Approximate Shortest Path and Distance Queries in Networks

Total Page:16

File Type:pdf, Size:1020Kb

Approximate Shortest Path and Distance Queries in Networks Approximate Shortest Path and Distance Queries in Networks Christian Sommer Born on 8 March 1983 in Zurich, Switzerland Citizen of Winterthur (ZH) and Sumiswald (BE), Switzerland Master of Science ETH Zurich (2006) Submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy January 2010 Department of Computer Science Graduate School of Information Science and Technology The University of Tokyo Abstract Computing shortest paths in graphs is one of the most fundamental and well-studied problems in combinatorial optimization. Numerous real-world applications have stimulated research investi- gations for more than 50 years. Finding routes in road and public transportation networks is a classical application motivating the study of the shortest path problem. Shortest paths are also sought by routing schemes for computer networks: the transmission time of messages is less when they are sent through a short sequence of routers. The problem is also relevant for social networks: one may more likely obtain a favor from a stranger by establishing contact through personal con- nections. This thesis investigates the problem of efficiently computing exact and approximate shortest paths in graphs, with the main focus being on shortest path query processing. Strategies for com- puting answers to shortest path queries may involve the use of pre-computed data structures (often called distance oracles) in order to improve the query time. Designing a shortest path query pro- cessing method raises questions such as: How can these data structures be computed efficiently? What amount of storage is necessary? How much improvement of the query time is possible? How good is the approximation quality of the query result? What are the tradeoffs between pre- computation time, storage, query time, and approximation quality? For distance oracles applicable to general graphs, the quantitative tradeoff between the storage requirement and the approximation quality is known up to constant factors. For distance oracles that take advantage of the properties of certain classes of graphs, however, the tradeoff is less well understood: for some classes of sparse graphs such as planar graphs, there are data structures that enable query algorithms to efficiently compute distance estimates of much higher precision than what the tradeoff for general graphs would predict. The first main contribution of this thesis is a proof that such data structures cannot exist for all sparse graphs. We prove a space lower bound implying that distance oracles with good precision and very low query costs require large amounts of space. A second contribution consists of space- and time-efficient data structures for a large family of complex networks. We prove that exploiting well-connected nodes yields effi- cient distance oracles for scale-free graphs. A third contribution is a practical method to compute approximate shortest paths. By means of random sampling and graph Voronoi duals, our method successfully accommodates both highly structured graphs stemming from transportation networks and less structured graphs stemming from complex networks such as social networks. iii Acknowledgements I thank my advisor and patron Shinichi Honiden for the wonderful Japanese environment he pro- vided, in which I learnt the essentials of Japanese student life and culture, for the freedom he gave me, and for his very generous financial support, which allowed me to travel to many conferences all around the world, and which also allowed me to work with high-quality equipment. I thank my co-advisor and mentor Michael E. Houle for the many fruitful and interesting discussions about algorithms and everything else, for announcing the shortest path project, for his advice, guidance, and intelligent questions, for his efforts as a collaborator, for teaching me how to improve my writing, and, honestly, for him patiently insisting on important things I did not want to hear and believe. I am very honored to have Hiroshi Imai as chair and David M. Avis, Takeo Igarashi, Kunihiko Sadakane, and Tetsuo Shibuya as members of the committee for my PhD thesis. Many thanks for investing their time in studying my work and for examining this thesis. I profited and learned enormously from my co-authors I worked with on the results of this thesis. I am indebted