SlideShare une entreprise Scribd logo
1  sur  38
A K-Main Routes Approach to
Spatial Network Activity Summarization
Authors:
Dev Oliver
Shashi Shekhar
James M. Kang
Renee Bousselaire
Abdussalam Bannur
Outline
 Motivation
 Problem Statement
 Contributions
 Validation
 Analytical
 Experimental
 Case Studies
 Summary and Future Work
Motivation: Crime Analysis (application domain)
 Crime hotspot
 Area of concentrated crime
Street Place
Neighborhood
**J. E. Eck et. al. Mapping Crime: Understanding Hot Spots. US National Inst. of Justice (http://www.ncjrs.gov/pdffiles1/nij/209393.pdf), 2005.
“Most clustering algorithms will show areas of concentration even when a line
is the most appropriate dimension.” – National Institute of Justice**
Star Tribune, January 26, 2011
Examples of Linear Patterns
Linear patterns resulting from deforestation in Brazil
http://en.wikipedia.org/wiki/Deforestation_in_Brazil
Linear patterns of crime in a major US
city
Motivation: Environmental Criminology (scientific domain)
 Spatial theories in Environmental Criminology
1L.E. Cohen et al., Social change and crime rate trends: A routine activity approach, American sociological review, 1979.
2P. L. Brantingham et al., Environmental Criminology, Waveland Press, 1990.
 Routine Activity Theory1
 Crime location related to criminal’s
frequently visited areas
 Crime Pattern Theory2
 Based on spatial model
 Nodes (e.g. home, work,
entertainment),
 Paths (e.g. routes between
nodes),
 Edges
 Crime locations close to edges
 Near criminal’s activity
boundaries where residents may
not recognize him/her
Source: Rossmo, Kim (2000). Geographic Profiling. Boca Raton, FL: CRC Press.
http://www.popcenter.org/learning/60steps/index.cfm?stepNum=16
 Network based summarization adds value to Environmental Criminology
 Assist with large scale verification of real-world data matching theories
 Opportunities to develop hypotheses for new theory formulation
Other Domains
Accident Analysis and PreventionDisaster Relief
Motivation Problem Contributions Validation Summary
Key Concepts
 Activity
 Object of interest located at node or edge
 Summary path
 A path chosen by KMR to summarize activities
 Activity coverage
 Total number of activities of a path or set of paths
 Active node
 A node having n ≥ 1 activities or joined by an edge
having n ≥ 1 activities e.g., A, B, C, D, E
 Inactive node
 A node having n = 0 activities and joined by edges
all having n = 0 activities e.g., F
 Active node ratio
 Total # active nodes/Total # nodes
 e.g., 5/6
Each edge has a weight of 1
Motivation Problem Contributions Validation Summary
Problem Statement
 Given
 A spatial network G = (N, E)
 A set of activities, A and their
locations (e.g. a node or edge)
 A set of Paths, P
 K (Number of routes)
 Edge weights
 Find
 A cardinality k subset P′ of P, i.e.,
a subset P′⊆ P with |P′| = k
 Objective
 Maximize the activity coverage
(AC) by P′
 Constraints
 1 ≤ k ≤ |P|.
k = 2
Edge Weights
are 1
Given P = the set of Shortest Paths
Motivation Problem Contributions Validation Summary
Challenges
 Measures of interestingness
 Activity coverage, average distance, etc
 Computational Complexity
 Choose(N,2) paths, given N nodes
 Exponential number of k subsets of paths
Motivation Problem Contributions Validation Summary
Related Work
Network Summarization by Grouping/Clustering
Clumping (Okabe), e.g.
NT-VCM (Shiode)
Max. Subgraph, e.g.
path, tree (Buchin)
Multiple routesZero or One routes
Our Work
Motivation Problem Contributions Validation Summary
Contributions
 K-Main Routes (KMR) algorithm
 Finds a set of k routes to group activities
 New design decisions added
 Network Voronoi Activity assignment
 Divide and Conquer Summary path recomputation
 Spatial network activity summarization is shown to be NP-complete.
 Analytically demonstrate correctness of design decisions and show cost
analysis
 Experimental evaluation of the various algorithms
 Performance evaluated using synthetic and real world datasets
 Case study comparing KMR with geometry based summarization
Motivation Problem Contributions Validation Summary
K-Main Routes (KMR) Algorithm
 K-Main Routes Algorithm
 Select k paths as initial summary paths
 Repeat
1. Form k clusters by assigning each activity
to its closest summary path
2. Recompute summary path of each cluster
 Until summary paths do not change
 Design Decisions
 Inactive node pruning
 Network Voronoi Activity assignment
 Divide and Conquer Summary path
recomputation
P = the set of Shortest Paths, K=2
Motivation Problem Contributions Validation Summary
Design Decision: Inactive Node Pruning
 Only consider paths between active nodes
 Optimal solution will still be in this set
Given the set of shortest paths
• 20 shortest paths calculated and stored versus 30
Motivation Problem Contributions Validation Summary
Design Decision: Network Voronoi (NV) Activity Assignment
 Goals
 Form k clusters by assigning each activity to its closest summary path
 Improve execution time of current assignment strategy
 Example (execution trace) Next
K-Main Routes Algorithm
Select k shortest paths as initial summary paths
Repeat
1. Form k clusters by assigning each activity
to its closest summary path
2. Recompute summary path of each cluster
Until summary paths do not change
K-Main Routes Algorithm
Select k shortest paths as initial summary paths
Repeat
1. Network Voronoi Activity Assignment
2. Recompute summary path of each cluster
Until summary paths do not change
Motivation Problem Contributions Validation Summary
Design Decision: Network Voronoi (NV) Activity Assignment
A B C D
E F G H
1
2
3 4
5 6
7 8
9
10
X
DISTANCEFROM
Open:
ACTIVITIES
1 2 3 4 5 6 7 8 9 10
A
E
D
H
AE
DH
Closed:
Activity
Active Node
Inactive Node
Virtual Node
Summary Path
Edge weight = 1
Edge weight = 0
Closed Node
X A E
∞
0
∞
∞
∞
∞∞
∞
∞
0
0
0
D
0
H
X
Motivation Problem Contributions Validation Summary
Design Decision: Network Voronoi (NV) Activity Assignment
A B C D
E F G H
1
2
3 4
5 6
7 8
9
10
X
DISTANCEFROM
Open:
ACTIVITIES
1 2 3 4 5 6 7 8 9 10
A
E
D
H
AE
DH
Closed:
Activity
Active Node
Inactive Node
Virtual Node
Summary Path
Edge weight = 1
Edge weight = 0
Closed Node
A E
∞
0
∞
∞∞0
0
0
D
0
H
X1
B
1 < 0?
0
0
A
0
0
Motivation Problem Contributions Validation Summary
Design Decision: Network Voronoi (NV) Activity Assignment
A B C D
E F G H
1
2
3 4
5 6
7 8
9
10
X
DISTANCEFROM
Open:
ACTIVITIES
1 2 3 4 5 6 7 8 9 10
A
E
D
H
AE
DH
Closed:
Activity
Active Node
Inactive Node
Virtual Node
Summary Path
Edge weight = 1
Edge weight = 0
Closed Node
E
∞
0
∞
∞
0
0
0
D
0
H
X1
B
0
0
A
F
1
0
0
0 0
0 0
E
0 0
Motivation Problem Contributions Validation Summary
Design Decision: Network Voronoi (NV) Activity Assignment
A B C D
E F G H
1
2
3 4
5 6
7 8
9
10
X
DISTANCEFROM
Open:
ACTIVITIES
1 2 3 4 5 6 7 8 9 10
A
E
D
H
AE
DH
Closed:
Activity
Active Node
Inactive Node
Virtual Node
Summary Path
Edge weight = 1
Edge weight = 0
Closed Node
0
∞
∞0
0
0
D
0
H
X1
B
0
0
A
F
1
0
0
0 0
0 0
E1
C
0 0
0 0
1 < 0?
0 0
0 0
D
Motivation Problem Contributions Validation Summary
Design Decision: Network Voronoi (NV) Activity Assignment
A B C D
E F G H
1
2
3 4
5 6
7 8
9
10
X
DISTANCEFROM
Open:
ACTIVITIES
1 2 3 4 5 6 7 8 9 10
A
E
D
H
AE
DH
Closed:
Activity
Active Node
Inactive Node
Virtual Node
Summary Path
Edge weight = 1
Edge weight = 0
Closed Node
0
∞
0
0
0
0
H
X1
B
0
0
A
F
1
0
0
0 0
0 0
E1
C
0 0
0 0
0 0
0 0
D
1
G
H
0 0
Motivation Problem Contributions Validation Summary
Design Decision: Network Voronoi (NV) Activity Assignment
A B C D
E F G H
1
2
3 4
5 6
7 8
9
10
X
DISTANCEFROM
Open:
ACTIVITIES
1 2 3 4 5 6 7 8 9 10
A
E
D
H
AE
DH
Closed:
Activity
Active Node
Inactive Node
Virtual Node
Summary Path
Edge weight = 1
Edge weight = 0
Closed Node
0
0
0
0
0
X1
B
0
0
A
F
1
0
0
0 0
0 0
E1
C
0 0
0 0
0 0
0 0
D
1
G
H
2 < 1?
1
1
1
1
2 < 1?
B
0 0
Motivation Problem Contributions Validation Summary
Design Decision: Network Voronoi (NV) Activity Assignment
A B C D
E F G H
1
2
3 4
5 6
7 8
9
10
X
DISTANCEFROM
Open:
ACTIVITIES
1 2 3 4 5 6 7 8 9 10
A
E
D
H
AE
DH
Closed:
Activity
Active Node
Inactive Node
Virtual Node
Summary Path
Edge weight = 1
Edge weight = 0
Closed Node
0
0
0
0
0
X1
0
0
A
F
1
0
0
0 0
0 0
E1
C
0 0
0 0
0 0
