Loading...
Search for: memory-usage
0.005 seconds

    Space/query-time tradeoff for computing the visibility polygon

    , Article Computational Geometry: Theory and Applications ; Volume 46, Issue 3 , April , 2013 , Pages 371-381 ; 09257721 (ISSN) Nouri Baygi, M ; Ghodsi, M ; Sharif University of Technology
    2013
    Abstract
    In this paper, we consider the problem of computing the visibility polygon (VP) of a query point q (or VP(q)) in a scene consisting of some obstacles with total complexity of n. We show that the combinatorial representation of VP(q) can be computed in logarithmic time by preprocessing the scene in O( n4logn) time and using O( n4) space. We can also report the actual VP(q) in additional O(|VP(q)|) time. As a main result of this paper, we will prove that we can have a tradeoff between the query time and the preprocessing time/space. In other words, we will show that using O(m) space, we can obtain O( n2log(m/n)/m) query time, where m is a parameter satisfying n2≤m≤ n4. For example, when m= n3,... 

    Skiptree: a new scalable distributed data structure on multidimensional data supporting range-queries

    , Article Computer Communications ; Volume 33, Issue 1 , 2010 , Pages 73-82 ; 01403664 (ISSN) Alaei, S ; Ghodsi, M ; Toossi, M ; Sharif University of Technology
    Abstract
    This paper presents a new balanced, distributed data structure for storing data with multidimensional keys in a peer-to-peer network. It supports range queries as well as single point queries which are routed in O (log n) hops. Our structure, called SkipTree, is fully decentralized with each node being connected to O (log n) other nodes. We propose modifications to the structures, so that the memory usage for maintaining the link structure at each node is reduced from the worst case of O (n) to O (log n log log n) on the average and O (log2 n) in the worst case. It is also shown that the load balancing is guaranteed to be within a constant factor. Our experimental results verify our... 

    A lightweight key establishment scheme for wireless sensor networks

    , Article 3rd International Conference on New Technologies, Mobility and Security, NTMS 2009 ; Article number 5384737 , 2009 ; 9781424462735 (ISBN) Nikounia, S. H ; Amin, F ; Jahangir, A ; Sharif University of Technology
    Abstract
    Key predistribution in sensor networks refers to the problem of distributing secret keys among sensor nodes prior to deployment. Recently, many key predistribution schemes have been proposed for wireless sensor networks. To further improve these techniques, researchers have also proposed to use sensors' expected location information to help predistribution of keying materials. In this paper we propose a lightweight and scalable key establishment scheme for GPS-enabled wireless sensor networks. This scheme has little communication overhead and memory usage. Since communications and computations of key establishment schemes are done only once and when the network is begin initiated, actually... 

    Effective page recommendation algorithms based on distributed learning automata

    , Article 4th International Multi-Conference on Computing in the Global Information Technology, ICCGI 2009, 23 August 2009 through 29 August 2009, Cannes, La Bocca ; 2009 , Pages 41-46 ; 9780769537511 (ISBN) Forsati, R ; Rahbar, A ; Mahdavi, M ; Sharif University of Technology
    Abstract
    Different efforts have been done to address the problem of information overload on the Internet. Recommender systems aim at directing users through this information space, toward the resources that best meet their needs and interests by extracting knowledge from the previous users' interactions. In this paper, we propose an algorithm to solve the web page recommendation problem. In our algorithm, we use distributed learning automata to learn the behavior of previous users' and recommend pages to the current user based on learned pattern. Our experiments on real data set show that the proposed algorithm performs better than the other algorithms that we compared to and, at the same time, it is... 

    Joint edge detection and motion estimation of cardiac MR image sequence by a phase field method

    , Article Computers in Biology and Medicine ; Volume 40, Issue 1 , 2010 , Pages 21-28 ; 00104825 (ISSN) Eslami, A ; Jahed, M ; Preusser, T ; Sharif University of Technology
    Abstract
    In this paper a variational framework for joint segmentation and motion estimation is employed for inspecting heart in Cine MRI sequences. A functional including Mumford-Shah segmentation and optical flow based dense motion estimation is approximated using the phase-field technique. The minimizer of the functional provides an optimum motion field and edge set by considering both spatial and temporal discontinuities. Exploiting calculus of variation principles, multiple partial differential equations associated with the Euler-Lagrange equations of the functional are extracted, first. Next, the finite element method is used to discretize the resulting PDEs for numerical solution. Several... 

    A multiscale phase field method for joint segmentation-rigid registration application to motion estimation of human knee joint

    , Article Biomedical Engineering - Applications, Basis and Communications ; Volume 23, Issue 6 , 2011 , Pages 445-456 ; 10162372 (ISSN) Eslami, A ; Esfandiarpour, F ; Shakourirad, A ; Farahmand, F ; Sharif University of Technology
    2011
    Abstract
    Image based registration of rigid objects has been frequently addressed in the literature to obtain an object's motion parameters. In this paper, a new approach of joint segmentation-rigid registration, within the variational framework of the phase field approximation of the Mumford-Shah's functional, is proposed. The defined functional consists of two Mumford-Shah equations, extracting the discontinuity set of the reference and target images due to a rigid spatial transformation. Multiscale minimization of the proposed functional after finite element discretization provided a sub-pixel, robust algorithm for edge extraction as well as edge based rigid registration. The implementation...