O(m) CPU 1 CPU Xeon LZEnd L1 1 L2 1.5 MiB 40 [10] CPU on-memory 2 2 LZEnd LZEnd 1 Xeon 5670 Xeon 5670 L1 data L2 LL Last Level 129 KiB 1

Size: px
Start display at page:

Download "O(m) CPU 1 CPU Xeon LZEnd L1 1 L2 1.5 MiB 40 [10] CPU on-memory 2 2 LZEnd LZEnd 1 Xeon 5670 Xeon 5670 L1 data L2 LL Last Level 129 KiB 1"

Transcription

1 DEIM Forum 2015 G3-3 LZE++: NTT {yamamuro.takeshi,honjo.toshimori}@lab.ntt.co.jp, onizuka@ist.osaka-u.ac.jp T[0...N-1] m LZE++ O(m) LZ77 LZEnd LZEnd O(m) CPU LZE++ O(m) mk/n+1 K K< = N while-loop LZEnd LZEnd on-memory 64 KiB KiB LZ77 1. LZ77 UNIX gzip 1 CPU Snappy 2 LZ77 DBMS [1] [2] [11] URI LZ N O(N) N 2 1 k Block-based Compression BC i i/k i%k O(k) Lucene 2 m O(m) LZEnd [3] LZEnd LZ ,. [5] [6] [7] [8].. BC k. k k k LZEnd

2 O(m) CPU 1 CPU Xeon LZEnd L1 1 L2 1.5 MiB 40 [10] CPU on-memory 2 2 LZEnd LZEnd 1 Xeon 5670 Xeon 5670 L1 data L2 LL Last Level 129 KiB 1.5 MiB 12 MiB 16 KiB PrefixSpan [12] O(m) mk/n+1 K K< = N while-loop LZE++ mk/n+1 LZEnd LZEnd on-memory 64 KiB KiB LZE++ LZEnd LZE LZEnd 2 LZEnd 3. O(m) mk/n : LZEnd 2 LZEnd L1 m BC LZE++ LZE++ O(m) while-loop LZEnd N M M<<N) k LZEnd T[0...N-1]=t 0 t 1...t N 1 t i Σ 0< = i<n 3 Z[0...K-1]=z 0 z 1...z K 1 (K K< = N) T[0...i-1] Z[0...p-1] history Z[0...q] (q<p) T[i...i+l-1] T[i...N-1] T[i...i+l] z p =z q t i+l T[i...i+l-1] history z q source T[N-1] LZEnd z K 1 coarsely optimal [13] Theorem 1. ρ(t ) k H k (T ) [14] T 3 Σ

3 T 0 k lim T f k ( T )=0 s.t. ρ(t ) < = H k (T )+f k ( T ) f k 2. 1 LZEnd LZEnd Z 3 c[0...k-1]: Z x[0...k-1]: z q source B[0...N-1]: c bit z p=z qt i+l c[p]=t i+l x[p]=q B[i+l] bit B rank select rank B(i) B[0...i] bit select B(i) i+1 bit rank select O(1) O(logN) bit B NH 0 [15] z p l B select B select B(p+1)-select B(p) LZEnd Algorithm 1 extract(base, m) 1: /* IN base: start position to decompress */ 2: /* IN m: length */ 3: /* OUT extracted symbols in T[base...base+m-1] */ 4: if n > 0 then 5: end = base + m - 1; 6: r = rank B (end); 7: if B[end] == 1 then 8: extract(base, m - 1); 9: Append c[r] to an output; 10: else 11: pos = select B (r) + 1; 12: if base < pos then 13: extract(base, pos - base); 14: m = end - pos : base = pos; 16: end if 17: ref = select B (x[r+1]) - select B (r + 1) + base + 1; 18: extract(ref, m); 19: end if 20: end if LZEnd Algorithm 1 [3] extract(base, m) T[base...base+m-1] B[end] bit 7 c[r] 9 LZEnd T[i...i+l-1] history z q source source extract T[i...i+l-1] extract m O(m) extract 3. : LZE LZE++ O(m) T[0...N-1] k PrefixSpan [12] S[0...M-1] M<<N LZE++ LZEnd c extract 1 3 abcd LZEnd d c abc extract 3 extract LZE++ ab 2 LZE++ extract LZEnd x CPU LZE++ PrefixSpan CPU CPU 4 (extract seq) wlen extract LZE++ wlen wlen

4 4 wlen extract wlen agpxz LZE++ extract seq CPU 3. 4 CPU 3. 2 LZE S[0...M-1] M<<N CPU k PrefixSpan [12] T N r% B L 0 0, kn/l, 2kN/L,... L/k k PrefixSpan α β ξ Algorithm 2 PrefixSpan 5 ababaac I B L B[i...L-1] (i I) {0, 1,..., L-1} 7 15 Σ s Σ s 13 length α β 10 4 ξ 9 I s B[i...i+length] i I s S 11 S abcde abcd 9 B[i...i+length+1] /S α=2, β=3 2 ξ=2 I {0, 1,..., 6} a, aa, aaa, aab,... 1 ab {0, 2, 4, 5} 2 2 ab S ba S S={ab, ba} S abba 3. 3 LZE++ LZE++ LZEnd 2. 1 hisotry LZE++ LZEnd S[0...M-1]: x [0...K-1]: S Algorithm 2 PrefixSpan(I, length) 1: /* IN I: indices of T and initially I = {0...N-1} */ 2: /* IN length: length of common prefixes among suffixes */ 3: /* OUT S: set of frequent patterns (shared dictionary) */ 4: if length > β then 5: Return; 6: end if 7: while s Σ do 8: I s = {i i I T[i + length] == s}; 9: if I s > = ξ then 10: if length > α && T[i...i + length + 1] / S then 11: S = S {T[i...i + length] i I s}; 12: end if 13: PrefixSpan(I s, length + 1); 14: end if 15: end while 5 ababaac PrefixSpan α=2, β=3, ξ=2 S={ab, ba} R[0...K-1]: bit z p z p =S[j...j+l-1]t i+l c[p]=t i+l x [p]=j B[i+l] R[p] bit LZE++ z p source z q q<p Z[x[p]] S[x [p]] R Algorithm 3 LZEnd extract Algorithm Algorithm 3 LZEnd extract 1: if R[r] == 1 then 2: ref = x [rank R (r) + base - pos]; 3: Append S[ref...ref + m] to B; 4: else 5: ref = select B (x[r + 1]) - select B (r + 1) + base + 1; 6: extract(ref, m); 7: end if LZE++ LZEnd Theorem 2. Z[p] Z[p ] p<p Z[p ] 2 history Z[p]c c Σ S[i...i+k-1]c i+k-1<m Z[p ] Z[p] history 3. 4 extract seq

5 CPU LZE++ wlen wlen T[base...base+m-1] m>wlen T[base...wlen-1] extract T[base+wlen...base+m-1] extract seq wlen LZE++ x log(wlen)-bit extract seq CPU LZE++ B R bit LZEnd Algorithm 4 T[base+wlen...base+m-1] extract seq T[base...wlen-1] extract (r1, r2, pos) while-loop 1 1 B CPU bit x64 CPU 64bit B bit bsr 0 0 l!=0 R[r2]==0 14 x select B 13 R[r2]= O(m) mk/n+1 while-loop 3 K/N<1 CPU 1 rank/select 4. LZE++ LZEnd 4. 1 LZE++ LZEnd LZEnd 2. 2 c 1B x source 4B Algorithm 4 extract seq(base, m) 1: /* IN base: start position to decompress */ 2: /* IN m: length (m > wlen) */ 3: /* OUT extracted symbols in T[base + wlen...base + m - 1] */ 4: r1 = rank B (base + wlen); 5: r2 = rank R (r1); 6: pos = select B (r1) + 1; 7: while pos - base < m do 8: l = Count leading zeroes from pos in B 9: if l!= 0 then 10: if R[r2] == 0 then 11: r3 = r1 - x[r1] + 1; 12: ref = select B (r3); 13: Copy T[ref...ref + l - 1] to an output; 14: else 15: ref = x [r2++]; 16: Copy S[ref...ref + l - 1] to an output; 17: end if 18: end if 19: Print c[r1++] to an output; 20: pos += l + 1; 21: end while bit B [3] rank select RecRank [15] LZEnd c x B 41bit LZEnd Suffix Array LZE++ c B LZEnd x 3. 4 log(wlen)-bit wlen 65,536 2B S 1B S 4B 3. 2 PrefixSpan T 1% r=1 k=1024 B PrefixSpan α β ξ LZE++ c S x x B R 58bits 8B 64bits α=8 wlen LZ77 LZE LZEnd Suffix Array O(m) while-loop B R LZE++1 LZE++2 2 LZE++1 LZEnd RecRank B R 3. 4 while-loop 1 select B select LZE++2 R LZE++1 select B LZE++2

