Recap from previous lecture. Information Retrieval. Topics for Today. Recall: Basic structure of an Inverted index. Dictionaries & Tolerant Retrieval

Size: px
Start display at page:

Download "Recap from previous lecture. Information Retrieval. Topics for Today. Recall: Basic structure of an Inverted index. Dictionaries & Tolerant Retrieval"

Transcription

1 Recap from previous lecture nformation Retrieval Dictionaries & Tolerant Retrieval Jörg Tiedemann Department of Linguistics and Philology Uppsala University nverted indexes dictionary & postings type/token distinction terms = normalized types put in the dictionary Boolean Model return exact matches for Boolean queries Jörg Tiedemann 1/1 Jörg Tiedemann 2/1 Topics for Today Recall: Basic structure of an nverted index Continue with the basics (inverted indexes) 1. Phrase queries 2. Dictionary data structures 3. Tolerant retrieval wild-card queries spelling correction For each term t, we store a list of all documents that contain t. BRUTUS! CAESAR! CALPURNA! {z } {z } dictionary postings Jörg Tiedemann 3/1 Jörg Tiedemann 4/1

2 Phrase queries Query: stanford university as a phrase (10% of web queries = phrase queries) dea one: Biword index! index every word bigram longer phrases: stanford university palo alto : Problems? 1. STANFORD UNVERSTY AND UNVERSTY PALO AND PALO ALTO 2. post-filtering of all hits Phrase queries dea two: Positional indexes! (store positions in posting list) Example query: to 1 be 2 or 3 not 4 to 5 be 6 TO, : h 1: h 7, 18, 33, 72, 86, 231i; 2: h1, 17, 74, 222, 255i; 4: h 8, 16, 190, 429, 433i; 5: h363, 367i; 7: h13, 23, 191i;...i BE, : h 1: h 17, 25i; 4: h 17, 191, 291, 430, 434i; 5: h14, 19, 101i;...i Document 4 is a match! Jörg Tiedemann 5/1 Jörg Tiedemann 6/1 Proximity search Data Structures for Dictionaries For each term t, we store a list of all documents that contain t. Second advantage of positional indexes: Can also use them for proximity search. For example: employment /4 place Find all documents that contain EMPLOYMENT and PLACE within 4 words of each other. BRUTUS! CAESAR! CALPURNA! {z } {z } dictionary postings Jörg Tiedemann 7/1 Jörg Tiedemann 8/1

3 Naive Dictionary: array of fixed-width entries Dictionary Data structures term document pointer to frequency postings list a 656,265! aachen 65! zulu 221! space needed: 20 bytes 4 bytes 4 bytes Two main classes of data structures: hashes and trees Criteria for when to use hashes vs. trees: s there a fixed number of terms or will it keep growing? What are the relative frequencies with which various keys will be accessed? How many terms are we likely to have? How do we store a dictionary in memory efficiently? How do we look up an element in this array at query time? Jörg Tiedemann 9/1 Jörg Tiedemann 10/1 Hashes Trees: Binary tree Each vocabulary term is hashed into an integer. Try to avoid collisions At query time, do the following: hash query term, resolve collisions, locate entry in fixed-width array Pros: Lookup is fast (faster than in a search tree) Lookup time is constant Cons no way to find minor variants (resume vs. résumé) no prefix search (all terms starting with automat) need to rehash everything periodically if vocabulary keeps growing Jörg Tiedemann 11/1 Jörg Tiedemann 12/1

4 Trees: Binary tree Trees: B-tree simplest tree structure efficient for searching Pros: solves the prefix problem (terms starting with automat) Cons: slower: O(log M) in balanced trees (M is the size of the vocabulary) re-balancing binary trees is expensive! Alternative: B-tree B-tree definition: every internal node has a number of children in the interval [a, b] where a, b are appropriate positive integers, e.g., [2, 4]. Jörg Tiedemann 13/1 Jörg Tiedemann 14/1 Trees: B-tree Tolerant Retrieval What s the difference? slightly more complex still efficient for searching same features as binary trees (prefix search!) need for re-balancing is less frequent! Wildcard queries Spelling correction Jörg Tiedemann 15/1 Jörg Tiedemann 16/1

5 Tolerant Retrieval: Wildcard queries How to handle * in the middle of a term Prefix queries: mon*: find all docs containing any term beginning with mon Easy with B-tree dictionary: retrieve all terms t in the range: mon apple t < moo Suffix Queries: *mon: find all docs containing any term ending with mon Maintain an additional tree for terms backwards Then retrieve all terms t in the range: nom apple t < non Example: pro*cent We could look up pro* and *cent in the B-tree and intersect the two term sets. Expensive! Alternative: permuterm index! How can we find all terms matching pro*cent? Jörg Tiedemann 17/1 Jörg Tiedemann 18/1 Permuterm index Permuterm index Rotate wildcard query, so that the * occurs at the end. introduce special symbol $ to indicate end of string! pro*cent becomes cent$pro* Add all rotations to B-tree: HELLO! hello$, ello$h, llo$he, lo$hel o$hell How does this help when matching queries with the index? Jörg Tiedemann 19/1 Jörg Tiedemann 20/1

6 Permuterm index & term mapping Processing a lookup in the permuterm index all rotated entries map to the same string... For X, look up X$ For X*, look up X* For *X, look up X$* For *X*, look up X* For X*Y, look up Y$X* Example: For hel*o, look up o$hel* To sum up: Rotate query wildcard to the right Use B-tree lookup as before What is the problem with this structure? Permuterm more than quadruples the size of the dictionary compared to a regular B-tree. (empirical observation for English) Jörg Tiedemann 21/1 Jörg Tiedemann 22/1 Alternative: Bigram (k-gram) indexes Postings list in a 3-gram inverted index Enumerate all k-grams (sequence of k characters) occurring in a term! more space-efficient than permuterm index Example: from April is the cruelest month we get the 2-grams (bigrams): $a ap pr ri il l$ $i is s$ $t th he e$ $c cr ru ue el le es st t$ $m mo on nt h$ $ is a special word boundary symbol, as before. Maintain a second inverted index from bigrams to the dictionary terms that contain the bigram... etr - BEETROOT - METRC - PETRFY - RETREVAL retrieve all postings of matching k-grams intersect all lists as usual Jörg Tiedemann 23/1 Jörg Tiedemann 24/1