to Wei Chen, who first told me about the connection between path queries and compact routing, Shang-Hua Teng, for empowering and inspiring me, Elad Verbin, for his fascinating questions and his great intuition (and the invitation to Tsinghua), Yajun Wang, for insisting and working hard on the subtle differences between random graph models, Martin Wolff, for his precious help on bootstrapping my thesis and for his impressive skills as a non-native editor, and Wei Yu, for working on all the tedious and nasty calculations. I also profited from collaborating with Cyrille Artho, Hristo Djidjev, Stephan Eidenbenz, Daisuke Fukuchi, Nicolas W. Hengartner, Pierre-Lo¨ıc Garoche, Shiva Kasiviswanathan, Ken-ichi Kawarabayashi, Yusuke Kobayashi, Martin Mevissen, Johan Nystrom,¨ Yoshio Okamoto, David Roberts, Sunil Thulasidasan, and Takeaki Uno. I got precious advice from Ittai Abraham, Erik D. Demaine, Jittat Fakcharoenphol, Cyril Gavoille, Stephan Langermann, Xiang-Yang Li, Mikkel Thorup, and Uri Zwick. This thesis has improved substantially by the valuable comments of those who read parts of preliminary versions of it. I would like to thank Michael E. Houle, Cyrille Artho, Jacopo Grazzini, and Johan Nystrom¨ for their helpful suggestions and proofreading. The remaining errors and omissions are entirely the authors responsibility. I owe a big thanks to countless individuals who I was fortunate to meet and to spend time with in one way or the other — o-sewa ni nari mashita! in the Honiden laboratories: Miki Nak- agawa (and Family Nishida in Takatsuki), Kyoko Oda, Akiko Shimazu, Shuko Yamada, Ai To- bimatsu, Mizuki Inoue, Kenji Taguchi, Yasuyuki Tahara, Nobukazu Yoshioka, Fuyuki Ishikawa, Kenji Tei, Rihoko Inoue, Nik Nailah Binti Abdullah, Rey Abe, Hikari Aikawa, Yukino Baba, Valentina Baljak, Takuo Doi , Katsushige Hino, Satoshi Kataoka, Yojiro Kawamata, Kazutaka Matsuzaki, Hirotaka Moriguchi, Mohammad Reza Motallebi, Hiroyuki Nakagawa, Yoshiyuki Nakamura, Hikotoshi Nakazato, Eric Platon, Jose´ Ghislain Quenum, Yuichi Sei, Ryota Seike, Shunichiro Suenaga, Ryuichi Takahashi, Ryu Tatsumi, Susumu Toriumi, Eric Tschetter, Kayoko Yamamoto, Adrian Klein, Maxim Makatchev, Daniele Quercia, and Martin Rehak; at NII: Shigeko Tokuda, Michael Nett, Weihuan Shu, Nizar Grira, Sebastien Louis, Sebastien´ Duval, Takeshi Ozawa, Yuzuru Sawato and all the other nice and friendly guards; at Microsoft Research Asia and in Beijing: Kun Chen, Yuki Arase, Yasuyuki Matsushita, ‘Tommy’, Yuan Zhou, Jialin Zhang, Lolan Song, Peter & Ursi Zurcher¨ , Gabriel Schweizer, and Jaimie Hwang; at the Los Alamos Na- tional Laboratories and in Los Alamos: Ulrike Campbell & Glenn, Family Eidenbenz, Douglas D. Kautz, Jacopo Grazzini, Nicolas Jegou, Leticia Cuellar, Vishwanath Venkatesan, Guanhua Yan, Keren Tan, Lukas Kroc, Leonid Gurvits, Nandakishore Santhi, and Carrie Manore; on my trips v to the US and around the world: Alicia Aponte, Jittat Fakcharoenphol, Daniele Quercia, Thomas, Kati & Lars Spirig, and Andrew Yao; a special thanks to my running mates from Tokyo’s Interna- tional Running Club “Namban Rengo” for many enjoyable hours of training, racing, and travelling (and partying): thanks Guillaume Bouvet, Gary & Mami Chandler, Kazuo Chiba, Chad Clark, Ed- ward Clease, Joachim Dirks, Jon Holmes, Jay Johannesen, Chika Kanai, Gordon Kanki Knight, Daniel Kershner, Stephen Lacey, Christiane Lange, Brett Larner, Jason Lawrence, Omar Minami, Teruyuki Minegishi, Keren Miers, Satohi Numasawa, Paddy O’Connor, Rie Onodera, Bob Poul- son, Gareth Pughe, Fabrizio Raponi, Gerard Robb, David Motozo Rubenstein, Philip Ryan, Daniel Seite, Yuka Shigihara, Mika Tokairin, Martin Verdier, Jur¨ gen Wittstock, Kiyonari Yoshida, and others; from the Swiss club in Japan: Jor¨ g Aschwanden, Daniel & Monika Hagemeier, Felix Mosner¨ , Hans Prisi, Christoph Saxer, Uwe Sievers, Martin Wenk, and Hermann Werner; Japan friends (tea ceremony & BBQ) Mitsuhiko & Yuko Kusuyama, Chikako, Tomoaki, & Noriaki Sawada, Machiko & Yoshinobu Nagura, Junichi ‘Andy’ Kimura, Hitomi Sakamoto, Tomoko Sawada, Toshiro ‘Joe’ Suzuki, Akemi Okado, Masae Ono, John & Yuki Mettraux; more friends in Japan: Ryudo Tsukizaki, Koichi Matsumoto, Filiz Gencer, Jumi Klaus, Cedric S. Rutishauser, Jerry Ray, my extremely patient and lovely Japanese teacher Chieko Okamoto, Katsuro Ishimasa of Idaten, and Ken Yamagata of Iroha for making the best eel sushi in town. It was great to have friends visiting me in Japan; thanks to Samuel Burri, Adrian Doswald, Martin Halter, Roger Herzog, Julia Imhof, Tanja Isker, Moritz Isler, Hannes Schneebeli, Georg Troxler, and Stefan Wolf. Last but definitely not least, I wish to thank my wonderful family. None of this would ever have been possible without the love and the fantastic support of Hansruedi, Hermine, and Stefan. They taught me that shortest paths are not always optimal and desirable, and that “der Weg ist das Ziel”. And I wish to thank my Japanese family in Miyazaki, Kayashima, and Tottori, especially my beloved Rie, for everything. Christian Sommer, December 2009 vi Table of Contents 1 Introduction 1 1.1 Networks and Graphs . 