221 results on '"Department of Computer Science (Brown University)"'
Search Results
2. Multitask Prompted Training Enables Zero-Shot Task Generalization
- Author
-
Sanh, Victor, Webson, Albert, Raffel, Colin, Bach, Stephen, Sutawika, Lintang, Alyafeai, Zaid, Chaffin, Antoine, Stiegler, Arnaud, Le Scao, Teven, Raja, Arun, Dey, Manan, Bari, M Saiful, Xu, Canwen, Thakker, Urmish, Sharma, Shanya, Szczechla, Eliza, Kim, Taewoon, Chhablani, Gunjan, V. Nayak, Nihal, Datta, Debajyoti, Chang, Jonathan, Jiang, Mike, Wang, Han, Manica, Matteo, Shen, Sheng, Yong, Zheng-Xin, Pandey, Harshit, Mckenna, Michael, Bawden, Rachel, Wang, Thomas, Neeraj, Trishala, Rozen, Jos, Sharma, Abheesht, Santilli, Andrea, Fevry, Thibault, Fries, Jason, Teehan, Ryan, Bers, Tali, Biderman, Stella, Gao, Leo, Wolf, Thomas, Rush, Alexander, Hugging Face, Department of Computer Science (Brown University), Brown University, Konvergen AI, King Fahd University of Petroleum and Minerals (KFUPM), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT), IMATAG [Rennes], Hyperscience, Institute for Infocomm Research - I²R [Singapore], SAP AI Research (SAP AI ), School of Computer Engineering [Singapore] (NTU), Nanyang Technological University [Singapour], Department of Computer Science and Engineering [Univ California San Diego] (CSE - UC San Diego), University of California [San Diego] (UC San Diego), University of California (UC)-University of California (UC), SambaNova Systems, Walmart Labs, Scott Tiger S.A., Vrije Universiteit Amsterdam [Amsterdam] (VU), Oracle, University of Virginia, AsusTeK Computer (ASUS), ZEALS, New York University [New York] (NYU), NYU System (NYU), IBM Research [Zurich], University of California [Berkeley] (UC Berkeley), University of California (UC), Sans affiliation, Parity, Automatic Language Modelling and ANAlysis & Computational Humanities (ALMAnaCH), Inria de Paris, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), CyberCube, Naver Labs Europe [Meylan], Birla Institute of Technology and Science (BITS Pilani), Università degli Studi di Roma 'La Sapienza' = Sapienza University [Rome] (UNIROMA), Point72, Stanford University, Charles River Analytics, EleutherAI, Booz Hallen Hamilton Inc, and ANR-19-P3IA-0001,PRAIRIE,PaRis Artificial Intelligence Research InstitutE(2019)
- Subjects
[INFO.INFO-CL]Computer Science [cs]/Computation and Language [cs.CL] - Abstract
International audience; Large language models have recently been shown to attain reasonable zero-shot generalization on a diverse set of tasks (Brown et al., 2020). It has been hypothesized that this is a consequence of implicit multitask learning in language models’ pretraining (Radford et al., 2019). Can zero-shot generalization instead be directly induced by explicit multitask learning? To test this question at scale, we develop a system for easily mapping any natural language tasks into a human-readable prompted form. We convert a large set of supervised datasets, each with multiple prompts with diverse wording. These prompted datasets allow for benchmarking the ability of a model to perform completely held-out tasks. We fine-tune a pre-trained encoder-decoder model (Raffel et al., 2020; Lester et al., 2021) on this multitask mixture covering a wide variety of tasks. The model attains strong zero-shot performance on several standard datasets, often outperforming models up to 16x its size. Further, our approach attains strong performance on a subset of tasks from the BIG-bench benchmark, outperforming models up to 6x its size. All trained models are available at https://github.com/bigscience-workshop/t-zero, and all prompts are available at https://github.com/bigscience-workshop/promptsource.
- Published
- 2022
3. OSSO: Obtaining Skeletal Shape from Outside
- Author
-
Keller, Marilyn, Zuffi, Silvia, Black, Michael J., Pujades, Sergi, Max-Planck-Institut für Intelligente Systeme, Max-Planck-Gesellschaft, Department of Computer Science (Brown University), Brown University, National Research Council of Italy | Consiglio Nazionale delle Ricerche (CNR), Capture and Analysis of Shapes in Motion (MORPHEO), Inria Grenoble - Rhône-Alpes, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire Jean Kuntzmann (LJK), Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes (UGA)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP ), Université Grenoble Alpes (UGA)-Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes (UGA)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP ), Université Grenoble Alpes (UGA), and ANR-19-CE23-0003,SEMBA,Des corps en mouvements vers l'anatomie(2019)
- Subjects
FOS: Computer and information sciences ,Computer Vision and Pattern Recognition (cs.CV) ,Computer Science - Computer Vision and Pattern Recognition ,[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV] - Abstract
We address the problem of inferring the anatomic skeleton of a person, in an arbitrary pose, from the 3D surface of the body; i.e. we predict the inside (bones) from the outside (skin). This has many applications in medicine and biomechanics. Existing state-of-the-art biomechanical skeletons are detailed but do not easily generalize to new subjects. Additionally, computer vision and graphics methods that predict skeletons are typically heuristic, not learned from data, do not leverage the full 3D body surface, and are not validated against ground truth. To our knowledge, our system, called OSSO (Obtaining Skeletal Shape from Outside), is the first to learn the mapping from the 3D body surface to the internal skeleton from real data. We do so using 1000 male and 1000 female dual-energy X-ray absorptiometry (DXA) scans. To these, we fit a parametric 3D body shape model (STAR) to capture the body surface and a novel part-based 3D skeleton model to capture the bones. This provides inside/outside training pairs. We model the statistical variation of full skeletons using PCA in a pose-normalized space. We then train a regressor from body shape parameters to skeleton shape parameters and refine the skeleton to satisfy constraints on physical plausibility. Given an arbitrary 3D body shape and pose, OSSO predicts a realistic skeleton inside. In contrast to previous work, we evaluate the accuracy of the skeleton shape quantitatively on held-out DXA scans, outperforming the state-of-the-art. We also show 3D skeleton prediction from varied and challenging 3D bodies. The code to infer a skeleton from a body shape is available for research at https://osso.is.tue.mpg.de/, and the dataset of paired outer surface (skin) and skeleton (bone) meshes is available as a Biobank Returned Dataset. This research has been conducted using the UK Biobank Resource., Project page: https://osso.is.tue.mpg.de/. Accepted in CVPR 2022
- Published
- 2022
- Full Text
- View/download PDF
4. Look at the Variance! Efficient Black-box Explanations with Sobol-based Sensitivity Analysis
- Author
-
Fel, Thomas, Cadène, Rémi, Chalvidal, Mathieu, Cord, Matthieu, Vigouroux, David, Serre, Thomas, Carney Institute for Brain Science [Providence], Brown University, Artificial and Natural Intelligence Toulouse Institute (ANITI), Université Fédérale Toulouse Midi-Pyrénées, Department of Computer Science (Brown University), Sorbonne Université (SU), IRT Saint Exupéry - Institut de Recherche Technologique, FEL, Thomas, and Artificial and Natural Intelligence Toulouse Institute - - ANITI2019 - ANR-19-P3IA-0004 - P3IA - VALID
- Subjects
FOS: Computer and information sciences ,Computer Science - Machine Learning ,Computer Science - Computation and Language ,Computer Science - Artificial Intelligence ,Computer Vision and Pattern Recognition (cs.CV) ,Computer Science - Computer Vision and Pattern Recognition ,[MATH] Mathematics [math] ,[INFO] Computer Science [cs] ,Explainability ,Machine Learning (cs.LG) ,[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI] ,Artificial Intelligence (cs.AI) ,[MATH.MATH-ST]Mathematics [math]/Statistics [math.ST] ,Interpretability ,Sensitivity analysis ,Computation and Language (cs.CL) - Abstract
We describe a novel attribution method which is grounded in Sensitivity Analysis and uses Sobol indices. Beyond modeling the individual contributions of image regions, Sobol indices provide an efficient way to capture higher-order interactions between image regions and their contributions to a neural network's prediction through the lens of variance. We describe an approach that makes the computation of these indices efficient for high-dimensional problems by using perturbation masks coupled with efficient estimators to handle the high dimensionality of images. Importantly, we show that the proposed method leads to favorable scores on standard benchmarks for vision (and language models) while drastically reducing the computing time compared to other black-box methods -- even surpassing the accuracy of state-of-the-art white-box methods which require access to internal representations. Our code is freely available: https://github.com/fel-thomas/Sobol-Attribution-Method, NeurIPS2021
- Published
- 2021
5. Few-camera Dynamic Scene Variational Novel-view Synthesis
- Author
-
Fülöp-Balogh, Beatrix-Emőke, Tursman, Eleanor, Bonneel, Nicolas, Tompkin, James, Digne, Julie, Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2), Department of Computer Science (Brown University), Brown University, Centre National de la Recherche Scientifique (CNRS), and Fulop-Balogh, Beatrix-Emoke
- Subjects
Computer Science::Computer Vision and Pattern Recognition ,[INFO.INFO-GR] Computer Science [cs]/Graphics [cs.GR] ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,[INFO.INFO-GR]Computer Science [cs]/Graphics [cs.GR] - Abstract
National audience; Few-camera videos Structure from motion Novel depth and RGB Relaxed point reconstruction without temporal consistency Efficient pose estimation robust to dynamic objects Sparse noisy point clouds Camera poses Virtual camera path Variational optimization with temporal consistency Figure 1: Given a set of video sequences from a few cameras only, our method computes camera poses and sparse points, then optimizes those points into a novel video sequence following a user-defined camera path. Our space-time SfM relaxes temporal consistency for points on dynamic objects and instead robustly adds consistency during the novel view synthesis via our variational formulation.
- Published
- 2020
6. Block Distributed 3MG Algorithm and its Application to 3D Image Restoration
- Author
-
Mathieu Chalvidal, Emilie Chouzenoux, Department of Computer Science (Brown University), Brown University, OPtimisation Imagerie et Santé (OPIS), Inria Saclay - Ile de France, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre de vision numérique (CVN), Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université Paris-Saclay-CentraleSupélec-Université Paris-Saclay, European Project: ERC-2019-STG-850925,MAJORIS, and European Project: ERC-2019-STG-850925,MAJORIS(2020)
- Subjects
021103 operations research ,Optimization problem ,Linear programming ,Computer science ,0211 other engineering and technologies ,Block-alternating optimization ,Image deblurring ,020206 networking & telecommunications ,02 engineering and technology ,Distributed scheme ,Majorization-Minimization ,Reduction (complexity) ,Asynchronous communication ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,Depth-varying blur ,Distributed memory ,Differentiable function ,[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing ,Algorithm ,Image restoration ,Block (data storage) - Abstract
International audience; Modern 3D image recovery problems require powerful optimization frameworks to handle high dimensionality while providing reliable numerical solutions in a reasonable time. In this perspective, asyn-chronous parallel optimization algorithms have received an increasing attention by overcoming memory limitation issues and communication bottlenecks. In this work, we propose a block distributed Majorize-Minorize Memory Gradient (BD3MG) optimization algorithm for solving large scale non-convex differentiable optimization problems. Assuming a distributed memory environment, the algorithm casts the efficient 3MG scheme into smaller dimension subproblems where blocks of variables are addressed in an asynchronous manner. Convergence of the sequence built by the proposed BD3MG method is established under mild assumptions. Application to the restoration of 3D images degraded by a depth-variant blur shows that our method yields significant computational time reduction compared to several synchronous and asynchronous competitors , while exhibiting great scalability potential.