7 Processing wildcarded terms in a bigram index Query mon* can now be run as: $m AND mo AND on Gets us all terms with the prefix mon, but also many false positives like MOON.! Must post-filter these terms against query. Surviving terms are then looked up in the term-document inverted index.! k-gram are still fast and more space efficient than permuterm indexes. Processing wildcard queries As before, we must potentially execute a large number of Boolean queries Most straightforward semantics: Conjunction of disjunctions Recall the query: gen* AND universit* (geneva AND university) OR (geneva AND université) OR (genève AND university) OR (genève AND université) OR (general AND universities) OR...! Very expensive!! Requires query optimization! Do we need to support wildcard queries? Users are lazy! f wildcards are allowed! Users will love it (?) Does Google allow wildcard queries? (And other engines?) Jörg Tiedemann 25/1 Jörg Tiedemann 26/1 Tolerant Retrieval: Spälling Korrection Correcting documents Two general uses of spelling correction: Correcting documents being indexed Correcting user queries (more common) Two different methods: solated word spelling correction Check each word on its own for misspelling Will not catch typos resulting in correctly spelled words, e.g., an asteroid that fell form the sky Context-sensitive spelling correction Look at surrounding words Can correct form/from error above primarily for OCR ed documents tuned for OCR mistakes (trained classifiers) may use domain-specific knowledge confusion between O and D etc... but also: correct typos in web pages and low quality documents! fewer misspellings in our dictionary and better matching general R philosophy: don t change the documents Jörg Tiedemann 27/1 Jörg Tiedemann 28/1

8 Correcting queries solated word correction more common in R than document correction typos in queries are common people are in a hurry users often look for things they don t know much about example: al quajda strategies: (also) retrieve documents with the correct spelling return alternative query suggestions ( Did you mean...? ) Premise 1: There is a list of correct words from which the correct spellings come. Premise 2: We have a way of computing the distance between a misspelled word and a correct word. Simple spelling correction algorithm: return the correct word that has the smallest distance to the misspelled word. Example: informaton! information Jörg Tiedemann 29/1 Jörg Tiedemann 30/1 solated word correction solated word correction Two choices: use a standard lexicon Webster s, OED etc.... industry-specific dictionary (for domain-specific R) advantage: correct entries only! vocabulary of the inverted index all words in the collection! better coverage but: include all misspellings! compute weights for all terms (based on frequencies) Task: Return lexicon entry that is closest to a given character sequence Q What is closest? Several alternatives: 1. Edit distance and Levenshtein distance 2. Weighted edit distance 3. k-gram overlap Jörg Tiedemann 31/1 Jörg Tiedemann 32/1

9 Edit distance Levenshtein distance: Computation The edit distance between string s 1 and string s 2 is the minimum number of basic operations that convert s 1 to s 2. Levenshtein distance: basic operations = insert, delete, and replace Levenshtein distance dog-do: 1 Levenshtein distance cat-cart: 1 Levenshtein distance cat-cut: 1 Levenshtein distance cat-act: 2 Damerau-Levenshtein: additional operation = transpose Damerau-Levenshtein distance cat-act: 1 Recursive definition & dynamic programming: start with upper-left table cell fill table with edit costs f a s t c a t s Jörg Tiedemann 33/1 Jörg Tiedemann 34/1 Levenshtein distance: algorithm LEVENSHTENDSTANCE(s 1, s 2 ) 1 for i 0 to s 1 2 do m[i, 0] =i 3 for j 0 to s 2 4 do m[0, j] =j 5 for i 1 to s 1 6 do for j 1 to s 2 7 do if s 1 [i] =s 2 [j] 8 then m[i, j] =min{m[i 1, j]+1, m[i, j 1]+1, m[i 1, j 1]} 9 else m[i, j] =min{m[i 1, j]+1, m[i, j 1]+1, m[i 1, j 1]+1} 10 return m[ s 1, s 2 ] Operations: insert, delete, replace, copy Levenshtein distance: algorithm LEVENSHTENDSTANCE(s 1, s 2 ) 1 for i 0 to s 1 2 do m[i, 0] =i 3 for j 0 to s 2 4 do m[0, j] =j 5 for i 1 to s 1 6 do for j 1 to s 2 7 do if s 1 [i] =s 2 [j] 8 then m[i, j] =min{m[i 1, j]+1, m[i, j 1]+1, m[i 1, j 1]} 9 else m[i, j] =min{m[i 1, j]+1, m[i, j 1]+1, m[i 1, j 1]+1} 10 return m[ s 1, s 2 ] Operations: insert, delete, replace, copy Jörg Tiedemann 35/1 Jörg Tiedemann 36/1

10 Levenshtein distance: algorithm LEVENSHTENDSTANCE(s 1, s 2 ) 1 for i 0 to s 1 2 do m[i, 0] =i 3 for j 0 to s 2 4 do m[0, j] =j 5 for i 1 to s 1 6 do for j 1 to s 2 7 do if s 1 [i] =s 2 [j] 8 then m[i, j] =min{m[i 1, j]+1, m[i, j 1]+1, m[i 1, j 1]} 9 else m[i, j] =min{m[i 1, j]+1, m[i, j 1]+1, m[i 1, j 1]+1} 10 return m[ s 1, s 2 ] Operations: insert, delete, replace, copy Levenshtein distance: algorithm LEVENSHTENDSTANCE(s 1, s 2 ) 1 for i 0 to s 1 2 do m[i, 0] =i 3 for j 0 to s 2 4 do m[0, j] =j 5 for i 1 to s 1 6 do for j 1 to s 2 7 do if s 1 [i] =s 2 [j] 8 then m[i, j] =min{m[i 1, j]+1, m[i, j 1]+1, m[i 1, j 1]} 9 else m[i, j] =min{m[i 1, j]+1, m[i, j 1]+1, m[i 1, j 1]+1} 10 return m[ s 1, s 2 ] Operations: insert, delete, replace, copy Jörg Tiedemann 37/1 Jörg Tiedemann 38/1 Levenshtein distance: algorithm Each cell of Levenshtein matrix LEVENSHTENDSTANCE(s 1, s 2 ) 1 for i 0 to s 1 2 do m[i, 0] =i 3 for j 0 to s 2 4 do m[0, j] =j 5 for i 1 to s 1 6 do for j 1 to s 2 7 do if s 1 [i] =s 2 [j] 8 then m[i, j] =min{m[i 1, j]+1, m[i, j 1]+1, m[i 1, j 1]} 9 else m[i, j] =min{m[i 1, j]+1, m[i, j 1]+1, m[i 1, j 1]+1} 10 return m[ s 1, s 2 ] Operations: insert, delete, replace, copy cost of getting here from my upper left neighbor (copy or replace) cost of getting here from my left neighbor (insert) cost of getting here from my upper neighbor (delete) the minimum of the three possible moves ; the cheapest way of getting here Jörg Tiedemann 39/1 Jörg Tiedemann 40/1

