Minkowski Sum of Polytopes Defined by Their Vertices
|
|
|
- Bonnie Eaton
- 10 years ago
- Views:
Transcription
1 Minkowski Sum of Polytopes Defined by Their Vertices Vincent Delos, Denis Teissandier To cite this version: Vincent Delos, Denis Teissandier. Minkowski Sum of Polytopes Defined by Their Vertices. Journal of Applied Mathematics and Physics (JAMP), Scientific Research Publishing, 205, 3 (), pp < <0.4236/jamp >. <hal v2> HAL Id: hal Submitted on 5 Jun 205 HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.
2 Minkowski sum of polytopes defined by their vertices Vincent Delos and Denis Teissandier University of Bordeaux CNRS, National Center for French Research I2M, UMR 5295 Talence, F-33400, France Abstract Minkowski sums are of theoretical interest and have applications in fields related to industrial backgrounds. In this paper we focus on the specific case of summing polytopes as we want to solve the tolerance analysis problem described in []. Our approach is based on the use of linear programming and is solvable in polynomial time. The algorithm we developped can be implemented and parallelized in a very easy way. keywords: Computational Geometry, Polytope, Minkowski Sum, Linear Programming, Convex Hull. Introduction Tolerance analysis is the branch of mechanical design dedicated to studying the impact of the manufacturing tolerances on the functional constraints of any mechanical system. Minkowski sums of polytopes are useful to model the cumulative stack-up of the pieces and thus, to check whether the final assembly respects such constraints or not, see [2] and [3]. We are aware of the algorithms presented in [4], [5], [6] and [7] but we believe that neither the list of all edges nor facets are mandatory to perform the operation. So we only rely on the set of vertices to describe both polytope operands. In a first part we deal with a natural way to solve this problem based on the use of the convex hulls. Then we introduce an algorithm able to take advantage of the properties of the sums of polytopes to speed-up the process. We finally conclude with optimization hints and a geometric interpretation. 2 Basic properties 2. Minkowski sums Given two sets A and B, let C be the Minkowski sum of A and B 2.2 Polytopes C = A + B = {c R n, a A, b B/c = a + b} A polytope is defined as the convex hull of a finite set of points, called the V-representation, or as the bounded intersection of a finite set of half-spaces, called the H-representation. The Minkowski-Weyl theorem states that both definitions are equivalent.
3 3 Sum of V-polytopes In this paper we deal with V-polytopes i.e. defined as the convex hull of a finite number of points. We note V A, V B and V C the list of vertices of the polytopes A, B and C = A + B. We call V C the list of Minkowski vertices. We note k = Card(V A ) and l = Card(V B ). 3. Uniqueness of the Minkowski vertices decomposition Let A and B be two R n -polytopes and V A, V B their respective lists of vertices. Let C = A + B and c = a + b where a V A and b V B. c V C the decomposition of c as a sum of elements of A and B is unique () We recall that in [4], we see that the vertex c of C, as a face, can be written as the Minkowski sum of a face from A and a face from B. For obvious reasons of dimension, c is necessarily the sum of a vertex of A and a vertex of B. Moreover, in the same article, Fukuda shows that its decomposition is unique. Reciprocally let a V A and b V B be vertices from polytopes A and B such that c = a + b is unique. Let c C and c 2 C such as c = 2 (c + c 2 ) = 2 (a + b + a 2 + b 2 ) = 2 (a + a 2 ) + 2 (b + b 2 ) = a + b with a = 2 (a + a 2 ) and b = 2 (b + b 2 ) because the decomposition of c in elements from A and B is unique. Given that a and b are two vertices, we have a = a 2 and b = b 2 which implies c = c 2. As a consequence c is a vertex of C. 3.2 Summing two lists of vertices Let A and B be two R n -polytopes and V A, V B their lists of vertices, let C = A + B. C = Conv({a + b, a V A, b V B }) (2) We know that V C V A + V B because a Minkowski vertex has to be the sum of vertices from A and B so C = Conv(V C ) Conv({a + b, a V A, b V B }). The reciprocal is obvious as Conv({a + b, a V A, b V B }) Conv({a + b, a A, b B}) = C as C = A + B is a convex set. At this step an algorithm removing all points which are not vertices of C from V A + V B could be applied to compute V C. The basic idea is the following: if we can build a hyperplane separating (a u + b v ) from the other points of V A + V B then we have a Minkowski vertex, otherwise (a u + b v ) is not an extreme point of the polytope C. The process trying to split the cloud of points is illustrated in Figure. To perform such a task, a popular technique given in [8] solves the following linear programming system. In the case of summing polytopes, testing whether the point (a u + b v ) is a Minkowski vertex or not, means finding (γ, γ uv ) R n R from a system of k l inequalities: < γ, a i + b j > γ uv 0 ; (i, j) {,.., k} {,.., l} ; (i, j) (u, v) < γ, a u + b v > γ uv f = max(< γ, a u + b v > γ uv ) a, + b, a,n + b,n. So if we define the matrix Γ =..... a k, + b l, a k,n + b l,n a u, + b v, a u,n + b v,n ( ) γ then Γ γ uv