- Published
- 2020
- Full Text
- View/download PDF
7. TRPLP – Trifocal Relative Pose From Lines at Points
- Author
-
Benjamin B. Kimia, Ricardo Fabbri, Anton Leykin, Elias P. Tsigaridas, Charles W. Wampler, David da Costa de Pinho, Tomas Pajdla, Jonathan D. Hauenstein, Peter Giblin, Margaret H. Regan, Timothy Duff, Hongyi Fan, State University of Rio de Janeiro, Georgia Institute of Technology [Atlanta], School of Mathematics - Georgia Institute of Technology, Brown University, University of Notre Dame [Indiana] (UND), Universidade Estadual do Norte Fluminense Darcy Ribeiro (UENF), OUtils de Résolution Algébriques pour la Géométrie et ses ApplicatioNs (OURAGAN), Inria de Paris, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), University of Liverpool, Department of Computer Science (Brown University), Czech Institute of Informatics, Robotics and Cybernetics [Prague] (CIIRC), and Czech Technical University in Prague (CTU)
- Subjects
Relative camera ,Computer science ,Grobner basis methods ,Feature extraction ,Scale-invariant feature transform ,Initialization ,Geometry ,010103 numerical & computational mathematics ,02 engineering and technology ,Iterative reconstruction ,Simulated experiments ,01 natural sciences ,Relative camera pose estimation ,Point-and-line correspondences ,0202 electrical engineering, electronic engineering, information engineering ,Structure from motion ,Three-view reconstruction ,TRPLP ,0101 mathematics ,Pose ,Pose estimation ,Pipelines ,[INFO.INFO-SC]Computer Science [cs]/Symbolic Computation [cs.SC] ,Image matching ,Minimal problems ,business.industry ,[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV] ,Solver ,Cameras ,Homotopy continuation ,SIFT features ,HC methods ,Generic cases ,View correspondences ,Efficient homotopy continuation solver ,Line (geometry) ,Image reconstruction ,Three-dimensional displays ,020201 artificial intelligence & image processing ,Computer vision ,Artificial intelligence ,business ,Algorithm - Abstract
Code available at http://github.com/rfabbri/minus; International audience; We present a method for solving two minimal problems for relative camera pose estimation from three views, which are based on three view correspondences of (i) three points and one line and (ii) three points and two lines through two of the points. These problems are too difficult to be efficiently solved by the state of the art Grobner basis methods. Our method is based on a new efficient homotopy continuation (HC) solver, which dramatically speeds up previous HC solving by specializing HC methods to generic cases of our problems. We show in simulated experiments that our solvers are numerically robust and stable under image noise. We show in real experiment that (i) SIFT features provide good enough point-and-line correspondences for three-view reconstruction and (ii) that we can solve difficult cases with too few or too noisy tentative matches where the state of the art structure from motion initialization fails.
- Published
- 2020
- Full Text
- View/download PDF
8. Clustering dynamique minimisant la somme des rayons des clusters
- Author
-
Henzinger, Monika, Leniowski, Dariusz, Mathieu, Claire, Ecole Polytechnique Fédérale de Lausanne (EPFL), Department of Computer Science (Brown University), and Brown University
- Subjects
[INFO]Computer Science [cs] ,ACM: F.: Theory of Computation ,ComputingMilieux_MISCELLANEOUS - Abstract
International audience
- Published
- 2020
- Full Text
- View/download PDF
9. International Conference on Blockchain Economics, Security and Protocols (Tokenomics 2019)
- Author
-
Danos, Vincent, Herlihy, Maurice, Potop-Butucaru, Maria, Prat, Julien, Tucci-Piergiovanni, Sara, Département d'informatique de l'École normale supérieure (DI-ENS), École normale supérieure - Paris (ENS Paris), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS), Centre National de la Recherche Scientifique (CNRS), Analyse Statique par Interprétation Abstraite (ANTIQUE), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-École normale supérieure - Paris (ENS Paris), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Inria de Paris, Institut National de Recherche en Informatique et en Automatique (Inria), Department of Computer Science (Brown University), Brown University, Networks and Performance Analysis (NPA), LIP6, Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)-Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS), Centre de Recherche en Économie et Statistique (CREST), Ecole Nationale de la Statistique et de l'Analyse de l'Information [Bruz] (ENSAI)-École polytechnique (X)-École Nationale de la Statistique et de l'Administration Économique (ENSAE Paris)-Centre National de la Recherche Scientifique (CNRS), Laboratoire d'Intégration des Systèmes et des Technologies (LIST), Direction de Recherche Technologique (CEA) (DRT (CEA)), Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Commissariat à l'énergie atomique et aux énergies alternatives (CEA), Département d'informatique - ENS Paris (DI-ENS), Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-École normale supérieure - Paris (ENS Paris), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-École normale supérieure - Paris (ENS Paris), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Inria de Paris, École normale supérieure - Paris (ENS-PSL), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-École normale supérieure - Paris (ENS-PSL), and Laboratoire d'Intégration des Systèmes et des Technologies (LIST (CEA))
- Subjects
[INFO]Computer Science [cs] ,ComputingMilieux_MISCELLANEOUS - Abstract
International audience
- Published
- 2020
- Full Text
- View/download PDF
10. Instance-Optimality in the Noisy Value-and Comparison-Model
- Author
-
Cohen-Addad, Vincent, Mallmann-Trenn, Frederik, Mathieu, Claire, Recherche Opérationnelle (RO), LIP6, Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)-Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS), Simon Fraser University (SFU.ca), Department of Computer Science (Brown University), and Brown University
- Subjects
[INFO]Computer Science [cs] - Abstract
International audience; Motivated by crowdsourced computation, peergrading, and recommendation systems, Braverman, Mao and Weinberg [7] studied the query and round complexity of fundamental problems such as finding the maximum (max), finding all elements above a certain value (threshold-ν) or computing the top−k elements (Top-k) in a noisy environment.For example, consider the task of selecting papers for a conference. This task is challenging due to the crowdsourcing nature of peer reviews: the results of reviews are noisy and it is necessary to parallelize the review process as much as possible. We study the noisy value model and the noisy comparison model: In the noisy value model, a reviewer is asked to evaluate a single element: “What is the value of paper i?” (e.g., accept). In the noisy comparison model (introduced in the seminal work of Feige, Peleg, Raghavan and Upfal [17]) a reviewer is asked to do a pairwise comparison: “Is paper i better than paper j?”In this paper, we introduce new lower bound techniques for these classic problems. In comparison to previous work, our lower bounds are much more fine-grained: they focus on the interplay between round and query complexity and the dependency on the output size. In the setting of conference papers, this translates into a trade-off between number of reviews per paper and the number of review rounds necessary in order find the best 100 papers for the conference.We complement these results with simple algorithms which show that our lower bounds are almost tight.We then go beyond the worst-case and address the question of the importance of knowledge of the instance by providing, for a large range of parameters, instance-optimal algorithms with respect to the query complexity. We complement these results by showing that for some family of instances, no instance-optimal algorithm can exist.
- Published
- 2020
- Full Text
- View/download PDF
11. Images de la transformation numérique
- Author
-
Abiteboul, Serge, Mathieu, Claire, Value from Data (VALDA ), Département d'informatique - ENS Paris (DI-ENS), École normale supérieure - Paris (ENS Paris), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-École normale supérieure - Paris (ENS Paris), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Inria de Paris, Institut National de Recherche en Informatique et en Automatique (Inria), Laboratoire Spécification et Vérification (LSV), Université Paris-Saclay-Centre National de la Recherche Scientifique (CNRS)-Ecole Normale Supérieure Paris-Saclay (ENS Paris Saclay), Department of Computer Science (Brown University), Brown University, Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-École normale supérieure - Paris (ENS Paris), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-École normale supérieure - Paris (ENS Paris), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Inria de Paris, École normale supérieure - Paris (ENS-PSL), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-École normale supérieure - Paris (ENS-PSL), and Département d'informatique de l'École normale supérieure (DI-ENS)
- Subjects
[INFO]Computer Science [cs] ,[SHS.HIST]Humanities and Social Sciences/History - Abstract
International audience; Les Entretiens informatiques sur le Blog binaire du journal Le monde présentent des images de la transformation numérique de différentes sciences, et en cela participent au patrimoine numérique.
- Published
- 2020
12. Mixed preferential attachment model: Homophily and minorities in social networks
- Author
-
Barbara Keller, Yvonne-Anne Pignolet, Zvi Lotker, David Peleg, Chen Avin, Claire Mathieu, Hadassa Daltrophe, Ben-Gurion University of the Negev (BGU), Department of Computer Science (Brown University), Brown University, Department of Computer Science and Applied Mathematics [Rehovot], Weizmann Institute of Science [Rehovot, Israël], and ABB Corporate Research [Västerås]
- Subjects
Statistics and Probability ,education.field_of_study ,Social network ,business.industry ,Population ,Context (language use) ,Condensed Matter Physics ,Preferential attachment ,ACM: F.: Theory of Computation ,01 natural sciences ,Homophily ,010305 fluids & plasmas ,Heterophily ,Social group ,Interpersonal ties ,0103 physical sciences ,[INFO]Computer Science [cs] ,010306 general physics ,business ,education ,Social psychology ,ComputingMilieux_MISCELLANEOUS ,Mathematics - Abstract
Individuals in social networks tend to exhibit homophily in their social ties, namely, they prefer bonding with others of the same social group (e.g., the same nationality, gender, socio-economic background, etc.). To formalize this phenomenon in the context of an evolving social network, we consider a mixed preferential attachment (MPA), bi-populated, network model. In this model each of the two social groups has a certain level of bias applied by its members toward other group members, ranging form homophily (affinity toward the same) to heterophily (affinity toward the different). Thus, the MPA model supports the following three simple and well-accepted observations on human behavior related to forming networks: (i) the “rich get richer” mechanism, (ii) heterogeneity and a resulting minority–majority partition, and (iii) selection bias between groups. The main contribution of this paper is to propose a model for the evolution of a social network under these three assumptions and analyze its behavior. We show that the suggested mixed preferential attachment model exhibits, for each population, a (possibly different) power law degree distribution, i.e., a distribution where the fraction of nodes with degree k is proportional to k − β (note that β may be different for each group, as a function of the bias level and the minority–majority partition). We believe that this model may contribute to a better understanding of the forces that shape the groups and communities of our society.
- Published
- 2020
- Full Text
- View/download PDF
13. Balanced centroidal power diagrams for redistricting
- Author
-
Neal E. Young, Philip N. Klein, Vincent Cohen-Addad, Recherche Opérationnelle (RO), LIP6, Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)-Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS), Department of Computer Science (Brown University), Brown University, Department of Computer Science [University of California, Davis], University of California [Davis] (UC Davis), and University of California-University of California
- Subjects
[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS] ,Population ,0102 computer and information sciences ,02 engineering and technology ,Computer Science::Computational Geometry ,Convex polygon ,01 natural sciences ,Combinatorics ,Intersection ,graph algorithm ,computational geometry ,0202 electrical engineering, electronic engineering, information engineering ,Power diagram ,education ,redistricting ,Mathematics ,education.field_of_study ,Regular polygon ,020207 software engineering ,16. Peace & justice ,Computer Science::Computers and Society ,Redistricting ,010201 computation theory & mathematics ,Polygon ,Voronoi diagram ,optimization - Abstract
International audience; We consider the problem of political redistricting: given the locations of people in a geographical area (e.g. a US state), the goal is to decompose the area into subareas, called districts, so that the populations of the districts are as close as possible and the districts are "compact" and "contiguous," to use the terms referred to in most US state constitutions and/or US Supreme Court rulings.We study a method that outputs a solution in which each district is the intersection of a convex polygon with the geographical area. The average number of sides per polygon is less than six. The polygons tend to be quite compact. Every two districts differ in population by at most one (so we call the solution balanced).In fact, the solution is a centroidal power diagram: each polygon has an associated center in R3 such that• the projection of the center onto the plane z = 0 is the centroid of the locations of people assigned to the polygon, and• for each person assigned to that polygon, the polygon's center is closest among all centers. The polygons are convex because they are the intersections of 3D Voronoi cells with the plane.The solution is, in a well-defined sense, a locally optimal solution to the problem of choosing centers in the plane and choosing an assignment of people to those 2-d centers so as to minimize the sum of squared distances subject to the assignment being balanced.A practical problem with this approach is that, in real-world redistricting, exact locations of people are unknown. Instead, the input consists of polygons (census blocks) and associated populations. A real redistricting must not split census blocks. We therefore propose a second phase that perturbs the solution slightly so it does not split census blocks. In our experiments, the second phase achieves this while preserving perfect population balance. The district polygons are no longer convex at the fine scale because their boundaries must follow the boundaries of census blocks, but at a coarse scale they preserve the shape of the original polygons.