6 DNA (influenza Escherichia Coli) einstein.de.txt world leaders 4 2 enwiki8 5 gov2 6 3 Hadoop 7 Cassandra 8 PostgreSQL 9 (1) (2) enwiki Wikipedia 10 8 B gov gov Web 128 MiB (3) 128 MiB 4. 3 LZE++ LZEnd LZE++ PostgreSQL einstein.de.txt enwiki8 3 LZE++ mk/n+1 while-loop K 4. 5 LZEnd 6 gzip (Version 1.4) LZ77 bzip2 10 (Version 1.0.6) Burrows-Wheeler [14] gzip bzip2-9 lzip 11 (Version 1.12) LZ77 LZMA Snappy (Revision 73) LZ4 (Revision 90) LZ77 Re-Pair 12 [16] Xeon5670 Xeon5670 L1 L2 LL 129 KiB 1.5 MiB 12 MiB CPU perf v3.6.9 C++ gcc v O KiB B 2 16 B LZE++ LZEnd PostgreSQL einstein.de.txt mmahoney/compression/textdata.html 6 mmahoney/compression/textdata.html rwan/en/restore.html 7 T T[0...N-1] S enwik8 LZE++ LZEnd LZEnd LZE LZE select B LZE++ LZE T k B B PrefixSpan T[0...N-1] S T[i...i + l] PostgreSQL 44.57% 71.32% 63.8 KiB 4.83% einstein.de.txt 23.78% 22.85% KiB 13.07% enwik % 47.46% 27.8 KiB 2.84% einstein.de.txt enwik8 0.93% 18.74% CPU L1/LL 8 LZEnd baseline LZE++ LZEnd CPU LL LZEnd LL 16.01% 55.59% 39.37% LL LZE KiB B 2 23 B LZE++ LZEnd LZE++ LZEnd LZEnd LZE LZE

7 6 2 5 B (32 B) 2 23 B (8 MiB) PostgreSQ einstein.de.txt enwik KiB LZEnd LZE LZE++ 64 KiB 3. 3 O(m) mk/n+1 while-loop 4. 4 LZEnd MiB Cassandra PostgreSQL wlen LZEnd 1.52% 6.15% world leaders 36.41% LZE++ Suffix Array 17bit 6 gzip bzip2 lzip Re-Pair LZEnd LZE++ LZEnd LZE++ Re-Pair DNA bzip2 enwik8 gov2 Snappy LZ7 LZEnd LZE++ LZE++ LZ-End LZE++ gzip Escherichia Coli einstein.de.txt bzip2 2 bzip2 lzip LZE++ Snappy LZ4 Re-Pair 4. 5 LZEnd LZE++ 9 LZEnd LZE LZEnd LZE B LZE++ LZEnd PostgreSQL LZEnd 5. [1] [2] [11] DBMS

8 1 LZE++ Apache Cassandra PostgreSQL ( ) wlen LZEnd 1.52% 6.15% Source Size(B) LZE++ LZEnd gzip-9 bzip-9 lzip Snappy LZ4 Re-Pair Escherichia Coli 112,689, influenza 154,808, einstein.de.txt 92,758, world leaders 46,968, enwik8 100,000, gov2 135,268, Hadoop 135,268, Cassandra 135, PostgreSQL 135,268, MiB ms LZE++ LZ-End Source LZE++ LZEnd gzip-9 bzip-9 lzip Snappy LZ4 Re-Pair Escherichia Coli influenza einstein.de.txt world leaders enwik gov Hadoop Cassandra PostgreSQL [1] Run Length Encoding Bitmap Encoding [5] [6] [7] [8] [2] LZEnd [4] [17] N O(logN) 6. m LZE++ LZE++ O(m) while-loop [1] D. Abadi et al., The Design and Implementation of Modern Column-Oriented Database Systems, Foundations and Trends c in Databases, Vol. 5, No. 3, pp , [2] P. Ferragina and G. Manzini, On Compressing the Textual Web, Proceedings of WSDM, [3] S. Kreft and G. Navarro, LZ77-like Compression with Fast Random Access, Proceedings of DCC, [4] S. Kreft and G. Navarro, Self-indexing based on LZ77, Proceedings of CPM, [5] K.Sadakane, New Text Indexing Functionalities of the Compressed Suffix Arrays, J. Algorithms, Vol. 48, No. 2, [6] R. Grossi, A. Gupta, and J. S. Vitter, High-Order Entropy- Compressed Text Indexes, Proceedings of SODA, [7] R.Grossi and J.S.Vitter, Compressed Suffix Arrays and Suffix Trees with Applications to Text Indexing and String Matching, SIAM J. Comput., Vol. 35, No. 2, pp , [8] P. Ferragina and G. Manzini, Opportunistic Data Structures with Applications, Proceedings of 41st FOCS, [9] U. Manber and G. Myers, Suffix Arrays: a New Method for On-line String Searches, Proceedings of SODA, [10] C. Kim et al., Closing the Ninja Performance Gap through Traditional Programming and Compiler Technology, techresearch.intel.com, [11] C. Hoobin et al., Relative Lempel-Ziv Factorization for Efficient Storage and Retrieval of Web Collections, Proceedings of VLDB Endow., Vol. 5, No. 3, [12] J. Pei, et al., PrefixSpan: Mining Sequential Patterns Efficiently by Prefix-Projected Pattern Growth, Proceedings of 17th ICDE, [13] Kosaraju, S.R. and Manzini, G., Compression of Low Entropy Strings with Lempel-Ziv Algorithms, Proceedings of CCS, [14] G. Manzini, An Analysis of the Burrows-Wheeler Transform, J. ACM, Vol. 48, No. 3, pp , [15] D. Okanohara and K. Sadakane, Practical Entropy-Compressed rank/select Dictionary, Proceedings of ALENEX, pp , [16] N. Larsson and A. Moffat, Offline dictionary-based compression, Proceedings of DCC, 1999, pp , [17] B. Philip et al., Random access to grammar-compressed strings, Proceedings of SODA, 2011

DEIM Forum 2013 C10-2 Re-Pair {k sekine, sasakawa, syoshid, 1999 Larsson Moffat Re-Pair Re-Pair Re-Pair

DEIM Forum 2013 C10-2 Re-Pair {k sekine, sasakawa, syoshid, 1999 Larsson Moffat Re-Pair Re-Pair Re-Pair DEIM Forum 2013 C10-2 Re-Pair 060 0814 14 9 E-mail: k sekine, sasakawa, syoshid, kida}@ist.hokudai.ac.jp 1999 Larsson Moffat Re-Pair Re-Pair Re-Pair VF Variable-to-Fixed-Length Encoding for Large Texts

More information

Fig. 3 3 Types considered when detecting pattern violations 9)12) 8)9) 2 5 methodx close C Java C Java 3 Java 1 JDT Core 7) ) S P S

Fig. 3 3 Types considered when detecting pattern violations 9)12) 8)9) 2 5 methodx close C Java C Java 3 Java 1 JDT Core 7) ) S P S 1 1 1 Fig. 1 1 Example of a sequential pattern that is exracted from a set of method definitions. A Defect Detection Method for Object-Oriented Programs using Sequential Pattern Mining Goro YAMADA, 1 Norihiro

More information

IPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info

IPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Information Science and Technology, Osaka University a) kawasumi.ryo@ist.osaka-u.ac.jp 1 1 Bucket R*-tree[5] [4] 2 3 4 5 6 2. 2.1 2.2 2.3

More information

Run-Based Trieから構成される 決定木の枝刈り法

Run-Based Trieから構成される  決定木の枝刈り法 Run-Based Trie 2 2 25 6 Run-Based Trie Simple Search Run-Based Trie Network A Network B Packet Router Packet Filtering Policy Rule Network A, K Network B Network C, D Action Permit Deny Permit Network

More information

CPU Levels in the memory hierarchy Level 1 Level 2... Increasing distance from the CPU in access time Level n Size of the memory at each level 1: 2.2

CPU Levels in the memory hierarchy Level 1 Level 2... Increasing distance from the CPU in access time Level n Size of the memory at each level 1: 2.2 FFT 1 Fourier fast Fourier transform FFT FFT FFT 1 FFT FFT 2 Fourier 2.1 Fourier FFT Fourier discrete Fourier transform DFT DFT n 1 y k = j=0 x j ω jk n, 0 k n 1 (1) x j y k ω n = e 2πi/n i = 1 (1) n DFT

More information

2 ID POS 1... 1 2... 2 2.1 ID POS... 2 2.2... 3 3... 5 3.1... 5 3.2... 6 3.2.1... 6 3.2.2... 7 3.3... 7 3.3.1... 7 3.3.2... 8 3.3.3... 8 3.4... 9 4... 11 4.1... 11 4.2... 15 4.3... 27 5... 35... 36...