4 Figure : Computing the vertices of the sum of two V-polytopes through a convex hull algorithm The corresponding method is detailed in Algorithm. Now we would like to find a way to reduce the size of the main matrix Γ as it is function of the product k l. Algorithm Compute C = A + B with A and B two R n -polytopes Require: A V-representation: list of vertices V A Require: B V-representation: list of vertices V B for all a u V A and b v V B do ( ) γ Compute f = max(< γ, a u + b v > γ uv ) with Γ γ uv if f > 0 then (a u + b v ) V C else (a u + b v ) / V C end if end for , Γ Rk l R n+ 3.3 Constructing the new algorithm In this section we want to use the basic property characterizing a Minkowski vertex. Then the algorithm computes, as done before, all sums of pairs (a u, b v ) V A V B and checks whether there exists a pair (a, b ) (a u, b v ) with a A, b B such as (a + b ) = (a u + b v ). If it is the case then (a u + b v ) / V C, otherwise (a u + b v ) V C. k k a = α i a i with i, α i 0 and α i = i= i= 3
5 b = l β j b j with j, β j 0 and j= We get the following system: k l α i a i + β j b j = a u + b v i= k α i = i= l β j = j= j= l β j =. j= i, α i 0 j, β j 0 That is to say with matrices and under the hypothesis of positivity for both vectors α and β: a, a 2, a k, b, b 2, b l, α a u, + b v, a,2 a 2,2 a k,2 b,2 b 2,2 b l, a u,2 + b v,2. α k =. a,n a 2,n a k,n b,n b 2,n b l,n β β l a u,n + b v,n We are not in the case of the linear feasibility problem as there is at least one obvious solution: p u,v = (α,, α k, β,, β l ) = (0,, 0, α u =, 0,, 0, 0,, 0, β v =, 0,, 0) The question is to know whether it is unique or not. This first solution is a vertex p u,v of a polyhedron in R k+l that verifies (n + 2) equality constraints with positive coefficients. The algorithm tries to build another solution making use of linear programming techniques. We can note that the polyhedron is in fact a polytope because it is bounded. The reason is that, by hypothesis, the set in R k of convex combinations of the vertices a i is bounded as it defines the polytope A. Same thing for B in R l. So in R k+l the set of points verifying both constraints simultaneously is bounded too. So we can write it in a more general form: ( a α u + b v P =, P R β) n+2 R k+l, α R k +, β R l +, a u R n, b v R n where only the second member is function of u and v. It gives the linear programming system: ( α P = β) a u + b v ( ) (3) α 0 β f = max(2 α u β v ) Thanks to this system we have now the basic property the algorithm relies on: a u V A, b v V B, (a u + b v ) V C f = 0 (4) f = 0 there exists only one pair (α u, β v ) = (, ) to reach the maximum f as k i= α i = and l j= β j = the decomposition of c = (a u + b v ) is unique c V C It is also interesting to note that when the maximum f has been reached: α u = β v = f = 0 4
6 Algorithm 2 Compute C = A + B with A and B two R n -polytopes Require: A V-representation: list of vertices V A Require: B V-representation: list of vertices V B for all a i V A and b j V B do Compute f = max(2 α i β j ) with P ( α P R n+2 R k+l and 0 β) if f = 0 then (a i + b j ) V C else (a i + b j ) / V C end if end for ( ) α = β a i + b j 3.4 Optimizing the new algorithm and geometric interpretation The current state of the art runs k l linear programming algorithms and thus is solvable in polynomial time. We presented the data such that the matrix P is invariant and the parametrization is stored in both the second member and the objective function, so one can take advantage of this structure to save computation time. A straight idea could be using the classical sensitivity analysis techniques to test whether (a u + b v ) is a Minkowski vertex or not from the previous steps, instead of restarting the computations from scratch at each iteration. Let s switch now to the geometric interpretation, given a V A, let s consider the cone generated by all the edges attached to a and pointing towards its neighbour vertices. After translating its apex to the origin O, we call this cone C O (a) and we call C O (b) the cone created by the same technique with the vertex b in the polytope