- Published
- 2018
- Full Text
- View/download PDF
14. Graph Reconstruction and Verification
- Author
-
Sampath Kannan, Claire Mathieu, Hang Zhou, Department of Computer Science (Brown University), Brown University, and École polytechnique (X)
- Subjects
Discrete mathematics ,[INFO.INFO-CC]Computer Science [cs]/Computational Complexity [cs.CC] ,Computer science ,020206 networking & telecommunications ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Oracle ,Randomized algorithm ,Mathematics (miscellaneous) ,010201 computation theory & mathematics ,Chordal graph ,Bounded function ,Shortest path problem ,0202 electrical engineering, electronic engineering, information engineering ,Graph (abstract data type) ,[INFO]Computer Science [cs] ,Greedy algorithm ,Voronoi diagram ,ComputingMilieux_MISCELLANEOUS ,MathematicsofComputing_DISCRETEMATHEMATICS - Abstract
How efficiently can we find an unknown graph using distance or shortest path queries between its vertices? We assume that the unknown graph G is connected, unweighted, and has bounded degree. In the reconstruction problem, the goal is to find the graph G . In the verification problem, we are given a hypothetical graph Ĝ and want to check whether G is equal to Ĝ . We provide a randomized algorithm for reconstruction using Õ( n 3/2 ) distance queries, based on Voronoi cell decomposition. Next, we analyze natural greedy algorithms for reconstruction using a shortest path oracle and also for verification using either oracle, and show that their query complexity is n 1+ o (1) . We further improve the query complexity when the graph is chordal or outerplanar. Finally, we show some lower bounds, and consider an approximate version of the reconstruction problem.
- Published
- 2018
- Full Text
- View/download PDF
15. Hierarchical Clustering: Objective Functions and Algorithms
- Author
-
Claire Mathieu, Varun Kanada, Vincent Cohen-Addad, Frederik Mallmann-Trenn, Recherche Opérationnelle (RO), LIP6, Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)-Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS), École normale supérieure - Paris (ENS Paris), Université Paris sciences et lettres (PSL), Department of Computer Science (Brown University), Brown University, Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory, and Mallmann-Trenn, Frederik
- Subjects
FOS: Computer and information sciences ,Computer science ,Correlation clustering ,[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS] ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Machine Learning (cs.LG) ,Set (abstract data type) ,Similarity (network science) ,CURE data clustering algorithm ,Artificial Intelligence ,Stochastic block model ,020204 information systems ,Computer Science - Data Structures and Algorithms ,0202 electrical engineering, electronic engineering, information engineering ,Data Structures and Algorithms (cs.DS) ,Cluster analysis ,Mathematics ,Brown clustering ,Hierarchy (mathematics) ,Constrained clustering ,Axiomatic system ,Function (mathematics) ,Hierarchical clustering ,Computer Science - Learning ,010201 computation theory & mathematics ,Hardware and Architecture ,Control and Systems Engineering ,Canopy clustering algorithm ,020201 artificial intelligence & image processing ,Hierarchical clustering of networks ,Algorithm ,Software ,Information Systems - Abstract
Hierarchical clustering is a recursive partitioning of a dataset into clusters at an increasingly finer granularity. Motivated by the fact that most work on hierarchical clustering was based on providing algorithms, rather than optimizing a specific objective, Dasgupta (2016) framed similarity-based hierarchical clustering as a combinatorial optimization problem, where a `good' hierarchical clustering is one that minimizes some cost function. He showed that this cost function has certain desirable properties, such as in order to achieve optimal cost disconnected components must be separated first and that in `structureless' graphs, i.e., cliques, all clusterings achieve the same cost. We take an axiomatic approach to defining `good' objective functions for both similarity and dissimilarity-based hierarchical clustering. We characterize a set of admissible objective functions (that includes the one introduced by Dasgupta) that have the property that when the input admits a `natural' ground-truth hierarchical clustering, the ground-truth clustering has an optimal value. Equipped with a suitable objective function, we analyze the performance of practical algorithms, as well as develop better and faster algorithms for hierarchical clustering. For similarity-based hierarchical clustering, Dasgupta (2016) showed that a simple recursive sparsest-cut based approach achieves an O(log^3/2 n)-approximation on worst-case inputs. We give a more refined analysis of the algorithm and show that it in fact achieves an O(√log n)-approximation. This improves upon the LP-based O(log n)-approximation of Roy and Pokutta (2016). For dissimilarity-based hierarchical clustering, we show that the classic average-linkage algorithm gives a factor 2 approximation, and provide a simple and better algorithm that gives a factor 3/2 approximation. This aims at explaining the success of this heuristics in practice. Finally, we consider `beyond-worst-case' scenario through a generalisation of the stochastic block model for hierarchical clustering. We show that Dasgupta's cost function also has desirable properties for these inputs and we provide a simple algorithm that for graphs generated according to this model yields a 1 + o(1) factor approximation.
- Published
- 2018
- Full Text
- View/download PDF
16. How to aggregate Top-lists: Approximation algorithms via scores and average ranks
- Author
-
Simon Mauras, Claire Mathieu, Department of Computer Science (Brown University), and Brown University
- Subjects
FOS: Computer and information sciences ,Generalization ,Sorting ,Approximation algorithm ,Aggregation problem ,Randomized algorithm ,Computer Science - Information Retrieval ,Combinatorics ,Ranking ,Computer Science - Data Structures and Algorithms ,Rank (graph theory) ,[INFO]Computer Science [cs] ,Data Structures and Algorithms (cs.DS) ,Time complexity ,ComputingMilieux_MISCELLANEOUS ,Information Retrieval (cs.IR) ,Mathematics - Abstract
A top-list is a possibly incomplete ranking of elements: only a subset of the elements are ranked, with all unranked elements tied for last. Top-list aggregation, a generalization of the well-known rank aggregation problem, takes as input a collection of top-lists and aggregates them into a single complete ranking, aiming to minimize the number of upsets (pairs ranked in opposite order in the input and in the output). In this paper, we give simple approximation algorithms for top-list aggregation. * We generalize the footrule algorithm for rank aggregation. * Using inspiration from approval voting, we define the score of an element as the frequency with which it is ranked, i.e. appears in an input top-list. We reinterpret Ailon's RepeatChoice algorithm for top-list aggregation using the score of an element and its average rank given that it is ranked. * Using average ranks, we generalize and analyze Borda's algorithm for rank aggregation. * We design a simple 2-phase variant of the Generalized Borda's algorithm, roughly sorting by scores and breaking ties by average ranks. * We then design another 2-phase variant in which in order to break ties we use, as a black box, the Mathieu-Schudy PTAS for rank aggregation, yielding a PTAS for top-list aggregation. * Finally, we discuss the special case in which all input lists have constant length., Comment: To appear in SODA'20
- Published
- 2018
- Full Text
- View/download PDF
17. Semidefinite and linear programming integrality gaps for scheduling identical machines
- Author
-
Adam Kurpisz, Monaldo Mastrolilli, Andreas Wiese, Claire Mathieu, Tobias Mömke, Victor Verdugo, Department of Computer Science (Brown University), Brown University, Department of Computer Science [ETH Zürich] (D-INFK), Eidgenössische Technische Hochschule - Swiss Federal Institute of Technology [Zürich] (ETH Zürich), Universidad de Chile = University of Chile [Santiago] (UCHILE), Max-Planck-Institut für Informatik (MPII), Max-Planck-Gesellschaft, and Operations Analytics
- Subjects
[INFO.INFO-CC]Computer Science [cs]/Computational Complexity [cs.CC] ,Discrete mathematics ,021103 operations research ,Job shop scheduling ,Linear programming ,General Mathematics ,Numerical analysis ,Convex relaxation ,Vertex cover ,0211 other engineering and technologies ,Approximation algorithm ,SDG 8 - Decent Work and Economic Growth ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Polynomial-time approximation scheme ,Scheduling (computing) ,Combinatorics ,010201 computation theory & mathematics ,[INFO]Computer Science [cs] ,ComputingMilieux_MISCELLANEOUS ,Software ,Mathematics - Abstract
Sherali and Adams (SIAM J Discrete Math 3:411–430, 1990) and Lovasz and Schrijver (SIAM J Optim 1:166–190, 1991) developed systematic procedures to construct the hierarchies of relaxations known as lift-and-project methods. They have been proven to be a strong tool for developing approximation algorithms, matching the best relaxations known for problems like Max-Cut and Sparsest-Cut. In this work we provide lower bounds for these hierarchies when applied over the configuration LP for the problem of scheduling identical machines to minimize the makespan. First we show that the configuration LP has an integrality gap of at least 1024/1023 by providing a family of instances with 15 different job sizes. Then we show that for any integer n there is an instance with n jobs in this family such that after $$\varOmega (n)$$ rounds of the Sherali–Adams ( $$\text {SA}$$ ) or the Lovasz–Schrijver ( $$\text {LS}_+$$ ) hierarchy the integrality gap remains at least 1024/1023.
- Published
- 2018
- Full Text
- View/download PDF
18. From wait-free to arbitrary concurrent solo executions in colorless distributed computing
- Author
-
Julien Stainer, Michel Raynal, Sergio Rajsbaum, Maurice Herlihy, Department of Computer Science (Brown University), Brown University, Instituto de Matematicas [México], Universidad Nacional Autónoma de México = National Autonomous University of Mexico (UNAM), As Scalable As Possible: foundations of large scale dynamic distributed systems (ASAP), Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-SYSTÈMES LARGE ÉCHELLE (IRISA-D1), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT), ANR-16-CE40-0023,DESCARTES,Abstraction modulaire pour le calcul distribué(2016), Universidad Nacional Autónoma de México (UNAM), SYSTÈMES LARGE ÉCHELLE (IRISA-D1), Université de Bretagne Sud (UBS)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National de Recherche en Informatique et en Automatique (Inria)-École normale supérieure - Rennes (ENS Rennes)-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-CentraleSupélec-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Université de Bretagne Sud (UBS)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria), Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Université de Rennes 1 (UR1), and Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique)
- Subjects
Theoretical computer science ,Asynchronous system ,General Computer Science ,Process (engineering) ,Computer science ,Generalization ,Computation ,Distributed computing ,[INFO.INFO-CE]Computer Science [cs]/Computational Engineering, Finance, and Science [cs.CE] ,0102 computer and information sciences ,01 natural sciences ,Theoretical Computer Science ,Set (abstract data type) ,03 medical and health sciences ,Task (computing) ,0302 clinical medicine ,Shared memory ,010201 computation theory & mathematics ,Asynchronous communication ,030220 oncology & carcinogenesis ,ComputingMilieux_MISCELLANEOUS - Abstract
In an asynchronous distributed system where any number of processes may crash, a process may have to run solo, computing its local output without receiving any information from other processes. In the basic shared memory system where the processes communicate through atomic read/write registers, at most one process may run solo. This paper introduces the family of d-solo models, where d-processes may concurrently run solo, 1 ≤ d ≤ n (the 1-solo model is the basic read/write model). The paper then studies distributed colorless computations in the d-solo models, where process ids are not used, either in task specifications or during computation. It presents a characterization of the colorless tasks that can be solved in each d-solo model. Colorless tasks include consensus, set agreement and many other previously studied tasks. It shows that colorless algorithms have limited computational power for solving tasks, only when d > 1 . When d = 1 , colorless algorithms can solve the same tasks as algorithms that may use ids. It is well-known that, while consensus is not wait-free solvable in a model where at most one process may run solo, ϵ-approximate agreement is solvable. In a d-solo model, the fundamental solvable task is ( d , ϵ ) -solo approximate agreement, a generalization of ϵ-approximate agreement. Indeed, ( d , ϵ ) -solo approximate agreement can be solved in the d-solo model, but not in the ( d + 1 ) -solo model. Finally, the paper studies a link between the solvability of d-set agreement and ( d , ϵ ) -solo approximate agreement in asynchronous wait-free message-passing systems, which provides an insight on the “maximal partitioning” allowed to solve an approximate agreement task.