0 0
D
1
G
H
1
1
1
1
B
2 < 1?
F
0 0
Motivation Problem Contributions Validation Summary
Design Decision: Network Voronoi (NV) Activity Assignment
A B C D
E F G H
1
2
3 4
5 6
7 8
9
10
X
DISTANCEFROM
Open:
ACTIVITIES
1 2 3 4 5 6 7 8 9 10
A
E
D
H
AE
DH
Closed:
Activity
Active Node
Inactive Node
Virtual Node
Summary Path
Edge weight = 1
Edge weight = 0
Closed Node
0
0
0
0
0
X1
0
0
A
1
0
0
0 0
0 0
E1
C
0 0
0 0
0 0
0 0
D
1
G
H
1
1
1
1
B F
1 1
1 1
C
2 < 1?
0 0
Motivation Problem Contributions Validation Summary
Design Decision: Network Voronoi (NV) Activity Assignment
 Network Voronoi Activity Assignment algorithm
Input: Graph G = (N, E), a set of Activities A, a set of k Summary Paths, S
Output: A set of k clusters formed by assigning all ai ∈A to one si ∈S, where dist(ai, si) ≤
dist(ai, sj) and sj ∈S and sj ≠ si
1. Open ← all nodes ∈ S, Closed ← Ø
2. Tnodes ← all nodes ∈ S,
3. Tactivities ← activities on si ∈S
4. repeat
5. nc ← next node ∈ Open
6. remove nc from Open
7. Closed ← nc
8. X ← neighbors of nc
9. foreach xi ∈ X
10. if xi ∉ Tnodes and xi ∉ Closed
11. Tnodes ← xi
12. xi.prev ← nc,
13. xi.dist ← dist(xi, nc) + nc.dist
14. xi.sp ← nc.sp
15. else if xi ∈Tnodes
16. update xi if new dist < xi.dist
17. if xi ∉ Open
18. Open ← xi
19. Y ← activities on edge {nc, xi}
20. foreach yi ∈ Y
21. if yi ∉ Tactivities
22. Tactivities ← yi
23. yi.prev ← nc
24. yi.dist ← xi.dist
25. yi.sp ← xi.sp
26. else
27. update yi if new dist < yi.dist
28. until all active nodes ∈ Closed
29. return currentClusters
Motivation Problem Contributions Validation Summary
Design Decision: Divide and Conquer Summary PAth
REcomputation
 Goals
 Recompute the summary path of each cluster
 Improve execution time of current recomputation strategy
 Example (execution trace) Next
K-Main Routes Algorithm
Select k shortest paths as initial summary paths
Repeat
1. Network Voronoi Activity Assignment
2. Recompute summary path of each cluster
Until summary paths do not change
K-Main Routes Algorithm
Select k shortest paths as initial summary paths
Repeat
1. Network Voronoi Activity Assignment
2. Divide and Conquer Summary path
Recomputation Design Decision
Until summary paths do not change
Motivation Problem Contributions Validation Summary
Design Decision: Divide and Conquer Summary PAth
REcomputation
 Summary Path Recomputation Algorithm
Input: Graph G = (N, E), a set of Clusters, C
Output: A set of summary paths, S where si ∈S has max coverage for ci ∈ C and si ∈ ci
1. nextClusters ← Ø
2. foreach ci ∈ C
3. X ← active nodes of ci
4. maxP ← Ø
5. foreach xi ∈ X
6. foreach xj ∈ X
7. if (i ≠ j)
8. cP ← getSP(xi, xj)
9. if (maxP = Ø)
10. maxP ← cP
11. if (maxP.activities < cP.activities)
12. maxP ← cP
13. if (maxP ≠ ci.summaryPath
14. nextClusters ← maxP
15. else
16. nextClusters ← ci.summaryPath
17. return nextClusters
A B C D
E F G H
1
2
3 4
5 6
7 8
9
10
Activity
Active Node
Inactive Node
Summary Path
Edge weights are 1
Cluster
Motivation Problem Contributions Validation Summary
Validation
 Analytical
 Cost analysis explaining computational savings
 Experimental
 Comparative analysis of KMR with various design decisions
 Performed on real and synthetic data
 Network voronoi activity assignment and divide and conquer summary path
recomputation saves computational costs
 Savings increase with number of nodes, routes, activities and active node ratio
 Case studies
 Qualitatively shows the usefulness of network based summarization on Crime
data
Motivation Problem Contributions Validation Summary
Analytical Evaluation: Computational Analysis
 KMR Execution Time = Number of Iterations × (Activity Assignment
Cost + Summary Path Recomputation Cost)
 TKMR = I × ([K × |A| × cost(ai,ci)] + [K × dc × |N|2])
 TKMR_I = I × ([K × |A| × cost(ai,ci)] + [K × dc × (|N| × r)2])
 TKMR_IAS = I × ([|E| + |N|×log |N|] + [K × dc × (|N|/K × r)2])
I = Number of Iterations
K = Number of Clusters
A = Set of activities
cost(ai, ci) = Cost of calculating the distance between activity ai and cluster ci
dc = Cost of looking up a path
N = Set of Nodes
E = Set of Edges
r = active node ratio, 0 ≤ r ≤ 1
Motivation Problem Contributions Validation Summary
Experimental Evaluation
• Goal: Comparative analysis
• Candidates: KMR with various design decisions
• KMR_I – KMR with inactive node pruning
• KMR_IV – KMR with inactive node pruning and Network voronoi activity assignment
• KMR_ID – KMR with Divide and conquer summary path recomputation
• KMR_IVD – KMR with all three design decisions
• Measure: CPU time (Unix time command)
• Platform: Mac Pro, 2 x Xeon Quad Core 2.26 GHz, 16 GB RAM
• Variables: #Nodes, #Routes, #Activities, Active Node Ratio
• Fixed Parameters: unit edge length
• Datasets: Synthetic and Real (Haiti Earthquake)
Real Dataset
Analysis
#Nodes
#Routes
Java-based Simulator
KMR_I KMR_IV
Candidates
Variables
#Activities
Active Node
Ratio
Measures
Synthetic Dataset
KMR_ID KMR_IVD
Motivation Problem Contributions Validation Summary
Data Description and Characteristics
 Synthetic Data
 2010 Census TIGER/Line® Shapefiles used for road network
 Activities randomly assigned to each edge
 Real-world data: Haiti Data Set
 Geospatial and Temporal Dataset describing recent events post-disaster
 Dataset collected from Jan 12, 2010 to March 23, 2010
 1,677 records
 Characteristics
 Attributes
• Incident Title (e.g., “Food, Water, Tents needed…”)
• Incident Date and Time
• Location (City, port name)
• Category (numeric category)
• Latitude/Longitude
 Sources
 Crisis Map of Haiti - http://haiti.ushahidi.com/
 OpenStreetMap - http://www.openstreetmap.org/
Motivation Problem Contributions Validation Summary
Effect of Number of Nodes
Synthetic Data Set
Number of Activities = 1200
Active Node Ratio = 0.2
K = 2
Trends:
 Voronoi Activity assignment and divide and conquer summary path recomputation saves comp. costs
 Savings increase with number of nodes
Real Data Set
Number of Activities = 1206
Active Node Ratio = 0.1998
K = 2
Motivation Problem Contributions Validation Summary
Effect of Number of Routes, K
Synthetic Data Set
Number of Nodes = 1000
Number of Activities = 1200
Active Node Ratio = 0.2
Real Data Set
Number of Nodes = 1000
Number of Activities = 202
Active Node Ratio = 0.219
Trends:
 Voronoi Activity assignment and divide and conquer summary path recomputation saves comp. costs
 Savings increase with number of routes
Motivation Problem Contributions Validation Summary
Effect of Number of Activities
Synthetic Data Set
Number of Nodes = 1000
Active Node Ratio = 0.2
K = 2
Trends:
 Voronoi Activity assignment and divide and conquer summary path recomputation saves comp. costs
 Savings increase with number of activities
Motivation Problem Contributions Validation Summary
Effect of Active Node Ratio
Synthetic Data Set
Number of Nodes = 1000
Number of Activities = 1200
K = 2
Trends:
 Voronoi Activity assignment and divide and conquer summary path recomputation saves comp. costs
 Savings increase with active node ratio
Input (a set of crime incidents, k=5) KMR Output
Crimestat K-Means (Euclidean distance) Crimestat K-Means (Network distance)
Case Study: Crime Analysis
Input (a set of crime incidents, k=5) KMR Output
Crimestat K-Means (Euclidean distance) Crimestat K-Means (Network distance)
Case Study: Crime Analysis
Input (a set of crime incidents, k=5) KMR Output
Crimestat K-Means (Euclidean distance) Crimestat K-Means (Network distance)
Case Study: Crime Analysis
Motivation Problem Contributions Validation Summary
Summary
 Spatial network activity summarization was shown to be NP-complete.
 K-Main Routes (KMR) algorithm and its design decisions described
 Inactive node pruning
 Network Voronoi Activity assignment
 Divide and Conquer Summary path recomputation
 Analytically demonstrated correctness of design decisions and cost analysis
showed
 Experimental evaluation
 Performance evaluated using synthetic and real world datasets
 Case study comparing KMR with geometry based summarization
Acknowledgements
 Members of the Spatial Database and Spatial Data Mining Research Group, University of
Minnesota, Twin-Cities.
 This work was supported by grants from USARMY and USDOD.
 Thank you for your time! Any questions or comments?

