CS 6604: Data Mining Large Networks and Time-Series

Size: px
Start display at page:

Download "CS 6604: Data Mining Large Networks and Time-Series"

Transcription

1 CS 6604: Data Mining Large Networks and Time-Series Pratik Anand Lecture 10/18: Community Detection Prof. B Aditya Prakash

2 Agenda Background Strong and weak ties, EB and G-N, cut and conductance Spectral clustering Laplacian matrix and properties Normalized graph laplacian and unnormalized spectral clustering algorithm Higher order organization of complex networks Motifs Conductance of motifs Spectral clustering of motifs Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 2

3 Background Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 3

4 Community Behavior Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 4

5 Need for community detection Source : Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 5

6 Need for community detection Provides a bigger picture of a large complex network Different communities act similarly Facebook, Twitter communities can help spot the origin of fake news Targeted advertisement to communities NSA!!! Source : Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 6

7 Strong and Weak ties Strong ties - ties between friends and family members Weak ties - ties between colleagues, acquaintances Strong Triadic closure Source : Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 7

8 Defining ties Different view of the same set of points by different criteria of putting edge between two nodes This results in different kind of strong ties Overlapping sections Removal of bridges results in clusters Source : Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 8

9 Betweenness of an edge (EB) Total unit flow flowing through an edge 7,7 Used by Girvan - Newman method to partition a graph Source : Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 9

10 Girvan - Newman method Remove edges with highest EBs Recalculate per node EB and repeat above Source : Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 10

11 Cuts and Conductance Goal : Split a graph into different clusters with different weights Min cut : Minimizing the weight between two subgraphs Balanced cuts Ratio cut for k partitions N-cut for k partitions NP - hard Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 11

12 SPECTRAL CLUSTERING Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 12

13 Spectral Clustering More efficient than traditional algorithms like k-means Provides better results, easier to implement Works on Laplacian matrix of similarity graph Similarity graphs usually created by different methods like k- means, ε-neighborhood graph Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 13

14 Laplacian matrix L = D - W Source : Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 14

15 Properties of Unnormalized Graph Laplacian Source : Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 15

16 Normalized Graph Laplacian Source : Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 16

17 The algorithm v1 Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 17

18 The algorithm v2 Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 18

19 Visual representation Source : Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 19

20 Combining it all : Higher-Order Organization of Complex Networks Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 20

21 Finding Higher-order structures Source : Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 21

22 Motifs Small subgraphs which are building blocks of all networks Earlier works based on frequency count of subgraphs Identifying results in understanding of overall structure which leads to accurate clustering Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 22

23 Identifying motifs in networks Source : Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 23

24 Applying Conductance to Motifs Source : Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 24

25 Clustering Find a set of node which minimizes motif conductance Such nodes become a cluster Problem? : It is computationally NP-hard Solution? Applying spectral clustering to motifs Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 25

26 Motif Spectral Clustering Input : Graph G and motif M Weighted graph G using the motif M to create motif adjacency matrix Spectral clustering on G Output : Clusters of original graph G with lowest motif conductance Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 26

27 Different phases of motif clustering Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 27

28 Problem Higher-order spectral analysis of a network of airports in Canada and the United States Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 28

29 Part A Motifs, anchored at blue nodes Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 29

30 Part B Top 50 most populous cities in the US Thicker lines represent weight in motif adjacency matrix Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 30

31 Part C Green - hubs Red - West coast nonhubs Purple - East coast nonhubs Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 31

32 Part D : Comparision Higher-order Laplacian Non -Higher-order Laplacian Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 32

33 Conclusion Spectral clustering is an effective technique Motifs are enablers to apply spectral clustering to unweighted graphs Clusters provide a macroscopic behavior of nodes in a network Motifs can be applied to large variety of networks like social network, transportation network Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 33

34 THANK YOU Pratik Anand 2017 CS 6604: DM Large Networks & Time-Series 34

Social Network Analysis in HCI

Social Network Analysis in HCI Social Network Analysis in HCI Derek L. Hansen and Marc A. Smith Marigold Bays-Muchmore (baysmuc2) Hang Cui (hangcui2) Contents Introduction ---------------- What is Social Network Analysis? How does it

More information

Community Detection and Labeling Nodes

Community Detection and Labeling Nodes and Labeling Nodes Hao Chen Department of Statistics, Stanford Jan. 25, 2011 (Department of Statistics, Stanford) Community Detection and Labeling Nodes Jan. 25, 2011 1 / 9 Community Detection - Network:

More information

Problem Set 4 Due: Wednesday, November 12th, 2014

Problem Set 4 Due: Wednesday, November 12th, 2014 6.890: Algorithmic Lower Bounds Prof. Erik Demaine Fall 2014 Problem Set 4 Due: Wednesday, November 12th, 2014 Problem 1. Given a graph G = (V, E), a connected dominating set D V is a set of vertices such

