首页 > 最新文献

2016 18th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)最新文献

英文 中文
How to Build a Global Digital Mathematics Library 如何建设全球数字数学图书馆
S. Watt
As with many other areas of study, mathematical knowledge has been produced for centuries and will continue to be produced for centuries to come. The records have taken many forms, from manuscripts, to printed journals, and now digital media. Unlike many other fields, however, much of mathematical knowledge has a high degree of precision and objectivity that both gives it permanent utility and makes it susceptible to mechanized treatment. We outline a path toward assembling the world’s mathematical knowledge. While initially in the form of a comprehensive digital library of page images, we expect evolution toward a knowledge base supporting sophisticated queries and automated reasoning. It is the aim of the nascent International Mathematical Knowledge Trust to provide a framework and to foster a community to make progress in this direction. We can foresee that such a knowledge base will enhance the capacity of individual mathematicians, accelerate discovery and allow new kinds of collaboration.
与许多其他研究领域一样,数学知识已经产生了几个世纪,并将在未来几个世纪继续产生。这些记录有多种形式,从手稿到印刷期刊,再到现在的数字媒体。然而,与许多其他领域不同,许多数学知识具有高度的精确性和客观性,这既使它具有永久的实用性,又使它容易受到机械化处理。我们勾勒出一条汇集世界数学知识的道路。虽然最初的形式是一个全面的页面图像数字库,但我们希望向支持复杂查询和自动推理的知识库发展。新生的国际数学知识信托基金的目标是提供一个框架,并促进一个社区在这方面取得进展。我们可以预见,这样一个知识库将提高数学家个人的能力,加速发现,并允许新的合作形式。
{"title":"How to Build a Global Digital Mathematics Library","authors":"S. Watt","doi":"10.1109/SYNASC.2016.019","DOIUrl":"https://doi.org/10.1109/SYNASC.2016.019","url":null,"abstract":"As with many other areas of study, mathematical knowledge has been produced for centuries and will continue to be produced for centuries to come. The records have taken many forms, from manuscripts, to printed journals, and now digital media. Unlike many other fields, however, much of mathematical knowledge has a high degree of precision and objectivity that both gives it permanent utility and makes it susceptible to mechanized treatment. We outline a path toward assembling the world’s mathematical knowledge. While initially in the form of a comprehensive digital library of page images, we expect evolution toward a knowledge base supporting sophisticated queries and automated reasoning. It is the aim of the nascent International Mathematical Knowledge Trust to provide a framework and to foster a community to make progress in this direction. We can foresee that such a knowledge base will enhance the capacity of individual mathematicians, accelerate discovery and allow new kinds of collaboration.","PeriodicalId":268635,"journal":{"name":"2016 18th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132277897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis of OpenCL Work-Group Reduce for Intel GPUs Intel gpu的OpenCL工作组缩减分析
Grigore Lupescu, E. Slusanschi, N. Tapus
As hardware becomes more flexible in terms ofprogramming, software APIs must expose hardware features ina portable way. Additions in the OpenCL 2.0 API expose threadcommunication through the newly defined work-group functions. In this paper we focus on two implementations of the work-groupfunctions in the OpenCL compiler backend for Intel's GPUs. Wefirst describe the particularities of Intel's GEN GPU architectureand the Beignet OpenCL open source project. Both work-groupimplementations are then detailed, one based on thread to threadmessage passing while the other on thread to shared local memoryread/write. The focus is around choosing an optimal variant basedon how each implementation maps to the hardware and its impacton performance.
