Similarity & Link Analysis. Stony Brook University CSE545, Fall 2016
|
|
- Francis Stokes
- 5 years ago
- Views:
Transcription
1 Similarity & Link nalysis Stony rook University SE545, Fall 6
2 Finding Similar Items? ( ecommendation-system-of-hive/) ( 3/8/entity-resolution-for-big-data)
3 Finding Similar Items : What we will cover Shingling Minhashing Locality-sensitive hashing istance Metrics
4 ocument Similarity hallenge: How to represent the document in a way that can be efficiently encoded and compared?
5 Shingles Goal: onvert documents to sets
6 Shingles Goal: onvert documents to sets k-shingles (aka character n-grams ) - sequence of k characters E.g. k= doc= abcdabd singles(doc, ) = {ab, bc, cd, da, bd}
7 Shingles Goal: onvert documents to sets k-shingles (aka character n-grams ) - sequence of k characters E.g. k= doc= abcdabd singles(doc, ) = {ab, bc, cd, da, bd} Similar documents have many common shingles hanging words or order has minimal effect. In practice use 5 < k <
8 Shingles Goal: onvert documents to sets Large enough that any given shingle k-shingles (aka character n-grams ) appearing a document is highly unlikely sequence of k characters (e.g. <.%- chance) an hash large shingles to smaller E.g. k= doc= abcdabd (e.g. 9-shingles into 4 bytes) singles(doc, ) = {ab, bc, cd, da, bd} an also use words (aka n-grams). Similar documents have many common shingles hanging words or order has minimal effect. In practice use 5 < k <
9 Shingles Problem: Even if hashing, sets of shingles are large (e.g. 4 bytes => 4x the size of the document).
10 Minhashing Goal: onvert sets to shorter ids, signatures
11 Minhashing - ackground Goal: onvert sets to shorter ids, signatures Jaccard Similarity: haracteristic Matrix, X:. (Leskovec at al., 4; often very sparse! (lots of zeros) S S
12 Minhashing - ackground haracteristic Matrix: S S ab bc de ah ha ed ca Jaccard Similarity:
13 Minhashing - ackground haracteristic Matrix: S S ab ** bc * de * ah ** ha ed ** ca * Jaccard Similarity:
14 Minhashing - ackground haracteristic Matrix: S S ab ** bc * de * ah ** ha ed ** ca * Jaccard Similarity: sim(s, S) = 3 / 6 # both have / # at least one has
15 Shingles Problem: Even if hashing, sets of shingles are large (e.g. 4 bytes => 4x the size of the document).
16 pproximate pproach: ) Instead of keeping whole characteristic Minhashing matrix, just keep first row where is haracteristic Matrix: X encountered. S S S3 S4 ab bc de ah ha ed ca (Leskovec at al., 4; ) Shuffle and repeat to get a signature for each set. Idea: We don t need to actually shuffle we can just use hash functions.
17 Minhashing haracteristic Matrix: S S S3 S4 ab bc de ah ha ed ca (Leskovec at al., 4; Minhash function: h ased on permutation of rows in the characteristic matrix, h maps sets to first row where set appears.
18 Minhash function: h ased on permutation of rows in the characteristic matrix, h maps sets to first row where set appears. Minhashing haracteristic Matrix: S S S3 S4 permuted order ab ha bc ed de 3 ab ah 4 bc ha 5 ca ed 6 ah ca 7 de (Leskovec at al., 4;
19 Minhash function: h ased on permutation of rows in the characteristic matrix, h maps sets to first row where set appears. Minhashing haracteristic Matrix: S S S3 S4 permuted order 3 ab ha 4 bc ed 7 de 3 ab 6 ah 4 bc ha 5 ca ed 6 ah 5 ca 7 de (Leskovec at al., 4;
20 Minhash function: h ased on permutation of rows in the characteristic matrix, h maps sets to first row where set appears. Minhashing haracteristic Matrix: S S S3 S4 permuted order 3 ab ha 4 bc ed 7 de 3 ab 6 ah 4 bc ha 5 ca ed 6 ah 5 ca 7 de (Leskovec at al., 4; h(s) = ed #permuted row h(s) = ha #permuted row h(s3) =
21 Minhash function: h ased on permutation of rows in the characteristic matrix, h maps sets to first row where set appears. Minhashing haracteristic Matrix: S S S3 S4 permuted order 3 ab ha 4 bc ed 7 de 3 ab 6 ah 4 bc ha 5 ca ed 6 ah 5 ca 7 de (Leskovec at al., 4; h(s) = ed #permuted row h(s) = ha #permuted row h(s3) = ed #permuted row h(s4) =
22 Minhash function: h ased on permutation of rows in the characteristic matrix, h maps sets to first row where set appears. Minhashing haracteristic Matrix: S S S3 S4 permuted order 3 ab ha 4 bc ed 7 de 3 ab 6 ah 4 bc ha 5 ca ed 6 ah 5 ca 7 de (Leskovec at al., 4; h(s) = ed h(s) = ha h(s3) = ed h(s4) = ha #permuted row #permuted row #permuted row #permuted row
23 Minhashing haracteristic Matrix: S S S3 S4 3 ab 4 bc 7 de 6 ah ha ed 5 ca (Leskovec at al., 4; Minhash function: h ased on permutation of rows in the characteristic matrix, h maps sets to rows. Signature matrix: M Record first row where each set had a in the given permutation h S S S3 S4 h(s) = ed #permuted row h(s) = ha #permuted row
24 Minhashing haracteristic Matrix: S S S3 S4 3 ab 4 bc 7 de 6 ah ha ed 5 ca (Leskovec at al., 4; Minhash function: h ased on permutation of rows in the characteristic matrix, h maps sets to rows. Signature matrix: M Record first row where each set had a in the given permutation h S S S3 S4 h(s) = ed #permuted row h(s) = ha #permuted row
25 Minhashing haracteristic Matrix: S S S3 S4 3 ab 4 bc 7 de 6 ah ha ed 5 ca (Leskovec at al., 4; Minhash function: h ased on permutation of rows in the characteristic matrix, h maps sets to rows. Signature matrix: M Record first row where each set had a in the given permutation h S S S3 S4 h(s) = ed #permuted row h(s) = ha #permuted row
26 Minhashing haracteristic Matrix: S S S3 S4 4 3 ab 4 bc 7 de 3 6 ah 6 ha 7 ed 5 5 ca (Leskovec at al., 4; Minhash function: h ased on permutation of rows in the characteristic matrix, h maps sets to rows. Signature matrix: M Record first row where each set had a in the given permutation h h S S S3 S4
27 Minhashing haracteristic Matrix: S S S3 S4 4 3 ab 4 bc 7 de 3 6 ah 6 ha 7 ed 5 5 ca (Leskovec at al., 4; Minhash function: h ased on permutation of rows in the characteristic matrix, h maps sets to rows. Signature matrix: M Record first row where each set had a in the given permutation S S S3 S4 h h 4
28 Minhashing haracteristic Matrix: S S S3 S4 4 3 ab 3 4 bc 7 7 de ah 6 ha 5 7 ed ca (Leskovec at al., 4; Minhash function: h ased on permutation of rows in the characteristic matrix, h maps sets to rows. Signature matrix: M Record first row where each set had a in the given permutation S S S3 S4 h h 4 h3
29 Minhashing haracteristic Matrix: S S S3 S4 4 3 ab 3 4 bc 7 7 de ah 6 ha 5 7 ed ca (Leskovec at al., 4; Minhash function: h ased on permutation of rows in the characteristic matrix, h maps sets to rows. Signature matrix: M Record first row where each set had a in the given permutation S S S3 S4 h h 4 h3
