1
3 Appl. Mth. Inf. Sci. 7, No. 1L, (01) / v 0 v 1 v v v 0 v 1 v v v 0 v 1 v v () () (c) (d) Figure The smple of DFS suscripting Figure () to Figure (d) represent three different DFS trees for the grph of Figure () nd they generte three different suscriptings. The rightmost pth for Figure () is (v 0,v 1,v ) nd (v 0,v 1,v,v ) is for Figure (c) nd Figure (d). Definition (Rightmost Extension). Given grph G nd its DFS tree T, we hve: Bckwrd extension: new edge cn e dded etween the rightmost vertex nd nother vertex on the rightmost pth. Forwrd extension: new vertex cn e introduced nd connected to vertex on the rightmost pth. Since oth kinds of ove extensions tke plce on the rightmost pth, we cll them rightmost extension. Tking Figure (c) s n exmple, since the edges lredy exist etween v 1, v nd v, the ckwrd extension cndidtes cn e (v,v 0 ) nd the forwrd extension cndidtes cn e edges extending from v 0, v 1, v or v, with new vertex introduced. The ll potentil rightmost extensions of Figure (c) re shown in Figure. The dshed lines represent the extensions. Among which, Figure () nd () oth extend from the rightmost vertex (i.e., v ) while Figure (c) to (d) re extend from other vertices on the rightmost pth. Anywy, ckwrd extension cn only occur on the rightmost vertex nd forwrd extension tkes plce on the vertex which elongs to the rightmost pth. void the extension of the sme grphs (i.e., isomorphic grphs), we hve to choose one se suscripting nd conduct rightmost extension on it. Definition 5(DFS Code). Given DFS tree T for grph G, sed on rightmost extension, the suscripted grph G T could e trnsformed to n edge sequence e i (i = 0,..., E 1). e i is clled DFS code, denoted s DFSCode(G,T). Bsed on Definition 5, there is ijective mpping etween suscripted grph nd DFS code. Besides, since there re vrious edge sequences for given grph G, we cn uild n order etween these sequences nd select the suscripting which genertes the minimum sequence s the suscripting of G. This order could lso e pplied to DFS codes nd we present it s follows. Definition 6(DFS Lexicogrphic Order). Let n edge e 5-tuple:(i, j,l i,l (i, j),l j ), where li nd l j re the lels of v i nd v j, respectively, nd l (i, j) is the lel of the edge connecting them. Given vertex v, the edge order is tht: All of its ckwrd edges should pper just efore its forwrd edges. If v does not hve ny forwrd edge, we put its ckwrd edges fter the forwrd edge, where v is the second vertex. Let the edge order tke the first priority, the vertex lel l i tke the second priority, the edge lel l ( i, j) tke the third nd the vertex lel l j tke the fourth to determine the order of two edges. The ordering sed on ove rules is clled DFS lexicogrphic order. From Definition 6 it follows tht, the complete sequence for Figure (c) is (0,1),(1,),(,),(,1). The DFS codes for Figure () to (d) re shown in Tle 1. We cn see from Tle 1 tht the first edges of the DFS codes re (0,1,,,),(0,1,,,) nd (0,1,,,). Since they hve the sme suscript (0,1) nd no edge order exists etween them, we cn t use it to tell the difference mong them. However, using the rest priorities of lel informtion we hve (0,1,,,) < (0,1,,,) < (0,1,,,). Therefore, c < c c < c d is the order for the DFS codes listed in Tle 1. () () (c) (d) (e) Figure The rightmost extension for Figure (c) As mentioned efore, it is likely tht one grph my hve more thn one DFS trees/suscriptings. In order to Tle 1 DFS codes for Figure () to (d) edge c c c c d e 0 (0,1,,,) (0,1,,,) (0,1,,,) e 1 (1,,,,) (1,,,,) (1,,,,) e (1,,,,) (,,,,) (,0,,,) e (,0,,,) (,1,,,) (,,,,)
4 17 B. Co,. Li, J. in: Mesuring similrity etween grphs... Definition 7(Minimum DFS Code). Given grph G, C(G) = {(DFSCode(G, T)) T, T is DFS tree for G}, sed on DFS lexicogrphic order, the minimum element of C(G) is clled minimum DFS code, denoted s mindfscode(g). According to Definition 7, the minimum DFS code of Figure () is c shown in Tle 1. Wht is more, we cn infer the following importnt reltionship etween the minimum DFS codes nd isomorphic grphs. Property 1.Given two grphs G nd G, we hve: G 1 = G mindfscode(g)=mindfscode(g ) Proof: : Since G is isomorphic to G, ccording to Definition 1, G nd G is one-to-one mpped under some certin function: f : V(G) V(G ). Thus, sed on the mpping etween E(G) nd E(G ) nd Definition 5, we cn infer the mpping of DFSCode(G,T) DFSCode(G,T). Nturlly, we hve mindfscode(g) mindfscode(g ). The proof is similr to. On the sis of ove discussions, we cn use the minimum DFS code s the cnonicl lel of one grph. At the end of this section, we present the definition of the Levenshtein distnce (i.e., string edit distnce, SED). Definition 8(String Edit Distnce, SED). Given two strings x nd y. The string edit distnce of x nd y, denoted s SED(x, y), is the minimum numer of insertions, deletions nd sustitutions to trnsform x into y. Since the cnonicl lel of grph is the minimum DFS code which could e viewed s string, we cn mesure the similrity etween two grphs y conducting string edit distnce (SED) clcultion on their minimum DFS codes. Thus, we turn the grph mtching prolem into string mtching prolem which is much esier to solve. Wht is