随着硬件在编程方面变得更加灵活,软件api必须以可移植的方式暴露硬件特性。OpenCL 2.0 API中的新增功能通过新定义的工作组函数公开线程通信。在本文中,我们重点研究了在英特尔gpu的OpenCL编译器后端中工作组函数的两种实现。我们首先描述了英特尔的GEN GPU架构和Beignet OpenCL开源项目的特殊性。然后详细介绍两个工作组的实现,一个基于线程到线程的消息传递,而另一个基于线程到共享本地内存的读/写。重点是根据每个实现如何映射到硬件及其对性能的影响来选择最佳变体。
{"title":"Analysis of OpenCL Work-Group Reduce for Intel GPUs","authors":"Grigore Lupescu, E. Slusanschi, N. Tapus","doi":"10.1109/SYNASC.2016.070","DOIUrl":"https://doi.org/10.1109/SYNASC.2016.070","url":null,"abstract":"As hardware becomes more flexible in terms ofprogramming, software APIs must expose hardware features ina portable way. Additions in the OpenCL 2.0 API expose threadcommunication through the newly defined work-group functions. In this paper we focus on two implementations of the work-groupfunctions in the OpenCL compiler backend for Intel's GPUs. Wefirst describe the particularities of Intel's GEN GPU architectureand the Beignet OpenCL open source project. Both work-groupimplementations are then detailed, one based on thread to threadmessage passing while the other on thread to shared local memoryread/write. The focus is around choosing an optimal variant basedon how each implementation maps to the hardware and its impacton performance.","PeriodicalId":268635,"journal":{"name":"2016 18th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125233495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards a Multi-Agent System for Medical Records Processing and Knowledge Discovery 面向病案处理和知识发现的多智能体系统
Todor Ivascu, Adriana Dinis, V. Negru
Medical files and observation papers have always been an important source of knowledge. Unfortunately, most of the times they are still stored as physical documents either printed or handwritten, thus making it difficult to transfer this precious information from one place to another, or centralizing and extracting new knowledge from it. But with nowadays advancements in computer science this problem may be handled. In this paper we propose a patient centered Multi-agent system project that is able to extract relevant information from the patients' health records and store that knowledge on a centralized data-store, based on a predefined ontology scheme. The system's purpose is to standardize and enrich the knowledge by performing various mining tasks on the given text. The final purpose is to provide different hospital departments with a tool which they can query for useful information about the patients' medication, treatments and/or scheduled tests and exams and get suggestions regarding their treatment intentions.
医学档案和观察论文一直是知识的重要来源。不幸的是,大多数时候它们仍然以打印或手写的物理文档的形式存储,因此很难将这些宝贵的信息从一个地方转移到另一个地方,也很难集中并从中提取新知识。但随着当今计算机科学的进步,这个问题可能会得到解决。在本文中,我们提出了一个以患者为中心的多智能体系统项目,该项目能够从患者的健康记录中提取相关信息,并基于预定义的本体方案将这些信息存储在集中的数据存储库中。该系统的目的是通过对给定文本执行各种挖掘任务来规范和丰富知识。最终目的是为不同的医院部门提供一个工具,他们可以查询有关患者的药物、治疗和/或安排的检查和检查的有用信息,并获得有关其治疗意图的建议。
{"title":"Towards a Multi-Agent System for Medical Records Processing and Knowledge Discovery","authors":"Todor Ivascu, Adriana Dinis, V. Negru","doi":"10.1109/SYNASC.2016.067","DOIUrl":"https://doi.org/10.1109/SYNASC.2016.067","url":null,"abstract":"Medical files and observation papers have always been an important source of knowledge. Unfortunately, most of the times they are still stored as physical documents either printed or handwritten, thus making it difficult to transfer this precious information from one place to another, or centralizing and extracting new knowledge from it. But with nowadays advancements in computer science this problem may be handled. In this paper we propose a patient centered Multi-agent system project that is able to extract relevant information from the patients' health records and store that knowledge on a centralized data-store, based on a predefined ontology scheme. The system's purpose is to standardize and enrich the knowledge by performing various mining tasks on the given text. The final purpose is to provide different hospital departments with a tool which they can query for useful information about the patients' medication, treatments and/or scheduled tests and exams and get suggestions regarding their treatment intentions.","PeriodicalId":268635,"journal":{"name":"2016 18th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131380732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Structural vs. Cyclic Induction: A Report on Some Experiments with Coq 结构与循环诱导:Coq的一些实验报告
Sorin Stratulat
Structural and (Noetherian) cyclic induction are two instances of the Noetherian induction principle adapted to reason on first-order logic. From a theoretical point of view, every structural proof can be converted to a cyclic proof but the other way is only conjectured. From a practical point of view, i) structural induction principles are built-in or automatically issued from the analysis of recursive data structures by many theorem provers, and ii) the implementation of cyclic induction reasoning may require additional resources such as functional schemas, libraries and human interaction. In this paper, we firstly define a set of conjectures that can be proved by using cyclic induction and following a similar scenario. Next, we implement the cyclic induction reasoning in the Coq proof assistant. Finally, we show that the scenarios for proving these conjectures with structural induction differ in terms of the number of induction steps and lemmas, as well as proof scenario. We identified three conjectures from this set that are hard or impossible to be proved by structural induction.