30 Minhash function: h Minhashing haracteristic Matrix: X S S S3 S4 4 3 ab 3 4 bc 7 7 de ah 6 ha 5 7 ed ca (Leskovec at al., 4; ased on permutation of rows in the characteristic matrix, h maps sets to rows. Signature matrix: M Record first row where each set had a in the given permutation S S S3 S4 h h 4 h
31 Minhashing haracteristic Matrix: S S S3 S4 4 3 ab 3 4 bc 7 7 de ah 6 ha 5 7 ed ca (Leskovec at al., 4; Property of signature matrix: Minhash function: The probability for hany hi (i.e. any row), that h (Sased on) permutation of rows ) = hi(s is the same as Sim(Sin,the S) i characteristic matrix, h maps sets to rows. Signature matrix: M Record first row where each set had a in the given permutation S S S3 S4 h h 4 h
32 Minhashing haracteristic Matrix: S S S3 S4 4 3 ab 3 4 bc 7 7 de ah 6 ha 5 7 ed ca (Leskovec at al., 4; Property of signature matrix: Minhash function: The probability for hany hi (i.e. any row), that h (Sased on) permutation of rows ) = hi(s is the same as Sim(Sin,the S) i characteristic matrix, h maps sets to rows. Thus, similarity of signatures S, S is the fraction of Signature matrix: M rows) in which they agree. minhash functions (i.e. Record first row where each set had a in the given permutation S S S3 S4 h h 4 h
33 Minhashing haracteristic Matrix: S S S3 S4 4 3 ab 3 4 bc 7 Property of signature matrix: Minhash function: The probability for hany hi (i.e. any row), that h (Sased on) permutation of rows ) = hi(s is the same as Sim(Sin,the S) i characteristic matrix, h maps sets to rows. Thus, similarity of signatures S, S is the fraction of Signature matrix: M rows) in which they agree. minhash functions (i.e. Record first row where each set had a in the given permutation Estimate with a random sample of 7 permutations de (i.e. ~) ah 6 ha 5 7 ed ca (Leskovec at al., 4; S S S3 S4 h h 4 h
34 Minhashing haracteristic Matrix: S S S3 S4 4 3 ab 3 4 bc 7 Property of signature matrix: Minhash function: The probability for hany hi (i.e. any row), that h (Sased on) permutation of rows ) = hi(s is the same as Sim(Sin,the S) i characteristic matrix, h maps sets to rows. Thus, similarity of signatures S, S is the fraction of Signature matrix: M rows) in which they agree. minhash functions (i.e. Record first row where each set had a in the given permutation Estimate with a random sample of 7 permutations de (i.e. ~) ah 6 ha 5 7 ed ca (Leskovec at al., 4; S S S3 S4 h h 4 h3 Estimated Sim(S, S3) = agree / all = /3
35 Minhashing haracteristic Matrix: S S S3 S4 4 3 ab 3 4 bc 7 7 de ah 6 ha 5 7 ed ca (Leskovec at al., 4; Property of signature matrix: Minhash function: The probability for hany hi (i.e. any row), that h (Sased on) permutation of rows ) = hi(s is the same as Sim(Sin,the S) i characteristic matrix, h maps sets to rows. Thus, similarity of signatures S, S is the fraction of Signature matrix: M rows) in which they agree. minhash functions (i.e. Record first row where each set had a in the given permutation S S S3 S4 h h 4 h3 Estimated Sim(S, S3) = agree / all = /3 Real Sim(S, S3) = Type a / (a + b + c) = 3/4
36 Minhashing haracteristic Matrix: S S S3 S4 4 3 ab 3 4 bc 7 7 de ah 6 ha 5 7 ed ca (Leskovec at al., 4; Property of signature matrix: Minhash function: The probability for hany hi (i.e. any row), that h (Sased on) permutation of rows ) = hi(s is the same as Sim(Sin,the S) i characteristic matrix, h maps sets to rows. Thus, similarity of signatures S, S is the fraction of Signature matrix: M rows) in which they agree. minhash functions (i.e. Record first row where each set had a in the given permutation S S S3 S4 h h 4 h3 Estimated Sim(S, S3) = agree / all = /3 Real Sim(S, S3) = Type a / (a + b + c) = 3/4 Try Sim(S, S4) and Sim(S, S)
37 Minhashing In Practice Problem: an t reasonably do permutations (huge space) an t randomly grab rows according to an order (random disk seeks = slow!)
38 Minhashing In Practice Problem: an t reasonably do permutations (huge space) an t randomly grab rows according to an order (random disk seeks = slow!) Solution: Use random hash functions. Setup: Pick ~ hash functions, hashes Store M[i][s] = a potential minimum hi(r) #initialized to infinity (num hashs x num sets)
39 Minhashing Solution: Use random hash functions. Setup: Pick ~ hash functions, hashes Store M[i][s] = a potential minimum hi(r) #initialized to infinity (num hashs x num sets) lgorithm: for r in rows of cm: #cm is characteristic matrix compute hi(r) for all i in hashes #precompute values for each set s in row r: if cm[r][s] == : for i in hashes: #check which hash produces smallest value if hi(r) < M[i][s]: M[i][s] = hi(r)
40 Minhashing Solution: Use random hash functions. Setup: Pick ~ hash functions, hashes Store M[i][s] = a potential minimum hi(r) #initialized to infinity (num hashs x num sets) Known as efficient minhashing. lgorithm: for r in rows of cm: #cm is characteristic matrix compute hi(r) for all i in hashes #precompute values for each set s in row r: if cm[r][s] == : for i in hashes: #check which hash produces smallest value if hi(r) < M[i][s]: M[i][s] = hi(r)
41 Minhashing What hash functions to use? Start with decent hash functions e.g. ha(x) = ascii(string) % large_prime_number hb(x) = (3*ascii(string) + 6) % large_prime_number dd together multiplying the second times i: hi(x) = ha(x) + i*hb(x) e.g. h5(x) = ha(x) + 5*hb(x)
42 Minhashing What hash functions to use? Start with decent hash functions e.g. ha(x) = ascii(string) % large_prime_number hb(x) = (3*ascii(string) + 6) % large_prime_number dd together multiplying the second times i: hi(x) = ha(x) + i*hb(x) e.g. h5(x) = ha(x) + 5*hb(x)
43 Minhashing Problem: Even if hashing, sets of shingles are large (e.g. 4 bytes => 4x the size of the document).
44 Minhashing Problem: Even if hashing, sets of shingles are large (e.g. 4 bytes => 4x the size of the document). New Problem: Even if the size of signatures are small, it can be computationally expensive to find similar pairs. E.g. m documents;,, choose = 5,,, pairs
45 Locality-Sensitive Hashing Goal: find pairs of minhashes likely to be similar (in order to then test more precisely for similarity). andidate pairs: pairs of elements to be evaluated for similarity.
46 Locality-Sensitive Hashing Goal: find pairs of minhashes likely to be similar (in order to then test more precisely for similarity). andidate pairs: pairs of elements to be evaluated for similarity. If we wanted the similarity for all pairs of documents, could anything be done?
47 Locality-Sensitive Hashing Goal: find pairs of minhashes likely to be similar (in order to then test more precisely for similarity). andidate pairs: pairs of elements to be evaluated for similarity. pproach: Hash multiple times over subsets of data: similar items are likely in the same bucket once.
