SlideShare une entreprise Scribd logo
1  sur  45
Extrapolation Methods for Accelerating PageRank Computations Sepandar D. Kamvar Taher H. Haveliwala Christopher D. Manning Gene H. Golub Stanford University
Motivation ,[object Object],[object Object],[object Object],[object Object],[object Object],Note: PageRank Computations don’t get faster as computers do. Results:  1.  The Official Site of the San Francisco Giants Search: Giants Results:  1.  The Official Site of the New York Giants
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],0.4 0.2 0.4 Repeat: u 1 u 2 u 3 u 4 u 5 u 1 u 2 u 3 u 4 u 5
Link Counts Linked by 2 Important Pages Linked by 2 Unimportant pages Sep’s Home Page Taher’s Home Page Yahoo! CNN DB Pub Server CS361
Definition of PageRank ,[object Object],importance of page  i pages  j  that link to page  i number of outlinks from  page  j importance of page  j
Definition of PageRank Yahoo! CNN DB Pub Server Taher Sep 1/2 1/2 1 1 0.1 0.1 0.1 0.05 0.25
PageRank Diagram Initialize all nodes to rank  0.333 0.333 0.333
PageRank Diagram Propagate ranks across links (multiplying by link weights) 0.167 0.167 0.333 0.333
PageRank Diagram 0.333 0.5 0.167
PageRank Diagram 0.167 0.167 0.5 0.167
PageRank Diagram 0.5 0.333 0.167
PageRank Diagram After a while… 0.4 0.4 0.2
Computing PageRank ,[object Object],[object Object],importance of page  i pages  j  that link to page  i number of outlinks from  page  j importance of page  j
Matrix Notation 0 .2  0 .3  0  0 .1  .4  0 .1 = .1 .3 .2 .3 .1 .1 .2 . 1 .3 .2 .3 .1 .1
Matrix Notation Find  x  that satisfies: . 1 .3 .2 .3 .1 .1 0 .2  0 .3  0  0 .1  .4  0 .1 = .1 .3 .2 .3 .1 .1 .2
Power Method ,[object Object],[object Object]
[object Object],[object Object],[object Object],A side note Find  x  that satisfies: Find  x  that satisfies:
Power Method ,[object Object],[object Object],[object Object]
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],0.4 0.2 0.4 Repeat: u 1 u 2 u 3 u 4 u 5 u 1 u 2 u 3 u 4 u 5
Power Method u 1 1 u 2  2 u 3  3 u 4  4 u 5  5 Express  x (0)  in terms of eigenvectors of A
Power Method u 1 1 u 2  2  2 u 3  3  3 u 4  4  4 u 5  5  5
Power Method u 1 1 u 2  2  2 2 u 3  3  3 2 u 4  4  4 2 u 5  5  5 2
Power Method u 1 1 u 2  2  2 k u 3  3  3 k u 4  4  4 k u 5  5  5 k
Power Method u 1 1 u 2  u 3  u 4  u 5 
Why does it work? ,[object Object],u 1 1 u 2  2 u 3  3 u 4  4 u 5  5 ,[object Object]
Why does it work? ,[object Object],[object Object],[object Object],[object Object],All less than 1
Power Method u 1 1 u 2  2 u 3  3 u 4  4 u 5  5 u 1 1 u 2  2  2 u 3  3  3 u 4  4  4 u 5  5  5 u 1 1 u 2  2  2 2 u 3  3  3 2 u 4  4  4 2 u 5  5  5 2
[object Object],Convergence u 1 1 u 2  2  2 k u 3  3  3 k u 4  4  4 k u 5  5  5 k
Our Approach u 1 u 2 u 3 u 4 u 5 Estimate components of current iterate   in the directions  of second two eigenvectors, and eliminate them.
Why this approach? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1 (“The Second Eigenvalue of the Google Matrix” dbpubs.stanford.edu/pub/2003-20.)
Using Successive Iterates u 1 x (0) u 1 u 2 u 3 u 4 u 5
Using Successive Iterates u 1 x (1) x (0) u 1 u 2 u 3 u 4 u 5
Using Successive Iterates u 1 x (1) x (0) x (2) u 1 u 2 u 3 u 4 u 5
Using Successive Iterates x (0) u 1 x (1) x (2) u 1 u 2 u 3 u 4 u 5
Using Successive Iterates  x (0) x’ = u 1 x (1) u 1 u 2 u 3 u 4 u 5
How do we do this? ,[object Object],[object Object]
Assume ,[object Object]
Linear Combination ,[object Object]
Rearranging Terms ,[object Object],Goal: Find   1 ,  2 ,  3  so that coefficients of  u 2  and  u 3   are 0, and coefficient of  u 1   is 1.
Summary ,[object Object],[object Object],[object Object]
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],u 1 u 2 u 3 u 4 u 5 u 1 u 2 u 3 u 4 u 5 0.4 0.2 0.4 Repeat:
Results Quadratic Extrapolation speeds up convergence.  Extrapolation was only used 5 times!
Results Extrapolation dramatically speeds up convergence,  for high values of c (c=.99)
Take-home message ,[object Object],[object Object],[object Object]
The End ,[object Object]