Contenu connexe

Tendances

Parallel algorithm for computing edt with new architecture
Parallel algorithm for computing edt with new architectureParallel algorithm for computing edt with new architecture
Parallel algorithm for computing edt with new architectureIAEME Publication
 
Pilot Contamination Mitigation for Wideband Massive MIMO: Number of Cells Vs ...
Pilot Contamination Mitigation for Wideband Massive MIMO: Number of Cells Vs ...Pilot Contamination Mitigation for Wideband Massive MIMO: Number of Cells Vs ...
Pilot Contamination Mitigation for Wideband Massive MIMO: Number of Cells Vs ...T. E. BOGALE
 
EENG519FinalProjectReport
EENG519FinalProjectReportEENG519FinalProjectReport
EENG519FinalProjectReportDaniel K
 
Projectwork on different boundary conditions in FDM.
Projectwork on different boundary conditions in FDM.Projectwork on different boundary conditions in FDM.
Projectwork on different boundary conditions in FDM.Nagesh NARASIMHA PRASAD
 
presentation
presentationpresentation
presentationjie ren
 
Surface reconstruction from point clouds using optimal transportation
Surface reconstruction from point clouds using optimal transportationSurface reconstruction from point clouds using optimal transportation
Surface reconstruction from point clouds using optimal transportationGuillaume Matheron
 
Reduction of multiple subsystem [compatibility mode]
Reduction of multiple subsystem [compatibility mode]Reduction of multiple subsystem [compatibility mode]
Reduction of multiple subsystem [compatibility mode]azroyyazid
 
K-means Clustering
K-means ClusteringK-means Clustering
K-means ClusteringSajib Sen
 
icml2004 tutorial on spectral clustering part I
icml2004 tutorial on spectral clustering part Iicml2004 tutorial on spectral clustering part I
icml2004 tutorial on spectral clustering part Izukun
 
icml2004 tutorial on spectral clustering part II
icml2004 tutorial on spectral clustering part IIicml2004 tutorial on spectral clustering part II
icml2004 tutorial on spectral clustering part IIzukun
 
Syde770a presentation
Syde770a presentationSyde770a presentation
Syde770a presentationSai Kumar
 