More information

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF   a m Vol.55 No.1 2 15 (Jan. 2014) 1,a) 2,3,b) 4,3,c) 3,d) 2013 3 18, 2013 10 9 saccess 1 1 saccess saccess Design and Implementation of an Online Tool for Database Education Hiroyuki Nagataki 1,a) Yoshiaki

More information

透過的データアクセスを実現する新しいデータ圧縮法

透過的データアクセスを実現する新しいデータ圧縮法 2013 年度 ERATO 秋の WS ブロック間の辞書共有による Re-Pairアルゴリズムの大規模テキスト圧縮への適用 北海道大学大学院情報科学研究科コンピュータサイエンス専攻 喜田拓也 登別温泉第一滝本館本館会議室 1 2013/09/13 研究の背景と目的 気象衛星データ 航空写真データ リモートセンシングデータ Internet SNS 市民からの情報提供 市民への道路情報の提供 UGC(User

More information

bit bit bit VAST N d i d 1 <d 2 <...<d k <...<d N d k VAST d k 3 d k 3 d k 2 d k 1 d k 4 w w=4 ) HW HW 32bit γ δ [4] PForDelta [3] HW CPU VAST VAST VA

bit bit bit VAST N d i d 1 <d 2 <...<d k <...<d N d k VAST d k 3 d k 3 d k 2 d k 1 d k 4 w w=4 ) HW HW 32bit γ δ [4] PForDelta [3] HW CPU VAST VAST VA DEIM Forum 2013 F10-6 VAST CPU NTT, 180-0012 3-9-11 E-mail: {yamamuro.takeshi,onizuka.makoto,konishi.fumikazu}@lab.ntt.co.jp CPU HW HW HW VAST VAST SIMD CPU TLB bit VAST VAST VAST VAST CPU SIMD VAST-Tree

More information

共有辞書を用いた 効率の良い圧縮アルゴリズム

共有辞書を用いた 効率の良い圧縮アルゴリズム 大規模テキストに対する 共有辞書を用いた Re-Pair 圧縮法 Variable-to-Fixed-Length Encoding for Large Texts Using Re-Pair Algorithm with Efficient Shared Dictionaries 関根渓, 笹川裕人, 吉田諭史, 喜田拓也 北海道大学大学院情報科学研究科 1 背景 : 巨大なデータ 計算機上で扱うデータの巨大化.

More information

rank ”«‘‚“™z‡Ì GPU ‡É‡æ‡éŁÀŠñ›»

rank ”«‘‚“™z‡Ì GPU ‡É‡æ‡éŁÀŠñ›» rank GPU ERATO 2011 11 1 1 / 26 GPU rank/select wavelet tree balanced parenthesis GPU rank 2 / 26 GPU rank/select wavelet tree balanced parenthesis GPU rank 2 / 26 GPU rank/select wavelet tree balanced

More information

Duplicate Near Duplicate Intact Partial Copy Original Image Near Partial Copy Near Partial Copy with a background (a) (b) 2 1 [6] SIFT SIFT SIF

Duplicate Near Duplicate Intact Partial Copy Original Image Near Partial Copy Near Partial Copy with a background (a) (b) 2 1 [6] SIFT SIFT SIF Partial Copy Detection of Line Drawings from a Large-Scale Database Weihan Sun, Koichi Kise Graduate School of Engineering, Osaka Prefecture University E-mail: sunweihan@m.cs.osakafu-u.ac.jp, kise@cs.osakafu-u.ac.jp

More information

1 12 ( )150 ( ( ) ) x M x 0 1 M 2 5x 2 + 4x + 3 x 2 1 M x M 2 1 M x (x + 1) 2 (1) x 2 + x + 1 M (2) 1 3 M (3) x 4 +

1 12 ( )150 ( ( ) ) x M x 0 1 M 2 5x 2 + 4x + 3 x 2 1 M x M 2 1 M x (x + 1) 2 (1) x 2 + x + 1 M (2) 1 3 M (3) x 4 + ( )5 ( ( ) ) 4 6 7 9 M M 5 + 4 + M + M M + ( + ) () + + M () M () 4 + + M a b y = a + b a > () a b () y V a () V a b V n f() = n k= k k () < f() = log( ) t dt log () n+ (i) dt t (n + ) (ii) < t dt n+ n

More information

Vol. 0 No Fast Traversal of Suffix Arrays for Full-Text Approximate String Matching Masao Utiyama and Hitoshi Isahara Given a text and a

Vol. 0 No Fast Traversal of Suffix Arrays for Full-Text Approximate String Matching Masao Utiyama and Hitoshi Isahara Given a text and a Vol. 0 No. 0 1959 2 2 2 Fast Traversal of Suffix Arrays for Full-Text Approximate String Matching Masao Utiyama and Hitoshi Isahara Given a text and an input pattern, the goal of full-text approximate

More information

y = x 4 y = x 8 3 y = x 4 y = x 3. 4 f(x) = x y = f(x) 4 x =,, 3, 4, 5 5 f(x) f() = f() = 3 f(3) = 3 4 f(4) = 4 *3 S S = f() + f() + f(3) + f(4) () *4

y = x 4 y = x 8 3 y = x 4 y = x 3. 4 f(x) = x y = f(x) 4 x =,, 3, 4, 5 5 f(x) f() = f() = 3 f(3) = 3 4 f(4) = 4 *3 S S = f() + f() + f(3) + f(4) () *4 Simpson H4 BioS. Simpson 3 3 0 x. β α (β α)3 (x α)(x β)dx = () * * x * * ɛ δ y = x 4 y = x 8 3 y = x 4 y = x 3. 4 f(x) = x y = f(x) 4 x =,, 3, 4, 5 5 f(x) f() = f() = 3 f(3) = 3 4 f(4) = 4 *3 S S = f()

More information

Part () () Γ Part ,

Part () () Γ Part , Contents a 6 6 6 6 6 6 6 7 7. 8.. 8.. 8.3. 8 Part. 9. 9.. 9.. 3. 3.. 3.. 3 4. 5 4.. 5 4.. 9 4.3. 3 Part. 6 5. () 6 5.. () 7 5.. 9 5.3. Γ 3 6. 3 6.. 3 6.. 3 6.3. 33 Part 3. 34 7. 34 7.. 34 7.. 34 8. 35

More information

2/ 土 :30 11:20 似通った科目名がありますので注意してください. 受験許可されていない科目を解答した場合は無効 整理番号と科目コードは受験許可証とよく照合し正確に記入

2/ 土 :30 11:20 似通った科目名がありますので注意してください. 受験許可されていない科目を解答した場合は無効 整理番号と科目コードは受験許可証とよく照合し正確に記入 2/ 土 28 9 10 10:30 11:20 似通った科目名がありますので注意してください. 受験許可されていない科目を解答した場合は無効 整理番号と科目コードは受験許可証とよく照合し正確に記入 30 10 11 12 00011 00016 01101 02607 02703 (1) AB AB 100 cm 2 3.00 cm 2 9.80 m/s 2 AB A B A 10.0 kg A

More information

( ) ( ) lex LL(1) LL(1)

( ) ( ) lex LL(1) LL(1) () () lex LL(1) LL(1) http://www.cs.info.mie-u.ac.jp/~toshi/lectures/compiler/ 29 5 14 1 1 () / (front end) (back end) (phase) (pass) 1 2 1 () () var left, right; fun int main() { left = 0; right = 10;

More information

DEIM Forum 2009 C8-4 QA NTT QA QA QA 2 QA Abstract Questions Recomme

DEIM Forum 2009 C8-4 QA NTT QA QA QA 2 QA Abstract Questions Recomme DEIM Forum 2009 C8-4 QA NTT 239 0847 1 1 E-mail: {kabutoya.yutaka,kawashima.harumi,fujimura.ko}@lab.ntt.co.jp QA QA QA 2 QA Abstract Questions Recommendation Based on Evolution Patterns of a QA Community