结构归纳法和诺埃尔循环归纳法是诺埃尔归纳法原理适用于一阶逻辑推理的两个实例。从理论的角度来看,每一种结构证明都可以转化为循环证明,而另一种方式只能是推测。从实际的角度来看,i)结构归纳原则是内置的,或者是由许多定理证明者从递归数据结构的分析中自动生成的,ii)循环归纳推理的实现可能需要额外的资源,如功能模式、库和人类交互。在本文中,我们首先定义了一组可以用循环归纳法证明的猜想,并遵循一个类似的场景。接下来,我们在Coq证明助手中实现循环归纳推理。最后,我们证明了用结构归纳证明这些猜想的场景在归纳步骤和引理的数量以及证明场景方面有所不同。我们从这个集合中确定了三个很难或不可能被结构归纳法证明的猜想。
{"title":"Structural vs. Cyclic Induction: A Report on Some Experiments with Coq","authors":"Sorin Stratulat","doi":"10.1109/SYNASC.2016.018","DOIUrl":"https://doi.org/10.1109/SYNASC.2016.018","url":null,"abstract":"Structural and (Noetherian) cyclic induction are two instances of the Noetherian induction principle adapted to reason on first-order logic. From a theoretical point of view, every structural proof can be converted to a cyclic proof but the other way is only conjectured. From a practical point of view, i) structural induction principles are built-in or automatically issued from the analysis of recursive data structures by many theorem provers, and ii) the implementation of cyclic induction reasoning may require additional resources such as functional schemas, libraries and human interaction. In this paper, we firstly define a set of conjectures that can be proved by using cyclic induction and following a similar scenario. Next, we implement the cyclic induction reasoning in the Coq proof assistant. Finally, we show that the scenarios for proving these conjectures with structural induction differ in terms of the number of induction steps and lemmas, as well as proof scenario. We identified three conjectures from this set that are hard or impossible to be proved by structural induction.","PeriodicalId":268635,"journal":{"name":"2016 18th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117350290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Censoring Sensitive Data from Images 从图像中筛选敏感数据
Stefan Postavaru, Ionut-MihaIta Plesea
In the recent years, the vast volume of digitalimages available enabled a large range of learning methods tobe applicable, while making human input obsolete for manytasks. In this paper, we are addressing the problem of removingprivate information from images. When confronted with arelatively big number of pictures to be made public, one mayfind the task of manual editing out sensitive regions to beunfeasible. Ideally, we would like to use a machine learningapproach to automate this task. We implement and comparedifferent architectures based on convolutional neural networks, with generative and discriminative models competing in anadversarial fashion.
