16 results
Search Results
2. A tree-projection-based algorithm for multi-label recurrent-item associative-classification rule generation
- Author
-
Rak, Rafal, Kurgan, Lukasz, and Reformat, Marek
- Subjects
- *
ALGORITHMS , *COMPUTER science , *COMPUTER logic , *SYSTEMS development , *COMPUTER programming , *INFORMATION technology , *INFORMATION science - Abstract
Abstract: Associative-classification is a promising classification method based on association-rule mining. Significant amount of work has already been dedicated to the process of building a classifier based on association rules. However, relatively small amount of research has been performed in association-rule mining from multi-label data. In such data each example can belong, and thus should be classified, to more than one class. This paper aims at the most demanding, with respect to computational cost, part in associative-classification, which is efficient generation of association rules. This task can be achieved using different frequent pattern mining methods. In this paper, we propose a new method that is based on the state-of-the-art tree-projection-based frequent pattern mining algorithm. This algorithm is modified to improve its efficiency and extended to accommodate the multi-label recurrent-item associative-classification rule generation. The proposed algorithm is tested and compared with A priori-based associative-classification rule generator on two large datasets. [Copyright &y& Elsevier]
- Published
- 2008
- Full Text
- View/download PDF
3. A tight analysis of the Katriel–Bodlaender algorithm for online topological ordering
- Author
-
Liu, Hsiao-Fei and Chao, Kun-Mao
- Subjects
- *
ALGORITHMS , *COMPUTER science , *SYSTEMS design , *COMPUTER programming , *INFORMATION science - Abstract
Abstract: Katriel and Bodlaender [Irit Katriel, Hans L. Bodlaender, Online topological ordering, ACM Transactions on Algorithms 2 (3) (2006) 364–379] modify the algorithm proposed by Alpern et al. [Bowen Alpern, Roger Hoover, Barry K. Rosen, Peter F. Sweeney, F. Kenneth Zadeck, Incremental evaluation of computational circuits, in: Proceedings of the First Annual ACM–SIAM Symposium on Discrete Algorithms (SODA), 1990, pp. 32–42] for maintaining the topological order of the nodes of a directed acyclic graph while inserting edges and prove that their algorithm runs in time and has an lower bound. In this paper, we give a tight analysis of their algorithm by showing that it runs in time 1 [1] In this paper, we assume that . In fact, our analysis can be easily extended to prove that the algorithm runs in time without the assumption . . [Copyright &y& Elsevier]
- Published
- 2007
- Full Text
- View/download PDF
4. Optimal algorithms for online scheduling on parallel machines to minimize the makespan with a periodic availability constraint
- Author
-
Liu, Ming, Zheng, Feifeng, Chu, Chengbin, and Xu, Yinfeng
- Subjects
- *
ALGORITHMS , *SCHEDULING , *PARALLEL computers , *COMPUTERS , *CONSTRAINT programming , *COMPUTER programming , *COMPUTER science , *COMPUTER network resources - Abstract
Abstract: In this paper we investigate two online scheduling problems. The first one is online scheduling on parallel machines with one machine periodically unavailable. The second problem is online scheduling on two uniform parallel machines where one machine is periodically unavailable. The online paradigm is that jobs arrive over list, i.e., when a job presents, we have to irrevocably assign it before the next one is seen. Preemption is not allowed. The objective is to minimize makespan. We suppose that the length of each available period is normalized to 1 and the length of each unavailable period is . For the first problem, we give an optimal algorithm with competitive ratio 2. For the second problem, we assume that the speed of the periodically unavailable machine is normalized to 1, while the speed of the other one is . In the case where , we design an algorithm and show that it is optimal with competitive ratio . Then we further give some lower bounds on competitive ratio in the case . We also study a special case and prove that algorithm proposed in Xu et al. (2009) is optimal with competitive ratio . [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
5. ASAP: Eliminating algorithm-based disclosure in privacy-preserving data publishing
- Author
-
Jin, Xin, Zhang, Nan, and Das, Gautam
- Subjects
- *
ALGORITHMS , *PRIVACY , *GENERIC programming (Computer science) , *ALGEBRA , *COMPUTER programming , *INFORMATION resources management , *COMPUTER science - Abstract
Abstract: Numerous privacy-preserving data publishing algorithms were proposed to achieve privacy guarantees such as . Many of them, however, were recently found to be vulnerable to algorithm-based disclosure—i.e., privacy leakage incurred by an adversary who is aware of the privacy-preserving algorithm being used. This paper describes generic techniques for correcting the design of existing privacy-preserving data publishing algorithms to eliminate algorithm-based disclosure. We first show that algorithm-based disclosure is more prevalent and serious than previously studied. Then, we strictly define Algorithm-SAfe Publishing (ASAP) to capture and eliminate threats from algorithm-based disclosure. To correct the problems of existing data publishing algorithms, we propose two generic tools to be integrated in their design: global look-ahead and local look-ahead. To enhance data utility, we propose another generic tool called stratified pick-up. We demonstrate the effectiveness of our tools by applying them to several popular algorithms: Mondrian, Hilb, and MASK. We conduct extensive experiments to demonstrate the effectiveness of our tools in terms of data utility and efficiency. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