Contenu connexe

Tendances

Basics of quantum mechanics
Basics of quantum mechanicsBasics of quantum mechanics
Basics of quantum mechanicsMirzaMusmanBaig
 
10 merge sort
10 merge sort10 merge sort
10 merge sortirdginfo
 
Introduction to density functional theory
Introduction to density functional theory Introduction to density functional theory
Introduction to density functional theory Sarthak Hajirnis
 
ADAPTIVE CONTROL AND SYNCHRONIZATION OF A HIGHLY CHAOTIC ATTRACTOR
ADAPTIVE CONTROL AND SYNCHRONIZATION OF A HIGHLY CHAOTIC ATTRACTORADAPTIVE CONTROL AND SYNCHRONIZATION OF A HIGHLY CHAOTIC ATTRACTOR
ADAPTIVE CONTROL AND SYNCHRONIZATION OF A HIGHLY CHAOTIC ATTRACTORijistjournal
 
Wk 6 part 2 non linearites and non linearization april 05
Wk 6 part 2 non linearites and non linearization april 05Wk 6 part 2 non linearites and non linearization april 05
Wk 6 part 2 non linearites and non linearization april 05Charlton Inao
 
ADAPTIVE CONTROL AND SYNCHRONIZATION OF LIU’S FOUR-WING CHAOTIC SYSTEM WITH C...
ADAPTIVE CONTROL AND SYNCHRONIZATION OF LIU’S FOUR-WING CHAOTIC SYSTEM WITH C...ADAPTIVE CONTROL AND SYNCHRONIZATION OF LIU’S FOUR-WING CHAOTIC SYSTEM WITH C...
ADAPTIVE CONTROL AND SYNCHRONIZATION OF LIU’S FOUR-WING CHAOTIC SYSTEM WITH C...IJCSEA Journal
 

Tendances (10)

Basics of quantum mechanics
Basics of quantum mechanicsBasics of quantum mechanics
Basics of quantum mechanics
 
Two queue tandem resim 16 presentatio
Two queue tandem resim 16 presentatioTwo queue tandem resim 16 presentatio
Two queue tandem resim 16 presentatio
 
ME-314- Control Engineering - Week 03-04
ME-314- Control Engineering - Week 03-04ME-314- Control Engineering - Week 03-04
ME-314- Control Engineering - Week 03-04
 
Mah
MahMah
Mah
 
10 merge sort
10 merge sort10 merge sort
10 merge sort
 
Introduction to density functional theory
Introduction to density functional theory Introduction to density functional theory
Introduction to density functional theory
 
ADAPTIVE CONTROL AND SYNCHRONIZATION OF A HIGHLY CHAOTIC ATTRACTOR
ADAPTIVE CONTROL AND SYNCHRONIZATION OF A HIGHLY CHAOTIC ATTRACTORADAPTIVE CONTROL AND SYNCHRONIZATION OF A HIGHLY CHAOTIC ATTRACTOR
ADAPTIVE CONTROL AND SYNCHRONIZATION OF A HIGHLY CHAOTIC ATTRACTOR
 