近年来,大量可用的数字图像使得大量的学习方法得以应用,同时在许多任务中,人工输入已经过时。在本文中,我们正在解决从图像中删除私有信息的问题。当面对相对大量的图片要公开时,人们可能会发现手工编辑敏感区域的任务是不可行的。理想情况下,我们希望使用机器学习方法来自动完成这项任务。我们实现并比较了基于卷积神经网络的不同架构,生成和判别模型以对抗的方式竞争。
{"title":"Censoring Sensitive Data from Images","authors":"Stefan Postavaru, Ionut-MihaIta Plesea","doi":"10.1109/SYNASC.2016.073","DOIUrl":"https://doi.org/10.1109/SYNASC.2016.073","url":null,"abstract":"In the recent years, the vast volume of digitalimages available enabled a large range of learning methods tobe applicable, while making human input obsolete for manytasks. In this paper, we are addressing the problem of removingprivate information from images. When confronted with arelatively big number of pictures to be made public, one mayfind the task of manual editing out sensitive regions to beunfeasible. Ideally, we would like to use a machine learningapproach to automate this task. We implement and comparedifferent architectures based on convolutional neural networks, with generative and discriminative models competing in anadversarial fashion.","PeriodicalId":268635,"journal":{"name":"2016 18th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124912534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Malicious URLs: A Semi-Supervised Machine Learning System Approach 检测恶意url:一种半监督机器学习系统方法
A. Gabriel, Dragos Gavrilut, Baetu Ioan Alexandru, Adrian-Stefan Popescu
As malware industry grows, so does the means of infecting a computer or device evolve. One of the most common infection vector is to use the Internet as an entry point. Not only that this method is easy to use, but due to the fact that URLs come in different forms and shapes, it is really difficult to distinguish a malicious URL from a benign one. Furthermore, every system that tries to classify or detect URLs must work on a real time stream and needs to provide a fast response for every URL that is submitted for analysis (in our context a fast response means less than 300-400 milliseconds/URL). From a malware creator point of view, it is really easy to change such URLs multiple times in one day. As a general observation, malicious URLs tend to have a short life (they appear, serve malicious content for several hours and then they are shut down usually by the ISP where they reside in). This paper aims to present a system that analyzes URLs in network traffic that is also capable of adjusting its detection models to adapt to new malicious content. Every correctly classified URL is reused as part of a new dataset that acts as the backbone for new detection models. The system also uses different clustering techniques in order to identify the lack of features on malicious URLs, thus creating a way to improve detection for this kind of threats.
随着恶意软件行业的发展,感染计算机或设备的手段也在不断发展。最常见的感染媒介之一是利用互联网作为切入点。这种方法不仅易于使用,而且由于URL的形式和形状不同,因此很难区分恶意URL和良性URL。此外,每个试图分类或检测URL的系统都必须在实时流上工作,并且需要为每个提交用于分析的URL提供快速响应(在我们的上下文中,快速响应意味着少于300-400毫秒/URL)。从恶意软件创建者的角度来看,在一天内多次更改这样的url确实很容易。根据一般观察,恶意url的寿命往往很短(它们出现,提供恶意内容几个小时,然后通常被它们所在的ISP关闭)。本文旨在提出一种分析网络流量中的url的系统,该系统还能够调整其检测模型以适应新的恶意内容。每个正确分类的URL都被重用为新数据集的一部分,作为新检测模型的主干。该系统还使用不同的聚类技术来识别恶意url上缺乏的特征,从而创建一种方法来改进对这类威胁的检测。
{"title":"Detecting Malicious URLs: A Semi-Supervised Machine Learning System Approach","authors":"A. Gabriel, Dragos Gavrilut, Baetu Ioan Alexandru, Adrian-Stefan Popescu","doi":"10.1109/SYNASC.2016.045","DOIUrl":"https://doi.org/10.1109/SYNASC.2016.045","url":null,"abstract":"As malware industry grows, so does the means of infecting a computer or device evolve. One of the most common infection vector is to use the Internet as an entry point. Not only that this method is easy to use, but due to the fact that URLs come in different forms and shapes, it is really difficult to distinguish a malicious URL from a benign one. Furthermore, every system that tries to classify or detect URLs must work on a real time stream and needs to provide a fast response for every URL that is submitted for analysis (in our context a fast response means less than 300-400 milliseconds/URL). From a malware creator point of view, it is really easy to change such URLs multiple times in one day. As a general observation, malicious URLs tend to have a short life (they appear, serve malicious content for several hours and then they are shut down usually by the ISP where they reside in). This paper aims to present a system that analyzes URLs in network traffic that is also capable of adjusting its detection models to adapt to new malicious content. Every correctly classified URL is reused as part of a new dataset that acts as the backbone for new detection models. The system also uses different clustering techniques in order to identify the lack of features on malicious URLs, thus creating a way to improve detection for this kind of threats.","PeriodicalId":268635,"journal":{"name":"2016 18th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131656941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Levenberg-Marquardt Learning Algorithm for Quaternion-Valued Neural Networks 四元数值神经网络的Levenberg-Marquardt学习算法
Călin-Adrian Popa
In this paper, we present the deduction of the Levenberg-Marquardt algorithm for training quaternion-valued feedforward neural networks, using the framework of the HR calculus. Its performances in the real-and complex-valued cases lead to the idea of extending it to the quaternion domain, also. The proposed method is exemplified on time series prediction applications, showing a significant improvement over the quaternion gradient descent algorithm.