6. Claw finding algorithms using quantum walk
- Author
-
Tani, Seiichiro
- Subjects
- *
ALGORITHMS , *QUANTUM theory , *RANDOM walks , *COMPUTATIONAL complexity , *CRYPTOGRAPHY , *GRAPH theory , *COMPUTER science , *COMPUTER programming - Abstract
Abstract: The claw finding problem has been studied in terms of query complexity as one of the problems closely connected to cryptography. Given two functions, and , with domain sizes and , respectively, and the same range, the goal of the problem is to find and such that . This problem has been considered in both quantum and classical settings in terms of query complexity. This paper describes an optimal algorithm that uses quantum walk to solve this problem. Our algorithm can be slightly modified to solve the more general problem of finding a tuple consisting of elements in the two function domains that has a prespecified property. It can also be generalized to find a claw of functions for any constant integer , where the domain sizes of the functions may be different. [Copyright &y& Elsevier]
- Published
- 2009
- Full Text
- View/download PDF
7. Equivalence of simple functions
- Author
-
Bastien, Cédric, Czyzowicz, Jurek, Fraczak, Wojciech, and Rytter, Wojciech
- Subjects
- *
UNIVALENT functions , *ALGORITHMS , *COMPUTER programming , *ELECTROMECHANICAL devices , *TRANSDUCERS , *COMPUTER science - Abstract
Abstract: A partial function is called a simple function if is the output produced in the leftmost derivation of a word from a nonterminal of a simple context free grammar with output alphabet . In this paper we present an efficient algorithm for testing the equivalence of simple functions. Such functions correspond also to one-state deterministic pushdown transducers. Our algorithm works in time polynomial with respect to , where is the size of the textual description of , and is the maximum of the shortest lengths of words generated by nonterminals of . [Copyright &y& Elsevier]
- Published
- 2007
- Full Text
- View/download PDF
8. Improved algorithms for the maximum-sums problems
- Author
-
Cheng, Chih-Huai, Chen, Kuan-Yu, Tien, Wen-Chin, and Chao, Kun-Mao
- Subjects
- *
ALGORITHMS , *COMBINATORICS , *COMPUTER programming , *COMPUTER science - Abstract
Abstract: Given a sequence of real numbers and an integer , , the maximum-sum segments problem is to locate the segments whose sums are the largest among all possible segment sums. Recently, Bengtsson and Chen gave an -time algorithm for this problem. Bae and Takaoka later proposed a more efficient algorithm for small . In this paper, we propose an -time algorithm for the same problem, which is superior to both of them when is . We also give the first optimal algorithm for delivering the maximum-sum segments in non-decreasing order if . Then we develop an -time algorithm for the -dimensional version of the problem, where and each dimension, without loss of generality, is of the same size . This improves the best previously known -time algorithm, also by Bengtsson and Chen, where . It should be pointed out that, given a two-dimensional array of size , our algorithm for finding the maximum-sum subarrays is the first one achieving cubic time provided that is . [Copyright &y& Elsevier]
- Published
- 2006
- Full Text
- View/download PDF
9. The maximum resource bin packing problem
- Author
-
Boyar, Joan, Epstein, Leah, Favrholdt, Lene M., Kohrt, Jens S., Larsen, Kim S., Pedersen, Morten M., and Wøhlk, Sanne
- Subjects
- *
WAREHOUSES , *ALGORITHMS , *COMPUTER science , *COMPUTER programming - Abstract
Abstract: Usually, for bin packing problems, we try to minimize the number of bins used or in the case of the dual bin packing problem, maximize the number or total size of accepted items. This paper presents results for the opposite problems, where we would like to maximize the number of bins used or minimize the number or total size of accepted items. We consider off-line and on-line variants of the problems. For the off-line variant, we require that there be an ordering of the bins, so that no item in a later bin fits in an earlier bin. We find the approximation ratios of two natural approximation algorithms, First-Fit-Increasing and First-Fit-Decreasing for the maximum resource variant of classical bin packing. For the on-line variant, we define maximum resource variants of classical and dual bin packing. For dual bin packing, no on-line algorithm is competitive. For classical bin packing, we find the competitive ratio of various natural algorithms. We study the general versions of the problems as well as the parameterized versions where there is an upper bound of on the item sizes, for some integer k. [Copyright &y& Elsevier]