11 Levenshtein distance: Example Weighted edit distance c a t s f a s t As above, but weight of an operation depends on the characters involved. Meant to capture keyboard errors, e.g., m more likely to be mistyped as n than as q. Therefore, replacing m by n is a smaller edit distance than by q. We now require a weight matrix as input. Modify dynamic programming to handle weights. Jörg Tiedemann 41/1 Jörg Tiedemann 42/1 Using edit distance Using edit distance given a query: get all sequences within a fixed edit distance intersect this list with the list of correct words return spelling suggestions Alternatively: use all corrections to retrieve doc s! slow! (and accepted by user?) use single best correction for retrieval Problems: lot s of possible strings even with few edit operations intersection with dictionary is slow Possible solution: use N-gram overlap can replace edit distance for spelling correction Jörg Tiedemann 43/1 Jörg Tiedemann 44/1

12 k-gram indexes for spelling correction Get all k-grams in the query term Use the k-gram index to retrieve correct words that match query term k-grams (recall wildcard search) Threshold by number of matching k-grams (e.g., only terms that differ by at most 3 k-grams) or use Jaccard coefficient > threshold Example: Jaccard(A, B) = A \ B A [ B Bigram index, misspelled word bordroom Bigrams: bo, or, rd, dr, ro, oo, om k-gram indexes for spelling correction: bordroom... BO - aboard - about -boardroom - border OR - border - lord - morbid - sordid RD - aboard - ardent -boardroom - border! boardroom exists in 6 out of 7 lists! Jaccard = 6/( ) =6/ Jörg Tiedemann 45/1 Jörg Tiedemann 46/1 Context-sensitive spelling correction Context-sensitive spelling correction Another approach: Hit-based spelling correction One approach: break phrase query into conjunction of biwords look for biwords that need only one term corrected get phrase matches and rank them... Example: flew form munich Try all phrases with possible corrections: Try query flea form munich Try query flew from munich Try query flew form munch The correct query flew from munich has most hits. Many alternatives!! Not very efficient! try to correct only if few hits returned tweaking with query logs and expected hits Jörg Tiedemann 47/1 Jörg Tiedemann 48/1

13 To sum up Using a positional inverted index with skip pointers efficient dictionary storage wild-card index spelling correction Soundex: Find phonetic alternatives We can quickly run a query like (SPELL(moriset) /3 tor*to) OR SOUNDEX(chaikofski) Jörg Tiedemann 49/1

Recap from previous lectures. Information Retrieval. Recap from previous lectures. Topics for Today. Dictionaries & Tolerant Retrieval.

Recap from previous lectures. Information Retrieval. Recap from previous lectures. Topics for Today. Dictionaries & Tolerant Retrieval. Recap from previous lectures nformation Retrieval Dictionaries & Tolerant Retrieval Jörg Tiedemann jorg.tiedemann@lingfil.uu.se Department of Linguistics and Philology Uppsala University nverted indexes

More information

Midterm for Name: Good luck! Midterm page 1 of 9

Midterm for Name: Good luck! Midterm page 1 of 9 Midterm for 6.864 Name: 40 30 30 30 Good luck! 6.864 Midterm page 1 of 9 Part #1 10% We define a PCFG where the non-terminals are {S, NP, V P, V t, NN, P P, IN}, the terminal symbols are {Mary,ran,home,with,John},

More information

HUFFMAN CODING. Catherine Bénéteau and Patrick J. Van Fleet. SACNAS 2009 Mini Course. University of South Florida and University of St.

HUFFMAN CODING. Catherine Bénéteau and Patrick J. Van Fleet. SACNAS 2009 Mini Course. University of South Florida and University of St. Catherine Bénéteau and Patrick J. Van Fleet University of South Florida and University of St. Thomas SACNAS 2009 Mini Course WEDNESDAY, 14 OCTOBER, 2009 (1:40-3:00) LECTURE 2 SACNAS 2009 1 / 10 All lecture

More information

Lectures: Feb 27 + Mar 1 + Mar 3, 2017

Lectures: Feb 27 + Mar 1 + Mar 3, 2017 CS420+500: Advanced Algorithm Design and Analysis Lectures: Feb 27 + Mar 1 + Mar 3, 2017 Prof. Will Evans Scribe: Adrian She In this lecture we: Summarized how linear programs can be used to model zero-sum

More information

Design of Parallel Algorithms. Communication Algorithms

Design of Parallel Algorithms. Communication Algorithms + Design of Parallel Algorithms Communication Algorithms + Topic Overview n One-to-All Broadcast and All-to-One Reduction n All-to-All Broadcast and Reduction n All-Reduce and Prefix-Sum Operations n Scatter

More information

Similarity & Link Analysis. Stony Brook University CSE545, Fall 2016

Similarity & Link Analysis. Stony Brook University CSE545, Fall 2016 Similarity & Link nalysis Stony rook University SE545, Fall 6 Finding Similar Items? (http://blog.soton.ac.uk/hive//5//r ecommendation-system-of-hive/) (http://www.datacommunitydc.org/blog/ 3/8/entity-resolution-for-big-data)

More information

Lecture5: Lossless Compression Techniques

Lecture5: Lossless Compression Techniques Fixed to fixed mapping: we encoded source symbols of fixed length into fixed length code sequences Fixed to variable mapping: we encoded source symbols of fixed length into variable length code sequences

More information

Self-Adjusting Binary Search Trees. Andrei Pârvu

Self-Adjusting Binary Search Trees. Andrei Pârvu Self-Adjusting Binary Search Trees Andrei Pârvu Andrei Pârvu 13-05-2015 1 Motivation Andrei Pârvu 13-05-2015 2 Motivation: Find Andrei Pârvu 13-05-2015 3 Motivation: Insert Andrei Pârvu 13-05-2015 4 Motivation:

More information

MITOCW watch?v=krzi60lkpek

MITOCW watch?v=krzi60lkpek MITOCW watch?v=krzi60lkpek The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free. To

More information

Coding for Efficiency

Coding for Efficiency Let s suppose that, over some channel, we want to transmit text containing only 4 symbols, a, b, c, and d. Further, let s suppose they have a probability of occurrence in any block of text we send as follows