1 1.1.1 Transportation Networks . 2 1.1.2 Complex Networks . 4 1.2 Shortest Paths . 7 1.2.1 Classical Results . 8 1.2.2 Point-to-Point Shortest Path Queries . 9 1.3 Contribution . 15 1.4 Outline . 16 2 Preliminaries 17 2.1 Graphs . 17 2.1.1 Graph Properties . 20 2.1.2 Graph Classes . 21 2.1.3 Synthetic Graph Models . 22 2.2 Graph Algorithms . 25 2.2.1 Computational Models . 26 2.2.2 Approximation Algorithms . 26 2.3 Common Techniques . 27 2.3.1 Spanners and Emulators . 27 2.3.2 Distance Labelings and Metric Embeddings . 29 2.3.3 Planar Graph Techniques . 30 2.3.4 Well-Separated Pairs . 31 2.4 Shortest Paths . 31 2.4.1 Single Source Shortest Path (SSSP) Algorithms . 32 2.4.2 All Pairs Shortest Path (APSP) Algorithms . 35 2.4.3 Many Pairs Shortest Path (MPSP) Algorithms .
Recommended publications
  • Coding Theory, Information Theory and Cryptology : Proceedings of the EIDMA Winter Meeting, Veldhoven, December 19-21, 1994
    Coding theory, information theory and cryptology : proceedings of the EIDMA winter meeting, Veldhoven, December 19-21, 1994 Citation for published version (APA): Tilborg, van, H. C. A., & Willems, F. M. J. (Eds.) (1994). Coding theory, information theory and cryptology : proceedings of the EIDMA winter meeting, Veldhoven, December 19-21, 1994. Euler Institute of Discrete Mathematics and its Applications. Document status and date: Published: 01/01/1994 Document Version: Publisher’s PDF, also known as Version of Record (includes final page, issue and volume numbers) Please check the document version of this publication: • A submitted manuscript is the version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official published version of record. People interested in the research are advised to contact the author for the final version of the publication, or visit the DOI to the publisher's website. • The final author version and the galley proof are versions of the publication after peer review. • The final published version features the final layout of the paper including the volume, issue and page numbers. Link to publication General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal.
    [Show full text]
  • Lipics-ISAAC-2020-42.Pdf (0.5
    Multiparty Selection Ke Chen Department of Computer Science, University of Wisconsin–Milwaukee, WI, USA [email protected] Adrian Dumitrescu Department of Computer Science, University of Wisconsin–Milwaukee, WI, USA [email protected] Abstract Given a sequence A of n numbers and an integer (target) parameter 1 ≤ i ≤ n, the (exact) selection problem is that of finding the i-th smallest element in A. An element is said to be (i, j)-mediocre if it is neither among the top i nor among the bottom j elements of S. The approximate selection problem is that of finding an (i, j)-mediocre element for some given i, j; as such, this variant allows the algorithm to return any element in a prescribed range. In the first part, we revisit the selection problem in the two-party model introduced by Andrew Yao (1979) and then extend our study of exact selection to the multiparty model. In the second part, we deduce some communication complexity benefits that arise in approximate selection. In particular, we present a deterministic protocol for finding an approximate median among k players. 2012 ACM Subject Classification Theory of computation Keywords and phrases approximate selection, mediocre element, comparison algorithm, i-th order statistic, tournaments, quantiles, communication complexity Digital Object Identifier 10.4230/LIPIcs.ISAAC.2020.42 1 Introduction Given a sequence A of n numbers and an integer (selection) parameter 1 ≤ i ≤ n, the selection problem asks to find the i-th smallest element in A. If the n elements are distinct, the i-th smallest is larger than i − 1 elements of A and smaller than the other n − i elements of A.