K-Sort: A New Sorting Algorithm that Beats Heap Sort for n 70 Lakhs!
K-Sort: A New Sorting Algorithm that Beats Heap Sort for n 70 Lakhs!K-Sort: A New Sorting Algorithm that Beats Heap Sort for n 70 Lakhs!
K-Sort: A New Sorting Algorithm that Beats Heap Sort for n 70 Lakhs!idescitation
 
study Streaming Multigrid For Gradient Domain Operations On Large Images
study Streaming Multigrid For Gradient Domain Operations On Large Imagesstudy Streaming Multigrid For Gradient Domain Operations On Large Images
study Streaming Multigrid For Gradient Domain Operations On Large ImagesChiamin Hsu
 
International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)IJMIT JOURNAL
 

Tendances (20)

Relatório
RelatórioRelatório
Relatório
 
E33018021
E33018021E33018021
E33018021
 
Parallel algorithm for computing edt with new architecture
Parallel algorithm for computing edt with new architectureParallel algorithm for computing edt with new architecture
Parallel algorithm for computing edt with new architecture
 
Pilot Contamination Mitigation for Wideband Massive MIMO: Number of Cells Vs ...
Pilot Contamination Mitigation for Wideband Massive MIMO: Number of Cells Vs ...Pilot Contamination Mitigation for Wideband Massive MIMO: Number of Cells Vs ...
Pilot Contamination Mitigation for Wideband Massive MIMO: Number of Cells Vs ...
 
EENG519FinalProjectReport
EENG519FinalProjectReportEENG519FinalProjectReport
EENG519FinalProjectReport
 
Projectwork on different boundary conditions in FDM.
Projectwork on different boundary conditions in FDM.Projectwork on different boundary conditions in FDM.
Projectwork on different boundary conditions in FDM.
 
presentation
presentationpresentation
presentation
 
Surface reconstruction from point clouds using optimal transportation
Surface reconstruction from point clouds using optimal transportationSurface reconstruction from point clouds using optimal transportation
Surface reconstruction from point clouds using optimal transportation
 
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
 
Reduction of multiple subsystem [compatibility mode]
Reduction of multiple subsystem [compatibility mode]Reduction of multiple subsystem [compatibility mode]
Reduction of multiple subsystem [compatibility mode]
 
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
QMC Program: Trends and Advances in Monte Carlo Sampling Algorithms Workshop,...
 
K-means Clustering
K-means ClusteringK-means Clustering
K-means Clustering
 
icml2004 tutorial on spectral clustering part I
icml2004 tutorial on spectral clustering part Iicml2004 tutorial on spectral clustering part I
icml2004 tutorial on spectral clustering part I
 
icml2004 tutorial on spectral clustering part II
icml2004 tutorial on spectral clustering part IIicml2004 tutorial on spectral clustering part II
icml2004 tutorial on spectral clustering part II
 
Syde770a presentation
Syde770a presentationSyde770a presentation
Syde770a presentation
 
Master's thesis
Master's thesisMaster's thesis
Master's thesis
 
K-Sort: A New Sorting Algorithm that Beats Heap Sort for n 70 Lakhs!
K-Sort: A New Sorting Algorithm that Beats Heap Sort for n 70 Lakhs!K-Sort: A New Sorting Algorithm that Beats Heap Sort for n 70 Lakhs!
K-Sort: A New Sorting Algorithm that Beats Heap Sort for n 70 Lakhs!
 
Slide11 icc2015
Slide11 icc2015Slide11 icc2015
Slide11 icc2015
 
study Streaming Multigrid For Gradient Domain Operations On Large Images
study Streaming Multigrid For Gradient Domain Operations On Large Imagesstudy Streaming Multigrid For Gradient Domain Operations On Large Images
study Streaming Multigrid For Gradient Domain Operations On Large Images
 
International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)
 

En vedette

Investigación sobre el rumor en las organizaciones
Investigación sobre el rumor en las organizacionesInvestigación sobre el rumor en las organizaciones
Investigación sobre el rumor en las organizacionesMaximiliano Blanc
 
TWT iBeacon Services – Branchenfokus Messe & Event
TWT iBeacon Services – Branchenfokus Messe & EventTWT iBeacon Services – Branchenfokus Messe & Event
TWT iBeacon Services – Branchenfokus Messe & EventTWT
 
P(A)T Galicia
P(A)T GaliciaP(A)T Galicia
P(A)T GaliciaShanaiss
 
Auflage kosmetik nicht mehr als gefahr
Auflage kosmetik nicht mehr als gefahrAuflage kosmetik nicht mehr als gefahr
Auflage kosmetik nicht mehr als gefahroekoadressen
 
Nexxus News Spring 2011 edition
Nexxus News Spring 2011 editionNexxus News Spring 2011 edition
Nexxus News Spring 2011 editionNexxus Scotland
 
Correo Electronico & Correo Postal
Correo Electronico & Correo PostalCorreo Electronico & Correo Postal
Correo Electronico & Correo PostalStefanya Toscano
 
Unicall Fundraising prostřednictvím kontaktního centra
Unicall Fundraising prostřednictvím kontaktního centraUnicall Fundraising prostřednictvím kontaktního centra
Unicall Fundraising prostřednictvím kontaktního centraUniCall Communication Group
 
I polítiques de mk internacional
I polítiques de mk internacionalI polítiques de mk internacional
I polítiques de mk internacionalMarketing per tu
 
3°mcsl primer gobiernoibañezcampo
3°mcsl primer gobiernoibañezcampo3°mcsl primer gobiernoibañezcampo
3°mcsl primer gobiernoibañezcampoXimena Prado
 

En vedette (20)

Investigación sobre el rumor en las organizaciones
Investigación sobre el rumor en las organizacionesInvestigación sobre el rumor en las organizaciones
Investigación sobre el rumor en las organizaciones
 
LA CRÓNICA 629
LA CRÓNICA 629LA CRÓNICA 629
LA CRÓNICA 629
 
TWT iBeacon Services – Branchenfokus Messe & Event
TWT iBeacon Services – Branchenfokus Messe & EventTWT iBeacon Services – Branchenfokus Messe & Event
TWT iBeacon Services – Branchenfokus Messe & Event
 
P(A)T Galicia
P(A)T GaliciaP(A)T Galicia
P(A)T Galicia
 
Jahresbericht_2015
Jahresbericht_2015Jahresbericht_2015
Jahresbericht_2015
 
Auflage kosmetik nicht mehr als gefahr
Auflage kosmetik nicht mehr als gefahrAuflage kosmetik nicht mehr als gefahr
Auflage kosmetik nicht mehr als gefahr
 
The New Basis of Claim Form (BOC) for Refugee Claims
The New Basis of Claim Form (BOC) for Refugee ClaimsThe New Basis of Claim Form (BOC) for Refugee Claims
The New Basis of Claim Form (BOC) for Refugee Claims
 
Nexxus News Spring 2011 edition
Nexxus News Spring 2011 editionNexxus News Spring 2011 edition
Nexxus News Spring 2011 edition
 
Correo Electronico & Correo Postal
Correo Electronico & Correo PostalCorreo Electronico & Correo Postal
Correo Electronico & Correo Postal
 