more, the string edit distnce gurntees the efficiency of our work. Bsed on the definitions introduced in this section, we present the implementtion detils in the following section.. Implementtion In this section, we discuss the implementtion detils of mesuring similrity etween grphs sed on the DFS code mentioned in Section. Note tht, we view the grph which is used to mtch ginst the grph dtse s the source grph. According to the rel requirements of different ppliction scenrios, we cn divide our implementtion into two min phses which re preprocessing nd mtching. Preprocessing phse is performed offline while mtching is online. Usully, people py much ttention to mtching phse since it hs direct influences on user experiences driven y efficient performnce. Firstly, we present the pseudo code of preprocessing phse in Algorithm 1. Algorithm 1 The lgorithm for preprocessing phse Input: Grph dtse (GD) Output: The minimum DFS codes for GD: M 1 ; the orders of node lels nd edge lels: N,E 1: Initilize two mp structures: M 1 nd M : N get order of node lels in GD : E get order of edge lels in GD : for ech grph G in GD do 5: ID get the ID of G 6: code get mindfscode(g) y N nd E 7: M 1.put(ID,code) 8: end for 9: for ech record r in M 1 do 10: dd ID of r to the grph ID set: ID Set 11: for ech record r in M 1 {(ID,code)} do 1: if the code in r is sme with tht in r then 1: dd ID of r to the ID Set 1: M.put(code,ID Set) 15: end if 16: end for 17: end for 18: for ech record r=(code,id Set) in M do 19: code extrct two node lels of one edge in their ppering order from the code 0: end for As shown in Algorithm 1, the input for this phse is the grph dtse which my contin lrge numer of grphs. And this phse genertes three outputs: the minimum DFS codes for ll the grphs in the grph dtse; the orders of node lels nd edge lels. At first, we prse ech grph in the grph dtse nd produce two orders of ll the node lels nd edge lels existing in the grph dtse (line nd ). These orders re used for constructing the DFS code of the grphs in the following steps. By iterting the grphs in grph dtse (line -8), we get the ID nd the minimum DFS code of ech grph nd put them in mp. Then, we merge the sme codes in the grph dtse nd using n inverted key-vlue pir (i.e., the minimum DFS code is the key nd the vlue is grph IDs) to represent the DFS codes of the grph dtse (line 9-17). Thus, we put the sme or isomorphic grphs together nd we only select one of them for similrity mesurement, which is efficient for mtching. In fct, efore clculting the SED, we firstly preprocess the minimum DFS code for simplicity y extrcting the lels of two vertices of n edge in their ppering order (line 18-0). For exmple, the minimum DFS code of Figure () is (0,1,,,)(1,,,,)(1,,,,)(,0,,,) which would e extrcted to the string.
5 Appl. Mth. Inf. Sci. 7, No. 1L, (01) / 17 Besides, in order to correctly extrct the DFS code of the source grph nd conduct similrity mesurement etween grphs in online mtching, we must gurntee the consistency of the orders of node lels nd edge lels in the whole mtching procedure. Therefore, we record these orders nd output them for mtching phse. Then, we present the online mtching phse in Algorithm. Besides the results of the offline preprocessing phse, we dd the source grph s nother input. In this phse, we output the grph, of the grph dtse, which is most similr to the source grph. Algorithm The lgorithm for mtching phse Input: The minimum DFS codes for GD: M 1 ; the orders of node lels nd edge lels: N,E; source grph (G) Output: Grph G (G GD) which is most similr to G 1: Initilize one mp structure: M : code get mindfscode(g) y N nd E : for ech record(code,id Set) in M 1 do : filter the minimum DFS codes of code nd code 5: distnce clculte the SED(code,code ) 6: M.put(ID Set,distnce) 7: end for 8: Sort M y distnce vlues nd return the grph IDs of the smllest record of M From Algorithm we cn see tht, there re three steps in the mtching phse. The first step is to get the minimum DFS code for the source grph with the help of the orders of node lels nd edge lels generted in lst phse. Since this step is focus on only one grph, its computtion time is very short (line ). Secondly, we not only conduct the SED clcultion of DFS codes etween the source grph nd the grphs of the grph dtse ut lso put the set of grph IDs nd the clculted distnce into mp (line -7). This step costs most time of the mtching phse since we hve to mtch ech grph in the grph dtse. The time complexity of this step is O(m n ) where m represents the numer of the grphs in the grph dtse nd n is the numer of nodes the lrgest grph hs. Generlly, since m is much lrger thn n, the computtion time of this step is durle nd ccepted. At lst, we sort the mp y the vlue of distnce nd return the grph IDs of the smllest distnce (line 8). Notice tht, the SED of the minimum DFS codes etween two grphs cn t directly determine their similrity or distnce. Suppose tht the usiness process shown in Figure () is the source grph, Figure () nd (c) show two grphs in grph dtse. Compring with the source grph in (), the grphs in () nd (c) lck only one edge respectively, i.e., 1 nd 1, nd the rest nodes