B. The method tries to build a pair, if it exists, (a, b ) with a A, b B such that (a + b) = (a + b ). Let s introduce the variable δ = a a = b b, and the straight line = {x R n : x = tδ, t R}. So the question about (a + b) being or not a Minkowski vertex can be presented this way: a V A, b V B, (a + b) / V C = {x R n : x = tδ, t R} C O (a) C O (b) (5) The existence of a straight line inside the reunion of the cones is equivalent to the existence of a pair (a, b ) such that (a + b) = (a + b ) which is equivalent to the fact that (a + b ) is not a Minkowski vertex. This is illustrated in Figure 2. The property becomes obvious when we understand that if (a, b ) exists in A B then (a a) and (b b) are symmetric with respect to the origin. Once a straight line has been found inside the reunion of two cones, we can test this inclusion with the same straight line for another pair of cones, here is the geometric interpretation of an improved version of the algorithm making use of what has been computed in the previous steps. We can resume the property writing it as an intersection introducing the cone C O (b) being the symmetric of C O (b) with respect to the origin. a V A, b V B, (a + b) V C C O (a) C O (b) = {O} (6) 4 Conclusion In this paper, our algorithm goes beyond the scope of simply finding the vertices of a cloud of points. That s why we have characterized the Minkowski vertices. However, among all the properties, some of them 5
7 Figure 2: (a 2 + b 4 ) is not a vertex of C=A+B as C O (a 2 ) C O (b 4 ) are not easily exploitable in an algorithm. In all the cases we have worked directly in the polytopes A and B, i.e. in the primal spaces and only with the polytopes V-descriptions. Other approaches use dual objects such as normal fans and dual cones. References can be found in [6], [7] and [9] but they need more than the V-description for the polytopes they handle. This can be problematic as obtaining the double description can turn out to be impossible in high dimensions, see [4] where Fukuda uses both vertices and edges. Reference [6] works in R 3 in a dual space where it intersects dual cones attached to the vertices, and it can be considered as the dual version of property 6 where the intersection is computed with primal cones. It actually implements Weibel s approach described in [9]. Such a method has been recently extended to any dimension for HV-polytopes in [7]. 5 Special thanks We would like to thank Pr Pierre Calka from the LMRS in Rouen University for his precious help in writing this article. References [] Denis Teissandier and Vincent Delos and Yves Couetard, Operations on Polytopes: Application to Tolerance Analysis, 6th CIRP Seminar on CAT, , Enschede (Netherlands), 999 [2] Lazhar Homri, Denis Teissandier, and Alex Ballu, Tolerancing Analysis by Operations on Polytopes, Design and Modeling of Mechanical Systems, Djerba (Tunisia), 597:604, 203 [3] Vijay Srinivasan, Role of Sweeps in Tolerancing Semantics, in ASME Proc. of the International Forum on Dimensional Tolerancing and Metrology, TS72.I57, CRTD, 27:69-78, 993 [4] Komei Fukuda, From the Zonotope Construction to the Minkowski Addition of Convex Polytopes, Journal of Symbolic Computation, 38:4:26-272,
8 [5] Komei Fukuda and Christophe Weibel, Computing all Faces of the Minkowski Sum of V-Polytopes, Proceedings of the 7th Canadian Conference on Computational Geometry, , 2005 [6] Denis Teissandier and Vincent Delos, Algorithm to Calculate the Minkowski Sums of 3-Polytopes Based on Normal Fans, Computer-Aided Design, 43:2: , 20 [7] Vincent Delos and Denis Teissandier, Minkowski Sum of HV-Polytopes in R n, Proceedings of the 4th Annual International Conference on Computational Mathematics, Computational Geometry and Statistics, Singapore, 205 [8] Komei Fukuda, Frequently Asked Questions in Polyhedral Computation, Swiss Federal Institute of Technology Lausanne and Zurich, Switzerland, 2004 [9] Christophe Weibel, Minkowski Sums of Polytopes, PhD Thesis, EPFL,
Mobility management and vertical handover decision making in heterogeneous wireless networks
Mobility management and vertical handover decision making in heterogeneous wireless networks Mariem Zekri To cite this version: Mariem Zekri. Mobility management and vertical handover decision making in
ibalance-abf: a Smartphone-Based Audio-Biofeedback Balance System
ibalance-abf: a Smartphone-Based Audio-Biofeedback Balance System Céline Franco, Anthony Fleury, Pierre-Yves Guméry, Bruno Diot, Jacques Demongeot, Nicolas Vuillerme To cite this version: Céline Franco,
Discussion on the paper Hypotheses testing by convex optimization by A. Goldenschluger, A. Juditsky and A. Nemirovski.