More information

Alexandre Fréchette, Neil Newman, Kevin Leyton-Brown

Alexandre Fréchette, Neil Newman, Kevin Leyton-Brown Solving the Station Repacking Problem Alexandre Fréchette, Neil Newman, Kevin Leyton-Brown Agenda Background Problem Novel Approach Experimental Results Background A Brief History Spectrum rights have

More information

Vesselin K. Vassilev South Bank University London Dominic Job Napier University Edinburgh Julian F. Miller The University of Birmingham Birmingham

Vesselin K. Vassilev South Bank University London Dominic Job Napier University Edinburgh Julian F. Miller The University of Birmingham Birmingham Towards the Automatic Design of More Efficient Digital Circuits Vesselin K. Vassilev South Bank University London Dominic Job Napier University Edinburgh Julian F. Miller The University of Birmingham Birmingham

More information

Advanced Data Visualization

Advanced Data Visualization Advanced Data Visualization CS 6965 Spring 2018 Prof. Bei Wang Phillips University of Utah Lecture 22 Foundations for Network Visualization NV MOTIVATION Foundations for Network Visualization & Analysis

More information

Social Network Analysis and Its Developments

Social Network Analysis and Its Developments 2013 International Conference on Advances in Social Science, Humanities, and Management (ASSHM 2013) Social Network Analysis and Its Developments DENG Xiaoxiao 1 MAO Guojun 2 1 Macau University of Science

More information

Modeling, Analysis and Optimization of Networks. Alberto Ceselli

Modeling, Analysis and Optimization of Networks. Alberto Ceselli Modeling, Analysis and Optimization of Networks Alberto Ceselli alberto.ceselli@unimi.it Università degli Studi di Milano Dipartimento di Informatica Doctoral School in Computer Science A.A. 2015/2016

More information

Lecture 22 [the second ½]: Standards, protocols and regulations in Architecting Engineering Systems

Lecture 22 [the second ½]: Standards, protocols and regulations in Architecting Engineering Systems Lecture 22 [the second ½]: Standards, protocols and regulations in Architecting Engineering Systems ESD 342 May 2, 2006 Page 1 Learning Objectives Appreciate the critical role of standards in architecting

More information

Social Network Theory and Applications

Social Network Theory and Applications Social Network Theory and Applications Leonid E. Zhukov School of Applied Mathematics and Information Science National Research University Higher School of Economics 13.01.2014 Leonid E. Zhukov (HSE) Lecture

More information

Transportation and The Small World

Transportation and The Small World Aaron Valente Transportation and The Small World Networks are the fabric that holds the very system of our lives together. From the bus we took to school as a child to the subway system we take to the

More information

Visualizations of personal social networks on Facebook and community structure: an exploratory study

Visualizations of personal social networks on Facebook and community structure: an exploratory study European Journal of Social Behaviour 2 (1): 21-30, 2015 ISSN 2408-0292 Visualizations of personal social networks on Facebook and community structure: an exploratory study Published online: 30 June 2015

More information

Lecture 13 Register Allocation: Coalescing

Lecture 13 Register Allocation: Coalescing Lecture 13 Register llocation: Coalescing I. Motivation II. Coalescing Overview III. lgorithms: Simple & Safe lgorithm riggs lgorithm George s lgorithm Phillip. Gibbons 15-745: Register Coalescing 1 Review:

More information

Gateways Placement in Backbone Wireless Mesh Networks

Gateways Placement in Backbone Wireless Mesh Networks I. J. Communications, Network and System Sciences, 2009, 1, 1-89 Published Online February 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Gateways Placement in Backbone Wireless Mesh Networks Abstract

More information

Network Layer (Routing)

Network Layer (Routing) Network Layer (Routing) Where we are in the ourse Moving on up to the Network Layer! Application Transport Network Link Physical SE 61 University of Washington Topics Network service models Datagrams (packets),

More information

CSC 396 : Introduction to Artificial Intelligence

CSC 396 : Introduction to Artificial Intelligence CSC 396 : Introduction to Artificial Intelligence Exam 1 March 11th - 13th, 2008 Name Signature - Honor Code This is a take-home exam. You may use your book and lecture notes from class. You many not use

More information

Privacy at the communication layer

Privacy at the communication layer Privacy at the communication layer The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability David Chaum 1988 CS-721 Carmela Troncoso http://carmelatroncoso.com/ (borrowed slides

More information

Meme Tracking. Abhilash Chowdhary CS-6604 Dec. 1, 2015

Meme Tracking. Abhilash Chowdhary CS-6604 Dec. 1, 2015 Meme Tracking Abhilash Chowdhary CS-6604 Dec. 1, 2015 Overview Introduction Information Spread Meme Tracking Part 1 : Rise and Fall Patterns of Information Diffusion: Model and Implications Part 2 : NIFTY:

More information

Checkpoint Questions Due Monday, October 7 at 2:15 PM Remaining Questions Due Friday, October 11 at 2:15 PM