nd edges re sme. Thus, from the viewpoint of structure, they should hve the sme similrity to (). But, ccording to the minimum DFS codes shown in the figure, we hve SED(, )! = SED(, c). Grphs The Minimum DFS Codes: 1 11 () 1 1 () 1 1 (c) Figure The illustrtion for filtering the minimum DFS codes To solve this prolem, we filter the minimum DFS codes (line ) simplified in preprocessing phse. Since ech edge, in grph, represented y the DFS code hs een simplified to -tuple: (l i,l j ), the length of simplified minimum DFS code is the multiple of. Bsed on these tuples, we compre the codes of the source grph nd the grph in dtse. Then, remove the sme edges (DFS codes) in oth of them nd the rest codes re conducted SED clcultion. Note tht, fter exchnging two nodes of n edge, if this edge is sme with nother edge in other grphs, these two -tuples could e viewed sme too. Then, they would e removed from the code. As shown in Figure, to determine the similrity etween () nd (c), we could merely clculte the SED of two strings: 1 nd. Becuse, the edge could e turned to. nd 1 correspond to nd 1 for the sme rule. Bsed on the ove discussion, from Figure, we cn get: SED(, ) == SED(, c). To conclude this section, we preprocess the grph dtse y extrcting their minimum DFS codes. Then, we mesure the similrity etween grphs sed on these DFS codes with through string edit distnce technique. Furthermore, we implement prototype sed on the ove detils nd evlute its performnce. The experimentl results re present in the following section.. Evlution As mentioned efore, since the online mtching is much more concerned y the end users nd the offline preprocessing hs little contriution to the efficiency of mtching, we only study the performnce of the mtching phse implementtion in this section. In the following experiments, we compre our method (i.e., SED sed) with trditionl GED-sed nd oth of them re developed in Jv (Jdk1.6). GED-sed method is implemented in fst greedy wy nd its time complexity is O(n ). The sorting lgorithm for returning the smllest distnce is ule sort. And ll the tests re done on.6ghz Intel(R) Core(TM) Duo P800 PC with GB min memory, running Windows 7. The grph dtset we used here re generted syntheticlly. There re totlly different 6 vertex lels nd ech grph hs vertex size of 5 to 10. The model grph is rndomly selected from this dtset. Then, we mtch the model grph ginst ll dt grphs in the dtset. First of ll, we study the efficiency which is mesured y the time for mtching. We fix the numer of vertex in
6 17 B. Co,. Li, J. in: Mesuring similrity etween grphs... Mtching time (s) GED sed SED sed C1 C C Test cses (ID) () Size of 000 Mtching time (s) Figure 5 Tests on sizes of 000 nd GED sed SED sed C1 C C Test cses (ID) () Size of Mtching time (s) GED sed SED sed Vertex numer in model grph Figure 7 Mtching time under different model grph sizes the model grph to 5 nd oserve the mtching time for oth methods under different size, rnging from 000 to 10000, of grph dtse. For ech grph dtse, we use different model grphs (with sme vertex numer 5) s different test cses. As shown in Figure 5, under different size of grph dtse (i.e., Figure 5() nd Figure 5()), GED-sed method costs much more time for mtching thn tht of SED-sed method in ll test cses. This is ecuse tht the computtion time for GED-sed method is O(n ) while it is O(n ) for SED-sed. Apprently, GED-sed method would ecome less pplicle once the size of the grph dtse grows lrge. Tle shows verge mtching time for different grph dtse sizes. Clerly, s the dtse size increses, oth methods need more time for mtching. In ddition, we cn see from Figure 6 tht the mtching time of GED-sed method to tht of SED-sed rtio Tle Mtching time for different grph dtse sizes Dtse Size GED-sed (s) SED-sed (s) Mtching time rtio Grph dtse size Figure 6 Mtching time rtio for the model grph with 5 vertices Mtching time rtio Grph dtse size Figure 8 Mtching time rtio for different model grph sizes decreses with incresing size of grph dtse. Filtering the minimum DFS codes efore mtching is the cuse for this trend. In tests of Figure nd Figure 8, we fix the size of grph dtse to 6 nd study the efficiency under different model grphs with different vertex numer rnged from to 10. As shown in Figure, using our SED-sed method, the mtching time is lmost unchnged with very smll vlues of 0.1 seconds round. However, there is n pprent growth trend in the GED-sed method nd the mtching time grows fst s the vertex numer incresed. Tht is to sy, GED-sed method is more sensitive to the size of the model grph thn ours. The reson is tht GED-sed implementtion hs to serch the est result in ech step nd grow sed on the current est result. There re mny recursive serches nd judges in this procedure which costs more thn computing two strings. Different from the mtching rtio trend tht showed in Figure 6, Figure 8 presents n opposite trend: the mtching time of GED-sed method to tht of SED-sed rtio increses with the incresing numer of vertex. This is ecuse in our SED-sed method, the numer of grphs which need to e mtched cn mke more contriutions to the mtching time thn the numer of vertex of model grph.