    [Show full text]
  • Open Thesis-Cklee-Jul21.Pdf
    The Pennsylvania State University The Graduate School College of Engineering EFFICIENT INFORMATION ACCESS FOR LOCATION-BASED SERVICES IN MOBILE ENVIRONMENTS A Dissertation in Computer Science and Engineering by Chi Keung Lee c 2009 Chi Keung Lee Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy August 2009 The dissertation of Chi Keung Lee was reviewed and approved∗ by the following: Wang-Chien Lee Associate Professor of Computer Science and Engineering Dissertation Advisor Chair of Committee Donna Peuquet Professor of Geography Piotr Berman Associate Professor of Computer Science and Engineering Daniel Kifer Assistant Professor of Computer Science and Engineering Raj Acharya Professor of Computer Science and Engineering Head of Computer Science and Engineering ∗Signatures are on file in the Graduate School. Abstract The demand for pervasive access of location-related information (e.g., local traffic, restau- rant locations, navigation maps, weather conditions, pollution index, etc.) fosters a tremen- dous application base of Location Based Services (LBSs). Without loss of generality, we model location-related information as spatial objects and the accesses of such information as Location-Dependent Spatial Queries (LDSQs) in LBS systems. In this thesis, we address the efficiency issue of LDSQ processing through several innovative techniques. First, we develop a new client-side data caching model, called Complementary Space Caching (CSC), to effectively shorten data access latency over wireless channels. This is mo- tivated by an observation that mobile clients, with only a subset of objects cached, do not have sufficient knowledge to assert whether or not certain object access from the remote server are necessary for given LDSQs.
    [Show full text]
  • Checking Whether a Word Is Hamming-Isometric in Linear Time
    Checking whether a word is Hamming-isometric in linear time Marie-Pierre B´eal ID ,∗ Maxime Crochemore ID † July 26, 2021 Abstract duced Fibonacci cubes in which nodes are on a binary alphabet and avoid the factor 11. The notion of d- A finite word f is Hamming-isometric if for any two ary n-cubes has subsequently be extended to define word u and v of the same length avoiding f, u can the generalized Fibonacci cube [10, 11, 19] ; it is the 2 be transformed into v by changing one by one all the subgraph Qn(f) of a 2-ary n-cube whose nodes avoid letters on which u differs from v, in such a way that some factor f. In this framework, a binary word f is 2 all of the new words obtained in this process also said to be Lee-isometric when, for any n 1, Qn(f) 2 ≥ avoid f. Words which are not Hamming-isometric can be isometrically embedded into Qn, that is, the 2 have been characterized as words having a border distance between two words u and v vertices of Qn(f) 2 2 with two mismatches. We derive from this charac- is the same in Qn(f) and in Qn. terization a linear-time algorithm to check whether On a binary alphabet, the definition of a Lee- a word is Hamming-isometric. It is based on pat- isometric word can be equivalently given by ignor- tern matching algorithms with k mismatches. Lee- ing hypercubes and adopting a point of view closer isometric words over a four-letter alphabet have been to combinatorics on words.