Checkpoint Questions Due Monday, October 7 at 2:15 PM Remaining Questions Due Friday, October 11 at 2:15 PM CS13 Handout 8 Fall 13 October 4, 13 Problem Set This second problem set is all about induction and the sheer breadth of applications it entails. By the time you're done with this problem set, you will

More information

MITOCW R13. Breadth-First Search (BFS)

MITOCW R13. Breadth-First Search (BFS) MITOCW R13. Breadth-First Search (BFS) The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources

More information

Social network Analysis: small world phenomenon and decentralized search

Social network Analysis: small world phenomenon and decentralized search Social network Analysis: small world phenomenon and decentralized search Donglei Du Faculty of Business Administration, University of New Brunswick, NB Canada Fredericton E3B 9Y2 (ddu@unb.ca) Du (UNB)

More information

AIMA 3.5. Smarter Search. David Cline

AIMA 3.5. Smarter Search. David Cline AIMA 3.5 Smarter Search David Cline Uninformed search Depth-first Depth-limited Iterative deepening Breadth-first Bidirectional search None of these searches take into account how close you are to the

More information

Data Visualisation. Jingpeng Li. Data Visualisation

Data Visualisation. Jingpeng Li. Data Visualisation Data Visualisation Jingpeng Li 1 of 28 Data Visualisation Our eyes are very good at data mining We can spot patterns, trends and clusters instantly in plotted data Problems begin when data covers more

More information

Centaur: Locating Devices in an Office Environment

Centaur: Locating Devices in an Office Environment Centaur: Locating Devices in an Office Environment MobiCom 12 August 2012 IN4316 Seminar Wireless Sensor Networks Javier Hernando Bravo September 29 th, 2012 1 2 LOCALIZATION TECHNIQUES Based on Models

More information

Parallel Dynamic and Selective Community Detection in Massive Streaming Graphs

Parallel Dynamic and Selective Community Detection in Massive Streaming Graphs Parallel Dynamic and Selective Community Detection in Massive Streaming Graphs European Conference on Data Analysis 2013, Luxembourg July 11, 2013 Christian L. Staudt, Yassine Marrakchi, Aleksejs Sazonovs

More information

MRN -4 Frequency Reuse

MRN -4 Frequency Reuse Politecnico di Milano Facoltà di Ingegneria dell Informazione MRN -4 Frequency Reuse Mobile Radio Networks Prof. Antonio Capone Assignment of channels to cells o The multiple access technique in cellular

More information

A Little Graph Theory for the Busy Developer. Dr. Jim Webber Chief Scientist, Neo

A Little Graph Theory for the Busy Developer. Dr. Jim Webber Chief Scientist, Neo A Little Graph Theory for the Busy Developer Dr. Jim Webber Chief Scientist, Neo Technology @jimwebber Roadmap Imprisoned data Labeled Property Graph Model And some cultural similarities Graph theory South

More information

Section Marks Agents / 8. Search / 10. Games / 13. Logic / 15. Total / 46

Section Marks Agents / 8. Search / 10. Games / 13. Logic / 15. Total / 46 Name: CS 331 Midterm Spring 2017 You have 50 minutes to complete this midterm. You are only allowed to use your textbook, your notes, your assignments and solutions to those assignments during this midterm.

More information

A SIGNAL DRIVEN LARGE MOS-CAPACITOR CIRCUIT SIMULATOR

A SIGNAL DRIVEN LARGE MOS-CAPACITOR CIRCUIT SIMULATOR A SIGNAL DRIVEN LARGE MOS-CAPACITOR CIRCUIT SIMULATOR Janusz A. Starzyk and Ying-Wei Jan Electrical Engineering and Computer Science, Ohio University, Athens Ohio, 45701 A designated contact person Prof.

More information

0:00:00.919,0:00: this is. 0:00:05.630,0:00: common core state standards support video for mathematics

0:00:00.919,0:00: this is. 0:00:05.630,0:00: common core state standards support video for mathematics 0:00:00.919,0:00:05.630 this is 0:00:05.630,0:00:09.259 common core state standards support video for mathematics 0:00:09.259,0:00:11.019 standard five n f 0:00:11.019,0:00:13.349 four a this standard

More information

Analysis of Data Mining Methods for Social Media

Analysis of Data Mining Methods for Social Media 65 Analysis of Data Mining Methods for Social Media Keshav S Rawat Department of Computer Science & Informatics, Central university of Himachal Pradesh Dharamshala (Himachal Pradesh) Email:Keshav79699@gmail.com

More information

Lower Bounds for the Number of Bends in Three-Dimensional Orthogonal Graph Drawings

