Similarity & Link Analysis. Stony Brook University CSE545, Fall 2016

Size: px
Start display at page:

Download "Similarity & Link Analysis. Stony Brook University CSE545, Fall 2016"

Transcription

1 Similarity & Link nalysis Stony rook University SE545, Fall 6

2 Finding Similar Items? ( ecommendation-system-of-hive/) ( 3/8/entity-resolution-for-big-data)

3 Finding Similar Items : What we will cover Shingling Minhashing Locality-sensitive hashing istance Metrics

4 ocument Similarity hallenge: How to represent the document in a way that can be efficiently encoded and compared?

5 Shingles Goal: onvert documents to sets

6 Shingles Goal: onvert documents to sets k-shingles (aka character n-grams ) - sequence of k characters E.g. k= doc= abcdabd singles(doc, ) = {ab, bc, cd, da, bd}

7 Shingles Goal: onvert documents to sets k-shingles (aka character n-grams ) - sequence of k characters E.g. k= doc= abcdabd singles(doc, ) = {ab, bc, cd, da, bd} Similar documents have many common shingles hanging words or order has minimal effect. In practice use 5 < k <

8 Shingles Goal: onvert documents to sets Large enough that any given shingle k-shingles (aka character n-grams ) appearing a document is highly unlikely sequence of k characters (e.g. <.%- chance) an hash large shingles to smaller E.g. k= doc= abcdabd (e.g. 9-shingles into 4 bytes) singles(doc, ) = {ab, bc, cd, da, bd} an also use words (aka n-grams). Similar documents have many common shingles hanging words or order has minimal effect. In practice use 5 < k <

9 Shingles Problem: Even if hashing, sets of shingles are large (e.g. 4 bytes => 4x the size of the document).

10 Minhashing Goal: onvert sets to shorter ids, signatures

11 Minhashing - ackground Goal: onvert sets to shorter ids, signatures Jaccard Similarity: haracteristic Matrix, X:. (Leskovec at al., 4; often very sparse! (lots of zeros) S S

12 Minhashing - ackground haracteristic Matrix: S S ab bc de ah ha ed ca Jaccard Similarity:

13 Minhashing - ackground haracteristic Matrix: S S ab ** bc * de * ah ** ha ed ** ca * Jaccard Similarity:

14 Minhashing - ackground haracteristic Matrix: S S ab ** bc * de * ah ** ha ed ** ca * Jaccard Similarity: sim(s, S) = 3 / 6 # both have / # at least one has

15 Shingles Problem: Even if hashing, sets of shingles are large (e.g. 4 bytes => 4x the size of the document).

16 pproximate pproach: ) Instead of keeping whole characteristic Minhashing matrix, just keep first row where is haracteristic Matrix: X encountered. S S S3 S4 ab bc de ah ha ed ca (Leskovec at al., 4; ) Shuffle and repeat to get a signature for each set. Idea: We don t need to actually shuffle we can just use hash functions.

17 Minhashing haracteristic Matrix: S S S3 S4 ab bc de ah ha ed ca (Leskovec at al., 4; Minhash function: h ased on permutation of rows in the characteristic matrix, h maps sets to first row where set appears.

18 Minhash function: h ased on permutation of rows in the characteristic matrix, h maps sets to first row where set appears. Minhashing haracteristic Matrix: S S S3 S4 permuted order ab ha bc ed de 3 ab ah 4 bc ha 5 ca ed 6 ah ca 7 de (Leskovec at al., 4;

19 Minhash function: h ased on permutation of rows in the characteristic matrix, h maps sets to first row where set appears. Minhashing haracteristic Matrix: S S S3 S4 permuted order 3 ab ha 4 bc ed 7 de 3 ab 6 ah 4 bc ha 5 ca ed 6 ah 5 ca 7 de (Leskovec at al., 4;

20 Minhash function: h ased on permutation of rows in the characteristic matrix, h maps sets to first row where set appears. Minhashing haracteristic Matrix: S S S3 S4 permuted order 3 ab ha 4 bc ed 7 de 3 ab 6 ah 4 bc ha 5 ca ed 6 ah 5 ca 7 de (Leskovec at al., 4; h(s) = ed #permuted row h(s) = ha #permuted row h(s3) =

21 Minhash function: h ased on permutation of rows in the characteristic matrix, h maps sets to first row where set appears. Minhashing haracteristic Matrix: S S S3 S4 permuted order 3 ab ha 4 bc ed 7 de 3 ab 6 ah 4 bc ha 5 ca ed 6 ah 5 ca 7 de (Leskovec at al., 4; h(s) = ed #permuted row h(s) = ha #permuted row h(s3) = ed #permuted row h(s4) =

22 Minhash function: h ased on permutation of rows in the characteristic matrix, h maps sets to first row where set appears. Minhashing haracteristic Matrix: S S S3 S4 permuted order 3 ab ha 4 bc ed 7 de 3 ab 6 ah 4 bc ha 5 ca ed 6 ah 5 ca 7 de (Leskovec at al., 4; h(s) = ed h(s) = ha h(s3) = ed h(s4) = ha #permuted row #permuted row #permuted row #permuted row

23 Minhashing haracteristic Matrix: S S S3 S4 3 ab 4 bc 7 de 6 ah ha ed 5 ca (Leskovec at al., 4; Minhash function: h ased on permutation of rows in the characteristic matrix, h maps sets to rows. Signature matrix: M Record first row where each set had a in the given permutation h S S S3 S4 h(s) = ed #permuted row h(s) = ha #permuted row

24 Minhashing haracteristic Matrix: S S S3 S4 3 ab 4 bc 7 de 6 ah ha ed 5 ca (Leskovec at al., 4; Minhash function: h ased on permutation of rows in the characteristic matrix, h maps sets to rows. Signature matrix: M Record first row where each set had a in the given permutation h S S S3 S4 h(s) = ed #permuted row h(s) = ha #permuted row

25 Minhashing haracteristic Matrix: S S S3 S4 3 ab 4 bc 7 de 6 ah ha ed 5 ca (Leskovec at al., 4; Minhash function: h ased on permutation of rows in the characteristic matrix, h maps sets to rows. Signature matrix: M Record first row where each set had a in the given permutation h S S S3 S4 h(s) = ed #permuted row h(s) = ha #permuted row

26 Minhashing haracteristic Matrix: S S S3 S4 4 3 ab 4 bc 7 de 3 6 ah 6 ha 7 ed 5 5 ca (Leskovec at al., 4; Minhash function: h ased on permutation of rows in the characteristic matrix, h maps sets to rows. Signature matrix: M Record first row where each set had a in the given permutation h h S S S3 S4

27 Minhashing haracteristic Matrix: S S S3 S4 4 3 ab 4 bc 7 de 3 6 ah 6 ha 7 ed 5 5 ca (Leskovec at al., 4; Minhash function: h ased on permutation of rows in the characteristic matrix, h maps sets to rows. Signature matrix: M Record first row where each set had a in the given permutation S S S3 S4 h h 4

28 Minhashing haracteristic Matrix: S S S3 S4 4 3 ab 3 4 bc 7 7 de ah 6 ha 5 7 ed ca (Leskovec at al., 4; Minhash function: h ased on permutation of rows in the characteristic matrix, h maps sets to rows. Signature matrix: M Record first row where each set had a in the given permutation S S S3 S4 h h 4 h3

29 Minhashing haracteristic Matrix: S S S3 S4 4 3 ab 3 4 bc 7 7 de ah 6 ha 5 7 ed ca (Leskovec at al., 4; Minhash function: h ased on permutation of rows in the characteristic matrix, h maps sets to rows. Signature matrix: M Record first row where each set had a in the given permutation S S S3 S4 h h 4 h3

30 Minhash function: h Minhashing haracteristic Matrix: X S S S3 S4 4 3 ab 3 4 bc 7 7 de ah 6 ha 5 7 ed ca (Leskovec at al., 4; ased on permutation of rows in the characteristic matrix, h maps sets to rows. Signature matrix: M Record first row where each set had a in the given permutation S S S3 S4 h h 4 h

31 Minhashing haracteristic Matrix: S S S3 S4 4 3 ab 3 4 bc 7 7 de ah 6 ha 5 7 ed ca (Leskovec at al., 4; Property of signature matrix: Minhash function: The probability for hany hi (i.e. any row), that h (Sased on) permutation of rows ) = hi(s is the same as Sim(Sin,the S) i characteristic matrix, h maps sets to rows. Signature matrix: M Record first row where each set had a in the given permutation S S S3 S4 h h 4 h