More information

ProCo 2017 Advanced Division Round 1

ProCo 2017 Advanced Division Round 1 ProCo 2017 Advanced Division Round 1 Problem A. Traveling file: 256 megabytes Moana wants to travel from Motunui to Lalotai. To do this she has to cross a narrow channel filled with rocks. The channel

More information

Philadelphia Classic 2013 Hosted by the Dining Philosophers University of Pennsylvania

Philadelphia Classic 2013 Hosted by the Dining Philosophers University of Pennsylvania Philadelphia Classic 2013 Hosted by the Dining Philosophers University of Pennsylvania Basic rules: 4 hours, 9 problems, 1 computer per team You can only use the internet for accessing the Javadocs, and

More information

Permutation Editing and Matching via Embeddings

Permutation Editing and Matching via Embeddings Permutation Editing and Matching via Embeddings Graham Cormode, S. Muthukrishnan, Cenk Sahinalp (grahamc@dcs.warwick.ac.uk) Permutation Editing and Matching Why study permutations? Distances between permutations

More information

11/13/18. Introduction to RNNs for NLP. About Me. Overview SHANG GAO

11/13/18. Introduction to RNNs for NLP. About Me. Overview SHANG GAO Introduction to RNNs for NLP SHANG GAO About Me PhD student in the Data Science and Engineering program Took Deep Learning last year Work in the Biomedical Sciences, Engineering, and Computing group at

More information

The revolution of the empiricists. Machine Translation. Motivation for Data-Driven MT. Machine Translation as Search

The revolution of the empiricists. Machine Translation. Motivation for Data-Driven MT. Machine Translation as Search The revolution of the empiricists Machine Translation Word alignment & Statistical MT Jörg Tiedemann jorg.tiedemann@lingfil.uu.se Department of Linguistics and Philology Uppsala University Classical approaches

More information

LECTURE VI: LOSSLESS COMPRESSION ALGORITHMS DR. OUIEM BCHIR

LECTURE VI: LOSSLESS COMPRESSION ALGORITHMS DR. OUIEM BCHIR 1 LECTURE VI: LOSSLESS COMPRESSION ALGORITHMS DR. OUIEM BCHIR 2 STORAGE SPACE Uncompressed graphics, audio, and video data require substantial storage capacity. Storing uncompressed video is not possible

More information

MITOCW R9. Rolling Hashes, Amortized Analysis

MITOCW R9. Rolling Hashes, Amortized Analysis MITOCW R9. Rolling Hashes, Amortized Analysis The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources

More information

Lecture 20: Combinatorial Search (1997) Steven Skiena. skiena

Lecture 20: Combinatorial Search (1997) Steven Skiena.   skiena Lecture 20: Combinatorial Search (1997) Steven Skiena Department of Computer Science State University of New York Stony Brook, NY 11794 4400 http://www.cs.sunysb.edu/ skiena Give an O(n lg k)-time algorithm

More information

Developing an Artificial Intelligence to Play the Board Game Scrabble

Developing an Artificial Intelligence to Play the Board Game Scrabble UNIVERSITY COLLEGE DUBLIN TRINITY COLLEGE DISSERTATION MAI IN ELECTRONIC & COMPUTER ENGINEERING Developing an Artificial Intelligence to Play the Board Game Scrabble Author: Carl O CONNOR Supervisor: Dr.

More information

Combined Permutation Codes for Synchronization

Combined Permutation Codes for Synchronization ISITA2012, Honolulu, Hawaii, USA, October 28-31, 2012 Combined Permutation Codes for Synchronization R. Heymann, H. C. Ferreira, T. G. Swart Department of Electrical and Electronic Engineering Science

More information

(Lec19) Geometric Data Structures for Layouts

(Lec19) Geometric Data Structures for Layouts Page 1 (Lec19) Geometric Data Structures for Layouts What you know Some basic ASIC placement (by annealing) Some basic ASIC routing (global versus detailed, area routing by costbased maze routing) Some

More information

Variant Calling. Michael Schatz. Feb 20, 2018 Lecture 7: Applied Comparative Genomics

Variant Calling. Michael Schatz. Feb 20, 2018 Lecture 7: Applied Comparative Genomics Variant Calling Michael Schatz Feb 20, 2018 Lecture 7: Applied Comparative Genomics Mission Impossible 1. Setup VirtualBox 2. Initialize Tools 3. Download Reference Genome & Reads 4. Decode the secret

More information

Information Retrieval and Text Mining

Information Retrieval and Text Mining Information Retrieval and Text Mining http://informationretrieval.org IIR 2: The term vocabulary and postings lists Hinrich Schütze & Wiltrud Kessler Institute for Natural Language Processing, University

More information

GENERALIZATION: RANK ORDER FILTERS

GENERALIZATION: RANK ORDER FILTERS GENERALIZATION: RANK ORDER FILTERS Definition For simplicity and implementation efficiency, we consider only brick (rectangular: wf x hf) filters. A brick rank order filter evaluates, for every pixel in

More information

Final Practice Problems: Dynamic Programming and Max Flow Problems (I) Dynamic Programming Practice Problems

Final Practice Problems: Dynamic Programming and Max Flow Problems (I) Dynamic Programming Practice Problems Final Practice Problems: Dynamic Programming and Max Flow Problems (I) Dynamic Programming Practice Problems To prepare for the final first of all study carefully all examples of Dynamic Programming which

More information

Log-linear models (part 1I)

Log-linear models (part 1I) Log-linear models (part 1I) Lecture, Feb 2 CS 690N, Spring 2017 Advanced Natural Language Processing http://people.cs.umass.edu/~brenocon/anlp2017/ Brendan O Connor College of Information and Computer

More information

Binary Search Tree (Part 2 The AVL-tree)

Binary Search Tree (Part 2 The AVL-tree) Yufei Tao ITEE University of Queensland We ave already learned a static version of te BST. In tis lecture, we will make te structure dynamic, namely, allowing it to support updates (i.e., insertions and

More information

Combining Large Datasets of Patents and Trademarks

Combining Large Datasets of Patents and Trademarks Combining Large Datasets of Patents and Trademarks Grid Thoma Computer Science Division, School of Science & Technology University of Camerino 14 th Italian STATA User Annual Meeting Florence, 16 Nov 2017