Código de inscripción
Código de inscripciónCódigo de inscripción
Código de inscripción
 
Unicall Fundraising prostřednictvím kontaktního centra
Unicall Fundraising prostřednictvím kontaktního centraUnicall Fundraising prostřednictvím kontaktního centra
Unicall Fundraising prostřednictvím kontaktního centra
 
consultas con parametros
consultas con parametrosconsultas con parametros
consultas con parametros
 
I polítiques de mk internacional
I polítiques de mk internacionalI polítiques de mk internacional
I polítiques de mk internacional
 
Carp mag 2013 lo
Carp mag 2013 loCarp mag 2013 lo
Carp mag 2013 lo
 
Brochure corso certificazione CPF - IBF
Brochure corso certificazione CPF -  IBFBrochure corso certificazione CPF -  IBF
Brochure corso certificazione CPF - IBF
 
Comercios vpos alignet v06
Comercios vpos alignet v06Comercios vpos alignet v06
Comercios vpos alignet v06
 
Presentación canastas de frutas
Presentación canastas de frutasPresentación canastas de frutas
Presentación canastas de frutas
 
3°mcsl primer gobiernoibañezcampo
3°mcsl primer gobiernoibañezcampo3°mcsl primer gobiernoibañezcampo
3°mcsl primer gobiernoibañezcampo
 
Unidad 6
Unidad 6Unidad 6
Unidad 6
 
Adecco
AdeccoAdecco
Adecco
 

Similaire à Kmr slides

1 chayes
1 chayes1 chayes
1 chayesYandex
 
Mit15 082 jf10_lec01
Mit15 082 jf10_lec01Mit15 082 jf10_lec01
Mit15 082 jf10_lec01Saad Liaqat
 
Efficient Identification of Improving Moves in a Ball for Pseudo-Boolean Prob...
Efficient Identification of Improving Moves in a Ball for Pseudo-Boolean Prob...Efficient Identification of Improving Moves in a Ball for Pseudo-Boolean Prob...
Efficient Identification of Improving Moves in a Ball for Pseudo-Boolean Prob...jfrchicanog
 
Sampling-Based Planning Algorithms for Multi-Objective Missions
Sampling-Based Planning Algorithms for Multi-Objective MissionsSampling-Based Planning Algorithms for Multi-Objective Missions
Sampling-Based Planning Algorithms for Multi-Objective MissionsMd Mahbubur Rahman
 
Markov Chain Monitoring - Application to demand prediction in bike sharing sy...
Markov Chain Monitoring - Application to demand prediction in bike sharing sy...Markov Chain Monitoring - Application to demand prediction in bike sharing sy...
Markov Chain Monitoring - Application to demand prediction in bike sharing sy...Harshal Chaudhari
 
A navigation mesh_for_dynamic_environments
A navigation mesh_for_dynamic_environmentsA navigation mesh_for_dynamic_environments
A navigation mesh_for_dynamic_environmentsRoger Hernando Buch
 
Research Summary: Scalable Algorithms for Nearest-Neighbor Joins on Big Traje...
Research Summary: Scalable Algorithms for Nearest-Neighbor Joins on Big Traje...Research Summary: Scalable Algorithms for Nearest-Neighbor Joins on Big Traje...
Research Summary: Scalable Algorithms for Nearest-Neighbor Joins on Big Traje...Alex Klibisz
 
Scalable Dynamic Graph Summarization
Scalable Dynamic Graph SummarizationScalable Dynamic Graph Summarization
Scalable Dynamic Graph SummarizationIoanna Tsalouchidou
 
[Term project] Junction-point process
[Term project] Junction-point process[Term project] Junction-point process
[Term project] Junction-point processKyunghoon Kim
 
test pre
test pretest pre
test prefarazch
 
Efficient Hill Climber for Constrained Pseudo-Boolean Optimization Problems
Efficient Hill Climber for Constrained Pseudo-Boolean Optimization ProblemsEfficient Hill Climber for Constrained Pseudo-Boolean Optimization Problems
Efficient Hill Climber for Constrained Pseudo-Boolean Optimization Problemsjfrchicanog
 
Branch and bound technique
Branch and bound techniqueBranch and bound technique
Branch and bound techniqueishmecse13
 
Poggi analytics - distance - 1a
Poggi   analytics - distance - 1aPoggi   analytics - distance - 1a
Poggi analytics - distance - 1aGaston Liberman
 
"An adaptive modular approach to the mining of sensor network ...
"An adaptive modular approach to the mining of sensor network ..."An adaptive modular approach to the mining of sensor network ...
"An adaptive modular approach to the mining of sensor network ...butest
 
Distributed Parallel Process Particle Swarm Optimization on Fixed Charge Netw...
Distributed Parallel Process Particle Swarm Optimization on Fixed Charge Netw...Distributed Parallel Process Particle Swarm Optimization on Fixed Charge Netw...
Distributed Parallel Process Particle Swarm Optimization on Fixed Charge Netw...Corey Clark, Ph.D.
 
Graph Edit Distance: Basics & Trends
Graph Edit Distance: Basics & TrendsGraph Edit Distance: Basics & Trends
Graph Edit Distance: Basics & TrendsLuc Brun
 
ECCV2008: MAP Estimation Algorithms in Computer Vision - Part 2
ECCV2008: MAP Estimation Algorithms in Computer Vision - Part 2ECCV2008: MAP Estimation Algorithms in Computer Vision - Part 2
ECCV2008: MAP Estimation Algorithms in Computer Vision - Part 2zukun
 

Similaire à Kmr slides (20)

1 chayes
1 chayes1 chayes
1 chayes
 
Mit15 082 jf10_lec01
Mit15 082 jf10_lec01Mit15 082 jf10_lec01
Mit15 082 jf10_lec01
 
Efficient Identification of Improving Moves in a Ball for Pseudo-Boolean Prob...
Efficient Identification of Improving Moves in a Ball for Pseudo-Boolean Prob...Efficient Identification of Improving Moves in a Ball for Pseudo-Boolean Prob...
Efficient Identification of Improving Moves in a Ball for Pseudo-Boolean Prob...
 
Lecture 3.pdf
Lecture 3.pdfLecture 3.pdf
Lecture 3.pdf
 
Sampling-Based Planning Algorithms for Multi-Objective Missions
Sampling-Based Planning Algorithms for Multi-Objective MissionsSampling-Based Planning Algorithms for Multi-Objective Missions
Sampling-Based Planning Algorithms for Multi-Objective Missions
 
Markov Chain Monitoring - Application to demand prediction in bike sharing sy...
Markov Chain Monitoring - Application to demand prediction in bike sharing sy...Markov Chain Monitoring - Application to demand prediction in bike sharing sy...
Markov Chain Monitoring - Application to demand prediction in bike sharing sy...
 
A navigation mesh_for_dynamic_environments
A navigation mesh_for_dynamic_environmentsA navigation mesh_for_dynamic_environments
A navigation mesh_for_dynamic_environments
 
Research Summary: Scalable Algorithms for Nearest-Neighbor Joins on Big Traje...
Research Summary: Scalable Algorithms for Nearest-Neighbor Joins on Big Traje...Research Summary: Scalable Algorithms for Nearest-Neighbor Joins on Big Traje...
Research Summary: Scalable Algorithms for Nearest-Neighbor Joins on Big Traje...
 