32 Minhashing haracteristic Matrix: S S S3 S4 4 3 ab 3 4 bc 7 7 de ah 6 ha 5 7 ed ca (Leskovec at al., 4; Property of signature matrix: Minhash function: The probability for hany hi (i.e. any row), that h (Sased on) permutation of rows ) = hi(s is the same as Sim(Sin,the S) i characteristic matrix, h maps sets to rows. Thus, similarity of signatures S, S is the fraction of Signature matrix: M rows) in which they agree. minhash functions (i.e. Record first row where each set had a in the given permutation S S S3 S4 h h 4 h

33 Minhashing haracteristic Matrix: S S S3 S4 4 3 ab 3 4 bc 7 Property of signature matrix: Minhash function: The probability for hany hi (i.e. any row), that h (Sased on) permutation of rows ) = hi(s is the same as Sim(Sin,the S) i characteristic matrix, h maps sets to rows. Thus, similarity of signatures S, S is the fraction of Signature matrix: M rows) in which they agree. minhash functions (i.e. Record first row where each set had a in the given permutation Estimate with a random sample of 7 permutations de (i.e. ~) ah 6 ha 5 7 ed ca (Leskovec at al., 4; S S S3 S4 h h 4 h

34 Minhashing haracteristic Matrix: S S S3 S4 4 3 ab 3 4 bc 7 Property of signature matrix: Minhash function: The probability for hany hi (i.e. any row), that h (Sased on) permutation of rows ) = hi(s is the same as Sim(Sin,the S) i characteristic matrix, h maps sets to rows. Thus, similarity of signatures S, S is the fraction of Signature matrix: M rows) in which they agree. minhash functions (i.e. Record first row where each set had a in the given permutation Estimate with a random sample of 7 permutations de (i.e. ~) ah 6 ha 5 7 ed ca (Leskovec at al., 4; S S S3 S4 h h 4 h3 Estimated Sim(S, S3) = agree / all = /3

35 Minhashing haracteristic Matrix: S S S3 S4 4 3 ab 3 4 bc 7 7 de ah 6 ha 5 7 ed ca (Leskovec at al., 4; Property of signature matrix: Minhash function: The probability for hany hi (i.e. any row), that h (Sased on) permutation of rows ) = hi(s is the same as Sim(Sin,the S) i characteristic matrix, h maps sets to rows. Thus, similarity of signatures S, S is the fraction of Signature matrix: M rows) in which they agree. minhash functions (i.e. Record first row where each set had a in the given permutation S S S3 S4 h h 4 h3 Estimated Sim(S, S3) = agree / all = /3 Real Sim(S, S3) = Type a / (a + b + c) = 3/4

36 Minhashing haracteristic Matrix: S S S3 S4 4 3 ab 3 4 bc 7 7 de ah 6 ha 5 7 ed ca (Leskovec at al., 4; Property of signature matrix: Minhash function: The probability for hany hi (i.e. any row), that h (Sased on) permutation of rows ) = hi(s is the same as Sim(Sin,the S) i characteristic matrix, h maps sets to rows. Thus, similarity of signatures S, S is the fraction of Signature matrix: M rows) in which they agree. minhash functions (i.e. Record first row where each set had a in the given permutation S S S3 S4 h h 4 h3 Estimated Sim(S, S3) = agree / all = /3 Real Sim(S, S3) = Type a / (a + b + c) = 3/4 Try Sim(S, S4) and Sim(S, S)

37 Minhashing In Practice Problem: an t reasonably do permutations (huge space) an t randomly grab rows according to an order (random disk seeks = slow!)

38 Minhashing In Practice Problem: an t reasonably do permutations (huge space) an t randomly grab rows according to an order (random disk seeks = slow!) Solution: Use random hash functions. Setup: Pick ~ hash functions, hashes Store M[i][s] = a potential minimum hi(r) #initialized to infinity (num hashs x num sets)

39 Minhashing Solution: Use random hash functions. Setup: Pick ~ hash functions, hashes Store M[i][s] = a potential minimum hi(r) #initialized to infinity (num hashs x num sets) lgorithm: for r in rows of cm: #cm is characteristic matrix compute hi(r) for all i in hashes #precompute values for each set s in row r: if cm[r][s] == : for i in hashes: #check which hash produces smallest value if hi(r) < M[i][s]: M[i][s] = hi(r)

40 Minhashing Solution: Use random hash functions. Setup: Pick ~ hash functions, hashes Store M[i][s] = a potential minimum hi(r) #initialized to infinity (num hashs x num sets) Known as efficient minhashing. lgorithm: for r in rows of cm: #cm is characteristic matrix compute hi(r) for all i in hashes #precompute values for each set s in row r: if cm[r][s] == : for i in hashes: #check which hash produces smallest value if hi(r) < M[i][s]: M[i][s] = hi(r)

41 Minhashing What hash functions to use? Start with decent hash functions e.g. ha(x) = ascii(string) % large_prime_number hb(x) = (3*ascii(string) + 6) % large_prime_number dd together multiplying the second times i: hi(x) = ha(x) + i*hb(x) e.g. h5(x) = ha(x) + 5*hb(x)

42 Minhashing What hash functions to use? Start with decent hash functions e.g. ha(x) = ascii(string) % large_prime_number hb(x) = (3*ascii(string) + 6) % large_prime_number dd together multiplying the second times i: hi(x) = ha(x) + i*hb(x) e.g. h5(x) = ha(x) + 5*hb(x)

43 Minhashing Problem: Even if hashing, sets of shingles are large (e.g. 4 bytes => 4x the size of the document).

44 Minhashing Problem: Even if hashing, sets of shingles are large (e.g. 4 bytes => 4x the size of the document). New Problem: Even if the size of signatures are small, it can be computationally expensive to find similar pairs. E.g. m documents;,, choose = 5,,, pairs

45 Locality-Sensitive Hashing Goal: find pairs of minhashes likely to be similar (in order to then test more precisely for similarity). andidate pairs: pairs of elements to be evaluated for similarity.

46 Locality-Sensitive Hashing Goal: find pairs of minhashes likely to be similar (in order to then test more precisely for similarity). andidate pairs: pairs of elements to be evaluated for similarity. If we wanted the similarity for all pairs of documents, could anything be done?

47 Locality-Sensitive Hashing Goal: find pairs of minhashes likely to be similar (in order to then test more precisely for similarity). andidate pairs: pairs of elements to be evaluated for similarity. pproach: Hash multiple times over subsets of data: similar items are likely in the same bucket once.

48 Locality-Sensitive Hashing Goal: find pairs of minhashes likely to be similar (in order to then test more precisely for similarity). andidate pairs: pairs of elements to be evaluated for similarity. pproach: Hash multiple times over subsets of data: similar items are likely in the same bucket once. pproach from MinHash: Hash columns of signature matrix andidate pairs end up in the same bucket.

49 Step : dd bands Locality-Sensitive Hashing (Leskovec at al., 4;

50 Step : dd bands Locality-Sensitive Hashing an be tuned to catch most true-positives with least false-positives. (Leskovec at al., 4;

51 Locality-Sensitive Hashing Step : dd bands Step : Hash columns within bands (Leskovec at al., 4;

52 Locality-Sensitive Hashing Step : dd bands Step : Hash columns within bands (Leskovec at al., 4;

53 Locality-Sensitive Hashing Step : dd bands Step : Hash columns within bands (Leskovec at al., 4;

54 Step : dd bands Step : Hash columns within bands Locality-Sensitive Hashing riteria for being candidate pair: They end up in same bucket for at least band. (Leskovec at al., 4;

55 Locality-Sensitive Hashing Step : dd bands Step : Hash columns within bands Simplification: There are enough buckets compared to rows per band that columns must be identical in order to hash to the same bucket. Thus, we only need to check if identical within a band. (Leskovec at al., 4;

56 ocument Similarity Pipeline Shingling Minhashing Localitysensitive hashing

57 Realistic Example: Probabilities of agreement, documents random permutations/hash functions/rows => if 4byte integers then 4Mb to hold signature matrix => still k choose is a lot (~5billion)

58 Realistic Example: Probabilities of agreement, documents random permutations/hash functions/rows => if 4byte integers then 4Mb to hold signature matrix => still k choose is a lot (~5billion) bands of 5 rows Want 8% Jaccard Similarity ; for any row p(s == S) =.8