- Published
- 2006
- Full Text
- View/download PDF
10. A Global Algorithm for Model-Based Test Suite Generation.
- Author
-
Hessel, Anders and Pettersson, Paul
- Subjects
COMPUTER science ,ALGORITHMS ,CASE studies ,ELECTRONICS ,COMPUTER programming - Abstract
Abstract: Model-based testing has been proposed as a technique to automatically verify that a system conforms to its specification. A popular approach is to use a model-checker to produce a set of test cases by formulating the test generation problem as a reachability problem. To guide the selection of test cases, a coverage criterion is often used. A coverage criterion can be seen as a set of items to be covered, called coverage items. We propose an on-the-fly algorithm that generates a test suite that covers all feasible coverage items. The algorithm returns a set of traces that includes a path fulfilling each item, without including redundant paths. The reachability algorithm explores a state only if it might increase the total coverage. The decision is global in the sense that it does not only regard each individual local search branch in isolation, but the total coverage in all branches together. For simpler coverage criteria as location of edge coverage, this implies that each model state is never explored twice. The algorithm presented in this paper has been implemented in the test generation tool Uppaal co ✓ er. We present encouraging results from applying the tool to a set of experiments and in an industrial sized case study. [Copyright &y& Elsevier]
- Published
- 2007
- Full Text
- View/download PDF
11. Partial Order Reduction for Rewriting Semantics of Programming Languages.
- Author
-
Farzan, Azadeh and Meseguer, José
- Subjects
PROGRAMMING languages ,COMPUTER software ,ALGORITHMS ,COMPUTER science ,COMPUTER programming - Abstract
Abstract: Software model checkers are typically language-specific, require substantial development efforts, and are hard to reuse for other languages. Adding partial order reduction (POR) capabilities to such tools typically requires sophisticated changes to the tool''s model checking algorithms. This paper proposes a new method to make software model checkers language-independent and improving their performance through POR. Getting the POR capabilities does not require making any changes to the underlying model checking algorithms: for each language L, they are instead achieved through a theory transformation of L''s formal semantics, rewrite theory . Under very minimal assumptions, this can be done for any language L with relatively little effort. Our experiments with the JVM, a Promela-like language and Maude indicate that significant state space reductions and time speedups can be gained for tools generated this way. [Copyright &y& Elsevier]
- Published
- 2007
- Full Text
- View/download PDF
12. Abstraction and Completeness for Real-Time Maude.
- Author
-
Ölveczky, Peter Csaba and Meseguer, José
- Subjects
REAL-time programming ,ALGORITHMS ,COMPUTER network protocols ,COMPUTER science ,COMPUTER programming - Abstract
Abstract: This paper presents criteria that guarantee completeness of Real-Time Maude search and temporal logic model checking analyses, under the maximal time sampling strategy, for a large class of real-time systems. As a special case, we characterize simple conditions for such completeness for object-oriented real-time systems, and show that these conditions can often be easily proved even for large and complex systems, such as advanced wireless sensor network algorithms and active network multicast protocols. Our results provide completeness and decidability of time-bounded search and model checking for a large and useful class of dense-time non-Zeno real-time systems far beyond the class of automaton-based real-time systems for which well known decision procedures exist. For discrete time, our results justify abstractions that can drastically reduce the state space to make search and model checking analyses feasible. [Copyright &y& Elsevier]