Lower Bounds for the Number of Bends in Three-Dimensional Orthogonal Graph Drawings ÂÓÙÖÒÐ Ó ÖÔ ÐÓÖØÑ Ò ÔÔÐØÓÒ ØØÔ»»ÛÛÛº ºÖÓÛÒºÙ»ÔÙÐØÓÒ»» vol.?, no.?, pp. 1 44 (????) Lower Bounds for the Number of Bends in Three-Dimensional Orthogonal Graph Drawings David R. Wood School of Computer Science

More information

Constructing K-Connected M-Dominating Sets

Constructing K-Connected M-Dominating Sets Constructing K-Connected M-Dominating Sets in Wireless Sensor Networks Yiwei Wu, Feng Wang, My T. Thai and Yingshu Li Georgia State University Arizona State University University of Florida Outline Introduction

More information

Lecture 20 November 13, 2014

Lecture 20 November 13, 2014 6.890: Algorithmic Lower Bounds: Fun With Hardness Proofs Fall 2014 Prof. Erik Demaine Lecture 20 November 13, 2014 Scribes: Chennah Heroor 1 Overview This lecture completes our lectures on game characterization.

More information

COMPONENTS: No token counts are meant to be limited. If you run out, find more.

COMPONENTS: No token counts are meant to be limited. If you run out, find more. Founders of Gloomhaven In the age after the Demon War, the continent enjoys a period of prosperity. Humans have made peace with the Valrath and Inox, and Quatryls and Orchids arrive from across the Misty

More information

COS 402 Machine Learning and Artificial Intelligence Fall Lecture 1: Intro

COS 402 Machine Learning and Artificial Intelligence Fall Lecture 1: Intro COS 402 Machine Learning and Artificial Intelligence Fall 2016 Lecture 1: Intro Sanjeev Arora Elad Hazan Today s Agenda Defining intelligence and AI state-of-the-art, goals Course outline AI by introspection

More information

SOFT 437. Software Performance Analysis. Software Execution Model. Chapter 4: Software Execution Model

SOFT 437. Software Performance Analysis. Software Execution Model. Chapter 4: Software Execution Model SOFT 437 Software Performance Analysis Chapter 4: Software Execution Model Software Execution Model Constructed early in the development process to ensure that the software architecture chosen can make

More information

Topology Control. Chapter 3. Ad Hoc and Sensor Networks. Roger Wattenhofer 3/1

Topology Control. Chapter 3. Ad Hoc and Sensor Networks. Roger Wattenhofer 3/1 Topology Control Chapter 3 Ad Hoc and Sensor Networks Roger Wattenhofer 3/1 Inventory Tracking (Cargo Tracking) Current tracking systems require lineof-sight to satellite. Count and locate containers Search

More information

Link State Routing. Stefano Vissicchio UCL Computer Science CS 3035/GZ01

Link State Routing. Stefano Vissicchio UCL Computer Science CS 3035/GZ01 Link State Routing Stefano Vissicchio UCL Computer Science CS 335/GZ Reminder: Intra-domain Routing Problem Shortest paths problem: What path between two vertices offers minimal sum of edge weights? Classic

More information

Constraint Satisfaction Problems: Formulation

Constraint Satisfaction Problems: Formulation Constraint Satisfaction Problems: Formulation Slides adapted from: 6.0 Tomas Lozano Perez and AIMA Stuart Russell & Peter Norvig Brian C. Williams 6.0- September 9 th, 00 Reading Assignments: Much of the

More information

Mining Heterogeneous Network

Mining Heterogeneous Network Mining Heterogeneous Network Clustering and Ranking Jiatu Shi Data Mining Lab@UESTC April 13, 2015 Jiatu Shi (Data Mining Lab@UESTC) Mining Heterogeneous Network April 13, 2015 1 / 23 Outline 1 Introduction

More information

Achieving Desirable Gameplay Objectives by Niched Evolution of Game Parameters

Achieving Desirable Gameplay Objectives by Niched Evolution of Game Parameters Achieving Desirable Gameplay Objectives by Niched Evolution of Game Parameters Scott Watson, Andrew Vardy, Wolfgang Banzhaf Department of Computer Science Memorial University of Newfoundland St John s.

More information

Discrete Fourier Transform (DFT)

Discrete Fourier Transform (DFT) Amplitude Amplitude Discrete Fourier Transform (DFT) DFT transforms the time domain signal samples to the frequency domain components. DFT Signal Spectrum Time Frequency DFT is often used to do frequency

More information

From Shared Memory to Message Passing

From Shared Memory to Message Passing From Shared Memory to Message Passing Stefan Schmid T-Labs / TU Berlin Some parts of the lecture, parts of the Skript and exercises will be based on the lectures of Prof. Roger Wattenhofer at ETH Zurich

More information

CS 4700: Artificial Intelligence

CS 4700: Artificial Intelligence CS 4700: Foundations of Artificial Intelligence Fall 2017 Instructor: Prof. Haym Hirsh Lecture 10 Today Adversarial search (R&N Ch 5) Tuesday, March 7 Knowledge Representation and Reasoning (R&N Ch 7)