Scalable Dynamic Graph Summarization
Scalable Dynamic Graph SummarizationScalable Dynamic Graph Summarization
Scalable Dynamic Graph Summarization
 
[Term project] Junction-point process
[Term project] Junction-point process[Term project] Junction-point process
[Term project] Junction-point process
 
test pre
test pretest pre
test pre
 
Efficient Hill Climber for Constrained Pseudo-Boolean Optimization Problems
Efficient Hill Climber for Constrained Pseudo-Boolean Optimization ProblemsEfficient Hill Climber for Constrained Pseudo-Boolean Optimization Problems
Efficient Hill Climber for Constrained Pseudo-Boolean Optimization Problems
 
Branch and bound technique
Branch and bound techniqueBranch and bound technique
Branch and bound technique
 
Poggi analytics - distance - 1a
Poggi   analytics - distance - 1aPoggi   analytics - distance - 1a
Poggi analytics - distance - 1a
 
"An adaptive modular approach to the mining of sensor network ...
"An adaptive modular approach to the mining of sensor network ..."An adaptive modular approach to the mining of sensor network ...
"An adaptive modular approach to the mining of sensor network ...
 
Distributed Parallel Process Particle Swarm Optimization on Fixed Charge Netw...
Distributed Parallel Process Particle Swarm Optimization on Fixed Charge Netw...Distributed Parallel Process Particle Swarm Optimization on Fixed Charge Netw...
Distributed Parallel Process Particle Swarm Optimization on Fixed Charge Netw...
 
Network Design Assignment Help
Network Design Assignment HelpNetwork Design Assignment Help
Network Design Assignment Help
 
Graph Edit Distance: Basics & Trends
Graph Edit Distance: Basics & TrendsGraph Edit Distance: Basics & Trends
Graph Edit Distance: Basics & Trends
 
ECCV2008: MAP Estimation Algorithms in Computer Vision - Part 2
ECCV2008: MAP Estimation Algorithms in Computer Vision - Part 2ECCV2008: MAP Estimation Algorithms in Computer Vision - Part 2
ECCV2008: MAP Estimation Algorithms in Computer Vision - Part 2
 
5.2_video_slides.pptx
5.2_video_slides.pptx5.2_video_slides.pptx
5.2_video_slides.pptx
 

Dernier

KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosVictor Morales
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdfAkritiPradhan2
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书rnrncn29
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmDeepika Walanjkar
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdfsahilsajad201
 
signals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsignals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsapna80328
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxStephen Sitton
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfisabel213075
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHSneha Padhiar
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSsandhya757531
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 

Dernier (20)

KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitos
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
 
signals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsignals in triangulation .. ...Surveying
signals in triangulation .. ...Surveying
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptx
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdf
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 

