This work presents a novel Algorithmic Differentiation (AD) approach for sensitivity analysis of Differential Algebraic Equation systems (DAEs). For the first time, the algorithmic specification of a computationally m...
详细信息
This work presents a novel Algorithmic Differentiation (AD) approach for sensitivity analysis of Differential Algebraic Equation systems (DAEs). For the first time, the algorithmic specification of a computationally memory-efficient equation-based AD technique is presented. This approach is mainly targeting equation-based modeling and simulation tools capable of constructing high-level models using state of the art object-oriented modeling principles. The approach is based on fundamental tree algorithms that are (even manually) applicable on implicit equation systems of long formulas, the main building blocks of model components. By applying the presented forward differentiation scheme on a given DAE, efficient representation of Sensitivity Equation Systems (SESs) is computed. Parameter sensitivities are evaluated by direct integration of the derived SESs. To overcome the runtime performance drawback of direct numerical integration, a system decomposition approach is recommended. It is shown that the runtime performance using modern variable-step integration methods tends to achieve the expected theoretical complexity of the forward differentiation scheme under few realistic assumptions. (C) 2014 Elsevier B.V. All rights reserved.
Given a set of terminals in the plane, a bottleneck Steiner tree is a tree interconnecting the terminals, in which the length of the longest edge is minimized. The bottleneck Steiner tree problem, or special cases the...
详细信息
Given a set of terminals in the plane, a bottleneck Steiner tree is a tree interconnecting the terminals, in which the length of the longest edge is minimized. The bottleneck Steiner tree problem, or special cases thereof, has applications in facility location and electronic physical design automation. In this paper, we first consider algorithms for computing optimal bottleneck Steiner trees. For a given topology, we give a direct, geometric algorithm that computes an optimal rectilinear bottleneck Steiner tree in O(n(2)) time, which improves on the time complexity of previous algorithms. We also give a linear-time algorithm that, given the output from the previous algorithm, computes a rectilinear Steiner tree with minimum bottleneck length and that, among all trees with minimum bottleneck length, has minimum total length. These topology-specific algorithms provide solutions to many facility location applications, and in combination with a topology enumeration algorithm, can be used to solve the more general problems that arise in other applications. We also describe some difficulties in generalizing these results to the Euclidean problem, and give a simple approximation algorithm for the Euclidean problem. We then consider computation of approximate bottleneck Steiner trees. Specifically, we derive the exact value of the bottleneck Steiner ratio in any distance metric. The bottleneck Steiner ratio is the maximum ratio of the length of the longest edge in a minimum spanning tree to the length of the longest edge in an optimal bottleneck Steiner tree. Thus, the bottleneck Steiner ratio indicates the quality of a minimum spanning tree as an approximation of an optimal bottleneck Steiner tree.
We consider the following problem. Suppose a rooted tree T is available for preprocessing. Answer on-line queries requesting the lowest common ancestor for any pair of vertices in T. We present a linear time and space...
详细信息
We consider the following problem. Suppose a rooted treeT is available for preprocessing. Answer on-line queries requesting the lowest common ancestor for any pair of vertices in T. We present a linear time and space preprocessing algorithm that enables us to answer each query in $O(1)$ time, as in Harel and Tarjan [SIAM J. Comput., 13 (1984), pp. 338–355]. Our algorithm has the advantage of being simple and easily parallelizable. The resulting parallel preprocessing algorithm runs in logarithmic time using an optimal number of processors on an EREW PRAM. Each query is then answered in $O(1)$ time using a single processor.
A new reconfigurable systolic multicomputer architecture is presented. The proposed architecture, called the Cylindrical Banyan Multicomputer (CBM), is based on the structure of a modified banyan network where every n...
详细信息
A new reconfigurable systolic multicomputer architecture is presented. The proposed architecture, called the Cylindrical Banyan Multicomputer (CBM), is based on the structure of a modified banyan network where every node of the network graph is composed of an application processor, a local memory and a communication processor, and network's inputs and outputs are merged (fused). The CBM has one of the lowest (cost) X (delay) among known multicomputer architectures based on regular networks. It is shown that a variety of computation structures such as pipelines, rings, and trees may be constructed and reconfigured in an optimal or a nearby optimal way on the CBM architecture, and that various basic algorithms can be executed very efficiently in a systolic manner. It is also shown that the CBM is an easily diagnosable and fault-tolerant system.
In this study, we address the discriminant factors of website trust. We specifically build sets of propositional rules that can be used to predict the level of trustworthiness of a site. Focusing on initial trust, a s...