More information

Real Time Word to Picture Translation for Chinese Restaurant Menus

Real Time Word to Picture Translation for Chinese Restaurant Menus Real Time Word to Picture Translation for Chinese Restaurant Menus Michelle Jin, Ling Xiao Wang, Boyang Zhang Email: mzjin12, lx2wang, boyangz @stanford.edu EE268 Project Report, Spring 2014 Abstract--We

More information

SONG RETRIEVAL SYSTEM USING HIDDEN MARKOV MODELS

SONG RETRIEVAL SYSTEM USING HIDDEN MARKOV MODELS SONG RETRIEVAL SYSTEM USING HIDDEN MARKOV MODELS AKSHAY CHANDRASHEKARAN ANOOP RAMAKRISHNA akshayc@cmu.edu anoopr@andrew.cmu.edu ABHISHEK JAIN GE YANG ajain2@andrew.cmu.edu younger@cmu.edu NIDHI KOHLI R

More information

A method and a tool for geocoding and record linkage

A method and a tool for geocoding and record linkage WORKING PAPERS A method and a tool for geocoding and record linkage Omar CHARIF 1 Hichem OMRANI 1 Olivier KLEIN 1 Marc SCHNEIDER 1 Philippe TRIGANO 2 CEPS/INSTEAD, Luxembourg 1 Heudiasyc Laboratory, Technology

More information

Digital Image Processing Lec.(3) 4 th class

Digital Image Processing Lec.(3) 4 th class Digital Image Processing Lec.(3) 4 th class Image Types The image types we will consider are: 1. Binary Images Binary images are the simplest type of images and can take on two values, typically black

More information

CSS 343 Data Structures, Algorithms, and Discrete Math II. Balanced Search Trees. Yusuf Pisan

CSS 343 Data Structures, Algorithms, and Discrete Math II. Balanced Search Trees. Yusuf Pisan CSS 343 Data Structures, Algorithms, and Discrete Math II Balanced Search Trees Yusuf Pisan Height Height of a tree impacts how long it takes to find an item Balanced tree O(log n) vs Degenerate tree O(n)

More information

1 This work was partially supported by NSF Grant No. CCR , and by the URI International Engineering Program.

1 This work was partially supported by NSF Grant No. CCR , and by the URI International Engineering Program. Combined Error Correcting and Compressing Codes Extended Summary Thomas Wenisch Peter F. Swaszek Augustus K. Uht 1 University of Rhode Island, Kingston RI Submitted to International Symposium on Information

More information

Introduction to Markov Models

Introduction to Markov Models Introduction to Markov Models But first: A few preliminaries Estimating the probability of phrases of words, sentences, etc. CIS 391 - Intro to AI 2 What counts as a word? A tricky question. How to find

More information

Sequence Alignment & Computational Thinking

Sequence Alignment & Computational Thinking Sequence Alignment & Computational Thinking Michael Schatz Bioinformatics Lecture 2 Undergraduate Research Program 2011 Recap Sequence assays used for many important and interesting ways Variation Discovery:

More information

SCRABBLE ARTIFICIAL INTELLIGENCE GAME. CS 297 Report. Presented to. Dr. Chris Pollett. Department of Computer Science. San Jose State University

SCRABBLE ARTIFICIAL INTELLIGENCE GAME. CS 297 Report. Presented to. Dr. Chris Pollett. Department of Computer Science. San Jose State University SCRABBLE AI GAME 1 SCRABBLE ARTIFICIAL INTELLIGENCE GAME CS 297 Report Presented to Dr. Chris Pollett Department of Computer Science San Jose State University In Partial Fulfillment Of the Requirements

More information

Spring 06 Assignment 2: Constraint Satisfaction Problems

Spring 06 Assignment 2: Constraint Satisfaction Problems 15-381 Spring 06 Assignment 2: Constraint Satisfaction Problems Questions to Vaibhav Mehta(vaibhav@cs.cmu.edu) Out: 2/07/06 Due: 2/21/06 Name: Andrew ID: Please turn in your answers on this assignment

More information

Channel Coding RADIO SYSTEMS ETIN15. Lecture no: Ove Edfors, Department of Electrical and Information Technology

Channel Coding RADIO SYSTEMS ETIN15. Lecture no: Ove Edfors, Department of Electrical and Information Technology RADIO SYSTEMS ETIN15 Lecture no: 7 Channel Coding Ove Edfors, Department of Electrical and Information Technology Ove.Edfors@eit.lth.se 2012-04-23 Ove Edfors - ETIN15 1 Contents (CHANNEL CODING) Overview

More information

Past questions from the last 6 years of exams for programming 101 with answers.

Past questions from the last 6 years of exams for programming 101 with answers. 1 Past questions from the last 6 years of exams for programming 101 with answers. 1. Describe bubble sort algorithm. How does it detect when the sequence is sorted and no further work is required? Bubble

More information

Alexandre Fréchette, Neil Newman, Kevin Leyton-Brown

Alexandre Fréchette, Neil Newman, Kevin Leyton-Brown Solving the Station Repacking Problem Alexandre Fréchette, Neil Newman, Kevin Leyton-Brown Agenda Background Problem Novel Approach Experimental Results Background A Brief History Spectrum rights have

More information

Machine Translation - Decoding

Machine Translation - Decoding January 15, 2007 Table of Contents 1 Introduction 2 3 4 5 6 Integer Programing Decoder 7 Experimental Results Word alignments Fertility Table Translation Table Heads Non-heads NULL-generated (ct.) Figure:

More information

Statistical Machine Translation. Machine Translation Phrase-Based Statistical MT. Motivation for Phrase-based SMT

Statistical Machine Translation. Machine Translation Phrase-Based Statistical MT. Motivation for Phrase-based SMT Statistical Machine Translation Machine Translation Phrase-Based Statistical MT Jörg Tiedemann jorg.tiedemann@lingfil.uu.se Department of Linguistics and Philology Uppsala University October 2009 Probabilistic

More information

Chapter 7: Sorting 7.1. Original

Chapter 7: Sorting 7.1. Original Chapter 7: Sorting 7.1 Original 3 1 4 1 5 9 2 6 5 after P=2 1 3 4 1 5 9 2 6 5 after P=3 1 3 4 1 5 9 2 6 5 after P=4 1 1 3 4 5 9 2 6 5 after P=5 1 1 3 4 5 9 2 6 5 after P=6 1 1 3 4 5 9 2 6 5 after P=7 1

More information

Southeastern European Regional Programming Contest Bucharest, Romania Vinnytsya, Ukraine October 21, Problem A Concerts