Discussion on the paper Hypotheses testing by convex optimization by A. Goldenschluger, A. Juditsky and A. Nemirovski. Fabienne Comte, Celine Duval, Valentine Genon-Catalot To cite this version: Fabienne
A usage coverage based approach for assessing product family design
A usage coverage based approach for assessing product family design Jiliang Wang To cite this version: Jiliang Wang. A usage coverage based approach for assessing product family design. Other. Ecole Centrale
A graph based framework for the definition of tools dealing with sparse and irregular distributed data-structures
A graph based framework for the definition of tools dealing with sparse and irregular distributed data-structures Serge Chaumette, Jean-Michel Lepine, Franck Rubi To cite this version: Serge Chaumette,
Online vehicle routing and scheduling with continuous vehicle tracking
Online vehicle routing and scheduling with continuous vehicle tracking Jean Respen, Nicolas Zufferey, Jean-Yves Potvin To cite this version: Jean Respen, Nicolas Zufferey, Jean-Yves Potvin. Online vehicle
QASM: a Q&A Social Media System Based on Social Semantics
QASM: a Q&A Social Media System Based on Social Semantics Zide Meng, Fabien Gandon, Catherine Faron-Zucker To cite this version: Zide Meng, Fabien Gandon, Catherine Faron-Zucker. QASM: a Q&A Social Media
VR4D: An Immersive and Collaborative Experience to Improve the Interior Design Process
VR4D: An Immersive and Collaborative Experience to Improve the Interior Design Process Amine Chellali, Frederic Jourdan, Cédric Dumas To cite this version: Amine Chellali, Frederic Jourdan, Cédric Dumas.
Expanding Renewable Energy by Implementing Demand Response
Expanding Renewable Energy by Implementing Demand Response Stéphanie Bouckaert, Vincent Mazauric, Nadia Maïzi To cite this version: Stéphanie Bouckaert, Vincent Mazauric, Nadia Maïzi. Expanding Renewable
FP-Hadoop: Efficient Execution of Parallel Jobs Over Skewed Data
FP-Hadoop: Efficient Execution of Parallel Jobs Over Skewed Data Miguel Liroz-Gistau, Reza Akbarinia, Patrick Valduriez To cite this version: Miguel Liroz-Gistau, Reza Akbarinia, Patrick Valduriez. FP-Hadoop:
Additional mechanisms for rewriting on-the-fly SPARQL queries proxy
Additional mechanisms for rewriting on-the-fly SPARQL queries proxy Arthur Vaisse-Lesteven, Bruno Grilhères To cite this version: Arthur Vaisse-Lesteven, Bruno Grilhères. Additional mechanisms for rewriting
DEM modeling of penetration test in static and dynamic conditions
DEM modeling of penetration test in static and dynamic conditions Quoc Anh Tran, Bastien Chevalier, Pierre Breul To cite this version: Quoc Anh Tran, Bastien Chevalier, Pierre Breul. DEM modeling of penetration
Faut-il des cyberarchivistes, et quel doit être leur profil professionnel?
Faut-il des cyberarchivistes, et quel doit être leur profil professionnel? Jean-Daniel Zeller To cite this version: Jean-Daniel Zeller. Faut-il des cyberarchivistes, et quel doit être leur profil professionnel?.
Overview of model-building strategies in population PK/PD analyses: 2002-2004 literature survey.
Overview of model-building strategies in population PK/PD analyses: 2002-2004 literature survey. Céline Dartois, Karl Brendel, Emmanuelle Comets, Céline Laffont, Christian Laveille, Brigitte Tranchand,
ANIMATED PHASE PORTRAITS OF NONLINEAR AND CHAOTIC DYNAMICAL SYSTEMS
ANIMATED PHASE PORTRAITS OF NONLINEAR AND CHAOTIC DYNAMICAL SYSTEMS Jean-Marc Ginoux To cite this version: Jean-Marc Ginoux. ANIMATED PHASE PORTRAITS OF NONLINEAR AND CHAOTIC DYNAMICAL SYSTEMS. A.H. Siddiqi,
Study on Cloud Service Mode of Agricultural Information Institutions
Study on Cloud Service Mode of Agricultural Information Institutions Xiaorong Yang, Nengfu Xie, Dan Wang, Lihua Jiang To cite this version: Xiaorong Yang, Nengfu Xie, Dan Wang, Lihua Jiang. Study on Cloud
Global Identity Management of Virtual Machines Based on Remote Secure Elements
Global Identity Management of Virtual Machines Based on Remote Secure Elements Hassane Aissaoui, P. Urien, Guy Pujolle To cite this version: Hassane Aissaoui, P. Urien, Guy Pujolle. Global Identity Management
Managing Risks at Runtime in VoIP Networks and Services
Managing Risks at Runtime in VoIP Networks and Services Oussema Dabbebi, Remi Badonnel, Olivier Festor To cite this version: Oussema Dabbebi, Remi Badonnel, Olivier Festor. Managing Risks at Runtime in
Aligning subjective tests using a low cost common set
Aligning subjective tests using a low cost common set Yohann Pitrey, Ulrich Engelke, Marcus Barkowsky, Romuald Pépion, Patrick Le Callet To cite this version: Yohann Pitrey, Ulrich Engelke, Marcus Barkowsky,
Use of tabletop exercise in industrial training disaster.