More information

Comment: Social Network Theory (book published last year, Alan Dali, editor/sna in educational change) / Filipa has it

Comment: Social Network Theory (book published last year, Alan Dali, editor/sna in educational change) / Filipa has it SNA Workshop, Kassel, 25-29 June, 2012 DAY 1 15 th June, 2012 LITERATURE: SNA, Wasserman and Faust (1999) Bible of SNA, the math and formulas behind it - Duality of Groups (important paper, briger, 70s)

More information

EM-Simulation based Design of Coupled Resonator Bandpass Filters in MWO

EM-Simulation based Design of Coupled Resonator Bandpass Filters in MWO EM-Simulation based Design of Coupled Resonator Bandpass Filters in MWO 7. AWR User Workshop Prof. Dr. Sören Peik 14.10.2010 S. Peik () MWO Filter Design 14.10.2010 1 / 50 Outline Motivation Coupled Resonator

More information

Basic electronics Prof. T.S. Natarajan Department of Physics Indian Institute of Technology, Madras Lecture- 17. Frequency Analysis

Basic electronics Prof. T.S. Natarajan Department of Physics Indian Institute of Technology, Madras Lecture- 17. Frequency Analysis Basic electronics Prof. T.S. Natarajan Department of Physics Indian Institute of Technology, Madras Lecture- 17 Frequency Analysis Hello everybody! In our series of lectures on basic electronics learning

More information

Orthonormal bases and tilings of the time-frequency plane for music processing Juan M. Vuletich *

Orthonormal bases and tilings of the time-frequency plane for music processing Juan M. Vuletich * Orthonormal bases and tilings of the time-frequency plane for music processing Juan M. Vuletich * Dept. of Computer Science, University of Buenos Aires, Argentina ABSTRACT Conventional techniques for signal

More information

Geometry-Based Populated Chessboard Recognition

Geometry-Based Populated Chessboard Recognition Geometry-Based Populated Chessboard Recognition whoff@mines.edu Colorado School of Mines Golden, Colorado, USA William Hoff bill.hoff@daqri.com DAQRI Vienna, Austria My co-authors: Youye Xie, Gongguo Tang

More information

Detection of Compound Structures in Very High Spatial Resolution Images

Detection of Compound Structures in Very High Spatial Resolution Images Detection of Compound Structures in Very High Spatial Resolution Images Selim Aksoy Department of Computer Engineering Bilkent University Bilkent, 06800, Ankara, Turkey saksoy@cs.bilkent.edu.tr Joint work

More information

Stanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011

Stanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011 Stanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011 Lecture 9 In which we introduce the maximum flow problem. 1 Flows in Networks Today we start talking about the Maximum Flow

More information

Vehicle routing problems with road-network information

Vehicle routing problems with road-network information 50 Dominique Feillet Mines Saint-Etienne and LIMOS, CMP Georges Charpak, F-13541 Gardanne, France Vehicle routing problems with road-network information ORBEL - Liège, February 1, 2018 Vehicle Routing

More information

Privacy preserving data mining multiplicative perturbation techniques

Privacy preserving data mining multiplicative perturbation techniques Privacy preserving data mining multiplicative perturbation techniques Li Xiong CS573 Data Privacy and Anonymity Outline Review and critique of randomization approaches (additive noise) Multiplicative data

More information

On uniquely k-determined permutations

On uniquely k-determined permutations On uniquely k-determined permutations Sergey Avgustinovich and Sergey Kitaev 16th March 2007 Abstract Motivated by a new point of view to study occurrences of consecutive patterns in permutations, we introduce

More information

Localization in Wireless Sensor Networks

Localization in Wireless Sensor Networks Localization in Wireless Sensor Networks Part 2: Localization techniques Department of Informatics University of Oslo Cyber Physical Systems, 11.10.2011 Localization problem in WSN In a localization problem

More information

CS256 Applied Theory of Computation

CS256 Applied Theory of Computation CS256 Applied Theory of Computation Parallel Computation III John E Savage Overview Mapping normal algorithms to meshes Shuffle operations on linear arrays Shuffle operations on two-dimensional arrays

More information

Lecture 3 Digital image processing.

Lecture 3 Digital image processing. Lecture 3 Digital image processing. MI_L3 1 Analog image digital image 2D image matrix of pixels scanner reflection mode analog-to-digital converter (ADC) digital image MI_L3 2 The process of converting

More information

Documentation and Discussion

Documentation and Discussion 1 of 9 11/7/2007 1:21 AM ASSIGNMENT 2 SUBJECT CODE: CS 6300 SUBJECT: ARTIFICIAL INTELLIGENCE LEENA KORA EMAIL:leenak@cs.utah.edu Unid: u0527667 TEEKO GAME IMPLEMENTATION Documentation and Discussion 1.