59 Realistic Example: Probabilities of agreement, documents random permutations/hash functions/rows => if 4byte integers then 4Mb to hold signature matrix => still k choose is a lot (~5billion) bands of 5 rows Want 8% Jaccard Similarity ; for any row p(s == S) =.8 P(S==S b): probability S and S agree within a given band

60 Realistic Example: Probabilities of agreement, documents random permutations/hash functions/rows => if 4byte integers then 4Mb to hold signature matrix => still k choose is a lot (~5billion) bands of 5 rows Want 8% Jaccard Similarity ; for any row p(s == S) =.8 P(S==S b): probability S and S agree within a given band =.85 =.38 => P(S!=S b) = -.38 =.67 P(S!=S): probability S and S do not agree in any band

61 Realistic Example: Probabilities of agreement, documents random permutations/hash functions/rows => if 4byte integers then 4Mb to hold signature matrix => still k choose is a lot (~5billion) bands of 5 rows Want 8% Jaccard Similarity ; for any row p(s == S) =.8 P(S==S b): probability S and S agree within a given band =.85 =.38 => P(S!=S b) = -.38 =.67 P(S!=S): probability S and S do not agree in any band =.67 =.35

62 Realistic Example: Probabilities of agreement, documents random permutations/hash functions/rows => if 4byte integers then 4Mb to hold signature matrix => still k choose is a lot (~5billion) bands of 5 rows Want 8% Jaccard Similarity ; for any row p(s == S) =.8 P(S==S b): probability S and S agree within a given band =.85 =.38 => P(S!=S b) = -.38 =.67 P(S!=S): probability S and S do not agree in any band =.67 =.35 What if wanting 4% Jaccard Similarity?

63 istance Metrics Pipeline gives us a way to find near-neighbors in high-dimensional space based on Jaccard istance ( - Jaccard Sim). (

64 istance Metrics Pipeline gives us a way to find near-neighbors in high-dimensional space based on Jaccard istance ( - Jaccard Sim). Typical properties of a distance metric, d: d(x, x) = d(x, y) = d(y, x) d(x, y) d(x,z) + d(z,y) (

65 istance Metrics Pipeline gives us a way to find near-neighbors in high-dimensional space based on Jaccard istance ( - Jaccard Sim). There are other metrics of similarity. e.g: Euclidean istance osine istance Edit istance Hamming istance

66 istance Metrics Pipeline gives us a way to find near-neighbors in high-dimensional space based on Jaccard istance ( - Jaccard Sim). There are other metrics of similarity. e.g: Euclidean istance osine istance Edit istance Hamming istance ( L Norm )

67 istance Metrics Pipeline gives us a way to find near-neighbors in high-dimensional space based on Jaccard istance ( - Jaccard Sim). There are other metrics of similarity. e.g: Euclidean istance osine istance Edit istance Hamming istance ( L Norm )

68 Locality Sensitive Hashing - Theory LSH an be generalized to many distance metrics by converting output to a probability and providing a lower bound on probability of being similar.

69 Locality Sensitive Hashing - Theory LSH an be generalized to many distance metrics by converting output to a probability and providing a lower bound on probability of being similar. E.g. for euclidean distance: hoose random lines (analogous to hash functions in minhashing) Project the two points onto each line; match if two points within an interval

70 Link nalysis

71 The Web, circa 998

72 The Web, circa 998 Match keywords, language (information retrieval) Explore directory

73 The Web, circa 998 Easy to game with term spam Match keywords, language (information retrieval) Explore directory Time-consuming; Not open-ended

74 Enter PageRank...

75 PageRank Key Idea: onsider the citations of the website.

76 PageRank Key Idea: onsider the citations of the website. Who links to it? and what are their citations?

77 PageRank Key Idea: onsider the citations of the website. Who links to it? and what are their citations? Innovation : What pages would a random Web surfer end up at? Innovation : Not just own terms but what terms are used by citations?

78 PageRank View : Flow Model: in-links as votes Innovation : What pages would a random Web surfer end up at? Innovation : Not just own terms but what terms are used by citations?

79 PageRank View : Flow Model: in-links (citations) as votes but, citations from important pages should count more. => Use recursion to figure out if each page is important. Innovation : What pages would a random Web surfer end up at? Innovation : Not just own terms but what terms are used by citations?

80 PageRank View : Flow Model: How to compute? Each page (j) has an importance (i.e. rank, rj) (nj is out-links )

81 PageRank r/ View : Flow Model: r/ r/4 r = r/ + r/4 + r/ How to compute? Each page (j) has an importance (i.e. rank, rj) (nj is out-links )

82 PageRank View : Flow Model: How to compute? Each page (j) has an importance (i.e. rank, rj) (nj is out-links )

83 PageRank View : Flow Model: System of Equations: How to compute? Each page (j) has an importance (i.e. rank, rj) (nj is out-links )

84 PageRank View : Flow Model: System of Equations: How to compute? Each page (j) has an importance (i.e. rank, rj) (nj is out-links )

85 PageRank View : Flow Model: Solve How to compute? Each page (j) has an importance (i.e. rank, rj) (nj is out-links )

86 PageRank to \ from / /3 / /3 / /3 / Transition Matrix, M

87 Innovation: What pages would a random Web surfer end up at? To start: N=4 nodes, so r = [¼, ¼, ¼, ¼,] View : Matrix Formulation to \ from / /3 / /3 / /3 / Transition Matrix, M

88 Innovation: What pages would a random Web surfer end up at? To start: N=4 nodes, so r = [¼, ¼, ¼, ¼,] after st iteration: M r = [3/8, 5/4, 5/4, 5/4] after nd iteration: M(M r) = M r = [5/48, /48, ] View : Matrix Formulation to \ from / /3 / /3 / /3 / Transition Matrix, M

89 Innovation: What pages would a random Web surfer end up at? To start: N=4 nodes, so r = [¼, ¼, ¼, ¼,] after st iteration: M r = [3/8, 5/4, 5/4, 5/4] after nd iteration: M(M r) = M r = [5/48, /48, ] Power iteration algorithm initialize: r[] = [/N,, /N], r[-]=[,...,] while (err_norm(r[t],r[t-])>min_err): err_norm(v, v) = v - v #L norm to \ from / /3 / /3 / /3 / Transition Matrix, M

90 Innovation: What pages would a random Web surfer end up at? To start: N=4 nodes, so r = [¼, ¼, ¼, ¼,] after st iteration: M r = [3/8, 5/4, 5/4, 5/4] after nd iteration: M(M r) = M r = [5/48, /48, ] Power iteration algorithm initialize: r[] = [/N,, /N], r[-]=[,...,] while (err_norm(r[t],r[t-])>min_err): r[t+] = M r[t] t+= solution = r[t] err_norm(v, v) = v - v #L norm to \ from / /3 / /3 / /3 / Transition Matrix, M

91 s err_norm gets smaller we are moving toward: r = M r View 3: Eigenvectors: Power iteration algorithm initialize: r[] = [/N,, /N], r[-]=[,...,] while (err_norm(r[t],r[t-])>min_err): r[t+] = M r[t] t+= solution = r[t] err_norm(v, v) = v - v #L norm

92 s err_norm gets smaller we are moving toward: r = M r View 3: Eigenvectors: We are actually just finding the eigenvector of M.... e h t ds fin Power iteration algorithm initialize: r[] = [/N,, /N], r[-]=[,...,] while (err_norm(r[t],r[t-])>min_err): r[t+] = M r[t] t+= solution = r[t] err_norm(v, v) = v - v #L norm x is an eigenvector of x = x if:

93 s err_norm gets smaller we are moving toward: r = M r View 3: Eigenvectors: We are actually just finding the eigenvector of M.... e h t ds fin Power iteration algorithm initialize: x is an eigenvector of x = x r[] = [/N,, /N], if: r[-]=[,...,] while (err_norm(r[t],r[t-])>min_err): r[t+] = M r[t] = t+= since columns of M sum to. solution = r[t] thus, r=mr err_norm(v, v) = v - v #L norm

94 View 4: Markov Process Where is surfer at time t+? p(t+) = M p(t) Suppose: p(t+) = p(t), then p(t) is a stationary distribution of a random walk. Thus, r is a stationary distribution. Probability of being at given node.