在本文中,我们提出了Levenberg-Marquardt算法的推导,用于训练四元数值前馈神经网络,使用HR微积分的框架。它在实值和复值情况下的性能也使其扩展到四元数域的想法。该方法在时间序列预测中的应用表明,该方法比四元数梯度下降算法有明显的改进。
{"title":"Levenberg-Marquardt Learning Algorithm for Quaternion-Valued Neural Networks","authors":"Călin-Adrian Popa","doi":"10.1109/SYNASC.2016.050","DOIUrl":"https://doi.org/10.1109/SYNASC.2016.050","url":null,"abstract":"In this paper, we present the deduction of the Levenberg-Marquardt algorithm for training quaternion-valued feedforward neural networks, using the framework of the HR calculus. Its performances in the real-and complex-valued cases lead to the idea of extending it to the quaternion domain, also. The proposed method is exemplified on time series prediction applications, showing a significant improvement over the quaternion gradient descent algorithm.","PeriodicalId":268635,"journal":{"name":"2016 18th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)","volume":"75 2-3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131922533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Resource Bounding for Non-Preemptive Task Scheduling on a Multiprocessor Platform 多处理器平台非抢占任务调度的资源绑定
V. Radulescu, S. Andrei, A. Cheng
Task scheduling, which is the fundamental problem for real-time systems, has been approached from various points of view and for various classes of hardware/software configurations. Most of the results currently available have been determined for preemptive scheduling. However, the non-preemptive case is also of great interest, and its higher complexity requires different solutions. This paper builds on previous results of the authors regarding the minimum number of processors that is necessary to allow finding a feasible schedule for a given task set. As previous work was considering single-instance tasks, now the focus moves to periodic tasks, and the existing results are extended in such a way as to cover the new requirements. Also, an existing scheduling algorithm, which aims to combine the characteristics of the well-known EDF and LLF techniques, is being adapted for dealing with periodic tasks.
任务调度是实时系统的基本问题,已经从不同的角度和不同类型的硬件/软件配置进行了探讨。目前可用的大多数结果都是针对抢占调度确定的。然而,非先发制人的情况也引起了人们的极大兴趣,其较高的复杂性需要不同的解决方案。本文建立在作者先前关于为给定任务集找到可行调度所需的最小处理器数量的结果的基础上。由于以前的工作是考虑单实例任务,现在的重点转移到周期性任务,并且以覆盖新需求的方式扩展了现有的结果。此外,现有的调度算法旨在结合著名的EDF和LLF技术的特点,用于处理周期性任务。
{"title":"Resource Bounding for Non-Preemptive Task Scheduling on a Multiprocessor Platform","authors":"V. Radulescu, S. Andrei, A. Cheng","doi":"10.1109/SYNASC.2016.035","DOIUrl":"https://doi.org/10.1109/SYNASC.2016.035","url":null,"abstract":"Task scheduling, which is the fundamental problem for real-time systems, has been approached from various points of view and for various classes of hardware/software configurations. Most of the results currently available have been determined for preemptive scheduling. However, the non-preemptive case is also of great interest, and its higher complexity requires different solutions. This paper builds on previous results of the authors regarding the minimum number of processors that is necessary to allow finding a feasible schedule for a given task set. As previous work was considering single-instance tasks, now the focus moves to periodic tasks, and the existing results are extended in such a way as to cover the new requirements. Also, an existing scheduling algorithm, which aims to combine the characteristics of the well-known EDF and LLF techniques, is being adapted for dealing with periodic tasks.","PeriodicalId":268635,"journal":{"name":"2016 18th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129943764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Quest for Perfect and Compact Symmetry Breaking for Graph Problems 图问题的完美紧致对称破缺
Marijn J. H. Heule
Symmetry breaking is a crucial technique to solve many graph problems. However, current state-of-the-art techniques break graph symmetries only partially, causing search algorithms to unnecessarily explore many isomorphic parts of the search space. We study properties of perfect symmetry breaking for graph problems. One promising and surprising result on small-sized graphs—up to order five— is that perfect symmetry breaking can be achieved using a compact propositional formula in which each literal occurs at most twice. At least for small graphs, perfect symmetry breaking can be expressed more compactly than the existing (partial) symmetry-breaking methods. We present several techniques to compute and analyze perfect symmetry-breaking formulas.