详细信息
In this study, we address the discriminant factors of website trust. We specifically build sets of propositional rules that can be used to predict the level of trustworthiness of a site. Focusing on initial trust, a survey was designed to assess site characteristics observed by the respondent and his/her perceptions around appearance, reputation, fulfillment, and security. By exploring data, we look for the most favorable rules classifiers among decision trees as well as classical and dominance-based rough sets. A heuristic aiming to derive simpler classifiers is also proposed. The experimental setup considers diverse groups of attributes (predictors) for the extraction of rules. Results obtained are compared by taking into account predictive ability and parsimony of rules' sets. Finally, the selected sets help bring light on how consumers process site information and suggest specific recommendations for e-commerce vendors.
The throughput characteristics of a random access system (RAS) which uses Q-ary tree algorithms (where Q is the number of groups into which colliding users are split) of the Capetanakis-Tsybakov-Mikhailov-Vvedenskaya ...
详细信息
The throughput characteristics of a random access system (RAS) which uses Q-ary tree algorithms (where Q is the number of groups into which colliding users are split) of the Capetanakis-Tsybakov-Mikhailov-Vvedenskaya type are analyzed for an infinite population of identical users generating packets. In the standard model packets are assumed to be generated according to a Poisson process. In this paper we greatly relax this assumption and consider a rich class of Markovian arrival processes, which, in general, are non-renewal. This class of arrival processes is known to lend itself very well to modeling bursty and correlated arrival processes commonly arising in computer and communication applications. Blocked and grouped channel access protocols are considered in combination with Q-ary collision resolution algorithms that exploit either binary ("collision or not") or ternary ("collision, success or idle") feedback. For the resulting RASs the corresponding maximum stable throughput is determined. It is concluded that the resulting RASs maintain their good stability characteristics under the wide range of arrival processes considered, thereby further extending the theoretical foundations of tree algorithms. (C) 2004 Elsevier B.V. All rights reserved.
We present a Turbo Pascal implementation of the expanding equilibrium algorithm for linear, single commodity spatial price equilibrium problems. We provide evidence that our microcomputer implementation is faster than...
详细信息
We present a Turbo Pascal implementation of the expanding equilibrium algorithm for linear, single commodity spatial price equilibrium problems. We provide evidence that our microcomputer implementation is faster than a mainframe implementation of a widely-referenced alternative algorithm. An executable version of our program, with documentation, is available upon request.
The distance between two objects determines how far apart they are with respect to each other. In this paper, we provide an overview of the distance concept in multimedia phylogeny, a novel research field that aims at...
详细信息
The distance between two objects determines how far apart they are with respect to each other. In this paper, we provide an overview of the distance concept in multimedia phylogeny, a novel research field that aims at discovering the phylogenetic relationships among digital objects that belong to the same population. With applications in digital forensics, copyright enforcement, and security, existing approaches are often based on dissimilarity computations among digital objects in a nonmetric space, but with enough information to correctly reconstruct the underlying relationships of these objects. As we discuss throughout the paper, a proper and well-designed dissimilarity is paramount for differentiating whether two multimedia objects are related and, also, the directionality of such relationship. In phylogeny setups, there is also the additional requirement of low complexity: fast and accurate dissimilarity measures to cope with the massive amount of data we often have to handle.
The bimodality of a population P can be measured by dividing its range into two intervals so as to maximize the Fisher distance between the resulting two subpopulations P1 and P2. If P is a mixture of two (approximate...
详细信息
The bimodality of a population P can be measured by dividing its range into two intervals so as to maximize the Fisher distance between the resulting two subpopulations P1 and P2. If P is a mixture of two (approximately) Gaussian subpopulations, then P1 and P2 are good approximations to the original Gaussians, if their Fisher distance is great enough. Moreover, good approximations to P1 and P2 can be obtained by dividing P into small parts; finding the maximum-distance (MD) subdivision of each part; combining small groups of these subdivisions into (approximate) MD subdivisions of larger parts; and so on. This divide-and-conquer approach yields an approximate MD subdivision of P in O(log n) computational steps using O(n) processors, where n is the size of P.
A greedy approach can be applied to find 2 edge-disjoint 1-trees or spanning trees (if they exist) of minimum total length in a graph with n vertices and m edges. A greedy algorithm to solve the tree problem contains ...
详细信息
A greedy approach can be applied to find 2 edge-disjoint 1-trees or spanning trees (if they exist) of minimum total length in a graph with n vertices and m edges. A greedy algorithm to solve the tree problem contains a routine that tests whether 2 edge-disjoint forests can be augmented with a given edge. Two test routines are discussed with different worst-case running times. The most efficient one is utilized to derive in O(m log m + n2) operations a lower bound solution to the 2-Peripatetic Salesman Problem (2-PSP), which requires 2 edge-disjoint Hamiltonian cycles of minimum total length. Then the other test routine executes in O(n2) operations a sensitivity analysis for all relevant edges. Computational results illustrate the impact of the sensitivity analysis.
暂无评论