48 Locality-Sensitive Hashing Goal: find pairs of minhashes likely to be similar (in order to then test more precisely for similarity). andidate pairs: pairs of elements to be evaluated for similarity. pproach: Hash multiple times over subsets of data: similar items are likely in the same bucket once. pproach from MinHash: Hash columns of signature matrix andidate pairs end up in the same bucket.
49 Step : dd bands Locality-Sensitive Hashing (Leskovec at al., 4;
50 Step : dd bands Locality-Sensitive Hashing an be tuned to catch most true-positives with least false-positives. (Leskovec at al., 4;
51 Locality-Sensitive Hashing Step : dd bands Step : Hash columns within bands (Leskovec at al., 4;
52 Locality-Sensitive Hashing Step : dd bands Step : Hash columns within bands (Leskovec at al., 4;
53 Locality-Sensitive Hashing Step : dd bands Step : Hash columns within bands (Leskovec at al., 4;
54 Step : dd bands Step : Hash columns within bands Locality-Sensitive Hashing riteria for being candidate pair: They end up in same bucket for at least band. (Leskovec at al., 4;
55 Locality-Sensitive Hashing Step : dd bands Step : Hash columns within bands Simplification: There are enough buckets compared to rows per band that columns must be identical in order to hash to the same bucket. Thus, we only need to check if identical within a band. (Leskovec at al., 4;
56 ocument Similarity Pipeline Shingling Minhashing Localitysensitive hashing
57 Realistic Example: Probabilities of agreement, documents random permutations/hash functions/rows => if 4byte integers then 4Mb to hold signature matrix => still k choose is a lot (~5billion)
58 Realistic Example: Probabilities of agreement, documents random permutations/hash functions/rows => if 4byte integers then 4Mb to hold signature matrix => still k choose is a lot (~5billion) bands of 5 rows Want 8% Jaccard Similarity ; for any row p(s == S) =.8
59 Realistic Example: Probabilities of agreement, documents random permutations/hash functions/rows => if 4byte integers then 4Mb to hold signature matrix => still k choose is a lot (~5billion) bands of 5 rows Want 8% Jaccard Similarity ; for any row p(s == S) =.8 P(S==S b): probability S and S agree within a given band
60 Realistic Example: Probabilities of agreement, documents random permutations/hash functions/rows => if 4byte integers then 4Mb to hold signature matrix => still k choose is a lot (~5billion) bands of 5 rows Want 8% Jaccard Similarity ; for any row p(s == S) =.8 P(S==S b): probability S and S agree within a given band =.85 =.38 => P(S!=S b) = -.38 =.67 P(S!=S): probability S and S do not agree in any band
61 Realistic Example: Probabilities of agreement, documents random permutations/hash functions/rows => if 4byte integers then 4Mb to hold signature matrix => still k choose is a lot (~5billion) bands of 5 rows Want 8% Jaccard Similarity ; for any row p(s == S) =.8 P(S==S b): probability S and S agree within a given band =.85 =.38 => P(S!=S b) = -.38 =.67 P(S!=S): probability S and S do not agree in any band =.67 =.35
62 Realistic Example: Probabilities of agreement, documents random permutations/hash functions/rows => if 4byte integers then 4Mb to hold signature matrix => still k choose is a lot (~5billion) bands of 5 rows Want 8% Jaccard Similarity ; for any row p(s == S) =.8 P(S==S b): probability S and S agree within a given band =.85 =.38 => P(S!=S b) = -.38 =.67 P(S!=S): probability S and S do not agree in any band =.67 =.35 What if wanting 4% Jaccard Similarity?
63 istance Metrics Pipeline gives us a way to find near-neighbors in high-dimensional space based on Jaccard istance ( - Jaccard Sim). (
64 istance Metrics Pipeline gives us a way to find near-neighbors in high-dimensional space based on Jaccard istance ( - Jaccard Sim). Typical properties of a distance metric, d: d(x, x) = d(x, y) = d(y, x) d(x, y) d(x,z) + d(z,y) (
65 istance Metrics Pipeline gives us a way to find near-neighbors in high-dimensional space based on Jaccard istance ( - Jaccard Sim). There are other metrics of similarity. e.g: Euclidean istance osine istance Edit istance Hamming istance
66 istance Metrics Pipeline gives us a way to find near-neighbors in high-dimensional space based on Jaccard istance ( - Jaccard Sim). There are other metrics of similarity. e.g: Euclidean istance osine istance Edit istance Hamming istance ( L Norm )
67 istance Metrics Pipeline gives us a way to find near-neighbors in high-dimensional space based on Jaccard istance ( - Jaccard Sim). There are other metrics of similarity. e.g: Euclidean istance osine istance Edit istance Hamming istance ( L Norm )
68 Locality Sensitive Hashing - Theory LSH an be generalized to many distance metrics by converting output to a probability and providing a lower bound on probability of being similar.
69 Locality Sensitive Hashing - Theory LSH an be generalized to many distance metrics by converting output to a probability and providing a lower bound on probability of being similar. E.g. for euclidean distance: hoose random lines (analogous to hash functions in minhashing) Project the two points onto each line; match if two points within an interval
70 Link nalysis
71 The Web, circa 998
72 The Web, circa 998 Match keywords, language (information retrieval) Explore directory
73 The Web, circa 998 Easy to game with term spam Match keywords, language (information retrieval) Explore directory Time-consuming; Not open-ended
74 Enter PageRank...
75 PageRank Key Idea: onsider the citations of the website.
76 PageRank Key Idea: onsider the citations of the website. Who links to it? and what are their citations?
77 PageRank Key Idea: onsider the citations of the website. Who links to it? and what are their citations? Innovation : What pages would a random Web surfer end up at? Innovation : Not just own terms but what terms are used by citations?
78 PageRank View : Flow Model: in-links as votes Innovation : What pages would a random Web surfer end up at? Innovation : Not just own terms but what terms are used by citations?
79 PageRank View : Flow Model: in-links (citations) as votes but, citations from important pages should count more. => Use recursion to figure out if each page is important. Innovation : What pages would a random Web surfer end up at? Innovation : Not just own terms but what terms are used by citations?