Kmr slides

  • 1. A K-Main Routes Approach to Spatial Network Activity Summarization Authors: Dev Oliver Shashi Shekhar James M. Kang Renee Bousselaire Abdussalam Bannur
  • 2. Outline  Motivation  Problem Statement  Contributions  Validation  Analytical  Experimental  Case Studies  Summary and Future Work
  • 3. Motivation: Crime Analysis (application domain)  Crime hotspot  Area of concentrated crime Street Place Neighborhood **J. E. Eck et. al. Mapping Crime: Understanding Hot Spots. US National Inst. of Justice (http://www.ncjrs.gov/pdffiles1/nij/209393.pdf), 2005. “Most clustering algorithms will show areas of concentration even when a line is the most appropriate dimension.” – National Institute of Justice** Star Tribune, January 26, 2011
  • 4. Examples of Linear Patterns Linear patterns resulting from deforestation in Brazil http://en.wikipedia.org/wiki/Deforestation_in_Brazil Linear patterns of crime in a major US city
  • 5. Motivation: Environmental Criminology (scientific domain)  Spatial theories in Environmental Criminology 1L.E. Cohen et al., Social change and crime rate trends: A routine activity approach, American sociological review, 1979. 2P. L. Brantingham et al., Environmental Criminology, Waveland Press, 1990.  Routine Activity Theory1  Crime location related to criminal’s frequently visited areas  Crime Pattern Theory2  Based on spatial model  Nodes (e.g. home, work, entertainment),  Paths (e.g. routes between nodes),  Edges  Crime locations close to edges  Near criminal’s activity boundaries where residents may not recognize him/her Source: Rossmo, Kim (2000). Geographic Profiling. Boca Raton, FL: CRC Press. http://www.popcenter.org/learning/60steps/index.cfm?stepNum=16  Network based summarization adds value to Environmental Criminology  Assist with large scale verification of real-world data matching theories  Opportunities to develop hypotheses for new theory formulation
  • 6. Other Domains Accident Analysis and PreventionDisaster Relief
  • 7. Motivation Problem Contributions Validation Summary Key Concepts  Activity  Object of interest located at node or edge  Summary path  A path chosen by KMR to summarize activities  Activity coverage  Total number of activities of a path or set of paths  Active node  A node having n ≥ 1 activities or joined by an edge having n ≥ 1 activities e.g., A, B, C, D, E  Inactive node  A node having n = 0 activities and joined by edges all having n = 0 activities e.g., F  Active node ratio  Total # active nodes/Total # nodes  e.g., 5/6 Each edge has a weight of 1
  • 8. Motivation Problem Contributions Validation Summary Problem Statement  Given  A spatial network G = (N, E)  A set of activities, A and their locations (e.g. a node or edge)  A set of Paths, P  K (Number of routes)  Edge weights  Find  A cardinality k subset P′ of P, i.e., a subset P′⊆ P with |P′| = k  Objective  Maximize the activity coverage (AC) by P′  Constraints  1 ≤ k ≤ |P|. k = 2 Edge Weights are 1 Given P = the set of Shortest Paths
  • 9. Motivation Problem Contributions Validation Summary Challenges  Measures of interestingness  Activity coverage, average distance, etc  Computational Complexity  Choose(N,2) paths, given N nodes  Exponential number of k subsets of paths
  • 10. Motivation Problem Contributions Validation Summary Related Work Network Summarization by Grouping/Clustering Clumping (Okabe), e.g. NT-VCM (Shiode) Max. Subgraph, e.g. path, tree (Buchin) Multiple routesZero or One routes Our Work
  • 11. Motivation Problem Contributions Validation Summary Contributions  K-Main Routes (KMR) algorithm  Finds a set of k routes to group activities  New design decisions added  Network Voronoi Activity assignment  Divide and Conquer Summary path recomputation  Spatial network activity summarization is shown to be NP-complete.  Analytically demonstrate correctness of design decisions and show cost analysis  Experimental evaluation of the various algorithms  Performance evaluated using synthetic and real world datasets  Case study comparing KMR with geometry based summarization
  • 12. Motivation Problem Contributions Validation Summary K-Main Routes (KMR) Algorithm  K-Main Routes Algorithm  Select k paths as initial summary paths  Repeat 1. Form k clusters by assigning each activity to its closest summary path 2. Recompute summary path of each cluster  Until summary paths do not change  Design Decisions  Inactive node pruning  Network Voronoi Activity assignment  Divide and Conquer Summary path recomputation P = the set of Shortest Paths, K=2
  • 13. Motivation Problem Contributions Validation Summary Design Decision: Inactive Node Pruning  Only consider paths between active nodes  Optimal solution will still be in this set Given the set of shortest paths • 20 shortest paths calculated and stored versus 30
  • 14. Motivation Problem Contributions Validation Summary Design Decision: Network Voronoi (NV) Activity Assignment  Goals  Form k clusters by assigning each activity to its closest summary path  Improve execution time of current assignment strategy  Example (execution trace) Next K-Main Routes Algorithm Select k shortest paths as initial summary paths Repeat 1. Form k clusters by assigning each activity to its closest summary path 2. Recompute summary path of each cluster Until summary paths do not change K-Main Routes Algorithm Select k shortest paths as initial summary paths Repeat 1. Network Voronoi Activity Assignment 2. Recompute summary path of each cluster Until summary paths do not change
  • 15. Motivation Problem Contributions Validation Summary Design Decision: Network Voronoi (NV) Activity Assignment A B C D E F G H 1 2 3 4 5 6 7 8 9 10 X DISTANCEFROM Open: ACTIVITIES 1 2 3 4 5 6 7 8 9 10 A E D H AE DH Closed: Activity Active Node Inactive Node Virtual Node Summary Path Edge weight = 1 Edge weight = 0 Closed Node X A E ∞ 0 ∞ ∞ ∞ ∞∞ ∞ ∞ 0 0 0 D 0 H X
  • 16. Motivation Problem Contributions Validation Summary Design Decision: Network Voronoi (NV) Activity Assignment A B C D E F G H 1 2 3 4 5 6 7 8 9 10 X DISTANCEFROM Open: ACTIVITIES 1 2 3 4 5 6 7 8 9 10 A E D H AE DH Closed: Activity Active Node Inactive Node Virtual Node Summary Path Edge weight = 1 Edge weight = 0 Closed Node A E ∞ 0 ∞ ∞∞0 0 0 D 0 H X1 B 1 < 0? 0 0 A 0 0
  • 17. Motivation Problem Contributions Validation Summary Design Decision: Network Voronoi (NV) Activity Assignment A B C D E F G H 1 2 3 4 5 6 7 8 9 10 X DISTANCEFROM Open: ACTIVITIES 1 2 3 4 5 6 7 8 9 10 A E D H AE DH Closed: Activity Active Node Inactive Node Virtual Node Summary Path Edge weight = 1 Edge weight = 0 Closed Node E ∞ 0 ∞ ∞ 0 0 0 D 0 H X1 B 0 0 A F 1 0 0 0 0 0 0 E 0 0
  • 18. Motivation Problem Contributions Validation Summary Design Decision: Network Voronoi (NV) Activity Assignment A B C D E F G H 1 2 3 4 5 6 7 8 9 10 X DISTANCEFROM Open: ACTIVITIES 1 2 3 4 5 6 7 8 9 10 A E D H AE DH Closed: Activity Active Node Inactive Node Virtual Node Summary Path Edge weight = 1 Edge weight = 0 Closed Node 0 ∞ ∞0 0 0 D 0 H X1 B 0 0 A F 1 0 0 0 0 0 0 E1 C 0 0 0 0 1 < 0? 0 0 0 0 D
  • 19. Motivation Problem Contributions Validation Summary Design Decision: Network Voronoi (NV) Activity Assignment A B C D E F G H 1 2 3 4 5 6 7 8 9 10 X DISTANCEFROM Open: ACTIVITIES 1 2 3 4 5 6 7 8 9 10 A E D H AE DH Closed: Activity Active Node Inactive Node Virtual Node Summary Path Edge weight = 1 Edge weight = 0 Closed Node 0 ∞ 0 0 0 0 H X1 B 0 0 A F 1 0 0 0 0 0 0 E1 C 0 0 0 0 0 0 0 0 D 1 G H 0 0
  • 20. Motivation Problem Contributions Validation Summary Design Decision: Network Voronoi (NV) Activity Assignment A B C D E F G H 1 2 3 4 5 6 7 8 9 10 X DISTANCEFROM Open: ACTIVITIES 1 2 3 4 5 6 7 8 9 10 A E D H AE DH Closed: Activity Active Node Inactive Node Virtual Node Summary Path Edge weight = 1 Edge weight = 0 Closed Node 0 0 0 0 0 X1 B 0 0 A F 1 0 0 0 0 0 0 E1 C 0 0 0 0 0 0 0 0 D 1 G H 2 < 1? 1 1 1 1 2 < 1? B 0 0
  • 21. Motivation Problem Contributions Validation Summary Design Decision: Network Voronoi (NV) Activity Assignment A B C D E F G H 1 2 3 4 5 6 7 8 9 10 X DISTANCEFROM Open: ACTIVITIES 1 2 3 4 5 6 7 8 9 10 A E D H AE DH Closed: Activity Active Node Inactive Node Virtual Node Summary Path Edge weight = 1 Edge weight = 0 Closed Node 0 0 0 0 0 X1 0 0 A F 1 0 0 0 0 0 0 E1 C 0 0 0 0 0 0 0 0 D 1 G H 1 1 1 1 B 2 < 1? F 0 0