- Published
- 2017
- Full Text
- View/download PDF
19. How Progressive Visualizations Affect Exploratory Analysis
- Author
-
Emanuel Zgraggen, Tim Kraska, Alex Galakatos, Andrew Crotty, Jean-Daniel Fekete, Department of Computer Science (Brown University), Brown University, Analysis and Visualization (AVIZ), Laboratoire de Recherche en Informatique (LRI), Université Paris-Sud - Paris 11 (UP11)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Université Paris-Sud - Paris 11 (UP11)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Inria Saclay - Ile de France, and Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)
- Subjects
Visual analytics ,Computer science ,02 engineering and technology ,computer.software_genre ,Information visualization ,Data visualization ,Knowledge extraction ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,[INFO.INFO-HC]Computer Science [cs]/Human-Computer Interaction [cs.HC] ,Interactive visualization ,scalability ,insight-based evaluation ,progressive visualization ,business.industry ,020207 software engineering ,Computer Graphics and Computer-Aided Design ,Visualization ,Exploratory analysis ,Analytics ,Signal Processing ,Scalability ,Computer Vision and Pattern Recognition ,Data mining ,business ,computer ,interactive visualization ,Software - Abstract
International audience; The stated goal for visual data exploration is to operate at a rate that matches the pace of human data analysts, but the ever increasing amount of data has led to a fundamental problem: datasets are often too large to process within interactive time frames. Progressive analytics and visualizations have been proposed as potential solutions to this issue. By processing data incrementally in small chunks, progressive systems provide approximate query answers at interactive speeds that are then refined over time with increasing precision. We study how progressive visualizations affect users in exploratory settings in an experiment where we capture user behavior and knowledge discovery through interaction logs and think-aloud protocols. Our experiment includes three visualization conditions and different simulated dataset sizes. The visualization conditions are: (1) blocking, where results are displayed only after the entire dataset has been processed; (2) instantaneous, a hypothetical condition where results are shown almost immediately; and (3) progressive, where approximate results are displayed quickly and then refined over time. We analyze the data collected in our experiment and observe that users perform equally well with either instantaneous or progressive visualizations in key metrics, such as insight discovery rates and dataset coverage, while blocking visualizations have detrimental effects.
- Published
- 2017
- Full Text
- View/download PDF
20. Local Search Yields Approximation Schemes for k-Means and k-Median in Euclidean and Minor-Free Metrics
- Author
-
Claire Mathieu, Vincent Cohen-Addad, Philip N. Klein, Recherche Opérationnelle (RO), LIP6, Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)-Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS), Department of Computer Science (Brown University), Brown University, Cohen-Addad, Vincent, École normale supérieure - Paris (ENS Paris), and Université Paris sciences et lettres (PSL)
- Subjects
Computational Geometry (cs.CG) ,FOS: Computer and information sciences ,General Computer Science ,General Mathematics ,[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS] ,Dimension (graph theory) ,Minor (linear algebra) ,[INFO.INFO-DS] Computer Science [cs]/Data Structures and Algorithms [cs.DS] ,0102 computer and information sciences ,02 engineering and technology ,Computer Science::Computational Geometry ,01 natural sciences ,Combinatorics ,symbols.namesake ,Computer Science - Data Structures and Algorithms ,Euclidean geometry ,0202 electrical engineering, electronic engineering, information engineering ,Data Structures and Algorithms (cs.DS) ,Local search (optimization) ,ComputingMilieux_MISCELLANEOUS ,Mathematics ,Euclidean space ,business.industry ,k-means clustering ,Facility location problem ,Planar graph ,Euclidean distance ,010201 computation theory & mathematics ,Bounded function ,symbols ,Computer Science - Computational Geometry ,020201 artificial intelligence & image processing ,business - Abstract
International audience; We give the first polynomial-time approximation schemes (PTASs) for the following problems: (1) uniform facility location in edge-weighted planar graphs; (2) $k$-median and $k$-means in edge-weighted planar graphs; and (3) $k$-means in Euclidean space of bounded dimension. Our first and second results extend to minor-closed families of graphs. All our results extend to cost functions that are the $p$th power of the shortest-path distance. The algorithm is local search, where the local neighborhood of a solution $S$ consists of all solutions obtained from $S$ by removing and adding $1/\varepsilon^{\Theta(1)}$ centers.
- Published
- 2016
- Full Text
- View/download PDF
21. Approximating connectivity domination in weighted bounded-genus graphs
- Author
-
Éric Colin de Verdière, David Meierfrankenfeld, Philip N. Klein, Vincent Cohen-Addad, Claire Mathieu, École normale supérieure - Paris (ENS Paris), Université Paris sciences et lettres (PSL), Laboratoire d'informatique de l'école normale supérieure (LIENS), Département d'informatique - ENS Paris (DI-ENS), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-École normale supérieure - Paris (ENS Paris), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS), Department of Computer Science (Brown University), Brown University, École normale supérieure - Paris (ENS-PSL), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-École normale supérieure - Paris (ENS-PSL), Cohen-Addad, Vincent, and Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Centre National de la Recherche Scientifique (CNRS)
- Subjects
Discrete mathematics ,Clique-sum ,[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS] ,Vertex cover ,[INFO.INFO-DS] Computer Science [cs]/Data Structures and Algorithms [cs.DS] ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Bidimensionality ,Combinatorics ,Treewidth ,Indifference graph ,Pathwidth ,010201 computation theory & mathematics ,Chordal graph ,TheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITY ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Maximal independent set ,ComputingMilieux_MISCELLANEOUS ,MathematicsofComputing_DISCRETEMATHEMATICS ,Mathematics - Abstract
We present a framework for addressing several problems on weighted planar graphs and graphs of bounded genus. With that framework, we derive polynomial-time approximation schemes for the following problems in planar graphs or graphs of bounded genus: edge-weighted tree cover and tour cover; vertex-weighted connected dominating set, max-weight-leaf spanning tree, and connected vertex cover. In addition, we obtain a polynomial-time approximation scheme for feedback vertex set in planar graphs. These are the first polynomial-time approximation schemes for all those problems in weighted embedded graphs. (For unweighted versions of some of these problems, polynomial-time approximation schemes were previously given using bidimensionality.)
- Published
- 2016
- Full Text
- View/download PDF
22. Culling a Set of Points for Roundness or Cylindricity Evaluations
- Author
-
Olivier Devillers, Franco P. Preparata, Geometric computing (GEOMETRICA), Inria Sophia Antipolis - Méditerranée (CRISAM), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Department of Computer Science (Brown University), and Brown University
- Subjects
Applied Mathematics ,Geometry ,Culling ,[INFO.INFO-CG]Computer Science [cs]/Computational Geometry [cs.CG] ,Roundness (object) ,Theoretical Computer Science ,Metrology ,Computational Mathematics ,Data point ,Computational Theory and Mathematics ,Geometry and Topology ,Algorithm ,Time complexity ,Mathematics - Abstract
International audience; Roundness and cylindricity evaluations are among the most important problems in computational metrology, and are based on sets of surface measurements (input data points). A recent approach to such evaluations is based on a linear-programming approach yielding a rapidly converging solution. Such a solution is determined by a fixed-size subset of a large input set. With the intent to simplify the main computational task, it appears desirable to cull from the input any point that cannot provably define the solution. In this note we present an analysis and an efficient solution to the problem of culling the input set. For input data points arranged in cross-sections under mild conditions of uniformity, this algorithm runs in linear time.
- Published
- 2003
- Full Text
- View/download PDF
23. Facility Location in Evolving Metrics
- Author
-
Eisenstat, David, Mathieu, Claire, Schabanel, Nicolas, Department of Computer Science (Brown University), Brown University, École normale supérieure - Paris (ENS Paris), Université Paris sciences et lettres (PSL), Laboratoire d'informatique Algorithmique : Fondements et Applications (LIAFA), Université Paris Diderot - Paris 7 (UPD7)-Centre National de la Recherche Scientifique (CNRS), and Schabanel, Nicolas
- Subjects
Social and Information Networks (cs.SI) ,FOS: Computer and information sciences ,[INFO.INFO-SI] Computer Science [cs]/Social and Information Networks [cs.SI] ,Computer Science - Data Structures and Algorithms ,[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS] ,Data Structures and Algorithms (cs.DS) ,[INFO.INFO-DS] Computer Science [cs]/Data Structures and Algorithms [cs.DS] ,Computer Science - Social and Information Networks ,[INFO.INFO-SI]Computer Science [cs]/Social and Information Networks [cs.SI] - Abstract
National audience; Understanding the dynamics of evolving social or infrastructure networks is a challenge in applied areas such as epidemiology, viral marketing, and urban planning. During the past decade, data has been collected on such networks but has yet to be analyzed fully. We propose to use information on the dynamics of the data to find stable partitions of the network into groups. For that purpose, we introduce a time-dependent, dynamic version of the facility location problem, which includes a switching cost when a client's assignment changes from one facility to another. This might provide a better representation of an evolving network, emphasizing the abrupt change of relationships between subjects rather than the continuous evolution of the underlying network. We show for some realistic examples that this model yields better hypotheses than its counterpart without switching costs, where each snapshot can be optimized independently. For our model, we present an $O(\log nT)$-approximation algorithm and a matching hardness result, where $n$ is the number of clients and $T$ is the number of timesteps. We also give another algorithm with approximation ratio $O(\log nT)$ for a variant model where the decision to open a facility is made independently at each timestep.