    [Show full text]
  • Modern Techniques for Constraint Solving the Casper Experience
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by New University of Lisbon's Repository MARCO VARGAS CORREIA MODERN TECHNIQUES FOR CONSTRAINT SOLVING THE CASPER EXPERIENCE Dissertação apresentada para obtenção do Grau de Doutor em Engenharia Informática, pela Universidade Nova de Lisboa, Faculdade de Ciências e Tecnologia. UNIÃO EUROPEIA Fundo Social Europeu LISBOA 2010 ii Acknowledgments First I would like to thank Pedro Barahona, the supervisor of this work. Besides his valuable scientific advice, his general optimism kept me motivated throughout the long, and some- times convoluted, years of my PhD. Additionally, he managed to find financial support for my participation on international conferences, workshops, and summer schools, and even for the extension of my grant for an extra year and an half. This was essential to keep me focused on the scientific work, and ultimately responsible for the existence of this dissertation. Designing, developing, and maintaining a constraint solver requires a lot of effort. I have been lucky to count on the help and advice of colleagues contributing directly or indirectly to the design and implementation of CASPER, to whom I am truly indebted: Francisco Azevedo introduced me to constraint solving over set variables, and was the first to point out the potential of incremental propagation. The set constraint solver integrating the work presented in this dissertation is based on his own solver CARDINAL, which he has thoroughly explained to me. Jorge Cruz was very helpful for clarifying many issues about real valued arithmetic, and propagation of constraints over real valued variables in general.
    [Show full text]
  • COMPUTERSCIENCE Science
    BIBLIOGRAPHY DEPARTMENT OF COMPUTER SCIENCE TECHNICAL REPORTS, 1963- 1988 Talecn Marashian Nazarian Department ofComputer Science Stanford University Stanford, California 94305 1 X Abstract: This report lists, in chronological order, all reports published by the Stanford Computer Science Department (CSD) since 1963. Each report is identified by CSD number, author's name, title, number of pages, and date. If a given report is available from the department at the time of this Bibliography's printing, price is also listed. For convenience, an author index is included in the back of the text. Some reports are noted with a National Technical Information Service (NTIS) retrieval number (i.e., AD-XXXXXX), if available from the NTIS. Other reports are noted with Knowledge Systems Laboratory {KSL) or Computer Systems Laboratory (CSL) numbers (KSL-XX-XX; CSL-TR-XX-XX), and may be requested from KSL or (CSL), respectively. 2 INSTRUCTIONS In the Bibliography which follows, there is a listing for each Computer Science Department report published as of the date of this writing. Each listing contains the following information: " Report number(s) " Author(s) " Tide " Number ofpages " Month and yearpublished " NTIS number, ifknown " Price ofhardcopy version (standard price for microfiche: $2/copy) " Availability code AVAILABILITY CODES i. + hardcopy and microfiche 2. M microfiche only 3. H hardcopy only 4. * out-of-print All Computer Science Reports, if in stock, may be requested from following address: Publications Computer Science Department Stanford University Stanford, CA 94305 phone: (415) 723-4776 * 4 % > 3 ALTERNATIVE SOURCES Rising costs and restrictions on the use of research funds for printing reports have made it necessary to charge for all manuscripts.
    [Show full text]
  • Download Book
    Lecture Notes in Computer Science 3279 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos New York University, NY, USA Doug Tygar University of California, Berkeley, CA, USA Moshe Y. Vardi Rice University, Houston, TX, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany Geoffrey M. Voelker Scott Shenker (Eds.) Peer-to-Peer Systems III Third International Workshop, IPTPS 2004 La Jolla, CA, USA, February 26-27, 2004 Revised Selected Papers 13 Volume Editors Geoffrey M. Voelker University of California, San Diego Department of Computer Science and Engineering 9500 Gilman Dr., MC 0114, La Jolla, CA 92093-0114, USA E-mail: [email protected] Scott Shenker University of California, Berkeley Computer Science Division, EECS Department 683 Soda Hall, 1776, Berkeley, CA 94720, USA E-mail: [email protected] Library of Congress Control Number: Applied for CR Subject Classification (1998): C.2.4, C.2, H.3, H.4, D.4, F.2.2, E.1, D.2 ISSN 0302-9743 ISBN 3-540-24252-X Springer Berlin Heidelberg New York This work is subject to copyright.