95 View 4: Markov Process Where is surfer at time t+? p(t+) = M p(t) Suppose: p(t+) = p(t), then p(t) is a stationary distribution of a random walk. Thus, r is a stationary distribution. Probability of being at given node. aka st order Markov Process Rich probabilistic theory. One finding: Stationary distributions have a unique distribution if: No dead-ends : a node can t propagate its rank No spider traps : set of nodes with no way out. lso known as being stochastic, irreducible, and aperiodic.

96 View 4: Markov Process - Problems for vanilla PI to \ from /3 /3 /3 What would r converge to? aka st order Markov Process Rich probabilistic theory. One finding: Stationary distributions have a unique distribution if: No dead-ends : a node can t propagate its rank No spider traps : set of nodes with no way out. lso known as being stochastic, irreducible, and aperiodic.

97 View 4: Markov Process - Problems for vanilla PI to \ from /3 /3 /3 What would r converge to? aka st order Markov Process Rich probabilistic theory. One finding: Stationary distributions have a unique distribution if: No dead-ends : a node can t propagate its rank No spider traps : set of nodes with no way out. lso known as being stochastic, irreducible, and aperiodic.

98 View 4: Markov Process - Problems for vanilla PI to \ from /3 /3 /3 What would r converge to? aka st order Markov Process Rich probabilistic theory. One finding: Stationary distributions have a unique distribution if: columns sum to same node doesn t repeat at regular intervals non-zero chance of going to any other node lso known as being stochastic, irreducible, and aperiodic.

99 Goals: No dead-ends No spider traps The Google PageRank Formulation dd teleportation:t each step, two choices. Follow a random link (probability, = ~.85). Teleport to a random node (probability, - )

100 Goals: No dead-ends No spider traps The Google PageRank Formulation dd teleportation:t each step, two choices. Follow a random link (probability, = ~.85). Teleport to a random node (probability, - ) to \ from ⅓ ⅓ ⅓

101 Goals: No dead-ends No spider traps The Google PageRank Formulation dd teleportation:t each step, two choices. Follow a random link (probability, = ~.85). Teleport to a random node (probability, - ) to \ from +.5*¼ +.5*¼ ⅓ +.5*¼.85*+.5*¼ ⅓ +.5*¼ +.5*¼ ⅓.85* +.5*¼ +.5*¼

102 Goals: No dead-ends No spider traps The Google PageRank Formulation dd teleportation:t each step, two choices. Follow a random link (probability, = ~.85). Teleport to a random node (probability, - ) to \ from +.5*¼ +.5*¼ 85*+.5*¼ +.5*¼.85*⅓+.5*¼ +.5*¼ +.5*¼.85*+.5*¼.85*⅓+.5*¼ +.5*¼ +.5*¼ +.5*¼.85*⅓+.5*¼.85*+.5*¼ +.5*¼ +.5*¼

103 Goals: No dead-ends No spider traps The Google PageRank Formulation dd teleportation:t each step, two choices. Follow a random link (probability, = ~.85). Teleport to a random node (probability, - ) to \ from ⅓ ⅓ ⅓

104 Goals: No dead-ends No spider traps The Google PageRank Formulation dd teleportation:t each step, two choices. Follow a random link (probability, = ~.85). Teleport to a random node (probability, - ) to \ from ¼ ⅓ ¼ ⅓ ¼ ⅓ ¼

105 Goals: No dead-ends No spider traps The Google PageRank Formulation dd teleportation:t each step, two choices. Follow a random link (probability, = ~.85). Teleport to a random node (probability, - ) to \ from.85*¼+.5*¼ ⅓.85*¼+.5*¼ ⅓.85*¼+.5*¼ ⅓.85*¼+.5*¼

106 Goals: No dead-ends No spider traps The Google PageRank Formulation dd teleportation:t each step, two choices. Follow a random link (probability, = ~.85). Teleport to a random node (probability, - ) (Teleport from a dead-end has probability ) to \ from +.5*¼ *¼ 85*+.5*¼ +.5*¼.85*⅓+.5*¼ *¼ +.5*¼.85*+.5*¼.85*⅓+.5*¼ *¼ +.5*¼ +.5*¼.85*⅓+.5*¼ *¼ +.5*¼ +.5*¼

107 Teleportation, as Flow Model: Goals: No dead-ends No spider traps (rin and Page, 998) to \ from +.5*¼ *¼ 85*+.5*¼ +.5*¼.85*⅓+.5*¼ *¼ +.5*¼.85*+.5*¼.85*⅓+.5*¼ *¼ +.5*¼ +.5*¼.85*⅓+.5*¼ *¼ +.5*¼ +.5*¼

108 Teleportation, as Flow Model: Goals: No dead-ends No spider traps (rin and Page, 998) Teleportation, as Matrix Model: to \ from +.5*¼ *¼ 85*+.5*¼ +.5*¼.85*⅓+.5*¼ *¼ +.5*¼.85*+.5*¼.85*⅓+.5*¼ *¼ +.5*¼ +.5*¼.85*⅓+.5*¼ *¼ +.5*¼ +.5*¼

109 Teleportation, as Flow Model: Goals: No dead-ends No spider traps (rin and Page, 998) Teleportation, as Matrix Model: to \ from +.5*¼.85*¼+.5*¼ 85*+.5*¼ +.5*¼.85*⅓+.5*¼.85*¼+.5*¼ +.5*¼.85*+.5*¼.85*⅓+.5*¼.85*¼+.5*¼ +.5*¼ +.5*¼.85*⅓+.5*¼.85*¼+.5*¼ +.5*¼ +.5*¼

110 Teleportation, as Flow Model: Goals: No dead-ends No spider traps (rin and Page, 998) Teleportation, as Matrix Model: To apply: run power iterations over M instead of M. to \ from +.5*¼ *¼ 85*+.5*¼ +.5*¼.85*⅓+.5*¼ *¼ +.5*¼.85*+.5*¼.85*⅓+.5*¼ *¼ +.5*¼ +.5*¼.85*⅓+.5*¼ *¼ +.5*¼ +.5*¼

111 Teleportation, as Flow Model: Goals: No dead-ends No spider traps (rin and Page, 998) Teleportation, as Matrix Model: Steps:. ompute M. dd /N to all dead-ends. 3. onvert M to M 4. Run Power Iterations. to \ from +.5*¼ *¼ 85*+.5*¼ +.5*¼.85*⅓+.5*¼ *¼ +.5*¼.85*+.5*¼.85*⅓+.5*¼ *¼ +.5*¼ +.5*¼.85*⅓+.5*¼ *¼ +.5*¼ +.5*¼

Markov Chains in Pop Culture

Markov Chains in Pop Culture Markov Chains in Pop Culture Lola Thompson November 29, 2010 1 of 21 Introduction There are many examples of Markov Chains used in science and technology. Here are some applications in pop culture: 2 of

More information

A PageRank Algorithm based on Asynchronous Gauss-Seidel Iterations

A PageRank Algorithm based on Asynchronous Gauss-Seidel Iterations Simulation A PageRank Algorithm based on Asynchronous Gauss-Seidel Iterations D. Silvestre, J. Hespanha and C. Silvestre 2018 American Control Conference Milwaukee June 27-29 2018 Silvestre, Hespanha and

More information

CS256 Applied Theory of Computation

CS256 Applied Theory of Computation CS256 Applied Theory of Computation Parallel Computation III John E Savage Overview Mapping normal algorithms to meshes Shuffle operations on linear arrays Shuffle operations on two-dimensional arrays

More information

Lecture 20: Combinatorial Search (1997) Steven Skiena. skiena

Lecture 20: Combinatorial Search (1997) Steven Skiena.   skiena Lecture 20: Combinatorial Search (1997) Steven Skiena Department of Computer Science State University of New York Stony Brook, NY 11794 4400 http://www.cs.sunysb.edu/ skiena Give an O(n lg k)-time algorithm

More information

4.12 Practice problems

4.12 Practice problems 4. Practice problems In this section we will try to apply the concepts from the previous few sections to solve some problems. Example 4.7. When flipped a coin comes up heads with probability p and tails

More information

17. Symmetries. Thus, the example above corresponds to the matrix: We shall now look at how permutations relate to trees.