80 PageRank View : Flow Model: How to compute? Each page (j) has an importance (i.e. rank, rj) (nj is out-links )
81 PageRank r/ View : Flow Model: r/ r/4 r = r/ + r/4 + r/ How to compute? Each page (j) has an importance (i.e. rank, rj) (nj is out-links )
82 PageRank View : Flow Model: How to compute? Each page (j) has an importance (i.e. rank, rj) (nj is out-links )
83 PageRank View : Flow Model: System of Equations: How to compute? Each page (j) has an importance (i.e. rank, rj) (nj is out-links )
84 PageRank View : Flow Model: System of Equations: How to compute? Each page (j) has an importance (i.e. rank, rj) (nj is out-links )
85 PageRank View : Flow Model: Solve How to compute? Each page (j) has an importance (i.e. rank, rj) (nj is out-links )
86 PageRank to \ from / /3 / /3 / /3 / Transition Matrix, M
87 Innovation: What pages would a random Web surfer end up at? To start: N=4 nodes, so r = [¼, ¼, ¼, ¼,] View : Matrix Formulation to \ from / /3 / /3 / /3 / Transition Matrix, M
88 Innovation: What pages would a random Web surfer end up at? To start: N=4 nodes, so r = [¼, ¼, ¼, ¼,] after st iteration: M r = [3/8, 5/4, 5/4, 5/4] after nd iteration: M(M r) = M r = [5/48, /48, ] View : Matrix Formulation to \ from / /3 / /3 / /3 / Transition Matrix, M
89 Innovation: What pages would a random Web surfer end up at? To start: N=4 nodes, so r = [¼, ¼, ¼, ¼,] after st iteration: M r = [3/8, 5/4, 5/4, 5/4] after nd iteration: M(M r) = M r = [5/48, /48, ] Power iteration algorithm initialize: r[] = [/N,, /N], r[-]=[,...,] while (err_norm(r[t],r[t-])>min_err): err_norm(v, v) = v - v #L norm to \ from / /3 / /3 / /3 / Transition Matrix, M
90 Innovation: What pages would a random Web surfer end up at? To start: N=4 nodes, so r = [¼, ¼, ¼, ¼,] after st iteration: M r = [3/8, 5/4, 5/4, 5/4] after nd iteration: M(M r) = M r = [5/48, /48, ] Power iteration algorithm initialize: r[] = [/N,, /N], r[-]=[,...,] while (err_norm(r[t],r[t-])>min_err): r[t+] = M r[t] t+= solution = r[t] err_norm(v, v) = v - v #L norm to \ from / /3 / /3 / /3 / Transition Matrix, M
91 s err_norm gets smaller we are moving toward: r = M r View 3: Eigenvectors: Power iteration algorithm initialize: r[] = [/N,, /N], r[-]=[,...,] while (err_norm(r[t],r[t-])>min_err): r[t+] = M r[t] t+= solution = r[t] err_norm(v, v) = v - v #L norm
92 s err_norm gets smaller we are moving toward: r = M r View 3: Eigenvectors: We are actually just finding the eigenvector of M.... e h t ds fin Power iteration algorithm initialize: r[] = [/N,, /N], r[-]=[,...,] while (err_norm(r[t],r[t-])>min_err): r[t+] = M r[t] t+= solution = r[t] err_norm(v, v) = v - v #L norm x is an eigenvector of x = x if:
93 s err_norm gets smaller we are moving toward: r = M r View 3: Eigenvectors: We are actually just finding the eigenvector of M.... e h t ds fin Power iteration algorithm initialize: x is an eigenvector of x = x r[] = [/N,, /N], if: r[-]=[,...,] while (err_norm(r[t],r[t-])>min_err): r[t+] = M r[t] = t+= since columns of M sum to. solution = r[t] thus, r=mr err_norm(v, v) = v - v #L norm
94 View 4: Markov Process Where is surfer at time t+? p(t+) = M p(t) Suppose: p(t+) = p(t), then p(t) is a stationary distribution of a random walk. Thus, r is a stationary distribution. Probability of being at given node.
95 View 4: Markov Process Where is surfer at time t+? p(t+) = M p(t) Suppose: p(t+) = p(t), then p(t) is a stationary distribution of a random walk. Thus, r is a stationary distribution. Probability of being at given node. aka st order Markov Process Rich probabilistic theory. One finding: Stationary distributions have a unique distribution if: No dead-ends : a node can t propagate its rank No spider traps : set of nodes with no way out. lso known as being stochastic, irreducible, and aperiodic.
96 View 4: Markov Process - Problems for vanilla PI to \ from /3 /3 /3 What would r converge to? aka st order Markov Process Rich probabilistic theory. One finding: Stationary distributions have a unique distribution if: No dead-ends : a node can t propagate its rank No spider traps : set of nodes with no way out. lso known as being stochastic, irreducible, and aperiodic.
97 View 4: Markov Process - Problems for vanilla PI to \ from /3 /3 /3 What would r converge to? aka st order Markov Process Rich probabilistic theory. One finding: Stationary distributions have a unique distribution if: No dead-ends : a node can t propagate its rank No spider traps : set of nodes with no way out. lso known as being stochastic, irreducible, and aperiodic.
98 View 4: Markov Process - Problems for vanilla PI to \ from /3 /3 /3 What would r converge to? aka st order Markov Process Rich probabilistic theory. One finding: Stationary distributions have a unique distribution if: columns sum to same node doesn t repeat at regular intervals non-zero chance of going to any other node lso known as being stochastic, irreducible, and aperiodic.
99 Goals: No dead-ends No spider traps The Google PageRank Formulation dd teleportation:t each step, two choices. Follow a random link (probability, = ~.85). Teleport to a random node (probability, - )
100 Goals: No dead-ends No spider traps The Google PageRank Formulation dd teleportation:t each step, two choices. Follow a random link (probability, = ~.85). Teleport to a random node (probability, - ) to \ from ⅓ ⅓ ⅓
101 Goals: No dead-ends No spider traps The Google PageRank Formulation dd teleportation:t each step, two choices. Follow a random link (probability, = ~.85). Teleport to a random node (probability, - ) to \ from +.5*¼ +.5*¼ ⅓ +.5*¼.85*+.5*¼ ⅓ +.5*¼ +.5*¼ ⅓.85* +.5*¼ +.5*¼
102 Goals: No dead-ends No spider traps The Google PageRank Formulation dd teleportation:t each step, two choices. Follow a random link (probability, = ~.85). Teleport to a random node (probability, - ) to \ from +.5*¼ +.5*¼ 85*+.5*¼ +.5*¼.85*⅓+.5*¼ +.5*¼ +.5*¼.85*+.5*¼.85*⅓+.5*¼ +.5*¼ +.5*¼ +.5*¼.85*⅓+.5*¼.85*+.5*¼ +.5*¼ +.5*¼
103 Goals: No dead-ends No spider traps The Google PageRank Formulation dd teleportation:t each step, two choices. Follow a random link (probability, = ~.85). Teleport to a random node (probability, - ) to \ from ⅓ ⅓ ⅓
104 Goals: No dead-ends No spider traps The Google PageRank Formulation dd teleportation:t each step, two choices. Follow a random link (probability, = ~.85). Teleport to a random node (probability, - ) to \ from ¼ ⅓ ¼ ⅓ ¼ ⅓ ¼
105 Goals: No dead-ends No spider traps The Google PageRank Formulation dd teleportation:t each step, two choices. Follow a random link (probability, = ~.85). Teleport to a random node (probability, - ) to \ from.85*¼+.5*¼ ⅓.85*¼+.5*¼ ⅓.85*¼+.5*¼ ⅓.85*¼+.5*¼
106 Goals: No dead-ends No spider traps The Google PageRank Formulation dd teleportation:t each step, two choices. Follow a random link (probability, = ~.85). Teleport to a random node (probability, - ) (Teleport from a dead-end has probability ) to \ from +.5*¼ *¼ 85*+.5*¼ +.5*¼.85*⅓+.5*¼ *¼ +.5*¼.85*+.5*¼.85*⅓+.5*¼ *¼ +.5*¼ +.5*¼.85*⅓+.5*¼ *¼ +.5*¼ +.5*¼
107 Teleportation, as Flow Model: Goals: No dead-ends No spider traps (rin and Page, 998) to \ from +.5*¼ *¼ 85*+.5*¼ +.5*¼.85*⅓+.5*¼ *¼ +.5*¼.85*+.5*¼.85*⅓+.5*¼ *¼ +.5*¼ +.5*¼.85*⅓+.5*¼ *¼ +.5*¼ +.5*¼
108 Teleportation, as Flow Model: Goals: No dead-ends No spider traps (rin and Page, 998) Teleportation, as Matrix Model: to \ from +.5*¼ *¼ 85*+.5*¼ +.5*¼.85*⅓+.5*¼ *¼ +.5*¼.85*+.5*¼.85*⅓+.5*¼ *¼ +.5*¼ +.5*¼.85*⅓+.5*¼ *¼ +.5*¼ +.5*¼
109 Teleportation, as Flow Model: Goals: No dead-ends No spider traps (rin and Page, 998) Teleportation, as Matrix Model: to \ from +.5*¼.85*¼+.5*¼ 85*+.5*¼ +.5*¼.85*⅓+.5*¼.85*¼+.5*¼ +.5*¼.85*+.5*¼.85*⅓+.5*¼.85*¼+.5*¼ +.5*¼ +.5*¼.85*⅓+.5*¼.85*¼+.5*¼ +.5*¼ +.5*¼
110 Teleportation, as Flow Model: Goals: No dead-ends No spider traps (rin and Page, 998) Teleportation, as Matrix Model: To apply: run power iterations over M instead of M. to \ from +.5*¼ *¼ 85*+.5*¼ +.5*¼.85*⅓+.5*¼ *¼ +.5*¼.85*+.5*¼.85*⅓+.5*¼ *¼ +.5*¼ +.5*¼.85*⅓+.5*¼ *¼ +.5*¼ +.5*¼