7 Appl. Mth. Inf. Sci. 7, No. 1L, (01) / As for effectiveness study, sed on oservtions on mtching results of two methods, first severl results for oth methods re lmost sme. However, since our method nd GED-sed method dopt different principles (e.g. the costs for node/edge deletion, insertion nd other opertions) for similrity mesurements, there exist greter differences etween mtching results in lrger size for oth methods. Generlly, the difference rtio could e 0% round. Nevertheless, since first severl results re more concerned y users, our method cn stisfy their ccurcy demnds in generl. 5. Conclusion In this pper, we propose novel pproch for mesuring similrity etween grphs. Using depth-first serch (DFS) strtegy, we trverse the grphs nd lel them cnoniclly with the minimum DFS code. Then, fter extrcting these codes nd filtering them, we conduct the clcultion of string edit distnce (SED) etween the source grph nd grphs in dtse. Compring with trditionl GED sed method, our pproch is more efficient nd the experimentl evlution proves its utility in rel pplictions. There is still some work needs e done in the future. For exmple, the ccurcy of mesuring similrity etween grphs through clculting the SED of DFS codes should e studied oth theoreticlly nd experimentlly. Besides, the reltion etween our proposed method nd GED needs to e determined. At lst, we re going to exploit our method in rel grph dtsets nd to improve its performnce mking it more pplicle nd prcticle. Acknowledgement This reserch ws prtilly supported y following foundtions: Ntionl Science nd Technology Supporting Progrm of Chin(No.01BAH06F0, No. 011BAD1B0), Ntionl Nturl Science Foundtion of Chin under Grnt (No.61719), Reserch Fund for the Doctorl Progrm y Ministry of Eduction of Chin(No ) References [1] A.. Broder, R. Kumr, F. Mghoul, P. Rghvn, S. Rjgopln, R. Stt, A. Tomkins, nd J.L. Wiener, Grph structure in the We. In Proceedings of Computer Networks. 09-0, (000). []. Tin, R. C. McEchin, C. Sntos, D. J. Sttes, nd J. M. Ptel. Sg: sugrph mtching tool for iologicl grphs. Bioinformtics, (): -9, (007). [] P. Willett, J. Brnrd, nd G. Downs. Chemicl similrity serching. J. Chem. Inf. Comput. Sci, 8(6): , (1998). [] R. Dijkmn, M. Dums, nd L. Grci-Bnuelos. Grph mtching lgorithms for usiness process model similrity serch. In BPM, (009). [5] H. Bunke. On reltion etween grph edit distnce nd mximum common sugrph. Pttern Recognition Letters, 18(8): , (1997). [6] H. Bunke nd K. Sherer. A grph distnce metric sed on the mximl common sugrph. Pttern Recognition Letters, 19(-): 55-59, (1998). [7] J. Rymond, E. Grdiner, nd P. Willett. RASCAL: Clcultion of Grph Similrity using Mximum Common Edge Sugrphs. The Computer Journl, 5(6): 61-6, (00). [8]. eng, A.K.H. Tung, J. Wng, J. Feng, nd L. hou, Compring Strs: On Approximting Grph Edit Distnce. In Proceedings of PVLDB, 5-6, (009). [9]. n, F. hu, P.S. u, nd J. Hn, Feture-sed similrity serch in grph structures. In Proceedings of ACM Trns. Dtse Syst, , (006). [10]. n nd J. Hn, gspn: Grph-Bsed Sustructure Pttern Mining. In Proceedings of ICDM (00). [11] I. Levenshtein, Binry code cple of correcting deletions, insertions nd reversls. Cyernetics nd Control Theory, 10(8), , (1966). Bin Co is currently Ph.D. cndidte in the College of Computer Science, hejing University (Chin). He received his B.S. from hejing University of Technology, Chin in 008 nd he took successive postgrdute nd doctorl progrm in hejing University since 009. His reserch interests include workflow mngement, event processing nd sptil dtse. ing Li is currently n ssocite professor in the College of Computer Science, hejing University (Chin). He received his M.S. from hejing University in 1997 nd his Ph.D. in Computer Science from hejing University in 000. His reserch interests include softwre rchitecture, softwre utomtion, compiling technology nd middlewre technology. Jinwei in is currently professor in the College of Computer Science, hejing University (Chin). He received his Ph.D. in Computer Science from hejing University in 001. He is the visiting scholr of Georgi Institute of Technology, Americ in 008. His reserch interests include distriuted network middlewre, softwre rchitecture nd informtion integrtion.
Regular Sets and Expressions
Regulr Sets nd Expressions Finite utomt re importnt in science, mthemtics, nd engineering. Engineers like them ecuse they re super models for circuits (And, since the dvent of VLSI systems sometimes finite
Reasoning to Solve Equations and Inequalities
Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing
LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES
LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of
Small Businesses Decisions to Offer Health Insurance to Employees
Smll Businesses Decisions to Offer Helth Insurnce to Employees Ctherine McLughlin nd Adm Swinurn, June 2014 Employer-sponsored helth insurnce (ESI) is the dominnt source of coverge for nonelderly dults
Or more simply put, when adding or subtracting quantities, their uncertainties add.