17. Symmetries. Thus, the example above corresponds to the matrix: We shall now look at how permutations relate to trees. 7 Symmetries 7 Permutations A permutation of a set is a reordering of its elements Another way to look at it is as a function Φ that takes as its argument a set of natural numbers of the form {, 2,, n}

More information

Digital Television Lecture 5

Digital Television Lecture 5 Digital Television Lecture 5 Forward Error Correction (FEC) Åbo Akademi University Domkyrkotorget 5 Åbo 8.4. Error Correction in Transmissions Need for error correction in transmissions Loss of data during

More information

Randomized Algorithms

Randomized Algorithms Presentation for use with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 Randomized Algorithms Randomized Algorithms 1 Applications: Simple Algorithms and

More information

Math 1111 Math Exam Study Guide

Math 1111 Math Exam Study Guide Math 1111 Math Exam Study Guide The math exam will cover the mathematical concepts and techniques we ve explored this semester. The exam will not involve any codebreaking, although some questions on the

More information

EE521 Analog and Digital Communications

EE521 Analog and Digital Communications EE521 Analog and Digital Communications Questions Problem 1: SystemView... 3 Part A (25%... 3... 3 Part B (25%... 3... 3 Voltage... 3 Integer...3 Digital...3 Part C (25%... 3... 4 Part D (25%... 4... 4

More information

Theory of Probability - Brett Bernstein

Theory of Probability - Brett Bernstein Theory of Probability - Brett Bernstein Lecture 3 Finishing Basic Probability Review Exercises 1. Model flipping two fair coins using a sample space and a probability measure. Compute the probability of

More information

Secret Key Systems (block encoding) Encrypting a small block of text (say 128 bits) General considerations for cipher design:

Secret Key Systems (block encoding) Encrypting a small block of text (say 128 bits) General considerations for cipher design: Secret Key Systems (block encoding) Encrypting a small block of text (say 128 bits) General considerations for cipher design: Secret Key Systems (block encoding) Encrypting a small block of text (say 128

More information

Introduction to Monte Carlo Methods

Introduction to Monte Carlo Methods Introduction Introduction to Monte Carlo Methods Daryl DeFord VRDI MGGG June 6, 2018 Introduction Outline 1 Introduction 2 3 Monte Carlo Methods 4 Historical Overview 5 Markov Chain Methods 6 MCMC on Graphs

More information

Comp551: Advanced Robotics Lab Lecture 7: Consensus CSE481C wi09 - Robotics Capstone, Lec3: Consensus

Comp551: Advanced Robotics Lab Lecture 7: Consensus CSE481C wi09 - Robotics Capstone, Lec3: Consensus Comp551: Advanced Robotics Lab Lecture 7: Consensus 1 intro 3 multi-robot computation model 5 Model: Robot State We can describe the state, s, of a single robot as a tuple of its ID, pose, and private

More information

Winter Quarter Competition

Winter Quarter Competition Winter Quarter Competition LA Math Circle (Advanced) March 13, 2016 Problem 1 Jeff rotates spinners P, Q, and R and adds the resulting numbers. What is the probability that his sum is an odd number? Problem

More information

Algorithmique appliquée Projet UNO

Algorithmique appliquée Projet UNO Algorithmique appliquée Projet UNO Paul Dorbec, Cyril Gavoille The aim of this project is to encode a program as efficient as possible to find the best sequence of cards that can be played by a single

More information

Math 1111 Math Exam Study Guide

Math 1111 Math Exam Study Guide Math 1111 Math Exam Study Guide The math exam will cover the mathematical concepts and techniques we ve explored this semester. The exam will not involve any codebreaking, although some questions on the

More information

Module 3 Greedy Strategy

Module 3 Greedy Strategy Module 3 Greedy Strategy Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu Introduction to Greedy Technique Main

More information

Distribution of Primes

Distribution of Primes Distribution of Primes Definition. For positive real numbers x, let π(x) be the number of prime numbers less than or equal to x. For example, π(1) = 0, π(10) = 4 and π(100) = 25. To use some ciphers, we

More information

DeepStack: Expert-Level AI in Heads-Up No-Limit Poker. Surya Prakash Chembrolu

DeepStack: Expert-Level AI in Heads-Up No-Limit Poker. Surya Prakash Chembrolu DeepStack: Expert-Level AI in Heads-Up No-Limit Poker Surya Prakash Chembrolu AI and Games AlphaGo Go Watson Jeopardy! DeepBlue -Chess Chinook -Checkers TD-Gammon -Backgammon Perfect Information Games

More information

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors Single Error Correcting Codes (SECC) Basic idea: Use multiple parity bits, each covering a subset of the data bits. No two message bits belong to exactly the same subsets, so a single error will generate

More information

Multitree Decoding and Multitree-Aided LDPC Decoding

Multitree Decoding and Multitree-Aided LDPC Decoding Multitree Decoding and Multitree-Aided LDPC Decoding Maja Ostojic and Hans-Andrea Loeliger Dept. of Information Technology and Electrical Engineering ETH Zurich, Switzerland Email: {ostojic,loeliger}@isi.ee.ethz.ch

More information

We will be releasing HW1 today It is due in 2 weeks (4/18 at 23:59pm) The homework is long

We will be releasing HW1 today It is due in 2 weeks (4/18 at 23:59pm) The homework is long We will be releasing HW1 today It is due in 2 weeks (4/18 at 23:59pm) The homework is long Requires proving theorems as well as coding Please start early Recitation sessions: Spark Tutorial and Clinic:

More information

Project. B) Building the PWM Read the instructions of HO_14. 1) Determine all the 9-mers and list them here:

Project. B) Building the PWM Read the instructions of HO_14. 1) Determine all the 9-mers and list them here: Project Please choose ONE project among the given five projects. The last three projects are programming projects. hoose any programming language you want. Note that you can also write programs for the

More information

Module 3 Greedy Strategy

Module 3 Greedy Strategy Module 3 Greedy Strategy Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu Introduction to Greedy Technique Main

More information

Recap from previous lecture. Information Retrieval. Topics for Today. Recall: Basic structure of an Inverted index. Dictionaries & Tolerant Retrieval

Recap from previous lecture. Information Retrieval. Topics for Today. Recall: Basic structure of an Inverted index. Dictionaries & Tolerant Retrieval Recap from previous lecture nformation Retrieval Dictionaries & Tolerant Retrieval Jörg Tiedemann jorg.tiedemann@lingfil.uu.se Department of Linguistics and Philology Uppsala University nverted indexes

More information

A COMPUTATIONAL PARADIGM FOR SPACE-TIME MULTIUSER DETECTION. Lisa Welburn*, Jim Cavers*, Kevin Sowerby** ** The University of Auckland, New Zealand

A COMPUTATIONAL PARADIGM FOR SPACE-TIME MULTIUSER DETECTION. Lisa Welburn*, Jim Cavers*, Kevin Sowerby** ** The University of Auckland, New Zealand A COMPUTATIONAL PARADIGM FOR SPACE-TIME MULTIUSER DETECTION Lisa Welburn*, Jim Cavers*, Kevin Sowerby** * Simon Fraser University, Canada ** The University of Auckland, New Zealand 1 OUTLINE: Space-time

More information

International Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)

International Journal of Digital Application & Contemporary research Website:   (Volume 1, Issue 7, February 2013) Performance Analysis of OFDM under DWT, DCT based Image Processing Anshul Soni soni.anshulec14@gmail.com Ashok Chandra Tiwari Abstract In this paper, the performance of conventional discrete cosine transform

More information

CS188 Spring 2010 Section 3: Game Trees

CS188 Spring 2010 Section 3: Game Trees CS188 Spring 2010 Section 3: Game Trees 1 Warm-Up: Column-Row You have a 3x3 matrix of values like the one below. In a somewhat boring game, player A first selects a row, and then player B selects a column.