More information

x, y x 3 y xy 3 x 2 y + xy 2 x 3 + y 3 = x 3 y xy 3 x 2 y + xy 2 x 3 + y 3 = 15 xy (x y) (x + y) xy (x y) (x y) ( x 2 + xy + y 2) = 15 (x y)

x, y x 3 y xy 3 x 2 y + xy 2 x 3 + y 3 = x 3 y xy 3 x 2 y + xy 2 x 3 + y 3 = 15 xy (x y) (x + y) xy (x y) (x y) ( x 2 + xy + y 2) = 15 (x y) x, y x 3 y xy 3 x 2 y + xy 2 x 3 + y 3 = 15 1 1977 x 3 y xy 3 x 2 y + xy 2 x 3 + y 3 = 15 xy (x y) (x + y) xy (x y) (x y) ( x 2 + xy + y 2) = 15 (x y) ( x 2 y + xy 2 x 2 2xy y 2) = 15 (x y) (x + y) (xy

More information

v 1 v 2 e g ˆ Š Œ Ž p š ~ m n u { i 1, i 2, i 3, i 4 } { i 1, i 5 } v 1 v 2 v 3 v 4 v 5 v 6 { i 1, i 2, i 4 } { i 1, i 2, i 3, i 5 } { i 1, i 3, i 4 }

v 1 v 2 e g ˆ Š Œ Ž p š ~ m n u { i 1, i 2, i 3, i 4 } { i 1, i 5 } v 1 v 2 v 3 v 4 v 5 v 6 { i 1, i 2, i 4 } { i 1, i 2, i 3, i 5 } { i 1, i 3, i 4 } DEIM Forum 2009 D2-1 COPINE: 112 86 2 1 1 E-mail: {seki,sesejun}@sel.is.ocha.ac.jp COPINE COPINE: Mining Networks Sharing Common Patterns Mio SEKI and Jun SESE Graduate School of Humanities and Sciences,

More information

2 2 MATHEMATICS.PDF 200-2-0 3 2 (p n ), ( ) 7 3 4 6 5 20 6 GL 2 (Z) SL 2 (Z) 27 7 29 8 SL 2 (Z) 35 9 2 40 0 2 46 48 2 2 5 3 2 2 58 4 2 6 5 2 65 6 2 67 7 2 69 2 , a 0 + a + a 2 +... b b 2 b 3 () + b n a

More information

漸化式のすべてのパターンを解説しましたー高校数学の達人・河見賢司のサイト

漸化式のすべてのパターンを解説しましたー高校数学の達人・河見賢司のサイト https://www.hmg-gen.com/tuusin.html https://www.hmg-gen.com/tuusin1.html 1 2 OK 3 4 {a n } (1) a 1 = 1, a n+1 a n = 2 (2) a 1 = 3, a n+1 a n = 2n a n a n+1 a n = ( ) a n+1 a n = ( ) a n+1 a n {a n } 1,

More information

1. A0 A B A0 A : A1,...,A5 B : B1,...,B12 2. 5 3. 4. 5. A0 (1) A, B A B f K K A ϕ 1, ϕ 2 f ϕ 1 = f ϕ 2 ϕ 1 = ϕ 2 (2) N A 1, A 2, A 3,... N A n X N n X N, A n N n=1 1 A1 d (d 2) A (, k A k = O), A O. f

More information

( 9 1 ) 1 2 1.1................................... 2 1.2................................................. 3 1.3............................................... 4 1.4...........................................

More information

1. A0 A B A0 A : A1,...,A5 B : B1,...,B

1. A0 A B A0 A : A1,...,A5 B : B1,...,B 1. A0 A B A0 A : A1,...,A5 B : B1,...,B12 2. 3. 4. 5. A0 A, B Z Z m, n Z m n m, n A m, n B m=n (1) A, B (2) A B = A B = Z/ π : Z Z/ (3) A B Z/ (4) Z/ A, B (5) f : Z Z f(n) = n f = g π g : Z/ Z A, B (6)

More information

BW BW

BW BW Induced Sorting BW 11T2042B 2015 3 23 1 1 1.1................................ 1 1.2................................... 1 2 BW 1 2.1..................................... 2 2.2 BW.................................

More information

2 2 ( M2) ( )

2 2 ( M2) ( ) 2 2 ( M2) ( ) 2007 3 3 1 2 P. Gaudry and R. Harley, 2000 Schoof 63bit 2 8 P. Gaudry and É. Schost, 2004 80bit 1 / 2 16 2 10 2 p: F p 2 C : Y 2 =F (X), F F p [X] : monic, deg F = 5, J C (F p ) F F p p Frobenius

More information

Gray [6] cross tabulation CUBE, ROLL UP Johnson [7] pivoting SQL 3. SuperSQL SuperSQL SuperSQL SQL [1] [2] SQL SELECT GENERATE <media> <TFE> GENER- AT

Gray [6] cross tabulation CUBE, ROLL UP Johnson [7] pivoting SQL 3. SuperSQL SuperSQL SuperSQL SQL [1] [2] SQL SELECT GENERATE <media> <TFE> GENER- AT DEIM Forum 2017 E3-1 SuperSQL 223 8522 3 14 1 E-mail: {tabata,goto}@db.ics.keio.ac.jp, toyama@ics.keio.ac.jp,,,, SuperSQL SuperSQL, SuperSQL. SuperSQL 1. SuperSQL, Cross table, SQL,. 1 1 2 4. 1 SuperSQL

More information

2006 3

2006 3 JAIST Reposi https://dspace.j Title 質問の曖昧性を考慮した質問応答システムに関する研 究 Author(s) 松本, 匡史 Citation Issue Date 2006-03 Type Thesis or Dissertation Text version author URL http://hdl.handle.net/10119/1986 Rights Description

More information

DEIM Forum 2017 H ,

DEIM Forum 2017 H , DEIM Forum 217 H5-4 113 8656 7 3 1 153 855 4 6 1 3 2 1 2 E-mail: {satoyuki,haya,kgoda,kitsure}@tkl.iis.u-tokyo.ac.jp,.,,.,,.,, 1.. 1956., IBM IBM RAMAC 35 IBM 35 24 5, 5MB. 1961 IBM 131,,, IBM 35 13.,

More information

johnny-paper2nd.dvi

johnny-paper2nd.dvi 13 The Rational Trading by Using Economic Fundamentals AOSHIMA Kentaro 14 2 26 ( ) : : : The Rational Trading by Using Economic Fundamentals AOSHIMA Kentaro abstract: Recently Artificial Markets on which

More information

II (Percolation) ( 3-4 ) 1. [ ],,,,,,,. 2. [ ],.. 3. [ ],. 4. [ ] [ ] G. Grimmett Percolation Springer-Verlag New-York [ ] 3

II (Percolation) ( 3-4 ) 1. [ ],,,,,,,. 2. [ ],.. 3. [ ],. 4. [ ] [ ] G. Grimmett Percolation Springer-Verlag New-York [ ] 3 II (Percolation) 12 9 27 ( 3-4 ) 1 [ ] 2 [ ] 3 [ ] 4 [ ] 1992 5 [ ] G Grimmett Percolation Springer-Verlag New-York 1989 6 [ ] 3 1 3 p H 2 3 2 FKG BK Russo 2 p H = p T (=: p c ) 3 2 Kesten p c =1/2 ( )

More information

,,,,., C Java,,.,,.,., ,,.,, i

,,,,., C Java,,.,,.,., ,,.,, i 24 Development of the programming s learning tool for children be derived from maze 1130353 2013 3 1 ,,,,., C Java,,.,,.,., 1 6 1 2.,,.,, i Abstract Development of the programming s learning tool for children

More information

2

2 2 485 1300 1 6 17 18 3 18 18 3 17 () 6 1 2 3 4 1 18 11 27 10001200 705 2 18 12 27 10001230 705 3 19 2 5 10001140 302 5 () 6 280 2 7 ACCESS WEB 8 9 10 11 12 13 14 3 A B C D E 1 Data 13 12 Data 15 9 18 2

More information

T rank A max{rank Q[R Q, J] t-rank T [R T, C \ J] J C} 2 ([1, p.138, Theorem 4.2.5]) A = ( ) Q rank A = min{ρ(j) γ(j) J J C} C, (5) ρ(j) = rank Q[R Q,

T rank A max{rank Q[R Q, J] t-rank T [R T, C \ J] J C} 2 ([1, p.138, Theorem 4.2.5]) A = ( ) Q rank A = min{ρ(j) γ(j) J J C} C, (5) ρ(j) = rank Q[R Q, (ver. 4:. 2005-07-27) 1 1.1 (mixed matrix) (layered mixed matrix, LM-matrix) m n A = Q T (2m) (m n) ( ) ( ) Q I m Q à = = (1) T diag [t 1,, t m ] T rank à = m rank A (2) 1.2 [ ] B rank [B C] rank B rank

More information

untitled

untitled 18 1 2,000,000 2,000,000 2007 2 2 2008 3 31 (1) 6 JCOSSAR 2007pp.57-642007.6. LCC (1) (2) 2 10mm 1020 14 12 10 8 6 4 40,50,60 2 0 1998 27.5 1995 1960 40 1) 2) 3) LCC LCC LCC 1 1) Vol.42No.5pp.29-322004.5.