Use of tabletop exercise in industrial training disaster. Alexis Descatha, Thomas Loeb, François Dolveck, Nathalie-Sybille Goddet, Valerie Poirier, Michel Baer To cite this version: Alexis Descatha, Thomas
. P. 4.3 Basic feasible solutions and vertices of polyhedra. x 1. x 2
4. Basic feasible solutions and vertices of polyhedra Due to the fundamental theorem of Linear Programming, to solve any LP it suffices to consider the vertices (finitely many) of the polyhedron P of the
The truck scheduling problem at cross-docking terminals
The truck scheduling problem at cross-docking terminals Lotte Berghman,, Roel Leus, Pierre Lopez To cite this version: Lotte Berghman,, Roel Leus, Pierre Lopez. The truck scheduling problem at cross-docking
Arrangements And Duality
Arrangements And Duality 3.1 Introduction 3 Point configurations are tbe most basic structure we study in computational geometry. But what about configurations of more complicated shapes? For example,
Information Technology Education in the Sri Lankan School System: Challenges and Perspectives
Information Technology Education in the Sri Lankan School System: Challenges and Perspectives Chandima H. De Silva To cite this version: Chandima H. De Silva. Information Technology Education in the Sri
An update on acoustics designs for HVAC (Engineering)
An update on acoustics designs for HVAC (Engineering) Ken MARRIOTT To cite this version: Ken MARRIOTT. An update on acoustics designs for HVAC (Engineering). Société Française d Acoustique. Acoustics 2012,
Optimization results for a generalized coupon collector problem
Optimization results for a generalized coupon collector problem Emmanuelle Anceaume, Yann Busnel, Ernst Schulte-Geers, Bruno Sericola To cite this version: Emmanuelle Anceaume, Yann Busnel, Ernst Schulte-Geers,
Territorial Intelligence and Innovation for the Socio-Ecological Transition
Territorial Intelligence and Innovation for the Socio-Ecological Transition Jean-Jacques Girardot, Evelyne Brunau To cite this version: Jean-Jacques Girardot, Evelyne Brunau. Territorial Intelligence and
Virtual plants in high school informatics L-systems
Virtual plants in high school informatics L-systems Janka Majherov To cite this version: Janka Majherov. Virtual plants in high school informatics L-systems. Michael E. Auer. Conference ICL2007, September
New implementions of predictive alternate analog/rf test with augmented model redundancy
New implementions of predictive alternate analog/rf test with augmented model redundancy Haithem Ayari, Florence Azais, Serge Bernard, Mariane Comte, Vincent Kerzerho, Michel Renovell To cite this version:
Towards Unified Tag Data Translation for the Internet of Things
Towards Unified Tag Data Translation for the Internet of Things Loïc Schmidt, Nathalie Mitton, David Simplot-Ryl To cite this version: Loïc Schmidt, Nathalie Mitton, David Simplot-Ryl. Towards Unified
Can linear programs solve NP-hard problems?
Can linear programs solve NP-hard problems? p. 1/9 Can linear programs solve NP-hard problems? Ronald de Wolf Linear programs Can linear programs solve NP-hard problems? p. 2/9 Can linear programs solve
ANALYSIS OF SNOEK-KOSTER (H) RELAXATION IN IRON
ANALYSIS OF SNOEK-KOSTER (H) RELAXATION IN IRON J. San Juan, G. Fantozzi, M. No, C. Esnouf, F. Vanoni To cite this version: J. San Juan, G. Fantozzi, M. No, C. Esnouf, F. Vanoni. ANALYSIS OF SNOEK-KOSTER
Towards Collaborative Learning via Shared Artefacts over the Grid
Towards Collaborative Learning via Shared Artefacts over the Grid Cornelia Boldyreff, Phyo Kyaw, Janet Lavery, David Nutter, Stephen Rank To cite this version: Cornelia Boldyreff, Phyo Kyaw, Janet Lavery,
Polytope Examples (PolyComp Fukuda) Matching Polytope 1
Polytope Examples (PolyComp Fukuda) Matching Polytope 1 Matching Polytope Let G = (V,E) be a graph. A matching in G is a subset of edges M E such that every vertex meets at most one member of M. A matching
GDS Resource Record: Generalization of the Delegation Signer Model
GDS Resource Record: Generalization of the Delegation Signer Model Gilles Guette, Bernard Cousin, David Fort To cite this version: Gilles Guette, Bernard Cousin, David Fort. GDS Resource Record: Generalization
Linear Programming. Widget Factory Example. Linear Programming: Standard Form. Widget Factory Example: Continued.
Linear Programming Widget Factory Example Learning Goals. Introduce Linear Programming Problems. Widget Example, Graphical Solution. Basic Theory:, Vertices, Existence of Solutions. Equivalent formulations.