111 Teleportation, as Flow Model: Goals: No dead-ends No spider traps (rin and Page, 998) Teleportation, as Matrix Model: Steps:. ompute M. dd /N to all dead-ends. 3. onvert M to M 4. Run Power Iterations. to \ from +.5*¼ *¼ 85*+.5*¼ +.5*¼.85*⅓+.5*¼ *¼ +.5*¼.85*+.5*¼.85*⅓+.5*¼ *¼ +.5*¼ +.5*¼.85*⅓+.5*¼ *¼ +.5*¼ +.5*¼
Markov Chains in Pop Culture
Markov Chains in Pop Culture Lola Thompson November 29, 2010 1 of 21 Introduction There are many examples of Markov Chains used in science and technology. Here are some applications in pop culture: 2 of
More informationA PageRank Algorithm based on Asynchronous Gauss-Seidel Iterations
Simulation A PageRank Algorithm based on Asynchronous Gauss-Seidel Iterations D. Silvestre, J. Hespanha and C. Silvestre 2018 American Control Conference Milwaukee June 27-29 2018 Silvestre, Hespanha and
More informationCS256 Applied Theory of Computation
CS256 Applied Theory of Computation Parallel Computation III John E Savage Overview Mapping normal algorithms to meshes Shuffle operations on linear arrays Shuffle operations on two-dimensional arrays
More informationLecture 20: Combinatorial Search (1997) Steven Skiena. skiena
Lecture 20: Combinatorial Search (1997) Steven Skiena Department of Computer Science State University of New York Stony Brook, NY 11794 4400 http://www.cs.sunysb.edu/ skiena Give an O(n lg k)-time algorithm
More information4.12 Practice problems
4. Practice problems In this section we will try to apply the concepts from the previous few sections to solve some problems. Example 4.7. When flipped a coin comes up heads with probability p and tails
More information17. Symmetries. Thus, the example above corresponds to the matrix: We shall now look at how permutations relate to trees.
7 Symmetries 7 Permutations A permutation of a set is a reordering of its elements Another way to look at it is as a function Φ that takes as its argument a set of natural numbers of the form {, 2,, n}
More informationDigital Television Lecture 5
Digital Television Lecture 5 Forward Error Correction (FEC) Åbo Akademi University Domkyrkotorget 5 Åbo 8.4. Error Correction in Transmissions Need for error correction in transmissions Loss of data during
More informationRandomized Algorithms
Presentation for use with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 Randomized Algorithms Randomized Algorithms 1 Applications: Simple Algorithms and
More informationMath 1111 Math Exam Study Guide
Math 1111 Math Exam Study Guide The math exam will cover the mathematical concepts and techniques we ve explored this semester. The exam will not involve any codebreaking, although some questions on the
More informationEE521 Analog and Digital Communications
EE521 Analog and Digital Communications Questions Problem 1: SystemView... 3 Part A (25%... 3... 3 Part B (25%... 3... 3 Voltage... 3 Integer...3 Digital...3 Part C (25%... 3... 4 Part D (25%... 4... 4
More informationTheory of Probability - Brett Bernstein
Theory of Probability - Brett Bernstein Lecture 3 Finishing Basic Probability Review Exercises 1. Model flipping two fair coins using a sample space and a probability measure. Compute the probability of
More informationSecret Key Systems (block encoding) Encrypting a small block of text (say 128 bits) General considerations for cipher design:
Secret Key Systems (block encoding) Encrypting a small block of text (say 128 bits) General considerations for cipher design: Secret Key Systems (block encoding) Encrypting a small block of text (say 128
More informationIntroduction to Monte Carlo Methods
Introduction Introduction to Monte Carlo Methods Daryl DeFord VRDI MGGG June 6, 2018 Introduction Outline 1 Introduction 2 3 Monte Carlo Methods 4 Historical Overview 5 Markov Chain Methods 6 MCMC on Graphs
More informationComp551: Advanced Robotics Lab Lecture 7: Consensus CSE481C wi09 - Robotics Capstone, Lec3: Consensus
Comp551: Advanced Robotics Lab Lecture 7: Consensus 1 intro 3 multi-robot computation model 5 Model: Robot State We can describe the state, s, of a single robot as a tuple of its ID, pose, and private
More informationWinter Quarter Competition
Winter Quarter Competition LA Math Circle (Advanced) March 13, 2016 Problem 1 Jeff rotates spinners P, Q, and R and adds the resulting numbers. What is the probability that his sum is an odd number? Problem
More informationAlgorithmique appliquée Projet UNO
Algorithmique appliquée Projet UNO Paul Dorbec, Cyril Gavoille The aim of this project is to encode a program as efficient as possible to find the best sequence of cards that can be played by a single
More informationMath 1111 Math Exam Study Guide
Math 1111 Math Exam Study Guide The math exam will cover the mathematical concepts and techniques we ve explored this semester. The exam will not involve any codebreaking, although some questions on the
More informationModule 3 Greedy Strategy
Module 3 Greedy Strategy Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu Introduction to Greedy Technique Main
More informationDistribution of Primes
Distribution of Primes Definition. For positive real numbers x, let π(x) be the number of prime numbers less than or equal to x. For example, π(1) = 0, π(10) = 4 and π(100) = 25. To use some ciphers, we
More informationDeepStack: Expert-Level AI in Heads-Up No-Limit Poker. Surya Prakash Chembrolu
DeepStack: Expert-Level AI in Heads-Up No-Limit Poker Surya Prakash Chembrolu AI and Games AlphaGo Go Watson Jeopardy! DeepBlue -Chess Chinook -Checkers TD-Gammon -Backgammon Perfect Information Games
More informationSingle Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors
Single Error Correcting Codes (SECC) Basic idea: Use multiple parity bits, each covering a subset of the data bits. No two message bits belong to exactly the same subsets, so a single error will generate
More informationMultitree Decoding and Multitree-Aided LDPC Decoding
Multitree Decoding and Multitree-Aided LDPC Decoding Maja Ostojic and Hans-Andrea Loeliger Dept. of Information Technology and Electrical Engineering ETH Zurich, Switzerland Email: {ostojic,loeliger}@isi.ee.ethz.ch
More informationWe will be releasing HW1 today It is due in 2 weeks (4/18 at 23:59pm) The homework is long
We will be releasing HW1 today It is due in 2 weeks (4/18 at 23:59pm) The homework is long Requires proving theorems as well as coding Please start early Recitation sessions: Spark Tutorial and Clinic:
More informationProject. B) Building the PWM Read the instructions of HO_14. 1) Determine all the 9-mers and list them here:
Project Please choose ONE project among the given five projects. The last three projects are programming projects. hoose any programming language you want. Note that you can also write programs for the
More informationModule 3 Greedy Strategy
Module 3 Greedy Strategy Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu Introduction to Greedy Technique Main
More informationRecap from previous lecture. Information Retrieval. Topics for Today. Recall: Basic structure of an Inverted index. Dictionaries & Tolerant Retrieval
Recap from previous lecture nformation Retrieval Dictionaries & Tolerant Retrieval Jörg Tiedemann jorg.tiedemann@lingfil.uu.se Department of Linguistics and Philology Uppsala University nverted indexes
More informationA COMPUTATIONAL PARADIGM FOR SPACE-TIME MULTIUSER DETECTION. Lisa Welburn*, Jim Cavers*, Kevin Sowerby** ** The University of Auckland, New Zealand
A COMPUTATIONAL PARADIGM FOR SPACE-TIME MULTIUSER DETECTION Lisa Welburn*, Jim Cavers*, Kevin Sowerby** * Simon Fraser University, Canada ** The University of Auckland, New Zealand 1 OUTLINE: Space-time
More informationInternational Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)
Performance Analysis of OFDM under DWT, DCT based Image Processing Anshul Soni soni.anshulec14@gmail.com Ashok Chandra Tiwari Abstract In this paper, the performance of conventional discrete cosine transform
More informationCS188 Spring 2010 Section 3: Game Trees
CS188 Spring 2010 Section 3: Game Trees 1 Warm-Up: Column-Row You have a 3x3 matrix of values like the one below. In a somewhat boring game, player A first selects a row, and then player B selects a column.