More information

コンピュータ概論

コンピュータ概論 4.1 For Check Point 1. For 2. 4.1.1 For (For) For = To Step (Next) 4.1.1 Next 4.1.1 4.1.2 1 i 10 For Next Cells(i,1) Cells(1, 1) Cells(2, 1) Cells(10, 1) 4.1.2 50 1. 2 1 10 3. 0 360 10 sin() 4.1.2 For

More information

SQUFOF NTT Shanks SQUFOF SQUFOF Pentium III Pentium 4 SQUFOF 2.03 (Pentium 4 2.0GHz Willamette) N UBASIC 50 / 200 [

SQUFOF NTT Shanks SQUFOF SQUFOF Pentium III Pentium 4 SQUFOF 2.03 (Pentium 4 2.0GHz Willamette) N UBASIC 50 / 200 [ SQUFOF SQUFOF NTT 2003 2 17 16 60 Shanks SQUFOF SQUFOF Pentium III Pentium 4 SQUFOF 2.03 (Pentium 4 2.0GHz Willamette) 60 1 1.1 N 62 16 24 UBASIC 50 / 200 [ 01] 4 large prime 943 2 1 (%) 57 146 146 15

More information

さくらの個別指導 ( さくら教育研究所 ) 1 φ = φ 1 : φ [ ] a [ ] 1 a : b a b b(a + b) b a 2 a 2 = b(a + b). b 2 ( a b ) 2 = a b a/b X 2 X 1 = 0 a/b > 0 2 a

さくらの個別指導 ( さくら教育研究所 ) 1 φ = φ 1 : φ [ ] a [ ] 1 a : b a b b(a + b) b a 2 a 2 = b(a + b). b 2 ( a b ) 2 = a b a/b X 2 X 1 = 0 a/b > 0 2 a φ + 5 2 φ : φ [ ] a [ ] a : b a b b(a + b) b a 2 a 2 b(a + b). b 2 ( a b ) 2 a b + a/b X 2 X 0 a/b > 0 2 a b + 5 2 φ φ : 2 5 5 [ ] [ ] x x x : x : x x : x x : x x 2 x 2 x 0 x ± 5 2 x x φ : φ 2 : φ ( )

More information

XcalableMP入門

XcalableMP入門 XcalableMP 1 HPC-Phys@, 2018 8 22 XcalableMP XMP XMP Lattice QCD!2 XMP MPI MPI!3 XMP 1/2 PCXMP MPI Fortran CCoarray C++ MPIMPI XMP OpenMP http://xcalablemp.org!4 XMP 2/2 SPMD (Single Program Multiple Data)

More information

13 0 1 1 4 11 4 12 5 13 6 2 10 21 10 22 14 3 20 31 20 32 25 33 28 4 31 41 32 42 34 43 38 5 41 51 41 52 43 53 54 6 57 61 57 62 60 70 0 Gauss a, b, c x, y f(x, y) = ax 2 + bxy + cy 2 = x y a b/2 b/2 c x

More information

I A A441 : April 15, 2013 Version : 1.1 I Kawahira, Tomoki TA (Shigehiro, Yoshida )

I A A441 : April 15, 2013 Version : 1.1 I   Kawahira, Tomoki TA (Shigehiro, Yoshida ) I013 00-1 : April 15, 013 Version : 1.1 I Kawahira, Tomoki TA (Shigehiro, Yoshida) http://www.math.nagoya-u.ac.jp/~kawahira/courses/13s-tenbou.html pdf * 4 15 4 5 13 e πi = 1 5 0 5 7 3 4 6 3 6 10 6 17

More information

., White-Box, White-Box. White-Box.,, White-Box., Maple [11], 2. 1, QE, QE, 1 Redlog [7], QEPCAD [9], SyNRAC [8] 3 QE., 2 Brown White-Box. 3 White-Box

., White-Box, White-Box. White-Box.,, White-Box., Maple [11], 2. 1, QE, QE, 1 Redlog [7], QEPCAD [9], SyNRAC [8] 3 QE., 2 Brown White-Box. 3 White-Box White-Box Takayuki Kunihiro Graduate School of Pure and Applied Sciences, University of Tsukuba Hidenao Iwane ( ) / Fujitsu Laboratories Ltd. / National Institute of Informatics. Yumi Wada Graduate School

More information

DEIM Forum 2009 B4-6, Str

DEIM Forum 2009 B4-6, Str DEIM Forum 2009 B4-6, 305 8573 1 1 1 152 8550 2 12 1 E-mail: tttakuro@kde.cs.tsukuba.ac.jp, watanabe@de.cs.titech.ac.jp, kitagawa@cs.tsukuba.ac.jp StreamSpinner PC PC StreamSpinner Development of Data

More information

() / (front end) (back end) (phase) (pass) 1 2

() / (front end) (back end) (phase) (pass) 1 2 1 () () lex http://www.cs.info.mie-u.ac.jp/~toshi/lectures/compiler/ 2018 4 1 () / (front end) (back end) (phase) (pass) 1 2 () () var left, right; fun int main() { left = 0; right = 10; return ((left

More information

学校では教えてくれないアセットバンドル

学校では教えてくれないアセットバンドル Unity Technologies Japan Developer Relationship Engineer Yusuke Ebata Unity 5.3 Unity ICON:designed by Freepik 1 AssetBundle.CreateFromMemory AssetBundle.CreateFromFile WWW.LoadFromCacheOrDownload LoadFromCacheOrDonwload

More information

koji07-02.dvi

koji07-02.dvi 007 I II III 1,, 3, 4, 5, 6, 7 5 4 1 ε-n 1 ε-n ε-n ε-n. {a } =1 a ε N N a a N= a a

More information

Int Int 29 print Int fmt tostring 2 2 [19] ML ML [19] ML Emacs Standard ML M M ::= x c λx.m M M let x = M in M end (M) x c λx.

Int Int 29 print Int fmt tostring 2 2 [19] ML ML [19] ML Emacs Standard ML M M ::= x c λx.m M M let x = M in M end (M) x c λx. 1, 2 1 m110057@shibaura-it.ac.jp 2 sasano@sic.shibaura-it.ac.jp Eclipse Visual Studio ML Standard ML Emacs 1 ( IDE ) IDE C C++ Java IDE IDE IDE IDE Eclipse Java IDE Java Standard ML 1 print (Int. 1 Int

More information

SAMA- SUKU-RU Contents p-adic families of Eisenstein series (modular form) Hecke Eisenstein Eisenstein p T

SAMA- SUKU-RU Contents p-adic families of Eisenstein series (modular form) Hecke Eisenstein Eisenstein p T SAMA- SUKU-RU Contents 1. 1 2. 7.1. p-adic families of Eisenstein series 3 2.1. modular form Hecke 3 2.2. Eisenstein 5 2.3. Eisenstein p 7 3. 7.2. The projection to the ordinary part 9 3.1. The ordinary

More information

.5 z = a + b + c n.6 = a sin t y = b cos t dy d a e e b e + e c e e e + e 3 s36 3 a + y = a, b > b 3 s363.7 y = + 3 y = + 3 s364.8 cos a 3 s365.9 y =,

.5 z = a + b + c n.6 = a sin t y = b cos t dy d a e e b e + e c e e e + e 3 s36 3 a + y = a, b > b 3 s363.7 y = + 3 y = + 3 s364.8 cos a 3 s365.9 y =, [ ] IC. r, θ r, θ π, y y = 3 3 = r cos θ r sin θ D D = {, y ; y }, y D r, θ ep y yddy D D 9 s96. d y dt + 3dy + y = cos t dt t = y = e π + e π +. t = π y =.9 s6.3 d y d + dy d + y = y =, dy d = 3 a, b

More information

fiš„v8.dvi

fiš„v8.dvi (2001) 49 2 333 343 Java Jasp 1 2 3 4 2001 4 13 2001 9 17 Java Jasp (JAva based Statistical Processor) Jasp Jasp. Java. 1. Jasp CPU 1 106 8569 4 6 7; fuji@ism.ac.jp 2 106 8569 4 6 7; nakanoj@ism.ac.jp

More information

3 m = [n, n1, n 2,..., n r, 2n] p q = [n, n 1, n 2,..., n r ] p 2 mq 2 = ±1 1 1 6 1.1................................. 6 1.2......................... 8 1.3......................... 13 2 15 2.1.............................

