Results 11  20
of
51
A probabilistic analysis of some tree algorithms, in "Annals of Applied Probability
, 2005
"... In this paper a general class of tree algorithms is analyzed. It is shown that, by using an appropriate probabilistic representation of the quantities of interest, the asymptotic behavior of these algorithms can be obtained quite easily without resorting to the usual complex analysis techniques. Thi ..."
Abstract

Cited by 16 (5 self)
 Add to MetaCart
In this paper a general class of tree algorithms is analyzed. It is shown that, by using an appropriate probabilistic representation of the quantities of interest, the asymptotic behavior of these algorithms can be obtained quite easily without resorting to the usual complex analysis techniques. This approach gives a unified probabilistic treatment of these questions. It simplifies and extends some of the results known in this domain. 1. Introduction. A
On the AllPairs ShortestPath Algorithm Of Moffat and Takaoka
, 1997
"... We review how to solve the allpairs shortestpath problem in a nonnegatively Ž 2 weighted digraph with n vertices in expected time On log n.. This bound is shown to hold with high probability for a wide class of probability distributions on nonnegatively weighted digraphs. We also prove that, for ..."
Abstract

Cited by 12 (4 self)
 Add to MetaCart
We review how to solve the allpairs shortestpath problem in a nonnegatively Ž 2 weighted digraph with n vertices in expected time On log n.. This bound is shown to hold with high probability for a wide class of probability distributions on nonnegatively weighted digraphs. We also prove that, for a large class of probability distributions, �Ž n log n. time is necessary with high probability to compute shortestpath distances with respect to a single
Effective SupraClassifiers for Knowledge Base Construction
, 1999
"... In this work, we explore the use of the supraclassier framework in the construction of a classier knowledge base. Previously, we introduced this framework within which labels produced by old classiers are used to improve the generalization performance of a new classier for a dierent but related cla ..."
Abstract

Cited by 9 (7 self)
 Add to MetaCart
In this work, we explore the use of the supraclassier framework in the construction of a classier knowledge base. Previously, we introduced this framework within which labels produced by old classiers are used to improve the generalization performance of a new classier for a dierent but related classication task (Bollacker & Ghosh, 1998). We showed empirically that a simple Hamming nearest neighbor is superior to other techniques (e.g. MLP, decision trees, Naive Bayes, Combiners) as a supraclassier. Here, we describe theoretically how the probability that the Hamming nearest neighbor supraclassier will predict the true target class approaches certainty at an exponential rate as more classiers are reused. The scalability of the Hamming nearest neighbor with large numbers of previously created classiers makes it a good choice as a supraclassier in the application of building a repository of domain knowledge organized as a classier knowledge base. Key words: Knowledge Reus...
Probabilistic transforms for combinatorial urn models
 Combin. Probab. Comput
, 2002
"... In this paper, we present several probabilistic transforms related to classical urn models. These transforms render the dependent random variables describing the urn occupancies into independent random variables with appropriate distributions. This simplifies the analysis of a large number of proble ..."
Abstract

Cited by 8 (1 self)
 Add to MetaCart
In this paper, we present several probabilistic transforms related to classical urn models. These transforms render the dependent random variables describing the urn occupancies into independent random variables with appropriate distributions. This simplifies the analysis of a large number of problems for which a function under investigation depends on the urn occupancies. The approach used for constructing the transforms involves generating functions of combinatorial numbers. We also show, by using Tauberian theorems derived in this paper, that under certain conditions the asymptotic expressions of target functions in the transform domain are identical to the asymptotic expressions in the inverse–transform domain. Therefore, asymptotic information about certain statistics can be gained without evaluating the inverse transform. 1
Generating Random Benchmarks for Description Logics
 In Proceedings of DL'98
, 1998
"... this paper, we address the problem of generating ..."
Precise Definition Of Software Component Specifications
 Proceedings of the IFAC ComputerAided Control System Design Conference
, 1997
"... : A set of generic specification categories is presented which can be used to comprehensively define any software component within a certain class. With these categories as a template, a specific set of formal specifications can be generated for each component. Specifications for a particular compon ..."
Abstract