More information

MATHCOUNTS. 100 Classroom Lessons. August Prepared by

MATHCOUNTS. 100 Classroom Lessons. August Prepared by MATHCOUNTS 100 Classroom Lessons August 2000 Prepared by John Cocharo The Oakridge School 5900 W. Pioneer Parkway Arlington, TX 76013 (817) 451-4994 (school) jcocharo@esc11.net (school) cocharo@hotmail.com

More information

CK-12 Algebra II with Trigonometry Concepts 1

CK-12 Algebra II with Trigonometry Concepts 1 1.1 Subsets of Real Numbers 1. Rational Number. Irrational Number. Rational Number 4. Whole Number 5. Integer 6. Irrational Number 7. Real, Rational, Integer, Whole, and Natural Number 8. Real and Rational

More information

Paper Presentation. Steve Jan. March 5, Virginia Tech. Steve Jan (Virginia Tech) Paper Presentation March 5, / 28

Paper Presentation. Steve Jan. March 5, Virginia Tech. Steve Jan (Virginia Tech) Paper Presentation March 5, / 28 Paper Presentation Steve Jan Virginia Tech March 5, 2015 Steve Jan (Virginia Tech) Paper Presentation March 5, 2015 1 / 28 2 paper to present Nonparametric Multi-group Membership Model for Dynamic Networks,

More information

11/13/18. Introduction to RNNs for NLP. About Me. Overview SHANG GAO

11/13/18. Introduction to RNNs for NLP. About Me. Overview SHANG GAO Introduction to RNNs for NLP SHANG GAO About Me PhD student in the Data Science and Engineering program Took Deep Learning last year Work in the Biomedical Sciences, Engineering, and Computing group at

More information

Monte Carlo Tree Search and AlphaGo. Suraj Nair, Peter Kundzicz, Kevin An, Vansh Kumar

Monte Carlo Tree Search and AlphaGo. Suraj Nair, Peter Kundzicz, Kevin An, Vansh Kumar Monte Carlo Tree Search and AlphaGo Suraj Nair, Peter Kundzicz, Kevin An, Vansh Kumar Zero-Sum Games and AI A player s utility gain or loss is exactly balanced by the combined gain or loss of opponents:

More information

CS 380: ARTIFICIAL INTELLIGENCE MONTE CARLO SEARCH. Santiago Ontañón

CS 380: ARTIFICIAL INTELLIGENCE MONTE CARLO SEARCH. Santiago Ontañón CS 380: ARTIFICIAL INTELLIGENCE MONTE CARLO SEARCH Santiago Ontañón so367@drexel.edu Recall: Adversarial Search Idea: When there is only one agent in the world, we can solve problems using DFS, BFS, ID,

More information

Attitude Determination. - Using GPS

Attitude Determination. - Using GPS Attitude Determination - Using GPS Table of Contents Definition of Attitude Attitude and GPS Attitude Representations Least Squares Filter Kalman Filter Other Filters The AAU Testbed Results Conclusion

More information

Hamming Codes and Decoding Methods

Hamming Codes and Decoding Methods Hamming Codes and Decoding Methods Animesh Ramesh 1, Raghunath Tewari 2 1 Fourth year Student of Computer Science Indian institute of Technology Kanpur 2 Faculty of Computer Science Advisor to the UGP

More information

5.4 Imperfect, Real-Time Decisions

5.4 Imperfect, Real-Time Decisions 116 5.4 Imperfect, Real-Time Decisions Searching through the whole (pruned) game tree is too inefficient for any realistic game Moves must be made in a reasonable amount of time One has to cut off the

More information

CMPS 12A Introduction to Programming Programming Assignment 5 In this assignment you will write a Java program that finds all solutions to the n-queens problem, for. Begin by reading the Wikipedia article

More information

Dynamic Programming in Real Life: A Two-Person Dice Game

Dynamic Programming in Real Life: A Two-Person Dice Game Mathematical Methods in Operations Research 2005 Special issue in honor of Arie Hordijk Dynamic Programming in Real Life: A Two-Person Dice Game Henk Tijms 1, Jan van der Wal 2 1 Department of Econometrics,

More information

Twenty Mathcounts Target Round Tests Test 1 MATHCOUNTS. Mock Competition One. Target Round. Name. State

Twenty Mathcounts Target Round Tests Test 1 MATHCOUNTS. Mock Competition One. Target Round. Name. State MATHCOUNTS Mock Competition One Target Round Name State DO NOT BEGIN UNTIL YOU ARE INSTRUCTED TO DO SO. This section of the competition consists of eight problems, which will be presented in pairs. Work

More information

Prof. Noah Snavely CS Administrivia. Assignment 5, due Friday, April 20 th, 5pm

Prof. Noah Snavely CS Administrivia. Assignment 5, due Friday, April 20 th, 5pm Sequences I Prof. Noah Snavely CS4 http://cs4.cs.cornell.edu Administrivia Assignment 5, due Friday, April 20 th, 5pm Assignment 6 will be released early next week 2 Administrivia Final projects Due on

More information

5.4 Imperfect, Real-Time Decisions

5.4 Imperfect, Real-Time Decisions 5.4 Imperfect, Real-Time Decisions Searching through the whole (pruned) game tree is too inefficient for any realistic game Moves must be made in a reasonable amount of time One has to cut off the generation

More information

CS188 Spring 2010 Section 3: Game Trees

CS188 Spring 2010 Section 3: Game Trees CS188 Spring 2010 Section 3: Game Trees 1 Warm-Up: Column-Row You have a 3x3 matrix of values like the one below. In a somewhat boring game, player A first selects a row, and then player B selects a column.

More information

Unit 3. Logic Design

Unit 3. Logic Design EE 2: Digital Logic Circuit Design Dr Radwan E Abdel-Aal, COE Logic and Computer Design Fundamentals Unit 3 Chapter Combinational 3 Combinational Logic Logic Design - Introduction to Analysis & Design

More information

The study of probability is concerned with the likelihood of events occurring. Many situations can be analyzed using a simplified model of probability

The study of probability is concerned with the likelihood of events occurring. Many situations can be analyzed using a simplified model of probability The study of probability is concerned with the likelihood of events occurring Like combinatorics, the origins of probability theory can be traced back to the study of gambling games Still a popular branch

More information

Chapter 4 SPEECH ENHANCEMENT

Chapter 4 SPEECH ENHANCEMENT 44 Chapter 4 SPEECH ENHANCEMENT 4.1 INTRODUCTION: Enhancement is defined as improvement in the value or Quality of something. Speech enhancement is defined as the improvement in intelligibility and/or

More information

CSE548, AMS542: Analysis of Algorithms, Fall 2016 Date: Sep 25. Homework #1. ( Due: Oct 10 ) Figure 1: The laser game.

CSE548, AMS542: Analysis of Algorithms, Fall 2016 Date: Sep 25. Homework #1. ( Due: Oct 10 ) Figure 1: The laser game. CSE548, AMS542: Analysis of Algorithms, Fall 2016 Date: Sep 25 Homework #1 ( Due: Oct 10 ) Figure 1: The laser game. Task 1. [ 60 Points ] Laser Game Consider the following game played on an n n board,

More information

Local Search: Hill Climbing. When A* doesn t work AIMA 4.1. Review: Hill climbing on a surface of states. Review: Local search and optimization

Local Search: Hill Climbing. When A* doesn t work AIMA 4.1. Review: Hill climbing on a surface of states. Review: Local search and optimization Outline When A* doesn t work AIMA 4.1 Local Search: Hill Climbing Escaping Local Maxima: Simulated Annealing Genetic Algorithms A few slides adapted from CS 471, UBMC and Eric Eaton (in turn, adapted from

More information

Outline for today s lecture Informed Search Optimal informed search: A* (AIMA 3.5.2) Creating good heuristic functions Hill Climbing

Outline for today s lecture Informed Search Optimal informed search: A* (AIMA 3.5.2) Creating good heuristic functions Hill Climbing Informed Search II Outline for today s lecture Informed Search Optimal informed search: A* (AIMA 3.5.2) Creating good heuristic functions Hill Climbing CIS 521 - Intro to AI - Fall 2017 2 Review: Greedy

More information

Question Score Max Cover Total 149

Question Score Max Cover Total 149 CS170 Final Examination 16 May 20 NAME (1 pt): TA (1 pt): Name of Neighbor to your left (1 pt): Name of Neighbor to your right (1 pt): This is a closed book, closed calculator, closed computer, closed

More information

Local Search. Hill Climbing. Hill Climbing Diagram. Simulated Annealing. Simulated Annealing. Introduction to Artificial Intelligence

Local Search. Hill Climbing. Hill Climbing Diagram. Simulated Annealing. Simulated Annealing. Introduction to Artificial Intelligence Introduction to Artificial Intelligence V22.0472-001 Fall 2009 Lecture 6: Adversarial Search Local Search Queue-based algorithms keep fallback options (backtracking) Local search: improve what you have

More information

18.S34 (FALL, 2007) PROBLEMS ON PROBABILITY

18.S34 (FALL, 2007) PROBLEMS ON PROBABILITY 18.S34 (FALL, 2007) PROBLEMS ON PROBABILITY 1. Three closed boxes lie on a table. One box (you don t know which) contains a $1000 bill. The others are empty. After paying an entry fee, you play the following

More information

game tree complete all possible moves

game tree complete all possible moves Game Trees Game Tree A game tree is a tree the nodes of which are positions in a game and edges are moves. The complete game tree for a game is the game tree starting at the initial position and containing