More information

koji07-01.dvi

koji07-01.dvi 2007 I II III 1, 2, 3, 4, 5, 6, 7 5 10 19 (!) 1938 70 21? 1 1 2 1 2 2 1! 4, 5 1? 50 1 2 1 1 2 2 1?? 2 1 1, 2 1, 2 1, 2, 3,... 3 1, 2 1, 3? 2 1 3 1 2 1 1, 2 2, 3? 2 1 3 2 3 2 k,l m, n k,l m, n kn > ml...?

More information

土木学会構造工学論文集(2011.3)

土木学会構造工学論文集(2011.3) Vol.57A (11 3 ) RC Consecutve falling-weight impact test of large-scale RC girders under specified total input-impact energy * ** *** **** ***** Norimitsu Kishi, Hisashi Konno, Satoru Yamaguchi, Hiroshi

More information

(2018 2Q C) [ ] R 2 2 P = (a, b), Q = (c, d) Q P QP = ( ) a c b d (a c, b d) P = (a, b) O P ( ) a p = b P = (a, b) p = ( ) a b R 2 {( ) } R 2 x = x, y

(2018 2Q C) [ ] R 2 2 P = (a, b), Q = (c, d) Q P QP = ( ) a c b d (a c, b d) P = (a, b) O P ( ) a p = b P = (a, b) p = ( ) a b R 2 {( ) } R 2 x = x, y (2018 2Q C) [ ] R 2 2 P = (a, b), Q = (c, d) Q P QP = a c b d (a c, b d) P = (a, b) O P a p = b P = (a, b) p = a b R 2 { } R 2 x = x, y R y 2 a p =, c q = b d p + a + c q = b + d q p P q a p = c R c b

More information

II No.01 [n/2] [1]H n (x) H n (x) = ( 1) r n! r!(n 2r)! (2x)n 2r. r=0 [2]H n (x) n,, H n ( x) = ( 1) n H n (x). [3] H n (x) = ( 1) n dn x2 e dx n e x2

II No.01 [n/2] [1]H n (x) H n (x) = ( 1) r n! r!(n 2r)! (2x)n 2r. r=0 [2]H n (x) n,, H n ( x) = ( 1) n H n (x). [3] H n (x) = ( 1) n dn x2 e dx n e x2 II No.1 [n/] [1]H n x) H n x) = 1) r n! r!n r)! x)n r r= []H n x) n,, H n x) = 1) n H n x) [3] H n x) = 1) n dn x e dx n e x [4] H n+1 x) = xh n x) nh n 1 x) ) d dx x H n x) = H n+1 x) d dx H nx) = nh

More information

,.,. NP,., ,.,,.,.,,, (PCA)...,,. Tipping and Bishop (1999) PCA. (PPCA)., (Ilin and Raiko, 2010). PPCA EM., , tatsukaw

,.,. NP,., ,.,,.,.,,, (PCA)...,,. Tipping and Bishop (1999) PCA. (PPCA)., (Ilin and Raiko, 2010). PPCA EM., , tatsukaw ,.,. NP,.,. 1 1.1.,.,,.,.,,,. 2. 1.1.1 (PCA)...,,. Tipping and Bishop (1999) PCA. (PPCA)., (Ilin and Raiko, 2010). PPCA EM., 152-8552 2-12-1, tatsukawa.m.aa@m.titech.ac.jp, 190-8562 10-3, mirai@ism.ac.jp

More information

¥¤¥ó¥¿¡¼¥Í¥Ã¥È·×¬¤È¥Ç¡¼¥¿²òÀÏ Âè1²ó

¥¤¥ó¥¿¡¼¥Í¥Ã¥È·×¬¤È¥Ç¡¼¥¿²òÀÏ Âè1²ó 1 2011 5 11 lumeta internet mapping http://www.lumeta.com http://www.cheswick.com/ches/map/ 2 / 43 ( ) 3 / 43 (Kenjiro Cho) WIDE 1984 ( ) OS 1993 1996 ( ) (QoS ) 2001 ( ) 2004 ( ) QoS 4 / 43 (Internet

More information

(2016 2Q H) [ ] R 2 2 P = (a, b), Q = (c, d) Q P QP = ( ) a c b d (a c, b d) P = (a, b) O P ( ) a p = b P = (a, b) p = ( ) a b R 2 {( ) } R 2 x = x, y

(2016 2Q H) [ ] R 2 2 P = (a, b), Q = (c, d) Q P QP = ( ) a c b d (a c, b d) P = (a, b) O P ( ) a p = b P = (a, b) p = ( ) a b R 2 {( ) } R 2 x = x, y (2016 2Q H) [ ] R 2 2 P = (a, b), Q = (c, d) Q P QP = a c b d (a c, b d) P = (a, b) O P a p = b P = (a, b) p = a b R 2 { } R 2 x = x, y R y 2 a p =, c q = b d p + a + c q = b + d q p P q a p = c R c b

More information

DEIM Forum 2019 H2-2 SuperSQL SuperSQL SQL SuperSQL Web SuperSQL DBMS Pi

DEIM Forum 2019 H2-2 SuperSQL SuperSQL SQL SuperSQL Web SuperSQL DBMS Pi DEIM Forum 2019 H2-2 SuperSQL 223 8522 3 14 1 E-mail: {terui,goto}@db.ics.keio.ac.jp, toyama@ics.keio.ac.jp SuperSQL SQL SuperSQL Web SuperSQL DBMS PipelineDB SuperSQL Web Web 1 SQL SuperSQL HTML SuperSQL

More information

2 (1) a = ( 2, 2), b = (1, 2), c = (4, 4) c = l a + k b l, k (2) a = (3, 5) (1) (4, 4) = l( 2, 2) + k(1, 2), (4, 4) = ( 2l + k, 2l 2k) 2l + k = 4, 2l

2 (1) a = ( 2, 2), b = (1, 2), c = (4, 4) c = l a + k b l, k (2) a = (3, 5) (1) (4, 4) = l( 2, 2) + k(1, 2), (4, 4) = ( 2l + k, 2l 2k) 2l + k = 4, 2l ABCDEF a = AB, b = a b (1) AC (3) CD (2) AD (4) CE AF B C a A D b F E (1) AC = AB + BC = AB + AO = AB + ( AB + AF) = a + ( a + b) = 2 a + b (2) AD = 2 AO = 2( AB + AF) = 2( a + b) (3) CD = AF = b (4) CE

More information

Research on decision making in multi-player games with imperfect information

Research on decision making in multi-player games with imperfect information Research on decision making in multi-player games with imperfect information 37-086521 22 2 9 UCT UCT 46 % 60000 9 % 1 1 1.1........................................ 1 1.2.....................................

More information

, = = 7 6 = 42, =

, = = 7 6 = 42, = http://www.ss.u-tokai.ac.jp/~mahoro/2016autumn/alg_intro/ 1 1 2016.9.26, http://www.ss.u-tokai.ac.jp/~mahoro/2016autumn/alg_intro/ 1.1 1 214 132 = 28258 2 + 1 + 4 1 + 3 + 2 = 7 6 = 42, 4 + 2 = 6 2 + 8

More information

( )

( ) NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya

More information

untitled

untitled N N X=[ ] R IJK R X R ABC A=[a ] R B=[b ] R C=[c ] R ABC X =[ ] R = a b c X X X X X D( ) D(X X )= log + D( ) a a b b c c b c b c a c a c a b a b R X X A a t =a b c a = t a R i i = a =. a I R = a = b =

More information

1 1(a) MPR 1(b) MPR MPR MPR MPR MPR 2 1 MPR MPR MPR A MPR B MPR 2 MPR MPR MPR MPR MPR GPS MPR MPR MPR 3. MPR MPR 2 MPR 2 (1) (4) Zai

1 1(a) MPR 1(b) MPR MPR MPR MPR MPR 2 1 MPR MPR MPR A MPR B MPR 2 MPR MPR MPR MPR MPR GPS MPR MPR MPR 3. MPR MPR 2 MPR 2 (1) (4) Zai Popular MPR 1,a) 2,b) 2,c) GPS Most Popular Route( MPR) MPR MPR MPR MPR MPR MPR MPR Popular Popular MPR MPR Popular 1. GPS GPS GPS Google Maps *1 Zaiben [1] Most Popular Route( MPR) MPR MPR MPR 1 525 8577

More information

NV-HD830DTA

NV-HD830DTA NV-HD830DTA k FOR USE IN JAPAN ONLY z m z z q!1 q w e r t y u o!0!1 i m t t t r e w +_ +_ z z z z zz z z z z z z z z z z z z z z z z z z z z z z z L LL g z z 1 3 4 1 1.. 4

More information

. (.8.). t + t m ü(t + t) + c u(t + t) + k u(t + t) = f(t + t) () m ü f. () c u k u t + t u Taylor t 3 u(t + t) = u(t) + t! u(t) + ( t)! = u(t) + t u(

. (.8.). t + t m ü(t + t) + c u(t + t) + k u(t + t) = f(t + t) () m ü f. () c u k u t + t u Taylor t 3 u(t + t) = u(t) + t! u(t) + ( t)! = u(t) + t u( 3 8. (.8.)............................................................................................3.............................................4 Nermark β..........................................