Propgtion of Uncertint through Mthemticl Opertions Since the untit of interest in n eperiment is rrel otined mesuring tht untit directl, we must understnd how error propgtes when mthemticl opertions re
Homework 3 Solutions
CS 341: Foundtions of Computer Science II Prof. Mrvin Nkym Homework 3 Solutions 1. Give NFAs with the specified numer of sttes recognizing ech of the following lnguges. In ll cses, the lphet is Σ = {,1}.
2 DIODE CLIPPING and CLAMPING CIRCUITS
2 DIODE CLIPPING nd CLAMPING CIRCUITS 2.1 Ojectives Understnding the operting principle of diode clipping circuit Understnding the operting principle of clmping circuit Understnding the wveform chnge of
How To Network A Smll Business
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
Appendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered:
Appendi D: Completing the Squre nd the Qudrtic Formul Fctoring qudrtic epressions such s: + 6 + 8 ws one of the topics introduced in Appendi C. Fctoring qudrtic epressions is useful skill tht cn help you
Section 5-4 Trigonometric Functions
5- Trigonometric Functions Section 5- Trigonometric Functions Definition of the Trigonometric Functions Clcultor Evlution of Trigonometric Functions Definition of the Trigonometric Functions Alternte Form
Small Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )
Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +
Small Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
A.7.1 Trigonometric interpretation of dot product... 324. A.7.2 Geometric interpretation of dot product... 324
A P P E N D I X A Vectors CONTENTS A.1 Scling vector................................................ 321 A.2 Unit or Direction vectors...................................... 321 A.3 Vector ddition.................................................
Small Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
Scalable Mining of Large Disk-based Graph Databases
Sclle Mining of Lrge Disk-sed Grph Dtses Chen Wng Wei Wng Jin Pei Yongti Zhu Bile Shi Fudn University, Chin, {chenwng, weiwng1, 2465, shi}@fudn.edu.cn Stte University of New York t Bufflo, USA & Simon
CS99S Laboratory 2 Preparation Copyright W. J. Dally 2001 October 1, 2001
CS99S Lortory 2 Preprtion Copyright W. J. Dlly 2 Octoer, 2 Ojectives:. Understnd the principle of sttic CMOS gte circuits 2. Build simple logic gtes from MOS trnsistors 3. Evlute these gtes to oserve logic
Concept Formation Using Graph Grammars
Concept Formtion Using Grph Grmmrs Istvn Jonyer, Lwrence B. Holder nd Dine J. Cook Deprtment of Computer Science nd Engineering University of Texs t Arlington Box 19015 (416 Ytes St.), Arlington, TX 76019-0015
EQUATIONS OF LINES AND PLANES
EQUATIONS OF LINES AND PLANES MATH 195, SECTION 59 (VIPUL NAIK) Corresponding mteril in the ook: Section 12.5. Wht students should definitely get: Prmetric eqution of line given in point-direction nd twopoint
Small Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
Experiment 6: Friction
Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht
One Minute To Learn Programming: Finite Automata
Gret Theoreticl Ides In Computer Science Steven Rudich CS 15-251 Spring 2005 Lecture 9 Fe 8 2005 Crnegie Mellon University One Minute To Lern Progrmming: Finite Automt Let me tech you progrmming lnguge
9 CONTINUOUS DISTRIBUTIONS
9 CONTINUOUS DISTIBUTIONS A rndom vrible whose vlue my fll nywhere in rnge of vlues is continuous rndom vrible nd will be ssocited with some continuous distribution. Continuous distributions re to discrete
Factoring Polynomials
Fctoring Polynomils Some definitions (not necessrily ll for secondry school mthemtics): A polynomil is the sum of one or more terms, in which ech term consists of product of constnt nd one or more vribles
Graphs on Logarithmic and Semilogarithmic Paper
0CH_PHClter_TMSETE_ 3//00 :3 PM Pge Grphs on Logrithmic nd Semilogrithmic Pper OBJECTIVES When ou hve completed this chpter, ou should be ble to: Mke grphs on logrithmic nd semilogrithmic pper. Grph empiricl
Lecture 3 Gaussian Probability Distribution
Lecture 3 Gussin Probbility Distribution Introduction l Gussin probbility distribution is perhps the most used distribution in ll of science. u lso clled bell shped curve or norml distribution l Unlike
1. Find the zeros Find roots. Set function = 0, factor or use quadratic equation if quadratic, graph to find zeros on calculator
AP Clculus Finl Review Sheet When you see the words. This is wht you think of doing. Find the zeros Find roots. Set function =, fctor or use qudrtic eqution if qudrtic, grph to find zeros on clcultor.