Cited by 7 (6 self)
 Add to MetaCart
: A set of generic specification categories is presented which can be used to comprehensively define any software component within a certain class. With these categories as a template, a specific set of formal specifications can be generated for each component. Specifications for a particular component (an algorithm that estimates the position and orientation of a physical object using visual sensing) have been defined in EXPRESS, an information modeling language. A few example natural language specifications are presented for this particular component. Keywords: Components, Computer vision, Formal languages, Formal specification, Software engineering, Software metrics, Software performance, Software specification, Software tools 1. INTRODUCTION The following is the software system development sequence that this research addresses: . A new software component is created, and the component developer (i.e., the vendor) wants see it widely used . A software systems developer (i.e., the use...
An Efficient Algorithm for the Approximate Median Selection Problem
 in Proceedings of the Fourth Italian Conference, CIAC 2000
, 1999
"... We present an efficient algorithm for the approximate median selection problem. The algorithm works inplace ..."
Abstract

Cited by 7 (1 self)
 Add to MetaCart
We present an efficient algorithm for the approximate median selection problem. The algorithm works inplace
Optimal average case sorting on arrays
 Proceedings of the 12th Symposium on Theoretical Aspects of Computer Science, number 900 in Lecture Notes in Computer Science
, 1995
"... Abstract. We present algorithms for sorting and routing on twodimensional meshconnected parallel architectures that are optimal on average. If one processor has many packets then we asymptotically halve the up to now best running times. For a load of one optimal algorithms are known for the mesh. ..."
Abstract

Cited by 7 (2 self)
 Add to MetaCart
Abstract. We present algorithms for sorting and routing on twodimensional meshconnected parallel architectures that are optimal on average. If one processor has many packets then we asymptotically halve the up to now best running times. For a load of one optimal algorithms are known for the mesh. We improve this to a load of eight without increasing the running time. For tori no optimal algorithms were known even for a load of one. Our algorithm is optimal for every load. Other architectures we consider include meshes with diagonals and reconfigurable meshes. Furthermore, the method applies to meshes of arbitrary higher dimensions and also enables optimal solutions for the routing problem. 1 Introduction We present deterministic algorithms that sort and route on meshconnected computers fast on average. For important, fundamental classes of problems (so called hh relations) we completely solve the problem in that sense that our approach is optimal for all cases. (We present matching lower bounds.) A twodimensional meshconnected computer is a processor array, where each processor has one bidirectional connection to each of its four neighbors. Meshes are a promising parallel architecture due to their scalability, their regular interconnection structure with its locality of communication, and since they need only linear space in the VLSImodel. We also consider meshes with wraparound connections, also known as tori, meshes with additional diagonal connections, and reconfigurable meshes.
Toward a usable theory of Chernoff Bounds for heterogeneous and partially dependent random variables
, 1992
"... Let X be a sum of real valued random variables and have a bounded mean E[X]. The generic ChernoffHoeffding estimate for large deviations of X is: P rfX \GammaE[X ] ag min 0 e \Gamma(a+E[X]) E[e X ], which applies with a 0 to random variables with very small tails. At issue is how to use this ..."
Abstract

Cited by 6 (1 self)
 Add to MetaCart
Let X be a sum of real valued random variables and have a bounded mean E[X]. The generic ChernoffHoeffding estimate for large deviations of X is: P rfX \GammaE[X ] ag min 0 e \Gamma(a+E[X]) E[e X ], which applies with a 0 to random variables with very small tails. At issue is how to use this method to attain sharp and useful estimates. We present a number of ChernoffHoeffding bounds for sums of random variables that may have a variety of dependent relationships and that may be heterogeneously distributed. AMS classifications 60F10, Large deviations, 68Q25 Analysis of algorithms, 62E17, Approximations to distributions (nonasymptotic), 60E15, Inequalities. Key words: Hoeffding bounds, Chernoff bounds, dependent random variables, Bernoulli trials. This research was supported, in part, by grants NSFCCR8902221, NSFCCR8906949, and NSFCCR9204202. 1 Summary In the analysis of probabilistic algorithms, some of the following problems may arise, possibly in complex combinations....