    [Show full text]
  • Anonymous Opt-Out and Secure Computation in Data Mining
    ANONYMOUS OPT-OUT AND SECURE COMPUTATION IN DATA MINING Samuel Steven Shepard A Thesis Submitted to the Graduate College of Bowling Green State University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE, MASTER OF ARTS December 2007 Committee: Ray Kresman, Advisor Larry Dunning So-Hsiang Chou Tong Sun ii ABSTRACT Ray Kresman, Advisor Privacy preserving data mining seeks to allow users to share data while ensuring individual and corpo- rate privacy concerns are addressed. Recently algorithms have been introduced to maintain privacy even when all but two parties collude. However, exogenous information and unwanted statistical disclosure can weaken collusion requirements and allow for approximation of sensitive information. Our work builds upon previous algorithms, putting cycle-partitioned secure sum into the mathematical framework of edge-disjoint Hamiltonian cycles and providing an additional anonymous “opt-out” procedure to help prevent unwanted statistical disclosure. iii Table of Contents CHAPTER 1: DATA MINING 1 1.1 The Basics . 1 1.2 Association Rule Mining Algorithms . 2 1.3 Distributed Data Mining . 3 1.4 Privacy-preserving Data Mining . 4 1.5 Secure Sum . 5 CHAPTER 2: HAMILTONIAN CYCLES 7 2.1 Graph Theory: An Introduction . 7 2.2 Generating Edge-disjoint Hamiltonian Cycles . 8 2.2.1 Fully-Connected . 8 2.2.2 Edge-disjoint Hamiltonian Cycles in Torus . 11 CHAPTER 3: COLLUSION RESISTANCE WITH OPT-OUT 14 3.1 Cycle-partitioned Secure Sum . 15 3.2 Problems with CPSS: Statistical Disclosure . 21 3.3 Anonymous Opt-Out . 22 3.4 Anonymous ID Assignment . 26 3.5 CPSS with Opt-out .
    [Show full text]
  • A Sheffield Hallam University Thesis
    Surface scanning with uncoded structured light sources. ROBINSON, Alan. Available from the Sheffield Hallam University Research Archive (SHURA) at: http://shura.shu.ac.uk/20284/ A Sheffield Hallam University thesis This thesis is protected by copyright which belongs to the author. The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the author. When referring to this work, full bibliographic details including the author, title, awarding institution and date of the thesis must be given. Please visit http://shura.shu.ac.uk/20284/ and http://shura.shu.ac.uk/information.html for further details about copyright and re-use permissions. REFERENCE ProQuest Number: 10700929 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a com plete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. uest ProQuest 10700929 Published by ProQuest LLC(2017). Copyright of the Dissertation is held by the Author. All rights reserved. This work is protected against unauthorized copying under Title 17, United States C ode Microform Edition © ProQuest LLC. ProQuest LLC. 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, Ml 48106- 1346 Surface Scanning with Uncoded Structured Light Sources Alan Robinson A thesis submitted in partial fulfilment of the requirements of Sheffield Hallam University for the degree of Doctor of Philosophy January 2005 Surface Scanning with Uncoded Structured Light Sources Abstract Structured Light Scanners measure the surface of a target object, producing a set of vertices which can be used to construct a three-dimensional model of the surface.
    [Show full text]
  • A Comparative Analysis of String Metric Algorithms
    International Journal of Latest Trends in Engineering and Technology Special Issue SACAIM 2017, pp. 138-142 e-ISSN:2278-621X A COMPARATIVE ANALYSIS OF STRING METRIC ALGORITHMS BabithaD’Cunha1, RoshiniKarishmaKarkada2 & Mrs.SuchethaVijaykumar3 Abstract: String metric is an important attribute for analysing a string pattern. A string metric provides a number indicating algorithm-specific indication distance. String metric includes many algorithms. One such algorithm is Levenshtein distance is a measure of the similarity between two strings, which we will refer to as the source string and the target string. Hamming distance algorithm is to find the distance between two strings of same length and the number of positions in which the corresponding symbols are different. Lee distance algorithm is used to state the number and length of disjoint paths between two nodes in a torus. We hereby propose to do a comparative study of all the above three algorithms by taking factors such as time and volume of the string to be searched and do an analysis of the same. Key Words: String Metric, Lee distance, Hamming distance,Levenshtein distance. 1. INTRODUCTION A string metric (also known as a string similarity metric or string distance function) is a metric that measures distance ("inverse similarity") between two text strings for approximate string matching. String matching is a technique to discover pattern from the specified input string. String matching algorithms are used to find the matches between the pattern and specified string. Various string matching algorithms are used to solve the string matching problems like wide window pattern matching, approximate string matching, polymorphic string matching, string matching with minimum mismatches, prefix matching, suffix matching, similarity measure etc.