More information

Romantic Partnerships and the Dispersion of Social Ties

Romantic Partnerships and the Dispersion of Social Ties Introduction Embeddedness and Evaluation Combining Features Romantic Partnerships and the of Social Ties Lars Backstrom Jon Kleinberg presented by Yehonatan Cohen 2014-11-12 Introduction Embeddedness and

More information

Modern Control System Theory and Design. Dr. Huang, Min Chemical Engineering Program Tongji University

Modern Control System Theory and Design. Dr. Huang, Min Chemical Engineering Program Tongji University Modern Control System Theory and Design Dr. Huang, Min Chemical Engineering Program Tongji University Syllabus Instructor: Dr. Huang, Min Time and Place to meet Office Hours: Text Book and References Modern

More information

Fast pseudo-semantic segmentation for joint region-based hierarchical and multiresolution representation

Fast pseudo-semantic segmentation for joint region-based hierarchical and multiresolution representation Author manuscript, published in "SPIE Electronic Imaging - Visual Communications and Image Processing, San Francisco : United States (2012)" Fast pseudo-semantic segmentation for joint region-based hierarchical

More information

Transportation Timetabling

Transportation Timetabling Outline DM87 SCHEDULING, TIMETABLING AND ROUTING 1. Sports Timetabling Lecture 16 Transportation Timetabling Marco Chiarandini 2. Transportation Timetabling Tanker Scheduling Air Transport Train Timetabling

More information

Ad Hoc and Neighborhood Search Methods for Placement of Mesh Routers in Wireless Mesh Networks

Ad Hoc and Neighborhood Search Methods for Placement of Mesh Routers in Wireless Mesh Networks 29 29th IEEE International Conference on Distributed Computing Systems Workshops Ad Hoc and Neighborhood Search Methods for Placement of Mesh Routers in Wireless Mesh Networks Fatos Xhafa Department of

More information

< AIIDE 2011, Oct. 14th, 2011 > Detecting Real Money Traders in MMORPG by Using Trading Network

< AIIDE 2011, Oct. 14th, 2011 > Detecting Real Money Traders in MMORPG by Using Trading Network < AIIDE 2011, Oct. 14th, 2011 > Detecting Real Money Traders in MMORPG by Using Trading Network Atsushi FUJITA Hiroshi ITSUKI Hitoshi MATSUBARA Future University Hakodate, JAPAN fujita@fun.ac.jp Focusing

More information

Ultra Wide Band Communications

Ultra Wide Band Communications Lecture #3 Title - October 2, 2018 Ultra Wide Band Communications Dr. Giuseppe Caso Prof. Maria-Gabriella Di Benedetto Lecture 3 Spectral characteristics of UWB radio signals Outline The Power Spectral

More information

Comparing the Quality of 2010 Census Proxy Responses with Administrative Records

Comparing the Quality of 2010 Census Proxy Responses with Administrative Records Comparing the Quality of 2010 Census Proxy Responses with Administrative Records Mary H. Mulry & Andrew Keller U.S. Census Bureau 2015 International Total Survey Error Conference September 22, 2015 Any

More information

Connect The Closest Dot Puzzles

Connect The Closest Dot Puzzles Connect The Closest Dot Puzzles Tim van Kapel June 23, 2014 Master s Thesis Utrecht University Marc van Kreveld Maarten Löffler Abstract In this thesis we present a new variation of the existing connect

More information

BAM (Bi-directional Associative Memory) Neural Network Simulator

BAM (Bi-directional Associative Memory) Neural Network Simulator BAM (Bi-directional Associative Memory) Neural Network Simulator J. Zlateva, G. Todorov Abstract: On Windows platform implemented BAM (Bi-directional Associative Memory) neural network simulator is presented.

More information

Use of Network Patent Analysis (NPA) for advanced analysis of patent data

Use of Network Patent Analysis (NPA) for advanced analysis of patent data Use of Network Patent Analysis (NPA) for advanced analysis of patent data Creating business advantage from patent insight Mike Lloyd, Doris Spielthenner, and George Mokdsi 5 th June 2012 1. Introduction

More information

Channel Allocation in based Mesh Networks

Channel Allocation in based Mesh Networks Channel Allocation in 802.11-based Mesh Networks Bhaskaran Raman Department of CSE, IIT Kanpur India 208016 http://www.cse.iitk.ac.in/users/braman/ Presentation at Infocom 2006 Barcelona, Spain Presentation

More information

Chained Permutations. Dylan Heuer. North Dakota State University. July 26, 2018

Chained Permutations. Dylan Heuer. North Dakota State University. July 26, 2018 Chained Permutations Dylan Heuer North Dakota State University July 26, 2018 Three person chessboard Three person chessboard Three person chessboard Three person chessboard - Rearranged Two new families

More information

Variables. Lecture 13 Sections Wed, Sep 16, Hampden-Sydney College. Displaying Distributions - Quantitative.