More informationMATHCOUNTS. 100 Classroom Lessons. August Prepared by
MATHCOUNTS 100 Classroom Lessons August 2000 Prepared by John Cocharo The Oakridge School 5900 W. Pioneer Parkway Arlington, TX 76013 (817) 451-4994 (school) jcocharo@esc11.net (school) cocharo@hotmail.com
More informationCK-12 Algebra II with Trigonometry Concepts 1
1.1 Subsets of Real Numbers 1. Rational Number. Irrational Number. Rational Number 4. Whole Number 5. Integer 6. Irrational Number 7. Real, Rational, Integer, Whole, and Natural Number 8. Real and Rational
More informationPaper Presentation. Steve Jan. March 5, Virginia Tech. Steve Jan (Virginia Tech) Paper Presentation March 5, / 28
Paper Presentation Steve Jan Virginia Tech March 5, 2015 Steve Jan (Virginia Tech) Paper Presentation March 5, 2015 1 / 28 2 paper to present Nonparametric Multi-group Membership Model for Dynamic Networks,
More information11/13/18. Introduction to RNNs for NLP. About Me. Overview SHANG GAO
Introduction to RNNs for NLP SHANG GAO About Me PhD student in the Data Science and Engineering program Took Deep Learning last year Work in the Biomedical Sciences, Engineering, and Computing group at
More informationMonte Carlo Tree Search and AlphaGo. Suraj Nair, Peter Kundzicz, Kevin An, Vansh Kumar
Monte Carlo Tree Search and AlphaGo Suraj Nair, Peter Kundzicz, Kevin An, Vansh Kumar Zero-Sum Games and AI A player s utility gain or loss is exactly balanced by the combined gain or loss of opponents:
More informationCS 380: ARTIFICIAL INTELLIGENCE MONTE CARLO SEARCH. Santiago Ontañón
CS 380: ARTIFICIAL INTELLIGENCE MONTE CARLO SEARCH Santiago Ontañón so367@drexel.edu Recall: Adversarial Search Idea: When there is only one agent in the world, we can solve problems using DFS, BFS, ID,
More informationAttitude Determination. - Using GPS
Attitude Determination - Using GPS Table of Contents Definition of Attitude Attitude and GPS Attitude Representations Least Squares Filter Kalman Filter Other Filters The AAU Testbed Results Conclusion
More informationHamming Codes and Decoding Methods
Hamming Codes and Decoding Methods Animesh Ramesh 1, Raghunath Tewari 2 1 Fourth year Student of Computer Science Indian institute of Technology Kanpur 2 Faculty of Computer Science Advisor to the UGP
More information5.4 Imperfect, Real-Time Decisions
116 5.4 Imperfect, Real-Time Decisions Searching through the whole (pruned) game tree is too inefficient for any realistic game Moves must be made in a reasonable amount of time One has to cut off the
More informationCMPS 12A Introduction to Programming Programming Assignment 5 In this assignment you will write a Java program that finds all solutions to the n-queens problem, for. Begin by reading the Wikipedia article
More informationDynamic Programming in Real Life: A Two-Person Dice Game
Mathematical Methods in Operations Research 2005 Special issue in honor of Arie Hordijk Dynamic Programming in Real Life: A Two-Person Dice Game Henk Tijms 1, Jan van der Wal 2 1 Department of Econometrics,
More informationTwenty Mathcounts Target Round Tests Test 1 MATHCOUNTS. Mock Competition One. Target Round. Name. State
MATHCOUNTS Mock Competition One Target Round Name State DO NOT BEGIN UNTIL YOU ARE INSTRUCTED TO DO SO. This section of the competition consists of eight problems, which will be presented in pairs. Work
More informationProf. Noah Snavely CS Administrivia. Assignment 5, due Friday, April 20 th, 5pm
Sequences I Prof. Noah Snavely CS4 http://cs4.cs.cornell.edu Administrivia Assignment 5, due Friday, April 20 th, 5pm Assignment 6 will be released early next week 2 Administrivia Final projects Due on
More information5.4 Imperfect, Real-Time Decisions
5.4 Imperfect, Real-Time Decisions Searching through the whole (pruned) game tree is too inefficient for any realistic game Moves must be made in a reasonable amount of time One has to cut off the generation
More informationCS188 Spring 2010 Section 3: Game Trees
CS188 Spring 2010 Section 3: Game Trees 1 Warm-Up: Column-Row You have a 3x3 matrix of values like the one below. In a somewhat boring game, player A first selects a row, and then player B selects a column.
More informationUnit 3. Logic Design
EE 2: Digital Logic Circuit Design Dr Radwan E Abdel-Aal, COE Logic and Computer Design Fundamentals Unit 3 Chapter Combinational 3 Combinational Logic Logic Design - Introduction to Analysis & Design
More informationThe study of probability is concerned with the likelihood of events occurring. Many situations can be analyzed using a simplified model of probability
The study of probability is concerned with the likelihood of events occurring Like combinatorics, the origins of probability theory can be traced back to the study of gambling games Still a popular branch
More informationChapter 4 SPEECH ENHANCEMENT
44 Chapter 4 SPEECH ENHANCEMENT 4.1 INTRODUCTION: Enhancement is defined as improvement in the value or Quality of something. Speech enhancement is defined as the improvement in intelligibility and/or
More informationCSE548, AMS542: Analysis of Algorithms, Fall 2016 Date: Sep 25. Homework #1. ( Due: Oct 10 ) Figure 1: The laser game.