More information

Chapter 3 Convolutional Codes and Trellis Coded Modulation

Chapter 3 Convolutional Codes and Trellis Coded Modulation Chapter 3 Convolutional Codes and Trellis Coded Modulation 3. Encoder Structure and Trellis Representation 3. Systematic Convolutional Codes 3.3 Viterbi Decoding Algorithm 3.4 BCJR Decoding Algorithm 3.5

More information

Optimization Techniques for Alphabet-Constrained Signal Design

Optimization Techniques for Alphabet-Constrained Signal Design Optimization Techniques for Alphabet-Constrained Signal Design Mojtaba Soltanalian Department of Electrical Engineering California Institute of Technology Stanford EE- ISL Mar. 2015 Optimization Techniques

More information

Introductory Probability

Introductory Probability Introductory Probability Combinations Nicholas Nguyen nicholas.nguyen@uky.edu Department of Mathematics UK Agenda Assigning Objects to Identical Positions Denitions Committee Card Hands Coin Toss Counts

More information

Universiteit Leiden Opleiding Informatica

Universiteit Leiden Opleiding Informatica Universiteit Leiden Opleiding Informatica An Analysis of Dominion Name: Roelof van der Heijden Date: 29/08/2014 Supervisors: Dr. W.A. Kosters (LIACS), Dr. F.M. Spieksma (MI) BACHELOR THESIS Leiden Institute

More information

1. Eighty percent of eighty percent of a number is 144. What is the 1. number? 2. How many diagonals does a regular pentagon have? 2.

1. Eighty percent of eighty percent of a number is 144. What is the 1. number? 2. How many diagonals does a regular pentagon have? 2. Blitz, Page 1 1. Eighty percent of eighty percent of a number is 144. What is the 1. number? 2. How many diagonals does a regular pentagon have? 2. diagonals 3. A tiny test consists of 3 multiple choice

More information

The Symmetric Traveling Salesman Problem by Howard Kleiman

The Symmetric Traveling Salesman Problem by Howard Kleiman I. INTRODUCTION The Symmetric Traveling Salesman Problem by Howard Kleiman Let M be an nxn symmetric cost matrix where n is even. We present an algorithm that extends the concept of admissible permutation

More information

CODE division multiple access (CDMA) systems suffer. A Blind Adaptive Decorrelating Detector for CDMA Systems

CODE division multiple access (CDMA) systems suffer. A Blind Adaptive Decorrelating Detector for CDMA Systems 1530 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 16, NO. 8, OCTOBER 1998 A Blind Adaptive Decorrelating Detector for CDMA Systems Sennur Ulukus, Student Member, IEEE, and Roy D. Yates, Member,

More information

CS 188: Artificial Intelligence Spring 2007

CS 188: Artificial Intelligence Spring 2007 CS 188: Artificial Intelligence Spring 2007 Lecture 7: CSP-II and Adversarial Search 2/6/2007 Srini Narayanan ICSI and UC Berkeley Many slides over the course adapted from Dan Klein, Stuart Russell or

More information

TOURNAMENT ROUND. Round 1

TOURNAMENT ROUND. Round 1 Round 1 1. Find all prime factors of 8051. 2. Simplify where x = 628,y = 233,z = 340. [log xyz (x z )][1+log x y +log x z], 3. In prokaryotes, translation of mrna messages into proteins is most often initiated

More information

Link State Routing. Stefano Vissicchio UCL Computer Science CS 3035/GZ01

Link State Routing. Stefano Vissicchio UCL Computer Science CS 3035/GZ01 Link State Routing Stefano Vissicchio UCL Computer Science CS 335/GZ Reminder: Intra-domain Routing Problem Shortest paths problem: What path between two vertices offers minimal sum of edge weights? Classic

More information

Outline. Tracking with Unreliable Node Sequences. Abstract. Outline. Outline. Abstract 10/20/2009

Outline. Tracking with Unreliable Node Sequences. Abstract. Outline. Outline. Abstract 10/20/2009 Tracking with Unreliable Node Sequences Ziguo Zhong, Ting Zhu, Dan Wang and Tian He Computer Science and Engineering, University of Minnesota Infocom 2009 Presenter: Jing He Abstract This paper proposes

More information

Functions of several variables

Functions of several variables Chapter 6 Functions of several variables 6.1 Limits and continuity Definition 6.1 (Euclidean distance). Given two points P (x 1, y 1 ) and Q(x, y ) on the plane, we define their distance by the formula

More information

ISudoku. Jonathon Makepeace Matthew Harris Jamie Sparrow Julian Hillebrand

ISudoku. Jonathon Makepeace Matthew Harris Jamie Sparrow Julian Hillebrand Jonathon Makepeace Matthew Harris Jamie Sparrow Julian Hillebrand ISudoku Abstract In this paper, we will analyze and discuss the Sudoku puzzle and implement different algorithms to solve the puzzle. After

More information

Heuristics & Pattern Databases for Search Dan Weld

Heuristics & Pattern Databases for Search Dan Weld 10//01 CSE 57: Artificial Intelligence Autumn01 Heuristics & Pattern Databases for Search Dan Weld Recap: Search Problem States configurations of the world Successor function: function from states to lists

More information

Meet #3 January Intermediate Mathematics League of Eastern Massachusetts

Meet #3 January Intermediate Mathematics League of Eastern Massachusetts Meet #3 January 2009 Intermediate Mathematics League of Eastern Massachusetts Meet #3 January 2009 Category 1 Mystery 1. How many two-digit multiples of four are there such that the number is still a

More information

1111: Linear Algebra I

1111: Linear Algebra I 1111: Linear Algebra I Dr. Vladimir Dotsenko (Vlad) Lecture 7 Dr. Vladimir Dotsenko (Vlad) 1111: Linear Algebra I Lecture 7 1 / 8 Invertible matrices Theorem. 1. An elementary matrix is invertible. 2.

More information

Mathematics Competition Practice Session 6. Hagerstown Community College: STEM Club November 20, :00 pm - 1:00 pm STC-170

Mathematics Competition Practice Session 6. Hagerstown Community College: STEM Club November 20, :00 pm - 1:00 pm STC-170 2015-2016 Mathematics Competition Practice Session 6 Hagerstown Community College: STEM Club November 20, 2015 12:00 pm - 1:00 pm STC-170 1 Warm-Up (2006 AMC 10B No. 17): Bob and Alice each have a bag

More information

Southeastern European Regional Programming Contest Bucharest, Romania Vinnytsya, Ukraine October 21, Problem A Concerts

Southeastern European Regional Programming Contest Bucharest, Romania Vinnytsya, Ukraine October 21, Problem A Concerts Problem A Concerts File: A.in File: standard output Time Limit: 0.3 seconds (C/C++) Memory Limit: 128 megabytes John enjoys listening to several bands, which we shall denote using A through Z. He wants

More information

Module 3: Physical Layer

Module 3: Physical Layer Module 3: Physical Layer Dr. Associate Professor of Computer Science Jackson State University Jackson, MS 39217 Phone: 601-979-3661 E-mail: natarajan.meghanathan@jsums.edu 1 Topics 3.1 Signal Levels: Baud

More information

Adversarial Search. Rob Platt Northeastern University. Some images and slides are used from: AIMA CS188 UC Berkeley

Adversarial Search. Rob Platt Northeastern University. Some images and slides are used from: AIMA CS188 UC Berkeley Adversarial Search Rob Platt Northeastern University Some images and slides are used from: AIMA CS188 UC Berkeley What is adversarial search? Adversarial search: planning used to play a game such as chess

More information

More Adversarial Search

More Adversarial Search More Adversarial Search CS151 David Kauchak Fall 2010 http://xkcd.com/761/ Some material borrowed from : Sara Owsley Sood and others Admin Written 2 posted Machine requirements for mancala Most of the

More information

Algebra. Recap: Elements of Set Theory.

Algebra. Recap: Elements of Set Theory. January 14, 2018 Arrangements and Derangements. Algebra. Recap: Elements of Set Theory. Arrangements of a subset of distinct objects chosen from a set of distinct objects are permutations [order matters]

More information

18.204: CHIP FIRING GAMES

18.204: CHIP FIRING GAMES 18.204: CHIP FIRING GAMES ANNE KELLEY Abstract. Chip firing is a one-player game where piles start with an initial number of chips and any pile with at least two chips can send one chip to the piles on

More information

Sheet 1: Introduction to prime numbers.