对称破缺是解决许多图问题的关键技术。然而,目前最先进的技术只是部分地打破了图的对称性,导致搜索算法不必要地探索搜索空间的许多同构部分。研究了图问题的完全对称破缺的性质。对于小尺寸的图(小到5阶),有一个令人惊讶的结果,那就是完美的对称性破缺可以用一个紧凑的命题公式来实现,其中每个字最多出现两次。至少对于小图,完全对称破缺可以比现有的(部分)对称破缺方法表达得更紧凑。我们提出了几种计算和分析完美对称破缺公式的技术。
{"title":"The Quest for Perfect and Compact Symmetry Breaking for Graph Problems","authors":"Marijn J. H. Heule","doi":"10.1109/SYNASC.2016.034","DOIUrl":"https://doi.org/10.1109/SYNASC.2016.034","url":null,"abstract":"Symmetry breaking is a crucial technique to solve many graph problems. However, current state-of-the-art techniques break graph symmetries only partially, causing search algorithms to unnecessarily explore many isomorphic parts of the search space. We study properties of perfect symmetry breaking for graph problems. One promising and surprising result on small-sized graphs—up to order five— is that perfect symmetry breaking can be achieved using a compact propositional formula in which each literal occurs at most twice. At least for small graphs, perfect symmetry breaking can be expressed more compactly than the existing (partial) symmetry-breaking methods. We present several techniques to compute and analyze perfect symmetry-breaking formulas.","PeriodicalId":268635,"journal":{"name":"2016 18th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127908441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Continuation Semantics of a Language Inspired by Membrane Computing with Symport/Antiport Interactions 一种具有正/反相互作用的膜计算语言的延拓语义
Gabriel Ciobanu, E. Todoran
We investigate the semantics of a language inspiredby membrane computing in which computation proceedsin a maximally parallel way, involving multisets of objectsdistributed into hierarchical structures of regions delimitedby membranes. The language provides primitives for parallelcommunication of objects across membranes in the form ofrules that can be used to express symport/antiport interactions. It also provides a primitive for membrane creation. Forthe language under investigation we present a denotationalsemantics designed with metric spaces and continuations.
我们研究了一种受膜计算启发的语言的语义,其中计算以最大并行的方式进行,涉及分布在由膜划分的区域的分层结构中的多组对象。该语言以规则的形式为跨膜对象的并行通信提供了原语,这些规则可用于表示正/反相互作用。它还为膜的形成提供了一种原始物质。对于所研究的语言,我们提出了一个由度量空间和延拓设计的指称语义。
{"title":"Continuation Semantics of a Language Inspired by Membrane Computing with Symport/Antiport Interactions","authors":"Gabriel Ciobanu, E. Todoran","doi":"10.1109/SYNASC.2016.060","DOIUrl":"https://doi.org/10.1109/SYNASC.2016.060","url":null,"abstract":"We investigate the semantics of a language inspiredby membrane computing in which computation proceedsin a maximally parallel way, involving multisets of objectsdistributed into hierarchical structures of regions delimitedby membranes. The language provides primitives for parallelcommunication of objects across membranes in the form ofrules that can be used to express symport/antiport interactions. It also provides a primitive for membrane creation. Forthe language under investigation we present a denotationalsemantics designed with metric spaces and continuations.","PeriodicalId":268635,"journal":{"name":"2016 18th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)","volume":"65 16","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113943386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2016 18th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1