  • 22. Motivation Problem Contributions Validation Summary Design Decision: Network Voronoi (NV) Activity Assignment A B C D E F G H 1 2 3 4 5 6 7 8 9 10 X DISTANCEFROM Open: ACTIVITIES 1 2 3 4 5 6 7 8 9 10 A E D H AE DH Closed: Activity Active Node Inactive Node Virtual Node Summary Path Edge weight = 1 Edge weight = 0 Closed Node 0 0 0 0 0 X1 0 0 A 1 0 0 0 0 0 0 E1 C 0 0 0 0 0 0 0 0 D 1 G H 1 1 1 1 B F 1 1 1 1 C 2 < 1? 0 0
  • 23. Motivation Problem Contributions Validation Summary Design Decision: Network Voronoi (NV) Activity Assignment  Network Voronoi Activity Assignment algorithm Input: Graph G = (N, E), a set of Activities A, a set of k Summary Paths, S Output: A set of k clusters formed by assigning all ai ∈A to one si ∈S, where dist(ai, si) ≤ dist(ai, sj) and sj ∈S and sj ≠ si 1. Open ← all nodes ∈ S, Closed ← Ø 2. Tnodes ← all nodes ∈ S, 3. Tactivities ← activities on si ∈S 4. repeat 5. nc ← next node ∈ Open 6. remove nc from Open 7. Closed ← nc 8. X ← neighbors of nc 9. foreach xi ∈ X 10. if xi ∉ Tnodes and xi ∉ Closed 11. Tnodes ← xi 12. xi.prev ← nc, 13. xi.dist ← dist(xi, nc) + nc.dist 14. xi.sp ← nc.sp 15. else if xi ∈Tnodes 16. update xi if new dist < xi.dist 17. if xi ∉ Open 18. Open ← xi 19. Y ← activities on edge {nc, xi} 20. foreach yi ∈ Y 21. if yi ∉ Tactivities 22. Tactivities ← yi 23. yi.prev ← nc 24. yi.dist ← xi.dist 25. yi.sp ← xi.sp 26. else 27. update yi if new dist < yi.dist 28. until all active nodes ∈ Closed 29. return currentClusters
  • 24. Motivation Problem Contributions Validation Summary Design Decision: Divide and Conquer Summary PAth REcomputation  Goals  Recompute the summary path of each cluster  Improve execution time of current recomputation strategy  Example (execution trace) Next K-Main Routes Algorithm Select k shortest paths as initial summary paths Repeat 1. Network Voronoi Activity Assignment 2. Recompute summary path of each cluster Until summary paths do not change K-Main Routes Algorithm Select k shortest paths as initial summary paths Repeat 1. Network Voronoi Activity Assignment 2. Divide and Conquer Summary path Recomputation Design Decision Until summary paths do not change
  • 25. Motivation Problem Contributions Validation Summary Design Decision: Divide and Conquer Summary PAth REcomputation  Summary Path Recomputation Algorithm Input: Graph G = (N, E), a set of Clusters, C Output: A set of summary paths, S where si ∈S has max coverage for ci ∈ C and si ∈ ci 1. nextClusters ← Ø 2. foreach ci ∈ C 3. X ← active nodes of ci 4. maxP ← Ø 5. foreach xi ∈ X 6. foreach xj ∈ X 7. if (i ≠ j) 8. cP ← getSP(xi, xj) 9. if (maxP = Ø) 10. maxP ← cP 11. if (maxP.activities < cP.activities) 12. maxP ← cP 13. if (maxP ≠ ci.summaryPath 14. nextClusters ← maxP 15. else 16. nextClusters ← ci.summaryPath 17. return nextClusters A B C D E F G H 1 2 3 4 5 6 7 8 9 10 Activity Active Node Inactive Node Summary Path Edge weights are 1 Cluster
  • 26. Motivation Problem Contributions Validation Summary Validation  Analytical  Cost analysis explaining computational savings  Experimental  Comparative analysis of KMR with various design decisions  Performed on real and synthetic data  Network voronoi activity assignment and divide and conquer summary path recomputation saves computational costs  Savings increase with number of nodes, routes, activities and active node ratio  Case studies  Qualitatively shows the usefulness of network based summarization on Crime data
  • 27. Motivation Problem Contributions Validation Summary Analytical Evaluation: Computational Analysis  KMR Execution Time = Number of Iterations × (Activity Assignment Cost + Summary Path Recomputation Cost)  TKMR = I × ([K × |A| × cost(ai,ci)] + [K × dc × |N|2])  TKMR_I = I × ([K × |A| × cost(ai,ci)] + [K × dc × (|N| × r)2])  TKMR_IAS = I × ([|E| + |N|×log |N|] + [K × dc × (|N|/K × r)2]) I = Number of Iterations K = Number of Clusters A = Set of activities cost(ai, ci) = Cost of calculating the distance between activity ai and cluster ci dc = Cost of looking up a path N = Set of Nodes E = Set of Edges r = active node ratio, 0 ≤ r ≤ 1
  • 28. Motivation Problem Contributions Validation Summary Experimental Evaluation • Goal: Comparative analysis • Candidates: KMR with various design decisions • KMR_I – KMR with inactive node pruning • KMR_IV – KMR with inactive node pruning and Network voronoi activity assignment • KMR_ID – KMR with Divide and conquer summary path recomputation • KMR_IVD – KMR with all three design decisions • Measure: CPU time (Unix time command) • Platform: Mac Pro, 2 x Xeon Quad Core 2.26 GHz, 16 GB RAM • Variables: #Nodes, #Routes, #Activities, Active Node Ratio • Fixed Parameters: unit edge length • Datasets: Synthetic and Real (Haiti Earthquake) Real Dataset Analysis #Nodes #Routes Java-based Simulator KMR_I KMR_IV Candidates Variables #Activities Active Node Ratio Measures Synthetic Dataset KMR_ID KMR_IVD
  • 29. Motivation Problem Contributions Validation Summary Data Description and Characteristics  Synthetic Data  2010 Census TIGER/Line® Shapefiles used for road network  Activities randomly assigned to each edge  Real-world data: Haiti Data Set  Geospatial and Temporal Dataset describing recent events post-disaster  Dataset collected from Jan 12, 2010 to March 23, 2010  1,677 records  Characteristics  Attributes • Incident Title (e.g., “Food, Water, Tents needed…”) • Incident Date and Time • Location (City, port name) • Category (numeric category) • Latitude/Longitude  Sources  Crisis Map of Haiti - http://haiti.ushahidi.com/  OpenStreetMap - http://www.openstreetmap.org/
  • 30. Motivation Problem Contributions Validation Summary Effect of Number of Nodes Synthetic Data Set Number of Activities = 1200 Active Node Ratio = 0.2 K = 2 Trends:  Voronoi Activity assignment and divide and conquer summary path recomputation saves comp. costs  Savings increase with number of nodes Real Data Set Number of Activities = 1206 Active Node Ratio = 0.1998 K = 2
  • 31. Motivation Problem Contributions Validation Summary Effect of Number of Routes, K Synthetic Data Set Number of Nodes = 1000 Number of Activities = 1200 Active Node Ratio = 0.2 Real Data Set Number of Nodes = 1000 Number of Activities = 202 Active Node Ratio = 0.219 Trends:  Voronoi Activity assignment and divide and conquer summary path recomputation saves comp. costs  Savings increase with number of routes
  • 32. Motivation Problem Contributions Validation Summary Effect of Number of Activities Synthetic Data Set Number of Nodes = 1000 Active Node Ratio = 0.2 K = 2 Trends:  Voronoi Activity assignment and divide and conquer summary path recomputation saves comp. costs  Savings increase with number of activities
  • 33. Motivation Problem Contributions Validation Summary Effect of Active Node Ratio Synthetic Data Set Number of Nodes = 1000 Number of Activities = 1200 K = 2 Trends:  Voronoi Activity assignment and divide and conquer summary path recomputation saves comp. costs  Savings increase with active node ratio
  • 34. Input (a set of crime incidents, k=5) KMR Output Crimestat K-Means (Euclidean distance) Crimestat K-Means (Network distance) Case Study: Crime Analysis
  • 35. Input (a set of crime incidents, k=5) KMR Output Crimestat K-Means (Euclidean distance) Crimestat K-Means (Network distance) Case Study: Crime Analysis
  • 36. Input (a set of crime incidents, k=5) KMR Output Crimestat K-Means (Euclidean distance) Crimestat K-Means (Network distance) Case Study: Crime Analysis
  • 37. Motivation Problem Contributions Validation Summary Summary  Spatial network activity summarization was shown to be NP-complete.  K-Main Routes (KMR) algorithm and its design decisions described  Inactive node pruning  Network Voronoi Activity assignment  Divide and Conquer Summary path recomputation  Analytically demonstrated correctness of design decisions and cost analysis showed  Experimental evaluation  Performance evaluated using synthetic and real world datasets  Case study comparing KMR with geometry based summarization
  • 38. Acknowledgements  Members of the Spatial Database and Spatial Data Mining Research Group, University of Minnesota, Twin-Cities.  This work was supported by grants from USARMY and USDOD.  Thank you for your time! Any questions or comments?