Southeastern European Regional Programming Contest Bucharest, Romania Vinnytsya, Ukraine October 21, Problem A Concerts Problem A Concerts File: A.in File: standard output Time Limit: 0.3 seconds (C/C++) Memory Limit: 128 megabytes John enjoys listening to several bands, which we shall denote using A through Z. He wants

More information

INTRODUCTION TO COMPUTER SCIENCE I PROJECT 6 Sudoku! Revision 2 [2010-May-04] 1

INTRODUCTION TO COMPUTER SCIENCE I PROJECT 6 Sudoku! Revision 2 [2010-May-04] 1 INTRODUCTION TO COMPUTER SCIENCE I PROJECT 6 Sudoku! Revision 2 [2010-May-04] 1 1 The game of Sudoku Sudoku is a game that is currently quite popular and giving crossword puzzles a run for their money

More information

Introduction to Source Coding

Introduction to Source Coding Comm. 52: Communication Theory Lecture 7 Introduction to Source Coding - Requirements of source codes - Huffman Code Length Fixed Length Variable Length Source Code Properties Uniquely Decodable allow

More information

LabVIEW Day 2: Other loops, Other graphs

LabVIEW Day 2: Other loops, Other graphs LabVIEW Day 2: Other loops, Other graphs Vern Lindberg From now on, I will not include the Programming to indicate paths to icons for the block diagram. I assume you will be getting comfortable with the

More information

How to Break Through Genealogy Brick Walls - Google Cheat Sheet CLUES = KEYWORDS

How to Break Through Genealogy Brick Walls - Google Cheat Sheet CLUES = KEYWORDS CLUES = KEYWORDS Your KEYWORDS are then used in Google Search and COMBINED with SEARCH OPERATORS. "9 out of 10 people don't know how to effectively use the Internet's search engines. Are you one of them?

More information

The Message Passing Interface (MPI)

The Message Passing Interface (MPI) The Message Passing Interface (MPI) MPI is a message passing library standard which can be used in conjunction with conventional programming languages such as C, C++ or Fortran. MPI is based on the point-to-point

More information

Introduction to Markov Models. Estimating the probability of phrases of words, sentences, etc.

Introduction to Markov Models. Estimating the probability of phrases of words, sentences, etc. Introduction to Markov Models Estimating the probability of phrases of words, sentences, etc. But first: A few preliminaries on text preprocessing What counts as a word? A tricky question. CIS 421/521

More information

MITOCW 8. Hashing with Chaining

MITOCW 8. Hashing with Chaining MITOCW 8. Hashing with Chaining The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free.

More information

Embedded Systems CSEE W4840. Design Document. Hardware implementation of connected component labelling

Embedded Systems CSEE W4840. Design Document. Hardware implementation of connected component labelling Embedded Systems CSEE W4840 Design Document Hardware implementation of connected component labelling Avinash Nair ASN2129 Jerry Barona JAB2397 Manushree Gangwar MG3631 Spring 2016 Table of Contents TABLE

More information

In this chapter, you find out how easy scripting is. The scripting basics set

In this chapter, you find out how easy scripting is. The scripting basics set 05_574949 ch01.qxd 7/29/04 10:45 PM Page 11 Chapter 1 A Cannonball Dive into the Scripting Pool In This Chapter Writing a simple script Writing a more complex script Running a script In this chapter, you

More information

Image Processing Computer Graphics I Lecture 20. Display Color Models Filters Dithering Image Compression

Image Processing Computer Graphics I Lecture 20. Display Color Models Filters Dithering Image Compression 15-462 Computer Graphics I Lecture 2 Image Processing April 18, 22 Frank Pfenning Carnegie Mellon University http://www.cs.cmu.edu/~fp/courses/graphics/ Display Color Models Filters Dithering Image Compression

More information

Princeton ELE 201, Spring 2014 Laboratory No. 2 Shazam

Princeton ELE 201, Spring 2014 Laboratory No. 2 Shazam Princeton ELE 201, Spring 2014 Laboratory No. 2 Shazam 1 Background In this lab we will begin to code a Shazam-like program to identify a short clip of music using a database of songs. The basic procedure

More information

COMP Online Algorithms. Paging and k-server Problem. Shahin Kamali. Lecture 11 - Oct. 11, 2018 University of Manitoba

COMP Online Algorithms. Paging and k-server Problem. Shahin Kamali. Lecture 11 - Oct. 11, 2018 University of Manitoba COMP 7720 - Online Algorithms Paging and k-server Problem Shahin Kamali Lecture 11 - Oct. 11, 2018 University of Manitoba COMP 7720 - Online Algorithms Paging and k-server Problem 1 / 19 Review & Plan

More information

6.02 Introduction to EECS II Spring Quiz 1

6.02 Introduction to EECS II Spring Quiz 1 M A S S A C H U S E T T S I N S T I T U T E O F T E C H N O L O G Y DEPARTMENT OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE 6.02 Introduction to EECS II Spring 2011 Quiz 1 Name SOLUTIONS Score Please

More information

my bank account number and sort code the bank account number and sort code for the cheque paid in the amount of the cheque.

my bank account number and sort code the bank account number and sort code for the cheque paid in the amount of the cheque. Data and information What do we mean by data? The term "data" means raw facts and figures - usually a series of values produced as a result of an event or transaction. For example, if I buy an item in

More information

Image Processing. Adrien Treuille

Image Processing. Adrien Treuille Image Processing http://croftonacupuncture.com/db5/00415/croftonacupuncture.com/_uimages/bigstockphoto_three_girl_friends_celebrating_212140.jpg Adrien Treuille Overview Image Types Pixel Filters Neighborhood

More information

AN ALTERNATIVE METHOD FOR ASSOCIATION RULES

AN ALTERNATIVE METHOD FOR ASSOCIATION RULES AN ALTERNATIVE METHOD FOR ASSOCIATION RULES RECAP Mining Frequent Itemsets Itemset A collection of one or more items Example: {Milk, Bread, Diaper} k-itemset An itemset that contains k items Support (

More information

Dragon Dictation Introduction

Dragon Dictation Introduction Dragon Dictation Introduction Nuance s Dragon Medical One is a voice recognition program that allows you to dictate into many areas of the Unity EHR. Here are some tips on using Dragon. INTRODUCTION By

More information

MITOCW ocw lec11

MITOCW ocw lec11 MITOCW ocw-6.046-lec11 Here 2. Good morning. Today we're going to talk about augmenting data structures. That one is 23 and that is 23. And I look here. For this one, And this is a -- Normally, rather