- Published
- 2014
24. Energy-efficient algorithms for non-preemptive speed-scaling
- Author
-
Ioannis Milis, Claire Mathieu, Vincent Cohen-Addad, Zhentao Li, Cohen-Addad, Vincent, École normale supérieure - Paris (ENS Paris), Université Paris sciences et lettres (PSL), Department of Computer Science (Brown University), Brown University, Department of Informatics [Athens] (CS-AUEB), Mobile Multimedia Laboratory [Athens], and Athens University of Economics and Business (AUEB)-Athens University of Economics and Business (AUEB)
- Subjects
FOS: Computer and information sciences ,Mathematical optimization ,Energy efficient algorithms ,[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS] ,[INFO.INFO-DS] Computer Science [cs]/Data Structures and Algorithms [cs.DS] ,Energy consumption ,Scheduling (computing) ,Nonpreemptive multitasking ,Energy conservation ,Release date ,Computer Science - Data Structures and Algorithms ,Data Structures and Algorithms (cs.DS) ,Total energy ,Speed scaling ,ComputingMilieux_MISCELLANEOUS ,Mathematics - Abstract
We improve complexity bounds for energy-efficient speed scheduling problems for both the single processor and multi-processor cases. Energy conservation has become a major concern, so revisiting traditional scheduling problems to take into account the energy consumption has been part of the agenda of the scheduling community for the past few years. We consider the energy minimizing speed scaling problem introduced by Yao et al. where we wish to schedule a set of jobs, each with a release date, deadline and work volume, on a set of identical processors. The processors may change speed as a function of time and the energy they consume is the $\alpha$th power of its speed. The objective is then to find a feasible schedule which minimizes the total energy used. We show that in the setting with an arbitrary number of processors where all work volumes are equal, there is a $2(1+\varepsilon)(5(1+\varepsilon))^{\alpha -1}\tilde{B}_{\alpha}=O_{\alpha}(1)$ approximation algorithm, where $\tilde{B}_{\alpha}$ is the generalized Bell number. This is the first constant factor algorithm for this problem. This algorithm extends to general unequal processor-dependent work volumes, up to losing a factor of $(\frac{(1+r)r}{2})^{\alpha}$ in the approximation, where $r$ is the maximum ratio between two work volumes. We then show this latter problem is APX-hard, even in the special case when all release dates and deadlines are equal and $r$ is 4. In the single processor case, we introduce a new linear programming formulation of speed scaling and prove that its integrality gap is at most $12^{\alpha -1}$. As a corollary, we obtain a $(12(1+\varepsilon))^{\alpha -1}$ approximation algorithm where there is a single processor, improving on the previous best bound of $2^{\alpha-1}(1+\varepsilon)^{\alpha}\tilde{B}_{\alpha}$ when $\alpha \ge 25$.
- Published
- 2014
25. A Probabilistic Analysis of the Power of Arithmetic Filters
- Author
-
Olivier Devillers, Franco P. Preparata, Geometric computing (GEOMETRICA), Inria Sophia Antipolis - Méditerranée (CRISAM), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Department of Computer Science (Brown University), and Brown University
- Subjects
Computational Geometry (cs.CG) ,FOS: Computer and information sciences ,Convex hull ,Unit sphere ,Discrete mathematics ,I.3.5 ,Computation ,Absolute value ,F.2.2 ,[INFO.INFO-CG]Computer Science [cs]/Computational Geometry [cs.CG] ,Theoretical Computer Science ,Combinatorics ,Normal distribution ,Computational Theory and Mathematics ,Unit cube ,Computer Science - Computational Geometry ,Discrete Mathematics and Combinatorics ,Probabilistic analysis of algorithms ,Geometry and Topology ,Algebraic expression ,Arithmetic ,Mathematics - Abstract
The assumption of real-number arithmetic, which is at the basis of conventional geometric algorithms, has been seriously challenged in recent years, since digital computers do not exhibit such capability. A geometric predicate usually consists of evaluating the sign of some algebraic expression. In most cases, rounded computations yield a reliable result, but sometimes rounded arithmetic introduces errors which may invalidate the algorithms. The rounded arithmetic may produce an incorrect result only if the exact absolute value of the algebraic expression is smaller than some (small) varepsilon, which represents the largest error that may arise in the evaluation of the expression. The threshold varepsilon depends on the structure of the expression and on the adopted computer arithmetic, assuming that the input operands are error-free. A pair (arithmetic engine,threshold) is an "arithmetic filter". In this paper we develop a general technique for assessing the efficacy of an arithmetic filter. The analysis consists of evaluating both the threshold and the probability of failure of the filter. To exemplify the approach, under the assumption that the input points be chosen randomly in a unit ball or unit cube with uniform density, we analyze the two important predicates "which-side" and "insphere". We show that the probability that the absolute values of the corresponding determinants be no larger than some positive value V, with emphasis on small V, is Theta(V) for the which-side predicate, while for the insphere predicate it is Theta(V^(2/3)) in dimension 1, O(sqrt(V)) in dimension 2, and O(sqrt(V) ln(1/V)) in higher dimensions. Constants are small, and are given in the paper., Comment: 22 pages 7 figures Results for in sphere test inproved in cs.CG/9907028
- Published
- 1998
- Full Text
- View/download PDF
26. Computing in the Presence of Concurrent Solo Executions
- Author
-
Michel Raynal, Sergio Rajsbaum, Julien Stainer, Maurice Herlihy, Department of Computer Science (Brown University), Brown University, Instituto de Matematicas [México], Universidad Nacional Autónoma de México = National Autonomous University of Mexico (UNAM), Institut Universitaire de France (IUF), Ministère de l'Education nationale, de l’Enseignement supérieur et de la Recherche (M.E.N.E.S.R.), As Scalable As Possible: foundations of large scale dynamic distributed systems (ASAP), Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-SYSTÈMES LARGE ÉCHELLE (IRISA-D1), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS), ANR-11-BS02-0014,DISPLEXITY,Calculabilité et complexité en distribué(2011), Universidad Nacional Autónoma de México (UNAM), SYSTÈMES LARGE ÉCHELLE (IRISA-D1), Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes 1 (UR1), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Inria Rennes – Bretagne Atlantique, and Institut National de Recherche en Informatique et en Automatique (Inria)
- Subjects
Approximate agreement ,Computer science ,Distributed computing ,Crash ,0102 computer and information sciences ,02 engineering and technology ,Parallel computing ,Solo execution ,01 natural sciences ,Task solvability ,Topology ,Message-passing ,Communication object ,Distributed computability ,0202 electrical engineering, electronic engineering, information engineering ,Read/write shared memory ,Asynchronous system ,System partitioning ,Message passing ,Process (computing) ,020207 software engineering ,010201 computation theory & mathematics ,Asynchronous communication ,Wait-freedom ,[INFO.INFO-DC]Computer Science [cs]/Distributed, Parallel, and Cluster Computing [cs.DC] - Abstract
In a wait-free model any number of processes may crash. A process runs solo when it computes its local output without receiving any information from other processes, either because they crashed or they are too slow. While in wait-free shared-memory models at most one process may run solo in an execution, any number of processes may have to run solo in an asynchronous wait-free message-passing model. This paper is on the computability power of models in which several processes may concurrently run solo. It first introduces a family of round-based wait-free models, called the d-solo models, 1 ≤ d ≤ n, where up to d processes may run solo. The paper gives then a characterization of the colorless tasks that can be solved in each d-solo model. It also introduces the (d, ǫ)-solo approximate agreement task, which generalizes ǫ-approximate agreement, and proves that (d, ǫ)-solo approximate agreement can be solved in the d-solo model, but cannot be solved in the (d + 1)-solo model. The paper studies also the relation linking d-set agreement and (d, ǫ)-solo approximate agreement in asynchronous wait-free message-passing systems. These results establish for the first time a hierarchy of wait-free models that, while weaker than the basic read/write model, are nevertheless strong enough to solve non-trivial tasks.; Dans un modèle wait-free, un nombre quelconque de processus peut arrêter de fonctionner. Un processus s'exécute en solo lorsqu'il calcule sa sortie sans communiquer avec les autres processus. Dans les modèles wait-free avec des processus communicant par mémoire partagée, au plus un processus peut s'exécuter en solo, alors que, dans les modèles wait-free ou ils échangent des messages, un nombre quelconque d'entre eux peut avoir à s'exécuter en solo. Cet article étudie la calculabilité dans des modèles intermédiaires, appelés d-solo modèles, dans lesquels au plus d processus s'exécutent en solo.
- Published
- 2014
- Full Text
- View/download PDF
27. Estimating Human Pose with Flowing Puppets
- Author
-
Javier Romero, Michael J. Black, Cordelia Schmid, Silvia Zuffi, Department of Computer Science (Brown University), Brown University, National Research Council of Italy | Consiglio Nazionale delle Ricerche (CNR), Max Planck Institute for Intelligent Systems [Tübingen], Max-Planck-Gesellschaft, Learning and recognition in vision (LEAR), Inria Grenoble - Rhône-Alpes, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire Jean Kuntzmann (LJK), Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS)-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS), ERC_Allegro, European Project: 320559,EC:FP7:ERC,ERC-2012-ADG_20120216,ALLEGRO(2013), Consiglio Nazionale delle Ricerche [Roma] (CNR), and Max Planck Institute for Intelligent Systems
- Subjects
Motion compensation ,business.industry ,Computer science ,Optical flow ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV] ,020207 software engineering ,02 engineering and technology ,3D pose estimation ,Articulated body pose estimation ,Video tracking ,Motion estimation ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Computer vision ,Artificial intelligence ,business ,Pose ,Block-matching algorithm - Abstract
International audience; We address the problem of upper-body human pose estimation in uncontrolled monocular video sequences, without manual initialization. Most current methods focus on isolated video frames and often fail to correctly localize arms and hands. Inferring pose over a video sequence is advantageous because poses of people in adjacent frames exhibit properties of smooth variation due to the nature of human and camera motion. To exploit this, previous methods have used prior knowledge about distinctive actions or generic temporal priors combined with static image likelihoods to track people in motion. Here we take a different approach based on a simple observation: Information about how a person moves from frame to frame is present in the optical flow field. We develop an approach for tracking articulated motions that "links" articulated shape models of people in adjacent frames through the dense optical flow. Key to this approach is a 2D shape model of the body that we use to compute how the body moves over time. The resulting "flowing puppets" provide a way of integrating image evidence across frames to improve pose inference. We apply our method on a challenging dataset of TV video sequences and show state-of-the-art performance.
- Published
- 2013
- Full Text
- View/download PDF
28. Towards Understanding Action Recognition
- Author
-
Silvia Zuffi, Cordelia Schmid, Juergen Gall, Hueihan Jhuang, Michael J. Black, Max Planck Institute for Intelligent Systems [Tübingen], Max-Planck-Gesellschaft, Computer vision group [Bonn], Rheinische Friedrich-Wilhelms-Universität Bonn, Department of Computer Science (Brown University), Brown University, National Research Council of Italy | Consiglio Nazionale delle Ricerche (CNR), Learning and recognition in vision (LEAR), Inria Grenoble - Rhône-Alpes, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire Jean Kuntzmann (LJK), Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS)-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS), ERC_Allegro, European Project: 320559,EC:FP7:ERC,ERC-2012-ADG_20120216,ALLEGRO(2013), Max Planck Institute for Intelligent Systems, and Consiglio Nazionale delle Ricerche [Roma] (CNR)
- Subjects
Ground truth ,business.industry ,Computer science ,Optical flow ,[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV] ,020207 software engineering ,02 engineering and technology ,Image segmentation ,3D pose estimation ,computer.software_genre ,Machine learning ,Optical flow estimation ,Gesture recognition ,Robustness (computer science) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Segmentation ,Artificial intelligence ,Data mining ,business ,Pose ,computer - Abstract
International audience; Although action recognition in videos is widely studied, current methods often fail on real-world datasets. Many recent approaches improve accuracy and robustness to cope with challenging video sequences, but it is often unclear what affects the results most. This paper attempts to provide insights based on a systematic performance evaluation using thoroughly-annotated data of human actions. We annotate human Joints for the HMDB dataset (J-HMDB). This annotation can be used to derive ground truth optical flow and segmentation. We evaluate current methods using this dataset and systematically replace the output of various algorithms with ground truth. This enables us to discover what is important - for example, should we work on improving flow algorithms, estimating human bounding boxes, or enabling pose estimation? In summary, we find that highlevel pose features greatly outperform low/mid level features; in particular, pose over time is critical, but current pose estimation algorithms are not yet reliable enough to provide this information. We also find that the accuracy of a top-performing action recognition framework can be greatly increased by refining the underlying low/mid level features; this suggests it is important to improve optical flow and human detection algorithms. Our analysis and JHMDB dataset should facilitate a deeper understanding of action recognition algorithms.