3. Linear Programming and Polyhedral Combinatorics
Massachusetts Institute of Technology Handout 6 18.433: Combinatorial Optimization February 20th, 2009 Michel X. Goemans 3. Linear Programming and Polyhedral Combinatorics Summary of what was seen in the
Cracks detection by a moving photothermal probe
Cracks detection by a moving photothermal probe J. Bodnar, M. Egée, C. Menu, R. Besnard, A. Le Blanc, M. Pigeon, J. Sellier To cite this version: J. Bodnar, M. Egée, C. Menu, R. Besnard, A. Le Blanc, et
What Development for Bioenergy in Asia: A Long-term Analysis of the Effects of Policy Instruments using TIAM-FR model
What Development for Bioenergy in Asia: A Long-term Analysis of the Effects of Policy Instruments using TIAM-FR model Seungwoo Kang, Sandrine Selosse, Nadia Maïzi To cite this version: Seungwoo Kang, Sandrine
What is Linear Programming?
Chapter 1 What is Linear Programming? An optimization problem usually has three essential ingredients: a variable vector x consisting of a set of unknowns to be determined, an objective function of x to
Running an HCI Experiment in Multiple Parallel Universes
Running an HCI Experiment in Multiple Parallel Universes,, To cite this version:,,. Running an HCI Experiment in Multiple Parallel Universes. CHI 14 Extended Abstracts on Human Factors in Computing Systems.
An Automatic Reversible Transformation from Composite to Visitor in Java
An Automatic Reversible Transformation from Composite to Visitor in Java Akram To cite this version: Akram. An Automatic Reversible Transformation from Composite to Visitor in Java. CIEL 2012, P. Collet,
Understanding Big Data Spectral Clustering
Understanding Big Data Spectral Clustering Romain Couillet, Florent Benaych-Georges To cite this version: Romain Couillet, Florent Benaych-Georges Understanding Big Data Spectral Clustering 205 IEEE 6th
SELECTIVELY ABSORBING COATINGS
SELECTIVELY ABSORBING COATINGS J. Vuletin, P. Kuli ik, M. Bosanac To cite this version: J. Vuletin, P. Kuli ik, M. Bosanac. SELECTIVELY ABSORBING COATINGS. Journal de Physique Colloques, 1981, 42 (C1),
Cobi: Communitysourcing Large-Scale Conference Scheduling
Cobi: Communitysourcing Large-Scale Conference Scheduling Haoqi Zhang, Paul André, Lydia Chilton, Juho Kim, Steven Dow, Robert Miller, Wendy E. Mackay, Michel Beaudouin-Lafon To cite this version: Haoqi
Distributed network topology reconstruction in presence of anonymous nodes
Distributed network topology reconstruction in presence of anonymous nodes Thi-Minh Dung Tran, Alain Y Kibangou To cite this version: Thi-Minh Dung Tran, Alain Y Kibangou Distributed network topology reconstruction
Ships Magnetic Anomaly Computation With Integral Equation and Fast Multipole Method
Ships Magnetic Anomaly Computation With Integral Equation and Fast Multipole Method T. S. Nguyen, Jean-Michel Guichon, Olivier Chadebec, Patrice Labie, Jean-Louis Coulomb To cite this version: T. S. Nguyen,
Largest Fixed-Aspect, Axis-Aligned Rectangle
Largest Fixed-Aspect, Axis-Aligned Rectangle David Eberly Geometric Tools, LLC http://www.geometrictools.com/ Copyright c 1998-2016. All Rights Reserved. Created: February 21, 2004 Last Modified: February
Linear Programming I
Linear Programming I November 30, 2003 1 Introduction In the VCR/guns/nuclear bombs/napkins/star wars/professors/butter/mice problem, the benevolent dictator, Bigus Piguinus, of south Antarctica penguins
A modeling approach for locating logistics platforms for fast parcels delivery in urban areas
A modeling approach for locating logistics platforms for fast parcels delivery in urban areas Olivier Guyon, Nabil Absi, Dominique Feillet, Thierry Garaix To cite this version: Olivier Guyon, Nabil Absi,
Partial and Dynamic reconfiguration of FPGAs: a top down design methodology for an automatic implementation
Partial and Dynamic reconfiguration of FPGAs: a top down design methodology for an automatic implementation Florent Berthelot, Fabienne Nouvel, Dominique Houzet To cite this version: Florent Berthelot,
Classification of Cartan matrices
Chapter 7 Classification of Cartan matrices In this chapter we describe a classification of generalised Cartan matrices This classification can be compared as the rough classification of varieties in terms
Surgical Tools Recognition and Pupil Segmentation for Cataract Surgical Process Modeling
Surgical Tools Recognition and Pupil Segmentation for Cataract Surgical Process Modeling David Bouget, Florent Lalys, Pierre Jannin To cite this version: David Bouget, Florent Lalys, Pierre Jannin. Surgical
Identifying Objective True/False from Subjective Yes/No Semantic based on OWA and CWA
Identifying Objective True/False from Subjective Yes/No Semantic based on OWA and CWA Duan Yucong, Christophe Cruz, Christophe Nicolle To cite this version: Duan Yucong, Christophe Cruz, Christophe Nicolle.