Sheet 1: Introduction to prime numbers. Option A Hand in at least one question from at least three sheets Sheet 1: Introduction to prime numbers. [provisional date for handing in: class 2.] 1. Use Sieve of Eratosthenes to find all prime numbers

More information

# 12 ECE 253a Digital Image Processing Pamela Cosman 11/4/11. Introductory material for image compression

# 12 ECE 253a Digital Image Processing Pamela Cosman 11/4/11. Introductory material for image compression # 2 ECE 253a Digital Image Processing Pamela Cosman /4/ Introductory material for image compression Motivation: Low-resolution color image: 52 52 pixels/color, 24 bits/pixel 3/4 MB 3 2 pixels, 24 bits/pixel

More information

Digital Transmission using SECC Spring 2010 Lecture #7. (n,k,d) Systematic Block Codes. How many parity bits to use?

Digital Transmission using SECC Spring 2010 Lecture #7. (n,k,d) Systematic Block Codes. How many parity bits to use? Digital Transmission using SECC 6.02 Spring 2010 Lecture #7 How many parity bits? Dealing with burst errors Reed-Solomon codes message Compute Checksum # message chk Partition Apply SECC Transmit errors

More information

An analysis of TL Wimpout: A probability study and an examination of game-playing strategies.

An analysis of TL Wimpout: A probability study and an examination of game-playing strategies. An analysis of TL Wimpout: A probability study and an examination of game-playing strategies. By: Anthony T. Litsch III A SENIOR RESEARCH PAPER PRESENTED TO THE DEPARTMENT OF MATHEMATICS AND COMPUTER SCIENCE

More information

Arrays. Independent Part. Contents. Programming with Java Module 3. 1 Bowling Introduction Task Intermediate steps...

Arrays. Independent Part. Contents. Programming with Java Module 3. 1 Bowling Introduction Task Intermediate steps... Programming with Java Module 3 Arrays Independent Part Contents 1 Bowling 3 1.1 Introduction................................. 3 1.2 Task...................................... 3 1.3 Intermediate steps.............................

More information

Introduction to Counting and Probability

Introduction to Counting and Probability Randolph High School Math League 2013-2014 Page 1 If chance will have me king, why, chance may crown me. Shakespeare, Macbeth, Act I, Scene 3 1 Introduction Introduction to Counting and Probability Counting

More information

Chapter 8. Representing Multimedia Digitally

Chapter 8. Representing Multimedia Digitally Chapter 8 Representing Multimedia Digitally Learning Objectives Explain how RGB color is represented in bytes Explain the difference between bits and binary numbers Change an RGB color by binary addition

More information

IDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE

IDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE International Journal of Technology (2011) 1: 56 64 ISSN 2086 9614 IJTech 2011 IDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE Djamhari Sirat 1, Arman D. Diponegoro

More information

MATHEMATICS UNIT 2: CALCULATOR-ALLOWED FOUNDATION TIER

MATHEMATICS UNIT 2: CALCULATOR-ALLOWED FOUNDATION TIER Surname Centre Number Candidate Number Other Names 0 GCSE NEW 3300U20-1 S17-3300U20-1 MATHEMATICS UNIT 2: CALCULATOR-ALLOWED FOUNDATION TIER TUESDAY, 20 JUNE 2017 AFTERNOON 1 hour 30 minutes For s use

More information

A Spectrum Analysis Method to Space Vector Pulse Width Modulation

A Spectrum Analysis Method to Space Vector Pulse Width Modulation dvanced Science and Technology Letters Vol.34 (MS ), pp.4-7 http://dx.doi.org/.47/astl..34.8 Spectrum nalysis Method to Space Vector Pulse Width Modulation Guoqiang hen and Jianli Kang School of Mechanical

More information

CS 438 Communication Networks Spring 2014 Homework 2 Due Date: February 19

CS 438 Communication Networks Spring 2014 Homework 2 Due Date: February 19 1. Questions to ponder a) What s the tradeoffs between copper and optical? b) Introduce two multiple access methods / protocols that weren t covered in class. Discuss their advantages and disadvantages.

More information

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Recently, consensus based distributed estimation has attracted considerable attention from various fields to estimate deterministic

More information

Reinforcement Learning Agent for Scrolling Shooter Game

Reinforcement Learning Agent for Scrolling Shooter Game Reinforcement Learning Agent for Scrolling Shooter Game Peng Yuan (pengy@stanford.edu) Yangxin Zhong (yangxin@stanford.edu) Zibo Gong (zibo@stanford.edu) 1 Introduction and Task Definition 1.1 Game Agent

More information

Design of Temporally Dithered Codes for Increased Depth of Field in Structured Light Systems

Design of Temporally Dithered Codes for Increased Depth of Field in Structured Light Systems Design of Temporally Dithered Codes for Increased Depth of Field in Structured Light Systems Ricardo R. Garcia University of California, Berkeley Berkeley, CA rrgarcia@eecs.berkeley.edu Abstract In recent

More information

Recap from previous lectures. Information Retrieval. Recap from previous lectures. Topics for Today. Dictionaries & Tolerant Retrieval.

Recap from previous lectures. Information Retrieval. Recap from previous lectures. Topics for Today. Dictionaries & Tolerant Retrieval. Recap from previous lectures nformation Retrieval Dictionaries & Tolerant Retrieval Jörg Tiedemann jorg.tiedemann@lingfil.uu.se Department of Linguistics and Philology Uppsala University nverted indexes

More information

Permutations and Combinations

Permutations and Combinations Permutations and Combinations In statistics, there are two ways to count or group items. For both permutations and combinations, there are certain requirements that must be met: there can be no repetitions

More information

Permutations and codes:

Permutations and codes: Hamming distance Permutations and codes: Polynomials, bases, and covering radius Peter J. Cameron Queen Mary, University of London p.j.cameron@qmw.ac.uk International Conference on Graph Theory Bled, 22

More information

CMPT 310 Assignment 1

CMPT 310 Assignment 1 CMPT 310 Assignment 1 October 16, 2017 100 points total, worth 10% of the course grade. Turn in on CourSys. Submit a compressed directory (.zip or.tar.gz) with your solutions. Code should be submitted

More information

Digital Integrated CircuitDesign

Digital Integrated CircuitDesign Digital Integrated CircuitDesign Lecture 13 Building Blocks (Multipliers) Register Adder Shift Register Adib Abrishamifar EE Department IUST Acknowledgement This lecture note has been summarized and categorized

More information

Digitizing Color. Place Value in a Decimal Number. Place Value in a Binary Number. Chapter 11: Light, Sound, Magic: Representing Multimedia Digitally

Digitizing Color. Place Value in a Decimal Number. Place Value in a Binary Number. Chapter 11: Light, Sound, Magic: Representing Multimedia Digitally Chapter 11: Light, Sound, Magic: Representing Multimedia Digitally Fluency with Information Technology Third Edition by Lawrence Snyder Digitizing Color RGB Colors: Binary Representation Giving the intensities

More information

Frugal Sensing Spectral Analysis from Power Inequalities

Frugal Sensing Spectral Analysis from Power Inequalities Frugal Sensing Spectral Analysis from Power Inequalities Nikos Sidiropoulos Joint work with Omar Mehanna IEEE SPAWC 2013 Plenary, June 17, 2013, Darmstadt, Germany Wideband Spectrum Sensing (for CR/DSM)

More information

Announcements. CS 188: Artificial Intelligence Fall Local Search. Hill Climbing. Simulated Annealing. Hill Climbing Diagram

Announcements. CS 188: Artificial Intelligence Fall Local Search. Hill Climbing. Simulated Annealing. Hill Climbing Diagram CS 188: Artificial Intelligence Fall 2008 Lecture 6: Adversarial Search 9/16/2008 Dan Klein UC Berkeley Many slides over the course adapted from either Stuart Russell or Andrew Moore 1 Announcements Project

More information

MA/CSSE 473 Day 14. Permutations wrap-up. Subset generation. (Horner s method) Permutations wrap up Generating subsets of a set

MA/CSSE 473 Day 14. Permutations wrap-up. Subset generation. (Horner s method) Permutations wrap up Generating subsets of a set MA/CSSE 473 Day 14 Permutations wrap-up Subset generation (Horner s method) MA/CSSE 473 Day 14 Student questions Monday will begin with "ask questions about exam material time. Exam details are Day 16

More information