- Published
- 2013
- Full Text
- View/download PDF
29. An Equivariance Theorem with Applications to Renaming
- Author
-
Castaneda, Armando, Herlihy, Maurice, Rajsbaum, Sergio, As Scalable As Possible: foundations of large scale dynamic distributed systems (ASAP), SYSTÈMES LARGE ÉCHELLE (IRISA-D1), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes 1 (UR1), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria), Department of Computer Science (Brown University), Brown University, Instituto de Matematicas [México], Universidad Nacional Autónoma de México (UNAM), Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-SYSTÈMES LARGE ÉCHELLE (IRISA-D1), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS), and Universidad Nacional Autónoma de México = National Autonomous University of Mexico (UNAM)
- Subjects
Renaming ,Equivariant maps ,[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH] ,Symmetry breaking ,Algebraic topology ,Distributed computing - Abstract
In the renaming problem, each process in a distributed system is issued a unique name from a large name space, and the processes must coordinate with one another to choose unique names from a much smaller name space. We show that lower bounds on the solvability of renaming in an asynchronous distributed system can be formulated as a purely topological question about the existence of an equivariant chain map from a "topological disk" to a "topological annulus". Proving the non-existence of such a map implies the non-existence of a distributed renaming algorithm in several related models of computation.; Ce rapport pr'esente un th'eor'eme d''equivariance avec des applications au renommage.
- Published
- 2011
30. Online Correlation Clustering
- Author
-
Mathieu, Claire, Sankur, Ocan, Schudy, Warren, Loria, Publications, Jean-Yves Marion and Thomas Schwentick, Department of Computer Science (Brown University), Brown University, École normale supérieure - Paris (ENS Paris), Université Paris sciences et lettres (PSL), and Inria Nancy Grand Est & Loria
- Subjects
FOS: Computer and information sciences ,000 Computer science, knowledge, general works ,online algorithms ,[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS] ,[INFO.INFO-DS] Computer Science [cs]/Data Structures and Algorithms [cs.DS] ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,correlation clustering ,ACM: F.: Theory of Computation/F.2: ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY/F.2.2: Nonnumerical Algorithms and Problems ,010201 computation theory & mathematics ,020204 information systems ,Computer Science ,Computer Science - Data Structures and Algorithms ,0202 electrical engineering, electronic engineering, information engineering ,Data Structures and Algorithms (cs.DS) ,F.2.2 - Abstract
We study the online clustering problem where data items arrive in an online fashion. The algorithm maintains a clustering of data items into similarity classes. Upon arrival of v, the relation between v and previously arrived items is revealed, so that for each u we are told whether v is similar to u. The algorithm can create a new cluster for v and merge existing clusters. When the objective is to minimize disagreements between the clustering and the input, we prove that a natural greedy algorithm is O(n)-competitive, and this is optimal. When the objective is to maximize agreements between the clustering and the input, we prove that the greedy algorithm is .5-competitive; that no online algorithm can be better than .834-competitive; we prove that it is possible to get better than 1/2, by exhibiting a randomized algorithm with competitive ratio .5+c for a small positive fixed constant c., 12 pages, 1 figure
- Published
- 2010
31. Probabilistic analysis of the k-server problem on the circle
- Author
-
Anagnostopoulos, Aris, Dombry, Clément, Guillotin-Plantard, Nadine, Kontoyiannis, Ioannis, Upfal, Eli, Department of Computer and Systems Science [Rome], Università degli Studi di Roma 'La Sapienza' = Sapienza University [Rome], Institut Camille Jordan [Villeurbanne] (ICJ), École Centrale de Lyon (ECL), Université de Lyon-Université de Lyon-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-Université Jean Monnet [Saint-Étienne] (UJM)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS), Department of Informatics, Department of Informatics Athens Univ of Econ & Business Patission 76, Athens 10434, Greece, Department of Computer Science (Brown University), and Brown University
- Subjects
[MATH.MATH-PR]Mathematics [math]/Probability [math.PR] ,ComputingMilieux_MISCELLANEOUS - Abstract
International audience
- Published
- 2010
32. Stochastic Analysis of the $k$-Server Problem on the Circle
- Author
-
Eli Upfal, Clément Dombry, Aris Anagnostopoulos, Ioannis Kontoyiannis, Nadine Guillotin-Plantard, Department of Informatics and System Sciences (Sapienza University of Rome), Università degli Studi di Roma 'La Sapienza' = Sapienza University [Rome], Laboratoire de Mathématiques et Applications (LMA-Poitiers), Université de Poitiers-Centre National de la Recherche Scientifique (CNRS), Institut Camille Jordan [Villeurbanne] (ICJ), École Centrale de Lyon (ECL), Université de Lyon-Université de Lyon-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-Université Jean Monnet [Saint-Étienne] (UJM)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS), Department of Informatics [Athens] (CS-AUEB), Mobile Multimedia Laboratory [Athens], Athens University of Economics and Business (AUEB)-Athens University of Economics and Business (AUEB), Department of Computer Science (Brown University), Brown University, Drmota, Michael and Gittenberger, Bernhard, and Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)
- Subjects
Independent and identically distributed random variables ,Mathematical optimization ,Theoretical computer science ,General Computer Science ,K-server problem ,[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS] ,[INFO.INFO-DS] Computer Science [cs]/Data Structures and Algorithms [cs.DS] ,Arbitrary distribution ,[INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM] ,[INFO.INFO-CG]Computer Science [cs]/Computational Geometry [cs.CG] ,Theoretical Computer Science ,$k$-server ,Server ,[MATH.MATH-CO]Mathematics [math]/Combinatorics [math.CO] ,Convergence (routing) ,Discrete Mathematics and Combinatorics ,Probabilistic analysis of algorithms ,Computer Science::Operating Systems ,Mathematics ,Stochastic process ,Process (computing) ,probabilistic analysis ,on-line algorithms ,[MATH.MATH-CO] Mathematics [math]/Combinatorics [math.CO] ,[INFO.INFO-DM] Computer Science [cs]/Discrete Mathematics [cs.DM] ,[INFO.INFO-CG] Computer Science [cs]/Computational Geometry [cs.CG] - Abstract
We consider a stochastic version of the $k$-server problem in which $k$ servers move on a circle to satisfy stochastically generated requests. The requests are independent and identically distributed according to an arbitrary distribution on a circle, which is either discrete or continuous. The cost of serving a request is the distance that a server needs to move to reach the request. The goal is to minimize the steady-state expected cost induced by the requests. We study the performance of a greedy strategy, focusing, in particular, on its convergence properties and the interplay between the discrete and continuous versions of the process.
- Published
- 2010
- Full Text
- View/download PDF
33. Synthèse d'algorithmes d'ordonnancement à partir de modèles de haut niveau
- Author
-
Monette, Jean-Noël, Deville, Yves, Van Hentenryck, Pascal, Département d'Ingénierie Informatique - UCL (INGI), Université Catholique de Louvain = Catholic University of Louvain (UCL), Department of Computer Science (Brown University), Brown University, and Deville, Yves
- Subjects
[INFO.INFO-AI] Computer Science [cs]/Artificial Intelligence [cs.AI] ,[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI] - Abstract
International audience; Ce papier décrit AEON, un système dédié à la synthèse d'algorithmes d'ordonnancement à partir de modèles de haut niveau. AEON, qui est entièrement écrit en COMET, prend en entrée le modèle de haut niveau d'un problème d'ordonnancement et l'analyse pour générer un algorithme dédié et qui exploite la structure du problème. AEON oeure une variété de synthétiseurs pour générer des algorithmes complets ou heuristiques. En outre, ces synthétiseurs peuvent être composés, permettant de générer naturellement des algorithmes hybrides complexes. Les premiers résultats montrent que cette approche peut être compétitive avec l'état de l'art des algorithmes de recherche.
- Published
- 2009
34. CERTIFIED REDUCED BASIS METHODS AND OUTPUT BOUNDS FOR THE HARMONIC MAXWELL'S EQUATIONS
- Author
-
Jan S. Hesthaven, Yvon Maday, Yanlai Chen, Jerónimo Rodríguez, Department of Computer Science (Brown University), Brown University, Laboratoire Jacques-Louis Lions (LJLL), Université Pierre et Marie Curie - Paris 6 (UPMC)-Université Paris Diderot - Paris 7 (UPD7)-Centre National de la Recherche Scientifique (CNRS), Facultade de Matemáticas Aplicada (Facultade de Matemáticas,), Facultade de Matemáticas, and David, Christian
- Subjects
Partial differential equation ,Basis (linear algebra) ,Applied Mathematics ,Numerical analysis ,Mathematical analysis ,Discontinuous Galerkin methods ,Parameterized complexity ,Maxwell's equations ,010103 numerical & computational mathematics ,[INFO.INFO-NA]Computer Science [cs]/Numerical Analysis [cs.NA] ,01 natural sciences ,010101 applied mathematics ,Computational Mathematics ,A posteriori error estimation ,Discontinuous Galerkin method ,A priori theory ,[INFO.INFO-NA] Computer Science [cs]/Numerical Analysis [cs.NA] ,Reduced basis methods ,Linear approximation ,0101 mathematics ,Galerkin method ,Linear equation ,Mathematics - Abstract
We propose certified reduced basis methods for the efficient and reliable evaluation of a general output that is implicitly connected to a given parameterized input through the harmonic Maxwell's equations. The truth approximation and the development of the reduced basis through a greedy approach is based on a discontinuous Galerkin approximation of the linear partial differential equation. The formulation allows the use of different approximation spaces for solving the primal and the dual truth approximation problems to respect the characteristics of both problem types, leading to an overall reduction in the off-line computational effort. The main features of the method are the following: (i) rapid convergence on the entire representative set of parameters, (ii) rigorous a posteriori error estimators for the output, and (iii) a parameter independent off-line phase and a computationally very efficient on-line phase to enable the rapid solution of many-query problems arising in control, optimization, and design. The versatility and performance of this approach is shown through a numerical experiment, illustrating the modeling of material variations and problems with resonant behavior.