More information

Math 3012 Applied Combinatorics Lecture 2

Math 3012 Applied Combinatorics Lecture 2 August 20, 2015 Math 3012 Applied Combinatorics Lecture 2 William T. Trotter trotter@math.gatech.edu The Road Ahead Alert The next two to three lectures will be an integrated approach to material from

More information

MITOCW watch?v=xsgorvw8j6q

MITOCW watch?v=xsgorvw8j6q MITOCW watch?v=xsgorvw8j6q The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free. To

More information

CSE6488: Mobile Computing Systems

CSE6488: Mobile Computing Systems CSE6488: Mobile Computing Systems Sungwon Jung Dept. of Computer Science and Engineering Sogang University Seoul, Korea Email : jungsung@sogang.ac.kr Your Host Name: Sungwon Jung Email: jungsung@sogang.ac.kr

More information

2004 Denison Spring Programming Contest 1

2004 Denison Spring Programming Contest 1 24 Denison Spring Programming Contest 1 Problem : 4 Square It s been known for over 2 years that every positive integer can be written in the form x 2 + y 2 + z 2 + w 2, for x,y,z,w non-negative integers.

More information

EE251: Tuesday October 10

EE251: Tuesday October 10 EE251: Tuesday October 10 Analog to Digital Conversion Text Chapter 20 through section 20.2 TM4C Data Sheet Chapter 13 Lab #5 Writeup Lab Practical #1 this week Homework #4 is due on Thursday at 4:30 p.m.

More information

Huffman Coding - A Greedy Algorithm. Slides based on Kevin Wayne / Pearson-Addison Wesley

Huffman Coding - A Greedy Algorithm. Slides based on Kevin Wayne / Pearson-Addison Wesley - A Greedy Algorithm Slides based on Kevin Wayne / Pearson-Addison Wesley Greedy Algorithms Greedy Algorithms Build up solutions in small steps Make local decisions Previous decisions are never reconsidered

More information

Central Place Indexing: Optimal Location Representation for Digital Earth. Kevin M. Sahr Department of Computer Science Southern Oregon University

Central Place Indexing: Optimal Location Representation for Digital Earth. Kevin M. Sahr Department of Computer Science Southern Oregon University Central Place Indexing: Optimal Location Representation for Digital Earth Kevin M. Sahr Department of Computer Science Southern Oregon University 1 Kevin Sahr - October 6, 2014 The Situation Geospatial

More information

The Use of Non-Local Means to Reduce Image Noise

The Use of Non-Local Means to Reduce Image Noise The Use of Non-Local Means to Reduce Image Noise By Chimba Chundu, Danny Bin, and Jackelyn Ferman ABSTRACT Digital images, such as those produced from digital cameras, suffer from random noise that is

More information

1. Completing Sequences

1. Completing Sequences 1. Completing Sequences Two common types of mathematical sequences are arithmetic and geometric progressions. In an arithmetic progression, each term is the previous one plus some integer constant, e.g.,

More information

We will be releasing HW1 today It is due in 2 weeks (4/18 at 23:59pm) The homework is long

We will be releasing HW1 today It is due in 2 weeks (4/18 at 23:59pm) The homework is long We will be releasing HW1 today It is due in 2 weeks (4/18 at 23:59pm) The homework is long Requires proving theorems as well as coding Please start early Recitation sessions: Spark Tutorial and Clinic:

More information

International Journal for Research in Technological Studies Vol. 1, Issue 8, July 2014 ISSN (online):

International Journal for Research in Technological Studies Vol. 1, Issue 8, July 2014 ISSN (online): International Journal for Research in Technological Studies Vol. 1, Issue 8, July 2014 ISSN (online): 2348-1439 A Novel Approach for Adding Security in Time Lapse Video with Watermarking Ms. Swatiben Patel

More information

RADIO SYSTEMS ETIN15. Channel Coding. Ove Edfors, Department of Electrical and Information Technology

RADIO SYSTEMS ETIN15. Channel Coding. Ove Edfors, Department of Electrical and Information Technology RADIO SYSTEMS ETIN15 Lecture no: 7 Channel Coding Ove Edfors, Department of Electrical and Information Technology Ove.Edfors@eit.lth.se 2016-04-18 Ove Edfors - ETIN15 1 Contents (CHANNEL CODING) Overview

More information

A Brief Introduction to Information Theory and Lossless Coding

A Brief Introduction to Information Theory and Lossless Coding A Brief Introduction to Information Theory and Lossless Coding 1 INTRODUCTION This document is intended as a guide to students studying 4C8 who have had no prior exposure to information theory. All of

More information

Using Binary Layers with NIS-Elements

Using Binary Layers with NIS-Elements Using Binary Layers with NIS-Elements Overview This technical note describes the usage of Binary Layers with NIS-Elements. Binary layers form an extension of simple intensity thresholding technique, allowing

More information

Digital Image Processing

Digital Image Processing Digital Image Processing Lecture # 5 Image Enhancement in Spatial Domain- I ALI JAVED Lecturer SOFTWARE ENGINEERING DEPARTMENT U.E.T TAXILA Email:: ali.javed@uettaxila.edu.pk Office Room #:: 7 Presentation

More information

Comparison Between Scrambled and X-Y Crosswire Readout Techniques

Comparison Between Scrambled and X-Y Crosswire Readout Techniques Comparison Between Scrambled and X-Y Crosswire When reading out a large number of detector elements, such as a multipixel SPM array, it is often desirable to use some form of multiplexing in order to reduce

More information

Skip Lists S 3 S 2 S 1. 2/6/2016 7:04 AM Skip Lists 1

Skip Lists S 3 S 2 S 1. 2/6/2016 7:04 AM Skip Lists 1 Skip Lists S 3 15 15 23 10 15 23 36 2/6/2016 7:04 AM Skip Lists 1 Outline and Reading What is a skip list Operations Search Insertion Deletion Implementation Analysis Space usage Search and update times

More information

CMSC 426, Fall 2012 Problem Set 4 Due October 25

CMSC 426, Fall 2012 Problem Set 4 Due October 25 CMSC 46, Fall 01 Problem Set 4 Due October 5 In this problem set you will implement a mincut approach to image segmentation. This algorithm has been discussed in class. The class web page also contains