Babylonian Method of Computing the Square Root: Justifications Based on Fuzzy Techniques and on Computational Complexity
Bbylonin Method of Computing the Squre Root: Justifictions Bsed on Fuzzy Techniques nd on Computtionl Complexity Olg Koshelev Deprtment of Mthemtics Eduction University of Texs t El Pso 500 W. University
Math 135 Circles and Completing the Square Examples
Mth 135 Circles nd Completing the Squre Exmples A perfect squre is number such tht = b 2 for some rel number b. Some exmples of perfect squres re 4 = 2 2, 16 = 4 2, 169 = 13 2. We wish to hve method for
PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY
MAT 0630 INTERNET RESOURCES, REVIEW OF CONCEPTS AND COMMON MISTAKES PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY Contents 1. ACT Compss Prctice Tests 1 2. Common Mistkes 2 3. Distributive
Bayesian Updating with Continuous Priors Class 13, 18.05, Spring 2014 Jeremy Orloff and Jonathan Bloom
Byesin Updting with Continuous Priors Clss 3, 8.05, Spring 04 Jeremy Orloff nd Jonthn Bloom Lerning Gols. Understnd prmeterized fmily of distriutions s representing continuous rnge of hypotheses for the
Operations with Polynomials
38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: Write polynomils in stndrd form nd identify the leding coefficients nd degrees of polynomils Add nd subtrct polynomils Multiply
How To Set Up A Network For Your Business
Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer
9.3. The Scalar Product. Introduction. Prerequisites. Learning Outcomes
The Sclr Product 9.3 Introduction There re two kinds of multipliction involving vectors. The first is known s the sclr product or dot product. This is so-clled becuse when the sclr product of two vectors
Mathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100
hsn.uk.net Higher Mthemtics UNIT 3 OUTCOME 1 Vectors Contents Vectors 18 1 Vectors nd Sclrs 18 Components 18 3 Mgnitude 130 4 Equl Vectors 131 5 Addition nd Subtrction of Vectors 13 6 Multipliction by
Simulation of operation modes of isochronous cyclotron by a new interative method
NUKLEONIKA 27;52(1):29 34 ORIGINAL PAPER Simultion of opertion modes of isochronous cyclotron y new intertive method Ryszrd Trszkiewicz, Mrek Tlch, Jcek Sulikowski, Henryk Doruch, Tdeusz Norys, Artur Srok,
Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers.
2 Rtionl Numbers Integers such s 5 were importnt when solving the eqution x+5 = 0. In similr wy, frctions re importnt for solving equtions like 2x = 1. Wht bout equtions like 2x + 1 = 0? Equtions of this
Unit 6: Exponents and Radicals
Eponents nd Rdicls -: The Rel Numer Sstem Unit : Eponents nd Rdicls Pure Mth 0 Notes Nturl Numers (N): - counting numers. {,,,,, } Whole Numers (W): - counting numers with 0. {0,,,,,, } Integers (I): -
Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3.
The nlysis of vrince (ANOVA) Although the t-test is one of the most commonly used sttisticl hypothesis tests, it hs limittions. The mjor limittion is tht the t-test cn be used to compre the mens of only
Basic Research in Computer Science BRICS RS-02-13 Brodal et al.: Solving the String Statistics Problem in Time O(n log n)
BRICS Bsic Reserch in Computer Science BRICS RS-02-13 Brodl et l.: Solving the String Sttistics Prolem in Time O(n log n) Solving the String Sttistics Prolem in Time O(n log n) Gerth Stølting Brodl Rune
Solving the String Statistics Problem in Time O(n log n)
Solving the String Sttistics Prolem in Time O(n log n) Gerth Stølting Brodl 1,,, Rune B. Lyngsø 3, Ann Östlin1,, nd Christin N. S. Pedersen 1,2, 1 BRICS, Deprtment of Computer Science, University of Arhus,
AntiSpyware Enterprise Module 8.5
AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility
Binary Representation of Numbers Autar Kaw
Binry Representtion of Numbers Autr Kw After reding this chpter, you should be ble to: 1. convert bse- rel number to its binry representtion,. convert binry number to n equivlent bse- number. In everydy
Health insurance marketplace What to expect in 2014
Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum
Quality Evaluation of Entrepreneur Education on Graduate Students Based on AHP-fuzzy Comprehensive Evaluation Approach ZhongXiaojun 1, WangYunfeng 2
Interntionl Journl of Engineering Reserch & Science (IJOER) ISSN [2395-6992] [Vol-2, Issue-1, Jnury- 2016] Qulity Evlution of Entrepreneur Eduction on Grdute Students Bsed on AHP-fuzzy Comprehensive Evlution
An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process
An Undergrdute Curriculum Evlution with the Anlytic Hierrchy Process Les Frir Jessic O. Mtson Jck E. Mtson Deprtment of Industril Engineering P.O. Box 870288 University of Albm Tuscloos, AL. 35487 Abstrct
All pay auctions with certain and uncertain prizes a comment
CENTER FOR RESEARC IN ECONOMICS AND MANAGEMENT CREAM Publiction No. 1-2015 All py uctions with certin nd uncertin prizes comment Christin Riis All py uctions with certin nd uncertin prizes comment Christin
FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University
SYSTEM FAULT AND Hrry G. Kwtny Deprtment of Mechnicl Engineering & Mechnics Drexel University OUTLINE SYSTEM RBD Definition RBDs nd Fult Trees System Structure Structure Functions Pths nd Cutsets Reliility