- Published
- 2009
35. Indecomposable permutations with a given number of cycles
- Author
-
Claire Mathieu, Robert Cori, Laboratoire Bordelais de Recherche en Informatique (LaBRI), Université de Bordeaux (UB)-Centre National de la Recherche Scientifique (CNRS)-École Nationale Supérieure d'Électronique, Informatique et Radiocommunications de Bordeaux (ENSEIRB), Department of Computer Science (Brown University), Brown University, Krattenthaler, Christian and Strehl, Volker and Kauers, and Manuel
- Subjects
Discrete mathematics ,General Computer Science ,Permutations ,Fixed point ,[INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM] ,Upper and lower bounds ,Theoretical Computer Science ,enumeration ,Combinatorics ,[MATH.MATH-CO] Mathematics [math]/Combinatorics [math.CO] ,Permutation ,[INFO.INFO-DM] Computer Science [cs]/Discrete Mathematics [cs.DM] ,Monotone polygon ,asymptotics ,Genus (mathematics) ,[MATH.MATH-CO]Mathematics [math]/Combinatorics [math.CO] ,Bijection ,Discrete Mathematics and Combinatorics ,Indecomposable module ,Maxima ,Mathematics - Abstract
A permutation $a_1a_2 \ldots a_n$ is $\textit{indecomposable}$ if there does not exist $p \lt n$ such that $a_1a_2 \ldots a_p$ is a permutation of $\{ 1,2, \ldots ,p\}$. We compute the asymptotic probability that a permutation of $\mathbb{S}_n$ with $m$ cycles is indecomposable as $n$ goes to infinity with $m/n$ fixed. The error term is $O(\frac{\log(n-m)}{ n-m})$. The asymptotic probability is monotone in $m/n$, and there is no threshold phenomenon: it degrades gracefully from $1$ to $0$. When $n=2m$, a slight majority ($51.1 \ldots$ percent) of the permutations are indecomposable. We also consider indecomposable fixed point free involutions which are in bijection with maps of arbitrary genus on orientable surfaces, for these involutions with $m$ left-to-right maxima we obtain a lower bound for the probability of being indecomposable., Une permutation $a_1a_2 \ldots a_n$ est $\textit{indécomposable}$, s’il n’existe pas de $p \lt n$ tel que $a_1a_2 \ldots a_p$ est une permutation de $\{ 1,2, \ldots ,p\}$. Nous calculons la probabilité pour qu’une permutation de $\mathbb{S}_n$ ayant $m$ cycles soit indécomposable et plus particulièrement son comportement asymptotique lorsque $n$ tend vers l’infini et que $m=n$ est fixé. Cette valeur décroît régulièrement de $1$ à $0$ lorsque $m=n$ croît, et il n’y a pas de phénomène de seuil. Lorsque $n=2m$, une faible majorité ($51.1 \ldots$ pour cent) des permutations sont indécomposables. Nous considérons aussi les involutions sans point fixe indécomposables qui sont en bijection avec les cartes de genre quelconque plongées dans une surface orientable, pour ces involutions ayant $m$ maxima partiels (ou records) nous obtenons une borne inférieure pour leur probabilité d’êtres indécomposables.
- Published
- 2009
36. A sketch-based interface for clothing virtual characters
- Author
-
Emmanuel Turquin, J. Wither, Marie-Paule Cani, Laurence Boissieux, John Hughes, Acquisition, representation and transformations for image synthesis (ARTIS), Inria Grenoble - Rhône-Alpes, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire Jean Kuntzmann (LJK), Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS)-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS), Virtual environments for animation and image synthesis of natural objects (EVASION), Service Expérimentation et Développement (SED [Grenoble]), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Department of Computer Science (Brown University), Brown University, and SED [Grenoble]
- Subjects
010407 polymers ,Interface (Java) ,Computer science ,02 engineering and technology ,01 natural sciences ,GeneralLiterature_MISCELLANEOUS ,Silhouette ,Clothing ,Computer graphics ,User-Computer Interface ,Imaging, Three-Dimensional ,ComputerApplications_MISCELLANEOUS ,Computer graphics (images) ,Image Interpretation, Computer-Assisted ,0202 electrical engineering, electronic engineering, information engineering ,Computer Graphics ,Humans ,Sketching clothes folds ,ComputingMethodologies_COMPUTERGRAPHICS ,Graphical user interface ,business.industry ,Sketch-based interface ,020207 software engineering ,3D modeling ,Computer Graphics and Computer-Aided Design ,3D modelling ,[INFO.INFO-GR]Computer Science [cs]/Graphics [cs.GR] ,Sketch ,0104 chemical sciences ,Character (mathematics) ,Paintings ,garment design ,business ,Software ,Algorithms - Abstract
Special issue on sketch based modeling; International audience; We present a new method for interactively creating garments for dressing virtual characters. The user draws an outline of the front and back of the garment, and the system makes reasonable geometric inferences about the overall shape of the garment (ignoring constraints arising from physics). Both the garment's shape and the way the character is wearing it are determined at once. We use the distance from the 2D garment silhouette to the character model to infer the variations of the distance between the remainder of the garment and the character in 3D. The garment surface is generated from the silhouette and border lines and this varying distance information, using a distance field to the character's body. This method is integrated in an interactive system in which the user sketches the garment over the 3D model of the character. Our results show that the system can be used to create a broad range of clothes that may be worn in a variety of ways.
- Published
- 2007
- Full Text
- View/download PDF
37. Sketching garments for virtual characters
- Author
-
John Hughes, Emmanuel Turquin, Marie-Paule Cani, Acquisition, representation and transformations for image synthesis (ARTIS), Laboratoire d'informatique GRAphique, VIsion et Robotique de Grenoble (GRAVIR - IMAG), Université Joseph Fourier - Grenoble 1 (UJF)-Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National Polytechnique de Grenoble (INPG)-Centre National de la Recherche Scientifique (CNRS)-Université Joseph Fourier - Grenoble 1 (UJF)-Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National Polytechnique de Grenoble (INPG)-Centre National de la Recherche Scientifique (CNRS)-Inria Grenoble - Rhône-Alpes, Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS), Virtual environments for animation and image synthesis of natural objects (EVASION), Department of Computer Science (Brown University), Brown University, Eurographics, and John F. Hughes and Joaquim A. Jorge
- Subjects
0209 industrial biotechnology ,business.industry ,3d model ,020207 software engineering ,02 engineering and technology ,Clothing ,GeneralLiterature_MISCELLANEOUS ,[INFO.INFO-GR]Computer Science [cs]/Graphics [cs.GR] ,Silhouette ,shape modeling ,020901 industrial engineering & automation ,Character (mathematics) ,Computer graphics (images) ,ComputerApplications_MISCELLANEOUS ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,virtual garment ,sketch-based interfaces ,business ,Distance transform ,ComputingMethodologies_COMPUTERGRAPHICS - Abstract
International audience; We present a method for simply and interactively creating basic garments for dressing virtual characters in applications like video games. The user draws an outline of the front or back of the garment, and the system makes reasonable geometric inferences about the overall shape of the garment (ignoring constraints arising from physics and from the material of the garment). Thus both the garment's shape and the way the character is wearing it are determined at once. We use the distance from the 2D garment silhouette to the character model to infer the variations of the distance between the remainder of the garment and the character in 3D. The garment surface is generated from the silhouette and border lines and this varying distance information, thanks to a data-structure that stores the distance field to the character's body. This method is integrated in an interactive system in which the user sketches the garment over the 3D model of the character. Our results show that the system can be used to create both standard clothes (skirts, shirts) and other garments that may be worn in a variety of ways (scarves, panchos).
- Published
- 2004
38. Circular Cylinders by Four or Five Points in Space
- Author
-
Devillers, Olivier, Mourrain, Bernard, Preparata, Franco, Trebuchet, Philippe, Geometric computing (GEOMETRICA), Inria Sophia Antipolis - Méditerranée (CRISAM), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Geometry, algebra, algorithms (GALAAD), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Université Nice Sophia Antipolis (1965 - 2019) (UNS), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS), Department of Computer Science (Brown University), Brown University, Calcul formel (CALFOR), Laboratoire d'Informatique de Paris 6 (LIP6), Université Pierre et Marie Curie - Paris 6 (UPMC)-Centre National de la Recherche Scientifique (CNRS)-Université Pierre et Marie Curie - Paris 6 (UPMC)-Centre National de la Recherche Scientifique (CNRS), and Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Université Nice Sophia Antipolis (... - 2019) (UNS)
- Subjects
[INFO.INFO-CG]Computer Science [cs]/Computational Geometry [cs.CG] - Abstract
International audience; We are interested in computing effectively cylinders through 5 points, and in other problems involved in metrology. In particular, we consider the cylinders through 4 points with a fix radius and with extremal radius. For these different problems, we give bounds on the number of solutions and exemples show that these bounds are optimal. Finally, we describe two algebraic methods which can be used here to solve efficiently these problems and some experimentation results.
- Published
- 2002
- Full Text
- View/download PDF
39. Automatic detection and tracking of human motion with a view-based representation
- Author
-
Michael J. Black, Ronan Fablet, Département Signal et Communications (SC), Université européenne de Bretagne - European University of Brittany (UEB)-Télécom Bretagne-Institut Mines-Télécom [Paris] (IMT), Department of Computer Science (Brown University), Brown University, Anders Heyden, Gunnar Sparr, Mads Nielsen, Peter Johansen, and Institut Mines-Télécom [Paris] (IMT)-Télécom Bretagne-Université européenne de Bretagne - European University of Brittany (UEB)
- Subjects
0209 industrial biotechnology ,Computer science ,Posterior probability ,Optical flow ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,02 engineering and technology ,Motion capture ,Motion (physics) ,optical flow ,020901 industrial engineering & automation ,Match moving ,Motion estimation ,0202 electrical engineering, electronic engineering, information engineering ,Structure from motion ,Computer vision ,particle filtering ,business.industry ,probabilistic models ,Real image ,motion detection and tracking ,Motion field ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing ,human motion analysis ,Visual motion - Abstract
International audience; This paper proposes a solution for the automatic detection and tracking of human motion in image sequences. Due to the complexity of the human body and its motion, automatic detection of 3D human motion remains an open, and important, problem. Existing approaches for automatic detection and tracking focus on 2D cues and typically exploit object appearance (color distribution, shape) or knowledge of a static background. In contrast, we exploit 2D optical flow information which provides rich descriptive cues, while being independent of object and background appearance. To represent the optical flow patterns of people from arbitrary viewpoints, we develop a novel representation of human motion using low-dimensional spatio-temporal models that are learned using motion capture data of human subjects. In addition to human motion (the foreground) we probabilistically model the motion of generic scenes (the background); these statistical models are defined as Gibbsian fields specified from the first-order derivatives of motion observations. Detection and tracking are posed in a principled Bayesian framework which involves the computation of a posterior probability distribution over the model parameters (i.e., the location and the type of the human motion) given a sequence of optical flow observations. Particle filtering is used to represent and predict this non-Gaussian posterior distribution over time. The model parameters of samples from this distribution are related to the pose parameters of a 3D articulated model (e.g. the approximate joint angles and movement direction). Thus the approach proves suitable for initializing more complex probabilistic models of human motion. As shown by experiments on real image sequences, our method is able to detect and track people under different viewpoints with complex backgrounds.
- Published
- 2002
- Full Text
- View/download PDF
40. Evaluating the cylindricity of a nominally cylindrical point set
- Author
-
Devillers, Olivier, Preparata, Franco, Geometry, Algorithms and Robotics (PRISME), Inria Sophia Antipolis - Méditerranée (CRISAM), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Department of Computer Science (Brown University), and Brown University
- Subjects
[INFO.INFO-CG]Computer Science [cs]/Computational Geometry [cs.CG] - Abstract
International audience; The minimum zone cylinder of a set of points in three dimensions is the cylindric crown defined by a pair of coaxial cylinders with minimal radial separation (width). In the context of tolerancing metrology, the set of points is nominally cylindrical, i.e., the points are known to lie in close proximity of a known reference cylinder. Using approximations which are valid only in the neighborhood of the reference cylinder, we can get a very good approximation of the minimum zone cylinder. The process provides successive approximations, and each iteration involves the solution of a linear programming problem in six dimensions. The error between the approximation and the optimal solution converges very rapidly (typically in three iterations in practice) down to a limit error of (8 omega^2)/R ( where omega is the width and R is the external radius of the zone cylinder).