Dantzig-Wolfe and Lagrangian decompositions in integer linear programming
Dantzig-Wolfe and Lagrangian decompositions in integer linear programming Lucas Létocart, Nora Touati Moungla, Anass Nagih To cite this version: Lucas Létocart, Nora Touati Moungla, Anass Nagih. Dantzig-Wolfe
Using Feature Modelling and Automations to Select among Cloud Solutions
Using Feature Modelling and Automations to Select among Cloud Solutions Clément Quinton, Laurence Duchien, Patrick Heymans, Stéphane Mouton, Etienne Charlier To cite this version: Clément Quinton, Laurence
LECTURE 5: DUALITY AND SENSITIVITY ANALYSIS. 1. Dual linear program 2. Duality theory 3. Sensitivity analysis 4. Dual simplex method
LECTURE 5: DUALITY AND SENSITIVITY ANALYSIS 1. Dual linear program 2. Duality theory 3. Sensitivity analysis 4. Dual simplex method Introduction to dual linear program Given a constraint matrix A, right
Novel Client Booking System in KLCC Twin Tower Bridge
Novel Client Booking System in KLCC Twin Tower Bridge Hossein Ameri Mahabadi, Reza Ameri To cite this version: Hossein Ameri Mahabadi, Reza Ameri. Novel Client Booking System in KLCC Twin Tower Bridge.
International Doctoral School Algorithmic Decision Theory: MCDA and MOO
International Doctoral School Algorithmic Decision Theory: MCDA and MOO Lecture 2: Multiobjective Linear Programming Department of Engineering Science, The University of Auckland, New Zealand Laboratoire
An integrated planning-simulation-architecture approach for logistics sharing management: A case study in Northern Thailand and Southern China
An integrated planning-simulation-architecture approach for logistics sharing management: A case study in Northern Thailand and Southern China Pree Thiengburanathum, Jesus Gonzalez-Feliu, Yacine Ouzrout,
Diversity against accidental and deliberate faults
Diversity against accidental and deliberate faults Yves Deswarte, Karama Kanoun, Jean-Claude Laprie To cite this version: Yves Deswarte, Karama Kanoun, Jean-Claude Laprie. Diversity against accidental
Adaptive Fault Tolerance in Real Time Cloud Computing
Adaptive Fault Tolerance in Real Time Cloud Computing Sheheryar Malik, Fabrice Huet To cite this version: Sheheryar Malik, Fabrice Huet. Adaptive Fault Tolerance in Real Time Cloud Computing. 2011 IEEE
Improved Method for Parallel AES-GCM Cores Using FPGAs
Improved Method for Parallel -GCM Cores Using FPGAs Karim Moussa Ali Abdellatif, Roselyne Chotin-Avot, abib Mehrez To cite this version: Karim Moussa Ali Abdellatif, Roselyne Chotin-Avot, abib Mehrez.
Advantages and disadvantages of e-learning at the technical university
Advantages and disadvantages of e-learning at the technical university Olga Sheypak, Galina Artyushina, Anna Artyushina To cite this version: Olga Sheypak, Galina Artyushina, Anna Artyushina. Advantages
Linear Programming for Optimization. Mark A. Schulze, Ph.D. Perceptive Scientific Instruments, Inc.
1. Introduction Linear Programming for Optimization Mark A. Schulze, Ph.D. Perceptive Scientific Instruments, Inc. 1.1 Definition Linear programming is the name of a branch of applied mathematics that
The Advantages and Disadvantages of Online Linear Optimization
LINEAR PROGRAMMING WITH ONLINE LEARNING TATSIANA LEVINA, YURI LEVIN, JEFF MCGILL, AND MIKHAIL NEDIAK SCHOOL OF BUSINESS, QUEEN S UNIVERSITY, 143 UNION ST., KINGSTON, ON, K7L 3N6, CANADA E-MAIL:{TLEVIN,YLEVIN,JMCGILL,MNEDIAK}@BUSINESS.QUEENSU.CA
Duality of linear conic problems
Duality of linear conic problems Alexander Shapiro and Arkadi Nemirovski Abstract It is well known that the optimal values of a linear programming problem and its dual are equal to each other if at least
CSE 167: Lecture 13: Bézier Curves. Jürgen P. Schulze, Ph.D. University of California, San Diego Fall Quarter 2011
CSE 167: Introduction to Computer Graphics Lecture 13: Bézier Curves Jürgen P. Schulze, Ph.D. University of California, San Diego Fall Quarter 2011 Announcements Homework project #6 due Friday, Nov 18
Flauncher and DVMS Deploying and Scheduling Thousands of Virtual Machines on Hundreds of Nodes Distributed Geographically
Flauncher and Deploying and Scheduling Thousands of Virtual Machines on Hundreds of Nodes Distributed Geographically Daniel Balouek, Adrien Lèbre, Flavien Quesnel To cite this version: Daniel Balouek,
Actually Doing It! 6. Prove that the regular unit cube (say 1cm=unit) of sufficiently high dimension can fit inside it the whole city of New York.
