Ali Abedi, Mahdi Hasanzadeh, Lobat Tayebi
Hasil untuk "cs.CG"
Menampilkan 20 dari ~88972 hasil · dari DOAJ, CrossRef
Yuya Takahashi, Marc Salvati, Andreas Bauer
Linjing Mu, Stefanie D. Krämer, Geoffrey I. Warnock et al.
Abstract Purpose Clinical positron emission tomography (PET) imaging of the presynaptic norepinephrine transporter (NET) function provides valuable diagnostic information on sympathetic outflow and neuronal status. As data on the NET-targeting PET tracers [11C]meta-hydroxyephedrine ([11C]mHED) and [18F]LMI1195 ([18F]flubrobenguane) in murine experimental models are scarce or lacking, we performed a detailed characterization of their myocardial uptake pattern and investigated [11C]mHED uptake by kinetic modelling. Methods [11C]mHED and [18F]LMI1195 accumulation in the heart was studied by PET/CT in FVB/N mice. To test for specific uptake by NET, desipramine, a selective NET inhibitor, was administered by intraperitoneal injection. [11C]mHED kinetic modelling with input function from an arteriovenous shunt was performed in three mice. Results Both tracers accumulated in the mouse myocardium; however, only [11C]mHED uptake was significantly reduced by excess amount of desipramine. Myocardial [11C]mHED uptake was half-saturated at 88.3 nmol/kg of combined mHED and metaraminol residual. After [11C]mHED injection, a radiometabolite was detected in plasma and urine, but not in the myocardium. [11C]mHED kinetics followed serial two-tissue compartment models with desipramine-sensitive K1. Conclusion PET with [11C]mHED but not [18F]LMI1195 provides information on NET function in the mouse heart. [11C]mHED PET is dose-independent in the mouse myocardium at < 10 nmol/kg of combined mHED and metaraminol. [11C]mHED kinetics followed serial two-tissue compartment models with K1 representing NET transport. Myocardial [11C]mHED uptake obtained from PET images may be used to assess cardiac sympathetic integrity in mouse models of cardiovascular disease.
Idan Eisner, Alek Vainshtein
no abstract
Jeffrey Gaither, Yushi Homma, Mark Sellke et al.
We use probabilistic and combinatorial tools on strings to discover the average number of 2-protected nodes in tries and in suffix trees. Our analysis covers both the uniform and non-uniform cases. For instance, in a uniform trie with $n$ leaves, the number of 2-protected nodes is approximately 0.803$n$, plus small first-order fluctuations. The 2-protected nodes are an emerging way to distinguish the interior of a tree from the fringe.
Yongwook Choi, Charles Knessl, Wojciech Szpankowski
In a recently proposed graphical compression algorithm by Choi and Szpankowski (2009), the following tree arose in the course of the analysis. The root contains n balls that are consequently distributed between two subtrees according to a simple rule: In each step, all balls independently move down to the left subtree (say with probability $p$) or the right subtree (with probability 1-$p$). A new node is created as long as there is at least one ball in that node. Furthermore, a nonnegative integer $d$ is given, and at level $d$ or greater one ball is removed from the leftmost node before the balls move down to the next level. These steps are repeated until all balls are removed (i.e., after $n+d$ steps). Observe that when $d=∞$ the above tree can be modeled as a $\textit{trie}$ that stores $n$ independent sequences generated by a memoryless source with parameter $p$. Therefore, we coin the name $(n,d)$-tries for the tree just described, and to which we often refer simply as $d$-tries. Parameters of such a tree (e.g., path length, depth, size) are described by an interesting two-dimensional recurrence (in terms of $n$ and $d$) that – to the best of our knowledge – was not analyzed before. We study it, and show how much parameters of such a $(n,d)$-trie differ from the corresponding parameters of regular tries. We use methods of analytic algorithmics, from Mellin transforms to analytic poissonization.
Eugenijus Manstavičius
We prove a total variation approximation for the distribution of component vector of a weakly logarithmic random assembly. The proof demonstrates an analytic approach based on a comparative analysis of the coefficients of two power series.
Thomas Feierl
We derive asymptotics for the moments of the height distribution of watermelons with $p$ branches with wall. This generalises a famous result by de Bruijn, Knuth and Rice on the average height of planted plane trees, and a result by Fulmek on the average height of watermelons with two branches.
Daniel Berend, Steven S. Skiena, Yochai Twitto
An $f(n)$ $\textit{dominance bound}$ on a heuristic for some problem is a guarantee that the heuristic always returns a solution not worse than at least $f(n)$ solutions. In this paper, we analyze several heuristics for $\textit{Vertex Cover}$, $\textit{Set Cover}$, and $\textit{Knapsack}$ for dominance bounds. In particular, we show that the well-known $\textit{maximal matching}$ heuristic of $\textit{Vertex Cover}$ provides an excellent dominance bound. We introduce new general analysis techniques which apply to a wide range of problems and heuristics for this measure. Certain general results relating approximation ratio and combinatorial dominance guarantees for optimization problems over subsets are established. We prove certain limitations on the combinatorial dominance guarantees of polynomial-time approximation schemes (PTAS), and give inapproximability results for the problems above.
Maxime Crochemore, Costas S. Iliopoulos, M. Sohel Rahman
In this paper, we study a restricted version of the position restricted pattern matching problem introduced and studied by Mäkinen and Navarro [Position-Restricted Substring Searching, LATIN 2006]. In the problem handled in this paper, we are interested in those occurrences of the pattern that lies in a suffix or in a prefix of the given text. We achieve optimal query time for our problem against a data structure which is an extension of the classic suffix tree data structure. The time and space complexity of the data structure is dominated by that of the suffix tree. Notably, the (best) algorithm by Mäkinen and Navarro, if applied to our problem, gives sub-optimal query time and the corresponding data structure also requires more time and space.
Gilbert Lee, Frank Ruskey, Aaron Williams
We study the Hamming distance from polynomials to classes of polynomials that share certain properties of irreducible polynomials. The results give insight into whether or not irreducible polynomials can be effectively modeled by these more general classes of polynomials. For example, we prove that the number of degree $n$ polynomials of Hamming distance one from a randomly chosen set of $\lfloor 2^n/n \rfloor$ odd density polynomials, each of degree $n$ and each with non-zero constant term, is asymptotically $(1-e^{-4}) 2^{n-2}$, and this appears to be inconsistent with the numbers for irreducible polynomials. We also conjecture that there is a constant $c$ such that every polynomial has Hamming distance at most $c$ from an irreducible polynomial. Using exhaustive lists of irreducible polynomials over $\mathbb{F}_2$ for degrees $1 ≤ n ≤ 32$, we count the number of polynomials with a given Hamming distance to some irreducible polynomial of the same degree. Our work is based on this "empirical" study.
Guy Louchard, Helmut Prodinger, Mark Daniel Ward
We consider a sequence of $n$ geometric random variables and interpret the outcome as an urn model. For a given parameter $m$, we treat several parameters like what is the largest urn containing at least (or exactly) $m$ balls, or how many urns contain at least $m$ balls, etc. Many of these questions have their origin in some computer science problems. Identifying the underlying distributions as (variations of) the extreme value distribution, we are able to derive asymptotic equivalents for all (centered or uncentered) moments in a fairly automatic way.
Rafik Aguech, Nabil Lasmar, Hosam Mahmoud
We investigate distances between pairs of nodes in digital trees (digital search trees (DST), and tries). By analytic techniques, such as the Mellin Transform and poissonization, we describe a program to determine the moments of these distances. The program is illustrated on the mean and variance. One encounters delayed Mellin transform equations, which we solve by inspection. Interestingly, the unbiased case gives a bounded variance, whereas the biased case gives a variance growing with the number of keys. It is therefore possible in the biased case to show that an appropriately normalized version of the distance converges to a limit. The complexity of moment calculation increases substantially with each higher moment; A shortcut to the limit is needed via a method that avoids the computation of all moments. Toward this end, we utilize the contraction method to show that in biased digital search trees the distribution of a suitably normalized version of the distances approaches a limit that is the fixed-point solution (in the Wasserstein space) of a distributional equation. An explicit solution to the fixed-point equation is readily demonstrated to be Gaussian.
Mikhail Menshikov, Dimitri Petritis, Serguei Popov
We report on the asymptotic behaviour of a new model of random walk, we term the bindweed model, evolving in a random environment on an infinite multiplexed tree.The term multiplexed means that the model can be viewed as a nearest neighbours random walk on a tree whose vertices carry an internal degree of freedom from the finite set $\{1,...,d\}$, for some integer $d$. The consequence of the internal degree of freedom is an enhancement of the tree graph structure induced by the replacement of ordinary edges by multi-edges, indexed by the set $\{1,...,d\} × \{1,...,d\}.$ This indexing conveys the information on the internal degree of freedom of the vertices contiguous to each edge. The term random environment means that the jumping rates for the random walk are a family of edge-indexed random variables, independent of the natural filtration generated by the random variables entering in the definition of the random walk; their joint distribution depends on the index of each component of the multi-edges. We study the large time asymptotic behaviour of this random walk and classify it with respect to positive recurrence or transience in terms of a specific parameter of the probability distribution of the jump rates.This classifying parameter is shown to coincide with the critical value of a matrix-valued multiplicative cascade on the ordinary tree (i.e.the one without internal degrees of freedom attached to the vertices) having the same vertex set as the state space of the random walk. Only results are presented here since the detailed proofs will appear elsewhere.
Y. Baryshnikov, E. Coffman, J. Feng et al.
The Additive-Increase-Multiplicative Decrease (AIMD) algorithm is an effective technique for controlling competitive access to a shared resource. Let $N$ be the number of users and let $x_i(t)$ be the amount of the resource in possession of the $i$-th user. The allocations $x_i(t)$ increase linearly until the aggregate demand $\sum_i x_i(t)$ exceeds a given nominal capacity, at which point a user is selected at a random time and its allocation reduced from $x_i(t)$ to $x_i(t)/ \gamma$ , for some given parameter $\gamma >1$. In our new, generalized version of AIMD, the choice of users to have their allocations cut is determined by a selection rule whereby the probabilities of selection are proportional to $x_i^{\alpha} (t)/ \sum_j x_j^{\alpha}$, with $\alpha$ a parameter of the policy. Variations of parameters allows one to adjust fairness under AIMD (as measured for example by the variance of $x_i(t)$) as well as to provide for differentiated service. The primary contribution here is an asymptotic, large-$N$ analysis of the above nonlinear AIMD algorithm within a baseline mathematical model that leads to explicit formulas for the density function governing the allocations $x_i(t)$ in statistical equilibrium. The analysis yields explicit formulas for measures of fairness and several techniques for supplying differentiated service via AIMD.
Mihai Furis, Paweł Hitczenko, Jeremy Johnson
On modern computers memory access patterns and cache utilization are as important, if not more important, than operation count in obtaining high-performance implementations of algorithms. In this work, the memory behavior of a large family of algorithms for computing the Walsh-Hadamard transform, an important signal processing transform related to the fast Fourier transform, is investigated. Empirical evidence shows that the family of algorithms exhibit a wide range of performance, despite the fact that all algorithms perform the same number of arithmetic operations. Different algorithms, while having the same number of memory operations, access memory in different patterns and consequently have different numbers of cache misses. A recurrence relation is derived for the number of cache misses and is used to determine the distribution of cache misses over the space of WHT algorithms.
Cary Cherng, Richard E. Ladner
New cache-oblivious and cache-aware algorithms for simple dynamic programming based on Valiant's context-free language recognition algorithm are designed, implemented, analyzed, and empirically evaluated with timing studies and cache simulations. The studies show that for large inputs the cache-oblivious and cache-aware dynamic programming algorithms are significantly faster than the standard dynamic programming algorithm.
Amr Elmasry
Given a set $\mathcal{S}$ with real-valued members, associated with each member one of two possible types; a multi-partitioning of $\mathcal{S}$ is a sequence of the members of $\mathcal{S}$ such that if $x,y \in \mathcal{S}$ have different types and $x < y$, $x$ precedes $y$ in the multi-partitioning of $\mathcal{S}$. We give two distribution-sensitive algorithms for the set multi-partitioning problem and a matching lower bound in the algebraic decision-tree model. One of the two algorithms can be made stable and can be implemented in place. We also give an output-sensitive algorithm for the problem.
Guy Louchard
Random compositions of integers are used as theoretical models for many applications. The degree of distinctness of a composition is a natural and important parameter. A possible measure of distinctness is the number $X$ of distinct parts (or components). This parameter has been analyzed in several papers. In this article we consider a variant of the distinctness: the number $X(m)$ of distinct parts of multiplicity m that we call the $m$-distinctness. A firstmotivation is a question asked by Wilf for random compositions: what is the asymptotic value of the probability that a randomly chosen part size in a random composition of an integer $ν$ has multiplicity $m$. This is related to $\mathbb{E}(X(m))$, which has been analyzed by Hitczenko, Rousseau and Savage. Here, we investigate, from a probabilistic point of view, the first full part, the maximum part size and the distribution of $X(m)$. We obtain asymptotically, as $ν → ∞$, the moments and an expression for a continuous distribution $φ$ , the (discrete) distribution of $X(m,ν )$ being computable from $φ$ .
Saibal Mitra, Bernard Nienhuis
We consider random paths on a square lattice which take a left or a right turn at every vertex. The possible turns are taken with equal probability, except at a vertex which has been visited before. In such case the vertex is left via the unused edge. When the initial edge is reached the path is considered completed. We also consider families of such paths which together cover every edge of the lattice once and visit every vertex twice. Because these paths may touch but not intersect each other and themselves, we call them osculating walks. The ensemble of such families is also known as the dense $O(n=1)$ model. We consider in particular such paths in a cylindrical geometry, with the cylindrical axis parallel with one of the lattice directions. We formulate a conjecture for the probability that a face of the lattice is surrounded by m distinct osculating paths. For even system sizes we give a conjecture for the probability that a path winds round the cylinder. For odd system sizes we conjecture the probability that a point is visited by a path spanning the infinite length of the cylinder. Finally we conjecture an expression for the asymptotics of a binomial determinant
Halaman 5 dari 4449