- Published
- 2000
41. Further Results on Arithmetic Filters for Geometric Predicates
- Author
-
Olivier Devillers, Franco P. Preparata, Geometric computing (GEOMETRICA), Inria Sophia Antipolis - Méditerranée (CRISAM), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Department of Computer Science (Brown University), and Brown University
- Subjects
Computational Geometry (cs.CG) ,FOS: Computer and information sciences ,Polynomial ,Control and Optimization ,Delaunay triangulation ,I.3.5 ,Computation ,Rounding ,F.2.2 ,Expected value ,Computational geometry ,[INFO.INFO-CG]Computer Science [cs]/Computational Geometry [cs.CG] ,Predicate (grammar) ,Computer Science Applications ,Computational Mathematics ,Efficiency ,Computational Theory and Mathematics ,Computer Science - Computational Geometry ,Exact arithmetic ,Geometry and Topology ,Algorithm ,Mathematics - Abstract
An efficient technique to solve precision problems consists in using exact computations. For geometric predicates, using systematically expensive exact computations can be avoided by the use of filters. The predicate is first evaluated using rounding computations, and an error estimation gives a certificate of the validity of the result. In this note, we studies the statistical efficiency of filters for cosphericity predicate with an assumption of regular distribution of the points. We prove that the expected value of the polynomial corresponding to the in sphere test is greater than epsilon with probability O(epsilon log 1/epsilon) improving the results of a previous paper by the same authors., Comment: 7 pages 2 figures presented at the 15th European Workshop Comput. Geom., 113--116, 1999 improve previous results (in other paper)
- Published
- 1999
- Full Text
- View/download PDF
42. Checking the Convexity of Polytopes and the Planarity of Subdivisions
- Author
-
Roberto Tamassia, Franco P. Preparata, Giuseppe Liotta, Olivier Devillers, Geometry, Algorithms and Robotics (PRISME), Inria Sophia Antipolis - Méditerranée (CRISAM), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), INRIA, School of Computing, Università degli Studi di Perugia = University of Perugia (UNIPG), Department of Computer Science (Brown University), and Brown University
- Subjects
Convex hull ,Control and Optimization ,[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH] ,Convex set ,Proper convex function ,MathematicsofComputing_NUMERICALANALYSIS ,EXACT ARITHMETIC ,Polytope ,0102 computer and information sciences ,Subderivative ,Computer Science::Computational Geometry ,[INFO.INFO-CG]Computer Science [cs]/Computational Geometry [cs.CG] ,01 natural sciences ,Combinatorics ,DELAUNAY TRIANGULATION ,TheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITY ,Convex polytope ,Convex combination ,COMPUTATIONAL GEOMETRY ,0101 mathematics ,ComputingMilieux_MISCELLANEOUS ,Mathematics ,ComputingMethodologies_COMPUTERGRAPHICS ,Discrete mathematics ,Convex analysis ,010102 general mathematics ,CONVEX HULL ,Computer Science Applications ,Computational Mathematics ,Computational Theory and Mathematics ,010201 computation theory & mathematics ,Geometry and Topology ,MathematicsofComputing_DISCRETEMATHEMATICS - Abstract
International audience; This paper considers the problem of verifying the correctness of geometric structures. In particular, we design simple optimal checkers for convex polytopes in two and higher dimensions, and for various types of planar subdivisions, such as triangulations, Delaunay triangulations, and convex subdivisions. Their performance is analyzed also in terms of the algorithmic degree, which characterizes the arithmetic precision required.
- Published
- 1998
- Full Text
- View/download PDF
43. Motion planning of legged robots: the spider robot problem
- Author
-
Jean-Daniel Boissonnat, Olivier Devillers, Franco P. Preparata, Leonbattista Donati, Geometry, Algorithms and Robotics (PRISME), Inria Sophia Antipolis - Méditerranée (CRISAM), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Department of Computer Science (Brown University), and Brown University
- Subjects
Robot kinematics ,business.industry ,Applied Mathematics ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Mobile robot ,[INFO.INFO-CG]Computer Science [cs]/Computational Geometry [cs.CG] ,Theoretical Computer Science ,Robot control ,Computational Mathematics ,Computational Theory and Mathematics ,Control theory ,Articulated robot ,Robot ,Computer vision ,Cartesian coordinate robot ,Geometry and Topology ,Artificial intelligence ,Motion planning ,Legged robot ,business ,Mathematics - Abstract
We consider the problem of planning motions of a simple legged robot called the spider robot. The robot is modelled as a point where all its legs are attached, and the footholds where the robot can securely place its feet consist of a set of n points in the plane. We show that the space F of admissible and stable placements of such robots has size Θ(n2) and can be constructed in O(n2 log n) time and O(n2) space. Once F has been constructed, we can efficiently solve several problems related to motion planning.
- Published
- 1995
- Full Text
- View/download PDF
44. Evaluation of a new method to compute signs of determinants
- Author
-
Franco P. Preparata, Mariette Yvinec, Olivier Devillers, J.-D. Boissonnat, Francis Avnaim, Geometry, Algorithms and Robotics (PRISME), Inria Sophia Antipolis - Méditerranée (CRISAM), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Department of Computer Science (Brown University), and Brown University
- Subjects
[INFO.INFO-CG]Computer Science [cs]/Computational Geometry [cs.CG] ,ComputingMilieux_MISCELLANEOUS ,Mathematics - Abstract
International audience
- Published
- 1995
- Full Text
- View/download PDF
45. Evaluating signs of determinants using single-precision arithmetic
- Author
-
Avnaim, Francis, Boissonnat, Jean-Daniel, Devillers, Olivier, Preparata, Franco, Yvinec, Mariette, Geometry, Algorithms and Robotics (PRISME), Inria Sophia Antipolis - Méditerranée (CRISAM), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Department of Computer Science (Brown University), Brown University, Laboratoire d'Informatique, Signaux, et Systèmes de Sophia Antipolis (I3S), Université Nice Sophia Antipolis (... - 2019) (UNS), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA), INRIA, and Université Nice Sophia Antipolis (1965 - 2019) (UNS)
- Subjects
PRECISION ,[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH] ,EXACT ARITHMETIC ,COMPUTATIONAL GEOMETRY - Abstract
We propose a method to evaluate signs of $2\times 2$ and $3\times 3$ determinants with $b$-bit integer entries using only $b$ and $(b+1)$-bit arithmetic respectively. This algorithm has numerous applications in geometric computation and provides a general and practical approach to robustness. The algorithm has been implemented and experimental results show that it slows down the computing time by only a small factor only with respect to floating-point calculation.
- Published
- 1994
46. Motion planning of legged robots : the spider robot problem
- Author
-
Boissonnat, Jean-Daniel, Devillers, Olivier, Preparata, Franco, Donati, Leonbattista, Geometry, Algorithms and Robotics (PRISME), Inria Sophia Antipolis - Méditerranée (CRISAM), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Department of Computer Science (Brown University), Brown University, and INRIA
- Subjects
[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH] ,ComputerApplications_COMPUTERSINOTHERSYSTEMS - Abstract
We consider the problem of planning motions of a simple legged robot called the spider robot. The robot is modelled as a point where all its legs are attached, and the footholds where the robot can securely place its feet consist of a set of n points in the plane. We show that the space of admissible and stable placements of such robots has size Q (n2) and can be constructed in O ( n2 log n) time and O (n2) space. Once has been constructed, we can efficiently solve several problems related to motion planning.
- Published
- 1992
47. Motion planning for a spider robot
- Author
-
Boissonnat, Jean-Daniel, Devillers, Olivier, Donati, Leonbattista, Preparata, Franco, Geometry, Algorithms and Robotics (PRISME), Inria Sophia Antipolis - Méditerranée (CRISAM), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Department of Computer Science (Brown University), and Brown University
- Subjects
[INFO.INFO-CG]Computer Science [cs]/Computational Geometry [cs.CG] ,ComputingMilieux_MISCELLANEOUS - Abstract
International audience
- Published
- 1992
48. Computing the Union of 3-Colored Triangles
- Author
-
Franco P. Preparata, Jean-Daniel Boissonnat, Olivier Devillers, Geometry, Algorithms and Robotics (PRISME), Inria Sophia Antipolis - Méditerranée (CRISAM), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Department of Computer Science (Brown University), Brown University, IFIP, Ce travail a été partiellement soutenu par Esprit Basic Research Action N° 3075 (ALCOM), CNES, et NSF, and INRIA
- Subjects
Convex hull ,Applied Mathematics ,[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH] ,Stability (learning theory) ,Boundary (topology) ,[INFO.INFO-CG]Computer Science [cs]/Computational Geometry [cs.CG] ,Theoretical Computer Science ,Combinatorics ,Set (abstract data type) ,Computational Mathematics ,Computational Theory and Mathematics ,Colored ,Geometry and Topology ,Motion planning ,Legged robot ,Time complexity ,ComputingMilieux_MISCELLANEOUS ,Mathematics - Abstract
International audience; Given is a set \s\ of $n$ points, each colored with one of $k \geq 3$ colours. We say that a triangle defined by three points of \s\ is 3-colored if its vertices have distinct colours. We prove in this paper that the problem of constructing the boundary of the union \ts\ of all such 3-colored triangles can be done in optimal $O(n \log n)$ time.
- Published
- 1991
- Full Text
- View/download PDF
49. Proving correctness of highly-concurrent linearisable objects
- Author
-
Viktor Vafeiadis, Maurice Herlihy, Marc Shapiro, Tony Hoare, Large-Scale Distributed Systems and Applications (Regal), Laboratoire d'Informatique de Paris 6 (LIP6), Université Pierre et Marie Curie - Paris 6 (UPMC)-Centre National de la Recherche Scientifique (CNRS)-Université Pierre et Marie Curie - Paris 6 (UPMC)-Centre National de la Recherche Scientifique (CNRS)-Inria Paris-Rocquencourt, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), INRIA, Max Planck Institute for Software Systems (MPI-SWS), Department of Computer Science (Brown University), Brown University, Microsoft Research [Cambridge] (Microsoft), and Microsoft Research
- Subjects
Correctness ,Record locking ,formel ,Computer science ,Concurrency ,[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH] ,02 engineering and technology ,LINEARISABILITY ,Software_PROGRAMMINGTECHNIQUES ,computer.software_genre ,Mathematical proof ,FORMAL VERIFICATION ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Concurrent computing ,[INFO]Computer Science [cs] ,SHARED-MEMORY CONCURRENCY ,Formal verification ,CONCURRENT PROGRAMMING ,Abstraction (linguistics) ,Programming language ,020207 software engineering ,RELY-GUARANTEE REASONING ,Software design pattern ,syn ,computer - Abstract
International audience; We study a family of implementations for linked lists using fine-grain synchronisation. This approach enables greater concurrency, but correctness is a greater challenge than for classical, coarse-grain synchronisation. Our examples are demonstrative of common design patterns such as lock coupling, optimistic, and lazy synchronisation. Although they are are highly concurrent, we prove that they are linearisable, safe, and they correctly implement a high-level abstraction. Our proofs illustrate the power and applicability of rely-guarantee reasoning, as well of some of its limitations. The examples of the paper establish a benchmark challenge for other reasoning techniques.
- Full Text
- View/download PDF
50. Stable placements for spider robots
- Author
-
Franco P. Preparata, Olivier Devillers, Leonbattista Donati, J.-D. Boissonnat, Geometry, Algorithms and Robotics (PRISME), Inria Sophia Antipolis - Méditerranée (CRISAM), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Department of Computer Science (Brown University), and Brown University
- Subjects
Spider ,Plane (geometry) ,Efficient algorithm ,Binary logarithm ,Space (mathematics) ,Topology ,[INFO.INFO-CG]Computer Science [cs]/Computational Geometry [cs.CG] ,Computer Science::Robotics ,Set (abstract data type) ,Combinatorics ,Simple (abstract algebra) ,Robot ,ComputingMilieux_MISCELLANEOUS ,Mathematics - Abstract
We study the problem of computing the set of admissible and stable placements of spider robots, a simple case of legged robots. The environment consists of a set of n points in the plane representing authorized footholds. We show that the space of admissible and stable placements of such robots has size t(n2) and can be constructed in O(n2 log n) time and O(n2) space. We give also efficient algorithms for several related problems.
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.