CSE548, AMS542: Analysis of Algorithms, Fall 2016 Date: Sep 25 Homework #1 ( Due: Oct 10 ) Figure 1: The laser game. Task 1. [ 60 Points ] Laser Game Consider the following game played on an n n board,
More informationLocal Search: Hill Climbing. When A* doesn t work AIMA 4.1. Review: Hill climbing on a surface of states. Review: Local search and optimization
Outline When A* doesn t work AIMA 4.1 Local Search: Hill Climbing Escaping Local Maxima: Simulated Annealing Genetic Algorithms A few slides adapted from CS 471, UBMC and Eric Eaton (in turn, adapted from
More informationOutline for today s lecture Informed Search Optimal informed search: A* (AIMA 3.5.2) Creating good heuristic functions Hill Climbing
Informed Search II Outline for today s lecture Informed Search Optimal informed search: A* (AIMA 3.5.2) Creating good heuristic functions Hill Climbing CIS 521 - Intro to AI - Fall 2017 2 Review: Greedy
More informationQuestion Score Max Cover Total 149
CS170 Final Examination 16 May 20 NAME (1 pt): TA (1 pt): Name of Neighbor to your left (1 pt): Name of Neighbor to your right (1 pt): This is a closed book, closed calculator, closed computer, closed
More informationLocal Search. Hill Climbing. Hill Climbing Diagram. Simulated Annealing. Simulated Annealing. Introduction to Artificial Intelligence
Introduction to Artificial Intelligence V22.0472-001 Fall 2009 Lecture 6: Adversarial Search Local Search Queue-based algorithms keep fallback options (backtracking) Local search: improve what you have
More information18.S34 (FALL, 2007) PROBLEMS ON PROBABILITY
18.S34 (FALL, 2007) PROBLEMS ON PROBABILITY 1. Three closed boxes lie on a table. One box (you don t know which) contains a $1000 bill. The others are empty. After paying an entry fee, you play the following
More informationgame tree complete all possible moves
Game Trees Game Tree A game tree is a tree the nodes of which are positions in a game and edges are moves. The complete game tree for a game is the game tree starting at the initial position and containing
More informationChapter 3 Convolutional Codes and Trellis Coded Modulation
Chapter 3 Convolutional Codes and Trellis Coded Modulation 3. Encoder Structure and Trellis Representation 3. Systematic Convolutional Codes 3.3 Viterbi Decoding Algorithm 3.4 BCJR Decoding Algorithm 3.5
More informationOptimization Techniques for Alphabet-Constrained Signal Design
Optimization Techniques for Alphabet-Constrained Signal Design Mojtaba Soltanalian Department of Electrical Engineering California Institute of Technology Stanford EE- ISL Mar. 2015 Optimization Techniques
More informationIntroductory Probability
Introductory Probability Combinations Nicholas Nguyen nicholas.nguyen@uky.edu Department of Mathematics UK Agenda Assigning Objects to Identical Positions Denitions Committee Card Hands Coin Toss Counts
More informationUniversiteit Leiden Opleiding Informatica
Universiteit Leiden Opleiding Informatica An Analysis of Dominion Name: Roelof van der Heijden Date: 29/08/2014 Supervisors: Dr. W.A. Kosters (LIACS), Dr. F.M. Spieksma (MI) BACHELOR THESIS Leiden Institute
More information1. Eighty percent of eighty percent of a number is 144. What is the 1. number? 2. How many diagonals does a regular pentagon have? 2.
Blitz, Page 1 1. Eighty percent of eighty percent of a number is 144. What is the 1. number? 2. How many diagonals does a regular pentagon have? 2. diagonals 3. A tiny test consists of 3 multiple choice
More informationThe Symmetric Traveling Salesman Problem by Howard Kleiman
I. INTRODUCTION The Symmetric Traveling Salesman Problem by Howard Kleiman Let M be an nxn symmetric cost matrix where n is even. We present an algorithm that extends the concept of admissible permutation
More informationCODE division multiple access (CDMA) systems suffer. A Blind Adaptive Decorrelating Detector for CDMA Systems
1530 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 16, NO. 8, OCTOBER 1998 A Blind Adaptive Decorrelating Detector for CDMA Systems Sennur Ulukus, Student Member, IEEE, and Roy D. Yates, Member,
More informationCS 188: Artificial Intelligence Spring 2007
CS 188: Artificial Intelligence Spring 2007 Lecture 7: CSP-II and Adversarial Search 2/6/2007 Srini Narayanan ICSI and UC Berkeley Many slides over the course adapted from Dan Klein, Stuart Russell or
More informationTOURNAMENT ROUND. Round 1
Round 1 1. Find all prime factors of 8051. 2. Simplify where x = 628,y = 233,z = 340. [log xyz (x z )][1+log x y +log x z], 3. In prokaryotes, translation of mrna messages into proteins is most often initiated
More informationLink State Routing. Stefano Vissicchio UCL Computer Science CS 3035/GZ01
Link State Routing Stefano Vissicchio UCL Computer Science CS 335/GZ Reminder: Intra-domain Routing Problem Shortest paths problem: What path between two vertices offers minimal sum of edge weights? Classic
More informationOutline. Tracking with Unreliable Node Sequences. Abstract. Outline. Outline. Abstract 10/20/2009
Tracking with Unreliable Node Sequences Ziguo Zhong, Ting Zhu, Dan Wang and Tian He Computer Science and Engineering, University of Minnesota Infocom 2009 Presenter: Jing He Abstract This paper proposes
More informationFunctions of several variables
Chapter 6 Functions of several variables 6.1 Limits and continuity Definition 6.1 (Euclidean distance). Given two points P (x 1, y 1 ) and Q(x, y ) on the plane, we define their distance by the formula
More informationISudoku. Jonathon Makepeace Matthew Harris Jamie Sparrow Julian Hillebrand
Jonathon Makepeace Matthew Harris Jamie Sparrow Julian Hillebrand ISudoku Abstract In this paper, we will analyze and discuss the Sudoku puzzle and implement different algorithms to solve the puzzle. After
More informationHeuristics & Pattern Databases for Search Dan Weld
10//01 CSE 57: Artificial Intelligence Autumn01 Heuristics & Pattern Databases for Search Dan Weld Recap: Search Problem States configurations of the world Successor function: function from states to lists
More informationMeet #3 January Intermediate Mathematics League of Eastern Massachusetts
Meet #3 January 2009 Intermediate Mathematics League of Eastern Massachusetts Meet #3 January 2009 Category 1 Mystery 1. How many two-digit multiples of four are there such that the number is still a
More information1111: Linear Algebra I
1111: Linear Algebra I Dr. Vladimir Dotsenko (Vlad) Lecture 7 Dr. Vladimir Dotsenko (Vlad) 1111: Linear Algebra I Lecture 7 1 / 8 Invertible matrices Theorem. 1. An elementary matrix is invertible. 2.
More informationMathematics Competition Practice Session 6. Hagerstown Community College: STEM Club November 20, :00 pm - 1:00 pm STC-170
2015-2016 Mathematics Competition Practice Session 6 Hagerstown Community College: STEM Club November 20, 2015 12:00 pm - 1:00 pm STC-170 1 Warm-Up (2006 AMC 10B No. 17): Bob and Alice each have a bag
More informationSoutheastern European Regional Programming Contest Bucharest, Romania Vinnytsya, Ukraine October 21, Problem A Concerts
Problem A Concerts File: A.in File: standard output Time Limit: 0.3 seconds (C/C++) Memory Limit: 128 megabytes John enjoys listening to several bands, which we shall denote using A through Z. He wants
More informationModule 3: Physical Layer
Module 3: Physical Layer Dr. Associate Professor of Computer Science Jackson State University Jackson, MS 39217 Phone: 601-979-3661 E-mail: natarajan.meghanathan@jsums.edu 1 Topics 3.1 Signal Levels: Baud
More informationAdversarial Search. Rob Platt Northeastern University. Some images and slides are used from: AIMA CS188 UC Berkeley
Adversarial Search Rob Platt Northeastern University Some images and slides are used from: AIMA CS188 UC Berkeley What is adversarial search? Adversarial search: planning used to play a game such as chess
More informationMore Adversarial Search
More Adversarial Search CS151 David Kauchak Fall 2010 http://xkcd.com/761/ Some material borrowed from : Sara Owsley Sood and others Admin Written 2 posted Machine requirements for mancala Most of the
More informationAlgebra. Recap: Elements of Set Theory.