1: 1. Compute a random 4-dimensional polytope P as the convex hull of 10 random points using rand sphere(4,10). Run VISUAL to see a Schlegel diagram. How many 3-dimensional polytopes do you see? How many
Module1. x 1000. y 800.
Module1 1 Welcome to the first module of the course. It is indeed an exciting event to share with you the subject that has lot to offer both from theoretical side and practical aspects. To begin with,
Contribution of Multiresolution Description for Archive Document Structure Recognition
Contribution of Multiresolution Description for Archive Document Structure Recognition Aurélie Lemaitre, Jean Camillerapp, Bertrand Coüasnon To cite this version: Aurélie Lemaitre, Jean Camillerapp, Bertrand
Performance Evaluation of Encryption Algorithms Key Length Size on Web Browsers
Performance Evaluation of Encryption Algorithms Key Length Size on Web Browsers Syed Zulkarnain Syed Idrus, Syed Alwee Aljunid, Salina Mohd Asi, Suhizaz Sudin To cite this version: Syed Zulkarnain Syed
An interval linear programming contractor
An interval linear programming contractor Introduction Milan Hladík Abstract. We consider linear programming with interval data. One of the most challenging problems in this topic is to determine or tight
Solving Geometric Problems with the Rotating Calipers *
Solving Geometric Problems with the Rotating Calipers * Godfried Toussaint School of Computer Science McGill University Montreal, Quebec, Canada ABSTRACT Shamos [1] recently showed that the diameter of
Undulators and wigglers for the new generation of synchrotron sources
Undulators and wigglers for the new generation of synchrotron sources P. Elleaume To cite this version: P. Elleaume. Undulators and wigglers for the new generation of synchrotron sources. Journal de Physique
Hinky: Defending Against Text-based Message Spam on Smartphones
Hinky: Defending Against Text-based Message Spam on Smartphones Abdelkader Lahmadi, Laurent Delosière, Olivier Festor To cite this version: Abdelkader Lahmadi, Laurent Delosière, Olivier Festor. Hinky:
A model driven approach for bridging ILOG Rule Language and RIF
A model driven approach for bridging ILOG Rule Language and RIF Valerio Cosentino, Marcos Didonet del Fabro, Adil El Ghali To cite this version: Valerio Cosentino, Marcos Didonet del Fabro, Adil El Ghali.
Application-Aware Protection in DWDM Optical Networks
Application-Aware Protection in DWDM Optical Networks Hamza Drid, Bernard Cousin, Nasir Ghani To cite this version: Hamza Drid, Bernard Cousin, Nasir Ghani. Application-Aware Protection in DWDM Optical
P2Prec: A Social-Based P2P Recommendation System
P2Prec: A Social-Based P2P Recommendation System Fady Draidi, Esther Pacitti, Didier Parigot, Guillaume Verger To cite this version: Fady Draidi, Esther Pacitti, Didier Parigot, Guillaume Verger. P2Prec:
Solving Systems of Linear Equations
LECTURE 5 Solving Systems of Linear Equations Recall that we introduced the notion of matrices as a way of standardizing the expression of systems of linear equations In today s lecture I shall show how
Multilateral Privacy in Clouds: Requirements for Use in Industry
Multilateral Privacy in Clouds: Requirements for Use in Industry Ina Schiering, Markus Hansen To cite this version: Ina Schiering, Markus Hansen. Multilateral Privacy in Clouds: Requirements for Use in
Methodology of organizational learning in risk management : Development of a collective memory for sanitary alerts
Methodology of organizational learning in risk management : Development of a collective memory for sanitary alerts Wim Van Wassenhove, Jean-Luc Wybo To cite this version: Wim Van Wassenhove, Jean-Luc Wybo.
Mathematical finance and linear programming (optimization)
Mathematical finance and linear programming (optimization) Geir Dahl September 15, 2009 1 Introduction The purpose of this short note is to explain how linear programming (LP) (=linear optimization) may
Algebra 2 Chapter 1 Vocabulary. identity - A statement that equates two equivalent expressions.
Chapter 1 Vocabulary identity - A statement that equates two equivalent expressions. verbal model- A word equation that represents a real-life problem. algebraic expression - An expression with variables.
Shortcut sets for plane Euclidean networks (Extended abstract) 1
Shortcut sets for plane Euclidean networks (Extended abstract) 1 J. Cáceres a D. Garijo b A. González b A. Márquez b M. L. Puertas a P. Ribeiro c a Departamento de Matemáticas, Universidad de Almería,
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic
