An Error-Resilient Arithmetic Coding Algorithm for Compressed Meshes Zhi-Quan Cheng, Bao Li, Kai Xu, Yan-Zhen Wang, Gang Dang, Shi-Yao Jin PDL Lab., NUDT University, P.R. China [email protected] Abstract The effort of on-the-fly accessing 3D contents over the internet has been done in recent years. And 3D streaming has been investigated to represent 3D models in the compact format and progressively transmit them on the limited-bandwidth and lossy channel. In the paper, an error resilient 3D mesh coding algorithm is presented, which employs an extended multiple quantization (EMQ) arithmetic coder method, inspired by the error-resilient JPEG 2000 image coding standards. With periodic arithmetic coder restarting and termination markers, the error resilient EMQ coder divides bit stream into little independent parts and enables basic transmission error containment. Furthermore, the EMQ coder has the intrinsic capacity of handling noise by using the maximum a posteriori (MAP) decoder. Experiments show that the method improves the mesh transmission quality in a simulated network environment.

1. Introduction Now, the technologies for transmission of 3D models face an increased demand in professional and private scenarios. 3D mesh compression [1] can be employed to reduce the file size and end-to-end delay in the compact single-resolution [2] or progressive representation [3]. Progressive transmission is scalable with respect to both network bandwidth and the user’s quality measurement. However, most of the type algorithms have assumed an error-free transmission channel, or storage medium for that matter. This is a fairly un-reasonable assumption when the network layer has weak error protection. If the network layer does not provide strong error protection, the decoded model can be severely affected. In fact, the real internet is lossy based on UDP/IP protocol, and has limited bandwidth. To meet this gap, error control schemes must be applied. Arithmetic coding, which has been widely used in

mesh compression, is very sensitive to bit errors. An error bit will, at some point, affect the interval test, thus an incorrect symbol will be decoded. All sequent symbols will also be erroneously decoded as the arithmetic coder gets out of sync. Even if the arithmetic coder was removed, the coefficient bit modeling, which generates the coded symbols, is also sensible to errors and can get out of sync after a bit error. A single bit error will thus alter all the following coded data to useless. For instance, if the error occurs in the middle of the bit stream, half of the model is lost. Even worse, if the error is not detected, arbitrary data is decoded and a model that has no resemblance to the original is decoded. Missing packets have a similar effect. In the following sections we will present methods that allow limiting the extent up to which bit errors affect the model data. These methods are inspired by the error resilience mechanisms in JPEG 2000 [4] and similar image or video coding standards, which rely on data partitioning. A subset of the extensions also enables other functionality such as random access and on-the-fly reordering, as we later explain. We should note that the proposed extensions are intended only for modest bit error rates (BER), such as the residual errors left by network or channel level forward error correction (FEC). In the paper, error detection is achieved through checks in the residual redundancy on the coded data and insertion of segment markers. The mechanism is shown to provide effective means to detect and contain transmission errors. It should be noted that the bitstream header contains very sensible information: number of surface, bounding box size and offset, codec options, predictor coefficients and quantized step sizes. It is therefore of paramount importance that its transmission be error free. As the size of the header is very small, it is feasible to apply strong error correcting codes and automatic repeat request (ARQ) technique to guarantee proper decoding with only minimal cost. Hereafter, it is assumed that the header is

transmitted without any error. The paper is organized as follow. Section 2 summarizes the related error-resilient transmission methods. Section 3 describes our encoding algorithm, which consists of data partitioning and basic error detection. In Section 4, we evaluate the error resilience of the proposed algorithm. Finally, we conclude this paper in section 5.

2. Related works Since Bajaj et al. [5] first proposed an error-resilient streaming method for compressed VRML models, many algorithms have been developed to robustly transmit 3D meshes. The error control schemes can be broadly classified into three categories: sender-based, network-based, and receiver-based. Sender-based error control. The sender estimates the channel resources (loss ratio) and protects the bitstream by adding redundant bits to be able to recover lost data on the client side. The method proposed by Bajaj et al. [5] is a typical sender-based error control way, where the encoded bit-stream is divided into layers according to the depth-first order of the vertices. As a result, each layer is independent of all other parts of the model and losing any layer will not affect the decoding of other layers. Subsequently, Yan et al. [6][7] finish their error resilient coding of 3D models by using the mesh segmentation scheme to prevent channel error propagation. While the series of algorithms, introduced by AI-Regib et al.[8][9], are scalable to both channel bandwidth and channel error characteristics. The bit-budget allocation method assigns an optimal FEC bit budgets, and distributes the error-protection bits among the transmitted layers to maximize the expected decoded model quality. Their experiments showed that the quality of the decoded model degrades more gracefully as the packet-loss rate increase. Since sender-based methods are highly effective [10] and they require little processing on the client size, our algorithm is among them. Network-based error control. Reliable transport TCP protocol has been the most commonly used on the Internet, and it is an example of this approach. However, TCP is not applicable for the time-sensitive applications due to its retransmission and congestion control mechanisms. For example, considering the case when a client requests a 3D model to be downloaded within a limited time, if the channel suffers from packet losses, then many TCP packets will be lost. Thus, unfortunately, it increases the download time. On the other hand, UDP are streaming friendly but not reliable. Therefore, AI-Regib et al. [11] proposed 3TP

protocol, which is a hybrid protocol to take advantage of both TCP and UDP. They showed that by intelligently selecting certain parts of the 3D data transmitted via TCP and others via UDP, the minimum distortion and delay should be obtained. Moreover, they showed that the structural data affects distortion of the reconstructed mesh more than the geometric data does. Li and Prabhakaran [12] proposed a generic 3D middleware between the 3D application layer and the transport layer for the transmission of triangle based progressively compressed 3D models. The middleware could consider end user hardware capabilities to effectively save the data size for network delivery, and introduced a minimum cost dynamic reliable set selectors to choose the transport protocol for each sub-layer depending on the relative importance and real-time network traffic. Receiver-based error control. The visual quality of corrupted 3D meshes can be improved by concealing or interpolating lost regions. In 3D data processing, error concealment can be considered as hole-filling [13] and surface reconstruction [14] problem. Such methods exploits the smoothness properties of the model in recovering lost parts, and they generally do not add any redundant bits. Usually, receiver-based algorithms work independently of the channel behavior and they require fairly high computational power at the client to perform processing in a timely fashion. Bischoff and Kobbelt [15] exploited the geometry coherence of the received data. The model at the sender was re-sampled to ensure such coherence between samples, and on the client side, the received samples were used to construct an approximation of the original 3D model.

3. Error Resilient Coding Algorithm Our objective is to design an error-resilient transmission method that is respect to channel error. In the paper, we utilize our progressive degree-driven algorithm [16] to compress the 3D models. The improved method iteratively applies the valence-driven decimating conquest and the cleaning conquest in pair to achieve connectivity compression. And in the geometrical compression, we use the barycenter prediction and the local approximate Frenet coordinate frame to separate normal and tangential components to further reduce the bit rates. Especially, the quantization in tangential components is less than the normal, since they has less contribution to the reconstructed model.

3.1. Standard MQ Coding

MQ coder [4] keeps the two features of the Q-coder in IBM’s Adaptive Bilevel Image Compression(ABIC): multiplication-free approximation and bit stuffing, and integrates conditional exchange and the Bayesian learning of probability-estimation state machine. The input of MQ coder is D and CX. D = {d0,…, dL-1}, corresponds to a binary code, and CX = {x0,…, xL-1} is the context of D. MQ coder recursively partitions the probability interval: at each time when the coder receives D, the interval is split into two subintervals(Fig. 1. a). In MQ coders, the decision bits D is not coded by 0 and 1, but classified into MPS(Most probable symbol) and LPS(Least probable symbol). If Qe is the probability of LPS, then the probability of MPS, referred as Pe, equals to 1−Qe. The arithmetic coder partitions the current interval into mostprobable-interval and least-probable-interval. The symbols A and C are used to denote the current interval, corresponding to the lower limit and A the length of current interval, respectively. Thus the mostprobable-interval can be expressed as [C+AQe,C+A], and [C,C+AQe] for the least-probable-interval. To avoid multiplications, the length of the interval, A, is guarantee to be in the range 0.75≤A<1, so AQe can be approximated by Qe. Then now the most-probableinterval can be denoted by [C+AQe,C+A], and [C, C+AQe] for the least-probable-interval. The following equations can be induced: MPS coding: Ci+1=Ci+Qe (1) (2) Ai+1=Ai−Qe LPS coding: Ci+1=Ci (3) (4) Ai+1=Qe If the data to be coded is MPS, then the mostprobable-interval is selected to be the current interval of next iteration coding. Similarly, if the data to be coded is LPS, then the least-probable-interval is selected to be the current interval of next iteration coding. Although arbitrary value of current interval can be used to denote coding data, C should be outputted after coding and delivered as the result of compression. In the same way, the arithmetic decoder can determine whether the inputted bit-stream belongs to most-probable-interval or least-probable-interval, based on the bit-stream itself and CX, then carries decompression on the data.

3.2. Extended Partitioning

MQ

coder

with

Data

The major problem with respect to error-prone transmission is that a model is coded as a single unit and a single bit error makes all the subsequent data unusable. A progressively compressed mesh has inherent data partitioning, as different multi-resolution levels can be independently coded. Even if the multiresolution surfaces were handled independently by the prediction and coefficient bit modeling stages, they are coded in the same arithmetic coder bit-stream. This is in general beneficial, in particular to models with small surfaces, since the adaptive arithmetic coder processes enough data to accurately learn its statistics. For error resilience this is however catastrophic. The arithmetic coder needs therefore to be periodically terminated and restarted. The overall bit-stream will be hence made of independent arithmetic coder bit-streams that are concatenated together. We choose to restart the arithmetic coder every level, and exploit two special features of the MQ arithmetic coder. On the one hand, MQ coders can be extended by the introduction of a forbidden region with probability Qf. The modified MQ is referred as EMQ(extended multiply quantization). As shown in Fig. 1. b, the probability interval is partitioned into Qf, LPS and MPS, and the lower limit C is adjusted. Obviously, at each iteration Qf is added to C, in order to skip the forbidden region. The encoder complexity is almost the same as standard MQ, since only one supplementary summation is needed. It is more important that the forbidden region allows for error detection at the decoder side, which is able to stop decoding as soon as the received code Ci falls into the forbidden region, Ci
A Qf

Qe

C

LPS

MPS

a)Standard MQ Coder

C

Qe LPS

MPS

b) EMQ Coder

Figure 1. Probability intervals in MQ and EMQ coder. On the other hand, we exploit the termination makers of the MQ coder. The MQ coder never generates 2-byte words in the range 0xFF90 to 0xFFFF, in hexadecimal. These sequences are denoted

termination makers. When the decoder encounters a termination marker it locks into a mode where it behaves as if the bit-stream continued with an infinite sequence of repeatedly 1 bits. In this mode no more bit-stream data is consumed. Each time the MQ coder is to be restarted flush its internal state and include a termination marker, just before starting. Since the termination markers can not be emulated by coded data, unless a bit error synthesizes one, a decoder can identify the individual bit-stream segments generated by the MQ coder. Since there are a fair number of different termination markers we successively use the ones in the 0xFF90 to 0xFFCF range to signal a sequence index with period 64(every 100 bytes, for example). When the last surface is coded we use a special maker, 0xFFF0, to signal the end of bit-stream, which is depicted in Fig. 2. Note that a termination marker also included right after the bit-stream header and before the first surface. This allows to detecting packet lossless at the start of the bit-stream. The average cost of including a marker is 3.5 bytes, since two bytes are required for the marker and 1.5 bytes are consumed when flushing the internal MQ coder state. 100byte

100byte

0xFFF0 0xFF90 +0xFFF +0xFFF

0xFF91 +0xFFF

100byte

100byte 100byte

0xFFCE 0xFFCF 0xFFF0 +0xFFF +0xFFF +0xFFF

Figure 2. Bit-stream termination markers.

with

100byte

0xFF90 +0xFFF

0xFF91 +0xFFF

periodic

The decoder periodically checks the received code. If the specific termination markers can’t be found at the destined positions, errors in the transmission will be figured out. Whenever an error resilient decoder detects an error it will locate the next bit-stream segment by searching for the next termination marker. It can also use the sequence index and end of bit-stream markers to detect packet loss and/or makers that have been affected by bit errors. To gain basis error detection, we can combine the two methods aforementioned together. More specifically, we can further partition the bit stream by inserting periodic termination markers in EMQ. What is more important, that this EMQ coder can be applied into any existing 3D geometric compression algorithm, and the incurred overhead is very small. For instance, we replace the adaptive arithmetic coder [18] in [16], and collect the coding overhead with different models, under two different quantization precisions(δ), 10-3 and 10-4. The result is listed in Table 1. We assign Qf to 0.05 for all models, and the length of interval is 100 bytes.

Table 1 Overhead due to error-detection coding in EMQ Vertex Qf Number fandisk 6,475 0.05 horse 19,851 0.05 david 127,465 0.05 Model

Interval Len. 100B 100B 100B

Overhead (δ=10-3) 11.8% 10.7% 10.5%

Overhead (δ=10-4) 10.4% 10.1% 10.1%

3.3. The MAP Decoding of EMQ The error-resilient transmission would not be effectively improved by simply adoption of automatic repeat request (ARQ) technique. Inspired by the decoding scheme of image transmission [19], we propose an EMQ decoding method with error correction capability, which is described as follows. Based on the CX, decoder looks up the index table to get the probability index and MPS. Then the decoder looks up the Q table to get Qe, next MPS and next LPS, based on the probability index. Finally, the decoder determines the A, C and Qe of current interval, and then decodes MPS or LPS. When decoding MPS or LPS, sometimes the compressed data needs to be read or normalized. Bit plane decoder computes the next CX, according to the delivered data, and passes it to arithmetic decoder. This process repeats until all the data is decoded. We adopt the maximum a posteriori (MAP) in decoding. More specifically, when the decoder receives the transmitted data R, which may be corrupted by channel noise, it estimates the maximum conditional probability P(C/R) of the original data C. Because P(C/R) is computed after R is received, we can refer it as a posteriori probability(APP). So the first task of decoder is to estimate the most correct code C’: C’=argmaxCP(C/R) (5) Here, P(C/R)∝P(R/C)P(D); P(R/C) is the transition probability of the channel, and it depends on the adopted channel model, e.g. in our simulation the BSC or the AWGN channel; P(D) is the a priori probability of the decision bits from C, and it can be evaluated based on the input bits D and corresponding context CX: L-1 P(D)= (6) P(di ,xi ) i=0 Fig. 3 is decoding tree used for search the most correct code C’, which represents all the possible code sequences of length N. The bit index j=0,…,N-1 is along the horizontal axis; each node of the tree corresponds to a certain EMQ decoding state σj, i.e. the context and the APP values in the j-th the iteration. Each transition between two nodes is associated with a



decoding step. For example, at the j-th level of the decoding tree, the two departing transitions are labeled with the APPs cj’=0 and cj’=1, respectively. Thus the decoder can obtain decoded bit dj, according to the context xj. If an error is detected in a branch, the branch will be pruned. Otherwise, the decoder will turn into the next state, σj+1. It is clearly that the goal of decoder is to pick up the path with maximum APP.

σ 0j +1 c 'j = 0 x 0j / d 0j

σj

c 'j = 1 x1j / d 1j

j-1

Figure 3. correction

Binary

Table 2. Error correction simulation results of EMQ

σ 1j +1

j

j+1

tree

used

BER = 10-4

for

error

3.4. Simulation Results The error resilience of the proposed algorithm is evaluated on several 3D meshes, based on a network test-bed that allows us to emulate the network behavior of congested links. The test-bet described by Fig. 4, consists of a bridge machine (BRG), two user machine (USnd, URcv), two background hosts (USnd, URcv), and two 100 Mbps switches (SW1, SW2). USnd and URcv enable TCP window scaling and set the read/write buffer size to 8 million bytes. The two background hosts are used to generate background noise traffic across the bridge, whose configuration allows the use of the machine to simulate WAN characteristics for packets between SW1 and SW2. The background hosts generate a pair of UDP components, a noise sender and a noise receiver, which simulate the network properties of a large number of external applications, communication over a shared data link. The noise sender BSnd sends UDP packets of size 1400 bytes to the BRcv, sleeping for a random amount of time before the next packet. USnd

URcv SW1

BSnd

BRG

We test the MAP decoding algorithm in a wireless 3G network. Take the david model in [16] as an example, whose connectivity compression rate and geometric compression rate is 5.9bpv and 15.6bpv, respectively. The model is transmitted in base station controller (BSC) channel and additive white Gaussian noise(AWGN) channel ,with two different bit error rates (BER) , 10-3 and 10-4. Table 2 is the error correction results of EMQ, under different configurations. Qf can be 0.005, 0.02, 0.05 and 0.08. The length of interval separated by termination marks is 100 bytes. The results is estimated by peak signal to noise ratio(PSNR), computed as linear average of the mean square error(MSE) over 100 independent simulations.

SW2 BRcv

Figure 4. Test environment components

BER = 10-3

Qf

BSC

AWGN

BSC

AWGN

0.005

27.7

36.5

19.4

34.5

PSNR 36.6

0.02

35.4

36.1

26.6

35.5

36.2

0.05

34.9

35.2

31.3

35.1

35.3

0.08

34.4

34.4

33.1

34.3

34.5

Our very simple error detection algorithm proves to be surprisingly effective, in particular for meshes with uncomplicated surface, as the most severe errors are detected. Examples of decoded models are shown in Fig. 4 for BER of 10-4. The decoder simply drops a surface when it detects an error. We can see that the severely distorted surfaces are in general avoided by this simple error detection mechanism. Occasionally, some severe errors go undetected and result in highly distorted surfaces. Nevertheless, we should point that since the length of the bit-stream is small for some models, very often no errors will hit the bit-stream and they will be perfectly decoded.

4. Conclusion We presented a novel algorithm for error resilient coding of 3D meshes, after reviewing error control schemes of robust 3D model transmission over network. The algorithm makes use of an extended multiple quantization (EMQ) arithmetic coder method, inspired by the error-resilience mechanisms presented in JPEG 2000 image coding standards. The encoder uses a shape adaptive mesh segmentation scheme to alleviate the effect of error propagation. An input mesh surface is coarsely divided into parts, and each part is further progressively compressed by the EMQ coder with periodic arithmetic restarting and terminating

markers to enable transmission error containment. We believe that much room remained for the further improvement. Simple heuristics should be added to asses the required amount of splitting, given the channel bit error rate and the application tolerable surface loss probability. Error concealment strategies more elaborate than simple surface discarding should also be proposed. Finally, the application of termination markers to bit-stream reordering for optimal view-dependent transmission and random access of large models can be investigated.

Acknowledgements The work is funded by National Natural Science Foundation of China under Grant No. 60773020.

References [1] P. Alliez, C. Gotsman, “Recent Advances in Compression of 3D Meshes”, Advances in Multiresolution for Geometric Modelling, Springer, Berlin, 2005, pp. 3-26. [2] M. Deering, “Mesh compression”, In: Proceedings of SIGGRAPH, ACM Press, New York, 1995, pp.13-20. [3] H. Hoppe, “Progressive Meshes”, In: Proceedings of SIGGRAPH, ACM Press, New York, 1996, pp. 99-108. [4] Taubman D. S., Marcellin M. W., JPEG2000: image compression fundamentals, standards and practice, Kluwer Academic Publisher, Norwell, MA, 2002. [5] C. L. Bajaj, S. Cutchin, V. Pascucci, G. Zhuang, “Error resilient transmission of compressed VRML”, [Technical Report]. The University of Texas, Austin, 1998. [6] Z. Yan, S. Kumar, C. C. J. Kuo, “Error resilient coding of 3-D graphic models via adaptive mesh segmentation”, IEEE Transaction on Circuits and System Video Technology, 2001, 11(7), pp. 860873. [7] Z. Yan, S. Kumar, C. C. J. Kuo, “Mesh Segmentation Schemes for Error Resilient Coding of 3-D Graphic Models”, IEEE Transaction on Circuits and System Video Technology, 2005, 15(1), pp. 138-144.

[8] G. Al-Regib, Y. Altunbasak. “An unequal error protection method for packet loss resilient 3D mesh transmission”, In: Proceedings of IEEE INFOCOM, IEEE Press, Piscataway, 2002, 2, pp. 743-752. [9] G. Al-Regib, Y. Altunbasak, J. Rossignac, “ErrorResilient Transmission of 3D Models”, ACM Transactions on Graphics, 2005, 24(2), pp. 182208. [10] S.-B. Park, C.-S. Kim, S.-U. Lee, “Error Resilient 3-D Mesh Compression”, IEEE Transactions on Multimedia, 2006, 8(5), pp. 885895. [11] G. Al-Regib, Y. Altunbasak, “3TP: An application-layer protocol for streaming 3-D graphics”, IEEE Transactions on Multimedia, 2005, 7(6), pp. 1149-1156. [12] H. Li, M. Li, B. Prabhakaran, “Middleware for streaming 3D progressive meshes over lossy networks”, ACM Transactions on Multimedia Computing, Communications, and Applications, 2006, 2(4), pp. 282-317. [13] P. Liepa, “Filling holes in meshes”, In: Proceedings of Eurographics/ ACM Siggraph Symposium Geometry Processing, CGF Press, London, 2003, pp. 200-207 [14] A. Sharf, M. Alexa, D. Cohen-Or, “Context-based surface completion”, In: Proceedings of SIGGRAPH, 2004, pp. 878-887. [15] S. Bischoff, L. Kobbelt, “Towards robust broadcasting of geometry data”, Computers & Graphics, 2002, 26(5), pp. 665-675. [16] Z.-Q. Cheng, H.-F. Liu, S.-Y. Jin, “The progressive mesh compression based on meaningful segmentation”, The Visual Computer, 2007, 23(9-11), pp. 651-660. [17] J. Chou, K. Ramchandran, “Arithmetic codingbased continuous error detection for efficient ARQ-based image transmission”, IEEE Journal on Selected Areas in Communications, 2000, 18(6), pp. 861-867. [18] M. Schindler, “A fast renormalization for arithmetic coding”, In: Proceedings of IEEE Data Compression Conference, Snowbird, UT, 1998, 572-577 [19] M. Grangetto, E. Magli, G. Olmo, “Error resilient MQ coder and map JPEG 2000 decoding”, In: Proceedings of ICIP, IEEE Press, Piscataway, 2004, 4, pp. 2551-2554.

An Error-Resilient Arithmetic Coding Algorithm for ...

Now, the technologies for transmission of 3D models face an ..... We test the MAP decoding algorithm in a wireless. 3G network. Take the david model in [16] as ...

245KB Sizes 1 Downloads 211 Views

Recommend Documents

An Evolutionary Algorithm for Homogeneous ...
fitness and the similarity between heterogeneous formed groups that is called .... the second way that is named as heterogeneous, students with different ...

An Algorithm for Implicit Interpolation
More precisely, we consider the following implicit interpolation problem: Problem 1 ... mined by the sequence F1,...,Fn and such that the degree of the interpolants is at most n(d − 1), ...... Progress in Theoretical Computer Science. Birkhäuser .

An Adaptive Fusion Algorithm for Spam Detection
An email spam is defined as an unsolicited ... to filter harmful information, for example, false information in email .... with the champion solutions of the cor-.

An Algorithm for Implicit Interpolation
most n(d − 1), where d is an upper bound for the degrees of F1,...,Fn. Thus, al- though our space is ... number of arithmetic operations required to evaluate F1,...,Fn and F, and δ is the number of ...... Progress in Theoretical Computer Science.

An Adaptive Fusion Algorithm for Spam Detection
adaptive fusion algorithm for spam detection offers a general content- based approach. The method can be applied to non-email spam detection tasks with little ..... Table 2. The (1-AUC) percent scores of our adaptive fusion algorithm AFSD and other f

An Algorithm for Nudity Detection
importance of skin detection in computer vision several studies have been made on the behavior of skin chromaticity at different color spaces. Many studies such as those by Yang and Waibel (1996) and Graf et al. (1996) indicate that skin tones differ

An SMT Based Method for Optimizing Arithmetic Computations in ...
embedded software program via code transformation to reduce the required bit-width and to increase the dynamic range. Our method is based on judicious application of an SMT solver based inductive synthesis procedure to code regions of bounded size. W

An SMT Based Method for Optimizing Arithmetic Computations in ...
paper, we present a new compiler assisted code transformation method to ...... case, taken from [18], is an inverse discrete cosine transform. (IDCT), which is ...

An Improved Divide-and-Conquer Algorithm for Finding ...
Zhao et al. [24] proved that the approximation ratio is. 2 − 3/k for an odd k and 2 − (3k − 4)/(k2 − k) for an even k, if we compute a k-way cut of the graph by iteratively finding and deleting minimum 3-way cuts in the graph. Xiao et al. [23

an algorithm for finding effective query expansions ... - CiteSeerX
analysis on word statistical information retrieval, and uses this data to discover high value query expansions. This process uses a medical thesaurus (UMLS) ...

An Optimal Online Algorithm For Retrieving ... - Research at Google
Oct 23, 2015 - Perturbed Statistical Databases In The Low-Dimensional. Querying Model. Krzysztof .... The goal of this paper is to present and analyze a database .... applications an adversary can use data in order to reveal information ...

VChunkJoin: An Efficient Algorithm for Edit Similarity ...
The current state-of-the-art Ed-Join algorithm im- proves the All-Pairs-Ed algorithm mainly in the follow- .... redundant by another rule v if v is a suffix of u (including the case where v = u). We define a minimal CBD is a .... The basic version of

An algorithm for improving Non-Local Means operators ...
number of an invertible matrix X (with respect to the spectral norm), that is ...... Cutoff (ω). PSNR Gain (dB) barbara boat clown couple couple_2 hill house lake lena .... dynamic range of 0 to 0.2, corresponding to blue (dark) to red (bright) colo

An Implementation of a Backtracking Algorithm for the ...
sequencing as the Partial Digest Problem (PDP). The exact computational ... gorithm presented by Rosenblatt and Seymour in [8], and a backtracking algorithm ...

An Effective Tree-Based Algorithm for Ordinal Regression
Abstract—Recently ordinal regression has attracted much interest in machine learning. The goal of ordinal regression is to assign each instance a rank, which should be as close as possible to its true rank. We propose an effective tree-based algori

An Efficient Algorithm for Learning Event-Recording ...
learning algorithm for event-recording automata [2] based on the L∗ algorithm. ..... initialized to {λ} and then the membership queries of λ, a, b, and c are ...

An exact algorithm for energy-efficient acceleration of ...
tion over the best single processor schedule, and up to 50% improvement over the .... Figure 3: An illustration of the program task de- pendency graph for ... learning techniques to predict the running time of a task has been shown in [5].

An algorithm for k-anonymous microaggregation and ...
Jul 2, 2011 - With the shifting of the Internet connectivity paradigm towards almost ... The opening up of enormous business opportunities for ..... Returning to privacy mechanisms specifically aimed at LBSs, a third class of TTP-free methods such as

An Improved Algorithm for the Solution of the ...
tine that deals with duplicate data points, a routine that guards against ... numerical algorithm has been tested on several data sets with duplicate points and ...

An O∗ (1.84k) Parameterized Algorithm for the ...
basic formulation is to find a 2-partition that separates a source vertex s from a target vertex t .... So we leave it open for a parameterized algorithm for ..... Discrete Mathematics and Theoretical Computer Science 5 (1991) 105–120. 8. Cygan, M.

AntHocNet: An Adaptive Nature-Inspired Algorithm for ...
network. Nature's self-organizing systems like insect societies show precisely these desir- ... while maintaining the properties which make ACO routing algorithms so appealing. ...... Routing over multihop wireless network of mobile computers.

An Evolutionary Algorithm for Constrained Multiobjective
MOPs as mathematical programming models, viz goal programming (Charnes and ..... Genetic algorithms + data structures = evolution programs (3rd ed.).

Development of an Avoidance Algorithm for Multiple ...
Traffic Collision Avoid- ance System (TCAS) II is a collision avoidance .... the controlled vehicle among unexpected obstacles” [3]. The VFF method works in.