Variables. Lecture 13 Sections Wed, Sep 16, Hampden-Sydney College. Displaying Distributions - Quantitative. - - Lecture 13 Sections 4.4.1-4.4.3 Hampden-Sydney College Wed, Sep 16, 2009 Outline - 1 2 3 4 5 6 7 Even-numbered - Exercise 4.7, p. 226. According to the National Center for Health Statistics, in the

More information

Graph Application in The Strategy of Solving 2048 Tile Game

Graph Application in The Strategy of Solving 2048 Tile Game Graph Application in The Strategy of Solving 2048 Tile Game Harry Setiawan Hamjaya and 13516079 Program Studi Teknik Informatika Sekolah Teknik Elektro dan Informatika Institut Teknologi Bandung, Jl. Ganesha

More information

CS188 Spring 2010 Section 3: Game Trees

CS188 Spring 2010 Section 3: Game Trees CS188 Spring 2010 Section 3: Game Trees 1 Warm-Up: Column-Row You have a 3x3 matrix of values like the one below. In a somewhat boring game, player A first selects a row, and then player B selects a column.

More information

ECC419 IMAGE PROCESSING

ECC419 IMAGE PROCESSING ECC419 IMAGE PROCESSING INTRODUCTION Image Processing Image processing is a subclass of signal processing concerned specifically with pictures. Digital Image Processing, process digital images by means

More information

Rouse Matrix Systems Honeycomb Clip Art

Rouse Matrix Systems Honeycomb Clip Art Rouse Matrix Systems Honeycomb Clip Art bflg.fh.uk.4bnr - 0000706 - G. Rouse 2000 Get additional clip art, design ideas, project instructions, graph paper, and more from our web site http://rouseinternational.com/rms

More information

CS510 \ Lecture Ariel Stolerman

CS510 \ Lecture Ariel Stolerman CS510 \ Lecture04 2012-10-15 1 Ariel Stolerman Administration Assignment 2: just a programming assignment. Midterm: posted by next week (5), will cover: o Lectures o Readings A midterm review sheet will

More information

Routing Messages in a Network

Routing Messages in a Network Routing Messages in a Network Reference : J. Leung, T. Tam and G. Young, 'On-Line Routing of Real-Time Messages,' Journal of Parallel and Distributed Computing, 34, pp. 211-217, 1996. J. Leung, T. Tam,

More information

How good is simple reversal sort? Cycle decompositions. Cycle decompositions. Estimating reversal distance by cycle decomposition

How good is simple reversal sort? Cycle decompositions. Cycle decompositions. Estimating reversal distance by cycle decomposition How good is simple reversal sort? p Not so good actually p It has to do at most n-1 reversals with permutation of length n p The algorithm can return a distance that is as large as (n 1)/2 times the correct

More information

Simple Search Algorithms

Simple Search Algorithms Lecture 3 of Artificial Intelligence Simple Search Algorithms AI Lec03/1 Topics of this lecture Random search Search with closed list Search with open list Depth-first and breadth-first search again Uniform-cost

More information

Distance-Vector Routing

Distance-Vector Routing Distance-Vector Routing Antonio Carzaniga Faculty of Informatics University of Lugano June 8, 2007 c 2005 2007 Antonio Carzaniga 1 Recap on link-state routing Distance-vector routing Bellman-Ford equation

More information

Problem 1 (15 points: Graded by Shahin) Recall the network structure of our in-class trading experiment shown in Figure 1

Problem 1 (15 points: Graded by Shahin) Recall the network structure of our in-class trading experiment shown in Figure 1 Solutions for Homework 2 Networked Life, Fall 204 Prof Michael Kearns Due as hardcopy at the start of class, Tuesday December 9 Problem (5 points: Graded by Shahin) Recall the network structure of our

More information

Unit 12: Artificial Intelligence CS 101, Fall 2018

Unit 12: Artificial Intelligence CS 101, Fall 2018 Unit 12: Artificial Intelligence CS 101, Fall 2018 Learning Objectives After completing this unit, you should be able to: Explain the difference between procedural and declarative knowledge. Describe the

More information

Last Lecture. photomatix.com

Last Lecture. photomatix.com Last Lecture photomatix.com Today Image Processing: from basic concepts to latest techniques Filtering Edge detection Re-sampling and aliasing Image Pyramids (Gaussian and Laplacian) Removing handshake

More information

Workshop Matlab/Simulink in Drives and Power electronics Lecture 4

Workshop Matlab/Simulink in Drives and Power electronics Lecture 4 Workshop Matlab/Simulink in Drives and Power electronics Lecture 4 : DC-Motor Chopper design SimPowerSystems Ghislain REMY Jean DEPREZ 1 / 20 Workshop Program 8 lectures will be presented based on Matlab/Simulink