More information

Problem A. Vera and Outfits

Problem A. Vera and Outfits Problem A. Vera and Outfits file: file: Vera owns N tops and N pants. The i-th top and i-th pants have colour i, for 1 i N, where all N colours are different from each other. An outfit consists of one

More information

MEASURING PRIVACY RISK IN ONLINE SOCIAL NETWORKS. Justin Becker, Hao Chen UC Davis May 2009

MEASURING PRIVACY RISK IN ONLINE SOCIAL NETWORKS. Justin Becker, Hao Chen UC Davis May 2009 MEASURING PRIVACY RISK IN ONLINE SOCIAL NETWORKS Justin Becker, Hao Chen UC Davis May 2009 1 Motivating example College admission Kaplan surveyed 320 admissions offices in 2008 1 in 10 admissions officers

More information

Link State Routing. Stefano Vissicchio UCL Computer Science CS 3035/GZ01

Link State Routing. Stefano Vissicchio UCL Computer Science CS 3035/GZ01 Link State Routing Stefano Vissicchio UCL Computer Science CS 335/GZ Reminder: Intra-domain Routing Problem Shortest paths problem: What path between two vertices offers minimal sum of edge weights? Classic

More information

Image Forgery. Forgery Detection Using Wavelets

Image Forgery. Forgery Detection Using Wavelets Image Forgery Forgery Detection Using Wavelets Introduction Let's start with a little quiz... Let's start with a little quiz... Can you spot the forgery the below image? Let's start with a little quiz...

More information

Implementing Logic with the Embedded Array

Implementing Logic with the Embedded Array Implementing Logic with the Embedded Array in FLEX 10K Devices May 2001, ver. 2.1 Product Information Bulletin 21 Introduction Altera s FLEX 10K devices are the first programmable logic devices (PLDs)

More information

Introduction. Physics 1CL WAVES AND SOUND FALL 2009

Introduction. Physics 1CL WAVES AND SOUND FALL 2009 Introduction This lab and the next are based on the physics of waves and sound. In this lab, transverse waves on a string and both transverse and longitudinal waves on a slinky are studied. To describe

More information

2. Nine points are distributed around a circle in such a way that when all ( )

2. Nine points are distributed around a circle in such a way that when all ( ) 1. How many circles in the plane contain at least three of the points (0, 0), (0, 1), (0, 2), (1, 0), (1, 1), (1, 2), (2, 0), (2, 1), (2, 2)? Solution: There are ( ) 9 3 = 8 three element subsets, all

More information

Mesh density options. Rigidity mode options. Transform expansion. Pin depth options. Set pin rotation. Remove all pins button.

Mesh density options. Rigidity mode options. Transform expansion. Pin depth options. Set pin rotation. Remove all pins button. Martin Evening Adobe Photoshop CS5 for Photographers Including soft edges The Puppet Warp mesh is mostly applied to all of the selected layer contents, including the semi-transparent edges, even if only

More information

Design and Analysis of Algorithms Prof. Madhavan Mukund Chennai Mathematical Institute. Module 6 Lecture - 37 Divide and Conquer: Counting Inversions

Design and Analysis of Algorithms Prof. Madhavan Mukund Chennai Mathematical Institute. Module 6 Lecture - 37 Divide and Conquer: Counting Inversions Design and Analysis of Algorithms Prof. Madhavan Mukund Chennai Mathematical Institute Module 6 Lecture - 37 Divide and Conquer: Counting Inversions Let us go back and look at Divide and Conquer again.

More information

MITOCW watch?v=-qcpo_dwjk4

MITOCW watch?v=-qcpo_dwjk4 MITOCW watch?v=-qcpo_dwjk4 The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free. To

More information

Voice Activity Detection

Voice Activity Detection Voice Activity Detection Speech Processing Tom Bäckström Aalto University October 2015 Introduction Voice activity detection (VAD) (or speech activity detection, or speech detection) refers to a class

More information

(CSC-3501) Lecture 6 (31 Jan 2008) Seung-Jong Park (Jay) CSC S.J. Park. Announcement

(CSC-3501) Lecture 6 (31 Jan 2008) Seung-Jong Park (Jay)   CSC S.J. Park. Announcement Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark Computer Architecture (CSC-3501) Lecture 6 (31 Jan 2008) 1 Announcement 2 1 Reminder A logic circuit is composed of: Inputs Outputs Functional specification

More information

Data Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1

Data Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Data Gathering Chapter 4 Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Environmental Monitoring (PermaSense) Understand global warming in alpine environment Harsh environmental conditions Swiss made

More information

DVA325 Formal Languages, Automata and Models of Computation (FABER)

DVA325 Formal Languages, Automata and Models of Computation (FABER) DVA325 Formal Languages, Automata and Models of Computation (FABER) Lecture 1 - Introduction School of Innovation, Design and Engineering Mälardalen University 11 November 2014 Abu Naser Masud FABER November

More information

Module 3 Greedy Strategy

Module 3 Greedy Strategy Module 3 Greedy Strategy Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu Introduction to Greedy Technique Main

More information

AD HOC: Object facet: PlayStation 4, PlayStation 5, Xbox One, Xbox Two. Outcome facet: Rumours. Date facet: Pre-release. Not facet: Game titles.

AD HOC: Object facet: PlayStation 4, PlayStation 5, Xbox One, Xbox Two. Outcome facet: Rumours. Date facet: Pre-release. Not facet: Game titles. 1. Introduction: Topic and Evaluation Policy. Title: Console gaming - release rumours Description: Find documents that discuss the pre-release rumours about the current generation of Sony PlayStation and

More information

game tree complete all possible moves

game tree complete all possible moves Game Trees Game Tree A game tree is a tree the nodes of which are positions in a game and edges are moves. The complete game tree for a game is the game tree starting at the initial position and containing

More information

Fall 2015 COMP Operating Systems. Lab #7

Fall 2015 COMP Operating Systems. Lab #7 Fall 2015 COMP 3511 Operating Systems Lab #7 Outline Review and examples on virtual memory Motivation of Virtual Memory Demand Paging Page Replacement Q. 1 What is required to support dynamic memory allocation

More information

Design of Area and Power Efficient FIR Filter Using Truncated Multiplier Technique

Design of Area and Power Efficient FIR Filter Using Truncated Multiplier Technique Design of Area and Power Efficient FIR Filter Using Truncated Multiplier Technique TALLURI ANUSHA *1, and D.DAYAKAR RAO #2 * Student (Dept of ECE-VLSI), Sree Vahini Institute of Science and Technology,

More information