More information

C言語によるアルゴリズムとデータ構造

C言語によるアルゴリズムとデータ構造 Algorithms and Data Structures in C 4 algorithm List - /* */ #include List - int main(void) { int a, b, c; int max; /* */ Ÿ 3Ÿ 2Ÿ 3 printf(""); printf(""); printf(""); scanf("%d", &a); scanf("%d",

More information

newmain.dvi

newmain.dvi 数論 サンプルページ この本の定価 判型などは, 以下の URL からご覧いただけます. http://www.morikita.co.jp/books/mid/008142 このサンプルページの内容は, 第 2 版 1 刷発行当時のものです. Daniel DUVERNEY: THÉORIE DES NOMBRES c Dunod, Paris, 1998, This book is published

More information

CRA3689A

CRA3689A AVIC-DRZ90 AVIC-DRZ80 2 3 4 5 66 7 88 9 10 10 10 11 12 13 14 15 1 1 0 OPEN ANGLE REMOTE WIDE SET UP AVIC-DRZ90 SOURCE OFF AV CONTROL MIC 2 16 17 1 2 0 0 1 AVIC-DRZ90 2 3 4 OPEN ANGLE REMOTE SOURCE OFF

More information

[2] 2. [3 5] 3D [6 8] Morishima [9] N n 24 24FPS k k = 1, 2,..., N i i = 1, 2,..., n Algorithm 1 N io user-specified number of inbetween omis

[2] 2. [3 5] 3D [6 8] Morishima [9] N n 24 24FPS k k = 1, 2,..., N i i = 1, 2,..., n Algorithm 1 N io user-specified number of inbetween omis 1,a) 2 2 2 1 2 3 24 Motion Frame Omission for Cartoon-like Effects Abstract: Limited animation is a hand-drawn animation style that holds each drawing for two or three successive frames to make up 24 frames

More information

DEIM Forum 2015 E4-5 DSMS DSMS DSMS 32% 46% RTOS Priority Inversion Time

DEIM Forum 2015 E4-5 DSMS DSMS DSMS 32% 46% RTOS Priority Inversion Time DEIM Forum 2015 E4-5 DSMS 464 8601 E-mail: {katsunuma,honda,hiro}@ertl.jp, watanabe@coi.nagoya-u.ac.jp DSMS DSMS 32% 46% RTOS Priority Inversion Time Reduction by Operator-Level Commit of DSMS Satoshi

More information

R1RW0408D シリーズ

R1RW0408D シリーズ お客様各位 カタログ等資料中の旧社名の扱いについて 2010 年 4 月 1 日を以って NEC エレクトロニクス株式会社及び株式会社ルネサステクノロジが合併し 両社の全ての事業が当社に承継されております 従いまして 本資料中には旧社名での表記が残っておりますが 当社の資料として有効ですので ご理解の程宜しくお願い申し上げます ルネサスエレクトロニクスホームページ (http://www.renesas.com)

More information

Optical Flow t t + δt 1 Motion Field 3 3 1) 2) 3) Lucas-Kanade 4) 1 t (x, y) I(x, y, t)

Optical Flow t t + δt 1 Motion Field 3 3 1) 2) 3) Lucas-Kanade 4) 1 t (x, y) I(x, y, t) http://wwwieice-hbkborg/ 2 2 4 2 -- 2 4 2010 9 3 3 4-1 Lucas-Kanade 4-2 Mean Shift 3 4-3 2 c 2013 1/(18) http://wwwieice-hbkborg/ 2 2 4 2 -- 2 -- 4 4--1 2010 9 4--1--1 Optical Flow t t + δt 1 Motion Field

More information

1 filename=mathformula tex 1 ax 2 + bx + c = 0, x = b ± b 2 4ac, (1.1) 2a x 1 + x 2 = b a, x 1x 2 = c a, (1.2) ax 2 + 2b x + c = 0, x = b ± b 2

1 filename=mathformula tex 1 ax 2 + bx + c = 0, x = b ± b 2 4ac, (1.1) 2a x 1 + x 2 = b a, x 1x 2 = c a, (1.2) ax 2 + 2b x + c = 0, x = b ± b 2 filename=mathformula58.tex ax + bx + c =, x = b ± b 4ac, (.) a x + x = b a, x x = c a, (.) ax + b x + c =, x = b ± b ac. a (.3). sin(a ± B) = sin A cos B ± cos A sin B, (.) cos(a ± B) = cos A cos B sin

More information

2 H23 BioS (i) data d1; input group patno t sex censor; cards;

2 H23 BioS (i) data d1; input group patno t sex censor; cards; H BioS (i) data d1; input group patno t sex censor; cards; 0 1 0 0 0 0 1 0 1 1 0 4 4 0 1 0 5 5 1 1 0 6 5 1 1 0 7 10 1 0 0 8 15 0 1 0 9 15 0 1 0 10 4 1 0 0 11 4 1 0 1 1 5 1 0 1 1 7 0 1 1 14 8 1 0 1 15 8

More information

a n a n ( ) (1) a m a n = a m+n (2) (a m ) n = a mn (3) (ab) n = a n b n (4) a m a n = a m n ( m > n ) m n 4 ( ) 552

a n a n ( ) (1) a m a n = a m+n (2) (a m ) n = a mn (3) (ab) n = a n b n (4) a m a n = a m n ( m > n ) m n 4 ( ) 552 3 3.0 a n a n ( ) () a m a n = a m+n () (a m ) n = a mn (3) (ab) n = a n b n (4) a m a n = a m n ( m > n ) m n 4 ( ) 55 3. (n ) a n n a n a n 3 4 = 8 8 3 ( 3) 4 = 8 3 8 ( ) ( ) 3 = 8 8 ( ) 3 n n 4 n n

More information

通信容量制約を考慮したフィードバック制御 - 電子情報通信学会 情報理論研究会(IT) 若手研究者のための講演会

通信容量制約を考慮したフィードバック制御 -  電子情報通信学会 情報理論研究会(IT)  若手研究者のための講演会 IT 1 2 1 2 27 11 24 15:20 16:05 ( ) 27 11 24 1 / 49 1 1940 Witsenhausen 2 3 ( ) 27 11 24 2 / 49 1940 2 gun director Warren Weaver, NDRC (National Defence Research Committee) Final report D-2 project #2,

More information

1. 2 P 2 (x, y) 2 x y (0, 0) R 2 = {(x, y) x, y R} x, y R P = (x, y) O = (0, 0) OP ( ) OP x x, y y ( ) x v = y ( ) x 2 1 v = P = (x, y) y ( x y ) 2 (x

1. 2 P 2 (x, y) 2 x y (0, 0) R 2 = {(x, y) x, y R} x, y R P = (x, y) O = (0, 0) OP ( ) OP x x, y y ( ) x v = y ( ) x 2 1 v = P = (x, y) y ( x y ) 2 (x . P (, (0, 0 R {(,, R}, R P (, O (0, 0 OP OP, v v P (, ( (, (, { R, R} v (, (, (,, z 3 w z R 3,, z R z n R n.,..., n R n n w, t w ( z z Ke Words:. A P 3 0 B P 0 a. A P b B P 3. A π/90 B a + b c π/ 3. +

More information

XACCの概要

XACCの概要 2 global void kernel(int a[max], int llimit, int ulimit) {... } : int main(int argc, char *argv[]){ MPI_Int(&argc, &argc); MPI_Comm_rank(MPI_COMM_WORLD, &rank); MPI_Comm_size(MPI_COMM_WORLD, &size); dx