More information

Trip Assignment. Lecture Notes in Transportation Systems Engineering. Prof. Tom V. Mathew. 1 Overview 1. 2 Link cost function 2

Trip Assignment. Lecture Notes in Transportation Systems Engineering. Prof. Tom V. Mathew. 1 Overview 1. 2 Link cost function 2 Trip Assignment Lecture Notes in Transportation Systems Engineering Prof. Tom V. Mathew Contents 1 Overview 1 2 Link cost function 2 3 All-or-nothing assignment 3 4 User equilibrium assignment (UE) 3 5

More information

Midterm Examination CS 534: Computational Photography

Midterm Examination CS 534: Computational Photography Midterm Examination CS 534: Computational Photography November 3, 2015 NAME: SOLUTIONS Problem Score Max Score 1 8 2 8 3 9 4 4 5 3 6 4 7 6 8 13 9 7 10 4 11 7 12 10 13 9 14 8 Total 100 1 1. [8] What are

More information

Designing Information Devices and Systems I Spring 2019 Lecture Notes Note Introduction to Electrical Circuit Analysis

Designing Information Devices and Systems I Spring 2019 Lecture Notes Note Introduction to Electrical Circuit Analysis EECS 16A Designing Information Devices and Systems I Spring 2019 Lecture Notes Note 11 11.1 Introduction to Electrical Circuit Analysis Our ultimate goal is to design systems that solve people s problems.

More information

Interactive Design/Decision Making in a Virtual Urban World: Visual Simulation and GIS

Interactive Design/Decision Making in a Virtual Urban World: Visual Simulation and GIS Robin Liggett, Scott Friedman, and William Jepson Interactive Design/Decision Making in a Virtual Urban World: Visual Simulation and GIS Researchers at UCLA have developed an Urban Simulator which links

More information

Algorithms for Bioinformatics

Algorithms for Bioinformatics Adapted from slides by Alexandru Tomescu, Leena Salmela, Veli Mäkinen, Esa Pitkänen 582670 Algorithms for Bioinformatics Lecture 3: Greedy Algorithms and Genomic Rearrangements 11.9.2014 Background We

More information

Unit 5: Graphs. Input. Output. Cartesian Coordinate System. Ordered Pair

Unit 5: Graphs. Input. Output. Cartesian Coordinate System. Ordered Pair Section 5.1: The Cartesian plane Section 5.2: Working with Scale in the Cartesian Plane Section 5.3: Characteristics of Graphs Section 5.4: Interpreting Graphs Section 5.5: Constructing good graphs from

More information

On uniquely k-determined permutations

On uniquely k-determined permutations Discrete Mathematics 308 (2008) 1500 1507 www.elsevier.com/locate/disc On uniquely k-determined permutations Sergey Avgustinovich a, Sergey Kitaev b a Sobolev Institute of Mathematics, Acad. Koptyug prospect

More information

CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University

CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University http://cs224w.stanford.edu 10/22/2014 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, http://cs224w.stanford.edu

More information

Chapter 3 Chip Planning

Chapter 3 Chip Planning Chapter 3 Chip Planning 3.1 Introduction to Floorplanning 3. Optimization Goals in Floorplanning 3.3 Terminology 3.4 Floorplan Representations 3.4.1 Floorplan to a Constraint-Graph Pair 3.4. Floorplan

More information

Local Image Segmentation Process for Salt-and- Pepper Noise Reduction by using Median Filters

Local Image Segmentation Process for Salt-and- Pepper Noise Reduction by using Median Filters Local Image Segmentation Process for Salt-and- Pepper Noise Reduction by using Median Filters 1 Ankit Kandpal, 2 Vishal Ramola, 1 M.Tech. Student (final year), 2 Assist. Prof. 1-2 VLSI Design Department

More information

Parallel De-Noising of Biological Signals Emily Sosin. May 19, 2008

Parallel De-Noising of Biological Signals Emily Sosin. May 19, 2008 Parallel De-Noising of Biological Signals Emily Sosin Final Paper for ENEE499 May 19, 2008 Introduction Currently, Dr. Jonathan Simon is involved in research on how the human auditory cortex processes

More information

Speech Coding in the Frequency Domain

Speech Coding in the Frequency Domain Speech Coding in the Frequency Domain Speech Processing Advanced Topics Tom Bäckström Aalto University October 215 Introduction The speech production model can be used to efficiently encode speech signals.

More information

CS188 Spring 2014 Section 3: Games

CS188 Spring 2014 Section 3: Games CS188 Spring 2014 Section 3: Games 1 Nearly Zero Sum Games The standard Minimax algorithm calculates worst-case values in a zero-sum two player game, i.e. a game in which for all terminal states s, the

More information

OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP

OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP Agenda OSPF Principles Introduction The Dijkstra Algorithm Communication Procedures LSA Broadcast Handling Splitted Area

More information