- Published
- 2007
- Full Text
- View/download PDF
13. Combined Static and Dynamic Analysis.
- Author
-
Artho, Cyrille and Biere, Armin
- Subjects
JAVA programming language ,ALGORITHMS ,COMPUTER science ,COMPUTER programming - Abstract
Abstract: Static analysis is usually faster than dynamic analysis but less precise. Therefore it is often desirable to retain information from static analysis for run-time verification, or to compare the results of both techniques. However, this requires writing two programs, which may not act identically under the same conditions. It would be desirable to share the same generic algorithm by static and dynamic analysis. In JNuke, a framework for static and dynamic analysis of Java programs, this has been achieved. By keeping the architecture of static analysis similar to a virtual machine, the only key difference between abstract interpretation and execution remains the nature of program states. In dynamic analysis, concrete states are available, while in static analysis, sets of (abstract) states are considered. Our new analysis is generic because it can re-use the same algorithm in static analysis and dynamic analysis. This paper describes the architecture of such a generic analysis. To our knowledge, JNuke is the first tool that has achieved this integration, which enables static and dynamic analysis to interact in novel ways. [Copyright &y& Elsevier]
- Published
- 2005
- Full Text
- View/download PDF
14. A modified PNN algorithm with optimal PD modeling using the orthogonal least squares method.
- Author
-
Delivopoulos, E. and Theocharis, J. B.
- Subjects
- *
ARTIFICIAL neural networks , *ARTIFICIAL intelligence , *ALGORITHMS , *COMPUTER programming , *COMPUTER science , *INFORMATION science , *INFORMATION theory - Abstract
In this paper a modified algorithm is suggested for developing polynomial neural network (PN N) models. Optimal partial description (PD) modeling is introduced at each layer of the PNN expansion, a task accomplished using the orthogonal least squares (OLS) method. Based on the initial PD models determined by the polynomial order and the number of PD inputs, OLS selects the most significant regressor terms reducing the output error variance. The method produces PN N models exhibiting a high level of accuracy and superior generalization capabilities. Additionally, parsimonious models are obtained comprising a considerably smaller number of parameters compared to the ones generated by means of the conventional PNN algorithm. Three benchmark examples are elaborated, including modeling of the gas furnace process as well as the iris and wine classification problems. Extensive simulation results and comparison with other methods in the literature, demonstrate the effectiveness of the suggested modeling approach. [ABSTRACT FROM AUTHOR]
- Published
- 2004
- Full Text
- View/download PDF
15. Cardinal directions between spatial objects: the pairwise-consistency problem.
- Author
-
Cicerone, Serafino and Di Felice, Paolino
- Subjects
- *
ALGORITHMS , *COMPUTER programming , *COMPUTER science , *INFORMATION science , *GEOGRAPHIC information systems , *INFORMATION storage & retrieval systems , *DATABASES - Abstract
The paper formalizes an open-problem (called by the authors the pairwise-consistency problem) which is relevant in the context of cardinal directions among extended objects, proposes an efficient algorithmic solution for it, discusses the implementation of the algorithm and briefly reports the numerical results obtained by running the code. [ABSTRACT FROM AUTHOR]
- Published
- 2004
- Full Text
- View/download PDF
16. Type Inference using Constraint Handling Rules.
- Author
-
Alves, Sandra and Florido, Mário
- Subjects
ALGORITHMS ,COMPUTER programming ,PROGRAMMING languages ,COMPUTER science - Abstract
In this paper we present an implementation of the general system for type inference algorithms HM(X), using Prolog and Constraint Handling Rules. In our implementation the difference between the general aspects of the type inference algorithms and the constraint resolution module becomes clearer, when compared to other implementations of the same systems, usually made in a functional programming language. In the constraint module, solving equality constraints, here implemented by Prolog unification, is completely separated from constraint simplification, which is made by a solver implemented in CHR for each system. CHR rules become a clear and natural way of specifying the simplification mechanism. [Copyright &y& Elsevier]
- Published
- 2002
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.