** Dpt. Chemical Engineering, Kasetsart University, Bangkok 10900, Thailand
Modelling nd Simultion of hemicl Processes in Multi Pulse TP Experiment P. Phnwdee* S.O. Shekhtmn +. Jrungmnorom** J.T. Gleves ++ * Dpt. hemicl Engineering, Ksetsrt University, Bngkok 10900, Thilnd + Dpt.hemicl
How To Make A Network More Efficient
Rethinking Virtul Network Emedding: Sustrte Support for Pth Splitting nd Migrtion Minln Yu, Yung Yi, Jennifer Rexford, Mung Ching Princeton University Princeton, NJ {minlnyu,yyi,jrex,chingm}@princeton.edu
Health insurance exchanges What to expect in 2014
Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount
Helicopter Theme and Variations
Helicopter Theme nd Vritions Or, Some Experimentl Designs Employing Pper Helicopters Some possible explntory vribles re: Who drops the helicopter The length of the rotor bldes The height from which the
5 a LAN 6 a gateway 7 a modem
STARTER With the help of this digrm, try to descrie the function of these components of typicl network system: 1 file server 2 ridge 3 router 4 ckone 5 LAN 6 gtewy 7 modem Another Novell LAN Router Internet
Integration by Substitution
Integrtion by Substitution Dr. Philippe B. Lvl Kennesw Stte University August, 8 Abstrct This hndout contins mteril on very importnt integrtion method clled integrtion by substitution. Substitution is
Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999
Economics Letters 65 (1999) 9 15 Estimting dynmic pnel dt models: guide for q mcroeconomists b, * Ruth A. Judson, Ann L. Owen Federl Reserve Bord of Governors, 0th & C Sts., N.W. Wshington, D.C. 0551,
and thus, they are similar. If k = 3 then the Jordan form of both matrices is
Homework ssignment 11 Section 7. pp. 249-25 Exercise 1. Let N 1 nd N 2 be nilpotent mtrices over the field F. Prove tht N 1 nd N 2 re similr if nd only if they hve the sme miniml polynomil. Solution: If
CHAPTER 11 Numerical Differentiation and Integration
CHAPTER 11 Numericl Differentition nd Integrtion Differentition nd integrtion re bsic mthemticl opertions with wide rnge of pplictions in mny res of science. It is therefore importnt to hve good methods
SPECIAL PRODUCTS AND FACTORIZATION
MODULE - Specil Products nd Fctoriztion 4 SPECIAL PRODUCTS AND FACTORIZATION In n erlier lesson you hve lernt multipliction of lgebric epressions, prticulrly polynomils. In the study of lgebr, we come
Pentominoes. Pentominoes. Bruce Baguley Cascade Math Systems, LLC. The pentominoes are a simple-looking set of objects through which some powerful
Pentominoes Bruce Bguley Cscde Mth Systems, LLC Astrct. Pentominoes nd their reltives the polyominoes, polycues, nd polyhypercues will e used to explore nd pply vrious importnt mthemticl concepts. In this
P.3 Polynomials and Factoring. P.3 an 1. Polynomial STUDY TIP. Example 1 Writing Polynomials in Standard Form. What you should learn
33337_0P03.qp 2/27/06 24 9:3 AM Chpter P Pge 24 Prerequisites P.3 Polynomils nd Fctoring Wht you should lern Polynomils An lgeric epression is collection of vriles nd rel numers. The most common type of
0.1 Basic Set Theory and Interval Notation
0.1 Bsic Set Theory nd Intervl Nottion 3 0.1 Bsic Set Theory nd Intervl Nottion 0.1.1 Some Bsic Set Theory Notions Like ll good Mth ooks, we egin with definition. Definition 0.1. A set is well-defined
Performance analysis model for big data applications in cloud computing
Butist Villlpndo et l. Journl of Cloud Computing: Advnces, Systems nd Applictions 2014, 3:19 RESEARCH Performnce nlysis model for big dt pplictions in cloud computing Luis Edurdo Butist Villlpndo 1,2,
Unleashing the Power of Cloud
Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,
Exponential and Logarithmic Functions
Nme Chpter Eponentil nd Logrithmic Functions Section. Eponentil Functions nd Their Grphs Objective: In this lesson ou lerned how to recognize, evlute, nd grph eponentil functions. Importnt Vocbulr Define
Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions.
Lerning Objectives Loci nd Conics Lesson 3: The Ellipse Level: Preclculus Time required: 120 minutes In this lesson, students will generlize their knowledge of the circle to the ellipse. The prmetric nd
How fast can we sort? Sorting. Decision-tree model. Decision-tree for insertion sort Sort a 1, a 2, a 3. CS 3343 -- Spring 2009
CS 4 -- Spring 2009 Sorting Crol Wenk Slides courtesy of Chrles Leiserson with smll chnges by Crol Wenk CS 4 Anlysis of Algorithms 1 How fst cn we sort? All the sorting lgorithms we hve seen so fr re comprison
Decision Rule Extraction from Trained Neural Networks Using Rough Sets
Decision Rule Extrction from Trined Neurl Networks Using Rough Sets Alin Lzr nd Ishwr K. Sethi Vision nd Neurl Networks Lbortory Deprtment of Computer Science Wyne Stte University Detroit, MI 48 ABSTRACT
DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report
DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of
1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam
1./1.1 Introduction to Computers nd Engineering Problem Solving Fll 211 - Finl Exm Nme: MIT Emil: TA: Section: You hve 3 hours to complete this exm. In ll questions, you should ssume tht ll necessry pckges
Algebra Review. How well do you remember your algebra?