More information

ver Web

ver Web ver201723 Web 1 4 11 4 12 5 13 7 2 9 21 9 22 10 23 10 24 11 3 13 31 n 13 32 15 33 21 34 25 35 (1) 27 4 30 41 30 42 32 43 36 44 (2) 38 45 45 46 45 5 46 51 46 52 48 53 49 54 51 55 54 56 58 57 (3) 61 2 3

More information

2.2 Sage I 11 factor Sage Sage exit quit 1 sage : exit 2 Exiting Sage ( CPU time 0m0.06s, Wall time 2m8.71 s). 2.2 Sage Python Sage 1. Sage.sage 2. sa

2.2 Sage I 11 factor Sage Sage exit quit 1 sage : exit 2 Exiting Sage ( CPU time 0m0.06s, Wall time 2m8.71 s). 2.2 Sage Python Sage 1. Sage.sage 2. sa I 2017 11 1 SageMath SageMath( Sage ) Sage Python Sage Python Sage Maxima Maxima Sage Sage Sage Linux, Mac, Windows *1 2 Sage Sage 4 1. ( sage CUI) 2. Sage ( sage.sage ) 3. Sage ( notebook() ) 4. Sage

More information

独立行政法人情報通信研究機構 Development of the Information Analysis System WISDOM KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the infor

独立行政法人情報通信研究機構 Development of the Information Analysis System WISDOM KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the infor 独立行政法人情報通信研究機構 KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the information analysis system WISDOM as a research result of the second medium-term plan. WISDOM has functions that

More information

DEIM Forum 2014 D3-5 DSMS DSMS DSMS 2.13% RTOS Realtime-Aware Efficient Query Processing for Automotiv

DEIM Forum 2014 D3-5 DSMS DSMS DSMS 2.13% RTOS Realtime-Aware Efficient Query Processing for Automotiv DEIM Forum 2014 D3-5 DSMS 464 8601 E-mail: {katsunuma,honda,hiro}@ertl.jp DSMS DSMS 2.13% RTOS Realtime-Aware Efficient Query Processing for Automotive DSMS Satoshi KATSUNUMA, Shinya HONDA, and Hiroaki

More information

メモリ階層構造を考慮した大規模グラフ処理の高速化

メモリ階層構造を考慮した大規模グラフ処理の高速化 , CREST ERATO 0.. (, CREST) ERATO / 8 Outline NETAL (NETwork Analysis Library) NUMA BFS raph500, reenraph500 Kronecker raph Level Synchronized parallel BFS Hybrid Algorithm for Parallel BFS NUMA Hybrid

More information

: ( 1) () 1. ( 1) 2. ( 1) 3. ( 2)

: ( 1) () 1. ( 1) 2. ( 1) 3. ( 2) Acquiring Organized Information from News by Incremental Theme Refinements 1 1 1 Yutaro Taniguchi 1 Tetsunori Kobayashi 1 Yoshihiko Hayashi 1 1 1 School of Science and Engineering, Waseda University Abstract:

More information

29

29 9 .,,, 3 () C k k C k C + C + C + + C 8 + C 9 + C k C + C + C + C 3 + C 4 + C 5 + + 45 + + + 5 + + 9 + 4 + 4 + 5 4 C k k k ( + ) 4 C k k ( k) 3 n( ) n n n ( ) n ( ) n 3 ( ) 3 3 3 n 4 ( ) 4 4 4 ( ) n n

More information

DEIM Forum 2010 A3-3 Web Web Web Web Web. Web Abstract Web-page R

DEIM Forum 2010 A3-3 Web Web Web Web Web. Web Abstract Web-page R DEIM Forum 2010 A3-3 Web Web 305 8550 1 2 305 8550 1 2 E-mail: s0813167@u.tsukuba.ac.jp, satoh@slis.tsukuba.ac.jp Web Web Web. Web Abstract Web-page Recommendation System based on the Keyword transitions

More information

mobius1

mobius1 H + : ω = ( a, b, c, d, ad bc > 0) 3.. ( c 0 )... ( 5z + 2 : ω = L (*) z + 4 5z + 2 z = z =, 2. (*) z + 4 5z+ 2 6( z+) ω + = + = z+ 4 z+ 4 5z+ 2 3( z 2) ω 2 = 2= z+ 4 z+ 4 ω + z + = 2 ω 2 z 2 x + T ( x)

More information

熊本県数学問題正解

熊本県数学問題正解 00 y O x Typed by L A TEX ε ( ) (00 ) 5 4 4 ( ) http://www.ocn.ne.jp/ oboetene/plan/. ( ) (009 ) ( ).. http://www.ocn.ne.jp/ oboetene/plan/eng.html 8 i i..................................... ( )0... (

More information

Microsoft Word - toyoshima-deim2011.doc

Microsoft Word - toyoshima-deim2011.doc DEIM Forum 2011 E9-4 252-0882 5322 252-0882 5322 E-mail: t09651yt, sashiori, kiyoki @sfc.keio.ac.jp CBIR A Meaning Recognition System for Sign-Logo by Color-Shape-Based Similarity Computations for Images

More information

1. A0 A B A0 A : A1,...,A5 B : B1,...,B

1. A0 A B A0 A : A1,...,A5 B : B1,...,B 1. A0 A B A0 A : A1,...,A5 B : B1,...,B12 2. 3. 4. 5. A0 A B f : A B 4 (i) f (ii) f (iii) C 2 g, h: C A f g = f h g = h (iv) C 2 g, h: B C g f = h f g = h 4 (1) (i) (iii) (2) (iii) (i) (3) (ii) (iv) (4)

More information

10/ / /30 3. ( ) 11/ 6 4. UNIX + C socket 11/13 5. ( ) C 11/20 6. http, CGI Perl 11/27 7. ( ) Perl 12/ 4 8. Windows Winsock 12/11 9. JAV

10/ / /30 3. ( ) 11/ 6 4. UNIX + C socket 11/13 5. ( ) C 11/20 6. http, CGI Perl 11/27 7. ( ) Perl 12/ 4 8. Windows Winsock 12/11 9. JAV tutimura@mist.i.u-tokyo.ac.jp kaneko@ipl.t.u-tokyo.ac.jp http://www.misojiro.t.u-tokyo.ac.jp/ tutimura/sem3/ 2002 11 20 p.1/34 10/16 1. 10/23 2. 10/30 3. ( ) 11/ 6 4. UNIX + C socket 11/13 5. ( ) C 11/20

More information

DEIM Forum 2019 D3-5 Web Yahoo! JAPAN Q&A Web Web

DEIM Forum 2019 D3-5 Web Yahoo! JAPAN Q&A Web Web DEIM Forum 2019 D3-5 Web 565 0871 1 5 Yahoo! JAPAN 102 8282 1 3 E-mail: {nakamura.tatsuya,hara}@ist.osaka-u.ac.jp, sufujita@yahoo-corp.jp Q&A Web Web Q&A Web Web 1 Web Web Web [2], [3], [10] Web Web [8],

More information

2 HI LO ZDD 2 ZDD 2 HI LO 2 ( ) HI (Zero-suppress ) Zero-suppress ZDD ZDD Zero-suppress 1 ZDD abc a HI b c b Zero-suppress b ZDD ZDD 5) ZDD F 1 F = a

2 HI LO ZDD 2 ZDD 2 HI LO 2 ( ) HI (Zero-suppress ) Zero-suppress ZDD ZDD Zero-suppress 1 ZDD abc a HI b c b Zero-suppress b ZDD ZDD 5) ZDD F 1 F = a ZDD 1, 2 1, 2 1, 2 2 2, 1 #P- Knuth ZDD (Zero-suppressed Binary Decision Diagram) 2 ZDD ZDD ZDD Knuth Knuth ZDD ZDD Path Enumeration Algorithms Using ZDD and Their Performance Evaluations Toshiki Saitoh,

More information

3 3 3 Knecht (2-3fps) AR [3] 2. 2 Debevec High Dynamic Range( HDR) [4] HDR Derek [5] 2. 3 [6] 3. [6] x E(x) E(x) = 2π π 2 V (x, θ i, ϕ i )L(θ

3 3 3 Knecht (2-3fps) AR [3] 2. 2 Debevec High Dynamic Range( HDR) [4] HDR Derek [5] 2. 3 [6] 3. [6] x E(x) E(x) = 2π π 2 V (x, θ i, ϕ i )L(θ (MIRU212) 212 8 RGB-D 223 8522 3 14 1 E-mail: {ikeda,charmie,saito}@hvrl.ics.keio.ac.jp, sugimoto@ics.keio.ac.jp RGB-D Lambert RGB-D 1. Augmented Reality AR [1] AR AR 2 [2], [3] [4], [5] [6] RGB-D RGB-D

More information