Wk 6 part 2 non linearites and non linearization april 05
Wk 6 part 2 non linearites and non linearization april 05Wk 6 part 2 non linearites and non linearization april 05
Wk 6 part 2 non linearites and non linearization april 05
 
ADAPTIVE CONTROL AND SYNCHRONIZATION OF LIU’S FOUR-WING CHAOTIC SYSTEM WITH C...
ADAPTIVE CONTROL AND SYNCHRONIZATION OF LIU’S FOUR-WING CHAOTIC SYSTEM WITH C...ADAPTIVE CONTROL AND SYNCHRONIZATION OF LIU’S FOUR-WING CHAOTIC SYSTEM WITH C...
ADAPTIVE CONTROL AND SYNCHRONIZATION OF LIU’S FOUR-WING CHAOTIC SYSTEM WITH C...
 
Stable chaos
Stable chaosStable chaos
Stable chaos
 

Similaire à Extrapolation

Cost Efficient PageRank Computation using GPU : NOTES
Cost Efficient PageRank Computation using GPU : NOTESCost Efficient PageRank Computation using GPU : NOTES
Cost Efficient PageRank Computation using GPU : NOTESSubhajit Sahu
 
Design of Second Order Digital Differentiator and Integrator Using Forward Di...
Design of Second Order Digital Differentiator and Integrator Using Forward Di...Design of Second Order Digital Differentiator and Integrator Using Forward Di...
Design of Second Order Digital Differentiator and Integrator Using Forward Di...inventionjournals
 
Intro. to computational Physics ch2.pdf
Intro. to computational Physics ch2.pdfIntro. to computational Physics ch2.pdf
Intro. to computational Physics ch2.pdfJifarRaya
 
Fortran chapter 2.pdf
Fortran chapter 2.pdfFortran chapter 2.pdf
Fortran chapter 2.pdfJifarRaya
 
Perspective in Informatics 3 - Assignment 2 - Answer Sheet
Perspective in Informatics 3 - Assignment 2 - Answer SheetPerspective in Informatics 3 - Assignment 2 - Answer Sheet
Perspective in Informatics 3 - Assignment 2 - Answer SheetHoang Nguyen Phong
 
MODULE_05-Matrix Decomposition.pptx
MODULE_05-Matrix Decomposition.pptxMODULE_05-Matrix Decomposition.pptx
MODULE_05-Matrix Decomposition.pptxAlokSingh205089
 
Mncs 16-10-1주-변승규-introduction to the machine learning #2
Mncs 16-10-1주-변승규-introduction to the machine learning #2Mncs 16-10-1주-변승규-introduction to the machine learning #2
Mncs 16-10-1주-변승규-introduction to the machine learning #2Seung-gyu Byeon
 
Paper Study: Melding the data decision pipeline
Paper Study: Melding the data decision pipelinePaper Study: Melding the data decision pipeline
Paper Study: Melding the data decision pipelineChenYiHuang5
 
New approach for wolfe’s modified simplex method to solve quadratic programmi...
New approach for wolfe’s modified simplex method to solve quadratic programmi...New approach for wolfe’s modified simplex method to solve quadratic programmi...
New approach for wolfe’s modified simplex method to solve quadratic programmi...eSAT Journals
 
Numerical Techniques
Numerical TechniquesNumerical Techniques
Numerical TechniquesYasir Mahdi
 
Chapter8-Link_Analysis.pptx
Chapter8-Link_Analysis.pptxChapter8-Link_Analysis.pptx
Chapter8-Link_Analysis.pptxAmenahAbbood
 
Chapter8-Link_Analysis (1).pptx
Chapter8-Link_Analysis (1).pptxChapter8-Link_Analysis (1).pptx
Chapter8-Link_Analysis (1).pptxAmenahAbbood
 
Unit-1 Basic Concept of Algorithm.pptx
Unit-1 Basic Concept of Algorithm.pptxUnit-1 Basic Concept of Algorithm.pptx
Unit-1 Basic Concept of Algorithm.pptxssuser01e301
 