January 14, 2018 Arrangements and Derangements. Algebra. Recap: Elements of Set Theory. Arrangements of a subset of distinct objects chosen from a set of distinct objects are permutations [order matters]
More information18.204: CHIP FIRING GAMES
18.204: CHIP FIRING GAMES ANNE KELLEY Abstract. Chip firing is a one-player game where piles start with an initial number of chips and any pile with at least two chips can send one chip to the piles on
More informationSheet 1: Introduction to prime numbers.
Option A Hand in at least one question from at least three sheets Sheet 1: Introduction to prime numbers. [provisional date for handing in: class 2.] 1. Use Sieve of Eratosthenes to find all prime numbers
More information# 12 ECE 253a Digital Image Processing Pamela Cosman 11/4/11. Introductory material for image compression
# 2 ECE 253a Digital Image Processing Pamela Cosman /4/ Introductory material for image compression Motivation: Low-resolution color image: 52 52 pixels/color, 24 bits/pixel 3/4 MB 3 2 pixels, 24 bits/pixel
More informationDigital Transmission using SECC Spring 2010 Lecture #7. (n,k,d) Systematic Block Codes. How many parity bits to use?
Digital Transmission using SECC 6.02 Spring 2010 Lecture #7 How many parity bits? Dealing with burst errors Reed-Solomon codes message Compute Checksum # message chk Partition Apply SECC Transmit errors
More informationAn analysis of TL Wimpout: A probability study and an examination of game-playing strategies.
An analysis of TL Wimpout: A probability study and an examination of game-playing strategies. By: Anthony T. Litsch III A SENIOR RESEARCH PAPER PRESENTED TO THE DEPARTMENT OF MATHEMATICS AND COMPUTER SCIENCE
More informationArrays. Independent Part. Contents. Programming with Java Module 3. 1 Bowling Introduction Task Intermediate steps...
Programming with Java Module 3 Arrays Independent Part Contents 1 Bowling 3 1.1 Introduction................................. 3 1.2 Task...................................... 3 1.3 Intermediate steps.............................
More informationIntroduction to Counting and Probability
Randolph High School Math League 2013-2014 Page 1 If chance will have me king, why, chance may crown me. Shakespeare, Macbeth, Act I, Scene 3 1 Introduction Introduction to Counting and Probability Counting
More informationChapter 8. Representing Multimedia Digitally
Chapter 8 Representing Multimedia Digitally Learning Objectives Explain how RGB color is represented in bytes Explain the difference between bits and binary numbers Change an RGB color by binary addition
More informationIDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE
International Journal of Technology (2011) 1: 56 64 ISSN 2086 9614 IJTech 2011 IDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE Djamhari Sirat 1, Arman D. Diponegoro
More informationMATHEMATICS UNIT 2: CALCULATOR-ALLOWED FOUNDATION TIER
Surname Centre Number Candidate Number Other Names 0 GCSE NEW 3300U20-1 S17-3300U20-1 MATHEMATICS UNIT 2: CALCULATOR-ALLOWED FOUNDATION TIER TUESDAY, 20 JUNE 2017 AFTERNOON 1 hour 30 minutes For s use
More informationA Spectrum Analysis Method to Space Vector Pulse Width Modulation
dvanced Science and Technology Letters Vol.34 (MS ), pp.4-7 http://dx.doi.org/.47/astl..34.8 Spectrum nalysis Method to Space Vector Pulse Width Modulation Guoqiang hen and Jianli Kang School of Mechanical
More informationCS 438 Communication Networks Spring 2014 Homework 2 Due Date: February 19
1. Questions to ponder a) What s the tradeoffs between copper and optical? b) Introduce two multiple access methods / protocols that weren t covered in class. Discuss their advantages and disadvantages.
More informationChapter 2 Distributed Consensus Estimation of Wireless Sensor Networks
Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Recently, consensus based distributed estimation has attracted considerable attention from various fields to estimate deterministic
More informationReinforcement Learning Agent for Scrolling Shooter Game
Reinforcement Learning Agent for Scrolling Shooter Game Peng Yuan (pengy@stanford.edu) Yangxin Zhong (yangxin@stanford.edu) Zibo Gong (zibo@stanford.edu) 1 Introduction and Task Definition 1.1 Game Agent
More informationDesign of Temporally Dithered Codes for Increased Depth of Field in Structured Light Systems
Design of Temporally Dithered Codes for Increased Depth of Field in Structured Light Systems Ricardo R. Garcia University of California, Berkeley Berkeley, CA rrgarcia@eecs.berkeley.edu Abstract In recent
More informationRecap from previous lectures. Information Retrieval. Recap from previous lectures. Topics for Today. Dictionaries & Tolerant Retrieval.
Recap from previous lectures nformation Retrieval Dictionaries & Tolerant Retrieval Jörg Tiedemann jorg.tiedemann@lingfil.uu.se Department of Linguistics and Philology Uppsala University nverted indexes
More informationPermutations and Combinations
Permutations and Combinations In statistics, there are two ways to count or group items. For both permutations and combinations, there are certain requirements that must be met: there can be no repetitions
More informationPermutations and codes:
Hamming distance Permutations and codes: Polynomials, bases, and covering radius Peter J. Cameron Queen Mary, University of London p.j.cameron@qmw.ac.uk International Conference on Graph Theory Bled, 22
More informationCMPT 310 Assignment 1
CMPT 310 Assignment 1 October 16, 2017 100 points total, worth 10% of the course grade. Turn in on CourSys. Submit a compressed directory (.zip or.tar.gz) with your solutions. Code should be submitted
More informationDigital Integrated CircuitDesign
Digital Integrated CircuitDesign Lecture 13 Building Blocks (Multipliers) Register Adder Shift Register Adib Abrishamifar EE Department IUST Acknowledgement This lecture note has been summarized and categorized
More informationDigitizing Color. Place Value in a Decimal Number. Place Value in a Binary Number. Chapter 11: Light, Sound, Magic: Representing Multimedia Digitally
Chapter 11: Light, Sound, Magic: Representing Multimedia Digitally Fluency with Information Technology Third Edition by Lawrence Snyder Digitizing Color RGB Colors: Binary Representation Giving the intensities
More informationFrugal Sensing Spectral Analysis from Power Inequalities
Frugal Sensing Spectral Analysis from Power Inequalities Nikos Sidiropoulos Joint work with Omar Mehanna IEEE SPAWC 2013 Plenary, June 17, 2013, Darmstadt, Germany Wideband Spectrum Sensing (for CR/DSM)
More informationAnnouncements. CS 188: Artificial Intelligence Fall Local Search. Hill Climbing. Simulated Annealing. Hill Climbing Diagram
CS 188: Artificial Intelligence Fall 2008 Lecture 6: Adversarial Search 9/16/2008 Dan Klein UC Berkeley Many slides over the course adapted from either Stuart Russell or Andrew Moore 1 Announcements Project
More informationMA/CSSE 473 Day 14. Permutations wrap-up. Subset generation. (Horner s method) Permutations wrap up Generating subsets of a set
MA/CSSE 473 Day 14 Permutations wrap-up Subset generation (Horner s method) MA/CSSE 473 Day 14 Student questions Monday will begin with "ask questions about exam material time. Exam details are Day 16
More information