    [Show full text]
  • Superpixels and Their Application for Visual Place Recognition in Changing Environments
    Superpixels and their Application for Visual Place Recognition in Changing Environments von der Fakult¨atf¨ur Elektrotechnik und Informationstechnik der Technischen Universit¨atChemnitz genehmigte Dissertation zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften (Dr.-Ing.) vorgelegt von Dipl.-Inf. Peer Neubert geboren am 10.11.1984 in Karl-Marx-Stadt Eingereicht am 18. August 2015 Gutachter: Prof. Dr.-Ing. Peter Protzel Prof. Dr. Achim Lilienthal Tag der Verleihung: 1. Dezember 2015 Peer Neubert Superpixels and their Application for Visual Place Recognition in Changing Environments Dissertation, Fakult¨at f¨ur Elektrotechnik und Informationstechnik Technische Universit¨at Chemnitz, Dezember 2015 Keywords superpixel, visual place recognition in changing environments, image segmentation, segmen- tation benchmark, simple linear iterative clustering, seeded watershed, appearance change prediction, visual landmarks Abstract Superpixels are the results of an image oversegmentation. They are an established in- termediate level image representation and used for various applications including object detection, 3d reconstruction and semantic segmentation. While there are various ap- proaches to create such segmentations, there is a lack of knowledge about their proper- ties. In particular, there are contradicting results published in the literature. This thesis identifies segmentation quality, stability, compactness and runtime to be important prop- erties of superpixel segmentation algorithms. While for some of these properties there are established evaluation methodologies available, this is not the case for segmentation stability and compactness. Therefore, this thesis presents two novel metrics for their evaluation based on ground truth optical flow. These two metrics are used together with other novel and existing measures to create a standardized benchmark for superpixel algorithms. This benchmark is used for extensive comparison of available algorithms.
    [Show full text]
  • Warkah Berita Persama
    1 WARKAH BERITA PERSAMA Bil 20 (2), 2015/1436 H/1937 S (Untuk Ahli Sahaja) Terbitan Ogos 2016 PERSATUAN SAINS MATEMATIK MALAYSIA (PERSAMA) (Dimapankan pada 1970 sebagai “Malayisan Mathematical Society” , tetapi dinamai semula sebagai “Persatuan Matematik Malaysia (PERSAMA) ” pada 1995 dan diperluaskan kepada “Persatuan Sains Matematik Malaysia (PERSAMA)” mulai Ogos 1998) Terbitan “Newsletter” persatuan ini yang dahulunya tidak berkala mulai dijenamakan semula sebagai “Warkah Berita” mulai 1994/1995 (lalu dikira Bil. 1 (1&2) 1995) dan diterbitkan dalam bentuk cetakan liat tetapi sejak isu 2008 (terbitan 2010) dibuat dalam bentuk salinan lembut di laman PERSAMA. Warkah Berita PERSAMA 20(2): Julai.-Dis, 2015/1436 H/1937 S 2 KANDUNGAN WB 2015, 20(2) (Julai-Dis) BARISAN PENYELENGGARA WB PERSAMA 2 MANTAN PRESIDEN & SUA PERSAMA 3 BARISAN PIMPINAN PERSAMA LANI 5-7 MELENTUR BULUH (OMK, IMO DSBNYA) 2015 7-9 BULAT AIR KERANA PEMBETUNG 9-21 STATISTIK AHLI PERSAMA SPT PADA DIS 2015 9 MINIT MESYUARAT AGUNG PERSAMA 2013/14 10-12 LAPORAN TAHUNAN PERSAMA 2013/14 13-18 PENYATA KEWANGAN PERSAMA 2013/14 18-21 BERITA PERSATUAN SN MATEMA ASEAN 21-24 DI MENARA GADING 24 GELANGGANG AKADEMIAWAN 25-115 SEM & KOLOKUIUM UKM, UM, UPM, USM & UTM Julai-Dis 2015) 25-28 PENERBITAN UPM (INSPEM, FSMSK), USM (PPSM&PSK) & UTM (JM &FP’kom) 2012 28-115 SEM DSBNYA KELAK: DALAM & LUAR NEGARA 2016 -2017 115-150 ANUGERAH (NOBEL, PINGAT DAN SEBAGAINYA) 151-152 KEMBALINYA SARJANA KE ALAM BAQA 152 MAKALAH UMUM YANG MENARIK 152 BUKU PILIHAN 152-187 ANUGERAH BUKU NEGARA 2015 152-154
    [Show full text]