PageRank Centrality of dynamic graph structures
PageRank Centrality of dynamic graph structuresPageRank Centrality of dynamic graph structures
PageRank Centrality of dynamic graph structuresDavid Gleich
 

Similaire à Extrapolation (20)

Neural Networks
Neural NetworksNeural Networks
Neural Networks
 
Cost Efficient PageRank Computation using GPU : NOTES
Cost Efficient PageRank Computation using GPU : NOTESCost Efficient PageRank Computation using GPU : NOTES
Cost Efficient PageRank Computation using GPU : NOTES
 
Design of Second Order Digital Differentiator and Integrator Using Forward Di...
Design of Second Order Digital Differentiator and Integrator Using Forward Di...Design of Second Order Digital Differentiator and Integrator Using Forward Di...
Design of Second Order Digital Differentiator and Integrator Using Forward Di...
 
Intro. to computational Physics ch2.pdf
Intro. to computational Physics ch2.pdfIntro. to computational Physics ch2.pdf
Intro. to computational Physics ch2.pdf
 
Fortran chapter 2.pdf
Fortran chapter 2.pdfFortran chapter 2.pdf
Fortran chapter 2.pdf
 
Perspective in Informatics 3 - Assignment 2 - Answer Sheet
Perspective in Informatics 3 - Assignment 2 - Answer SheetPerspective in Informatics 3 - Assignment 2 - Answer Sheet
Perspective in Informatics 3 - Assignment 2 - Answer Sheet
 
NFSFIXES
NFSFIXESNFSFIXES
NFSFIXES
 
D026017036
D026017036D026017036
D026017036
 
MODULE_05-Matrix Decomposition.pptx
MODULE_05-Matrix Decomposition.pptxMODULE_05-Matrix Decomposition.pptx
MODULE_05-Matrix Decomposition.pptx
 
Mncs 16-10-1주-변승규-introduction to the machine learning #2
Mncs 16-10-1주-변승규-introduction to the machine learning #2Mncs 16-10-1주-변승규-introduction to the machine learning #2
Mncs 16-10-1주-변승규-introduction to the machine learning #2
 
Paper Study: Melding the data decision pipeline
Paper Study: Melding the data decision pipelinePaper Study: Melding the data decision pipeline
Paper Study: Melding the data decision pipeline
 
Simplex algorithm
Simplex algorithmSimplex algorithm
Simplex algorithm
 
New approach for wolfe’s modified simplex method to solve quadratic programmi...
New approach for wolfe’s modified simplex method to solve quadratic programmi...New approach for wolfe’s modified simplex method to solve quadratic programmi...
New approach for wolfe’s modified simplex method to solve quadratic programmi...
 
Data Analysis Homework Help
Data Analysis Homework HelpData Analysis Homework Help
Data Analysis Homework Help
 
Numerical Techniques
Numerical TechniquesNumerical Techniques
Numerical Techniques
 
Chapter8-Link_Analysis.pptx
Chapter8-Link_Analysis.pptxChapter8-Link_Analysis.pptx
Chapter8-Link_Analysis.pptx
 
Chapter8-Link_Analysis (1).pptx
Chapter8-Link_Analysis (1).pptxChapter8-Link_Analysis (1).pptx
Chapter8-Link_Analysis (1).pptx
 
Generative models
Generative modelsGenerative models
Generative models
 
Unit-1 Basic Concept of Algorithm.pptx
Unit-1 Basic Concept of Algorithm.pptxUnit-1 Basic Concept of Algorithm.pptx
Unit-1 Basic Concept of Algorithm.pptx
 
PageRank Centrality of dynamic graph structures
PageRank Centrality of dynamic graph structuresPageRank Centrality of dynamic graph structures
PageRank Centrality of dynamic graph structures
 

Dernier

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

Extrapolation

Notes de l'éditeur

  1. Why does the Power Method Work?
  2. Assume that lambda 1 is less than 1 and all other eigenvalues are strictly less than 1.
  3. Here, talk about in the past, how lambda 2 is often close to 1, so the power method is not useful. However, in our case,
  4. Note : derivation given here is slightly different from what’s in the paper the one here is perhaps more intuitive the one in the paper is more compact