Algebr Review How well do you remember your lgebr? 1 The Order of Opertions Wht do we men when we write + 4? If we multiply we get 6 nd dding 4 gives 10. But, if we dd + 4 = 7 first, then multiply by then
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm
Bibhudendr chry, Girij Snkr Rth, Srt Kumr Ptr, nd Sroj Kumr Pnigrhy Novel Methods of Generting Self-Invertible Mtrix for Hill Cipher lgorithm Bibhudendr chry Deprtment of Electronics & Communiction Engineering
Integration. 148 Chapter 7 Integration
48 Chpter 7 Integrtion 7 Integrtion t ech, by supposing tht during ech tenth of second the object is going t constnt speed Since the object initilly hs speed, we gin suppose it mintins this speed, but
Multiplication and Division - Left to Right. Addition and Subtraction - Left to Right.
Order of Opertions r of Opertions Alger P lese Prenthesis - Do ll grouped opertions first. E cuse Eponents - Second M D er Multipliction nd Division - Left to Right. A unt S hniqu Addition nd Sutrction
www.mathsbox.org.uk e.g. f(x) = x domain x 0 (cannot find the square root of negative values)
www.mthsbo.org.uk CORE SUMMARY NOTES Functions A function is rule which genertes ectl ONE OUTPUT for EVERY INPUT. To be defined full the function hs RULE tells ou how to clculte the output from the input
Vector differentiation. Chapters 6, 7
Chpter 2 Vectors Courtesy NASA/JPL-Cltech Summry (see exmples in Hw 1, 2, 3) Circ 1900 A.D., J. Willird Gis invented useful comintion of mgnitude nd direction clled vectors nd their higher-dimensionl counterprts
RTL Power Optimization with Gate-level Accuracy
RTL Power Optimiztion with Gte-level Accurcy Qi Wng Cdence Design Systems, Inc Sumit Roy Clypto Design Systems, Inc 555 River Oks Prkwy, Sn Jose 95125 2903 Bunker Hill Lne, Suite 208, SntClr 95054 [email protected]
ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment
ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks
Numeracy across the Curriculum in Key Stages 3 and 4. Helpful advice and suggested resources from the Leicestershire Secondary Mathematics Team
Numercy cross the Curriculum in Key Stges 3 nd 4 Helpful dvice nd suggested resources from the Leicestershire Secondry Mthemtics Tem 1 Contents pge The development of whole school policy 3 A definition
6.2 Volumes of Revolution: The Disk Method
mth ppliction: volumes of revolution, prt ii Volumes of Revolution: The Disk Method One of the simplest pplictions of integrtion (Theorem ) nd the ccumultion process is to determine so-clled volumes of
Small Business Cloud Services
Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly
Space Vector Pulse Width Modulation Based Induction Motor with V/F Control
Interntionl Journl of Science nd Reserch (IJSR) Spce Vector Pulse Width Modultion Bsed Induction Motor with V/F Control Vikrmrjn Jmbulingm Electricl nd Electronics Engineering, VIT University, Indi Abstrct:
Vendor Rating for Service Desk Selection
Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl
Software Cost Estimation Model Based on Integration of Multi-agent and Case-Based Reasoning
Journl of Computer Science 2 (3): 276-282, 2006 ISSN 1549-3636 2006 Science Publictions Softwre Cost Estimtion Model Bsed on Integrtion of Multi-gent nd Cse-Bsed Resoning Hsn Al-Skrn Informtion Technology
Implementation Evaluation Modeling of Selecting ERP Software Based on Fuzzy Theory
Implementtion Evlution Modeling of Selecting ERP Softwre Bsed on Fuzzy Theory Xukn Xu 1, Ydong Jing 1 nd Zheng Shi 2 1 Informtion Mngement Deprtment, Chngzhou Cmpus, Hohi University, Chngzhou 213022, Jingsu,
Example A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding
1 Exmple A rectngulr box without lid is to be mde from squre crdbord of sides 18 cm by cutting equl squres from ech corner nd then folding up the sides. 1 Exmple A rectngulr box without lid is to be mde
Roudmup for Los Angeles Pierce College ADIV Program ancl csu Dominguez Hilk Rlt-B^sr/ progrum
Roudmup for Los Angeles Pierce College ADIV Progrm ncl csu Dominguez Hilk Rlt-B^sr/ progrum Admission Requirements for Los Angeles pierce (LApC) LAPC hs four-semester Associte Degree in Nursing (ADN) Progrm.
Enterprise Risk Management Software Buyer s Guide
Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors
Understanding Basic Analog Ideal Op Amps
Appliction Report SLAA068A - April 2000 Understnding Bsic Anlog Idel Op Amps Ron Mncini Mixed Signl Products ABSTRACT This ppliction report develops the equtions for the idel opertionl mplifier (op mp).
Unit 29: Inference for Two-Way Tables
Unit 29: Inference for Two-Wy Tbles Prerequisites Unit 13, Two-Wy Tbles is prerequisite for this unit. In ddition, students need some bckground in significnce tests, which ws introduced in Unit 25. Additionl
In addition, the following elements form an integral part of the Agency strike prevention plan:
UNITED STTES DEPRTMENT OF GRICULTURE Wshington, DC 20250 Federl Grin Inspection Service FGIS Directive 4711.2 6/16/80 STRIKE PREVENTION ND STRIKE CONTINGENCY PLNS I PURPOSE This Instruction: Estlishes
