SASB: Spatial Activity Summarization using Buffers Atanu Roy & Akash Agrawal.

Slides:



Advertisements
Similar presentations
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
Advertisements

1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
1 Efficient Subgraph Search over Large Uncertain Graphs Ye Yuan 1, Guoren Wang 1, Haixun Wang 2, Lei Chen 3 1. Northeastern University, China 2. Microsoft.
Optimization of Pearl’s Method of Conditioning and Greedy-Like Approximation Algorithm for the Vertex Feedback Set Problem Authors: Ann Becker and Dan.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph, any set of nodes that are not adjacent.
Mohamed Hefeeda Multiplexing of Variable Bitrate Scalable Video for Mobile Broadcast Networks Project Presentation Farid Molazem Cmpt 820 Fall 2010 School.
Complexity Theory CSE 331 Section 2 James Daly. Reminders Project 4 is out Due Friday Dynamic programming project Homework 6 is out Due next week (on.
CS21 Decidability and Tractability
Balanced Graph Partitioning Konstantin Andreev Harald Räcke.
Computability and Complexity 15-1 Computability and Complexity Andrei Bulatov NP-Completeness.
HCS Clustering Algorithm
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Cascading Spatio-Temporal Pattern Discovery P. Mohan, S.Shekhar, J. Shine, J. Rogers CSci 8715 Presented by: Atanu Roy Akash Agrawal.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Distributed Coloring in Õ(  log n) Bit Rounds COST 293 GRAAL and.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Mobility (II) 11th Week
Some Problems in Computer Science and Elementary Number Theory Elwyn Berlekamp.
Two Discrete Optimization Problems Problem #2: The Minimum Cost Spanning Tree Problem.
Copyright © Cengage Learning. All rights reserved. CHAPTER 9 COUNTING AND PROBABILITY.
CBLOCK: An Automatic Blocking Mechanism for Large-Scale Deduplication Tasks Ashwin Machanavajjhala Duke University with Anish Das Sarma, Ankur Jain, Philip.
INHERENT LIMITATIONS OF COMPUTER PROGRAMS CSci 4011.
4x + 2y = 18 a. (1,8) = 18 a. 4(1) + 2(8) = 18 b. (3,3)20 = 18 b. 4(3) + 2(3) = = = 18 15x + 5y = 5 a. (-2,7) NoYes b. (-1,4) a.
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
On the Construction of Data Aggregation Tree with Minimum Energy Cost in Wireless Sensor Networks: NP-Completeness and Approximation Algorithms National.
Mobility Limited Flip-Based Sensor Networks Deployment Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic.
Graph Coalition Structure Generation Maria Polukarov University of Southampton Joint work with Tom Voice and Nick Jennings HUJI, 25 th September 2011.
Scott Perryman Jordan Williams.  NP-completeness is a class of unsolved decision problems in Computer Science.  A decision problem is a YES or NO answer.
Switch-and-Navigate: Controlling Data Ferry Mobility for Delay-Bounded Messages Liang Ma*, Ting He +, Ananthram Swami §, Kang-won Lee + and Kin K. Leung*
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
An Efficient Approach to Clustering in Large Multimedia Databases with Noise Alexander Hinneburg and Daniel A. Keim.
INHERENT LIMITATIONS OF COMPUTER PROGRAMS CSci 4011.
Example Question on Linear Program, Dual and NP-Complete Proof COT5405 Spring 11.
Researchers: Preet Bola Mike Earnest Kevin Varela-O’Hara Han Zou Advisor: Walter Rusin Data Storage Networks.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
Speaker: Yoni Rozenshein Instructor: Prof. Zeev Nutov.
Palette: Distributing Tables in Software-Defined Networks Yossi Kanizo (Technion, Israel) Joint work with Isaac Keslassy (Technion, Israel) and David Hay.
1 Steiner Tree Algorithms and Networks 2014/2015 Hans L. Bodlaender Johan M. M. van Rooij.
An Interactive Tutorial for NP-Completeness. Outline  Background and Motivation  Visualizations  The NP-Complete Problems  Practice Exercises on NP-Complete.
RF network in SoC1 SoC Test Architecture with RF/Wireless Connectivity 1. D. Zhao, S. Upadhyaya, M. Margala, “A new SoC test architecture with RF/wireless.
Computer Science and Engineering Predicting Performance for Grid-Based P. 1 IPDPS’07 A Performance Prediction Framework.
Group 8: Denial Hess, Yun Zhang Project presentation.
June 4, 2003EE384Y1 Demand Based Rate Allocation Arpita Ghosh and James Mammen {arpitag, EE 384Y Project 4 th June, 2003.
Node Reclamation and Replacement for Long-lived Sensor Networks Bin Tong, Wensheng Zhang, and Chuang Wang Department of Computer Science, Iowa State University.
Tung-Wei Kuo, Kate Ching-Ju Lin, and Ming-Jer Tsai Academia Sinica, Taiwan National Tsing Hua University, Taiwan Maximizing Submodular Set Function with.
Maximizing Lifetime per Unit Cost in Wireless Sensor Networks
Machine Learning and Data Mining Clustering (adapted from) Prof. Alexander Ihler TexPoint fonts used in EMF. Read the TexPoint manual before you delete.
1 Latency-Bounded Minimum Influential Node Selection in Social Networks Incheol Shin
An Optimal Broadcast Algorithm for Content-Addressable Networks Ludovic Henrio Fabrice Huet Justine Rochas 1 18/12/ OPODIS (Nice)
Vasilis Syrgkanis Cornell University
Chapter 7 May 3 Ford-Fulkerson algorithm Step-by-step walk through of an example Worst-case number of augmentations Edmunds-Karp modification Time complexity.
Center-Piece Subgraphs: Problem definition and Fast Solutions Hanghang Tong Christos Faloutsos Carnegie Mellon University.
Introduction to NP-complete. The relationship between Tai-yi schedule and Memory management. Kai – Po
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
Optimal Relay Placement for Indoor Sensor Networks Cuiyao Xue †, Yanmin Zhu †, Lei Ni †, Minglu Li †, Bo Li ‡ † Shanghai Jiao Tong University ‡ HK University.
CSCI-256 Data Structures & Algorithm Analysis Lecture Note: Some slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved. 11.
A Low Interference Channel Assignment Algorithm for Wireless Mesh Networks Can Que 1,2, Xinming Zhang 1, and Shifang Dai 1 1.Department of Computer Science.
Amazons Puzzles are NP- Complete. G∞ is the infinite grid. Cubic Subgrid Graphs are subgraphs of G∞ where nodes have degree at most three. HC3G = {G |
A K-Main Routes Approach to Spatial Network Activity Summarization(SNAS) Group 8.
Memory Protection through Dynamic Access Control Kun Zhang, Tao Zhang and Santosh Pande College of Computing Georgia Institute of Technology.
Exploiting Input Features for Controlling Tunable Approximate Programs Sherry Zhou Department of electronic engineering Tsinghua University.
Clustering – Definition and Basic Algorithms Seminar on Geometric Approximation Algorithms, spring 11/12.
Resource Provision for Batch and Interactive Workloads in Data Centers Ting-Wei Chang, Pangfeng Liu Department of Computer Science and Information Engineering,
Urban Sensing Based on Human Mobility
B. Jayalakshmi and Alok Singh 2015
Rui Wu, Jose Painumkal, Sergiu M. Dascalu, Frederick C. Harris, Jr
James B. Orlin Presented by Tal Kaminker
Maximal Independent Set
Greedy Algorithms: Introduction
The travelling salesman problem
Strong Barrier Coverage of Wireless Sensor Networks Seung Oh Kang
Presentation transcript:

SASB: Spatial Activity Summarization using Buffers Atanu Roy & Akash Agrawal

Overview Motivation Problem Statement Computational Challenges Related Works Approach Examples Conclusion

Motivation Applications in domains like –Public safety –Disaster relief operations SASB

SASB Problem Statement

Definitions Constant Area Buffers –Node buffers –Path buffers

Running Example Coverage Path Buffer = 16Node Buffer = 15Total Coverage = 31/33

Computational Challenges SASB is NP-Hard Proof: –KMR is a special case of SASB Buffers have width = 0 –KMR is proved to be NP-Complete –SASB is at least NP-Hard

Related Works Geometry based NoYes Network based Yes Path based: KMR, Mean Streets 0-1 Subgraph: SANET, Max Subgraph This work No - K-Means, K-Medoids, P-median, Hierarchical Clustering

Contributions Definition SASB problem NP-Hardness proof Combination of geometry and network based summarization. First principle examples

Greedy Approach Choice of k-best buffers Repeat k times –Choose the buffer with maximum activities –Delete all activities contained in the chosen buffer from all the remaining buffers –Replace the chosen buffer from buffer pool to the result-set

Execution Trace NB_A = 8 NB_B = 6 NB_C = 11 PB_1 = 8 PB_2 = 12 PB_12 = 2 NB_A = 8 NB_B = 6NB_B = 2 NB_C = 11NB_C = 1 PB_1 = 8PB_1 = 7 PB_2 = 12PB_2 = NA PB_12 = 2PB_12 = 1

Execution Trace: Final Solution

Best Case Scenario

Better

Average Case Scenario

Conclusion Provides a framework to fuse geometry and network based approaches. First principle examples indicates it can be comparable with related approaches.

Acknowledgements CSci 8715 peer reviewers who gave valuable suggestions.

Thank you